veritas storagecentral™ 5command scsrm.....168 chapter 4. working with netapp filers..... 171...
TRANSCRIPT
VERITAS StorageCentral™ 5.2 User’s Guide Windows
N113648
Disclaimer
The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual.
VERITAS Legal Notice
Copyright © 2003 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo, and all VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS and the VERITAS logo, Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.
VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 USA Phone 650-527-8000 Fax 650-527-2908 www.veritas.com
Contents
Chapter 1. Getting Started ..................................................................................... 1 Introduction to StorageCentral ..................................................................................................................1
Product Benefits ....................................................................................................................................1 Related Products ...................................................................................................................................2
What's New in StorageCentral 5.2 .............................................................................................................3 Features Related to the Active Directory...........................................................................................3 Features Related to Network Appliance Filers.................................................................................3 Other New Features and Capabilities ................................................................................................4
What's New in StorageCentral 5.1 .............................................................................................................6 What's New in StorageCentral 5.0 .............................................................................................................7 MMC Overview .........................................................................................................................................10 Active Directory .........................................................................................................................................13
Schema Modifications ........................................................................................................................13 StorageCentral Schema in the Active Directory .............................................................................13 Display Structure ................................................................................................................................14 Installation Notes................................................................................................................................14
Getting Technical Support ........................................................................................................................16
Chapter 2. Installation and Upgrade.................................................................... 19 Introduction to the Installation Process ..................................................................................................19 Requirements..............................................................................................................................................20
Agents...................................................................................................................................................20 Collector ...............................................................................................................................................21 Console.................................................................................................................................................21 Network Appliance Filer ...................................................................................................................22 Remote Agent......................................................................................................................................22
Upgrade Roadmap.....................................................................................................................................23 Upgrading from Earlier Releases of StorageCentral SRM to VERITAS StorageCentral 5.2 .....23 Compatibility Between VERITAS StorageCentral 5.2 and Earlier Releases ...............................27
StorageCentral 5.2 and StorageCentral 4.1...............................................................................27 StorageCentral 5.2 and StorageCentral SRM 5 ........................................................................27
Installation Worksheet ..............................................................................................................................29 Installation Checklist .................................................................................................................................35 Customizing the ActiveReports Component (CAB File)......................................................................40 Verifying the Installation ..........................................................................................................................42
i
Installation Verification: Standard Edition.....................................................................................43 Installation Verification: Active Directory Edition........................................................................46 Installation Verification: Network Appliance Editions ................................................................48 Installation Verification: AD Extended the Schema......................................................................54
Uninstalling StorageCentral .....................................................................................................................55 Silent Installation........................................................................................................................................56 Silent Uninstallation ..................................................................................................................................59 Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2 ......................................................................................................................................60
Chapter 3. Using StorageCentral......................................................................... 63 Viewing and Modifying Global Properties ............................................................................................63
Audit Tab .............................................................................................................................................64 Event Log Tab......................................................................................................................................64
Space Allocation...........................................................................................................................64 File Blocking .................................................................................................................................65
File Blocking Tab.................................................................................................................................65 Mail Tab ...............................................................................................................................................66
Exchange Mail Settings ...............................................................................................................66 SMTP Mail Settings .....................................................................................................................67 Using Active Directory for E-mail.............................................................................................67
Network Appliance Tab.....................................................................................................................68 Remote Agent Tab ..............................................................................................................................68 Reports Tab..........................................................................................................................................68 Space Allocation Tab ..........................................................................................................................69 SQL Server Tab....................................................................................................................................70 Trending Tab .......................................................................................................................................70 Version Tab..........................................................................................................................................71
Policies.........................................................................................................................................................72 Introduction to Policies ......................................................................................................................72 Managed Object Policies ....................................................................................................................72
Introduction to Managed Object Policies .................................................................................72 Creating a New Managed Object Policy...................................................................................73
The New Policy Wizard.......................................................................................................74 Policy Name Dialog Box......................................................................................................74 Policy Attributes Dialog Box...............................................................................................74 Policy Preferences Dialog Box ............................................................................................75 Set Space Allocation Dialog Box.........................................................................................75 Space Allocation Alarm Dialog Boxes ...............................................................................76 File Groups Dialog Box........................................................................................................76
ii
File Blocking Alarm Dialog Box .........................................................................................77 File Blocking Filter Dialog Box ...........................................................................................77
Deleting a Managed Object Policy ............................................................................................78 Copying a Managed Object Policy ............................................................................................78 Renaming a Managed Object Policy .........................................................................................79 Viewing and Modifying Managed Object Policy Properties .................................................79
Allocation Properties............................................................................................................80 File Blocking Properties .......................................................................................................81 Preferences.............................................................................................................................82
Managed Object Policy Propagation.........................................................................................83 Transparent Policies ....................................................................................................................84
Computer Policies...............................................................................................................................85 Introduction to Computer Policies............................................................................................85 Creating a New Computer Policy .............................................................................................86 Deleting a Computer Policy .......................................................................................................87 Viewing and Modifying Computer Policy Properties............................................................88 Applying a Computer Policy .....................................................................................................88
Managed Objects........................................................................................................................................90 Introduction to Managed Objects .....................................................................................................90
Overview.......................................................................................................................................90 Managed Object Details Pane ....................................................................................................91
Sorting the Display...............................................................................................................92 Selecting Columns to Display in the Managed Object Grid ...........................................92 Filtering the Contents of the Managed Object Grid.........................................................93 Network Appliance Filers and the Grid............................................................................93 Viewing the Contents of a Folder.......................................................................................94
Refreshing the Managed Object Database................................................................................94 Automatically........................................................................................................................94 Manually................................................................................................................................94
Running a Report Against a Managed Object .........................................................................95 Managed Objects and the Microsoft Application Event Log.................................................95
Creating a New Managed Object......................................................................................................96 The New Managed Object Wizard............................................................................................97 Folders Dialog Box ......................................................................................................................97 Folder Options Dialog Box .........................................................................................................98 User Options Dialog Box ............................................................................................................98 Select Users Dialog Box...............................................................................................................99 Select Object Type Dialog Box ...................................................................................................99 Set Space Allocation Dialog Box..............................................................................................100 Alarm Dialog Boxes...................................................................................................................100 File Groups Dialog Box.............................................................................................................101
iii
File Blocking Alarm Dialog Box...............................................................................................101 File Blocking Filter Dialog Box.................................................................................................102
Deleting a Managed Object .............................................................................................................103 Viewing and Modifying Managed Object Properties ..................................................................103
Folder Space Allocation or User Space Allocation................................................................104 Space Allocation Tab..........................................................................................................105 Alarm Tabs ..........................................................................................................................105
Auto Detect Subfolders.............................................................................................................106 Auto Detect All Users ...............................................................................................................106 File Blocking ...............................................................................................................................107
File Groups Tab...................................................................................................................107 Alarm Tab............................................................................................................................107 Filters Tab ............................................................................................................................108
Applying a Policy to a Managed Object .................................................................................108 File Groups................................................................................................................................................110
Introduction to File Groups.............................................................................................................110 Creating a New File Group .............................................................................................................110 Deleting a File Group .......................................................................................................................111 Viewing and Modifying File Group Properties............................................................................112 Copying a File Group.......................................................................................................................113 Renaming a File Group ....................................................................................................................113
Report Collectors......................................................................................................................................114 Introduction to Report Collectors...................................................................................................114 Adding a Report Collector...............................................................................................................114 Deleting a Report Collector .............................................................................................................115 Deleting a Scheduled Job .................................................................................................................115 Viewing and Modifying a Report Collector Schedule.................................................................115
Reports.......................................................................................................................................................117 Introduction to Reports....................................................................................................................117
Limitations..................................................................................................................................117 Report Definitions.............................................................................................................................118
Introduction to Report Definitions..........................................................................................118 Creating a New Report Definition ..........................................................................................119 Deleting a Report Definition ....................................................................................................121 Viewing and Modifying Report Definition Properties.........................................................122 Copying a Report Definition....................................................................................................123 Renaming a Report Definition .................................................................................................123 Report Detail ..............................................................................................................................124 Report Query..............................................................................................................................124 Report Break...............................................................................................................................126 Report Sort..................................................................................................................................128
iv
Report Total ................................................................................................................................129 Report Summary Query............................................................................................................130 Report Summary Sort................................................................................................................131 Report Summary Total..............................................................................................................132 Report Graph..............................................................................................................................133
Report Sets .........................................................................................................................................135 Introduction to Report Sets ......................................................................................................135 Creating a New Report Set .......................................................................................................136 Deleting a Report Set.................................................................................................................137 Viewing and Modifying Report Set Properties .....................................................................137
Filter Tab..............................................................................................................................138 Format Tab ..........................................................................................................................139 Output Tab ..........................................................................................................................139 Content Tab .........................................................................................................................141
Copying a Report Set ................................................................................................................142 Renaming a Report Set..............................................................................................................143 Running a Report Set ................................................................................................................143
Running a Report Set Interactively ..................................................................................143 Running a Report Set Batch ..............................................................................................145
Predefined Report Sets..............................................................................................................146 Preferred Groups and Machines............................................................................................................150
Introduction to Preferred Groups and Preferred Machines........................................................150 Creating a New Preferred Group ...................................................................................................151 Deleting a Preferred Group .............................................................................................................152 Renaming a Preferred Group ..........................................................................................................152 Viewing and Modifying Preferred Group Properties..................................................................153 Applying a Computer Policy to a Preferred Machine .................................................................153 Starting or Stopping Service on a Preferred Machine..................................................................154 Deleting a Preferred Machine .........................................................................................................155 Viewing and Modifying Preferred Machine Properties ..............................................................155
Audit Data.................................................................................................................................................156 Introduction to Audit Data..............................................................................................................156
Removing Expired Data............................................................................................................157 Viewing and Modifying Audit Properties ....................................................................................158 Deleting an Audit Record................................................................................................................158 Refreshing Audit Data .....................................................................................................................159
Command Line Commands ...................................................................................................................160 Command SCAlloc ...........................................................................................................................160 Command SCBlock...........................................................................................................................163 Command SCDisplayLimit .............................................................................................................164 Command SCReport.........................................................................................................................165
v
Command SCSRM............................................................................................................................168
Chapter 4. Working with NetApp Filers............................................................. 171 Introduction to Using StorageCentral with Network Appliance Filers ...........................................171
Controlling the Filer from StorageCentral.....................................................................................171 File Blocking and Network Appliance Filers .......................................................................................173 Space Allocation and Network Appliance Filers.................................................................................174 Space Allocation and Network Appliance Filers—Examples............................................................176 Auto Detection and Network Appliance Filers ...................................................................................180 Computer Policies and Network Appliance Filers..............................................................................181 Configuring the Filer to Work with SC.................................................................................................182
Converting to Qtrees on Network Appliance Filers ....................................................................182 Configuring SNMP for Space Allocation on Network Appliance Filers...................................182 Configuring File Blocking on Network Appliance Filers............................................................183
Chapter 5. Reference.......................................................................................... 185 AD Fields in Custom Reports.................................................................................................................185 Application Event Log ............................................................................................................................187 Auto Detection .........................................................................................................................................190
User.....................................................................................................................................................190 Subfolder............................................................................................................................................190
Handling Exceptions .................................................................................................................191 Centralized Database...............................................................................................................................192 Cluster Support ........................................................................................................................................194
Types of Clusters...............................................................................................................................194 Architecture .......................................................................................................................................195
Managed Objects........................................................................................................................195 SRM Policies, Reports, and File Groups .................................................................................195 The StorageCentralSRM5 Cluster Resource...........................................................................196
Managing Policies in a Cluster........................................................................................................196 Active Directory Cluster Configuration .................................................................................197 Standard Edition Cluster Configuration ................................................................................198
Installing StorageCentral in a Cluster ............................................................................................199 VERITAS Cluster Server Support...................................................................................................201
Configuring SQL Server Support ..........................................................................................................202 Description of File Blocking Alarm Settings ........................................................................................205
File Blocking Tab...............................................................................................................................205 Notification Tab ................................................................................................................................206 Execute Tab........................................................................................................................................208
vi
Report Tab..........................................................................................................................................209 Description of Space Allocation Alarm Settings..................................................................................211
Threshold Tab....................................................................................................................................212 Notification Tab ................................................................................................................................213 Execute Tab........................................................................................................................................215 Report Tab..........................................................................................................................................215 Extend Tab .........................................................................................................................................217
Disk Space Limit ......................................................................................................................................218 Include and Exclude Filters ....................................................................................................................219 Group Associations..................................................................................................................................220 Group Space Allocation ..........................................................................................................................222 Message Macros .......................................................................................................................................223
File Blocking Macros ........................................................................................................................223 Space Allocation Macros..................................................................................................................224
MIB.............................................................................................................................................................226 Overdraft Limit ........................................................................................................................................227 Rules of File Ownership..........................................................................................................................228 Space Allocation Options........................................................................................................................229 Trending....................................................................................................................................................232
Removing Expired Data...................................................................................................................233 Types of Space Allocation.......................................................................................................................234 Unauthorized and Authorized Files......................................................................................................236
Chapter 6. Permissions...................................................................................... 237 Introduction to Permissions ...................................................................................................................237
Standard StorageCentral Security ..................................................................................................238 Advanced StorageCentral Security ................................................................................................238
Standard StorageCentral Security..........................................................................................................239 Two Levels of Non-Administrative User Access to StorageCentral..........................................239 Standard Permissions for StorageCentral......................................................................................241
Advanced StorageCentral Security........................................................................................................243 Permissions for Help Desk Users ...................................................................................................243 Permissions for Running SRM Reports .........................................................................................246 Permissions for Service Account ....................................................................................................248 Permissions for the Registry and Active Directory......................................................................248 Permissions for DCOM ....................................................................................................................249 Permissions for WMI........................................................................................................................253 Adding Users to the SCRead and SCWrite Groups and Assigning Permissions ....................259 Adding the SCRead and SCWrite Groups to a New Directory and Assigning Permissions .260
vii
Adding the SCRead and SCWrite Groups to the WQuinn Container in the Active Directory and Assigning Permissions .............................................................................................................261 Setting Up the Task Scheduler Logon Account ............................................................................267
Chapter 7. Best Practices................................................................................... 269 Introduction to Best Practices.................................................................................................................269 General ......................................................................................................................................................271
Establish Corporate SRM Policies...................................................................................................271 Tell Users That Storage Resource Management Is Beginning ....................................................273 Create Managed Objects and Apply Policies During Off Hours ...............................................274 Monitor Overall Disk Consumption ..............................................................................................274
Running Reports ......................................................................................................................................275 Use Predefined Report Sets .............................................................................................................275 Create Your Own Report Definitions and Report Sets ................................................................276
Space Allocation.......................................................................................................................................277 Implement Passive Limits Initially.................................................................................................277 Use Auto Detect Managed Objects.................................................................................................278 Use Disk Full Error Message ...........................................................................................................278 Use Overdrafts ..................................................................................................................................279
File Blocking .............................................................................................................................................280 Create File Blocking Policies That Suit Your Site's Needs...........................................................280 Create Customized File Blocking Messages..................................................................................281
Educating Users .......................................................................................................................................282 .......................................................................................................................282 Identify User Reports
Chapter 8. Troubleshooting ............................................................................... 283 Quota Alerts Are Not Triggered From a Network Appliance Filer...........................................283 Login Failure .....................................................................................................................................284 Managed Objects Fail to Display (1 of 2) .......................................................................................284 Managed Objects Fail to Display (2 of 2) .......................................................................................285 E-mail Is Not Received From Alarms ............................................................................................285 No Audit Records are Displayed in the MMC While Connected to a Remote Domain .........286 User Account Is Marked “Safe for Delegation” Differently in Windows 2003 Server Where Domain or Forest Level Functionality Has Been Raised to Windows 2003 Native Mode......287
viii
Chapter 1. Getting Started
Introduction to StorageCentral Welcome to VERITAS StorageCentral™, a comprehensive storage capacity optimization solution. StorageCentral addresses the key storage management areas: controlling and monitoring disk space usage, reporting on storage content, and monitoring the health of your storage. It is a real-time storage resource management system for Windows 2000 (and above).
StorageCentral is designed to be a simple yet powerful product, focused on solving immediate storage problems with a minimum amount of setup and planning. With features like auto detection, detailed reporting, and policies, storage policies can be established and enforced with a minimum of administrative intervention. Storage reporting is designed to allow for storage problems to be quickly isolated and resolved on a real-time basis.
Installation requirements for StorageCentral are minimal, and this product is not dependent on any other products being installed to work properly. The installation is completely self-contained.
StorageCentral:
• Limits the users' disk space by monitoring and enforcing disk usage policies in real time
• Generates detailed reports of space consumption
• Prevents unwanted files from being saved on the servers
Product Benefits Control. StorageCentral controls the users' storage habits and prevents "runaway disk consumption." Simply select the appropriate disk space allocations by user, workgroup, or enterprise.
1
Enforcement. StorageCentral enforces pre-configured storage policies that have been set.
Continuity. StorageCentral eliminates or reduces system crashes, downtime, and loss of productivity due to lack of disk space or unnecessary space upgrades.
User Awareness. StorageCentral notifies the users of attempts to violate a certain storage policy and educates them about appropriate disk space usage, restricting their wasteful storage habits.
Efficiency. StorageCentral maximizes disk space usage and prolongs the performance of disk space investment, lowering overall storage total cost of ownership.
Recovery. StorageCentral reclaims wasted disk space and identifies which files are not backed up.
Related Products StorageCentral Explorer Snap-In is a tool that enables system administrators and regular users to easily access managed objects from Windows Explorer. System administrators using Explorer Snap-In can create new managed objects, delete managed objects, and view and modify managed object properties. Regular users can also use this product to view managed objects.
To learn if StorageCentral Explorer Snap-In is available at your site, contact the head of your organization's Information Technology group.
Related Sections • To learn what you need to run StorageCentral on your system, read the section
“Requirements” on page 20.
• For an overview of what you must do to install StorageCentral, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.
2 StorageCentral User Guide
What's New in StorageCentral 5.2 StorageCentral 5.2 has a variety of new features and capabilities.
Features Related to the Active Directory • Information presented regarding the AD property level. StorageCentral uses
scoping rules when taking properties from the AD. (For example, if an OU does not have properties defined, StorageCentral applies the domain-level properties to the OU.) However, previous versions of StorageCentral did not tell users which properties were being applied to their computer. StorageCentral 5.2 provides a new field called Property Level on the Version tab (page 71) of the Properties dialog box to tell you from where your computer is getting its properties—from your computer, your OU, or the domain. This field is present only in AD editions of StorageCentral.
• Applying a computer policy stored in the AD to a computer you are installing. If you are installing an AD edition of StorageCentral and there are computer policies stored in the AD, the installation wizard gives you the opportunity to apply an existing computer policy to the computer you are installing. Using an existing computer policy saves you time and effort because you do not have to create a new one.
Features Related to Network Appliance Filers • New information presented in the managed object grid for objects residing on
a Network Appliance Filer. Previous versions of StorageCentral displayed no information in the grid about Network Appliance Filer volumes that were offline. You can read more about this in the section “Introduction to Managed Objects” on page 90.
3
• Issuing simple Network Appliance Filer commands from StorageCentral. You can turn a Network Appliance Filer’s quotas on or off from the grid in the managed object details pane. You can also resize and restart quotas. You can read more about this in the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
• User quota support for Network Appliance Filers. StorageCentral now supports user quotas on Network Appliance Filers. This means you can apply a quota (that is, space allocation) policy to a specific user (or users) within a Network Appliance qtree.
Other New Features and Capabilities • The ability to run under Windows 2003. StorageCentral 5.2 supports the latest
Windows operating system—Windows 2003 Standard, Enterprise, and Data Center.
• Unicode support. StorageCentral 5.2 supports Unicode strings. The alert message and names of policies, file groups, report definitions, report sets, and managed objects can all be Unicode. The audit and trend databases may store Unicode information if you configure them to do so.
• Increased control over the amount of data StorageCentral stores. You can now specify how long StorageCentral retains audit and trend data. Also, you can now specify which actions (such as creating or deleting a managed object) generate an application event log record. For more information, read about the Audit, Trending, and Event Log tabs in the section “Viewing and Modifying Global Properties” at the beginning of Chapter 3.
• Two levels of access for non-administrative users. In this version of the product there are two levels of access to StorageCentral for non-administrative users: Read and Full Control.
o Read access allows non-administrative users to run storage reports and view policies, managed objects, file blocking groups, report definitions, report sets, and global settings.
4 StorageCentral User Guide
o Full Control access allows them to add, delete, and modify policies, managed objects, file blocking groups, report definitions, report sets, and global settings as well as perform the functions allowed by Read access.
For more information, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.
• Reports run against a larger number of files. This version of StorageCentral doubles the maximum number of files (from approximately 8 million to approximately 16 million) that can be processed when generating reports.
Related Sections To learn about features added in the previous versions of StorageCentral, read the sections “What's New in StorageCentral 5.1” and “What's New in StorageCentral 5.0”.
5
What's New in StorageCentral 5.1 StorageCentral 5.1 has these new features:
• Support for Network Appliance’s Filer machine. StorageCentral now provides quota and file-blocking support for Network Appliance Filer machines. For additional information, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
• Support for MAPI. StorageCentral now has the ability to use MS Exchange for sending e-mail. Note: Microsoft introduced a security patch for MS Outlook that prompts the user for permission prior to sending e-mail when the sender is a program such as StorageCentral. This security patch was introduced to prevent viruses from sending e-mail to all addresses in the global address book. The presence of this security patch means that for every e-mail StorageCentral attempts to send, the user must give permission.
• Simplified permission requirements. We have moved the location of the QA database from the root directory of the drive to a folder in the root. This folder is called "SCSRMQuota". This change means that read/write permissions are no longer required for the root directory, only the new folder.
Related Sections To learn about features added in the previous version of StorageCentral, read the section “What's New in StorageCentral 5.0”.
6 StorageCentral User Guide
What's New in StorageCentral 5.0 StorageCentral 5.0 has many new features.
Usability • Centralized Console. StorageCentral provides a console that manages the entire
Windows enterprise including server appliances based on Microsoft’s Windows-Powered Server Appliance Kit, and direct-attached Windows NT, 2000, Advanced, Terminal, Cluster, and Datacenter Servers and storage area networks (SANs). All Windows-based storage can be managed centrally and the console integrates seamlessly with other frameworks with SNMP and scriptable interfaces.
• MMC-Based Interface. Conforming to the standard Microsoft Management Console interface makes navigating through StorageCentral simple and intuitive.
• Web User Interface. With enhanced accessibility, the web interface makes it easier to remotely control StorageCentral policies and settings as well as report on storage usage. StorageCentral leverages IIS and other Microsoft technologies to distribute SRM-based information to more people on an as-needed basis. Users can view their storage reports via any intranet server or kiosk, while systems managers and help desk personnel can check the server storage status whenever required.
• Best Practice SRM Policies. To make it easier to configure an SRM system, StorageCentral provides pre-configured policies that implement best practices. Administrators can simply select from a menu of best practice policies and make any necessary custom edits, such as inserting a help desk number, and apply them to servers.
• Alarm History. To make it easier to reuse frequently used automated alerting messages, StorageCentral keeps a history of previously used alert messages. Administrators can simply select from a menu of previously used alert messages and make any necessary custom edits, or create new alerts, which will also be stored in the alert history.
7
Scalability • Enhanced Support of Microsoft’s Windows 2000 Active Directory for
centralized storage policy propagation. StorageCentral has the ability to write storage policy definitions inside the Windows 2000 Active Directory, thereby mandating the automation of storage policy across the enterprise. Storage policies include space allocation alarms and actions, scheduled SRM report generation, blocking of unauthorized content such as MP3 files, and integration with data protection and availability products.
• Windows Installer and SMS Installation. StorageCentral installs on any number of Windows servers efficiently and with minimal administrator effort. Administrators simply install StorageCentral on a Microsoft SMS server, which propagates the installation out to tens, hundreds, or even thousands of specified servers across the enterprise.
• RapidScan (TM). Reports run 700 percent faster than previous StorageCentral releases by reporting on file meta data stored in the NTFS Master File Table. Rather than "touching" each file when running storage usage reports, StorageCentral simply runs against the NTFS Master File Table. This makes reporting on a large scale quicker and more resource-efficient.
• File Blocking by Type and Header. StorageCentral blocks unwanted file types such as MP3 files, even if clever users attempt to disguise unauthorized file types as legitimate file types. Because of scanning by file type and by header information, StorageCentral is virtually impossible to fool.
SRM Reporting • Enhanced SRM Reporting. Reports include capacity planning, details trend
analysis, reports by Active Folder hierarchy, integration with Active Folder user profiles, nightly backup capacity, enhanced security reporting, reporting on extended attributes, and reporting on percentage of space allocations. Also, a robust custom-report generator enables users to narrow down the contents of an initial report by applying additional filtering and sorting criteria.
• Chargeback Reporting. IT departments can implement disk usage accountability by department, division, location, or workgroup.
8 StorageCentral User Guide
• Drill-Down Reporting. To probe further into the summary reports, users simply click on any summary report item to generate the detailed information that supports the summary data. For example, by clicking on the summary report called "graphic files," which shows a sum total number of these files and the total amount of space they use, a detailed report listing each individual file will be generated. From the detail, the user can view, move, or delete individual files or groups of files by right-clicking the item(s) from a web browser.
• Multiple-Alarm Actions. As the result of any individual disk utilization alarm being activated, multiple actions can execute. For example, at 80% of the object’s disk space allocation, StorageCentral can run disk cleanup reports, extend the volume, notify the administrator, e-mail the user, and submit data to the Microsoft application event log.
9
MMC Overview The MMC (Microsoft Management Console) is divided into two panes.
• The left pane is the management pane and includes the Tree tab also known as the console tree. The console tree displays items that are available in a given console.
• The right pane contains the details pane. The details pane displays information about items in the console tree.
If Active Directory is not being supported, the console tree for StorageCentral contains the following items:
• My Computer. StorageCentral is a Storage Resource Management system that provides disk space limit monitoring and control in real time. Use the following tools to monitor and control disk space:
o Managed Objects—Configure objects to manage and control space allocation and file blocking settings. Create new managed objects, delete existing managed objects, and view/modify the properties of the managed objects.
o Policies—Configure policies to define rules and specify actions on managed objects. Define space limit and file blocking properties of the policies. Create new policies, delete existing policies, and view/modify the properties of the policies.
o File Groups—Configure file selection masks for effective blocking.
o Reports—Define and generate storage management reports to analyze disk consumption.
o Audit—Space allocation and file blocking actions may be viewed in the audit window.
• Microsoft Windows Network. Users have the ability to connect to remote servers allowing for centralized management of groups, policies, managed objects, and reports.
10 StorageCentral User Guide
• Preferred Machines. Machines selected by the user for quick access. This is a user-specific setting.
• Report Collectors. Servers designated to run reports.
If Active Directory is being supported, the StorageCentral tree displays as a sub-tree of Machine, Domain, Site, OU, and AD root node. The Managed Objects node displays all the objects for the scope of its level. In the example below, clicking on the Managed Objects node for Sales will display all the managed objects in the Sales OU.
For example:
ADTest (DC) File Groups Policies Reports Managed Objects Sales(OU) File Groups Policies Reports Managed Objects Server1 File Groups Policies Reports Managed Objects Server2 File Groups Policies Reports Managed Objects ServerN File Groups Policies Reports Managed Objects Marketing(OU) OU N (OU)
11
Related Sections In addition to using the graphical user interface, you can manipulate StorageCentral through its command line interface. For more information about the CLI, read the section “Command SCSRM” on page 168.
12 StorageCentral User Guide
Active Directory StorageCentral provides support of Microsoft’s Windows 2000 (and above) Active Directory for centralized storage policy management. StorageCentral has the ability to write storage policy definitions inside the Active Directory (AD), thereby allowing the application of storage policy across the enterprise. Storage policies include space allocation alarms and actions, scheduled report generation, blocking of unauthorized files by file type or content, and integration with data protection and availability products.
StorageCentral requires a specific tree structure and data types. To meet these requirements, the Active Directory schema must be extended. This results in StorageCentral information being self-contained which among other benefits facilitates more efficient searching. Microsoft ADSI is used to extend the schema.
Schema Modifications The StorageCentral installation will extend the schema. Two new attributes will be added—"wquinn-DataType" and "wquinn-String". Two new classes will be added—"wquinn-Container" and "wquinn-Value". The installation will copy StorageCentral environment data from the local registry to the Active Directory domain.
StorageCentral Schema in the Active Directory StorageCentral integrates with Active Directory at the policy level. All space allocation, file blocking, and report definitions may be stored in the Active Directory. The structure of the Active Directory mirrors the structure in the registry.
Classes:
Name Class Distinguished Name CN=wquinn-Container classSchema CN=wquinn-Container,
CN=Schema,CN=Configuration, DC=yourcompanydomainname, DC=com
13
Name Class Distinguished Name CN=wquinn-Value classSchema CN=wquinn-Value,
CN=Schema,CN=Configuration, DC= yourcompanydomainname, DC=com
CN=wquinn-DataType attributeSchema CN=wquinn-DataType, CN=Schema, CN=Configuration, DC= yourcompanydomainname, DC=com
CN=wquinn-String attributeSchema CN=wquinn-String, CN=Schema, CN=Configuration, DC= yourcompanydomainname, DC=com
Display Structure The StorageCentral tree is displayed as a sub-tree of the following entities: Machine, Domain, Site, OU, and AD Root Node.
For example, the Managed Objects node displays all the objects for the scope of its level. Clicking on the Managed Object node for Departments displays all the managed objects for all machines in the Departments OU.
Installation Notes • The machine where StorageCentral is installed should be in an Active Directory
domain.
• The user who installs the product should have the following privileges from the Active Directory domain controller: Schema Admin, Domain Admin, and Enterprise Admin.
14 StorageCentral User Guide
Related Sections To learn how Active Directory affects the way the MMC console tree displays, read the section “MMC Overview” on page 10.
15
Getting Technical Support VERITAS Software Corporation offers you a variety of support options.
Accessing the VERITAS Support Web Site The VERITAS Support Web site allows you to:
• contact the VERITAS Support staff and post questions to them
• get the latest patches, upgrades, and utilities
• view the StorageCentral Frequently Asked Questions (FAQ) page
• search the knowledge base for answers to technical support questions
• receive automatic notice of product updates
• find out about StorageCentral training
• read current white papers related to StorageCentral
The address for the VERITAS Support Web site is http://support.veritas.com.
Subscribing to VERITAS E-mail Notification Service Subscribe to the VERITAS e-mail notification service to be informed of software alerts, newly published documentation, Beta programs, and other services.
Go to http://support.veritas.com. Select a product and click E-mail Notifications on the right side of the page. Your customer profile ensures you receive the latest VERITAS technical information pertaining to your specific interests.
16 StorageCentral User Guide
Accessing VERITAS Telephone and Fax Support Telephone support for StorageCentral is only available with a valid support contract. To contact VERITAS for technical support, go to http://support.veritas.com. Specify StorageCentral as the product and click Contact Support on the right side of the page. Find the appropriate phone number in the list that displays.
Contacting VERITAS Licensing For license information, call 1-650-527-0300 or fax 1-650-527-0952.
17
18 StorageCentral User Guide
Chapter 2. Installation and Upgrade
Introduction to the Installation Process The steps below summarize what you must do to install StorageCentral on your system.
Step To do this… Refer to this section… 1 Verify you have the hardware and software needed
to install StorageCentral on your system
“Requirements” (page 20)
2 Gather the information you will need during the installation process
“Installation Worksheet” (page 29)
3 Install StorageCentral
“Installation Checklist” (page 35)
4 Verify that you correctly installed and configured StorageCentral.
“Verifying the Installation” (page 42)
5 Optional: By default, StorageCentral stores audit and trend data in a Microsoft Access database. If you choose to store these data in Microsoft SQL Server, you must configure StorageCentral to save the data there.
“Configuring SQL Server Support” (page 202)
Important: The installation must be performed by a member of the Domain Admins group.
Related Sections • To learn about your options for upgrading StorageCentral, read the section
“Upgrade Roadmap” on page 23.
• To learn how you can silently install and uninstall StorageCentral, read the sections “Silent Installation” (page 56) and “Silent Uninstallation” (page 59).
19
• To remove StorageCentral from your computer, read the section “Uninstalling StorageCentral” on page 55.
• To learn about using Active Directory, read the section “Active Directory” on page 13.
• To take advantage of the Unicode support in StorageCentral 5.2, you must convert your audit and trend data. To do so, read the section “Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2” on page 60.
Requirements This section lists what you need to run StorageCentral on your system.
Agents • One of the following operating systems:
o Windows XP Professional
o Windows NT 4, service pack 6a
o Windows 2000 Professional Server, Advanced Server, or Datacenter Server
o Windows Server 2003 Standard, Enterprise, or Datacenter Edition
• 128 MB RAM for Windows Professional or 256 MB for others
• 6 MB of disk space are required to install an agent, plus additional space to run StorageCentral
20 StorageCentral User Guide
Collector • One of the following operating systems:
o Windows XP Professional
o Windows NT 4, service pack 6a
o Windows 2000 Professional Server, Advanced Server, or Datacenter Server
o Windows Server 2003 Standard, Enterprise, or Datacenter Edition
• Internet Explorer 5.5 or later
• 256 MB RAM for Windows Professional or 512 MB for others
• 33 MB of disk space are required to install a collector, plus additional space to run StorageCentral
Console • One of the following operating systems:
o Windows XP Professional
o Windows 2000 Professional Server, Advanced Server, or Datacenter Server
o Windows Server 2003 Standard, Enterprise, or Datacenter Edition
• Internet Explorer 5.5 or later
• 256 MB RAM for Windows Professional or 512 MB for others
• 50 MB of disk space are required to install the MMC console, plus additional space to run StorageCentral
21
Network Appliance Filer This section applies only if you are installing a Network Appliance edition of StorageCentral.
• Data ONTAP version 6.4 (or later) from Network Appliance must be installed on the Filer to provide support for third-party products (such as StorageCentral).
• The CIFS protocol must be enabled on the Filer you want to manage.
• SNMP must be configured on both the Filer and remote agent to generate traps for your remote agent. You will configure SNMP to do this when you install StorageCentral.
• The StorageCentral remote agent and MMC must be installed and executed within the same domain as the Network Appliance Filer(s) that they are intended to manage.
Remote Agent This section applies only if you are installing a Network Appliance edition of StorageCentral.
• One of the following operating systems:
o Windows XP Professional
o Windows 2000 Professional Server, Advanced Server, or Datacenter Server
o Windows Server 2003 Standard, Enterprise, or Datacenter Edition
• Internet Explorer 5.5 or later
• 128 MB RAM for Windows Professional or 256 MB for others
• 6 MB of disk space are required to install a remote agent, plus additional space to run StorageCentral
22 StorageCentral User Guide
• Simple Network Management Protocol (SNMP) support must be operational on the remote agent so that StorageCentral can report on space allocation violations on the Filer.
• The StorageCentral remote agent and MMC must be installed and executed within the same domain as the Network Appliance Filer(s) that they are intended to manage.
Note: Installing the remote agent on a Windows 2000 (or above) cluster is not supported.
Upgrade Roadmap This section provides instructions to upgrade your current version of StorageCentral. It also provides information about compatibility between versions.
Upgrading from Earlier Releases of StorageCentral SRM to VERITAS StorageCentral 5.2
This release of StorageCentral allows you to upgrade most installations of StorageCentral (4.1, 5.0, and 5.1) without having to uninstall the current installation. Exceptions are:
• Version 5.0 Builds 197 and 219. These require that the product be manually removed prior to installation.
• Version 5.0 or 5.1 Standard Edition to Active Directory (AD) Edition. Upgrading an earlier Standard edition to the 5.2 AD edition is not supported. To achieve this you must first upgrade to 5.2 Standard, then upgrade 5.2 Standard to 5.2 AD.
Upgrading from FileScreen 2000 is also supported in the instructions below.
To upgrade to VERITAS StorageCentral 5.2, refer to the table below. Locate the version you have currently installed in the Upgrade From column, confirm the Upgrade To column contains the appropriate edition of 5.2, and follow the steps as shown.
23
Upgrade From
Upgrade To Instructions
4.1, build 450 or higher
5.2 Standard Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. A migration tool runs as a part of the installation procedure. It converts StorageCentral 4.1 quotas, screening rules, and reports. When prompted, select Yes to uninstall StorageCentral 4.1 and install 5.2 Standard.
4.1 + FileScreen 2000
5.2 Standard 1. Save FileScreen registry under the WQUINN key.
2. Uninstall FileScreen.
3. Restore the registry.
4. Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2.
5.0 (builds 197 and 219) Standard
5.2 Standard 1. Remove any QFEs associated with StorageCentral SRM 5 in the reverse order in which you installed them.
2. Remove StorageCentral SRM 5. Choose to save any entities if asked. Ignore any message requesting a reboot.
3. Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2.
24 StorageCentral User Guide
Upgrade From
Upgrade To Instructions
5.0 (builds 197 and 219) AD
5.2 AD 1. Remove any QFEs associated with StorageCentral SRM 5 in the reverse order in which you installed them.
2. Remove StorageCentral SRM 5. Choose to save any entities if asked. Ignore any message requesting a reboot.
3. Install StorageCentral 5.2 AD by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. Choose to restore any previously saved entities.
5.0 (builds 220 and 230) Standard
5.2 Standard Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. The installation process will uninstall the older version of StorageCentral 5.2. Choose to save any entities if asked. Choose to restore any previously saved entities. If you are upgrading from StorageCentral 5.0 and have SQL Server configured for auditing and trending, you need to reconfigure the user name and password used to access the SQL Server database after installing StorageCentral 5.2: 1. On the StorageCentral management pane,
highlight My Computer, Preferred Machine, or OU, right-click and choose Properties. The Properties dialog box displays.
2. Click the SQL Server tab. 3. Enter the user name and password. 4. Click OK.
25
Upgrade From
Upgrade To Instructions
5.0 (builds 220 and 230) AD
5.2 AD Install StorageCentral 5.2 AD by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. The installation process will uninstall the older version of StorageCentral and install 5.2. Choose to save any entities if asked. Choose to restore any previously saved entities. If you are upgrading from StorageCentral 5.0 and have SQL Server configured for auditing and trending, you need to reconfigure the user name and password used to access the SQL Server database after installing StorageCentral 5.2: 1. On the StorageCentral management pane,
highlight My Computer, Preferred Machine, or OU, right-click and choose Properties. The Properties dialog box displays.
2. Click the SQL Server tab. 3. Enter the user name and password. 4. Click OK.
5.1 (build 229) NetApp Standard
5.2 NetApp Standard
Install StorageCentral 5.2 NetApp Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. The installation process will uninstall the older version of StorageCentral and install 5.2. Choose to save any entities if asked. Choose to restore any previously saved entities. Note: The name of the share that is located on the Network Appliance Filer and that is used by StorageCentral must be changed—the installation worksheet and checklist contain the details.
26 StorageCentral User Guide
Compatibility Between VERITAS StorageCentral 5.2 and Earlier Releases
This section explains compatibility issues between StorageCentral 5.2 and earlier releases.
StorageCentral 5.2 and StorageCentral 4.1
When upgrading from StorageCentral version 4.1 to version 5.2, two alarm notification fields (Notify Administrator and Record Alarm) in a transparent template are not set to transparent. This is because these fields did not exist in version 4.1.
StorageCentral 5.2 and StorageCentral SRM 5
This section explains compatibility issues between StorageCentral 5.2 and earlier releases of StorageCentral SRM 5. Unless specifically stated, a 5.2 environment can be managed by a 5.0 or 5.1 environment and vice versa.
• StorageCentral 5.2 policies, managed objects, file groups, report definitions, and report sets can be managed by a StorageCentral SRM 5 MMC unless they contain Unicode data. Versions 5.0 and 5.1 cannot work with Unicode data.
• StorageCentral SRM 5.0 and 5.1 policies, managed objects, file groups, report definitions, and report sets, can be managed by a StorageCentral 5.2 MMC.
• An Active HTML report generated by a 5.2 collector on behalf of a request made by a 5.2 agent or MMC cannot be viewed on a computer that has the 5.0 or 5.1 MMC installed. However, the same report can be sent to a machine that has only older versions of ActiveX controls installed.
• New features added in StorageCentral 5.2 cannot be managed by a 5.0 or 5.1 MMC. These features include:
o Displaying the property level in the AD editions
o E-mail support for the Exchange Server
o Controlling which events will be logged in the Microsoft event log
27
o Specifying the retention period for audit and trend data
o Configuring SQL Server user name and password
• StorageCentral 5.2 can store audit and trend data in a SQL Server database in either ANSI or Unicode format. StorageCentral SRM 5.0 and 5.1 can only store audit and trend data in ANSI format. For more information, read the section “Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2” on page 60.
• StorageCentral 5.2 does not support StorageCentral SRM 5.0 builds 197 and 219.
Related Sections • To remove StorageCentral from your computer, read the section “Uninstalling
StorageCentral” on page 55.
• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
28 StorageCentral User Guide
Installation Worksheet The installation wizard that StorageCentral uses will prompt you for a variety of information. The installation process will go more smoothly if you have this information available in one place before you start.
You may print this section and fill in the blanks below with the information you need.
Option and Description Your Answer License Agreements
Before installing StorageCentral you will be asked to accept the terms of a VERITAS Software Corporation license agreement. You can find a copy of this agreement on the CD in the \docs folder.
Yes/No: _______
Customer Information The product asks for a user name, the organization, and serial number. Only the serial number is required to continue the installation process. You can find the serial number in the VIP Product License Certificate provided by VERITAS. We recommend you save the key in a file and use copy/paste when required during the install.
User: ______________________ Organization: ______________________ Serial Number: _______________________
Active Directory Support If you are installing or upgrading to an Active Directory (AD) edition of StorageCentral, you will perform two important tasks during installation.
1. You must extend the AD schema using a
program called ExtSche; you can find this program on the installation CD. StorageCentral makes use of its own data types and values and therefore requires the extension. You must have write access to the root of the AD to perform the extension, which implies Schema Admin and Domain Admin privileges. The installation checklist tells you how to use ExtSche.
Yes/No: _______
29
Option and Description Your Answer
2. You must populate the AD. The process that populates the AD executes during the installation and takes data from the registry and places it into the AD. However, this process executes only if two conditions are true: You instruct it to execute, and the AD does not already contain StorageCentral data. During installation you will be given the opportunity to populate the AD.
o If you are performing a clean installation
(that is, not an upgrade), then on at least one machine you must select all components to be installed and answer Yes to the question Populate Active Directory? that the installation wizard presents on the Active Directory Support dialog box. Until the AD is populated, an AD edition of StorageCentral will not work properly. VERITAS recommends you install all components on the first machine and then populate the AD.
o If this is an upgrade, then you must determine which machine in your enterprise contains the set of data that you want loaded to the AD. Then, when upgrading StorageCentral on that machine, you will answer Yes to the question Populate the Active Directory? that the installation wizard presents on the Active Directory Support dialog box.
30 StorageCentral User Guide
Option and Description Your Answer Until the AD is populated, an AD edition of StorageCentral will not work properly. VERITAS recommends you work with the machine that contains the appropriate set of data first and then populate the AD.
Computer Policies
If you are installing an AD edition of StorageCentral and there are computer policies stored in the AD, the installation wizard gives you the opportunity to apply an existing computer policy to the computer you are installing.
If you select a policy: You must choose, on the Custom Setup dialog box, to install the agent in order for StorageCentral to apply the policy.
Computer policy you want to apply: _____________________
Destination Folders These are the folders in which the product files will be installed and where the audit and trend databases will be placed. During an upgrade the process uses the same directories that the older release used.
The audit and trend databases are used through the ODBC data source. By default, the User Interface (UI) looks only at the local Microsoft Access database even if the UI focus is on another server or another domain. Use a centralized database to see the records for all computers in the domain which the UI is connected to.
Install: _____________________ Databases: _____________________
31
Option and Description Your Answer Restore Entities
If you are upgrading or performing a re-installation, the installation wizard asks if you want to carry forward any existing entities it finds. Entities are: managed objects, file groups, report sets and report definitions, preferred machines, audit and trend databases, and reports and quarantine directories.
Managed Objects (Yes/No): _______ File groups (Yes/No): ____ Report sets/definitions (Yes/No): _____ Preferred machines (Yes/No): _____ Audit and trend db (Yes/No): _______ Reports directory (Yes/No): _____ Quarantine directory (Yes/No): _____
Custom Setup The installation process allows you to choose features to be installed. The default is to install everything.
Agent (Yes/No): _______ Agent/Command Line (Yes/No): ____ Collector (Yes/No): _______ User Interface/MMC (Yes/No): _____
32 StorageCentral User Guide
Option and Description Your Answer Administrator Password
An account with domain administrator privileges is required for the services to run. Do not use System account. See the section “Permissions for Service Account” on page 248 for details.
User Name: _____________ Domain: ________________ Password: ______________
Mail Information For alarms and reports to be mailed, you will have to provide the details of the mail server. You can choose to use Microsoft’s Exchange server or an SMTP mail server. If you are installing an Active Directory edition of StorageCentral, you can also choose to use the AD mail facility as a source of e-mail addresses.
Exchange Profile: ________________ Exchange Password: ______________ SMTP Server: _________________ SMTP Sender (login ID or e-mail address): ___________________ SMTP Password: _________________ Use AD (Yes/No): _______
* * * * * The following items apply only to Network Appliance support * * * * *
Veritas Share on the Filer
StorageCentral needs to store data on all Filers. A share called "Veritas" must exist before the Filers can be added to a remote agent’s management list.
(You will do this as part of the installation process.)
33
Option and Description Your Answer Administrator Access to the Filer
StorageCentral requires administrator access to the Filer. This access is required to get and set quotas, and to register itself for file blocking requests.
Administrator: _________________ Password: _________________
Enable File Screening The Filer needs to be configured to have file screening turned on.
(You will do this as part of the installation process.)
SNMP The Filer generates SNMP traps for all quota violations. You will have to use the Network Appliance FilerView application to set the appropriate destination.
(You will do this as part of the installation process.)
Related Sections • For an overview of the installation process, read the section “Introduction to the
Installation Process” at the beginning of Chapter 2.
• To see the specifics of the installation process, read the section “Installation Checklist” on page 35.
34 StorageCentral User Guide
Installation Checklist The chart below summarizes the installation instructions and to which StorageCentral edition a step applies.
STD NetApp STD
AD NetApp AD
1. Extend schema No No Maybe Maybe 2. Configure for NetApp Editions
No Yes No Yes
3. Install StorageCentral Yes Yes Yes Yes 4. Reboot the machine Yes Yes Yes Yes 5. Create a share No Yes No Yes 6. Configure remote agent No Yes No Yes 7. Add Filer to a preferred group
No Yes No Yes
8. Enable file blocking on the Filer
No Yes No Yes
9. Set SNMP on the Filer No Yes No Yes
Key to columns in the chart above:
• STD = StorageCentral Standard Edition
• NetApp STD = StorageCentral for Network Appliance Standard Edition
• AD = StorageCentral Active Directory Edition
• NetApp AD = StorageCentral for Network Appliance Active Directory Edition
You may print this section and check off the steps as you complete them.
The installation process will go more smoothly if you complete the installation worksheet (page 29) before proceeding with the installation checklist.
35
STEP COMMENTS DONE 1. Extend schema.
If you are installing or upgrading to a StorageCentral Active Directory edition and have never previously installed the Active Directory edition anywhere in your entire enterprise, you must extend the Active Directory schema. The account executing the schema extension program must have Schema Admin and Domain Admin privileges. Follow these steps:
1. Start a command prompt.
2. Locate a program called ExtSche in the \Utilities\Active Directory folder on the CD and execute it by typing this: ExtSche /x
The program will indicate success or failure. If the program fails, try setting the correct permissions and rerun the program. If problems persist, contact VERITAS technical support. You can read instructions to verify that the schema was properly extended on page 54.
36 StorageCentral User Guide
STEP COMMENTS DONE 2. Configure for NetApp Editions.
Perform this step only if you are installing one of the StorageCentral for Network Appliance editions. SNMP support is required on the remote agent machine. Do the following on the remote agent:
1. Click Start | Settings | Control Panel | Add/Remove Programs.
2. Click Add/Remove Windows Components, select Management and Monitoring Tools, and click Details.
3. If Simple Network Management Protocol is not selected, then select it and proceed with its installation.
3. Install StorageCentral. Locate and run the "setup.exe" that applies to the StorageCentral edition you are installing. Allow the wizard to proceed to a normal finish. Update each panel in the wizard according to the answers you have laid out in the installation worksheet.
4. Reboot the machine.
The following steps apply only if the product installed is one of the StorageCentral for Network Appliance editions. 5. Create a share.
Using a Network Appliance tool, create a share named "Veritas" on each Network Appliance Filer that StorageCentral will manage. Note: Creating a folder on the Filer is not the same as creating a share.
37
STEP COMMENTS DONE 6. Configure remote agent.
Configure the remote agent by doing the following:
1. Start the MMC. Do this by clicking Start | Programs | VERITAS StorageCentral.
2. Select the properties of the machine that has StorageCentral for Network Appliance installed.
3. On the Network Appliance tab, click Add and proceed to add the Network Appliance Filers to the list of managed machines.
7. Add Filer to a preferred group. The Network Appliance Filers added to the remote agent in the previous step must now be added to a preferred group. For more information about preferred groups and preferred machines, see the section “Introduction to Preferred Groups and Preferred Machines” on page 150.
8. Enable file blocking on the Filer. For detailed instructions, read the section “Configuring File Blocking on Network Appliance Filers” on page 183.
9. Set SNMP on the Filer. For detailed instructions, read the section “Configuring SNMP for Space Allocation on Network Appliance Filers” on page 182.
Related Sections • For an overview of the installation process, read the section “Introduction to the
Installation Process” at the beginning of Chapter 2.
• For instructions to install StorageCentral in a cluster, read the section “Cluster Support” on page 194.
38 StorageCentral User Guide
• To remove StorageCentral from your computer, read the section “Uninstalling StorageCentral” on page 55.
• During installation you are given the option to specify mail information on the Mail Information dialog box. If you chose to not provide the mail parameters during installation, you may do so later using the global Properties dialog box. You can read more about this in the section “Viewing and Modifying Global Properties” at the beginning of Chapter 3.
39
Customizing the ActiveReports Component (CAB File) Every time you install the Collector component of StorageCentral, a CAB file containing the OCXs required for running reports is installed on a local server. A copy of this CAB file is also located (available) on the VERITAS web site and can be downloaded from there. On the Reports tab of the global Properties dialog box, the support URL by default points to the VERITAS web site. You can leave this URL pointing to the VERITAS web site, and all downloads for the CAB file will come from VERITAS; or you can place a copy of the CAB file on an Intranet web server. If you choose to leave a local copy for downloading, all Collectors must be modified accordingly. Use method 1 below to modify the support URL. When the decision is made as to the location of the CAB file, all unreferenced copies can be deleted.
Note: The VERITAS copy of the CAB file gets updated from time to time. If you chose to use a local copy of the CAB file, you will have to replace it with an upgraded copy when a new upgrade is available.
You may download the CAB from a local Intranet web server using one of the two methods below.
Requirements: Microsoft Internet Information Server 4.0 and above.
Method 1
1. Copy the StorageCentralSRM5.CAB file from the Installation Path\Reports\Cabs folder to a virtual folder existing on a web server.
2. Modify the support URL in the MMC user interface. To modify the support URL in the MMC user interface, go to the global Properties | Reports | Support URL. Specify a new URL such as http://<web server>/<virtual folder>/StorageCentralSRM5.CAB.
Method 2
1. Create a new virtual folder on your web server.
2. Copy the StorageCentralSRM5.CAB file from the Installation Path\Reports\Cabs folder to the virtual folder.
40 StorageCentral User Guide
3. From Windows Explorer, right-click the virtual folder and choose Properties | Web Sharing.
4. Select Share this folder option. Use the default name or give any alias you want.
5. Modify the support URL in the MMC user interface. To do so, go to the global Properties | Reports | Support URL. Specify a new URL such as http://<webserver>/<virtual folder>/StorageCentralSRM5.CAB.
Note: In case you have a TCP port configured on your web server and the port number is other than 80, you must specify the port number in the URL as follows: http://<web server:port number>/<new virtual folder>/StorageCentralSRM5.CAB. To test if the CAB file is located at this address, enter the URL from the Internet Explorer address bar and a file download dialog should display. Advanced users can use the Microsoft Internet Information Server console to perform the above steps.
Related Sections • For information about the support URL, read the “Reports Tab” section (page 68)
of the section "Viewing and Modifying Global Properties."
• For information about report formats, read the “Format Tab” section (page 139) of the section "Viewing and Modifying Report Set Properties.".
41
Verifying the Installation Although not required, VERITAS Software Corporation recommends that you verify that StorageCentral was installed and configured properly on your system. The chart below provides instructions to perform the verification.
If you installed this edition...
...do this:
Standard 1. Verify StorageCentral installed properly on your server (page 43).
Network Appliance Standard
1. Verify StorageCentral is working properly with the Network Appliance Filer to manage storage on the Filer (page 48).
2. Optionally verify StorageCentral, installed on the remote agent, is able to manage its own local storage (page 43).
Active Directory 1. Verify that the AD extended the schema properly (page 54).
2. Verify StorageCentral installed properly on your server (page 46).
Network Appliance Active Directory
1. Verify that the AD extended the schema properly (page 54).
2. Verify StorageCentral is working properly with the Network Appliance Filer to manage storage on the Filer (page 48).
3. Optionally verify StorageCentral, installed on the remote agent, is able to manage its own local storage (page 46).
42 StorageCentral User Guide
For an overview of the installation process, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.
Installation Verification: Standard Edition Use this section to verify the Standard edition of StorageCentral is able to manage local storage of the server on which it is installed.
Follow each of the steps below in order.
1. Create a folder at the root of the C: drive called SC5IVP. This folder is temporary; it will not hold much data and you will delete it at the end of this procedure. Note: If you choose to not place this folder in the root of the C: drive then you must modify the references to the SC5IVP folder in the instructions that follow.
2. Start StorageCentral by double-clicking its icon on your Windows desktop.
3. Expand My Computer. It expands to list File Groups, Policies, Reports, and Managed Objects.
4. Click Managed Objects. An empty right pane (except for the heading line) displays.
5. Right-click in the right pane and choose New. The New Managed Object Wizard starts.
6. Click Next. The list of drives available displays in the Folders dialog box.
7. Expand the C: drive by clicking on the . A list of the folders located in the rootof the C: drive displays.
8. Select the box ( ) next to the SC5IVP folder. A check mark appears in the box, and the SC5IVP folder displays in the Selected Folders area.
9. Click Next. The Folder Options dialog box displays.
43
10. In the Folder Policy area click the button and select 250MB limit witblocking.
h
11. Click Next. The User Options dialog box displays, but we will ignore it for this test.
12. Click Next. The Completing… dialog box displays.
13. Click Finish. In the right pane, there are now two managed objects called
C:\SC5IVP associated with your server. One has a folder icon ( ).
14. Right-click this C:\SC5IVP managed object and choose Properties.
15. Click Yes to confirm the modification of properties.
16. On the Space Allocation tab, change the Disk space limit from 250 to 5.
17. To the right of the Disk space limit field, click the button and select
18. Still on the Space Allocation tab, clear the check box next to Always save open
20. C5IVP managed object that has a shield
Kilobytes.
files.
19. Click OK to save the changes.
In the right-pane, right-click the C:\S
icon ( ) and choose Properties.
21. Click Yes to confirm the modification of properties.
ox.
the Properties dialog box.
22. Click the Alarm tab.
23. Select the Check file content check box.
24. Click the Actions button. The Actions dialog box displays.
25. On the Notification tab, select the Quarantine File check b
26. Click OK to save and return to
44 StorageCentral User Guide
27. Click OK to save the changes.
28. Click OK on the dialog that identifies unavailable signatures.
29. Copy a simple text file that is less than 5 KB to the SC5IVP folder. The file
30. le text file that is larger than 5 KB to the SC5IVP folder. The copy should fail because you instructed StorageCentral to allow only 5 KB of
32. Delete the simple text file you copied to the SC5IVP folder. The folder should
33. , start.wav) into SC5IVP. This copy should fail because the policy
you applied (“250MB limit with blocking”) blocks media files, and WAV files are
35. Make a copy of the same WAV file in a folder other than SC5IVP and rename it
36. should contents as well as its filename when
Files\VERITAS\StorageCentral\5.2\Quarantine) and you will see the file you
The verification process for this edition of StorageCentral is complete. You have proved that the StorageCentral space allocation and file blocking capabilities are working.
should copy successfully.
Attempt to copy a simp
storage in that folder.
31. Click OK on the dialog box that identifies the error.
now be empty.
From the C:\WINNT\Media folder, copy a WAV file that is smaller than 5 KB (for example
media files.
34. Click OK on the dialog box that identifies the error.
such that the extension identifies it as a TXT file.
Attempt to copy this newly renamed file to the SC5IVP folder. The copy fail because StorageCentral checks a file’sdetermining if it should be blocked. Using Windows Explore, locate the Quarantine folder (usually C:\Program
attempted to copy to the SC5IVP folder.
37. Delete the SC5IVP folder and its contents.
45
Installation Verification: Active Directory Edition Use this section to verify the Active Directory edition of StorageCentral is able to manage local storage of the server on which it is installed.
Follow each of the steps below in order.
1. Create a folder at the root of the C: drive called SC5IVP. This folder is temporary; it will not hold much data and you will delete it at the end of this procedure. Note: If you choose to not place this folder in the root of the C: drive then you must modify the references to the SC5IVP folder in the instructions that follow.
2. Start StorageCentral by double-clicking its icon on your Windows desktop.
3. Click Managed Objects.
4. Right-click in the right pane and choose New. The Select a Computer dialog box displays.
5. Select your computer by clicking the box ( ) next to your computer name.
6. Click OK and the New Managed Object Wizard starts.
7. Click Next. The list of drives available displays in the Folders dialog box.
8. Expand the C: drive by clicking on the . A list of the folders located in the root of the C: drive displays.
9. Select the box ( ) next to the SC5IVP folder. A check mark appears in the boxand the SC5IVP folder displays in the Selected Folders area.
,
10. Click Next. The Folder Options dialog box displays.
11. In the Folder Policy area click the button and select 250MB limit with blocking.
12. Click Next. The User Options dialog box displays, but we will ignore it for this test.
46 StorageCentral User Guide
13. Click Next. The Completing… dialog box displays.
14. Click Finish. In the right pane you will see two managed objects called
C:\SC5IVP for the server you are working with. One has a folder icon ( ).
15. Right-click this C:\SC5IVP managed object and choose Properties.
16. Click Yes to confirm the modification of properties.
17. On the Space Allocation tab, change the Disk space limit from 250 to 5.
18. To the right of the Disk space limit field, click the button and select Kilobytes.
19. Still on the Space Allocation tab, clear the check box next to Always save open files.
20. Click OK to save the changes.
21. In the right-pane, right-click the C:\SC5IVP managed object that has a shield
icon ( ) and choose Properties.
22. Click Yes to confirm the modification of properties.
23. Click the Alarm tab.
24. Select the Check file content check box.
25. Click the Actions button. The Actions dialog box displays.
26. On the Notification tab, select the Quarantine File check box.
27. Click OK to save and return to the Properties dialog box.
28. Click OK to save the changes.
29. Click OK on the dialog that identifies unavailable signatures.
30. Copy a simple text file that is less than 5 KB to the SC5IVP folder. The file should copy successfully.
47
31. Attempt to copy a simple text file that is larger than 5 KB to the SC5IVP folder. The copy should fail because you instructed StorageCentral to allow only 5 KB of storage in that folder.
32. Click OK on the dialog box that identifies the error.
33. Delete the simple text file you copied to the SC5IVP folder. The folder should now be empty.
34. From the C:\WINNT\Media folder, copy a WAV file that is smaller than 5 KB (for example, start.wav) into SC5IVP. This copy should fail because the policy you applied (“250MB limit with blocking”) blocks media files, and WAV files are media files.
35. Click OK on the dialog box that identifies the error.
36. Make a copy of the same WAV file in a folder other than SC5IVP and rename it such that the extension identifies it as a TXT file.
37. Attempt to copy this newly renamed file to the SC5IVP folder. The copy should fail because StorageCentral checks a file’s contents as well as its filename when determining if it should be blocked. Using Windows Explore, locate the Quarantine folder (usually C:\Program Files\VERITAS\StorageCentral\5.2\Quarantine) and you will see the file you attempted to copy to the SC5IVP folder.
38. Delete the SC5IVP folder and its contents.
The verification process for this edition of StorageCentral is complete. You have proved that the StorageCentral space allocation and file blocking capabilities are working.
Installation Verification: Network Appliance Editions Use this section to verify that the Network Appliance edition (Standard or Active Directory) of StorageCentral you installed on the remote agent can manage storage on the Network Appliance Filer.
48 StorageCentral User Guide
Follow each of the steps below in order.
1. Using NetApp software, create a qtree on the Filer called SC5IVPQT. This qtree is temporary; it will not hold much data and you will delete it at the end of this procedure. Note: If you choose to not create a new qtree and use an existing qtree then you must modify the references to the SC5IVPQT qtree in the instructions that follow.
2. Using NetApp software, create a share named SC5IVPSHARE using the newly created qtree as the mount point.
3. Start StorageCentral by double-clicking its icon on your Windows desktop.
4. Right-click Preferred Machines and choose New | Preferred Group. The New Preferred Group Wizard starts.
5. Click Next.
6. Enter a name for this new temporary preferred group—call it IVP—and click Next. The Select Computer dialog box displays.
7. In the Computers section locate the NetApp Filer you are using and click the box ( ) next to its name. Still in the Computers section, locate the computer you are using for the remote agent and click the box next to its name. You should now see both computer names in the Selected Computers area.
8. Click Next.
9. Click Finish to exit the New Preferred Group Wizard.
10. Expand the newly created IVP group by clicking the next to its name, select the remote agent, and right-click. Select Properties.
11. Click the Network Appliance tab and you should see the name of the NetApp Filer you are working with.
49
12. Click Cancel.
13. Expand the NetApp Filer by clicking the next to its name and right-click its name. Select Properties.
14. Click the Remote Agent tab and you should see the name of the remote agent you are currently working with in the Remote Agent text area. You should also see the user name—the one used during the installation.
15. Click Cancel.
16. Click the Managed Objects associated with the NetApp Filer. In the right pane you will see the existing managed objects (if any).
17. Right-click in the right pane and choose New. The New Managed Object Wizard starts.
18. Click Next. A list of volumes available displays in the Folders dialog box.
19. Expand the volume that the SC5IVPQT qtree is located on and select the box next to the SC5IVPQT folder. A check mark appears in the box, and the SC5IVPQT folder displays in the Selected Folders area.
20. Click Next. The Folder Options dialog box displays.
21. In the Folder Policy area click the button and select 250MB limit with alerts.
22. Click Next. The User Options dialog box displays, but we will ignore it for this test.
23. Click Next. The Completing… dialog box displays.
24. Click Finish. In the right pane you will see a managed object called <volume>\SC5IVPQT for the NetApp Filer you are working with. It has a folder
icon ( ) that represents the quota object.
25. Right-click the SC5IVPQT quota object and choose Properties.
26. Click Yes to confirm the modification of properties.
50 StorageCentral User Guide
27. On the Space Allocation tab, change the Disk space limit from 250 to 8.
28. To the right of the Disk Space Limit field, click the button and select
29.
30. restart. Depending on the size of your filer, the restart can take many seconds.
Kilobytes.
Click OK to save the changes.
Right-click the SC5IVPQT quota object and select Quota Management | Quotas
Wait until the restart is complete. Click the refresh button ( ) repeatedly untithe Quotas Initializing message
l is replaced by a list of all the quotas on the Filer.
KB to the SC5IVPSHARE he Filer to allow only 8 KB
33. that identifies the error.
HARE folder. The folder
37.
izard
39. displays in the Folders dialog box.
40.
Note: The names may be confusing. A good practice is to keep the share names
31. Copy a simple text file that is less than 8 KB to the SC5IVPSHARE folder. The file should copy successfully.
32. Attempt to copy a simple text file that is larger than 8folder. The copy should fail because you instructed tof storage in that folder.
Click OK on the dialog box
34. Delete the simple text file you copied to the SC5IVPSshould now be empty.
35. Right-click the SC5IVPQT object and select Delete.
36. Click OK to confirm the delete.
Create a new folder called ABC in the SC5IVPSHARE folder.
38. Back in the MMC with the Managed Objects for the NetApp Filer selected, right-click in the right pane and choose New. The New Managed Object Wstarts.
Click Next. A list of volumes available
Select the volume on which the SC5IVPQT qtree is located and expand it; you will see the newly created ABC folder.
51
the same as the qtree names, which are also known as the mount point names. StorageCentral is forced to use the mount point name.
pears in the box, and the folder displays in the Selected Folders area.
42. . The Folder Options dialog box displays.
41. Select the box next to the ABC folder. A check mark ap
Click Next
43. In the Folder Policy area click the button and select 250MB limit with blocking.
ut we will ignore it for this
47.
48. In the right pane you will see a managed object called It has a
44. Click Next. The User Options dialog box displays, btest.
45. Click Next. The Completing… dialog box displays.
46. Click Finish.
Click OK to the message stating that ABC is not a qtree.
<volume>\SC5IVPQT\ABC for the NetApp Filer you are working with.
shield icon ( ) that represents the file blocking object.
49. Right-click the SC5IVPQT\ABC blocking object and choose Properties.
properties.
the Quarantine File check box.
56. Click OK to save the changes.
50. Click Yes to confirm the modification of
51. Click the Alarm tab.
52. Select the Check file content check box.
53. Click the Actions button. The Actions dialog box displays.
54. On the Notification tab, select
55. Click OK to save and return to the Properties dialog box.
52 StorageCentral User Guide
57. Click OK to the dialog that identifies unavailable signatures.
Until notified otherwise, you must execute the following steps from a machine other than the one on which the remote agent is running. File blocking is not available by design if the request is mad
58. IVPSHARE\ABC. This copy should fail because the policy you applied (“250MB limit with
59.
may be a bit confusing but the Filer returns an error to Windows that is consistent with the message; StorageCentral has no control over
60. Make a copy of the same WAV file in a folder other than SC5IVPSHARE\ABC
61. the SC5IVPSHARE\ABC folder. The copy will be successful because StorageCentral can only check a file’s contents after it has
62. bserve the file in the ABC folder—it will be removed shortly after it gets
k OK.
Perf
63. tine folder (usually C:\Program Files\VERITAS\StorageCentral\5.2\Quarantine) and you will see the file you
64. Delete the SC5IVPSHARE folder and its contents. Then delete the SC5IVPQT
n of StorageCentral is complete. You have proved that the NetApp Filer’s space allocation and file blocking capabilities are working and manageable through StorageCentral.
e by the remote agent.
From the C:\WINNT\Media folder, copy a WAV file into SC5
blocking”) blocks media files, and WAV files are media files.
Click OK on the dialog box (or boxes) that identifies the error. Note: The error message
the text of the message.
and rename it such that the extension identifies it as a TXT file.
Copy this newly renamed file to
been closed by the application.
Ocopied.
If you receive a Messenger Service message, clic
orm the remaining steps from the remote agent machine.
Using Windows Explore, locate the Quaran
copied to the SC5IVPSHARE\ABC folder.
qtree.
The verification process for this editio
53
Installation Verification: AD Extended the Schema Use this section to verify that the Active Directory schema was extended during the installation process. You will use this section only if you are installing an AD edition of StorageCentral.
Follow each of the steps below in order.
1. If necessary, install ADSI Edit by installing the AdminPak.
2. Launch ADSI Edit.
3. Right-click the ADSI Edit object, then right-click and select Connect to....
4. In the Connection Point area, select Naming Context and from its dropdown list, choose Schema.
5. Click OK.
6. Expand the schema under the ADSI Edit object.
7. Click the expanded entry CN=schema, ... and the right pane populates with entries.
8. When the right pane is fully populated, scroll to the end. The presence of the following means the Active Directory schema was properly extended:
o wQuinn-Container
o wQuinn-Value
o wQuinn-DataType
o wQuinn-String
54 StorageCentral User Guide
Uninstalling StorageCentral To uninstall StorageCentral, do the following:
1. From your PC’s desktop, select Start | Settings | Control Panel | Add/Remove Programs.
2. Find the StorageCentral product in the list and click it.
3. Click Remove. The system asks you to confirm that you want to uninstall StorageCentral.
4. Click Yes to confirm you want to uninstall the product. StorageCentral uninstalls, and then the system tells you the computer must be restarted to complete the uninstallation process.
5. Click Yes to restart your computer now or click No to restart your computer later.
Note: Any entities created before uninstalling StorageCentral are automatically saved. They will be available to the installation wizard the next time it is run. The StorageCentral entities are:
o Managed objects o File groups o Report sets and report definitions o Preferred machines o Audit and trend databases o Reports directory o Quarantine directory o Network Appliance Filer registry
Related Sections For an overview of the installation process, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.
55
Silent Installation Administrators can script automatic installations of the software by creating a batch file that inputs all basic information that would occur during a monitored installation.
Notes: This installation requires one reboot of the server. The silent install process does not support the installation of the Web UI. The silent install does not provide the option to populate the Active Directory; therefore, it must not be used until the Active Directory has been populated.
Creating the msibuild.bat File To run the silent installation procedure, do the following:
1. Use the installation worksheet (page 29) to gather the information you will provide when you run the installation utility (below).
2. Copy the SC5SilentInstall.exe utility from the installation CD (at 5.2/STDEdition) to a folder on your hard drive. You may see other copies of this utility—they are identical. You must execute the utility from your hard drive and not the CD because it generates a file that is placed in the folder from which it is run.
3. Copy the companion DLLs named SC5InstallUtility.dll and gwinsock.dll to the same folder on your hard drive.
4. Execute the installation utility.
5. Enter the required information on the dialog box that displays. (This is the information you would normally enter during an attended installation.) Then click Generate. The resulting file, msibuild.bat, together with the appropriate product’s .msi file
56 StorageCentral User Guide
(located on the CD), must be used in conjunction with the software distribution package you have at your disposal.
6. Edit the msibuild.bat file.
o If you are installing an AD edition of StorageCentral, add this property before the /qn command: COMPUTERPOLICIES="computer-policy-name" where computer-policy-name is the name of the computer policy you want to apply to the computer you are installing.
o If you want the install to perform the required reboot, remove the REBOOT=“ReallySuppress” property. This will cause the server to reboot automatically after install is complete. The server will boot to the Logon screen.
Note: During a silent installation, StorageCentral automatically selects (that is, carries forward) any entities it detects. This means any entities created when StorageCentral was used after a previous installation are available after the silent installation. The StorageCentral entities are:
o Managed objects o File groups o Report sets and report definitions o Preferred machines o Audit and trend databases o Reports directory o Quarantine directory o Network Appliance Filer registry
Executing the msibuild.bat File To execute the silent install, you can either run it from Start | Run or from the command prompt (Start | Programs | Accessories | Command Prompt).
Do the following:
1. Change the directory to the folder that contains the batch file and .msi file.
57
2. If you are performing a silent upgrade, copy the file StorageCentralQFE.bat from the installation CD to the folder you just changed to.
3. Type msibuild.bat and press Enter. For example: D:\Silent\msibuild.bat
The install begins. You will not see any prompts or windows pop up. However, you will see the entire batch command in the command prompt window. By default, the server will not reboot.
For information about the commands and switches you may use to customize your msibuild.bat file, go to this web site:
http://www.microsoft.com/technet/treeview/default.asp?url=/TechNet/prodtechnol/winxppro/proddocs/sag_WinInstall_Command_Line_Syntax.asp
Related Section “Silent Uninstallation” (page 59)
58 StorageCentral User Guide
Silent Uninstallation To run the silent uninstallation procedure, do the following:
1. Copy the SC5SilentUninstall.exe utility from the installation CD (at 5.2/STDEdition) to a folder on your hard drive. You may see other copies of this utility—they are identical. You must execute the utility from your hard drive and not the CD because it generates a file that is placed in the folder from which it is run.
2. Execute the SC5SilentUninstall.exe utility and answer the questions that StorageCentral asks. StorageCentral then builds the msiuninstall.bat file.
This msiuninstall.bat file, together with the appropriate product’s .msi file (located on the CD), must be used in conjunction with the software distribution package you have at your disposal.
Related Section “Silent Installation” (page 56)
59
Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2
StorageCentral 5.2 supports Unicode. To take advantage of this support, you must convert your audit and trend data, whether they are stored in Microsoft Access or Microsoft SQL Server.
This section provides instructions for converting your Access or SQL Server database to run under StorageCentral 5.2.
If Your Data is In Microsoft Access If your data is already stored in Access 2000 format, you need take no action. StorageCentral 5.2 will be able to store Unicode data in the Access database.
If your data is stored in Access 97 format and you do not want to take advantage of the StorageCentral 5.2 Unicode support, you need take no action. All versions of StorageCentral will be able to access the database, but StorageCentral 5.2 will be unable to store Unicode data in the Access database.
If your data is stored in Access 97 format and you want to take advantage of the StorageCentral 5.2 Unicode support, do the following:
1. Upgrade StorageCentral to version 5.2.
2. Manually convert the Access database from 97 to 2000 format.
All versions of StorageCentral will be able to access the database, and StorageCentral 5.2 will be able to store Unicode data in the Access database.
If Your Data is In SQL Server If you do not want to take advantage of the StorageCentral 5.2 Unicode support, you need take no action. All versions of StorageCentral will be able to access the database, but StorageCentral 5.2 will be unable to store Unicode data in SQL Server.
60 StorageCentral User Guide
If your data is stored in Access 97 format and you want to take advantage of the StorageCentral 5.2 Unicode support, follow the steps below.
1. Upgrade StorageCentral to version 5.2.
2. Copy the files SCSQL.bat and SCSRMDB2U.sql from the <install-directory>\DB directory of the computer on which StorageCentral is installed to the computer on which SQL Server is installed. SCSRMDB2U.sql contains SQL statements that the conversion program, SCSQL.bat, uses.
3. Convert the SQL Server data by typing the following: SCSQL /c username password where username is an account that can create databases, tables, and indexes, and password is the password for this account.
StorageCentral 5.2 will be able to access SQL Server and store Unicode data there. However, StorageCentral 5.0 will be unable to access the database.
Related Sections For an overview of the installation process, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.
61
62 StorageCentral User Guide
Chapter 3. Using StorageCentral
Viewing and Modifying Global Properties The Properties dialog box presents tabs that allow you to configure global properties for an individual machine (or OU when supporting Active Directory).
You will not always see all the tabs. Which tabs display is a function of what computer you are working on and which edition of StorageCentral is installed on the computer. The chart below summarizes under what conditions you will see each tab.
Tab See page number
Non-NetApp Computer
Remote Agent for a NetApp Filer
NetApp Filer
Audit 64 X X Event Log 64 X X File Blocking 65 X X X Mail 66 X X X Network Appliance 68 X Remote Agent 68 X Reports 68 X X X Space Allocation 69 X X SQL Server 70 X X Trending 70 X X X Version 71 X X
To view and modify global properties:
1. On the management pane, highlight My Computer, an OU, domain, or a preferred machine. Then right-click and choose Properties. The Properties dialog box displays. The remaining sections in this section describe the tabs on this dialog box.
2. View and modify properties as required.
63
3. Click OK to modify the properties -or- click Cancel to discard modifications.
Audit Tab Period The number of days StorageCentral keeps the audit data. A value of 0
specifies that StorageCentral is to keep the data indefinitely. Setting a long retention period causes StorageCentral to use more disk space for storing data.
For additional information about audit data, read the section “Introduction to Audit Data” on page 156.
Event Log Tab On the Event Log tab you can specify which events will generate a record in the Microsoft application event log.
Space Allocation
Action Comment Creating an Object Select this action if you want StorageCentral to create a record
in the application event log when a space allocation managed object is created.
Modifying an Object's Properties
Select this action if you want StorageCentral to create a record in the application event log when a space allocation managed object is modified.
Deleting an Object Select this action if you want StorageCentral to create a record in the application event log when a space allocation managed object is deleted.
StorageCentral defaults to creating a record in the application event log for each space allocation action.
64 StorageCentral User Guide
File Blocking
Action Comment Creating an Object Select this action if you want StorageCentral to create a record
in the application event log when a file blocking managed object is created.
Modifying an Object's Properties
Select this action if you want StorageCentral to create a record in the application event log when a file blocking managed object is modified.
Deleting an Object Select this action if you want StorageCentral to create a record in the application event log when a file blocking managed object is deleted.
StorageCentral defaults to not creating a record in the application event log for any file blocking action.
For more information about event log, read the section “Application Event Log” on page 187.
File Blocking Tab Quarantine file location
Applicable only to file content blocking. The blocked file will be placed in a quarantine folder. You can modify the location for quarantined files.
65
Excluded users and groups
Users and/or groups globally excluded from being blocked for any types of files. Click Add to select users and groups to exclude. The exclusion is implemented on a server-wide basis. For example, if an object is blocked for graphics files, but you would like "Domain Admins" to be excluded from the screen, add the group "Domain Admins" to the excluded users and groups list. Notes You can exclude by user and by group on non-Network Appliance computers; you can exclude only by user on Network Appliance computers. If the quarantine option is not selected and/or the file location is not provided, the blocked file will be deleted.
Mail Tab StorageCentral can use e-mail to notify you when an alarm goes off and to send you reports.
On the Mail tab you can specify the parameters that enable StorageCentral to use e-mail: Exchange mail settings, SMTP mail settings, and whether it is to use Active Directory for e-mail.
Exchange Mail Settings
Profile The Microsoft Exchange profile to be used when the address book is required.
Password The Exchange password (if required).
66 StorageCentral User Guide
SMTP Mail Settings
You must specify a mail server and mail sender if you want to perform the following actions:
• E-mail alarm notifications. To have StorageCentral e-mail an alarm notification, you must fill in the Mail To field, or Mail To and Mail CC fields, of an alarm's Notification tab.
• E-mail reports from alarm actions. To have StorageCentral e-mail a report from an alarm action, you must fill in the Mail To field, or Mail To and Mail CC fields, of an alarm's Report tab.
• E-mail interactive reports after they run. To have StorageCentral e-mail an interactive report after it runs, you must fill in the Mail the report to the following email address field on the Output tab of a report set's properties dialog box.
• E-mail batch reports after they run. To have StorageCentral e-mail a batch report after it runs, you must fill in the Mail To field, or Mail To and Mail CC fields, after pressing the Mail button on the Run Report dialog box.
Mail Server
SMTP server, from which e-mail alerts and reports are sent
Mail Sender
From address in e-mail. You may need to provide the sender's login ID (for example, DJones) or the sender's e-mail address (for example, [email protected]).
Password E-mail password
Using Active Directory for E-mail
If you want StorageCentral to retrieve the e-mail address from Active Directory, select the Use Active Directory for email check box. This helps send notification messages through alarm actions.
If you want StorageCentral to not retrieve the e-mail address using Active Directory, leave the check box clear.
67
Network Appliance Tab On this tab you can add and delete Network Appliance Filers from the list of known Filers.
To add a Filer, do the following:
1. Click Add. The Select Computer dialog box displays.
2. Identify a Network Appliance Filer by doing one of the following:
o Typing its fully qualified path name in the box
o Clicking the browse (...) button, finding the Filer using the Browse for Computer dialog box, and clicking OK
3. Click OK on the Select Computer dialog box.
To delete a Filer from the list, highlight a Filer in the list and click Remove.
Remote Agent Tab User name The user name you use to access the Network Appliance
remote agent. Password and Confirm Password
The password associated with the user name.
Reports Tab Exclude OS files OS files are excluded from reports Exclude DLL files DLL files are excluded from reports Exclude Administrators
Administrator files are excluded from reports
Include user shares User shares included in reports
68 StorageCentral User Guide
Include Administrator shares
Administrator shares included in reports
Report output folder Folder where reports and batch files will be saved. If no value is specified, reports and batch files are stored in the StorageCentral \Reports folder.
Support URL URL for downloading ActiveReports component used in Active HTML reports. For information about customizing the ActiveReports component, read the section “Customizing the ActiveReports Component (CAB File)” on page 40.
Cost per GB This value is used in the Chargeback by Account Number report to charge back the departments (OUs) within the company for the cost of storage and for its maintenance. $80 per GB is a default setting that can be changed. For additional details, see the description of the Chargeback by Account Number report; this description is located on the Description tab of the report's Properties dialog box.
Account code Any AD field to total on (Department is a default). AD fields are supported in Active Directory editions only. For additional details, see the description of the Chargeback by Account Number report; this description is located on the Description tab of the report's Properties dialog box.
Space Allocation Tab Auto detect disks Mounted drives can automatically be detected and a storage
management policy can be applied to ensure data protection. Use policy The managed object policy to use for auto detection of disks. Allow active limit on devices
This option allows the users to set an active space limit on partitions (non-system disks). This check box is not selected by default. Use this option with caution because an active limit on devices will enforce a device space limit.
69
Minimum limit The smallest limit (in bytes) given to a managed object during auto detection operations. Enter a minimum space limit amount if a policy is not selected from the Use policy drop-down list. Use policy is linked to the Apply Policy option in Auto detection Settings in the Managed Objects. If the Apply Policy is left blank, the value in the Minimum limit box will be used.
SQL Server Tab If you want to store StorageCentral audit and trend data in Microsoft SQL Server (rather than in the default Microsoft Access database), you will provide the values below as you follow the instructions in the section “Configuring SQL Server Support” on page 202.
User The SQL Server user name Password The password associated with the user name
Trending Tab Enable collection
Enables space allocation collection. At trend intervals, managed object information will be saved to a database. You may run trend reports to view the trend information from the database.
Start Time Time data should start to be collected Collection Interval
Time interval between space allocation collections
Period The number of days StorageCentral keeps the trend data. A value of 0 specifies that StorageCentral is to keep the data indefinitely. Setting a long retention period causes StorageCentral to use more disk space for storing data.
For additional information about trend data and how to report on it, read the section “Trending” on page 232.
70 StorageCentral User Guide
Version Tab On this tab you can do the following:
• View product version information.
• View technical support information.
• Enter a new license key. VERITAS Software Corporation supplies you with a new license key after you upgrade your existing license; you must then enter the new license key on this tab.
• View the property level. (This field displays only if you are running an Active Directory edition of StorageCentral.) The value in this field tells you from where your computer is getting its properties; the properties can come from your computer, your OU, or the domain.
Related Sections For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
71
Policies
Introduction to Policies StorageCentral provides two types of policies: managed object policies and computer policies.
• A managed object policy is a set of space allocation and/or file blocking properties that define a managed object, such as a drive or folder. To learn more about this type of policy, read the section “Introduction to Managed Object Policies” on page 72.
• A computer policy is a "policy for applying managed object policies to servers." A computer policy includes devices, folders under these devices, and managed object policies. When a computer policy is applied to a server, the included managed object policies are applied to the devices and folders on that server. To learn more about this type of policy, read the section “Introduction to Computer Policies” on page 85.
Managed Object Policies
Introduction to Managed Object Policies
Managed object policies are available for use with managed objects, such as drives or folders. A managed object policy can contain both space allocation and file blocking properties. Predefined managed object policies are shipped with the product, but you can also create custom polices.
Both predefined and custom policies can be selected when creating a managed object. This not only saves time but decreases the chance for clerical errors because the policy properties are only entered once and the policy can be applied to multiple managed objects.
72 StorageCentral User Guide
Optionally, you can automatically propagate policy changes to managed objects that are using that policy.
For managed object policies, you can:
• Create a new policy
• Create a transparent policy
• Delete a policy
• Copy a policy
• Rename a policy
• View and modify the properties of a policy
Related Sections “Creating a New Managed Object Policy” (page 73) “Deleting a Managed Object Policy” (page 78) “Copying a Managed Object Policy” (page 78) “Renaming a Managed Object Policy” (page 79) “Viewing and Modifying Managed Object Policy Properties” (page 79) “Transparent Policies” (page 84)
“Space Allocation Options” (page 229) provides explanations of the options you can select when creating or modifying the space allocation properties of a managed object policy.
“Introduction to Computer Policies” (page 85) is an introduction to policies for computers.
Creating a New Managed Object Policy
This section assists you in using the New Policy Wizard, which enables you to create a managed object policy that has space allocation and/or file blocking properties associated with it.
73
To start the New Policy Wizard, do the following:
On the management pane, highlight Policies, right-click, and click New | Managed Object Policy.
The New Policy Wizard starts. The remainder of this section explains how to use the wizard’s dialog boxes.
The New Policy Wizard The dialog boxes presented in this section are:
• Policy Name (page 74)
• Policy Attributes (page 74)
• Policy Preferences (page 75)
• Set Space Allocation (page 75)
• Space Allocation Alarm n (page 76)
• File Groups (page 76)
• File Blocking Alarm (page 77)
• File Blocking Filter (page 77)
Not every dialog box documented in this section will display; your choice on the Policy Attributes dialog box determines which dialog boxes display later in the wizard.
Policy Name Dialog Box Use the Policy Name dialog box to name the managed object policy you are creating. Do not use these characters in the policy name: + # = ; : , /
Policy Attributes Dialog Box Use the Policy Attributes dialog box to specify if the managed object policy you are creating is to contain space allocation properties, file blocking properties, or both.
74 StorageCentral User Guide
Policy Preferences Dialog Box On the Policy Preferences dialog box, do the following:
• Specify if the policy is to propagate changes to managed objects, or be a transparent policy (a maintenance policy), or neither. See the sections “Managed Object Policy Propagation” (page 83) and “Transparent Policies” (page 84) for additional information.
• Optionally associate a user or group with the policy.
Set Space Allocation Dialog Box This dialog box displays if you selected the Space allocation check box on the Policy Attributes dialog box.
On the Set Space Allocation dialog box, do the following:
• Enter the disk space limit and specify a qualifier -- that is, a unit of size (such as megabytes) or the percentage of something (such as percentage of space currently being used) -- from the drop-down list. The disk space limit determines the maximum amount of space the managed object may use. On a Network Appliance Filer, the disk space limit must be 1 K or larger. For additional information, read the section “Limitations” (page 174) in the section "Space Allocation and Network Appliance Filers." For information about disk space limits, read the section “Disk Space Limit” on page 218.
• Enter the overdraft limit and specify a qualifier from the drop-down list. The overdraft limit is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The overdraft limit does not apply if the managed object resides on a Network Appliance Filer. For more information about overdraft limits, read the section “Overdraft Limit” on page 227.
75
• Select the space allocation options you want. Read the section “Space Allocation Options” on page 229 for an explanation of these options. The options marked with an asterisk do not apply if the managed object resides on a Network Appliance Filer.
Space Allocation Alarm Dialog Boxes These dialog boxes display if you selected the Space allocation check box on the Policy Attributes dialog box.
There are multiple space allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.
On the alarm setting dialog boxes (Space Allocation Alarm 1, Space Allocation Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” on page 211 for an explanation of the information you can provide on the alarm setting dialog boxes.
• Enter information about the alarm’s threshold.
• Click Actions to add the following information about the alarm:
o Notification
o Execute
o Report
o Extend
File Groups Dialog Box This dialog box displays if you selected the File blocking check box on the Policy Attributes dialog box.
On the File Groups dialog box, check a file group(s) to specify that StorageCentral should block (or not block) the file types specified in that file group.
For an introduction to working with file groups, read the section “Introduction to File Groups” on page 110.
76 StorageCentral User Guide
File Blocking Alarm Dialog Box This dialog box displays if you selected the File blocking check box on the Policy Attributes dialog box.
On the File Blocking Alarm dialog box, enter information about the file blocking alarm. Read the section “Description of File Blocking Alarm Settings” on page 205 for an explanation of the information you can provide on the dialog box.
• Specify one or more blocking options.
• Click Actions to add the following information about the alarm:
o Notification
o Execute
o Report
File Blocking Filter Dialog Box This dialog box displays if you selected the File blocking check box on the Policy Attributes dialog box.
On the File Blocking Filter dialog box, optionally specify folders to include and exclude from the file-blocking process. Use these buttons:
Add folders to the list.
Remove folders from the list.
and Move folders up and down in the list. The order of the folders does not affect the way StorageCentral processes them; ordering them is for your convenience only.
Related Sections • For an introduction to managed objects, read the section “Introduction to
Managed Objects” on page 90.
77
• For an explanation of space allocation, read the section “Types of Space Allocation” on page 234.
• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
• Other related sections:
“Include and Exclude Filters” (page 219) “Group Associations” (page 220)
Deleting a Managed Object Policy
To delete a managed object policy:
1. On the management pane, expand Policies.
2. Highlight the policy to delete and right-click. Click Delete. A message displays prompting for confirmation.
3. Click Yes to delete the policy.
Copying a Managed Object Policy
To copy a managed object policy:
1. On the management pane, highlight Policies.
2. In the details pane, right-click the policy you want to copy. Choose Copy.
3. Right-click in the details pane and choose Paste. A new managed object policy, named "Copy of <policy you selected>", displays in the list.
4. Rename the new policy by right-clicking it and choosing Rename, entering the new name in the text field, and pressing Enter.
78 StorageCentral User Guide
5. Change the properties of the new policy as appropriate. See page 79 for additional information.
Renaming a Managed Object Policy
To rename a managed object policy:
1. On the management pane, expand Policies.
2. Highlight the policy to rename and right-click. Click Rename.
3. Enter the new name in the text field and press Enter.
Viewing and Modifying Managed Object Policy Properties
This section assists you in viewing and modifying the properties of a managed object policy.
Note: If you are a non-administrative user, you can modify the properties only if you have "Full Control" permission. For more information, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.
To view or modify a managed object policy’s properties, do the following:
1. On the management pane, expand Policies.
2. Click a policy.
3. In the details pane, double-click Allocation, Blocking, or Preferences. If a policy does not have that type of property associated with it, you are given the option to add that type (allocation or blocking) of information.
79
Allocation Properties If you select the allocation icon, StorageCentral presents you with the Allocation Properties dialog box containing these tabs:
• Space Limit
• Alarm n
You may view or modify the properties specified on these tabs.
Space Limit Tab On the Space Limit tab, do the following:
• Enter the disk space limit and specify a qualifier—that is, a unit of size (such as megabytes) or the percentage of something (such as percentage of space currently being used)—from the drop-down list. The disk space limit determines the maximum amount of space the managed object may use. On a Network Appliance Filer, the disk space limit must be 1 K or larger. For additional information, read the section “Limitations” (page 174) in the section "Space Allocation and Network Appliance Filers." For information about disk space limits, read the section “Disk Space Limit” on page 218.
• Enter the overdraft limit and specify a qualifier from the drop-down list. The overdraft limit is the amount of space by which the disk space limit can be exceeded before enforces the disk space limit. The overdraft limit does not apply if the managed object resides on a Network Appliance Filer. For more information about overdraft limits, read the section “Overdraft Limit” on page 227.
• Select the space allocation options you want. Read the section “Space Allocation Options” on page 229 for an explanation of these options. The options marked with an asterisk do not apply if the managed object resides on a Network Appliance Filer.
80 StorageCentral User Guide
Alarm Tabs There are multiple space allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.
On the alarm tabs (Alarm 1, Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” on page 211 for an explanation of the information you can provide on the alarm tabs.
• Enter information about the alarm’s threshold.
• Click Actions to add the following information about the alarm:
o Notification
o Execute
o Report
o Extend
File Blocking Properties If you select the file blocking icon, StorageCentral presents you with the Blocking dialog box containing these tabs:
• Groups
• Alarm
• Filters
You may view or modify the properties specified on these tabs.
Groups Tab On the Groups tab, check a file group(s) to specify that should block (or not block) the file types specified in that file group.
For an introduction to working with file groups, read the section “Introduction to File Groups” on page 110.
81
Alarm Tab On the Alarm tab, enter information about the file blocking alarm. Read the section “Description of File Blocking Alarm Settings” on page 205 for an explanation of the information you can provide on the tab.
• Specify one or more blocking options.
• Click Actions to add the following information about the alarm:
o Notification
o Execute
o Report
Filters Tab On the Filters tab, optionally specify folders to include and exclude from the file-blocking process. Use these buttons:
Add folders to the list.
Remove folders from the list.
and Move folders up and down in the list. The order of the folders does not affect the way processes them; ordering them is for your convenience only.
Preferences If you select the preferences icon, StorageCentral presents you with the Preferences Properties dialog box containing the Preferences tab.
On this tab you may do the following:
• Specify if the policy is to propagate changes to managed objects, or be a transparent policy (a maintenance policy), or neither.
82 StorageCentral User Guide
See the sections “Managed Object Policy Propagation” (page 83) and “Transparent Policies” (page 84) for additional information.
• Optionally associate a user or group with the policy.
Related Sections • For an introduction to managed object policies, read the section “Introduction to
Managed Object Policies” on page 72.
• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
• Other related sections:
“Include and Exclude Filters” (page 219) “Group Associations” (page 220)
Managed Object Policy Propagation
You can select to propagate policy properties to associated managed objects. For propagation to function correctly, the policy propagation option must be selected before the policy is used in the creation of a managed object or applied to a managed object.
After the policy and managed object are associated, all changes to the policy will be reflected in the managed object. However, if the properties of a managed object are modified, the associated policy and the managed object will no longer be linked and the association will be removed.
During policy propagation, if there is an auto detect object on the folder, no space allocation object will be created on that folder.
Related Sections • “Creating a New Managed Object Policy” (page 73)
• “Viewing and Modifying Managed Object Policy Properties” (page 79)
83
Transparent Policies
A transparent policy is a maintenance policy you use to make individual changes to policies that have been applied to multiple existing managed objects. A transparent policy allows you to change the properties you do want changed and ignore properties you do not want changed.
For example, say you have several managed objects, each having different space allocation property values. You could unselect the "reset high-water mark" option on each of the policies by using a transparent policy without changing the properties that differ from policy to policy. The transparent policy allows you to sensitize (turn on) the policy properties you want to change, and ignore (turn off) those you do not want to change.
When applied to existing policies, only the properties turned on in the transparent policy will be modified. When creating a transparent policy, the check boxes next to the fields are used to turn on or turn off a field. A field with a check box means the field is set to transparent, and that field will be ignored when the transparent policy is applied. That field is also grayed out.
Transparent polices are created the same way as "regular" managed object policies. However, when creating a transparent policy, the leftmost check boxes are used to indicate which properties to use or ignore. Selecting a check box for a field indicates that the field is set to transparent and that field will be ignored when the policy is applied.
The New Policy Wizard allows you to specify that the policy is to be transparent on the Policy Preferences dialog box. Be sure the Transparent Policy check box is selected. This sets all properties to transparent, allowing you to sensitize only the desired properties.
Related Sections • “Creating a New Managed Object Policy” (page 73)
84 StorageCentral User Guide
Computer Policies
Introduction to Computer Policies
Computer policies are a very valuable feature, especially with large deployments. A computer policy is a "policy for applying managed object policies to servers." When a computer policy is applied to a server, the included managed object policies are applied to the devices and folders on that server.
Computer policies consist of the following properties: policy name, devices to apply the policy to, folders within the device to apply policies to, and actions such as auto detect disks, auto detect folders, and folder policies.
Define computer policies and then apply computer policies to servers.
For computer policies, you may:
• Create a new policy
• Delete a policy
• View and modify the properties of a policy
• Apply a computer policy
Notes:
• When you use an Active Directory edition of StorageCentral, you can use computer policies to implement policies across the enterprise very quickly.
• Blocking rules are placed on the folder itself, not on the children. With blocking rules, "auto detect folders" and "apply to folder" are treated identically, meaning the blocking rule is placed on the parent folder only.
• Computer policies currently do not have mount point support. This feature will be included in the future.
85
Related Sections “Creating a New Computer Policy” (page 86) “Deleting a Computer Policy” (page 87) “Viewing and Modifying Computer Policy Properties” (page 88) “Applying a Computer Policy” (page 88) “Introduction to Managed Object Policies” (page 72) is an introduction to policies for managed objects.
Creating a New Computer Policy
To create a computer policy:
1. On the management pane, highlight Policies and right-click. Click New, then click Computer Policy -or- on the details pane, right-click. Click New, then click Computer Policy -or- expand Polices, highlight Computer Policies, right-click and click New, click Computer Policy.
2. The Welcome dialog box for the New Policy Wizard displays. Click Next.
3. On the Policy Name dialog box, enter a name for the computer policy you are creating. Do not use the following characters in the computer policy name: + # = ; : , /
4. Click Next.
5. On the Select Devices dialog box, select the devices to include and exclude from the computer policy. Click Next.
6. On the Select Folders dialog box, enter folder names to include for each selected device. Click Next.
7. Select a device policy (optional) and the policy to use when automatically detecting mounted drives.
8. Select policies to use for folders and/or a policy used when subfolders are automatically detected. Click Next.
9. Select report sets and collector information.
86 StorageCentral User Guide
10. Click Schedule to enter schedule information for the reports including schedule interval, time of day, days of week, and days of month. Click OK.
11. Click Next.
12. The Completing the New Policy Wizard dialog box displays. Click Finish to create the computer policy.
Related Sections “Introduction to Computer Policies” (page 85) “Deleting a Computer Policy” (page 87) “Viewing and Modifying Computer Policy Properties” (page 88) “Applying a Computer Policy” (page 88)
Deleting a Computer Policy
To delete a computer policy:
1. On the management pane, expand Computer Policies.
2. On the details pane, highlight the computer policy to delete and right-click. Click Delete.
3. A message displays prompting for confirmation.
4. Click Yes to delete the computer policy.
Related Sections “Introduction to Computer Policies” (page 85) “Creating a New Computer Policy” (page 86) “Viewing and Modifying Computer Policy Properties” (page 88) “Applying a Computer Policy” (page 88)
87
Viewing and Modifying Computer Policy Properties
To view or modify computer policy properties:
1. On the management pane, expand Policies. Click Computer Policies.
2. On the details pane, highlight a computer policy and right-click. Click Properties or double-click on the computer policy.
3. View and modify as many properties as required.
4. Click OK to modify the properties -or- click Cancel to return to the details pane.
Related Sections “Introduction to Computer Policies” (page 85) “Creating a New Computer Policy” (page 86) “Deleting a Computer Policy” (page 87) “Applying a Computer Policy” (page 88)
Applying a Computer Policy
To apply a computer policy to a server:
1. On the management pane, select a server to apply a policy to, right-click, and click Apply Computer Policy.
2. The Select Computers dialog displays if the Apply option is selected at the OU level. Select computers where to apply policy. Click OK.
3. On the Select Computer Policy dialog, select computer policies to apply.
4. Click OK to apply the computer policy.
Notes: If the managed objects do not exist, they are created and the actions specified in the policy are applied to each new managed object. If the "Create folder" option is selected, the folder is created before the managed object is created. If the managed object already exists, the managed object is not created.
88 StorageCentral User Guide
Related Sections “Introduction to Computer Policies” (page 85) “Creating a New Computer Policy” (page 86) “Deleting a Computer Policy” (page 87) “Viewing and Modifying Computer Policy Properties” (page 88)
89
Managed Objects
Introduction to Managed Objects This section contains these sections:
• An introduction to managed objects
• An explanation of the managed objects details pane (page 91)
• Instructions to refresh the managed object database (page 94)
• Instructions to run a report against a managed object (page 95)
• Instructions to control the number of entries that StorageCentral sends to the application event log (page 95)
Overview
Managed objects are objects with a space allocation and/or file blocking policies associated with them. A managed object may consist of a file, directory, share, or partition. When using AD, objects may be managed for an OU, Site, or Domain.
When you choose Managed Objects from the management pane, a list of the managed objects displays in the details pane. You may do the following:
• Create and delete managed objects
• View and modify the properties of a managed object
• Set the frequency with which StorageCentral automatically refreshes the contents of the details pane
• Control the appearance of the grid
90 StorageCentral User Guide
• Specify the contents of the grid
• Run a report against a managed object
• Apply a policy to a managed object
• On Network Appliance Filers: Turn quotas on and off, resize quotas, and restart quotas
Managed Object Details Pane
For each managed object, the following fields display in the grid in the details pane:
Field Description High-water The highest amount of disk space limit that was ever used on a
particular managed object even if files were deleted Managed Object
Managed object name (folder name) The column header changes to "Managed Object (Filtered)" if you apply a filter to the grid as described in the section “Filtering the Contents of the Managed Object Grid,” below. If a Network Appliance Filer is not online, a row displays with a managed object of volume-name — status. Read more about this in the section "Network Appliance Filers and the Grid," below.
Mode Indicates whether space allocation or file blocking is enforced. Valid values are Active and Passive.
% Used Percentage used of the space limit: o Red: 90 – 100 o Yellow: 60 – 89 o Green: 0 – 59
Policy Name of policy applied to a managed object Server Name of the server where a managed object is located Space Limit Maximum amount of space that can be used for a managed object Space Used Space actually used by a managed object
91
Field Description Type Type of managed object:
— folder space allocation
— user space allocation
— auto detect subfolders
— auto detect all users
— file blocking
User Owner of the managed object
Sorting the Display You can sort on any of these columns by clicking the column header.
Sel nFollow
2.
in the managed object grid.
e details pane.
grid layout with the original
ecti g Columns to Display in the Managed Object Grid these steps:
1. On the details pane, right-click and select Choose Columns.
Select columns to display from the list.
3. Use the Move Up and Move Down buttons to reorder the columns. The first column in the list will be the left-most column
4. Click OK to accept the selected columns and order -or- click Cancel to discard the selections and return to th
Note: Use the Restore button to revert back to the originalcolumns and column order selected.
92 StorageCentral User Guide
Filtering the Contents of the Managed Object Grid You can filter the contents of the grid so that only those managed objects that meet spe
Follow
3. Select filter options including allocation fields to filter on and a range of values.
4. Click the Advanced button to enter advanced filter options. From here, you can fi e.
5. C
Notes:
grid, the header of the managed objects . You
Network Appliance Filers and the Grid
For example: You have defined a folder named Accounting on volume Prime on your
w labeled
at a volume is initializing by displaying a row with ializing”. After the managed object has
is replaced with rows for the managed objects on that volume.
cific criteria will display.
these steps:
1. On the details pane, right-click in the blank area and click Filter Objects.
2. Select one or more object types you want to see such as folder limit or blocking.
lter by policy name, user name, server name, or mod
lick OK to apply the filter.
Click Restore to revert to the original filter options.
When you filter the contents of thecolumn changes from "Managed Object" to "Managed Object (Filtered)"may need to widen the column to see this entire header.
The grid does not present space allocation or file-blocking managed objects for a Network Appliance Filer volume that is not online. Instead, you see a row with a managed object of volume-name — status.
Network Appliance Filer to have file blocking properties. If Prime is online, you see a row labeled Prime\Accounting. However, if this volume is offline, you see a roPrime — Offline.
Additionally, the grid informs you th-name — quota initthe message “volume
initialized, the row
93
VieDo the f
1. On the details pane, right-click a managed object in the grid and click Explorer.
2. The Windows Explorer window displays. The selected managed object is e selected folder can be viewed
Refreshing the Managed Object Database
aged t an
Automatically To smanage
1. On the details pane, right-click and select Auto Refresh Frequency.
tes nges.
ManuaManually refreshing the display does not recreate the object, it just recalculates the curr t
• To refresh specific managed objects, go to the details pane and select one or more managed objects. Then right-click and choose Scan.
wing the Contents of a Folder ollowing:
highlighted on the left pane. The contents of thon the right pane.
Usage information about the managed object is stored in a database when the manobject is created. Data about the managed object may be refreshed automatically ainterval you specify, or manually whenever you want.
et the frequency with which StorageCentral automatically refreshes the list of d objects displayed in the grid, follow these steps:
2. On the Auto Refresh Frequency dialog box, use the up and down arrows to adjust the time values in minutes and seconds. The default value is 15 minu00 seconds. Click OK to save your cha
lly
en space limit and updates the database.
• To refresh all managed objects, click the refresh button ( ).
94 StorageCentral User Guide
Running a Report Against a Managed Object
To run a report against a managed object, right-click the managed object in the gridchoose Run Report. The Run Report dialog box displ
and ays.
For Set” on
Managed Objects and the Microsoft Application Event Log
You can ft app g by following these instructions:
2. Click the Event Log tab.
nt to generate a record in the event log.
4.
See the Viewing and Modifying Global Properties” for additional information.
Related Sect
• To find from the mana g the Filer from StorageCentral” (page 171). With these commands you can turn a Filer's quotas on or off, and you can resize and restart quotas.
eleting a Managed Object” (page 103)
an explanation of the Run Report dialog box, read the section “Running a Report page 143.
control how much information StorageCentral writes to the Microsolication event lo
1. On the StorageCentral management pane, highlight My Computer, an OU, or a preferred machine. Then right-click and choose Properties. The Properties dialog box displays.
3. Select the actions you wa
Click OK.
section “Event Log Tab” (page 64) in the section “
ions
out how you can issue simple Network Appliance Filer commandsged object details pane, read the section “Controllin
• Other related sections:
“Creating a New Managed Object” (page 96) “D
95
“Viewing and Modifying Managed Object Properties” (page 103) “Applying a Policy to a Managed Object” (page 108)
Creating a New Managed Object This sec ch enables you to create a managed object that has space allocation and/or file blocking properties asso
To start ged Object Wizard, do the following:
1. On mNew -or- In the managed object details pane, right-click and click New.
2. log box displays if the managed object you want to identify could reside on more than one computer. For example, you see this
o You are running an Active Directory edition of StorageCentral and you are working at the root level
aged object on a computer that is part of a preferred group
If the Select a Computer dialog box displays, specify the computer on which you object.
The ew starts. The remainder of this section explains how to use the wizard’s dialog boxes.
tion assists you in using the New Managed Object Wizard, whi
ciated with it.
the New Mana
the anagement pane, highlight Managed Objects, right-click, and click | Object.
The Select a Computer dia
dialog box if:
o You attempt to create a man
want the managed
N Managed Object Wizard
96 StorageCentral User Guide
The New Managed Object Wizard
The a n this section are:
• Set Space Allocation (page 100)
)
• File Blocking Alarm (page 101)
will display; your choices on some of the dialog boxes early in the wizard determine which dialog boxes display later in the wizard.
Use the Folders dialog box to select the managed objects (volumes, folders, or files) to whi y
Note: Ishare th rd, refresh the MMC, and restart the wizard. To refresh, click the refresh button located in the row of but s
di log boxes presented i
• Folders (page 97)
• Folder Options (page 98)
• User Options (page 98)
• Select Users (page 99)
• Select Object Type (page 99)
• Alarm n (page 100
• File Groups (page 101)
• File Blocking Filter (page 102)
Not every dialog box documented in this section
Folders Dialog Box
ch ou want to apply space allocation and/or file blocking policies.
f you are working with a Network Appliance Filer and have recently added a at does not display in the list of folders, you must exit the wiza
ton above the managed object details pane.
97
Folder Options Dialog Box
ubfolders.
cy optionally select an existing managed object policy
from the Use policy drop-down list. If you do not select an existing policy here
• To a olders of the managed object(s) you selected, select the object pinforma 190.
User O
On the Uobject apply t l ways, but not both.
• To monitor all users, select Auto detect all users within the folder. You may .
he .
heck for user or group associations check box and select an existing policy from the first Use policy drop-down list.
• to restrict a specific user or users in the folder you specified on the Folders dialog box, select Apply policy to specific users
m
cond Use policy drop-down list.
On the Folder Options dialog box, you may choose to apply a policy to the managed object(s) you selected and/or choose to apply a policy to a managed object’s s
• To apply a policy to the managed object(s) you selected, select the Apply polito folder check box. Then
first , you will define a policy “on the fly” later in the wizard.
pply a policy to the subfApply policy to subfolders check box. Then select an existing managed
olicy from the second Use policy drop-down list. For additional tion, read about auto detecting subfolders on page
ptions Dialog Box
ser Options dialog box, specify which users the restrictions on this managed o. You may specify users in one of severa
further refine this choice
o To exempt administrators from the restriction you are creating, select tExclude administrators check box
o To apply policies associated with each user’s primary group, select the C
To apply a managed object policy
within the folder. (You will specify the specific users on the Select Users dialogbox that follows.) Then optionally select an existing managed object policy frothe se
98 StorageCentral User Guide
Select Us
This dialog box folder check box on the dialog box.
The Select Us rshould apply to
• If y domain\user name, click Insert, type it into the User Name click OK.
you want to select from a list of all available users, click ; the dialog lays. Select a machine or domain, select one or more users, and click
OK.
• If you know the user's name (for example, David Smith) but not the user name user; the Find User dialog box displays.
of the dialog box.
2. Select the user you want and click Add; the user is then listed in the Selected box. You may specify more than one user by holding the CTRL
he user in the list and click
Select
Use the pe dialog box to specify if the managed object policy you are creating “on the fly” is to contain space allocation properties, file blocking properties, or both.
ers Dialog Box
displays if you selected the Apply policy to specific users within the User Options
e s dialog box gives you multiple ways to specify which user(s) the policy .
ou know the user's dialog box, and
• If Add Userbox disp
(for example, DSmith), click Find
1. Enter either a complete or partial name in the Full Name box and clickFind Now. All user names matching your criteria display in the middle
key as you select users.
3. Click OK.
To remove a user already in the Select Users list, highlight tRemove.
Object Type Dialog Box
Select Object Ty
99
Set Sp
This dia lays if you selected the Space allocation check box on the Select Obj t
On the S
•
e limit determines the maximum amount of space the managed
1 K or larger. For
For information about disk space limits, read the section “Disk Space Limit” on page 218.
t limit and specify a qualifier from the drop-down list.
it is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The overdraft limit
For more information about overdraft limits, read the section “Overdraft Limit”
age 229 for an explanation of these options.
ly if the managed object resides
on a Network Appliance Filer.
Alarm Dialog Boxes
These dialo xes display if you selected the Space allocation check box on the Select Object Type dialog box.
ace Allocation Dialog Box
log box dispec Type dialog box.
et Space Allocation dialog box, do the following:
Enter the disk space limit and specify a qualifier—that is, a unit of size (such as megabytes) or the percentage of something (such as percentage of space currently being used)—from the drop-down list. The disk spacobject may use. On a Network Appliance Filer, the disk space limit must be additional information, read the section “Limitations” (page 174) in the section "Space Allocation and Network Appliance Filers."
• Enter the overdraf The overdraft lim
does not apply if the managed object resides on a Network Appliance Filer.
on page 227.
• Select the space allocation options you want. Read the section “Space AllocationOptions” on p
The options marked with an asterisk do not app
g bo
100 StorageCentral User Guide
There are m p allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.
On the alarm ng dialog boxes (Alarm 1, Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” (page 211) for an explanation of the information you can provide on the alarm
o Report
File Groups Dialog Box
On the File G up(s) to specify that StorageCentral sho d in that file group.
For i ction to File Groups” on p
File Blocking Alarm Dialog Box
This dialog box displays if you selected the File blocking check box on the Select Object Type dialog box.
ulti le space
setti
setting dialog boxes.
• Enter information about the alarm’s threshold.
• Click Actions to add the following information about the alarm:
o Notification
o Execute
o Extend
This dialog box displays if you selected the File blocking check box on the Select Object Type dialog box.
roups dialog box, select a file grould block (or not block) the file types specifie
an ntroduction to working with file groups, read the section “Introduage 110.
101
On the File Blocking Alarm dialog box, enter information about the file blocking alarm.
•
ion about the alarm:
o Notifi
o Execute
o Repo
File Blocking Filt
his dialog box displays if you selected the File blocking check box on the Select Object Type dialog box.
lter dialog box, optionally specify folders to include and exclude rocess. Use these buttons:
Read the section “Description of File Blocking Alarm Settings” (page 205) for an explanation of the information you can provide on the dialog box.
Specify one or more blocking options.
• Click Actions to add the following informat
cation
rt
er Dialog Box
T
On the File Blocking Fifrom the file-blocking p
st.
Add folders to the li
ers from the list.
Remove fold
and Move folders up and down in the list. The order of the folders does not affect the way StorageCentral processes them; ordering them is for your convenience only.
Related Sections
• For an introduction to managed objects, read the section “Introduction to Managed Objects” on page 90.
102 StorageCentral User Guide
• For an explanation of space allocation, read the section “Types of Space Allocation” on page 234.
• For information about working with Network Appliance Filers, read the section
.
e 219) “Group Associations” (page 220)
DeTo delete a managed object:
Then right-
“Introd
Viewing and Modifying Managed Object Properties This section assists you in viewing and modifying the properties of a managed object.
N are a non-administrative user, you can modify the properties only if you have "Full Control" permission. For more information, read the section “Two Levels of Non-Administrat page 239.
“Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4
• Other related sections:
“Include and Exclude Filters” (pag
leting a Managed Object
1. On the details pane, select one or more managed objects to delete.click and click Delete.
2. A message displays prompting for confirmation.
3. Click Yes to delete the managed object(s).
Related Sections
uction to Managed Objects” (page 90)
ote: If you
ive User Access to StorageCentral” on
103
To view or modify a managed object’s properties, do the following:
In the managed object details pane, right-click a managed object in the grid and click Prop
Which properties disp object you selected.
These are the types of man select from the grid:
This icon in ...represents this type of managed object:
erties.
lay depends on the type of managed
aged objects that you may
the grid...
Folder space allocation (see page 104)
ce allocation (see page 104)User spa
Auto detect subfolders (see page 106)
Auto detect all users (see page 106)
File blocking (see page 107)
Folder Space Allocation or User Space Allocation
llocation” or “user space allocation” type, Stora
•
•
You may view or modify the properties specified on these tabs.
Note: Ipropert d to the m
If you select a managed object of “folder space ageCentral presents you with the following property tabs:
Space Allocation
Alarm n
f a policy is associated with the managed object, modifying the managed object ies will break the association. Changes to the policy will no longer be propagateanaged object.
104 StorageCentral User Guide
Space AOn the S cation tab, do the following:
egabytes) or the percentage of something (such as percentage of space
bject may use.
e Filer, the disk space limit must be 1 K or larger. For additional information, read the section “Limitations” (page 174) in the section
or information about disk space limits, read the section “Disk Space Limit” on
• Enter the overdraft limit and specify a qualifier from the drop-down list.
t twork Appliance Filer.
ad the section “Space Allocation
object resides on a nce Filer.
Alarm TabThere are multiple allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.
On the alarm 1, Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” on page 211 for an explanation of the information you can provide on the alarm tabs.
llocation Tab pace Allo
• Enter the disk space limit and specify a qualifier—that is, a unit of size (such as mcurrently being used)—from the drop-down list. The disk space limit determines the maximum amount of space the managedo On a Network Applianc
"Space Allocation and Network Appliance Filers." Fpage 218.
The overdraft limit is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The overdraft limidoes not apply if the managed object resides on a Ne For more information about overdraft limits, read the section “Overdraft Limit” on page 227.
• Select the space allocation options you want. ReOptions” on page 229 for an explanation of these options. The options marked with an asterisk do not apply if the managed
Network Applia
s space
tabs (Alarm
105
• Enter information about the alarm’s threshold.
o Report
If yoyou wit
On s that Sto
Auto Detect All Users
If you select a managed object of “auto detect all users” type, StorageCentral presents Detection dialog box.
• Use the drop-down list to specify the policy that StorageCentral is to use.
• Select the Exclude administrators check box to exempt administrators from the on on this managed object.
e Check for group associations check box to apply policies associated with each user’s primary group.
• Click Actions to add the following information about the alarm:
o Notification
o Execute
o Extend
Auto Detect Subfolders
u select a managed object of “auto detect subfolders” type, StorageCentral presents h the Auto Detection dialog box.
thi dialog box you may use the drop-down list to specify the managed object policy rageCentral is to use.
you with the Auto
On this dialog box you may:
restricti
• Select th
106 StorageCentral User Guide
File Blocking
If you select a managed object of “file blocking” type, StorageCentral presents you with the following property tabs:
• File Groups
• Alarm
pecified on these tabs.
File rOn the File G should block (or not b
For an intro g with file groups, read the section “Introduction to File Groups” on
Alarm TabOn the Alarm tab, enter information about the file blocking alarm. Read the section
of File Blocking Alarm Settings” on page 205 for an explanation of the
options.
• Click Actions ormation about the alarm:
o Notifi
o Execute
o Repo
• Filters
You may view or modify the properties s
G oups Tab roups tab, check a file group(s) to specify that StorageCentral
lock) the file types specified in that file group.
duction to workin page 110.
“Description information you can provide on the tab.
• Specify one or more blocking
to add the following inf
cation
rt
107
Filters Tab On the Fbloc n
ilters tab, optionally specify folders to include and exclude from the file-ki g process. Use these buttons:
Add folders to the list.
Remove folders from the list.
and does not affecMove folders up and down in the list. The order of the folders
t the way StorageCentral processes them; ordering them is for your convenience only.
Related Sections
d the section “Introduction to
Allocation” on page 234.
For information about working with Network Appliance Filers, read the section e
Other related sections:
Ap y
Applyin managed object. If pro
• For an introduction to managed objects, reaManaged Objects” on page 90.
• For an explanation of space allocation, read the section “Types of Space
• “Introduction to Using StorageCentral with Network Appliance Filers” at thbeginning of Chapter 4.
•
“Include and Exclude Filters” (page 219) “Group Associations” (page 220)
pl ing a Policy to a Managed Object
g a policy to a managed object associates that policy with thepagation is enabled, any changes to the policy will be reflected in the managed object.
108 StorageCentral User Guide
To apply a policy to a managed object:
n the details pane, select one or more managed objects to associate with a olicy, right-click, and choose Apply Policy.
isplays. Select a policy from the list by checking ly that policy to the managed object -or- click
location or file blocking) of the selected managed object will be displayed in the policy list.
• If managed object properties are modified, the policy association will be broken. t changes to the policy will not be reflected in the managed
object.
1. Op
2. The Apply Policy dialog box dthe box and click Apply to appCancel to return to the details pane without selecting a policy.
Notes:
• Only policies that have the attributes (space al
Any subsequen
109
File Groups
IntroductFile groups consist of a set of unauthorized and authorized files that StorageCentral is to block from the system. File groups are also used as selection criteria by reports. For example, a G unauthorized files with extensions *.jpg and *.bmp, but authorize the specific file important.jpg. Predefined file groups are available file groups.
Related Sections
“Creat“Deleting a File Group” (page 111) “Viewing and Modifying File Group Properties” (page 112)
e 113) ge 113)
Creating a New File Group
, right-click, and click New | ties dialog box displays.
2. Enter a name for the file group in the File group name box.
ption box. ile group is used as a
ion to File Groups
raphics file group might contain
, and you can create customized
ing a New File Group” (page 110)
“Copying a File Group” (pag“Renaming a File Group” (pa
To create a new file group:
1. On the management pane, highlight File GroupsFile Group. The File Group Proper
3. Enter up to 50 characters of descriptive text in the DescriStorageCentral shows this description in a report if this ffilter in the report set.
110 StorageCentral User Guide
4. Enter unauthorized and/or authorized files. Full wild carding in file names is supported. Use the following buttons:
— to enter a file name
— to remove files from the list
— to move files up the list
— to move files down the list
For a e section “Unauthorized and Authorized File
5. Click
Delet
1. On the management pane, highlight File Groups.
2. On the details pane, highlight a file group, right-click, and click Delete.
3. A message displays prompting for confirmation.
dditional information, read ths” on page 236.
OK to create the new file group.
ing a File Group To delete a file group:
4. Click Yes to delete the file group.
111
ViewiTo view or modify file group properties:
1. nagement pane, highlight File Groups.
2. On the details pane, double-click the file group you want to view or modify. The File Group Properties dialog box displays.
descriptive text in the Description box. hows this description in a report if this file group is used as a
filter in the report set.
4. Add and remove unauthorized and authorized files. Full wild carding in file
ng and Modifying File Group Properties
On the ma
3. Enter up to 50 characters ofStorageCentral s
names is supported. Use the following buttons:
— to enter a file name
— to remove files from the list
— to move files up the list
— to move files down the list
For additional information, read the section “Unauthorized and Authorized Files” on page 236.
5. Click OK to modify the file group properties.
Note: You cannot change the file group's name on the File Group Properties dialog box. To change a file group name, read the section “Renaming a File Group” on page 113.
112 StorageCentral User Guide
Copying a File Group :
1. On the management pane, highlight File Groups.
hoose Copy.
5. Change the properties of the new file group as appropriate as described on page 112.
RenaminTo rena
1.
2. ails pane, highlight a file group, right-click and click Rename.
3. Enter the new name in the text field and press Enter.
To copy a file group
2. On the details pane, right-click the file group you want to copy. C
3. Right-click in the details pane and choose Paste. A new file group, named "Copy of <file group you selected>", displays in the list.
4. Rename the new file group by right-clicking it and choosing Rename, entering the new name in the text field, and pressing Enter.
g a File Group me a file group:
On the management pane, highlight File Groups.
On the det
113
Report
Intr cReport collecto s. Report collectors allow you to off-load r the management console to additional resources. Machines with the full version of StorageCentral or the Collector component, available through the custom installation, may be designated as report collectors and
Re
“Deleting a Report Collector” (page 115) ule” (page 115)
For instructions on running a report, read the section “Running a Report Set” on page 143.
Adding a Report Collector To add
1. On the management pane, highlight Report Collectors, right-click and click New
Collectors
odu tion to Report Collectors rs are machines used to run report
rt processing, which can be intensive, from epo
selected when scheduling reports.
lated Sections
“Adding a Report Collector” (page 114)
“Viewing and Modifying a Report Collector Sched“Deleting a Scheduled Job” (page 115)
a report collector:
| Collector.
2. Enter a computer name. You may also use the browse button (...) to select a computer name.
3. Click OK to add a report collector.
114 StorageCentral User Guide
DeTo delet rt collector:
nagement pane, expand Collectors. Click on a computer, right-click, and click Delete.
2. A message will be displayed prompting for confirmation.
3. Click Yes to delete the report collector.
Deleting a Scheduled Job To d e uled job:
1. On the management pane, expand Collectors. Click on a computer to view scheduled jobs for that collector. Highlight a job, right-click, and click Delete.
2. A message displays prompting for confirmation.
3. Click Yes to delete the scheduled job.
Viewing and Modifying a Report Collector Schedule To view or modify the schedule for each report collector:
1. On the management pane, expand Report Collectors and click on a collector machine to view its schedule.
2. Right-click on a scheduled job. Click Properties.
3. View and modify as many properties as required relating to the scheduled job. Task, Schedule, and Settings properties may be modified.
4. Click OK to modify the properties.
leting a Report Collector e a repo
1. On the ma
el te a sched
115
The following fields are displayed for each scheduled job:
• Name
• Schedule
• Creator
• Command
• Next Run Time
• Last Run Time
• Last Result
116 StorageCentral User Guide
Reports
IntReportman eidentify types an ations being stored on non-designated servers or partitions, and identify
Limita
If you own on the Acti
If you are ru ndows Server 2003 and Internet Explorer Enhanced S StorageCentral reports are blocked and you get a warnin e report web page to the Trusted zone, the report is allo d properly the first time. However, if you reload the p rly.
Related S t
• For n on “Introduction to Rep
• For ction “Introduction to Report Sets” (pag 3
roduction to Reports s provide an overview of disk consumption as well as information required to
ag space effectively. Reports can provide a wealth of information such as ing inappropriate file types being stored on corporate resources, identifying filed ing files not being included in the backup policies.
applic
tions
ning StorageCentral under Windows NT, you are unable to drill dveX reports.
are run
nning StorageCentral under Wiecurity Configuration is enabled,g prompt from IE. If you add thwe to launch but does not open
age, the report does open prope
ec ions
an i troduction to report definitions, read the sectiort Definitions” (page 118).
an introduction to report sets, read the see 1 5).
117
Report D
Introd
Report d report d
• A standard report definition is limited in what the user can modify, such as which l.
dard report definitions have this icon:
efinitions
uction to Report Definitions
efinitions define the content and appearance of a report. There are two types ofefinitions: standard and custom.
columns to display. All standard report definitions ship with StorageCentra On the details pane, stan
• A custom report definition is designed using the StorageCentral custom report stom reports are highly configurable by the user. Some custom report
o create your own.
t definition:
rt Break” (page 126)
“Report Sort” (page 128)
o “Report Summary Query” (page 130)
o “Report Summary Sort” (page 131)
information or summary formation. Detail information might be a list of files that meet a specific
writer. Cudefinitions ship with StorageCentral; you can als These sections contain instructions for you to create a custom repor
o “Report Detail” (page 124)
o “Report Query” (page 124)
o “Repo
o
o “Report Total” (page 129)
o “Report Summary Total” (page 132)
o “Report Graph” (page 133)
A custom report definition can report on detail in
118 StorageCentral User Guide
criteria, while summary information might provide the total amount of storage each user is using.
rough the data. When a report definition provides summary information, StorageCentral produces the report in two passes. The
g 100 MB of storage, Douglas is using 240 MB of storage, and so on).
de
When a report definition provides detail information, StorageCentral produces the report in one pass th
first past produces raw data (for example, a list of the seven files user Mark is storing, and their sizes), and the second pass summarizes the data (the fact that Mark is usin
When you specify summary parameters—Summary Query, Summary Sort, Summary Total—you tell StorageCentral that the report definition is to provisummary information.
On the details pane, custom report definitions have this icon:
Rel
“Deleting a Report Definition” (page 121)
Creati
To creat
2. ox ew Report Definition Wizard displays. Click Next.
ation objects, Space allocation history). Click Next.
ated Sections “Creating a New Report Definition” (page 119)
“Viewing and Modifying Report Definition Properties” (page 122) “Copying a Report Definition” (page 123) “Renaming a Report Definition” (page 123)
For an introduction to report sets, read the section “Introduction to Report Sets”on page 135.
ng a New Report Definition
e a new report definition:
1. On the management pane, expand the Reports branch.
Right-click Definitions and choose New | Definition. The Welcome dialog bof the N
3. On the Report Definition Name dialog box, enter the report definition name and select the data source for the report (Active file system, Space alloc
119
Note: Do not use the following characters in the report definition name: + # = ; : ,/
cription dialog box, enter the report description that will be used in
5. lected for l information.
6. On the Detail dialog box, select the columns to display in the file detail for a report. Selected Fields are columns that will display on the report. See the
e 124) for additional information. Click Next.
See the section “Report Sort” (page 128) for additional information. Click Next.
8. On the Report Break dialog box, select the fields to display in the report. See rmation. Click Next.
determined by the order of the fields in the Selected Fields list. See the section
ary query to define the files that are selected for the report. See the section “Report Summary Query”
Click Next.
mary Sort dialog box, define the order of the files in the report e the section “Report Summary Sort” (page 131) for additional
12. otals, which Selected Fields list. See the
for additional information. Click Next.
13. On the Graph dialog box, select graph options for the report. See the section “Report Graph” (page 133) for additional information. Click Next.
4. On the Desthe report. Click Next.
On the Query dialog box, create a query to define the files that are sethe report. See the section “Report Query” (page 124) for additionaClick Next.
section “Report Detail” (pag
7. On the Sort dialog box, define the order of the files in a report.
the section “Report Break” (page 126) for additional info
9. On the Total dialog box, select the order of the columns' totals, which are
“Report Total” (page 129) for additional information. Click Next.
10. On the Summary Query dialog box, create a summ
(page 130) for additional information.
11. On the Sumsummary. Seinformation. Click Next.
On the Summary Total dialog box, select the order of the columns tare determined by the order of the fields in the section “Report Summary Total” (page 132)
120 StorageCentral User Guide
14. A Completing the Report Definition Wizard dialog box displays. Click Finish
Rel d“Introduction to Report Definitions” (page 118)
“Viewing and Modifying Report Definition Properties” (page 122)
“Renaming a Report Definition” (page 123)
Deleting
Only custom (u
To delete a
1. On the m
2. Click D efinitions displays in the details pane.
3. On the d ort definition to delete and choose Delete.
4. A messa
5. Click Ye
Related Sections “Introduction to Report Definitions” (page 118)
difying Report Definition Properties” (page 122) “Copying a Report Definition” (page 123)
a Report Definition” (page 123)
to create a new report definition.
ate Sections
“Deleting a Report Definition” (page 121)
“Copying a Report Definition” (page 123)
a Report Definition
ser-defined) report definitions can be deleted.
report definition:
anagement pane, expand the Reports branch.
efinitions. The list of report d
etails pane, right-click the rep
ge displays prompting for confirmation.
s to delete report definition.
“Creating a New Report Definition” (page 119) “Viewing and Mo
“Renaming
121
Viewing and Modifying Report Definition Properties
efinition:
3. On the details pane, right-click a report definition and choose Properties.
4. iew and modify properties as required.
rt definition (
To view or modify a report d
1. On the management pane, expand the Reports branch.
2. Click Definitions. The list of report definitions displays in the details pane.
A tabbed dialog box displays listing properties for the report. V
o If you are updating the properties of a standard repo ), StorageCentral presents tabs for properties unique to that report
o If you are updating the properties of a custom report definition (
definition.
), d these sections about the tabs StorageCentral presents:
– “Report Total” (page 129) – “Report Summary Query” (page 130) – “Report Summary Sort” (page 131)
tal” (page 132) 3)
ick Cancel to return to the details pane.
Related Sections
“Creating a New Report Definition” (page 119) “Deleting a Report Definition” (page 121) “Copying a Report Definition” (page 123) “Renaming a Report Definition” (page 123)
rea
– “Report Detail” (page 124) – “Report Query” (page 124) – “Report Break” (page 126) – “Report Sort” (page 128)
– “Report Summary To– “Report Graph” (page 13
5. Click OK to modify the report definition properties -or- cl
“Introduction to Report Definitions” (page 118)
122 StorageCentral User Guide
Copying a Report Definition
To copy
1.
2. finition you want to copy, and choose Copy.
in the details pane and choose Paste. A new report definition, named report definition you selected>", displays in the list.
hange the properties of the new report definition as appropriate as described on page 122.
R s tion to Report Definitions” (page 118)
g a Ng and ies” (page 122)
a Report Definition” (page 121) enaming a Report Definition” (page 123)
enaming a Report Definition
To rename a report definition:
nagement pane, expand the Reports branch.
me in the text field and press Enter.
a report definition:
On the management pane, expand the Reports branch.
Click Definitions, right-click the report de
3. Right-click"Copy of <
4. Rename the new report definition by right-clicking it and choosing Rename, entering the new name in the text field, and pressing Enter.
5. C
elated Section“Introduc“Creatin“Viewin“Deleting “R
ew Report Definition” (page 119) Modifying Report Definition Propert
R
1. On the ma
2. Click Definitions, highlight a report definition to rename, right-click, and click Rename.
3. Enter the new na
123
Rel d 118)
“Creating a New Report Definition” (page 119) Report Definition” (page 121)
“Viewing and Modifying Report Definition Properties” (page 122) “Copyin age 123)
Re r
Use Detail to define the columns that will appear for the file detail for a report. Detail is display w per file. The order of the columns is determined by the order of the fields in he Selected Fields list with the top field appearing on the left column.
How to:
Add a field to the Selected Fields column
In the Fields column, double-click the field name to add -or-
ate Sections “Introduction to Report Definitions” (page
“Deleting a
g a Report Definition” (p
po t Detail
ed as one ro t
select the field name and click the button.
Delete a field from the Selected Fields
In the Selected Fields column, select the field name to delete
from the list and click the button.
column Change order in In the Selected Fields column, select the field namethe Selected
to move and
Fields column use the and arrow buttons.
Report Query
Use Report Queries to define the files that are selected for the report. You may type the ld or use the query builder to create it.
There are two types of queries: simple and complex.
query directly into the Query fie
Queries
124 StorageCentral User Guide
• Simple query formula: <Field Name> <Operator> <Value>
Example:
SizeAllocatedKB > 1024
cated size greater than 1024 KB.
• C plex q (Sim rator> (Simple Query) -or- NOT uery)
Example:
(Si Th 4 KB an
Date values are represented inside curly brackets in the form {MM D
Parenthesis are not necessary, but they ensure that the proper evaluation is done. As in arit ewithout
These e (SizeAllocatedKB > 1024) AND (CreatedDays < 30)
KB > 1024 AND CreatedDays < 30
These e NOT(SizeAllocatedKB > 1024) AND (CreatedDays < 30) NOT(SizeAllocatedKB > 1024 AND CreatedDays < 30)
The example selects all files with an allo
om uery formula: ple Query) <Ope
(Simple Q
zeAllocatedKB > 1024) AND (CreatedDays < 30)
e example selects all files with the allocated size greater than 102d a creation date less than 30 days old.
/ D/YYYY HH:MM:SS}. The time portion of the date is optional.
hm tic, operations within parenthesis are evaluated first. The order of precedence parenthesis is NOT AND OR.
xpressions are the same:
SizeAllocated
xpressions are different:
125
Defining a Query Expression Use the following field selectors to define a query expression:
• Use the Field Name list to select a column name to insert into the query at the cursor position.
• Use the Operator list to select an operator to insert into the query at the cursor position. These are the relations you may use:
$ Contains substring < Less than <= Less than or equal to <> Not equal to = Equal to > Greater than >= Greater than or equal to AND Both simple expressions must be true for the result to be true NOT Inverts the result of an expression. If an expression is true, it is
made false; if false, it is made true OR Either simple expression must be true for the result to be true
• The Query is the edit area where the query is entered. You may edit it directly r use the query builder to place fields in it.
o c ays false, f rror is found, the
rsor is positio of the error is he
R mm
Report Break
Report Breaks allows you to define a summary break in the report, and it depends on the sort that has been defined. A summary break is associated with a sort column. A
o
• Use Verify tevaluate tocu
heck the query syntax. A query that has syntax errors will alw so no files will be selected with it. I a syntax e
ned at the error and a message about the naturedisplayed in t
elated Sections
Query status field.
“Report Su ary Query” (page 130)
126 StorageCentral User Guide
break occurs whenever the value changes from one row to the next in the associated sort column or any other major sort column. You may then define totaling actions for a s k.
U ort Break otaling is associated with the s bre subtotals to occur w valu sort column. After the report break is ass rt totals is similar to d inal tota ulated for the group of rows
the report break, not for all the rows.
iate the report break with the directory sort and define your totals there. This would give you the totals for every directory by the file owner. You may create a summary report of just report breaks by not defining the detail line. As a result only the Report Breaks are printed.
nt is displayed in the leftmost column. Double-clicking an individual data element brings up its p psumma
How o
Add a field to the In the Fields column, double-click the field name to add -or-
ummary brea
se Rep s to control subtotaling in the report. Subtort. A reporthenever the
ak associated with a sort column will causee changes in that column or any other majorociated with a sort column, defining the repo
efining f ls. The difference is that the totals are calcin
Example: If a report is sorted on file owner and directory, you might want to show total usage for each directory within each file owner. You would assoc
Selected Fields These are the file information data elements you are displaying. The top eleme
ro erties, which you may use to control how the individual data element is rized.
t :
Selected Fields column select the field name and click the button.
Delete a field from In the Selected FithFields
elds column, select the field name to delete e Selected
column from the list and click the button.
Changeth eFields
column, select the field name to move order in In the Selected Fieldse S lected
column and use the and arrow buttons.
127
An action property controls the action on the data element. The action properties are:
DisSUM plays the sum of all the values in the column. MIN Dis nplays the smallest value in the colum . MAX Displays the largest value in the column. AVERAGE Displays the average value in the column. STORE Dis mn. plays the last row's value in the coluRESET Controls when the value is reset to zero.
S he Br he sort element used to trol break. The field names that display in the Break at drop-down list
ere specified on the Report Sort property (page 128).
Sort
the files in a custom report (the rows of a report). Sort is specified as sort keys. For example:
• en the rows of the report will be in alphabetical order by the File Name.
is sorted in Date Created descending order, then the rows will be the newest to the oldest order.
a report is sorted on Date Created and then File Name, the overall report will be displayed in Date Created order.
ore rows h he s in F
elections from tetermine the con
eak at drop-down list let you specify tdw
Report
Use Sort to define the order ofdefined by the order of the data elements
If a report is sorted on File Name, th
• If a report shown in
If you sort on more than one column, then the first sort column will control the overall order of the report and the subsequent sort columns will be defined in the order within the overall or major order. For example:
• If
• If two or mbe displayed
ave t ame creation date, then within that date they willile Name order.
128 StorageCentral User Guide
H
ld to the Selected Fields column
In t name to add -or-
select the field name and click the
ow to:
Add a fie he Fields column, double-click the field
button.
Delete a field from
In the Selected Fields column, select the field name to delete the
Selected Fields n
from the list and click the
colum
button.
Change ordelected
um
t the field name to move r in In the Selected Fields column, selecthe Se
and use the Fields col n and arrow buttons.
may be in ascending or descending order. To change a sort's direction, double-click the phrase "Ascending" or "Descending" next to an item in the Selected Fields
Related Sections “Report Break” (page 126)
(page 131)
the totals displayed at the end of the report. These totals are for all the lu ined by the order eft colu n
How to:
Add a fie to the Selecte column
column, double-click the field name to add -or-
and click the
A sort
column.
“Report Summary Sort”
Report Total
Use Total to controlva es in the column you are totaling. The order of the Total columns is determ
of the fields in the Selected Fields list with the top field appearing in the lm .
ld d Fields
In the Fields
select the field button.
Delete a d frothe Sele elcolumn
ted Fields column, select the field name to delete
e list and click the
fiel m In the Seleccted Fi ds
from th button.
129
Change n Selecte s column
ove order i the In the Selected Fields column, select the field name to md Field
and use the and arrow buttons.
The Total has an action property that controls how the column is totaled. The actions are:
Sum Displays the sum of all the values in the column. Min Displays the smallest value in the column. Max Displays the largest value in the column. Average Displays the average value in the column. Store . Displays the last rows value in the column
Related“Report Summary Total” (page 132)
You may type the query directly into the Query field or use thque
• an operator in the query. These are
Sections
Report Summary Query
Use Summary Query to define the query expression to control file selection during summarization of the custom report.
e query builder to create it. Use the following field selectors to define a ry expression:
• Use the Field Name drop-down list to insert a column name in the query.
Use the Operator drop-down list to insertthe relations you may use:
$ Contains substring < Less than <= Less than or equal to <> Not equal to = Equal to > Greater than >= Greater than or equal to
130 StorageCentral User Guide
AND Both simple expressions must be true for the result to be true NOT Inverts the result o ression. If an expression is true, it is
adf an exp
m e false; if false, it is made true OR Eithe r t o be true r simple expression must be true fo he result t
ery is th d. You may edit it directly or ery builder to place fields in it.
Verify button to verify ery that has syntax errors ys eval so d with it. If a syntax error
is found, the cursor is positioned at the error and a message about the nature of the error is displayed in the Query status field.
(page 124) for details on query syntax.
Report Summary Sort
Use Summary Sort to define the order of the columns in a custom report to sort on for mary Sort is defined by the order of the data elements ple:
Date Created descending order, then the rows will be shown in the newest to the oldest order.
If you sort on more than one column, then the first sort column will control the overall order of the report an hin the overall or major or
rt is s ill isplayed
two or more rows have the same creation date, then within that date they will be displayed in File Name order.
• The Quuse the qu
e edit area where the query is entere
• Use thewill alwa
the query syntax. A quuate to false, no files will be selecte
Related Sections See “Report Query”
summarization. Like Sort, Sumspecified as sort keys. For exam
• If a report is sorted on File Name, then the rows of the report will be in alphabetical order by the File Name.
• If a report is sorted in
d the subsequent sort columns will be defined in the order witder. For example:
• If a repobe d
• If
orted on Date Created and then File Name, the overall report win Date Created order.
131
H
e Selected Fields column
s e field name to add -or-
select the field name and click the
ow to:
Add a field to th In the Field column, double-click th
button.
Delete a field from the Selected
In the Selected Fields column, select the field name to delete
from the Fields column list and click the button.
Change orderelected
column
ield name to move in In the Selected Fields column, select the f
and use the and arrow buthe SFields ttons.
ary sort may be ange a sort's direction, -click the phrase "Ascending" or "Descending" next to an item in the Selected
Fields column.
Related“Report Sort” (page 128)
stom report. These summary totals are for tal columns
th the top field
How to:
the Selected e field name to add -or-
nd click the
Adouble
summ in ascending or descending order. To ch
Sections
Report Summary Total
A summary may be created instead of a detailed report. Use Summary Total to select the columns to summarize on at the end of the cuall the values in the column you are totaling. The order of the Summary Tois determined by the order of the fields in the Selected Fields list wiappearing in the left column.
Add a field to In the Fields column, double-click th
Fields column select the field a button.
Delete a field
Selected Fields column
In the Selected Fields column, select the field name to delete
from the list and click the from the
button.
132 StorageCentral User Guide
Change order in
Fields column
In the Selected Fields column, select the field name to move the Selected
and use the and arrow buttons.
Like the Total, the Summary Total has an action property that controls how the column . The actions are: is totaled
Sum Displays the sum of all the values in the column. Min Displays the smallest value in the column. Max Displays the largest value in the column. Average Displays the average value in the column. Store Displays the last rows value in the column.
Related Sections Report Tot
Report Graph
eport Graph allows you to define a graph to include in the report. You may select the to display: pie, bar, or plot. Graph settings determine the data to be used xis as well as the line break.
The graph settings are described below.
XT selects snapshot was taken.
The option from the drop-down list:
Stamp
“ al” (page 129)
Rtype of graphfor X- and Y a
Note: The plot graph option is available only for trending reports.
Axis he X axis the time when the
Time The time data was collected
133
X Axis Label The X axis label. The option from the drop-down list:
label TimeStamp The TimeStamp
important that the Y axis be included in the Detail of the report. Failure to do so may result in an application failure or a k gr
e drop-down list:
High-water The highest usage the object has ever showed
Y Axis The Y axis is the capacity of the object at the time when the snapshot was taken. It is
blan aph.
Options from th
Object The object name Overdraft The space limit overdraft Server The server name SID The user's Security Identifier Space Limit The object space limit Space Used The space used at the time data was collected TimeStamp The time data was collected
Line BrThe line nstitute a new line. If object is used, then Storage . Only the first line has regression analysis perform
Options
High-water The highest usage the object has ever showed
eak break determines what is used to coCentral draws one line for each objected on it.
from the drop-down list:
Object The object name Overdraft The space limit overdraft Server The server name SID The user's Security Identifier Space Limit The object space limit Space Use data was collected d The space used at the timeTimeStamp The time data was collected
134 StorageCentral User Guide
For example: Y axis = Space Used, and line break = Object. This shows the space used for e
RegresDisplays a regression line in the graph depicting the trend as an ascending or descending line ysis.
Repo
Introduction to Report Sets
Report sreports re user-defined reports written using the Custom Report Writer.
Related
Set” (page 137)
ical user interface, you can
ns” (page 118).
ach object at each TimeStamp.
sion Line
. The regression line is used to forecast future usage based on historical anal
rt Sets
ets are containers for detailed reports. A report set can contain one or many and can be a combination of standard and custom reports. Custom reports a
Sections “Creating a New Report Set” (page 136) “Deleting a Report “Viewing and Modifying Report Set Properties” (page 137) “Copying a Report Set” (page 142) “Renaming a Report Set” (page 143) “Running a Report Set” (page 143)
For information about the report sets that come pre-packaged with StorageCentral, read the section “Predefined Report Sets” on page 146.
In addition to running report sets through the graphalso run them through the command line interface. For more information, read the section “Command SCReport” on page 165.
For an introduction to report definitions, read the section “Introduction to Report Definitio
135
Creating a New Report Set
To creat
1. rt Sets, right-click - On the details pane, right-click. Click
2. A Report Set Wizard will guide you through creating a new report set.
port Set Wizard . Click Next.
port set name. The following characters should not be used in the rep rt set name: + # = ; : , /
5. Click Next.
6. On the Filter dialog, define the selection criteria for the report set. Select as many Modifying
Report Set Properties” on page 137 for additional information. Click Next.
at dialog, select output formatting for the report set. This includes sizes. See the section “Viewing and e 137 for additional information. Click
8. should be saved and t set. See the section “Viewing and
Modifying Report Set Properties” on page 137 for additional information. Click Next.
to include in the report set. selected. You can also view properties of a
perties button.
10. A Completing the Report Set Wizard dialog displays. Click Finish to create a ew
anagement pane without creating a new report set.
e a new report set:
On the management pane, expand Reports. Highlight Repoand click New. Click Report Set -or New. Click Report Set.
3. A Welcome to the Re page displays
4. On the Enter Report Set Name dialog, enter the reo
of the available options as desired. See the section “Viewing and
7. On the Formthe report format and how to display the Modifying Report Set Properties” on pagNext.
On the Output dialog, specify where the report set optionally where to e-mail the repor
9. On the Content dialog, select the report definitions Multiple report definitions can bereport definition by clicking the Pro
new report set -or- click Back to modify the properties before creating a nreport set -or- click Cancel to return to the m
136 StorageCentral User Guide
Rel d“Introduction to Report Sets” (page 135) “De age 137) “Viewing and Modifying Report Set Properties” (page 137) “Co n ge 142) “Renam “Ru n ge 143)
Report Set
the
3. A mes e displays prompting for confirmation.
4. Click Y
Related Sections tro
“Creat rt Set” (page 136) “View difying Report Set Properties” (page 137) “CopyRena
unn
Viewing and
To view or modify report set properties:
1. On the management pane, highlight Report Sets.
2. On the details pane, highlight a target report set, right-click, and choose Properties -or- double-click on a report set.
ate Sections
leting a Report Set” (p
pyi g a Report Set” (paing a Report Set” (page 143)
nni g a Report Set” (pa
Deleting a
1. On the management pane, highlight Report Sets.
2. On details pane, highlight a Report Set, right-click, and click Delete.
sag
es to delete the report set -or- click No to cancel deletion.
“In duction to Report Sets” (page 135) ing a New Repoing and Moing a Report Set” (page 142) ming a Report Set” (page 143) “
“R ing a Report Set” (page 143)
Modifying Report Set Properties
137
3. A prop
o 138)
o Fo
o Ou
o Co n
Filter Tab Reports can be ort set.
By name Choose this option to filter files by name using standard file selection masks. Use semicolons to enter multiple file selection masks.
Entering *.exe;*.dll will select all the "exe" and "dll" files.
erties dialog box displays. There are four tabs:
Filter (page
rmat (page 139)
tput (page 139)
nte t (page 141)
filtered by defining selection criteria for the rep
Example:
By file group
Choose this option to filter by predefined file groups.
er I y be filtered by the name of t EA
f filter by screening group selected, files maBy ushe file owner.
xample: dmin* includes all files whose owner's name begins with Admin.
T e r ER
Report length
he number of records to include in the report set. By default all thecords will be included in the report set.
xample: eport length of 50 would include the first 50 records.
138 StorageCentral User Guide
File attributes
Fi A
o Read Only: the file is read-only. en: the file is hidden.
o System: the file is a system file. : the file is .
: the file has be up. a di
Dark GBl
les may be selected based on six standard file attributes.
ttributes:
o Hidd
o Compressed compressedo Archive en changed and not backedo Directory: the file is rectory.
check—select if the attribute is present ray check—do not filter, attribute is ignored ank—select if the attribute is absent
Format Tab Reports can be cr
CSV As applications.
eated in several different formats.
comma-delimited format that can be imported into most preadsheets or database
DBF Report output is in a flat database format. Excel Report output in Microsoft Excel format (xls). HTML Presents the report in a traditional browser, which does not require any
special controls. File management capabilities are not available with this format.
Active HTML
This option provides a spreadsheet-style output displayed in the Microsoft Explorer. This style provides for sorting as well as for limited file management, such as copy, move, and delete. In addition, a file launch feature, which will launch a file based on file associations, is available. This functionality requires that the ActiveX controls are loaded on the client machine viewing the report.
Text Report output in the text format (txt). Show sizes in
Units in report: Bytes, Kilobytes (KB), Megabytes (MB), or Gigabytes (GB).
Output Tab Save and mail options.
139
Save threport to
e
the following folder
r tory
c:\reports\duplicates.htm
n is specified and if the format represented by this ported in the report set (see the section “Format Tab”
ill generate a report in that format.
ve the a value in the Save the
port to the following folder field, the value takes precedence over
Folder where the report output will be written. The directory path ofile name may be entered either separately or together. If the direcdoes not exist, create it. Example:
Directory path: c:\reports
File name: duplicates.htm
Directory and filename: If a file extensioextension is sup
n page 139), report DLL wo Batch files created by entering a value in the Batch Command field (documented below) are also saved to the folder specified in Sareport to the following folder. If you specifyrethe value in the Report Output Folder field of the global properties Reports tab (page 68).
Mail the report to the following email address
E-m aail ddress where the report will be sent
140 StorageCentral User Guide
Batch CComm
reates a batch file with a command that was entered in this field. ered either when creating a new e existing report set properties.
r JPEG files that are older than r the del "#" command in the Batch
Command field on the Output tab. The report will produce a set of
Del brian1.jpg Del brian2.jpg
pg
format (JPEG) and file age (older than 01/01/04) are specified in query, go to the
ition, click the
e 68), the value takes
folder field of the Output tab (documented elsewhere in this section), the value takes precedence over the default and the
rty value.
t, the report would generate a batch file ll the JPEG files older than 01/01/04. To
run the batch file.
and The batch command may be entreport set or when modifying th Example: If users want to delete all of thei01/01/04, they should ente
commands similar to these:
Del brian3.j File the query of the actual report definition. To enter the Content tab, select the appropriate report definProperties button, and select the Query tab. The batch file has the same filename as the generated report except that it has an extension of BAT. The batch file is stored in one of several locations.
o By default, it is stored in the StorageCentral \Reports folder. o If you specify a value in the Report Output Folder field of the
global properties Reports tab (pagprecedence over the default.
o If you specify a value in the Save the report to the following
global destination prope After running the report sewith delete commands for adelete all these JPEG files,
Content Tab Use the Content tab to modify the content of the report set. Select the report definitions to include in the report set.
141
Related Sections “Introduction to“Creating a New Rep
Report Sets” (page 135) ort Set” (page 136)
Copyi
To copy
1.
2. ort set you want to copy, and choose Copy.
3. Right-click in the details pane and choose Paste. A new report set, named "Copy >", displays in the list.
Rename, entering the new name in the text field, and pressing Enter.
ort set as appropriate as described on page 137.
Related“Introduction to Report Sets” (page 135)
Deleting a Report Set” (page 137)
“Running a Report Set” (page 143)
“Deleting a Report Set” (page 137) “Copying a Report Set” (page 142) “Renaming a Report Set” (page 143) “Running a Report Set” (page 143) “Introduction to File Groups” (page 110)
ng a Report Set
a report set:
On the management pane, expand the Reports branch.
Click Report Sets, right-click the rep
of <report set you selected
4. Rename the new report set by right-clicking it and choosing
5. Change the properties of the rep
Sections
“Creating a New Report Set” (page 136) ““Renaming a Report Set” (page 143)
142 StorageCentral User Guide
Renam
To rena
2.
3. Enter.
Related Sections age 135)
Creating a New Report Set” (page 136)
g a Report Set” (page 143)
Running
You can run
Running a Report Set Interactively 1. On m
Storage
2. Double- e report set you want to run.
he Run interactively option is selected.
ing a Report Set
me a report set:
1. On the management pane, expand the Report branch.
Click Report Sets, highlight a report set to rename, right-click, and click Rename.
Enter the new name in the text field and press
“Introduction to Report Sets” (p““Deleting a Report Set” (page 137) “Viewing and Modifying Report Set Properties” (page 137) “Copying a Report Set” (page 142) “Runnin
a Report Set
report sets in one of two ways: interactively or batch.
the anagement pane, expand Reports and then click Report Sets.
Central lists the existing report sets on the details pane.
click th The Run Report dialog box displays.
3. Make sure t
4. Optionally change the value in the Collector box if you want to use a different report collector. You might want to use a different report collector if you expect the report to
143
return a large number of files (records). This might happen if you are running a single report against multiple managed objects. In a case like this, the collection process may take a lot of memory.
5.
ant to run the report set. You may select more than one. How long the report
. Click OK when you finish.
g box, click Submit.
Output is also sent to one of several locations.
By default, it goes to the StorageCentral \Reports folder.
rts kes precedence over
the default.
eld
After ex
• .
ou in a file; this name displays in the Report Status field of the Run Report dialog box and in the web browser's Address field. However,
Click the ... button to the right of the Object(s) box; the Select Folder dialog box displays. Select the computer, drive, folder, or sub-folder against which you wset will execute is a function of the reports being run and the number of files being examined
6. On the Run Report dialo The report set begins running. When the report set finishes running, the output displays on your screen in the format specified on the Format tab (page 139) of the report set's properties. (Oneexception: If the report's format is DBF, the report does not display on your screen.)
o
o If you specify a value in the Report Output Folder field of the Repotab (page 68) of the global properties, the value ta
o If you specify a value in the Save the report to the following folder fiof the Output tab of the report set's properties dialog box, the valuetakes precedence over the default and the report destination property value.
amining the report on your screen, you may do one or more of the following:
Print it
• Save it to a hard drive for future examination. (StorageCentral automatically saves the report for y
you probably want to name the file yourself and place it in a location of your choosing.)
144 StorageCentral User Guide
• Send it to another user by selecting File | Send | Page by E-mail from the web
• if it permits. For example, some reports is is called drilling
pen, delete, and move individual files.
Note: You are unable to drill down if you are running StorageCentral under
RunninUse batrecurring b
Runnin he instruct specify when t area. If you want to e-mail the report after it runs, click Mail and specify the recipients.
ot run, do one of the following:
ane, find a report that did not run according to schedule, and look for any error
ges. The solutio on the kind of error.
• On the management find a report that didSR_timestamp.txt ditimestamp value is reptime in that order.
• In case a report is sch ask scheduler llec
none.
e \Program .log rors.
• View the Task Scheduler log. The log will indicate if the job was submitted and ran successfully, with regards to the schedule process.
browser's menu.
Take action directly from the reportenable you to run another report to get additional details; thdown. Other reports enable you to o
Windows NT.
g a Report Set Batch ch reports when you want to run a report set at a specific time, either once or on a
asis.
g a report set as a scheduled job is similar to running it interactively. Follow tions for running an interactive report set, but select the Schedule job option and
to run the report set by providing values in the Schedule repor
If a scheduled report set does n
• On the management pane, expand the Report Collectors. On the details p
messa n will depend
pane, expand the Report Collectors. On the details pane, not run according to schedule, and check if the text file splayed in the Command path exists on the disk. The resented in numbers showing the year, month, day, and
eduled on a remote collector, check if the taccount on that co tor has access to your computer. Give access if there is
• Check thfile for er
Files\Veritas\StorageCentral\5.2\bin\StorageReports
145
Related Sections Rep
“Creating a New Rep“Deleting a Report Se
and Modif“Copying a Report Se“Renaming a Report
For information abouStorageCentral, read
For an introduction t page 1
addition to runninrun
the
Predefined Report Sets
T the repor
“Introduction to ort Sets” (page 135) ort Set” (page 136) t” (page 137)
“Viewing ying Report Set Properties” (page 137) t” (page 142)
Set” (page 143)
t the report sets that come pre-packaged with the section “Predefined Report Sets” on page 146.
o report collectors, read the section “Introduction to Report Collectors” on
In
14.
g report sets through the StorageCentral graphical user them through the command line interface. For minterface, you can
information, readore
section “Command SCReport” on page 165.
his section defines t sets that come pre-packaged with StorageCentral.
Report Set Description Best Practices A representation of storage management best practices
. The that is a good starting point for disk space analysisBest Practices Report gives an overall indication ofsystem's disk health. This
your report identifies files by type,
duplicate files, large scale files, files not being backed up, most commonly used files, and nightly backup requirements. This report contains drill-down capabilities so you may access file detail.
Chargeback Summary
Allows you to view the files by any property contained within the user profile in the Active Directory and assignsa dollar value to the storage used by those files.
Daily Storage Provides daily storage usage details for the managed object.
146 StorageCentral User Guide
Report Set Description Disk Drive Summary d type. Lists all partitions and their capacity, free space an
You may drill into the partition for more detailed information.
Duplicate Files an excessive Identifies duplicate files that may useamount of space. This information is useful for cleaning up disk space quickly.
File Type Summary Provides usage details for the disk profile. Drill down into category details by double-clicking a category in the pie chart or from the report table. In addition, files are sorted by file groups, and the size of each file group is calculated.
Files Created This Month ay
Identifies files based on when the file was created. This is useful for determining environment changes that mhave caused system or disk capacity problems.
Files Not Accessed in Over One Year
Identifies files that have not been accessed in over one year.
Files Not Being BaUp
cked
p
Identifies files that have been modified but have not beenbacked up according to the NTFS archive bit. This bit is used by backup applications to indicate a file's backustatus.
Files To Remove Identifies various temporary file types that can be removed from the system.
Graphic Files Displays all the graphics files contained in the object. This is useful for locating graphic files by name or type.
Insecure Files Displays "at risk" files. Files with access to all are considered "at risk" files.
Internet Files Displays all the files contained in the managed object with extensions *.htm, *.html, *.url, and *@*.
Large Duplicate Files Selects large files that contain duplicate copies within the passed directory path. Files that have a close name matand the same size can be considered duplicates. A cl
ch ose
be a duplicate.
match is done by comparing the number of letters in thefile name that are the same, starting with the left-most letter and proceeding right. Optionally, the files maycompared before being counted as
Large Files Identifies large files based on the file's size. This is useful for locating and recovering disk space quickly.
147
Report Set Description Large Folder ObSummary
ject seful to quickly locate large folder objects.
Identifies folder objects larger than 2 MB. This information is u
Large Users Summary ace usage by user identifier.
Identifies space by user. This information is useful to track sp
Media Files Displays all the media files contained in the object. This is useful for locating media files by name or type.
Microsoft Office Files Displays all Microsoft Office files contained in the object. e This is useful for locating Microsoft Office files by nam
or type. Most Commonly Used Files
Presents the amount of raw capacity accessed each day. This is useful for balancing applications, data, and users across available resources and to prevent under-used or over-burdened file servers.
New Files Identifies files created today. This is useful for determining environment changes that may have caused system or disk capacity problems.
Pinpoint Security Problems
This report is for advanced users. Understanding of file security is necessary to make use of this information. This report identifies files that contain undefined Access Control Entries (ACEs) within an Access Control List (ACL) and also identifies files that have an undefined owner. Undefined ACEs impact file system performance as well as system security integrity, whereas files that have an undefined owner are useful to pinpoint potential security breaches, orphaned files and to ensure files are owned by the proper user.
Space Allocation Summary
Identifies all of the space limits defined on the server.
Space Allocation Trend Summary
Reads the trending database (SCTrend.mdb) and reports about the space allocation objects, space used by them, their space limit, the owner, and other information.
Space By Folder Object Summary
Identifies all the folder objects in the managed object to the depth specified in the report content property. This information is useful to quickly identify large folder objects and folder object trees.
Space By Group Summary
Identifies space by file group. This information is useful to track space usage by group identifier.
148 StorageCentral User Guide
Report Set Description Space By User Displays the utilization by each user in the domain for the Summary selected path. Weekly Storage Provides weekly storage usage details for the managed
object.
Related Sections For an introduction to report sets, read the section “Introduction to Report Sets” on page 135.
149
Preferred
Introduc d Preferred Machines A prefer ters. The purpose rs in one place. W r does not have to these comput
Preferred cess. This is a user-s istry.
For preferred machines, you may:
• Delete a preferred group
Rename a preferred group
• nd modify preferred group properties
For
• App
• Star n them
• Run report
• Clear properties (available only in AD editions)
Groups and Machines
tion to Preferred Groups anred group is a named logical entity that contains one or more compu of creating a preferred group is to group commonly used computehen target computers are included in the preferred group, the use
browse through the Microsoft Windows Network and can manage ers directly from the preferred group.
machines are computers included in the preferred group for quick acpecific setting stored in the local reg
• Create a new preferred group
For a preferred group, you may:
• Run a report on all objects in the preferred group
•
View a
a single preferred machine, you may:
ly computer policy (available only in AD editions)
t and stop services (available only in computers with the agent installed o)
150 StorageCentral User Guide
• Delete a preferred machine
• View and modify preferred machine properties
referred Group” (page 151)
“Renaming a Preferred Group” (page 152) “Viewing and Modifying Preferred Group Properties” (page 153)
to a Preferred Machine” (page 153) ice on a Preferred Machine” (page 154)
Machine” (page 155)
)
Creating a New Preferred Group group:
ose New |
2. On the Welcome to the New Preferred Group Wizard dialog box, click Next.
log box, enter the name of the group and click
o Expand the Computers list and select computers to include in the group.
o Right-click in the Selected computers area and click Add. The Add computer dialog box displays. Type the name of the computer you want to add and then click OK.
Related Sections “Creating a New P“Deleting a Preferred Group” (page 152)
“Applying a Computer Policy“Starting or Stopping Serv“Deleting a Preferred“Viewing and Modifying Preferred Machine Properties” (page 155) “Running a Report Set” (page 143
To create a new preferred
1. On the management pane, right-click Preferred Machines. ChoPreferred Group.
3. On the Preferred Group Name diaNext.
4. On the Select Computer dialog box, do one of the following:
5. Click Next.
151
6. On the Completing the Preferred Group Wizard dialog box, click Finish to create the preferred group.
Relate
“Int ge 150)
Deleting a Preferred Group To delete a
1. On the m select the Del o
2. A messa . Click Yes to delete the
Related Sections
ed Groups and Preferred Machines” (page 150)
Renaming a Preferred Group
Related Sections
“Introduction to Preferred Groups and Preferred Machines” (page 150)
d Sections
roduction to Preferred Groups and Preferred Machines” (pa
preferred group:
anagement pane, right-click the preferred group to delete and ete ption from the menu.
ge displays prompting for confirmationpreferred group.
“Introduction to Preferr
To rename a preferred group:
1. On the management pane, right-click the preferred group to rename and select the Rename option from the menu.
2. Enter the new name in the text field and press Enter.
152 StorageCentral User Guide
Vie ying Preferred Group Properties
1. On the management pane, right-click the preferred group and select the Properties option from the menu.
o Add a computer to the list by expanding the Computers list and selecting computers to include in the group.
ter to the list by right-clicking in the Selected computers alogd t
Related Sections
“Introduction to Preferred Groups and Preferred Machines” (page 150)
Applying a Computer Policy to a Preferred Machine
tral. To do so, follow these steps:
1. On the management pane, expand a preferred group, right-click the target computer, and select the Apply Computer Policy option from the menu.
d click OK.
wing and ModifTo view and modify preferred group properties:
2. On the Select Computers tab, do one of the following:
o Add a compuarea and clicking Add. The Add computer di box displays. Type the name of the computer you want to add an hen click OK.
o Remove a computer from the list by highlighting it in the Selected computers area and clicking Remove.
3. Click Apply and then click OK to save your modifications -or- click Cancel to return to the management pane.
You can apply a computer policy to a single preferred machine only if you are running an Active Directory edition of StorageCen
2. On the Select Computer Policy dialog, select a policy to apply an
153
Related Sections
“Introduction to Preferred Groups and Preferred Machines” (page 150)
Starting or Stopping Service on a Preferred Machine This s ce tion provides instructions to start or stop service on a preferred machine.
Starting Service
A computer that has no service turned on is marked with the symbol and nothing displays in the details pane.
To start service, go to the management pane and expand a preferred group. Right-click a
t and trend data that have exceeded their retention period. The retention periods were specified on the Audit and Trending tabs beginni
Stopping Service
A computer that has a service turned on is marked with the
target computer and click Start Service.
When the service starts, StorageCentral deletes audi
, as documented in the section “Viewing and Modifying Global Properties” at the ng of Chapter 3.
symbol and its file groups,
To stop service, go to the management pane and expand a preferred group. Right-click a target computer and click Stop Service.
Related Sections
Groups and Preferred Machines” (page 150)
policies, reports, and managed objects display in the details pane.
“Introduction to Preferred
154 StorageCentral User Guide
Deleting a Preferred Machine te a preferred machine:
1. On the management pane, expand a preferred group, right-click the computer to delete, and select the Delete option from the menu.
confirmation. Click Yes to delete the
“Introduction to Preferred Groups and Preferred Machines” (page 150)
ViewiTo view a efe properties:
1. On the man gemcomputer, and se e organized on a se hich tabs display is a function of what computer y rking computer.
2. View ify the propert Refer to the sectio roperties” at the beginning o a tabs you see.
3. C to modi ons.
Related Sections
• “Introduction to P
To dele
2. A message displays prompting forcomputer.
Related Sections
ng and Modifying Preferred Machine Properties nd modify pr rred machine
a ent pane, expand preferred group, right-click the target lect the Properties option from the menu. The properties arries of tabs. W
ou are wo on and which edition of StorageCentral is installed on the
or mod ies on the tabs.
n “Viewing and Modifying Global Pf Chapter 3 for detailed description of the options available on the
lick OK fy the properties -or- click Cancel to discard modificati
referred Groups and Preferred Machines” (page 150)
155
Audit Data
Introduct to Audy view space allocation and file blocking actions in the Audit window. To save
n creating a managed object or e Notification tab.
2. The data stored in the audit database and displayed in the grid includes:
iption
ion it Data You maand later view space allocation and blocking actions, whedefining a managed object policy, select Record alarm option on th
To view space allocation and blocking actions:
1. On the management pane, expand Audit. In the details pane, a grid with audit data displays.
Field Name DescrFile Name The fully-qualified file name that triggered the alarm
action. For example, this is the file that was being updated when the quota was exceeded or a prohibited file type for file blocking.
Message The message that was configured for the alarm action(s) on the Notification tab when defining the policy or managed object.
Object The drive, partition, folder, or filename, etc. that was being monitored by the managed object.
Policy Name The policy name, assuming the managed object is associated with a policy. You can create managed objects that have no policy association.
Server The Windows server name where the managed object resides.
Status This identifies whether the action that caused the alarm to be triggered was "Allowed" or "Denied". "Allowed" basically means that the space allocation or file blocking object was defined as being passive, whereas "Denied" indicates that the object was active, or non-passive.
Time The date and time that the alarm was triggered.
156 StorageCentral User Guide
Field Name Description Type This identifies the type of managed object. "ALLOC" is
objects, whereas "BLOCK" is displayed for space allocation displayed for file blocking objects.
User e file operation which triggered the alarm. The user and domain name are provided. The user that performed th
ID A sequential number that is assigned to each audit record.
Note: You can change the order of the fields in the grid.
IMP he ODBC d osoft Access database even if the UI focus is on another server or another domain. Use a cenconnect
Re
After an se for n days, StorageCentral deletes it. The value for Audit tab, which is documented in the sect perties” at the beginning of Chapter 3.
rameters for your system. Read the section “Audit Tab” (page 64) in the section “Viewing and Modifying Global Properties” for an
• ain, use a centralized t the centralized database, read
on page 192.
Support” on page 202.
ORTANT The Audit Database (as well as the Trend Database) is used through tata source. By default, the User Interface (UI) looks only at the local Micr
tralized database to see the records for all computers in the domain which the UI is ed to.
moving Expired Data
audit record has been in its databan is specified in the Period field on the
ion “Viewing and Modifying Global Pro
Related Sections
• You may change the audit pa
explanation of the parameters.
To see the audit records for all computers in the domMicrosoft Access database. For information abouthe section “Centralized Database”
• You may choose to have StorageCentral store its audit data in Microsoft SQL Server. However, you must first configure StorageCentral to use SQL Server to store this data. For instructions, read the section “Configuring SQL Server
157
• Other related sections:
ing an Audit Record” (page 158) “Viewing and Modifying Audit Properties” (page 158)
Viewing and Modifying Audit Properties To view or modify audit properties:
1. On the management pane, expand Audit. In the details pane, a grid with the audit information displays. Right-click on the grid and click Properties.
2. On the Columns tab, view and modify the columns displayed and the columns' order. Use the Move up and Move down buttons to change the columns' order.
3. On the Date tab, you may filter records by date.
4. On the Custom tab, you may filter records by: user name, policy name, object name, file name, access, and type.
5. Click OK to modify the properties.
Deleting an Audit Record To manually delete an audit record:
1. On the management pane, expand Audit. In the details pane, a grid with audit information displays. Right-click on the grid and click Delete.
2. A message displays prompting for confirmation.
3. Click Yes to delete the record.
To find out how StorageCentral automatically deletes old audit records, read the section “Removing Expired Data” (page 157) in the section "Introduction to Audit Data."
“Delet
“Refreshing Audit Data” (page 159)
158 StorageCentral User Guide
Refreshing Audit Data
1. On the management pane, expand Audit. In the details pane, a grid with audit information displays.
grid and click Refresh -or- click the refresh icon on the toolbar.
To refresh audit data:
2. Right-click on the
159
Command Line Commands
Command SCAlloc Use this commap es.
Command Syntax
S loc [\\ser
S er ”]
S [\\ser [[/I | /L] | [/U “domain\user”]] [/X]
S \\ser | /L] | [/U “domain\user”]] [:KB | /R[:KB | :MB | :GB] “number”] [/[-]W] [/[-]E] [/X]
S er “policy” [[/I | /L] | [/U “domain\user”]]
S [\\ser “domain\user”]] [:KB | ber”] [/[-]W] [/[-]E] ]
SCAlloc [\\server] /D
SCAlloc [\\server] /D[Y] /O “object” [[/I | /L] | [/U “domain\user”]]
rver] /S /O “object”
SCAlloc -]Z /O “object”
nd to perform functions related to space allocation managed object olici
CAl ver] /LIST
CAlloc [\\s ver] /SHOW [/O “object
CAlloc ver] /A /O “object” /T “policy”
CAlloc [ ver] /A /O “object” [[/I [/P :MB | :GB] “number”] [
CAlloc [\\s ver] /M /O “object” /T [/X]
CAlloc ver] /M /O “object” [[/I | /L] | [/U [/P :MB | :GB] “number”] [/R[:KB | :MB | :GB] “num [/X
A[Y] /O “object”
SCAlloc [\\se
SCAlloc [\\server] /Y [/O “object”]
[\\server] /[
160 StorageCentral User Guide
/LIST List all space allocation policies /SHO/A
Default space limit is 10 MB
/D[A]
/S /Y can each individual managed object on each volume
/Y /O “object” = Scan each individual managed object on the
/X
/O Managed object name uto detect subfolders
/L
/P:KB Space limit in kilobytes in megabytes
/P:GB/R Overdraft in bytes (default)
/R:MBs
/[-]E /[-]W Save open files (default), -W Do not save open files
olume, -Z Disable volume /U er] /? Help
SCAlloc /a /o C:\Test /t "100 MB Limit" Adds a space allocation object on C:\Test using the "100 MB Limit" managed object policy
W Show all space allocation managed objects Add
o o Default overdraft value is 0 MB
[Y] Delete[All][No confirmation] /M Modify
Scan the named managed object /Y = S
named volume Delay the scan until an SCAlloc command is issued with a /S or /Y switch
/I Enable aEnable auto detect users
/T Policy name /P Space limit in bytes (default)
/P:MB Space limit Space limit in gigabytes
/R:KB Overdraft in kilobytes Overdraft in megabytes
/R:GB Overdraft in gigabyteActive limit (default), -E Passive limit
/[-]Z Enable vUser or group, [Domain\Us
Examples
161
SCAlloc /a /x /o C:\Test /t "100 MB Limit"
SCA oc /a /o C:\ /p:mb 10 /r:kb 2 /e /u Domain\Joe
SCAlloc /a /l /o C:\Test /t "100 MB Limit"
SCA o
SCAlloc /d /o C:\Test Deletes the space allocation object on C:\Test
SCAlloc /d /l /o C:\Test detect user object on C:\Test
Deletes the auto detect folder object on C:\Test
SCAlloc /m /o C:\Test /p:mb 5 /-e
Scans the managed object C:\Test
SCAlloc /y ota managed objects
SCAlloc /y /o s a on volume C:\
Adds a space allocation object on C:\Test using the "100 MB Limit" managed object policy and does not perform a scan
llAdds a user allocation object on C:\ with user Domain\Joe
Adds an auto detect user object on C:\Test using the "100 MB Limit" managedobject policy
ll c /a /i /o C:\Test /t "100 MB Limit" Adds an auto detect folder object on C:\Test using the "100 MB Limit" managed object policy
SCAlloc /d /o C:\ /u Domain\Joe Deletes the user allocation object on C:\ with user Domain\Joe
Deletes the auto
SCAlloc /d /i /o C:\Test
Modifies the space allocation object C:\Test
SCAlloc /s /o C:\Test
Scans all the qu
C:\ Scan ll the quota managed objects
162 StorageCentral User Guide
R ted Sec
“Comm d that enables you to perform
• “Command SCBlock” (page 163) explains the command that enables you to perform functions on file-blocking managed object policies.
mand SCReport” (page 165) explains the command that enables you to
• al through its graphical user interface. For more information about
MC Overview” on page 10.
Command SCBlock erform functions related to file-blocking managed object policies.
Co m
SCBlock
SCB ck
SCB ck [\\server] /A /O “object” /P “policy”
SCBlock
SCBlock [\\server] /D[Y] /O “object”
SCBlock [\\server] /S
/A Add /D[A][Y] Delete[All][No confirmation]
ela tions
• and SCSRM” (page 168) explains the comman functions on all managed object policies.
• “Comproduce reports.
In addition to using the command line interface, you can manipulate StorageCentrthis GUI, read the section “M
Use this command to p
m and Syntax
[\\server] /LIST
lo [\\server] /SHOW
lo
[\\server] /DA[Y]
/SHOW Show all managed objects /LIST List all file-blocking policies
163
/P Policy name /O Managed object name /S /?
Examp
SCBject C:\Users having the "Monitor Office Files" managed
bject policy
SCBloc
Re
•
• “Command SCAlloc” (page 160) explains the command that enables you to space allocation managed object policies.
• In addition to using the command line interface, you can manipulate StorageCentral through its graphical user interface. For more information about this GUI, read the section “MMC Overview” on page 10.
Command SCDisplayLimit The SCDisplayLimit.exe command displays a message showing users their current space
ion. The command displays the information during logon.
Notify driver to scan managed objects Help
les
lock /a /o C:\Users /p "Monitor Office Files" Adds the managed obo
k \\NTDEV /d /o C:\Test Deletes the managed object C:\Test on machine \\NTDEV
lated Sections
“Command SCSRM” (page 168) explains the command that enables you to perform functions on all managed object policies.
perform functions on
• “Command SCReport” (page 165) explains the command that enables you to produce reports.
allocation usage informat
164 StorageCentral User Guide
Before this command can be used, the domain administrator must follow these steps to configure the user's logon script to run SCDisplayLimit.exe during logon:
r.tlb from the CD’s \Utilities\Logon directory to the NETLOGON shared directory on the domain controller.
Th ory is located in a directory similar to this: you ipts
CrSC Fo d:
Co on script to run the script created in step 2 by entering the scr "displaylimit.cmd" in the above example) in the Logon Script box of the Profile tab on the user's Properties dialog box.
Related Section
dditio al through isection “M
CommanUse this comm rts.
Command Syntax
SCReport [\\server] /LIST
1. Copy SCDisplayLimit.exe and qasv
e NETLOGON shared directr-system-drive:\winnt\SYSVOL\sysvol\your-domain-name\Scr
2. eate a logon script in the NETLOGON shared directory to run DisplayLimit.exe.
r example, the following script file might be named DisplayLimit.cm echo displaylimit script \\NTDEV\C$\winnt\SYSVOL\sysvol\wquinn.com\Scripts\
SCDisplayLimit /hd pause
3. nfigure a user's logipt name (
In a n to using the command line interface, you can manipulate StorageCentrts graphical user interface. For more information about this GUI, read the
MC Overview” on page 10.
d SCReport and to perform functions related to producing repo
165
SCReport [\\server] /F “parameter file”
[/
/O /M Specify "Mail To" addresses separated by a semicolon. The values
lues (if any) specified
ies dialog box. If you do not use the /M switch, SCReport will e-mail the report output to the
the following email
/D name /F Specify the batch command (parameter file) file name
r /?
mmand
If the report object of the /O switch contains the root of two or more
example, C:\ and D:\) separated by a pipe character and SCReport incorrectly interprets what you type as the
SCReport /R "File Type Summary" /O "C:\|D:\"
o SCReport /R "File Type Summary" /O "C:|D:"
SCReport [\\server] /R “report set” /O “object” [/M “email”] D “output directory or file name”]
/LIST List all report set names /R Specify report set name
Specify one or more managed objects separated by a pipe line
you specify for the /M switch override the vain the Mail the report to the following email address field on the Output tab of the report set's propert
value specified in the Mail the report to address field. Specify the output directory or file
/UF Specify user filteHelp
Notes: e used in the batch coThe /R, /O, /M, /D, and /UF switches can bfile.
partitions (forenclosed in quotes, escape sequence and the report is only run against the first partition. For example, typing this causes the problem:
To work around this problem, type one of the following: o SCReport /R "File Type Summary" /O "C:\\|D:\\"
166 StorageCentral User Guide
Ex p
SCRepo
managed objects.
ummary" /o C:\ /m [email protected] t named File Type Summary against the C:\ volume and send
SCReport /r "Best Practices" /o C:\ /d C:\report.html Run the report set named Best Practices against the C:\ volume and send the
amed C:\Report.html.
s" /o C:\ /d C:\Output Run the report set named Best Practices against the C:\ volume and send the
t Run the batch command file named Param.txt.
R Se
“Com SRM” (page 168) explains the command that enables you to perfo policies.
“Com ) explains the command that enables you to perfo on space allocation managed object policies.
“Com SCBlock” (page 163) explains the command that enables you to perform tions on file-blocking managed object policies.
• For a list and explanation of the report sets that come with StorageCentral, read the section “Predefined Report Sets” on page 146.
am les
rt \\NTDEV /r "Best Practices" /o "C:\Test|D:\Test" Run the report set named Best Practices against the C:\Test and D:\Test
SCReport /r "File Type SRun the report sethe output to the [email protected] e-mail address.
output to a file n
SCReport /r "Best Practice
output to a file in folder C:\Output.
SCReport /f C:\Param.txt Run a report set using the instructions in the batch command file named C:\Param.txt.
SCReport \\NTDEV /f \\NTDEV\VeritasReportParameters\Param.tx
elated ctions
• mand SCrm functions on all managed object
• mand SCAlloc” (page 160rm functions
• mandfunc
167
• In addition to running report sets through the command line interface, you can interface. For more
CoUse this form functions related to all managed object policies.
Comm
T
SCSRM [\\server] /SHOW
SCSRM
SCSRM “policy” [[/I | /L] | [/U “domain\user”]]
SCSRM [\\server] /D[Y] /O “object” [[/I | /L] | [/U “domain\user”]]
anaged object policies /S O/A /D ]/M/O Managed object name /I /L detect users /P Policy name /U/?
run them through the StorageCentral graphical user information, read the section “Running a Report Set” on page 143.
mmand SCSRM command to per
and Syntax
SCSRM [\\server] /LIS
[\\server] /A /O “object” /P “policy” [[/I | /L] | [/U “domain\user”]]
[\\server] /M /O “object” /P
/LIST List all mH W Show all managed objects
Add [Y Delete[No confirmation] Modify
Enable auto detect subfolders Enable auto
User or group, [Domain\User] Help
168 StorageCentral User Guide
Examples
SCSRM /a /o C:\Test /p “250MB Limit with blocking” Adds both an allocation and a blocking object on C:\Test using the “250MB Limit with blocking” managed object policy
SCSRM /a /l /o C:\Test /p “100MB Limit” Adds an auto detect user object on C:\Test using the “100MB Limit” managed object policy
SCSRM /m /i /o C:\Test /p “100MB Limit” Modifies the auto detect folder object on C:\Test using the “100MB Limit” managed object policy
SCSRM /d /o C:\Test Deletes managed object on C:\Test
SCSRM \\NTDEV /d /i /o C:\Test Deletes the auto detect folder object and blocking object on C:\Test on machine \\NTDEV if the object exists
Related Sections
• “Command SCAlloc” (page 160) explains the command that enables you to perform functions on space allocation managed object policies.
• “Command SCBlock” (page 163) explains the command that enables you to perform functions on file-blocking managed object policies.
• “Command SCReport” (page 165) explains the command that enables you to produce reports.
• In addition to using the command line interface, you can manipulate StorageCentral through its graphical user interface. For more information about this GUI, read the section “MMC Overview” on page 10.
169
170 StorageCentral User Guide
Chapter .4 Working with NetApp Filers
Introduction to Using StorageCentral with Network Appliance Filers
Stor eblockin Filer.
Storagedifferenthat no APIs thallocatio rced directly by the Filer, while file blocking is enforced by third-party software, such as StorageCentral for Network Appliance, running on a machine other than the Filer.
rements that must be met before you can use StorageCentral with your Networ inst ed“Requir mplete explanation of what you need to run StorageCentral.
ControllingYou can turn Network Appliance Filer’s quotas on or off from the grid in the managed object detail
f, , and choose Quotas on.
Wa etimes nothing happens and no error message displays. This may happen when there are until all e online before turning on quotas.
ag Central for Network Appliance provides support for space allocation, file g, and reporting against the Network Appliance
Central for Network Appliance provides support for the Filer in a manner quite t from that for directly attached storage devices. The reason for this difference is third-party software runs on the Filer. Network Appliance has provided a set of at can be used to set and manage space allocation and file blocking. Space n is enfo
There are several requik Appliance Filer. For example, the proper version of Data ONTAP must be
all on the Filer, and the Filer must have CIFS enabled. Read the section ements” on page 20 for a co
the Filer from StorageCentral a
s pane. You can also resize and restart quotas.
• To turn all quotas on, point in the grid to a volume with its quotas turned ofright-click
rning: If you attempt to turn on quotas on a volume that is online, som
quotas defined for a different volume that is offline. If this happens, wait volumes ar
171
• To turn all quotas off, point to one of the Filer’s quotas in the grid, right-click,and choose Quota Management | Quotas off.
• To resize all quotas, point to one of the Filer's quotas in the grid, right-click, and
s
as when there are quotas defined for a different volume that
is offline. If this happens, wait until all volumes are online before restarting quotas.
Re• For information about specific StorageCentral features and Network Appliance
o “File Blocking and Network Appliance Filers” (page 173)
o “Space Allocation and Network Appliance Filers” (page 174)
etection and Network Appliance Filers” (page 180)
o “Computer Policies and Network Appliance Filers” (page 181)
• For information about configuring the Network Appliance Filer, read these sections:
o “Converting to Qtrees on Network Appliance Filers” (page 182)
o “Configuring SNMP for Space Allocation on Network Appliance Filers” (page 182)
o “Configuring File Blocking on Network Appliance Filers” (page 183)
choose Quota Management | Resize quotas.
• To restart all quotas, point to one of the Filer's quotas in the grid, right-click, and choose Quota Management | Restart quotas.
Warning: If you attempt to restart quotas on a volume that is online, the quotafor that volume may disappear and be replaced with an entry that reads “quotoff.” This may happen
lated Sections
Filers, read these sections:
o “Auto D
172 StorageCentral User Guide
• For information about macros you can use to generate notification messages from Network Appliance Filers, read the section “Message Macros” on page 223.
File Blocking and Network Appliance Filers t for file blocking, as provided by prior versions of StorageCentral, is
provided. However, all blocking requests are sent over the network from the Filer to the Stor e
For file blocking to be enabled, file screening on the Network Appliance Filer must be enabled Blocking on Network Appliance Filers” on page 183.
LimStorageCentral does not block files residing on Network Appliance Filers under these conditio
• ough a UNIX client; only files added or modified through a Windows machine can be blocked on Filers
• The file blocking request originated from the remote agent
rm used
Full suppor
ag Central for Network Appliance agent (remote agent) for servicing.
. For instructions, read the section “Configuring File
itations
ns:
The files were added or modified thr
Note: File blocking is the term used by StorageCentral, while file screening is the teby Network Appliance.
173
Space Allocation and Network Appliance Filers The File oes not match that provided by StorageCentral.
The File
• Has hard and soft limits, and a threshold—all specified by numbers. Each of
ation on a qtree.
he next multiple of 4. For example, a quota established at 1 K becomes 4 K, while a 6 K quota becomes 8 K.
The following is true of StorageCentral when working with Microsoft Windows-
ermine if the space allocation is passive or not, and a single value for the space allocation. Up to 5 alarms can be set, all based off the space
ercentage.
n on any folder or file on a disk.
Wit h orageCentral has implemented space allocation support in a fashion that mimics, as closely as possible, the support found in its Win w the values available through the Filer. For examples of this, read the section “Space Allocation and Network Appliance Filers—Examples” on page 17
Limit ioIf a man ides on a Network Appliance Filer is renamed, Stora eC bout the newly renamed object. The object will no longer display objects.
r has a paradigm for space allocation that d
r...
these numbers can cause an alarm to be triggered.
• Only supports space alloc
• Rounds all quotas up to t
controlled objects...
• Has a flag to det
allocation amount as a p
• Supports space allocatio
h t ese differences in mind, St
do s environment while using
6.
at ns aged object that res
g entral will not know a in the list of managed
174 StorageCentral User Guide
Network Appliance requires that a Filer's quotas be 1 K or larger. This size limit applies to quotas you set explicitly and implicitly.
• If you try to create a quota on a qtree using the "% of Size Used" units with a percent value that results in a quota of less than 1 K, a quota rule with all null values is created on the Filer.
Space allocation features on the Filer that StorageCentral does not support:
and soft
e allocatio
ip
StorageCentral space allocation features not available for Filer support:
• Always save open files
• ater mark
isk full error co
•
•
• Folders below root level
• If you manually create a quota with a space limit of 1-1023 bytes, a quota rule with all null values is created on the Filer.
• File limits, hard
• Default spac n
• Mult le users on one quota
• Overdraft limit
Reset high-w
• Send d de
• Exclude from folder limit
• Activate below value (an option associated with alarms)
Notify user (an action option)
• Extend (an action option)
Alarms 3, 4, and 5
• File space allocation
175
Space Allocation and Network Appliance Filers—Examples This section provides numerical examples of the information presented in the section “Space Allocation and Network Appliance Filers” on page 174.
BaSay you used the FilerView application to establish a quota on the Network Appliance Filer es:
e Limit
ckground
with these valu
Disk SpacSoft Hard
eshold Thr
40 MB 50 MB 30 MB
If you then viewed this configuration using StorageCentral, this is what you would see o box w ing the managed object (that is, the Filer’s qtree):
Passive Limit Checkbox
Disk Space Limit Alarm 1 Alarm 2
n the Properties dialog hen examin
Not selected 50 MB 100% 80%
An expl
FilerView. Put another way, the space allocation limit for this managed object is active.
• hat is the value of the hard disk space limit on the Filer.
• StorageCentral automatically sets Alarm 1’s percentage to 100%.
anation of these values:
• The Passive Limit check box is not selected because you specified a hard disk space limit through
StorageCentral sets the disk space limit to 50 MB because t
176 StorageCentral User Guide
• StorageCentral computes Alarm 2’s percentage using the Filer’s soft and hard disk space limits—the 40 MB soft disk space limit is 80% of the 50 MB hard disk
Example 1: Turn Passive Limit On S e example in the “Bac d” section, torageCentral to hange the properties of the managed object. Specifically, select the Passive Limit check
box to change the space allocation limit for this managed object from active to passive.
sive Limit Checkbox
Disk Space Limit Alarm 1 Alarm 2
space limit.
tarting with th presented kgroun use Sc
Pas
Selected 50 MB 100% 80%
en use iew to view the properties of this quota on the Filer, you would ee this:
Isf you th d FilerV
Disk Space Limit So
shold Threft Hard
50 MB -- 40 MB
An l
• space limit is 50 MB because the StorageCentral disk space limit becomes the Filer’s soft disk space limit.
• limit is passive rather than active.
• The threshold is 40 MB because it is 80% of the 50 MB StorageCentral disk space orageCentral Alarm 2.)
exp anation of these values:
The soft disk
There is no hard disk space limit because the space allocation
limit. (The 80% comes from the St
177
Examp nge ce LS e example d in the “Bac d” section, torageCentral to h f th ged object. Spec ge ace limit
50 MB to 100 MB.
eckbox
le 2: Cha the Disk Spa imit tarting with th
ange the properties opresentee mana
kgrounifically, chan
use Sthe disk spc
from
Passive Limit Ch
Disk Space Limit Alarm 1 Alarm 2
Not selected 100 100% 80% MB
I en use iew to view the properties of this quota on the Filer, you would ee this: f you th d FilerV
s
Disk Space Limit So
hreshold Tft Hard
80 MB 100 MB --
An l
• space limit is computed as a percentage of the hard disk space limit. The percentage used in this calculation (80%) comes from Alarm 2 of
• The hard disk space limit has a value because there is an active (not passive) space allocation limit. This value (100 MB) comes from the StorageCentral disk space limit.
• There is no threshold because StorageCentral supports only two alarms on Filers, and the second alarm sets the soft disk space limit.
Example 3: Change Alarm 2 Starting with the example presented in the “Background” section, use StorageCentral to change the properties of the managed object. Specifically, change the value of Alarm 2 from 80% to 40%.
exp anation of these values:
The soft disk
StorageCentral.
178 StorageCentral User Guide
Passive Limit Checkbox
Disk Space Limit Alarm 1 Alarm 2
Not selected 50 MB 100% 40%
If you then used FilerView to view the properties of this quota on the Filer, you would see this:
Disk Space Limit Soft Hard
Threshold
20 MB 50 MB --
An explanation of these values:
• The soft disk space limit is computed as a percentage of the hard disk space limit. The percentage used in this calculation (40%) comes from Alarm 2 of StorageCentral.
• The hard disk space limit has a value because there is an active (not passive) space allocation limit. This value (50 MB) comes from the StorageCentral disk space limit.
• There is no threshold because StorageCentral supports only two alarms on Filers, and the second alarm sets the soft disk space limit.
179
Auto Detection and Network Appliance Filers This feature is not supported with the Network Appliance Filer.
Related Sections To learn more about the auto detection feature in StorageCentral, read the section “AutDetection” (page 190)
o .
180 StorageCentral User Guide
Computer Policies and Network Appliance Filers This feature is not supported with the Network Appliance Filer.
Related Sections To learn more about computer policies in StorageCentral, read the section “Computer Policies” (page 85).
181
Configuring the Filer to Work with SC
Converting to Qtrees on Network Appliance Filers Applying quotas to objects on the Filer can only be done when the object is defined thro qtree. If a root level directory needs to have quota management
To convert a root level directory, follow the steps below. Take care during this process to prevent access to the folders during the conversion and take backups before conversion.
Configuring SNMP for Space Allocation on Network Ap
ncluding e-mail) for the administrators. For this to happen SNMP must be configured correctly in the Filer.
Using the FilerView application provided by Network Appliance, follow the steps below to configure a Filer that StorageCentral is managing.
1. Click SNMP.
2. Click Configure.
3. Set SNMP Enabled to Yes.
ugh the Filer as a applied to it and it is not a qtree then it must be converted.
1. Rename the existing folder.
2. Create a qtree with the name of the original folder.
3. Move the data from the saved folder to the qtree.
4. Remove the renamed folder.
pliance Filers When space allocation on a Filer is exceeded, the Filer can generate SNMP traps that can be used to create notifications (i
182 StorageCentral User Guide
4. Set Traps Enabled to Yes.
5. Set Auth Traps to Yes.
6. Under Communities, set the first unused row to: Read-Only, Public
7. Set the Traphosts, which correspond to the community, to the name of the remote agent. A fully qualified host name is recommended.
8. Click Apply.
Repeat these steps for each of the other Filers that StorageCentral is managing.
Configuring File Blocking on Network Appliance Filers File blocking must be enabled on the Filers for the StorageCentral agent to successfully register.
Using a Microsoft Windows command window, issue a telnet command against the Filer and connect to the Filer. After a connection has been established, enter this command:
fpolicy enable default
Related Sections
For information about the fpolicy command, refer to the Data ONTAP documentation from Network Appliance.
183
184 StorageCentral User Guide
Chapter 5. Reference
AD Fields in Custom Reports that contain information about the managed object owners (a
er). The AD fields are supported only in ay select AD fields from the Field Name
drop-down list or Fields list when creating custom reports (when creating new report definitions). The Field Name and Fields lists appear on the following dialogs: Query, Detail, Sort, Report Break, Total, Summary Query, Summary Sort, and Summary Total.
The AD fields are useful when you want to view the owner information from the managed object against which you are running a report. If several users own one managed object, the report created using AD fields will display information about all owners of that managed object.
Some of the AD fields are:
• Account Expires
• Company
• Country Code
• Employee ID
• Given Name
• Home Phone
• Machine
• Name
• Owner
AD fields are the fieldsmanaged object could be a file or foldStorageCentral Active Directory editions. You m
185
• Street Address
Re“Introduction to Reports” (page 117) “Creating a New Report Definition” (page 119)
• Title
lated Sections
186 StorageCentral User Guide
Applica EvenS entral nd warning messa example, your event log m ilar to this:
tion t Log torageC defaults to creating a record in the application event log for error a
ges as well as for space allocation and file blocking actions. Foray look sim
187
The lication event log are discussed in the table below.
FiName
fields displayed in the app
eld Description
Type Indicates event type: an error message, a warning message, or an ation message. For example, the message may say the ng:
informfollowi
o Error: "Space limit exceeded for object X on C:\Test. Currspace used is 10MB."
ent
o Warning: "Space limit is approaching for object X on C:\Test. Current space used is 10MB. Please perform cleaning on your files. Failure to do so may restrict future access to HELEN2000."
o Information: "Space Allocation object on C:\Test was successfully modified."
Please note that the wording of the actual messages may differ from the one in our examples.
Date The date when an event occurred. Time The time when an event occurred. Source Indicates event source: Space Allocation Server or File Blocking
Server. Category None Event ID ID A numerical event ID. User N/A Computer Local computer name.
The records in the application event log can be filtered by any single field or a combination of fields. For example, you may filter the records just by event Source or by event Type, Source, and ID.
To access the application event log on a Windows 2000 computer:
1. Open computer management.
2. Click System Tools.
188 StorageCentral User Guide
3. Click Event Viewer.
pplication.
Related Sections nformation about space allocation and file blocking actions, read the section wing and Modifying Global Properties” at the beginning of Chapter 3.
4. Click A
For i“Vie
189
Auto D
User “Auto detect all users” is a space allocation limit set on a folder so that a user who owns a fil napplied is enabluser spa a predefined policy. These are ideal for public shares.
Subfoldeentral applies a managed object policy you select
, a managed object) you specify. StorageCentral also applies this policy to any subfolders created in the future.
Subfolders are detected one level beneath the managed object. This is ideal for user home folders.
For example, say this was your current directory structure:
\Users \Ethan \Jessica \Martha
If you specified an "auto detect subfolders" policy for the \Users managed object, that policy will apply to the existing \Users\Ethan, \Users\Jessica, and \Users\Martha subfolders. Also, the policy will apply to any subfolders created in the future (for example, \Users\Douglas).
You can use "auto detect subfolders" on the Folder Options dialog box (see page 98) when you create a managed object.
etection Two types of auto detection are available: user and subfolder.
e i the folder will automatically be assigned a space limit. This space limit will be to any new owner of a file as well. If the auto detection all users space allocationed, any new user who allocates space within the managed object will be given a ce limit. This space limit is based on
r With "auto detect subfolders," StorageCto all subfolders of a folder (that is
190 StorageCentral User Guide
Handling Exceptions
a larger space limit than others, set these individually before ubfolders" managed object. Existing managed objects are not
uto detect subfolders" y to accomplish this.
olicy ,
Relat“Ty“Ru“Gr
If some subfolders requirecreating the "auto detect schanged by auto detection. An example of how this can work:
• The problem: In the directory structure shown above, the system administrator wants to apply a 250 MB limit on all users. Applying an "apolicy on the \Users managed object would be an easy waHowever, Ethan says he requires a larger limit.
• The solution: The system administrator applies (1) a policy with a 500 MB limit on the \Users\Ethan subfolder, and then (2) an "auto detect subfolders" pwith a 250 MB limit on the \Users subfolder that will apply to Jessica, Marthaand any users added in the future.
ed Sections pes of Space Allocation” (page 234) les of File Ownership” (page 228) oup Associations” (page 220)
191
CentrageCentral installed on them
, all events occurring on different computers are displayed on the details pane of the StorageCentral Audit branch. Events are the space allocation and file blocking actions.
For the database to be centralized, install both StorageCentral and the database locally on the same computer. Every time you install StorageCentral on other computers, you must point their databases to the computer with the local database. To point numerous computers to one centralized database, change the destination folder path on the Destination Folder dialog during installation. To change the destination folder after installation, you must change DSN path in the ODBC data source.
To change SCAuditDB or SCTrendDB System DSN on Windows 2000:
1. Click Start | Settings | Control Panel.
2. Double-click Administrative Tools.
3. Double-click Data Sources (ODBC).
4. Click the System DSN tab in the ODBC Data Source Administrator dialog box.
5. Select the data source (SCAuditDB or SCTrendDB) you want to change and click Configure.
6. Click Select on the ODBC Microsoft Access Setup dialog box.
7. Select a drive and/or directory on the Select Database dialog box. This is a new destination folder.
8. Click OK to save changes.
lized Database A centralized database means that all computers with Storaaccess the same database. When your database is centralized
192 StorageCentral User Guide
Related Sections Audit Data” (page 156) e 232)
Settings” (page 211)
“Introduction to “Trending” (pag“Description of File Blocking Alarm Setting” (page 205) “Description of Space Allocation Alarm
193
Clusterws NT/2000 and
meets IBM’s ClusterProven standard.
Clustered servers provide high availability and load balancing by attaching two or more d disk array.
TyA Windows 2000 clustered server can be installed using Windows 2000 Advanced Server and Clustering Services. Two or more servers are attached to a single storage device.
assive and active/active.
es
d without interruption.
• Active/Active cluster. To support load balancing and high availability, the cluster resources are split among two or more nodes. Each node in the cluster is the preferred owner of different resources. In the event of a failure of either cluster node, the shared resources on that node failover to the remaining cluster node(s) and users continue to access these resources without interruption.
Support StorageCentral provides support for clustered servers running Windo
servers to a single share
This section contains these sections:
• “Types of Clusters” (page 194)
• “Architecture” (page 195)
• “Managing Policies in a Cluster” (page 196)
• “Installing StorageCentral in a Cluster” (page 199)
• “VERITAS Cluster Server Support” (page 201)
pes of Clusters
StorageCentral supports two cluster types: active/p
• Active/Passive cluster. To support high availability, the shared cluster resourcare made available on one node of the cluster at a time. In the event of a failure on the active cluster node, the shared resources failover to the passive node anusers may continue to connect to the cluster
194 StorageCentral User Guide
Ars in
olicy information is
Managed Objects
Managed objects are stored on the shared cluster disk in a file called \QAQuotasV4.dat. Policy settings are stored in a file called \SCSRMQuota\QAPolicyV5.mdb. Because they are stored on the shared disk itself, the managed object information is always available to
storage. Objects are managed by the each node in the cluster.
anaged object information is stored on the drive itself. The
QuotaAdvisor Server service automatically resumes alarm actions on the remaining cluster node. No intervention by the Administrator is necessary.
objects are stored in the registry of
orts, and File Groups
rts, and file groups is handled differently depending e Directory support. When using Active Directory, the
available. With the Standard edition, are replicated between the cluster
nodes by the StorageCentralSRM5 cluster resource.
chitecture StorageCentral supports the high availability of its managed objects and policieseveral ways. This section looks at where managed object and pstored, and how it is made available before and after cluster failover.
the node in the cluster that is managing theStorageCentral services that are installed on
In the event of a failover, the cluster service on the secondary node detects the failure and issues a mount request for the shared cluster drives. The StorageCentral driver detects this mount request and begins managing objects on that drive after it comes online. Thisis possible because the m
A file blocking object is handled differently. Theseeach machine. The failover of file blocking objects is handled by the StorageCentralSRM5 cluster resource, which is discussed later.
SRM Policies, Rep
The failover of storage policies, repoon whether you selected Activpolicies are stored in AD and are therefore always they are stored in the registry of each machine, and
195
The StorageCentralSRM5 Cluster Resource
The failover of policies and other registry-based information is handled by the StorageCentralSRM5 cluster resource. A resource of the name “[GROUP NAME] StorageCentralSRM5” is created for each disk group. This resource makes sure the policy information on each cluster node is identical before and after failover. This ensures that SRM policies continue to function regardless of which cluster node is managing the storage.
Managing Policies in a Cluster e a hine
up. There are two methods to grouping cluster nodes depending on which edition of StorageCentral you purchased: Active
r Standard.
To manage StorageCentral managed objects in a cluster, we recommend you creatsingle group in which all nodes in the cluster can be viewed. You will add the macnames of each member of the cluster to this gro
Directory o
196 StorageCentral User Guide
Active Directory Cluster Configuration
To view all managed objects in your cluster, first create an Organizational Unit for the cluster. In our example, the OU is 2000CLUSTER. Then, add both computers in the cluster to the 2000CLUSTER OU.
|___OU=2000CLUSTER |___2000CLUSVFS01 |___2000CLUSVFS02
To view
Domain.company.com |
|
managed objects, click the Managed Objects folder beneath the OU.
197
If y up instead (see the tion Cluster Configuration,” below).
Standard Edition Cluster Configuration
To v wmachine na
ou prefer not to create an OU for your cluster, you may use a preferred gro section “Standard Edi
ie all managed objects in your cluster, create a preferred group and add the mes of your cluster members to it.
198 StorageCentral User Guide
To create a preferred group, follow the instructions in the section “Creating a New Preferred Group” on page 151.
Installing StorageCentral in a Cluster To install StorageCentral in a cluster, do the following:
1. Ensure that your cluster meets the minimum requirements of StorageCentral (see page 20).
199
2. Prepare a service account for the StorageCentral services. The account should be a member of the Domain Administrators group for ease of setup. If a domain
uld either add this account to the local s. See the section “Permissions for Service
3. Obtain your mail configuration information. For SMTP, you require the SMTP
include a
ted on
5. Install StorageCentral on the first node in the cluster. At the end of the y
ctive resources from this node to another using Cluster Administrator. Then
atically failover.)
6. Afte as restarted, install StorageCentral on the second one. Answer “No” when prompted to restart. Then move the active resources to the first
7. When S tral has been installed and all cluster nodes have been restarted, move all resources back to their preferred node if necessary.
8. databases must be changed. By default, they re stored locally. However, in a clustered environment they must use a shared
.
StorageCentral is now installed on your cluster.
user account is used instead, you shoAdministrators, or assign permissionAccount” on page 248 for more information.
server address (that is, mail.yourdomain.com) and the sender address ([email protected]), and your password. (Note: If you password, you may require a login ID instead of sender address.)
4. Make sure all nodes in the cluster are online. All nodes must be online to install the new resource type. If a node is not online, the resource type is not creit and you may be unable to move resources to that node.
a
installation procedure, you are prompted to restart. Answer “No” and move anarestart the node. (Note: If the node is the only preferred owner of the resources, you may simply want to restart, and the resources will autom
r the first node h
node and restart.
torageCen
The location of the audit and trendadatabase. Follow the instructions in the section “Configuring SQL Server Support” on page 202
200 StorageCentral User Guide
If y files from your virus scanner forming a virus check on these files during a failover may cause problems. In some DSK bringing the storage offline. These are the files to exclude:
• QAQuotasV4.dat is on each drive at the root level
• QAPoli
VERITAS CStorage r, the regi f VCS may be used to maintain consistency of StorageCentral registry information.
The following keys should be replicated:
• HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\StorageCentral SRM .
• HKEY_ E\WQuinn\StorageCentral SRM\5.0\Groups
• HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\StorageCentral SRM .
• HK CHINE\SOFTWARE\WQuinn\StorageCentral SRM\5.0\ReportSet
• \StorageCentral SRM\5.0\Rules
• uinn\StorageCentral SRM\5.0\ServerPolicies
See the VERITAS Cluster Server System Administrator’s Guide for information on configuring
ou use antivirus software, exclude certain StorageCentral. Per cases, the cluster service may begin a CHK
cyV5.mdb is in a root-level folder called SCSRMQuota on each drive
luster Server Support Central does not have direct support for VERITAS Cluster Server 2.0. Howevestry replication feature o
\5 0\Definitions
LOCAL_MACHINE\SOFTWAR
\5 0\Policies
EY_LOCAL_MA
HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn
HKEY_LOCAL_MACHINE\SOFTWARE\WQ
registry replication.
201
Configuring SThis section ps you must follow to configure StorageCentral to use Microsoft SQL Server as its repository for audit and trending data.
You can store StorageCentral data in one of two formats in SQL Server —ANSI or Unicode. St g nly ANSI data in SQL Server, but StorageCentral 5.2 can store either ANSI or Unicode data in SQL Server. Storing your data in ANS oom and is backward compatible to StorageCentral 5.0, but means you cannot use foreign character sets. If you want to take dvantage of Unicode support and store your data in SQL Server, you must use
StorageCentral 5.2 and configure it to use the Unicode version of SQL Server. The ions that follow enable you to choose the ANSI or Unicode version of SQL Server.
he same computer as SQL Server, copy the following files to one directory on the SQL Server computer.
o SCSRMDB.sql (if you are going to install the ANSI version of SQL Server) or SCSRMDBU.sql (if you are going to install the Unicode version)
These files are located in the <install-directory>\DB directory of the computer on which StorageCentral is installed. Note: Running the batch file in the next step will drop the existing SQL Server SCSRMDB database.
QL Server Support presents the ste
ora eCentral 5.0 can store o
I format takes up less r
a
instruct
1. If StorageCentral is installed on the same computer as SQL Server, go to step 2. If StorageCentral is not installed on t
o SCSQL.bat
202 StorageCentral User Guide
2. Run the SCSQL batch file by typing the following:
o swi f "a" if you are using the ANSI version of SQL Server; it h L Server
user s
o pass
SCSQL.bat calls the ISQL.exe command, which in turn creates the SCSRMDB database and its tables.
sions to the SCSRMDB database.
ssword by following these instructions:
a. O entral management pane, highlight My Computer, P ties. The P
b. Click the SQL Server tab.
c. E
d. C
5. Remove o SN for SCAuditDB and SCTrendDB on each machine on which StorageCentral is installed.
6. Configure hine using the
7. Provide th ns:
a. O r, Preferred Machine, or OU, right-click and click Properties. The Properties dialog box displays.
SCSQL /switch username password where
tch has a value oas a value of "u" if you are using the Unicode version of SQ
o name is an account that can create databases, tables, and indexe
word is the password for this account
3. Set user permis
4. Provide the SQL Server user name and pa
n the StorageCreferred Machine, or OU, right-click and click Properroperties dialog box displays.
nter the user name and password.
lick OK.
r rename the previous ODBC D
the ODBC DSN for SCAuditDB and SCTrendDB on each macSCSRMDB database in SQL Server.
e SQL Server user name and password by following these instructio
n the StorageCentral management pane, highlight My Compute
203
b. Click the SQL Server tab.
.
d. Cli
8. Close the M
o Qu
o Fil en Server
N
• The user na st be the same as that in the ODBC SCSRMDB
he ODBC rties to S
c. Enter the user name and password
ck OK.
MC UI and restart these services:
otaAdvisor Server
eScre
otes:
me and password you specify in step 4 muconnection, and this account must have the permission to access the database in SQL Server.
• Taccess the
DSN should use the access method specified in database propeCSRMDB database.
204 StorageCentral User Guide
Descrip FileFor the alarm setting, y
Tab De
tion of Blocking Alarm Settings ou can enter certain categories of information on tabs.
scription File blocking Options to customize the file blocking process (page 205) Notification Notific
who sh 6) ation message and options relating to the message and ould receive notification (page 20
Execute ions that will occur if alarm is activated (page 208) ActReport Report to run when alarm is activated (page 209)
File Blocking TaThe following threshold options can be selected:
Field D
b
escription Passive Files can be either monitored (passive) or blocked. Check file content
Ib Wp age: " s have been selected for use with Content Checking File Blocking. This feature relies on registered signatures that do not exist for the following file types: a list of file types." As new file types appear on the market, they may not necessarily be included in our list of known file extensions. To check file content of such new file types, they need to be added to our list and file signatures need to be created for them. If you have seen new file types in your environment and you want them be blocked by content, please contact VERITAS technical support (see page 16) and our staff will create file signatures for these new file types.
ndicates if only the file extension should be checked when locking files or whether file content should also be checked.
hen you select "Check file content" option for file blocking olicies or managed objects, you may get the following messFile Group(s) containing the following file extension
205
Notification Tab The following notification options can be entered:
Field Description Message Notification message that can be sent to the user, administrator,
and/or Microsoft application event log when the threshold alarmis activated. Message macros can be inserted in the message focustomized output; see the section “Message Macros” on page 22for a list of the
r
3 se macros.
e selected; click ... to view previously used age that can be selected later
Previous messages can b
messages. Click + to save a mess.
Notify user Send o erformed the I/O that Stormessage this capability using this com ssage-text
s n tification message to the user who p caused the threshold to be exceeded.
ageCentral uses Windows messaging to deliver alarm s. You can test or troubleshoot
mand: NET SEND username meNotify administrator
Sen an alar
ds notification message to the administrator when m has been activated.
Send SNMP trap
Use clienmes
ral SNMP
SNMP traps to send the notification message to an SNMPt. The machine name, username, object name, and threshold
sage will be sent to the SNMP client. Go to page 226 for information about the StorageCentregistered MIB.
Record alarm s been activated. Writes information to the audit database that an alarm ha
Quarantine file
Applies to file content blocking only. The blocked file will be copied to the quarantine folder.
206 StorageCentral User Guide
Field Description Mail to and Mail CC
E-mail address(es) where the notification messand copied. Do the following to send e-ma
age will be sent il:
If you are using the AD to get the e-mail address of the e's recipient, use [USER NO DOMAIN].
NO DOMAIN]@domain.com. You can use this
Y R NO DOMAIN] in the Mail t You this o the sectio Two sepa a and semi
o messag
o If you are not using the AD to get the e-mail address of the message's recipient, use [USERformat only if the user name that triggered the alarm is also used in the e-mail address.
ou may also use the macro [OWNEo and Mail CC fields.
must set e-mail options in the global properties page before ption will work; read about the Mail tab (page 66) inn “Viewing and Modifying Global Properties”.
rators between e-mail addresses are supported: commcolon.
Subject The subje essage ct line of an e-mail notification mSend to event log
Sends notification message to the Microsoft application event log. I t e options are Severe, Warning, and Informational. You can also specify the server name of the event l“
f this option is selected, you can choose the message level fromhe message drop-down list; th
og to be updated. For more information, read the section Application Event Log” on page 187.
207
Execute Tab The ll
Field Description
fo owing actions will occur when the alarm is activated:
R tprograset of command
batch files. Usually, this is a batch file execution or a "net send." Do not execute a command that requires interaction with the
ardcoded or macros
o [DOMAIN NO QUOTES]—domain name without quotes o [MESSAGE]—notification message o [MESSAGE NO QUOTES]—notification message without
quotes o [OBJECT NAME]—managed object against which a file
blocking action was triggered o [OWNER]—owner of the file o [OWNER NO QUOTES]—owner without quotes o [USER]—user who triggered action o [USER NO DOMAIN]—user without domain name o [USER NO DOMAIN NO QUOTES]—user without
domain name or quotes o [USER NO QUOTES]—user without quotes
Note: When a program or command is executed by StorageCentral for Network Appliance, it is executed on the remote agent and not the Network Appliance Filer.
un his m or
Executes a valid Windows 2000 (and above) command including
s desktop. Parameters to batch files can be hcan be used.
Macros supported are: o [DOMAIN]—domain name
208 StorageCentral User Guide
Report Tab The following actions will occur when the alarm is activated:
Field Description Collector The report collector you want to use to run the report. For more
information, read the section “Introduction to Report Collectors” on page 114.
Report set Report set to run. Click ... for a list of report sets from which you may choose. For more information, read the section “Introduction to Report Sets” on page 135.
Save to Folder where report is to be saved Mail to and Mail CC
E-mail address(es) where the report will be sent and copied. Do the following to send e-mail:
f the
ou are not using the AD to get the e-mail address of
ormat only if the user name that triggered the alarm is
] in the
You must set e-mail options in the global properties page before this option will work; read about the Mail tab (page 66) in the section “Viewing and Modifying Global Properties”. Two separators between e-mail addresses are supported: comma and semicolon.
o If you are using the AD to get the e-mail address omessage's recipient, use [USER NO DOMAIN].
o If ythe message's recipient, use [USER NO DOMAIN]@domain.com. You can use this falso used in the e-mail address.
You may also use the macro [OWNER NO DOMAINMail to and Mail CC fields.
Subject Subject line of an e-mail report Schedule interval
Schedule interval for the report o Immediately—no further input required o Today—enter time to run the report o Tomorrow—enter time to run report o Next—enter time, days of week, and days of month
209
Related Sections • For information about file blocking with Network Appliance Filers, read the
section “File Blocking and Network Appliance Filers” (page 173).
or infoons
o
o
o
o icy Properties” (page 79)
• Fsecti
rmation about using the options described in this section, read these :
“Creating a New Managed Object” (page 96)
“Viewing and Modifying Managed Object Properties” (page 103)
“Creating a New Managed Object Policy” (page 73)
“Viewing and Modifying Managed Object Pol
210 StorageCentral User Guide
Description of Space Allocation Alarm Settings A resholds all cify actions to occur when a threshold value (a p of a spac or non-Network Applia ce Filers.
drops below the threshold. For exam le, if threshold 3 is 70% and threshold 2 is 80% and the space limit is 71%, threshold 3 is alue first drops below 70% value raises above 80%.
For e settin
Tab D
larm th ow you to speercentage e allocation) is exceeded. You may configure five alarm settings f
nce computers and two alarm settings for Network Applian
ted only once until the percentage of used spaceA threshold is activap activated. Threshold 3 will not be activated again, unless the v. Threshold 2 will be activated if more files are saved and the
ach alarm g, you can enter certain categories of information on tabs.
escription Threshold Pe
(prcentage of disk space that can be used before an alarm occurs age 212)
Notification Nsh tion (page 213)
otification message and options relating to the message and who ould receive notifica
Execute Commands to run when alarm is activated (page 215) Report Report to run when alarm is activated (page 215) Extend Di vated (page 217) sk space limit adjusted when alarm is acti
211
Threshold Tab T threshhe following old options can be entered:
Field Description Alarm threshold
Percenta will occur. Valid values space limit c entage is based on the disk pace limit alone and does not consider the overdraft limit. Thre f "war me actions. Threthe fthe l enerally, the f
ge of space limit that needs to be exceeded before the actions
for the alarm threshold can be larger than 100%, because an be passive or active. This perc
ssholds do not enforce space limits, they are simply a means oning" users and/or taking so
sholds are exceeded in reverse order so that, of five thresholds, ifth threshold is exceeded first. This way the fifth threshold is east critical and the first threshold is the most critical. G
d would have a value in the 90%–100% range. irst thresholActivate below
Alar e thre
his e hre
o 90%, Activate below value check box selected, and a notification message of, “Thank you for freeing up disk space.”
The second message displays when the percent of disk space used drops below the threshold of 90%.
value
m will be activated if current disk space used falls below thshold value.
Tt
check box can be used to send the user different messages as thshold is crossed each way. For example: o Alarm 1 could be configured with a threshold of 90%,
Activate below value check box cleared, and a notificationmessage of, “Your disk is getting full; please delete or archive unneeded files.” Alarm 2 could be configured with a threshold of
212 StorageCentral User Guide
Notification Tab The following notifi can be entered: cation options
Field Description Message Notification message that can be sent to the user, administrato
and/or Microsoft application event log when the threshold alarm is activa
r,
ted. Message macros can be inserted in the essage for customized output; see the section “Message
r a list of these macros. Pre ly used m Click + to save a message that can be selected late
mMacros” on page 223 fo
vious messages can be selected; click ... to view previousessages.
r. Notify user Sen I/O
that cau to be exceeded. Storage g to deliver alarm mes t this capability using this comma
ds notification message to the user who performed the sed the threshold
Central uses Windows messaginsages. You can test or troubleshoo
nd: NET SEND username message-text Notify administrator
Sen tor when an alarm has
ds notification message to the administra been activated.
Send SNMP trap
Use P clien T d threshold
es
SNMP traps to send the notification message to an SNMhe machine name, usernat. me, object name, an
sage will be sent to the SNMP client. m Go to page 226 information about the StorageCentral SNMP registered MIB.
Record alarm m has been activated. Writes information to the audit database that an alar
213
Field Description Mail to and Mail CC
-mail address of the DOMAIN].
e AD to get the e-mail address of the message's recipient, use [USER NO DOMAIN]@domain.com. You can use this format only if the user name that triggered the alarm is
YouMa You obal properties page before this optisection
wo separators between e-mail addresses are supported:
E-mail address(es) where the notification message will be sent and copied. Do the following to send e-mail:
o If you are using the AD to get the emessage's recipient, use [USER NO
o If you are not using th
also used in the e-mail address.
may also use the macro [OWNER NO DOMAIN] in the il to and Mail CC fields.
must set e-mail options in the glon will work; read about the Mail tab (page 66) in the
“Viewing and Modifying Global Properties”.
Tcomma and semicolon.
Subject message The subject line of an e-mail notificationSend to event log
ends notification message to the Microsoft application event
ame of the event log to be updated. For more information, read
Slog. If this option is selected, you can choose the message level from the message drop-down list; the options are Severe, Warning, and Informational. You can also specify the server nthe section “Application Event Log” on page 187.
214 StorageCentral User Guide
Execute Tab Field Description Run this
set s
Executes a valid Windows 2000 (and above) command including sually, this is a batch file execution or a "net send."
the
ported are:
MAIN NO QUOTES]—domain name without quotes
o [MESSAGE]—notification message n message
o [OBJECT NAME]—managed object against which a quota threshold was exceeded
o [OWNER]—owner of the file o [OWNER NO QUOTES]—owner without quotes
R NO DOMAIN NO QUOTES]—user without domain name or quotes
Note: When a program or command is executed by
remote agent and not the Network Appliance Filer.
program orof command
batch files. UDo not execute a command that requires interaction with desktop. Parameters to batch files can be hardcoded or macros can be used. Macros sup
o [DOMAIN]—domain name o [DO
o [MESSAGE NO QUOTES]—notificatiowithout quotes
o [USER]—user who triggered action o [USER NO DOMAIN]—user without domain name o [USE
o [USER NO QUOTES]—user without quotes
StorageCentral for Network Appliance, it is executed on the
Report TabField
Description
Collector The report collector you want to use to run the report. For more
on page 114. information, read the section “Introduction to Report Collectors”
215
Field Description Report set Report set to run. Click ... for a list of report sets from which you
may choose. For more information, read the section “Introduction to Report Sets” on page 135.
Save to Folder where report is to be saved Mail the report to the following address
E-mail recipient of the report
Mail to and E-mail address(es) where the report will be sent and copied. Do Mail CC the following to send e-mail:
t the e-mail address of the O DOMAIN]. the e-mail address of
m. You can use this t triggered the alarm is
You may also use the macro [OWNER NO DOMAIN] in the
before he
ing and Modifying Global Properties”.
separators between e-mail addresses are supported: comma and semicolon.
o If you are using the AD to gemessage's recipient, use [USER NIf you are not using the AD to geo tthe message's recipient, use [USER NO DOMAIN]@domain.coformat only if the user name thaalso used in the e-mail address.
Mail to and Mail CC fields. You must set e-mail options in the global properties page this option will work; read about the Mail tab (page 66) in tsection “View Two
Subject The subject line of an e-mail report Schedule interval —no further input required
o Tomorrow—enter time to run report
Schedule interval for the report o Immediatelyo Today—enter time to run the report
o Next—enter time, days of week, and days of month
216 StorageCentral User Guide
Extend Tab The following options to adjust the disk space limit can be entered:
Field Description Space limit amount
This allows the disk space limit to be increased when the threshold is exceeded. Disk space limit can be in bytes, kilobytes, or megabytes.
Repeat value Controls the number of times the disk space limit can be increased.
Current Shows the number of times the disk space limit has been increased.
Clicking the Clear button resets the value in the Current field to 0.
lated Sections Re• For information about working with Network Appliance Filers, read the section
“Introduction to Using StorageCentral with Network Appliance Filers” at the f Chapter 4.
section “Space Allocation and Network Appliance Filers” (page 174).
erties” (page 103)
d Object Policy Properties” (page 79)
beginning o
• For information about space allocation with Network Appliance Filers, read the
• For information about using the options described in this section, read these sections:
o “Creating a New Managed Object” (page 96)
o “Viewing and Modifying Managed Object Prop
o “Creating a New Managed Object Policy” (page 73)
o “Viewing and Modifying Manage
217
Disk Space Limit The disk space limit determines the maximum amount of space a managed object mayuse. When the disk space limit is exceeded, the overdraft limit (page 227) will be used
before allocation failure occurs. All policy actions are based on the disk space limit. In
Bytes Disk space limit represented in bytes.
addition, the alarms that can be set are activated by the disk space limit and all monitor screen percentages are based on the disk space limit as well.
Disk space limit definition also depends on the option selected from the drop-down list.
KB Disk space limit represented in kilobytes. MB Disk space limit represented in megabytes. GB Disk space limit represented in gigabytes. TB Disk space limit represented in terabytes. % of Current Sets the disk space limit to a percentage of the current used
space.
ation is recalculated based on the current usage.
Used
If current disk space used is 100 MB and % of current used option is selected and 150 entered, then the disk space limit will be set to 150 MB. When a policy using % of current used is propagated, the space alloc
% of Space Limit
Sets the disk space limit to a percentage of the current disk space limit.
limit is 100 MB and the % of space limit option is selected and 150% entered, then the disk space limit
50 MB.
If the current space
will be set to 1% of Device
If device capacity is 100 MB and % of device option is selected and 50 entered, then the
Sets the disk space limit to a percentage of the device.
disk space limit will be set to 50 MB. Use Device Capacity
Sets the disk space limit to the size of the device.
218 StorageCentral User Guide
Include and Exclude Filters
Include Filters Use include filters to refine the file blocking policy to a set of folders within a managed object.
For example, you may want to block only the "Temporary Internet Files" folder under the "C:\Winnt\Profiles" object. In this case, your managed object would be "C:\Winnt\Profiles," and your include filter would be "Temporary Internet Files." You could accomplish the same goal by making "C:\Winnt" your managed object, but this time the include filter would be "*\Temporary Internet Files." The "*\" relates the relative position of the include filter folder to the managed object. This is useful when applying blocking policies to a large set of objects contained in a folder structure.
Exclude Filters Use exclude filters to refine the file blocking policy to a set of folders within a managed object.
For example, you may want to block the "D:\Users\David" folder but exclude the Temp folder. In this case, your managed object would be "D:\Users\David," and your exclude filter would be "Temp." You could accomplish the same goal by making "D:\Users" your managed object, but this time the exclude filter would be "*\Temp." The "*\" relates the relative position of the exclude filter to the managed object. This is useful to exclude known classes of files or folders from the file blocking process.
Note: Files can also be filtered by name or type. This is done in the Files Blocking Group using the "Authorized" and "Unauthorized" fields. See the section “Introduction to File Groups” on page 110 for additional information.
219
Group Associations A user space allocation can also be applied based on the primary group of a user. An Auto detect all Users space allocation can be instructed to look for group associations.
For Auto detect all Users, the primary group of the user who owns the file being writtenwill be obtained. Then this primary group will be referenced to see if any policies have been associated with it. If a policy is found, the poli
cy properties defined in it will be applied to that user. If a policy is not found, then the policy specified in the Auto detect
ExYou have created three policies: a Students policy of 20 MB, a Teachers policy of 50 MB, and an Everyone policy of 10 MB. The Students policy has been associated with the
achers policy has been associated with the Teachers group. The group association.
You have created the Auto detect all Users space allocation on the D:\Public share with the following properties:
• Check for group associations
• Exclude administrators
When user JDoe writes a file to D:\Public, and he belongs to both the Students and Teachers groups, but his primary group is Students, the Students policy will be applied and he will have a 20 MB space allocation.
When user TJones writes a file to D:\Public, and he belongs to both the Students and Teachers groups, but his primary group is Teachers, the Teachers policy will be applied and he will have a 50 MB space allocation.
all Users space allocation will be used.
This is a two-step process. First, a policy must be created that is associated with a group. Second, the Auto detect all Users space allocation must be created and told to look for group associations. The following example illustrates this process.
ample
Students group. The TeEveryone policy has no
220 StorageCentral User Guide
When user BSmith writes a file to D:\Public, and he belongs to both the Students and Teachers groups, but his primary group is Janitors, the Everyone policy will be applied
10 MB space allocation.
ore d be
location.
and he will have a
If a specific user space allocation was set on any of these users' D:\Public folder befcreating the Auto detect space allocation, all the policies and associations woulignored and the size of the file would be applied to the appropriate user space al
221
Group Space Allocation A on is a typ ation. The Group Space allocation is a specified up. It can be artition. of space th n t tions work in the same fa ations. in the Object for any s roup
N file ownership by a mon, it is possible. To limit a Group to nt of disk space, p Share. G st be a member u are limiting th e by limiting Share. Third party applications m a file to a mmonly, the A owns strators group copies a opied not to the SID of the u rs of lied a specific Space al he membersh
Related Sections “Group Associations” (page 220)
Group Space allocati e of User Space alloc the space limit set for
set on a folder or p SID that is associated with an individual Gro
The Group Space allocation limits the amount caat the Group’s SID can own i
shion as User Space alhe Object. Group Space allo The Group SID must own floc
pace to be charged to the Giles
Space allocation.
ote: Though group is uncom a certain amou set a Folder Space allocation on the Grouenerally, you mu of that Group to write a file; therefore, yoe Group as a whol the size of the Groupay apply ownership of specific group SID. More codministrators group often
file, the ownership of the c files. If a member of the Adminifile is changed to Administrators,
a particular Group can also be appser who copied the file. Uselocation based on t ip in that Group.
222 StorageCentral User Guide
MessagMacro creating ion lists the file b llocation mac age field on the N alarm's Act also provides a d s substituted ification message.
N os are applicab y StorageCentral for N macro (*) in the lists below.
File Blocking Macros Macro D
e Macros s can be used when
locking and space a notification messages. This sectros you can use in the Mess
otification tab of an ions dialog box. The sectionescription of what i for each macro in the not
ote: Not all macr le to messages generated betwork Appliance. These s are identified by an asterisk
escription
[BLOCKING GROUP] File blocking group used
[DOMAIN] * Domain name
[FILE NAME] * Name of file that caused the action
[FILE OWNER] * Owner of the file that caused the action
[FILE SPEC] * File path and name
[OBJECT NAME] Name of object that caused the action
[OBJECT NAME SHARE] Shared name of the object; that is, you can share "h" as h:\ drive and the macro will display the share name
[OWNER] Owner of file that caused the action
[OWNER NO DOMAIN] Owner of file that caused the action but does not include domain information
[POLICY NAME] Name of policy applied
[SERVER NAME] Server name where an alarm is activated
[USER] Current user who caused the action
[USER NO DOMAIN] Current user who caused the action but does not include domain information
223
Space Allocation Macros Macro Description [ACTIVATE TYPE] Activate above or below threshold value [ALARM NUMBER] Alarm numbers 1-5 [ALARM PERCENT] Percentage of the disk space limit that can be
used before an alarm occurs [CURRENT USAGE] Current space use in bytes [CURRENT USAGE KB] Current space use in kilobytes [CURRENT USAGE MB] Current space use in megabytes [DOMAIN] Domain name [FILE NAME] Name of the f ion ile that caused the act[FILE OWNER] Owner of the tion file that caused the ac[FILE SPEC] File path and name [FREE SPACE LIMIT] Unused space limit in bytes [FREE SPACE LIMIT KB] Unused space limit in kilobytes [FREE SPACE LIMIT MB] Unused space limit in megabytes [HIGHWATER] * High-water mark in bytes [HIGHWATER KB] * High-water mark in kilobytes [HIGHWATER MB] * High-water mark in megabytes [OBJECT DIR OWNER] * Evaluates to the owner of the directory that the
space allocation is set on. For example, if the space allocation is set on D:\Finance and the NTFS owner of D:\Finance is "\\Domain\Beancounter," then the [OBJECT DIR OWNER] macro evaluates to "Beancounter".
[OBJECT NAME] Evaluates to the directory name that the space allocation is set on. For example, if the space allocation is set on D:\users\jdoe, then the [OBJECT NAME] macro evaluates to "jdoe".
[OBJECT NAME SHARE] * Shared name of the object; that is, you can share "h" as h:\ drive and the macro will display the share name
[OPENED FILE] * File that caused the action [OVERDRAFT] * Overdraft in bytes [OVERDRAFT KB] * Overdraft in kilobytes [OVERDRAFT MB] * Overdraft in megabytes
224 StorageCentral User Guide
Macro Description [OWNER] * Owner of file that caused the action [OWNER NO DOMAIN] * Owner of file that caused the action without
domain name [PERCENT FREE] Percent of free space limit [PERCENT USED] Percent of used space limit [POLICY NAME] Name of policy applied [SERVER NAME] Server name where an alarm is triggered [SPACE LIMIT] Disk space limit in bytes [SPACE LIMIT KB] Disk space limit in kilobytes [SPACE LIMIT MB] Disk space limit in megabytes [USER] * ho caused the action Current user w[USER N ser name of the user who
on that triggered mple, if the user is ," then the [USER NO
DOMAIN] macro evaluates to "Mark".
O DOMAIN] * Evaluates to the uperformed the write operatithe alarm. For exa"\\Domain\Mark
Related Sections For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
225
MIB This section documents the StorageCentral SNMP registered MIB (management information block) and related values.
Entity Value StorageCentral SNMP registered MIB 1.3.6.1.4.1.3083 Machine name 1.3.6.1.4.1.3083.2.1.0 O tbjec name 1.3.6.1.4.1.3083.2.2.0 User name 1.3.6.1.4.1.3083.2.3.0 Message 1.3.6.1.4.1.3083.2.4.0
226 StorageCentral User Guide
Overdraft Limit The overdraft limit is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The disk space limit will not be enforced until the disk space limit plus the overdraft limit amount has been reached. The overdraft limit acts as between the disk space limit and when an I/O o s an e
The overdr limit can
Bytes Overdraft l ented in bytes
a safety factorperation return
aft
rror. All policy actions are based on the disk space limit.
be represented in the following formats:
imit represKB Overdraft limit represented in kilobytes MB Overdraft limit represented in megabytes GB Overdraft limit represented in gigabytes TB Overdraft limit represented in terabytes
Related Sections “Disk Space Limit” (page 218)
227
Rules o nersThe user who creates athe Administrators Group. If a member of the Administrators Group creates a file, then the Administrators Gr
File ownership is also modified by the "Take Ownership" facility in Windows Explorer. Files are created in the ays:
1. Create a new f el, or Windows E
2. Copy an existifolder is a newcopy.
When moving a file from ition, a new file is not created. The file systeownership does not ch
Files do not inherit thecompression and perm
f File Ow hip file owns a file. The only exception is if the user is a member of
oup SID owns the file, not the user.
following w
ile using an application such as Microsoft Word, Microsoft Excxplorer.
ng file from one folder to another folder. The file in the target file and thus, the ownership is that of the user performing the
one folder to another on the same partm simply modifies the pointers of the file. Therefore, file ange.
ownership of the folder in which they exist. Files do inherit sions, but not file ownership. is
228 StorageCentral User Guide
Space A ation OpIn addition to the disk ng space allocation options are available to
lloc tions ace limit and the overdraft limit, the followisp
enable you to customize a managed object policy:
Field Description Always save open files
n
B space limit and is currently at 49 MB. The user opens a file, adds 5 MB of content to that file, and then tries to save the file. Because the space limit for that user is now exceeded the file would not be saved unless the Always save open files option is selected.
A single I/O that exceeds the space limit will be allowed to complete, but the next I/O will fail (if the Passive limit optiois not selected). Example: A user has a 50 M
This option may not be used with a policy for a Network Appliance Filer.
229
Field Description Exclude fromfold
er limit
This option will exclude a user (or a group) from the space limit calculation. Any files owned by the user will be excluded from the space limit. In addition, the space limit will not be in
se it
A \Public folder may be limited to 500 MB. However, the
Public in conjunction with a space limit on the
by the Administrators Group SID, not by this
be used with a policy for a Network
effect for that user. This option is only available for user space limits becaudoesn't make sense to exclude a disk space limit from itself. Example:
Administrators Group should not be limited from writing to this folder and the files owned by Administrators should not be counted against the space allocation on \Public. This can be accomplished by setting a disk space limit of 500 MB on \Administrators Group SID of the device capacity that is instructed to exclude from folder limit. (In this case, apply a space allocation to a group, because when a member of the Administrators Group writes a file, the file is ownedindividual user.) This option may not Appliance Filer.
Pa ore, I/O operations
limit set on the
ssive limit The limit will not be enforced and, therefwill never be stopped. However, the alarms will still be activated after the space limit is reached. It is strongly suggested that any disk spacesystem or boot partition be passive. If a disk space limit is set on the system or boot partition and is not passive, there may be trouble booting as system startup performs I/O to the system partition.
230 StorageCentral User Guide
Field Description Reset high-water mark
This option resets the high-water mark. The high-water mark is the highest amount of disk space limit that was ever used on a particular object even if files were deleted. This option may not be used with a policy for a Network Appliance Filer.
Send disk full error code
This option sends the "disk full" error code instead of the "not enough quota is available" error code. Windows 95 clients do
ll" error code. This option may not be used with a policy for a Network Appliance Filer.
not interpret the "not enough quota is available" error code, but they do interpret the "disk fu
Related Sections • For information about working with Network Appliance Filers, read the section
“Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.
• For information about disk space limits and overdraft limits, read the sections “Disk Space Limit” (page 218) and “Overdraft Limit” (page 227), respectively.
• For information about using the options described in this section, read these sections:
o “Creating a New Managed Object” (page 96)
o “Viewing and Modifying Managed Object Properties” (page 103)
o “Creating a New Managed Object Policy” (page 73)
o “Viewing and Modifying Managed Object Policy Properties” (page 79)
231
Trending StorageCentral supports managed object trending. Managed object trending collects historical data about your managed objects and stores it in a database. You can then run trend reports on any managed objects including disks, directories, and users.
Trend dAccess d
• allation, an ODBC data source called "SCTrendDB" is added. This
pecified in the server or D properties.
• o see the records for all computers in the domain which the UI is connected to, lized database.
Regardlcollect t
d
as been collected, it can be reported on using the Space Allocation Trend Summary report set. You can also create your own trend report sets with plotted
mary
ata (along with audit data) can be stored in one of two places: A Microsoft atabase (the default) or Microsoft SQL Server.
During instdata source points to the SCTrend.mdb Microsoft Access database; the default installation directory for this database is \VERITAS\StorageCentral\5.2\DB. Data is collected for all managed objects at the interval sA
• To override the default and store the data in Microsoft SQL Server, follow the instructions in the section “Configuring SQL Server Support” on page 202.
Tuse a centra
ess of where the trend data is stored, you must configure StorageCentral to he data. Follow these instructions:
1. Right-click the server or AD root, and click Properties.
2. Select the Trending tab. Specify the trending parameters for your system. Reathe section “Trending Tab” (page 70) in the section “Viewing and Modifying Global Properties” for an explanation of the parameters.
After trend data h
graphs and a variety of output by modifying the Space Allocation Trend Sumreport definition in your report sets.
232 StorageCentral User Guide
Re
Related Sections To learn about predefined report sets (including the Space Allocation Trend Summary),
fined Report Sets” on page 146.
moving Expired Data After a trend record has been in its database for n days, StorageCentral deletes it. The value for n was specified in the Period field on the Trending tab (page 70), which is documented in the section “Viewing and Modifying Global Properties”.
read the section “Prede
233
Types of Space Allocation There are two types of space allocations available: folder space allocation and user (SID) space allocation.
• A folder space allocation is the space limit set on a file, folder, or partition. This type of space allocation limits the size of the managed object regardless of who
a 50 MB folder space allocation is set on the managed object c:\users\JDoe, that folder and all of its contents will be limited to 50 MB regardless of who owns
rites files to that folder.
on is the space limit set on a specified SID that is associated with an individual user. User space allocations can be set on a file, folder, or
.
Example:
c:\Public, then JDoe will be limited to 50 MB of space in c:\Public. Only files that
Not U artition. If the system does not have sufficient space to write files, the system may fail. Also, if the system parmay notthe syst partitio assive limit" option on any space allocation set on the system partition.
and folders "on the desktop". These files are stored in s\<username>\Desktop. To control disk space usage on the
p
eleting a file through Explorer typically does not delete the file; instead, it renames it to e Recycle Bin folder. If the user’s space allocation is on his or her own folder, this will
writes to, or who owns files in, the managed object. Example: If
the files in that folder or who w
• A user space allocati
partition. It limits the amount of space that the user’s SID can own in the object
If a 50 MB user space allocation is set on user JDoe on the managed object
JDoe owns will be applied to the limit.
e: se caution when placing space allocations on the system p
tition does not have enough space to write temporary files during boot, the system restart. You can avoid this by using caution when placing space allocations on
em partition or system folders. If you wish to keep track of growth on the systemn, you should use the "P
Users may create files %systemroot%\Profilesystem partition, you may want to set modest space allocations for users on their desktofolders.
Dth
234 StorageCentral User Guide
relieve his or her space limit. Howethe partition, the used amount may act
ver, if a user's space allocation is on the root folder of ually increase on deletion. This is because the
Recycle Bin must store additional information to allow the file to be restored. If a user's space allocation is established on the root folder, then all is well. However, if you choose to place the user’s space allocation on his or her login folder, make sure you also place a
ecycle Bin to eliminate the possibility of users storing large amounts of data in the Recycle Bin to circumvent their space limits
Related Sections “Group Space Allocation” (page 222) Rul of )
space allocation for that user on the R
(allocations).
es File Ownership” (page 228
235
Unauthor eUnauth will not allow to be written. Files can be blocked by extension and/or name. For example, if you specify *.mp3, Stor e y files wit
Authori to the u , even though *.mp3 files may be unauthorized, the specific file music.mp3 can be added to the authorized file list and then allowed to be written.
Wa n following could p
1. You create a file group that unauthorizes all files (*.*), but authorizes files with
2. You create a policy that uses this file group with "Check file content" turned on.
3. You create a managed object using this policy.
4. A user renames a .jpg file so that it has a file type of .doc.
5. tored by the managed object. StorageCentral does not block the file because the extension is authorized. The
Related Sections For info and unauthorized files, read the section “Introduction to File Groups” on page 110.
iz d and Authorized Files orized files are those files that StorageCentral
ag Central will block all mp3 files from being written. If you specify test.doc, onlh that specific name will be blocked.
zed files are the files that are allowed to be written; they are typically exceptionsnauthorized rules. For example
Note: Full wildcarding is supported.
rni g: StorageCentral does not check the content of an authorized file. Theotentially happen:
specific extensions (*.doc and *.xls).
The user copies the file into the folder being moni
file can be opened using the "open with" option of an application that's capable of viewing image files.
rmation about file groups that contain authorized
236 StorageCentral User Guide
Chapter 6. Permissions
Introduction to Permissions oups—standard
gement.
• Creating storage policies, managed objects, and report definitions
control who may create and apply policies. The administrative control is especially necessary in the configuration, setup, and
ative
roduct requires permissions to various objects. To control user access to StorageCentral and its objects, the proper rights and permissions must be assigned to
indows global domain groups.
Storage resource management (SRM) functions can be divided in two grand advanced mana
Standard storage resource management includes the following functions:
• Viewing space allocation and file blocking managed objects
• Executing storage reports
Advanced storage resource management includes the following functions:
• Modifying storage policies, managed objects, and report definitions
• Applying storage policies to managed objects
Advanced storage resource management should be limited to system administrators because they understand the effects SRM may have on business continuity and system performance. Specific user rights, permissions to file system objects, registry entries, and Active Directory objects are required to
implementation phases of SRM initiatives. After SRM policies, managed objects, and administrative and user reports are created, the on-going maintenance of managed objects and report execution may be delegated to the users without full administrrights.
StorageCentral uses Windows security to protect against unauthorized users modifyingstorage policies, managed objects, and report definitions. Additionally, the architecture of the p
individual users or user groups such as the Help Desk group. Much of the permissions are assigned by the StorageCentral installation, which sets up a security access schemeusing standard W
237
The following is required for StorageCentral to function correctly:
d the “Permissions for WMI” on page 253.
• If the report collector does not reside on the same computer as the agent, the Scheduler on the report collector must be configured to run under the ice account used in the installation. For information about how to set up the
Sta
ss
• For information about standard permissions required to access StorageCentral, n “Standard Permissions for StorageCentral” on page 241.
Ad
• For information about permissions required to run StorageCentral reports, read the section “Permissions for Running SRM Reports” on page 246.
about DCOM permissions, read the section “Permissions for
•
• The correct access for the Windows Management Instrumentation (WMI) must be set on all agent computers. For information about WMI permissions, reasection
TaskservTask Scheduler logon account, read the section “Setting Up the Task Scheduler Logon Account” on page 267.
ndard StorageCentral Security • For information about two levels of non-administrative user access to
StorageCentral, read the section “Two Levels of Non-Administrative User Acceto StorageCentral” on page 239.
read the sectio
vanced StorageCentral Security • For information about permissions for help desk users, read the section
“Permissions for Help Desk Users” on page 243.
• For informationDCOM” on page 249.
For information about service account permissions, read the section “Permissions for Service Account” on page 248.
238 StorageCentral User Guide
Standard St
Two LevStorage
Non-admThere ar on-administrative users: Read and Full s to run storage definitio e users to king groups, report defi oRead ac
Read and Full Control access is assigned through SCRead and SCWrite groups. If the Permissions Utility SCPerm.exe is run automatically during installation, it adds SCRead
the Permissions Utility SCRead group
s) are set up during the installation for the objects created and used by StorageCentral. These objects reside in the system registry, Active Directory, and installation
The use ded t e at least Read access to StorageCentral w sers ll have Full Control access. The membership in sers who are not members of the
dministrators group to still manage StorageCentral. This security scheme is designed so that it does not disable the existing access. If users already have Full Control access,
torageCentral, assigning them to SCRead group will give them Read access.
Important: Although the users added to S ve ad ss to S its objects, it is not the s administrativ s to the entire n
orageCentral Security
els of Non-Administrative User Access to Central inistrative users are the users who are not included in the Administrators group. e two levels of access to StorageCentral for n
Control. Read access to StorageCentral allows non-administrative userreports and view policies, managed objects, file blocking groups, report ns, report sets, and global settings. Full Control access allows non-administrativadd, delete, and modify policies, managed objects, file bloc
niti ns, report sets, and global settings as well as perform the functions allowed by cess.
and SCWrite groups to the domain SAM. The user running should be at least a member of the Domain Admins group. The implements Read access level to the registry and Active Directory entries. The SCWritegroup implements Full Control access level to the registry and Active Directory entries. The Active Control Lists (ACL
directory.
rs adhile the u
o the SCRead group wiladded to the SCWrite grou
l havp wi
the SCWrite group allows the uA
assigning them to SCRead group will not limit them to Read access. However, if users have no access to S
CWrite group ha ministrative accetorageCentral and same a e accesetwork system.
239
Ability to View and Drill Down Storage Reports
Any a storage report and h he OCX installe able to view a that report, only limited restrictions the on the file system access.
S
D orary files created in the % ctory. If no r ified, reports should the \Re p d d and SCWrite group e permis have Full C ort EMd n user; therefore, acc for the alled
torageCentral. Other users must have Full Control access to their %TEMP% directories for report drill-down to function correctly. To learn how to add SCRead and SCWrite groups to the %TEMP% directory, read the section “Adding the SCRead and SCWrite Groups to a New Directory and Assigning Permissions” on page 260.
Servic
The rvpermiss ount user to the SCWrite group and also assigns the "Increase Quota" right to the SCWrite group, which is inherited by that user. The "Increase Quota" right is required for space limits (quotas) to be properly created. For the Standard edition and Active Directory edition of StorageCentral the service account must be a domain level user. For more information about the service account permissions, read the section “Permissions for Service Account” (page 248).
Related Sections
• StorageCentral installation automatically adds the service account user to the SCWrite group. To learn how to add additional users to SCRead and SCWrite groups, read the section “Adding Users to the SCRead and SCWrite Groups and Assigning Permissions” on page 259.
• Currently StorageCentral sets up access control only on the WQuinn container in the Active Directory at the domain level. If you are going to use containers at
users who receivend drill down on
ave tby the
d will bey have
ecurity
uring report generation, temp will be TEMP% direeport directory is spec be created in ports or \Temirectory. The SCRea s are set by th sions utility toontrol access to the %TEMP% and repependent on the logo
s directory. The %Tess is set only
P% directory is user who inst
S
e Account
se ice account user is set by the permissions utility to have Full Control access. The ions utility automatically assigns the service acc
240 StorageCentral User Guide
different levels, you should assign permissions to these containers. To learn how to assign permissions to the WQuinn container in the Active Directory, read the
e Groups to the WQuinn Container in issions” on page 261.
• The installation will set access control to the installation, bin, reports, database, f the reports, database, or quarantine
must be set on a new ry, y
• The correct access for WMI must be set on all agent computers for StorageCentral to function correctly. For information about WMI permissions, read the section “Permissions for WMI” on page 253.
• For information about other types of permissions, read the section “Introduction
Standard Permissions for StorageCentral Non-administrative users included in SCRead and SCWrite groups can access Stor e s the following permissions to SCRead
G p
section “Adding the SCRead and SCWritthe Active Directory and Assigning Perm
and quarantine directories. If location odirectory is changed after the installation, the access controldirectory. To learn how to add SCRead and SCWrite groups to a new directoread the section “Adding the SCRead and SCWrite Groups to a New Directorand Assigning Permissions” on page 260.
to Permissions” at the beginning of Chapter 6.
ag Central. The permissions utility SCPerm.exe grant and SCWrite groups:
rou Permission SCRead SE_ENABLE_DELEGATION SCWrite SE_INCREASE_QUOTA
SE_ENABLE_DELEGATION
The followin
Object Permission for Permission for roup
SCRead and SCWrite groups are added to the ACLs (Access Control Lists) for the g objects:
SCRead group SCWrite gAD domain root Read Read AD domain WQuinn container Read Full Control
241
O c r Permission for group
bje t Permission foSCRead group SCWrite
Registry HKLM Read Read Re stHKLM StorageCentral\5.0
gi ry \Software\
Read Full Control
<Installation ad & Execute Read & Execute directory>\bin Re<Datab ad Full Control ase directory> Re<Reports directory> Full Control Full Control All SCSRMQuota directories Read Full Control %TEMP% directory Full Control Full Control % PTM % directory Full Control Full Control DC Mand W
O interfaces for WQRptSvr.exe QFileSvr.exe
Permit (to access and launch)
Permit (to access and launch)
Related Sections
• For more information about SCRead and SCWrite groups, read the section “Two
• ction
Levels of Non-Administrative User Access to StorageCentral” on page 239.
For information about other types of permissions, read the section “Introduto Permissions” at the beginning of Chapter 6.
242 StorageCentral User Guide
Advanced S
Permissions for Help Desk Users Help desk users can be given Full Control access by assigning them to the SCWrite group. If you want to limit access to this class of users, you can manually assign the access permissions on the server. Permissions required for different editions of
StorageCentral Standard Edition
to is is a requirement for creating or modifying a space
allocation managed object.
• t directories (that is, \Users).
sub keys.
and its sub directories.
Sto g
• s | Administrative Tools | Local Security Policy. In Local Policies choose User Rights Assignment to assign this
• naged object directories (that is, \Users).
torageCentral Security
StorageCentral are listed below.
• "Increase Quotas" right. Choose Start | Programs | Administrative Tools | Local Security Policy. In Local Policies choose User Rights Assignmentassign this right. Th
LIST permission to all managed objec
• FULL CONTROL permission to the registry key. HKEY_LOCAL_MACHINE\Software\Wquinn and its
• FULL CONTROL permission to the \Program Files\Precise directory
ra eCentral for Network Appliance Standard Edition
"Increase Quotas" right. Choose Start | Program
right.
LIST permission to all ma
243
• FULL CONTROL permission to the registry key HKEY_LOCAL_MACHINE\Software\Wquinn and its sub keys.
d its sub
ministrator rights to the Filer.
StorageCentral Active Directory Edition
• "Increase Quotas" right. C | Programs | Administrative Tools | olicy. In icies choo ssign
this right.
o all ma rect
• FULL CONTROL permission to the \Progra sub directories.
• FULL CONTROL permission to the Active Dedit this, run the ADSI (Active Directory Ser an be installed from the \Support Tools directoWindows 2003) CD-ROM. To add this utilit MMC," and press ENTER. In the MMC menu, chooClick the ADD button. Select ADSI in the lis
StorageCentral for Network Appliance A
• "Increase Quotas" right. Choose Start | Prog | Local Security Policy. In Local Policies choose Use Rights Assignment to assign this right.
• LIST permission to all managed object direct
• FULL CONTROL permission to the \Progra b directories.
• FULL CONTROL permission to the \Program Files\Precise directory andirectories.
• Full ad
hoose StartLocal Security P Local Pol se User Rights Assignment to a
• LIST permission t naged object di ories (that is, \Users).
m Files\Precise directory and its
irectory \WQuinn container. To vices Interface) MMC utility that cry of the Windows 2000 (and y, choose Start | Run, type "se "Console/Add/Remove Snapin". t. Click OK.
ctive Directory Edition
rams | Administrative Toolsr
ories (that is, \Users).
m Files\Precise directory and its su
244 StorageCentral User Guide
• FULL CONTROL permission to the Active Directory \WQuinn container. To edit this, run the ADSI (Active Directory Services Interface) MMC utility that can
up ls directo03) CD-ROM his utilit "MMC,"
and press ENTER. In the MC menu, choose "Console/Add/Remove Snapin". Click the ADD button. Se the list. Click OK.
• Full administrator rights to the Filer.
To Grant Permissions to the Active Directory \WQuinn Container
1. Log in as Administrator.
2. In the ADSI Editor, right-click the root "ADS K.
3. Expand the directory tree and select the \W choose Properties from the menu. Click the Advanced button.
4. Click the ADD button and select your help y are lick the View/E
5. In the Apply Onto box, select This object an e Allow check box for the FULL CONTROL p
es to cl pen sec
Related Sections
• For information about other types of permis ction to Permissions” at the beginning of Chapter
• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the
apter 4.
be installed from the \SWindows 20
port Too. To add t
ry of the Windows 2000 (and y, choose Start | Run, type
Mlect ADSI in
I" and choose "Connect." Click O
Quinn container. Right-click andSecurity tab. Then click the
desk user or group. While theselected, c dit button.
d all child objects. Then select thermission.
6. Click OK three tim ose three o urity properties dialogs.
sions, read the section “Introdu 6.
beginning of Ch
245
Permissions for Running SRM Reports To execute a report, LIST permission is required to all drives and directories that will be reported on. READ permission is required if you want the report to return file ownership information. Although the report may not fail if the user has insufficient permissions, it may be returned blank or not include a list of all files that meetquery criteria.
the report
The following access permissions are required to the StorageCentral installation ion:
DRequired
directories assuming a default installat
irectory Permission Notes
C: all location of the StorageCentral directory
\Program Files\Veritas List Typical inst
C:StorageCentral\5.2\bin
ecause the r on the report
nerates a temporary file in this folder during report generation. This assumes that the WQRptSvr
running under the service account identity. Read the section “Permissions for DCOM” (page 249) for alternatives.
\Program Files\Veritas\ Read, Write This is required bDCOM servecollector ge
DCOM server on the collector is
C:\Program Files\Veritas\ StorageCentral\5.2\Reports
Full Control When a report is executed, an output file is created in this
are generated interactively.
r
rmissions for DCOM” (page 249) for alternatives.
directory on the report collector. This is also true when reports
This assumes that the WQRptSvDCOM server on the collector is running under the service account identity. Read the section “Pe
246 StorageCentral User Guide
Directory Permission Required
Notes
C:\Progand its sub-directories Execute,
rite
This is required for the computer where the report is being launched.
reports.
ram Files\Internet Explorer Read &
List folder contents, Read, W
This is required to support drill-down capabilities from Active-X
A share \WQReportParameters Modify This share must be created and accessible to users running reports.
StorageCentral report collector. By default, this share is created on the directory C:\Program Files\Veritas\StorageCentral\5.2\Reports with Everyone group
This share must reside on every
having Full Control access. C:\WinNT\TEMP Read, Write This is required because the
DCOM server on the report collector generates a temporary file in this folder during report generation.
Registry and Active Directory see notes The proper permissions must be assigned to the registry and Active Directory. For information about these permissions, read the section “Permissions for the Registry and Active Directory” on page 248.
Related Sections
For information about other types of permissions, read the section “Introduction to Permissions” at the beginning of Chapter 6.
247
Per Server
and FileScreen Server. These services should run under a specified service account. Due , the service account at times
does not have an interactive user to impersonate. It is recommended that the Quo Screen Server services run under a specified administrative account that has "Increase Quotas" right.
To assign the "Increase Quotas" right:
1. Choose Start | Programs | Administrative Tools | Local Security Settings.
Local Policies.
4. Assign "Increase Quotas" right to the service account.
Related Sections
For information about other types of permissions, read the section “Introduction to Permissions” at the beginning of Chapter 6.
Permissions for the Registry and Active Directory An interactive user (a user who runs the User Interface) and the two service accounts (QuotaAdvisor Server and FileScreen Server) need the following permissions to access the registry and Active Directory:
• READ permission to the \WQuinn container within the Active Directory is required for a user or group to read the properties of a policy in order to apply those properties to a managed object. Likewise for report execution, the properties of the report set must be read from the Active Directory. This is true only for an Active Directory edition of StorageCentral.
• READ permission to the registry key HKEY_LOCAL_MACHINE\Software\WQuinn and its sub keys. This is
rmissions for Service Account When the agent is installed, StorageCentral installs two services - QuotaAdviso
to the Auto Detect feature included with StorageCentral
taAdvisor Server and File
2. Choose User Rights Assignment in the
3. Right-click the Increase Quotas policy and choose Security.
248 StorageCentral User Guide
required for report execution and application of a template policy to a managed object. The properties for reports and policies are stored in the registry for a Standard edition of StorageCentral.
• FULL permission to the registry key HKLM/Software/WQuinn/StorageCentralSRM/5.0/Devices. This is required in both the Standard and Active Directory editions in order to create or modify file blocking objects. The list of folders that have a file blocking policy applied to them resides in this registry key.
Related Sections
For information about other types of permissions, read the section “Introduction to Permissions” at the beginning of Chapter 6.
Permissions for DCOM The DCOM application WQRptSvr handles reports. The WQRptSvr is installed on a server called "Report Collector," which is dedicated to running reports. By default, the WQRptSvr DCOM server runs under the identity of the account you specified for StorageCentral services (read the section “Permissions for Service Account” on page 248). This account should be a member of Domain Administrators group. This is very similar to a feature of the Task Scheduler. In the Task Scheduler, you can schedule a job to run as another user. If the WQRptSvr on the Report Collector is running as the L unching User, the report will execute as the user running the user interface. If the report is cheduled, the report will execute as the user that the Task Scheduler is running as.
e managed console. The WQRptSvr account must have enough he file system and using DCOM.
• recommended if a non-administrative eport Collector on which many reports will
The StorageCDC C QRptSvr to the "Launching User." This can be done if the management console and the Report Collector
a
s
• Specifying an account for the WQRptSvr is required if the Report Collector is remote to thpermissions for accessing t
Specifying an account for the WQRptSvr is user needs to run reports, or for a Rbe scheduled.
entral DCOM server (WQRptSvr) can be configured using the OM NFG utility. If you wish to limit who will run reports, set W
249
are installed on the same server. Permissions of an interactive user are used to generatreports. The users without permissions to the directories will be able to run reports, butthe output will n
e
ot include files to which they do not have at least LIST access.
t for WQRptSvr:
onfiguration Properties dialog.
4. Select WQRptSvr and click Properties.
5. On the Identity tab, select The launching user option to change the account.
To check or change the DCOM accoun
1. Choose Start | Run.
2. Run dcomcnfg.
3. Click the Applications tab on the Distributed COM C
250 StorageCentral User Guide
If Wschedul
To change the AT service account:
1. Go to the \WINNT\Tasks folder.
QRptSvr is set to the "Launching User," you must change the AT service account for ed reports.
2. Choose Advanced/AT Service Account from the menu.
3. Stop and restart the Scheduler for this change to take effect.
251
An interactive user (a user who runs the User Interface) and the two service accounts (QuotaAdvisor Server and FileScreen Server) need the following permissions to access StorageCentral:
For StorageCentral Standard Edition
• READ permissions to access local registry.
• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub keys.
For StorageCentral for Network Appliance Standard Edition
• READ permissions to access local registry.
• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub keys.
• Full administrator rights to the Filer.
For StorageCentral Active Directory Edition
• READ permissions to access local registry.
• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub keys.
• READ permissions to access the Active Directory \Wquinn container.
For StorageCentral for Network Appliance Active Directory Edition
• READ permissions to access local registry.
ys.
• READ permissions to access the Active Directory \Wquinn container.
•
• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub ke
Full administrator rights to the Filer.
252 StorageCentral User Guide
Related Sections
ForPerm
Permissions for WMI Windows Management Instrumentation (WMI) is used by the StorageCentral wizards in the user interface to enumerate folders to which policies are applied. To be successful, a user running the user interface on a client machine must be added to the security for CIMV2 WMI Control.
To add a user or group to the security for CIMV2 WMI Control:
1. Click Start, choose Run and run mmc.
2. The Console1 window displays. From the menu bar at the top choose Console, then choose Add/Remove Snap-in.
3. Click the Add button on the Standalone tab.
4. Select WMI Control from the Available Standalone Snap-ins list and click the Add button.
5. On the Change managed computer dialog box, select Local computer and click Finish.
6. Close the Available Standalone Snap-ins dialog box.
information about other types of permissions, read the section “Introduction to issions” at the beginning of Chapter 6.
253
7. Click OK on the Add/Remove Snap-in dialog box to add the WMI Control. The MMC tree should look as follows:
8. Select WMI Control (Local) in the MMC tree, right-click, and choose Properties.
the WMI Control (Local) Properties dialog box, click the Security tab, expand Root, select CIMV2, and click the Security button.
9. On
254 StorageCentral User Guide
10. To add a specific user or group, click the Add button on the Security for
11. On the Select Users, Computers, or Groups dialog box, select a domain, select a user or group, click the Add button, and click OK.
up name displays on the Security for Root\CIMV2 dialog box. w
Root\CIMV2 dialog box.
12. The user or groTo assign permissions, select the user or group in the list and select the Allocheck box next to permissions required for that user or group.
255
13. Control Settings for CIMV2 dialog box displays.
ontrol Settings for CIMV2 dialog box, select (highlight) the or group and click View/Edit.
On the Security for Root\CIMV2 dialog box, click Advanced. The Access
14. On the Access Cnewly added user
256 StorageCentral User Guide
d subnamespaces." Click OK.
15. On the Permission Entry for CIMV2 dialog box, ensure that permissions are applied to "This namespace an
257
16. Click four times to close all open windows.
Relate
For info read the section “Introduction to Permissions” at the beginning of Chapter 6.
d Sections
rmation about other types of permissions,
258 StorageCentral User Guide
Adding Users to the SCRead and SCWrite Groups and Assigning Permissions
The non-administrative users added to the SCRead group will have Read permission. The non-administrative users added to the SCWrite group will have Full Control permission. You can assign Read or Full Control permissions in two ways:
• By selecting a single user and making him or her a member of the SCRead or SCWrite group
• By selecting a group (SCRead or SCWrite) and adding a number of users to that group
To assign Read or Full Control permissions to a single non-administrative user with no access:
1. Choose Start | Programs | Administrative Tools | Active Directory Users and Computers.
2. Expand the Active Directory structure under the domain node in the left pane and select Users.
3. In the right pane, select the user you want to give access to, right-click and choose Properties in the menu.
4. On the Properties dialog box, click the Member Of tab.
5. On the Member Of tab, click the Add button.
6. On the Select Groups dialog box, do one of the following depending on your
ect SCRead group in the list, click the Add button, and click OK to assign Read access to the selected user.
o Select SCWrite group in the list, click the Add button, and click OK to ll Control access to the selected user.
needs:
o Sel
assign Fu
7. Click OK on the Properties dialog box.
259
To add a number of non-administrative users to SCRead and SCWrite groups:
s and
der the domain node in the left pane and select Users.
3. In the right pane, select the SCRead or SCWrite group, right-click and choose
4 the Add button.
5. d click the Add button. Add one or more users. When you finish adding the users,
window.
For more information about the permissions for non-administrative users, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.
Adding the SCRead and SCWrite Groups to a New Directory and Assigning Permissions
When you move report or database directories, you should add the SCRead and SCWrite groups to the new directory's Access Control List (ACL) and then assign proper permissions to these groups.
To add the SCRead and SCWrite groups to a new directory:
1. Select a new directory in Windows Explorer in the left pane, right-click, and choose Properties in the menu.
1. Choose Start | Programs | Administrative Tools | Active Directory UserComputers.
2. Expand the Active Directory structure un
Properties in the menu.
. On the group Properties dialog box, select the Members tab and click
On the Select Users, Contacts, or Computers dialog box, select a user an
click OK.
6. Click OK on the Properties dialog box to save your changes and exit the
Related Sections
260 StorageCentral User Guide
2. Click the Security tab on the directory Properties dialog box.
3. Click the Add button.
4. The Select Users, Computers, or Groups dialog box displays. Select the SCRead and SCWrite groups and click the Add button. Then click OK. The SCRead and SCWrite groups now display in the directory Properties dialog box.
5. Select the SCRead group. If this is the Reports directory, all permissions should be selected. If this is the Database directory, only Read & Execute, List Folder Contents, and Read permissions should be selected.
6. Select the SCWrite group. All permissions should be selected for this group. Select the Allow check box for Full Control permission. This automatically selects all permissions.
7. Click the Apply button. Then click OK. Now you have assigned proper permissions to the SCRead and SCWrite groups in the new directory.
Related Sections
For general information about the permissions for non-administrative users, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.
Adding the SCRead and SCWrite Groups to the WQuinn Container in the Active Directory and Assigning Permissions
A WQuinn container is a container in the Active Directory hierarchy where the product attributes, such as the key, policy, and report information, are stored. During the installation of StorageCentral the WQuinn container is created by default at the domain root in the Active Directory. In case you need to override a policy or another setting, you may create a WQuinn container at any other node in the Active Directory hierarchy (for example, at a single computer or a group).
The Permissions Utility program used during installation allows you to assign permissions to the WQuinn container only at the domain root. In this section you will
261
learn how to use ADSI Edit to assign peDirectory that is not located at the doma
rmissions to the WQuinn container in the Active in root.
To assign permissions to the WQuinn container in the Active Directory:
mmc.exe file.
ap-
dd/Remove Snap-in dialog box displays. Select the Standalone tab and click the Add button.
4. The Add Standalone Snap-in dialog box displays. Select ADSI Edit in the list and click the Add button. Click Close.
n the Add/Remove Snap-in dialog box, click OK to close the dialog.
e in the left pane, right-click and
1. Choose Start | Run and run the
2. When the MMC console appears, click Console and choose Add/Remove Snin in the menu.
3. The A
5. O
6. In the MMC console, select the ADSI Edit nodchoose Connect in the menu.
262 StorageCentral User Guide
7. The Connection dialog box displays. The entries in the Name and Naming Context text boxes should appear as shown:
8. Click OK on the Connection dialog box.
263
The console window is now connected to the Active Directory for the domain as shown:
9.
10. Right-click the CN=WQUINN node and choose Properties from the menu.
11.
12. ead
Now yo
Expand the Domain NC node in the left pane and find the CN=WQUINN node that is not located at the domain root. The permission at the domain root CN=WQUINN has been changed during the installation.
The CN=WQUINN Properties dialog box displays. Select the Security tab and click the Add button.
The Select Users, Computers or Groups dialog box displays. Select the SCRand SCWrite groups in the list and click OK.
u have returned to the CN=WQUINN Properties dialog box.
264 StorageCentral User Guide
13. Select the SCRead group on the Security tab. Make sure that the Allow check box is selected only for the Read permission as shown below:
Select the SCWrite group on the Security tab. Make sure that the Allow checbox is selected for the Full Control, Read, Write, Creat ll Child Objects, and Delete All Child Obj ts pa
14. k e A
ec ermissions. Selecting the Full Control permission utomatically selects all permissions.
265
15. Click Apply on the CN=WQUINN Properties dialog box. Then click OK. This ndard ACL for the CN=WQUINN container in the Active
Related Sections
For general information about the permissions for non-administrative users, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.
will change staDirectory.
266 StorageCentral User Guide
Setting Up the Task Scheduler Logon Account If the report collector does not reside on the same computer as the agent, the Task Scheduler must be configured to run under the service account used in the installation.
To configure the Task Scheduler logon account:
4. and enter
5. Open the Advanced menu bar item and choose Stop Using Task Scheduler.
6. Open the Advanced menu bar item and choose Start Using Task Scheduler.
Relate
“Int d
1. Open Windows Explorer on the computer with the report collector.
2. Go to My Computer | Control Panel | Scheduled Tasks.
3. Open the Advanced menu bar item and choose AT Service Account.
On the AT Service Account Configuration dialog, select This Accountthe service account name and password for StorageCentral. Click OK.
d Sections
ro uction to Permissions” at the beginning of Chapter 6
267
268 StorageCentral User Guide
Chapter 7. Best Practices
Introduction to Best Practices The best practices provide guidelines for creating corporate SRM policies and using StorageCentral to monitor and enforce those policies. The best practices were developed
ience of implementing StorageCentral in hundreds of corporations.
ftware Corporation has identified:
General
Ru• Use Predefined Report Sets (page 275)
• Create Your Own Report Definitions and Report Sets (page 276)
Space Allocation
• Use Auto Detect Managed Objects (page 278)
based on years of exper
These are the best practices that VERITAS So
• Establish Corporate SRM Policies (page 271)
• Tell Users That SRM Is Beginning (page 273)
• Create Managed Objects and Apply Policies During Off Hours (page 274)
• Monitor Overall Disk Consumption (page 274)
nning Reports
• Implement Passive Limits Initially (page 277)
269
• Use Disk Full Error Message (page 278)
• Use Overdrafts (page 279)
File B• Create File Blocking Policies That Suit Your Site's Needs (page 280)
• Create Customized File Blocking Messages (page 281)
Educating the Users
lo king c
• Identify User Reports (page 282)
270 StorageCentral User Guide
General
Exp a
• Decide how much space to give each user.
the result of a storage audit. The audit have, and whether the disk
r
ll use at least passive limits with alarms. This encourages users to participate in
includes the notification message and specifies how the message will be delivered (screen pop-up or e-mail) and who will receive the message.
• Determine alarm thresholds.
thresholds allow you to specify actions to occur when a threshold value (a percentage of the space allocation) is exceeded. Although multiple alarm settings
old is activated only once until the percentage of used space drops below the threshold. For example, if threshold 3 is set at 70 percent and threshold 2 is set at 80 percent and 71 percent of the space limit is used, threshold 3 is activated. Threshold 3
Establish Corporate SRM Policies lan tion: Define your organization's goals by establishing corporate SRM policies.
The space limits are determined based onshould show how much space the users currentlyspace is being used appropriately (business data vs. personal or illicit data). Space limits are also based on available capacity. The space limit alarms may take many forms based on an individual need andthe "political" nature of limiting disk space. Some organizations prefer to monitoall users and enforce limits only for certain offenders. Most organizations wi
storage management. More strict environments such as a university would enforce all users and use alarms to warn of the space limit. A typical alarm
Alarm
can be configured, usually only two or three alarms are enough with the thresholds set at 80, 90, and 100 percent. A thresh
will not be activated again, unless the value first drops below 70 percent. Threshold 2 will be activated if more files are saved and the value raises above 80 percent.
271
For more information about the space allocation alarm thresholds, read the “Threshold” section (page 212) in the section "Description of Space Allocation Alarm Settings".
• Determine notification messages to users. A customized notification message can be sent to a user when a space allocatior file blocking alarm is activated. For a space allocation alarm with a threshold set at 70 percen
on
t, the following message could be sent to the user: "Space limit is approaching for [USER] on [OBJECT NAME]. Current space used is [CURRENT USAGE MB]. Please perform some housecleaning on your files. Failure to do so may restrict future access to [SERVER NAME]." For more information about the space allocation notification messages, read the “Notification Tab” section (page 213) in the section "Description of Space Allocation Alarm Settings." For a file blocking alarm, the following message could be sent to the user: "The network detected that you may have attempted to save media files on [SERVER
ese files are not permitted. Contact John Smith at extension 1234 with or more information about the file blocking notification messages,
Determine which file types to block.
les with file extensions such as .exe and .vbs could turn out to be harmful viruses. Illegal .mp3 and .mpg files may take up a valuable disk space on your company's servers. Include unwanted file types in the list of unauthorized files when creating a new file group. For more information about the unauthorized files and file groups, read the
to ge 110).
Benefit: ization more easily implement StorageCentral and more quickly begin reaping the benefits of storage resource management.
NAME]. Thquestions." Fread the “Notification Tab” section (page 206) in the section "Description of File Blocking Alarm Settings."
• Consider that some executable fi
sections “Unauthorized and Authorized Files” (page 236) and “Introduction File Groups” (pa
Having clear goals helps your organ
272 StorageCentral User Guide
Related Sections
To learn about SRM policies, read the section “Introduction to Policies” (page 72).
•
earn about the variables you can use in custom messages, read the section ge Macros” on page 223.
• For general information about the best practices, read the section “Introduction
Tell Users That Storage Resource Management Is Beginning
being implemented. Specify when the SRM will start and what is being monitored. Explain benefits to the organization and let the users know whom to contact if they have questions or issues (for example, whom to ask when they want to
ion).
For example, you may send the following e-mail to all users in your organization or in a certain department: "As part of our organization's storage resource management policy, limits on users' disk space will be set on the company server to conserve space. The disk space liHelpDe
Benefit:on the o
Related Sections
For nPractice
• To l“Messa
to Best Practices” at the beginning of Chapter 7.
Explanation: Notify users in your organization that corporate storage resource management (SRM) is
increase a space allocat
mit per user is X. If you require additional disk space, contact [email protected]."
Increased acceptance from the user community, which leads to a faster return rganization’s investment in StorageCentral.
ge eral information about the best practices, read the section “Introduction to Best s” at the beginning of Chapter 7.
273
Create Managed Objects and Apply Policies Durination: Most managed object-policy relationships are created
s are created. We suggest that the initial application of space allocne during off hours because creating managed objects requires
though the persistent monitoring of disk I/O for policy enforcementpercent to overall system overhead, the initial application of a space a
a one-time scan of the managed object to determine currentg required to perform this scan depends on the numb
If it is a large folder, the scan can take some time and the processireflected primarily in the system process and the QuotaAdvisor Server se
which manages space limits and sends alarms).
This practice minimizes disruption to users and allows for anstem performance.
Related Sections
To learn more about StorageCentral policies, read the sections
g Off Hours Explan when new managed object ation policies should be do a disk scan.
Al adds less than 1 llocation policy
requires space consumption. The processin er of files stored in the object. ng will be
rvice (the SRM service,
Benefit: optimal CPU/sy
• “Introduction to 72) and “Introduction to Managed Object Policies” (page 72).
• For general information about the best practices, read the section “Introduction
MonitorExplanation: StorageCentral provides detailed disk consumption information in a format that allows administrators to take corrective actions.
• StorageCentral ships with pre-configured policies for monitoring disk consumption. For example, when the "Partition Alert" policy is applied to a partition, it calculates the size of the partition and sets the space allocation value to that amount.
Policies” (page
• To learn how to apply policies to managed objects, read the section “Applying a Policy to a Managed Object” on page 108.
to Best Practices” at the beginning of Chapter 7.
Overall Disk Consumption
274 StorageCentral User Guide
• When you crconfigure mu
eate space allocation policies or managed objects, you may ltiple alarm thresholds to customize to your needs.
• You may generate certain reports that allow you to monitor space by partition. k Drive Summary" report lists all partitions and their nd type.
Related Sections
Chapter 7.
Runnin
Use Predefined Report Sets Explanation: StorageCentral includes 26 predefined reports sets. The following reports will allow you to begin auditing your storage immediately:
• Space By User Object
• Space By Folder Object
• Duplicate Files
• Large Files
• File Type Summary
• Files Not Accessed in Over a Year
For example, the "Discapacity, free space a
Benefit: This practice saves the organization money by reducing wasted space on storage media and helps avoid down time associated with insufficient disk space. Administrators will be notified when disks approach their capacity so that they can take corrective actions before disk consumption reaches critical levels.
For general information about the best practices, read the section “Introduction to Best Practices” at the beginning of
g Reports
275
For definitions of all the report sets that come with StorageCentral, read the section “Predefined Report Sets” on page 146.
ike "Do I have duplicate files?" and "How much space are my users using?"
Related Sections
For general information about the best practices, read the section “Introduction to Best Pra e
Create Your Own Report Definitions and Report Sets Exp atiowha hthe repo y n distributed or presented in a different fashion to different adminisrequires present e y report definitions and report sets from scratch using a custom report writer or adjust the parameters of the default ones.
to
rent value to different users. These reports can be detailed for use in file
out report definitions, read the section “Introduction to Report Definitions” (page 118).
• To learn how to create a report definition, read the section “Creating a New
Benefit: Using predefined report sets enables you to begin examining your storage immediately and answer questions l
ctic s” at the beginning of Chapter 7.
lan n: Because each organization has unique needs, it is important to determine t t ese are and configure custom reports that provide custom answers. Additionally,
rts ma eed to be trators, managers, and users. Determine what reports your organization , who needs to view those reports, and in what format the reports should be
ed. Then creat our own
Benefit: StorageCentral gives organizations the flexibility of creating reports unique their needs. The custom report writer provides the ability to create reports that have diffemanagement or can provide summary information for executive personnel.
Related Sections
• To learn ab
Report Definition” (page 119).
276 StorageCentral User Guide
•
• To learn how to create a report set, read the section “Creating a New Report Set” on page 136.
• For general information about the best practices, read the section “Introduction to Best Practices” at the beginning of Chapter 7.
Space
Implement Passive Limits Initially Expl a limits, users will not be hindered by space allocation enforcement; itor disk consumption. With passive limits, you can implement a space allocation value, rather than a percentage of current usage. For example, your corporate SRM policy may specify that each user’s home directory should be no larger than 100 MB. By implementing a passive 100 MB limit, you can quickly and easily determine who is violating that policy. Exceptions can be made, and space allocation can be enforced at a later date.
Benefit: Th rphase after StorageCentral is first installed. Frequently, the policies never need to be actually enforced to gain the benefit of implementing those policies. After the users
ties are being monitored on of what and how much they
eir own disk space.
One example of the customized alarm action is the following notification message sent to the user: "Space limit is approaching for [USER] on [OBJECT NAME]. Current space used is [CURRENT USAGE MB]. Please perform some house cleaning on your files. Failure to do so may restrict future access to [SERVER NAME]." For more information about the space allocation notification messages, read the “Notification Tab” section (page 213) in the section "Description of Space Allocation Alarm Settings."
To learn about report sets, read the section “Introduction to Report Sets” on page 135.
Allocation
an tion: By applying passive however, you can still mon
is p actice minimizes disruption to users during the information-gathering
realize that their space consumption and file-writing activithe corporate servers, they tend to be more conscientiousstore. Additionally, customized notification messages issued when space allocationalarm thresholds are exceeded educate the users and provide a means for them to manage th
277
Related Sections
• For information about a passive limit, read the section "Space Allocation Options" (page 229).
• For information about disk space limit and overdraft limit, read the sections “Disk Space Limit” (page 218) and “Overdraft Limit” (page 227), respectively.
• For general information about the best practices, read the section “Introduction
Use Auto Detect Managed Objects
on works for both subfolder objects and user objects. With Auto Detect Subfolders, a specified policy is applied to a subfolder as it is created under the chosen root. Likewise, with Auto Detect Users, a
le within the selected object. Auto because of its explicit benefit.
Benefit: This practice saves time and reduces the total cost of ownership by limiting the amount of administration and user interaction needed to manage your storage policies.
Rela
• For more information about auto detection, read the section “Auto Detection” on page 190.
• For general information about the best practices, read the section “Introduction to Best Practices” at the beginning of Chapter 7.
Use Disk FullExplanation: Wenforcement. St urn valid, supported Windows 2000 error messages back to a client when space allocation is
to Best Practices” at the beginning of Chapter 7.
Explanation: Auto detection automates the application of storage policies when new users or directories are added to the server. Auto detecti
specified policy is applied to each user that owns a fidetection should be implemented wherever possible
ted Sections
Error Message hen enforcing space allocation, send "Disk full" error message with orageCentral integrates with the operating system (OS) to ret
278 StorageCentral User Guide
enfor d la "Disk fuhas sho do not p "Not enough quota is available" error message. "Disk full" is universally understood and properly handled by applications and operating systems, including the Apple Macintosh OS.
Benefit: Error messages are only returned if the space allocation policy is enforced. Regardless of enforcement, customized alarm actions still occur. Because the "Disk Full" error message is better understood by applications and client operating systems, the benefit of using this error message is reduced training for end users.
For gene to Best Practice
Explan aft or at least
y the size of the file the user is modifying.
verdraft limit, read the section “Overdraft Limit” on page 227.
t the "Always save open files" option, read the section “Space Allocation Options” on page 229.
ce . The two supported error messages are: "Not enough quota is avai ble" andll." Though both are fully supported Windows 2000 error messages, experience
wn that many Microsoft applications and non-Windows 2000 operating systemsroperly handle or translate the
Related Sections
ral information about the best practices, read the section “Introductions” at the beginning of Chapter 7.
Use Overdrafts ation: If enforcing space allocation, provide the appropriate overdr
use the "Always save open files" option. The overdraft allows for space allocation to be exceeded by the specified overdraft value. The "Always save open files" option allows quota to be exceeded only b
Benefit: You have flexible options to enforce the space allocation limit while still permitting users to perform their work.
Related Sections
• For more information about the o
• For more information abou
279
• For general information about the best practices, read the section “Introductionto Best Practices” at the beginning of Chapter 7.
File Blo
Cr
to the standard ones.
Benefit: This gives you the flexibility to customize file groups or policies for your corporate standards.
Relate
• To learn about file groups, read the section “Introduction to File Groups” on page 110.
• To learn how to create a file group, read the section “Creating a New File Group” on page 110.
• ed
• ng a file blocking policy, read the section “Creating a New Managed Object Policy” on page 73.
• For general information about the best practices, read the section “Introduction
cking
eate File Blocking Policies That Suit Your Site's Needs Explanation: StorageCentral allows you to create your own file groups and file blockingpolicies in addition
d Sections
To learn about file blocking policies, read the section “Introduction to ManagObject Policies” on page 72.
To learn about creati
to Best Practices” at the beginning of Chapter 7.
280 StorageCentral User Guide
Create Customized File Blocking Messages Explanation: In StorageCentral, file blocking is integrated with the operating system so
at it is enforced d not as descriptive custom messa more detail to the user.
ile blocking messages are created when policy or managed ges are entered in a of the Notification tab on example, you may enter the following message: "The
y have attempted to save media files on [SERVER NAME]. itted. Contact John Sm ions." You messages when you ing policy or
naged object.
fication messages b r corporate .
Related Sections
” section ( ription of File Blocking Alarm Settings" for the opti
tion messages to the user.
riables you can the section “Message Macros” on page 223.
• For general information about the be e section “Introduction to Best Practices” at the beginning of
th returns a supported Windows 2000 error message when a blocking rule. The supported Windows 2000 error messages tend to be cryptic an
as one would like. Therefore, we suggest that you also create age within a file-blocking managed object policy that provides
The f a new file blockingobject is created. The messa
dialog box. For the Message are
the Actionsnetwork detected you maThese files are not perm
n modify file blockingith at extension 1234 with quest
cama
modify an existing file block
Benefit: Custominformation policy
ized noti etter inform users of you
• Read the “Notification Tab page 206) in the section "Descons StorageCentral provides for
customizing notifica
• To learn about the va use in custom messages, read
st practices, read th Chapter 7.
281
Educating Users
yExplan a space allocation
that directly affects a user. When th hes critical s based on SRM policies, the user shoiled reports that help him or her recov tral uses ActiveX
orer, whic dministrative actions to be taken listed in the report. For example ed, copied, moved, or
d directly from the browser. This enab tors to delegate file back to the users who own the
t: a corrective ing the burden dministrator.
Related Sections
out the best practi “Introduction to Best ices” at the beginning of Chapter 7.
Identif User Reports ation: A user report is a report that is typically implemented in
policy e user’s space consumption reacleveldeta
uld be not only notified, but also provided er wasted space. StorageCen
controls within the Internet Explagainst files
h allows a, a file can be launch
delete les system administramanagement data.
Benefi Informed users can take on the system a
action themselves, decreas
For general information ab ces, read the sectionPract
282 StorageCentral User Guide
Chapter 8. Troubleshooting
This section identifies some problems you ma ter with StorageCentral and offers estions for resolving the issue.
hese problems are addressed in this trouble
alerts are not triggered from a Network Appliance Filer (below)
in failure" error message
• Managed objects fail to display (page 284)
• Managed objects fail to display after displaying before (page 285)
received from alarms (p
played in d to a remote domain (page 286)
account is marked “Safe for De ation” differently in Windows 2003 Server (page 287)
Are Not Triggered From a Network Appliance
iolations on the Filer are not detected by the remote agent and tions are not triggered.
When a quota is exceeded on t s to send an SNMP trap to traphosts." The StorageCentral r traps as and rrive.
:
n the NetA n configured. If it is not, configure it using the instructions in uring SNMP for Space Allocation on Network Appliance Fi
y encounsugg
T shooting section:
• Quota
• The "log displays (page 284)
• E-mail is not age 285)
• No audit records are dis the MMC while connecte
• User leg
Quota AlertsFiler
Problem: Quota vassociated ac
Explanation:all defined "
he Filer it attemptemote agent will process the
when they a
Suggested solutions
1. Verify the SNMP service o pp Filer has beethe section “Configlers” (page 182).
283
2. Verify the SNMP component has bee ost as the remote If it is not, follow the appropri cklist
u modified the system by following eithe must stop and e services on the remote agent.
e : The "log in failure" error message d
planation: This message displays when ay be denied if the space allocation and file bl log in.
Suggested solutions:
1. Check access to computer
fferent dothe following:
o Create a trust between the
o Add the current user to a known gro
bjects Fail to Display you are at the managed object gr
twork Appliance Filer volume that is onlin age plays.
y happen when there lume ffline. Possible solutions: (a) Turn on
n installed on the same hagent. ate step in the installation che(page 35).
If yo r suggested solution, yourestart th
Login FailurProblem isplays.
access to the computer is denied. Access mocking services cannot
Ex
2. If this computer is in a di main than the current login account, then do
domains
up in the destination domain
Managed O (1 of 2) Problem: If id and attempt to turn on quotas on a
e, nothing happens and no error messNedis
Explanation: This ma are quotas defined for a different vothat is o quotas only when all volumes are online.
284 StorageCentral User Guide
Managed Objects Fail to Display of 2) Problem: Objects that previously displaye f managed objects no longer show there.
aged object that reentral will not know ab renamed object. The object will
isplay in the list of managed objec
are at the managed ob start quotas on a e that is onlin
pear and be replaced with an entry that .” This may happen when defined for a different volum
ions: (a) Restart quotas only wh are online. (b) Wait until all mes are online before restarting quotas.
eived From Alaoblem: A space allocation or file blocking ication
ut no e-mail is received. That th ered can be verified he application event log for the
Verify e-mail settings:
o For the Standard edition, che e server global properties. Verify the r is specified, and the sender address and passwor e mail server is reachable from the server ru ntral using PING, or another mail client.
o For the Active Directory edition, check the Mail tab (see page 66) in the properties "StorageCentral (yourdomain)." Verify
rrect mail server is spe ss and password are correct. Verify that the m rver running StorageCentral us r mail client.
(2d in the list o
Explanation 1: If a man sides on a Network Appliance Filer is renamed, StorageC out the newlyno longer d ts.
Explanation 2: If you ject grid and attempt to reNetwork Appliance Filer volumdisap
e, the quotas for that volume may reads “quotas off
there are quotas e that is offline. Possible solut en all volumesvolu
E-mail Is Not Rec rms alarm is configured to e-mail a notifPr
to the user, b e alarm level was triggby checking t alarm message.
Suggested solutions:
1.
ck the Mail tab (see page 66) in th correct mail served are correct. Verify that thnning StorageCe
console root global the co cified, and the sender addre
ail server is reachable from the seing PING, or anothe
285
2. If you selected the Use Active Dir age 66) in the server or AD properties, verify the address in Active Directory's Users and Computers. Th n the General tab of user account properties.
larm settings. On rm tab, click the Actions button. Make sure the Mail To field is filled in. Also verify a message has been
tered. (Read the section "Notific ctions “Description of File ing Alarm Settings” and “Descr e Allocation Alarm Settings”
for information about this check box.) settings are correct, also make sure this policy was applied to the m and check the settings in the
ct itself.
u are using a macro in the Mail T ddress fields, verify the is configured correctly. For macro should read: [USER
]@domain.com. Also on ID matches his or her il address. For Active Directo ail, use only [USER NO
DOMAIN].
5. Use the [USER] macro in your messa the message sent to the ation event log. Verify that the triggered the alarm.
isplayed in the MMC While Connected
as triggered for a m remote domain. The audit e Microsoft Access A he local computer, but this
audit record was not displayed in the MMC User Interface.
: By default, the Audit part of th ocal Microsoft Access database while the rest of th ected to the remote domain.
er, the program should look at the Mi ss database of the domain, ected to.
sted solution: Use a centralized databremote domain.
ectory for email check box (p user account has an e-mail
e e-mail address appears o
3. Check the policy a the policy Ala
en ation Tab" in the seBlock iption of Spac
If the policy anaged object,
obje
4. If yo o or Mail CC amacro regular e-mail, theNO DOMAIN verify the user's loge-ma ry or Exchange e-m
ge, and reviewapplic expected user
No Audit Records are Dto a Remote Domain
Problem: An alarm wdata was written to th
anaged object in audit database on t
Explanation e User Interface looks only at the le UI is conn
Howev crosoft Accewhich the User Interface is conn
Sugge ase to see the audit records for all computers in the
286 StorageCentral User Guide
User Account Is Marked “Safe for Delegation” Differently in 3 Server Where D
ionality Has Been Raised to s 2003 Native Mode torageCentral Active Di nied" error
ived when trying to con te domain in Windows Server 2003.
: In Windows 2000 the user acco count safe for delegation. In Win
t be enabled for a user accouncipal Name) must be registered fo
lution: Allow a user to be tru
1. Open Active Directory Users and Co
console tree, click Users. Ri ou want to be trusted for legation and choose Properties.
tab and selec ollowing options as appropriate: ation to any t this user
ion to specific services e required for the Trust this user for delegati ices only option. Click OK.
4. If you cannot see the Delegation tab, ntax: Setspn /s
Type the following:
Setspn WQQASvr/servSetspn WQFSSvr/servername domain\user
user still receives "Access Denieremote serve ices should be restarted on the
Windows 200 omain or Forest Level WindowFunct
Problem: Usinmessage may be rece
g S rectory Edition the "Access Denect to a remote machine or a remo
unt has a property that a user can select todows Server 2003 running in native mode
Explanationmark the acdelegation mus t using a command Setspn. The SPN
r the service account when the service is (Service Prininstalled by setup.
sted for delegation.
mputers.
Suggested so
2. In the ght-click the user yde
3. Click the Delegation t one of the f service (Kerberos only) or Trusly. Further configuration will b
Trust this user for delegfor delegat on
on to specific serv
set the SPN first using the Setspn rvername domain\user. command. Use the sy ervicename/se
ername domain\user
Note: If a d" error message after uninstalling and then r, the servreinstalling StorageCentral on a
remote server.
287
Index
A Access database
converting data to support Unicode, 60 access to StorageCentral, levels of, 237 Active Directory (AD)
computer policies, 85 effects on MMC console tree, 10 fields, 185 introduction, 13 permissions needed to access, 248 schema modifications, 13 verify schema extension, 54 WQuinn container, 261
ActiveReports component (CAB file), 40 adding
report collector, 114 SCRead, SCWrite groups to new directory,
260 SCRead, SCWrite groups to WQuinn
container, 261 users to SCRead, SCWrite groups, 259
adding, 114 AdminPak, 54 ADSI Edit, 54 alarm settings
file blocking, 205 space allocation, 211
Always save open files (space allocation option), 229
ANSI in SQL Server, 202 antivirus software, 194 application event log, 187 applying a computer policy to a server, 88 applying a policy to a managed object, 108
associations, group, 220 audit data
deleting, 158 introduction, 156 refreshing, 159 viewing, 156
audit database in a clustered environment, 194 viewing contents, 156
audit window, modifying properties, 158 auto detection
and NetApp Filers, 180
B backwards compatibility, 23 benefits to using StorageCentral, 1 best practices
apply policies off hours, 274 create file blocking policies, 280 create your own reports, 276 establish corporate policies, 271 file blocking messages, 281 identify user reports, 282 implement passive limits, 277 introduction, 269 monitor disk consumption, 274 use auto detect, 278 use disk full error code, 278 use overdrafts, 279 use predefined report sets, 275
C CAB file, 40 centralized databases, 192
289
290 StorageCentral User Guide
chargeback Chargeback Summary (predefined report
set), 146 checklist for installation, 35 cluster support
overview, 194 commands
FPOLICY, 183 ISQL.exe, 202 SCAlloc, 160 SCBlock, 163 SCDisplayLimit, 164 SCReport, 165 SCSRM, 168
compatibility, 23 computer policies
and NetApp Filers, 181 applying, 88, 153 creating, 86 deleting, 87 introduction, 85 modifying properties, 88
COMPUTERPOLICIES parameter, 56 configuring
Microsoft SQL Server support, 202 SQL Server support, 202 StorageCentral to use MS SQL Server, 202
converting databases to run under SC 5.2, 60 copying
file group, 113 managed object policies, 78 report definition, 123 report set, 142
creating computer policy, 86 file group, 110 managed object, 96 managed object policies, 73 preferred group, 151 report definition, 119 report set, 136
customizing ActiveReports component (CAB file), 40
D Daily Storage (predefined report set), 146 Data ONTAP software, 183 databases, centralized, 192 DBF report output format, 143 DCOM, permissions required, 249 DCOMCNFG program, 249 deleting
audit data, 158 computer policy, 87 file group, 111 managed object, 103 managed object policy, 78 preferred group, 152 preferred machine, 155 report collector, 115 report definition, 121 report set, 137 scheduled job, 115
details pane, 10 Disk Drive Summary (predefined report set),
146 disk space limits
introduction, 218 used with overdraft limit, 227
DSN path, 192 Duplicate Files (predefined report set), 146
E escape sequence, 165 event log
application event log, 187 examples
space allocation and NetApp Filers, 176 exclude filters, 219 Exclude from folder limit (space allocation
option), 229
291
extending the schema verifying, 54
F failover, 194 file blocking
alarm settings, 205 on NetApp Filers, 173
file blocking policy refining with filters, 219
file groups copying, 113 creating, 110 deleting, 111 introduction, 110 modifying properties, 112 renaming, 113
File Type Summary (predefined report set), 146
files (general) ownership rules, 228
files (specific) msibuild.bat, 56 msiuninstall.bat, 59 QAPolicyV5.mdb, 194 QAQuotasV4.dat, 194 SC5InstallUtility.dll, 56 SC5SilentInstall.exe, 56 SC5SilentUninstall.exe, 59 SCPerm.exe, 239, 241 SCSQL.bat, 60, 202 SCSRMDB.sql, 202 SCSRMDB2U.sql, 60 SCSRMDBU.sql, 202 SCTrend.mdb, 232 SR_*.txt, 143 StorageCentralQFE.bat, 56
Files Created This Month (predefined report set), 146
Files Not Accessed in Over One Year (predefined report set), 146
Files Not Being Backed Up (predefined report set), 146
Files to Remove (predefined report set), 146 FileScreen Server (service)
configuring SQL Server support, 202 permissions required, 248, 249
filtering audit data, 158
filters, include and exclude, 219 FPOLICY command, 183
G global properties
modifying, 63 Graphic Files (predefined report set), 146 group associations, 220 group space allocation, 222
H hard limit, 176 help desk users, required permissions, 243
I include filters, 219 Insecure Files (predefined report set), 146 installation process
checklist, 35 in a cluster, 194 introduction, 19 preparation worksheet, 29 silent procedure, 56
Internet Files (predefined report set), 146 introduction
Active Directory (AD), 13 audit data, 156 best practices, 269 computer policy, 85
292 StorageCentral User Guide
file groups, 110 installation process, 19 managed object policy, 72 managed objects, 90 MMC, 10 permissions, 237 preferred groups, 150 preferred machines, 150 report collectors, 114 report definitions, 118 report sets, 135 StorageCentral, 1 using SC with NetApp Filers, 171
ISQL.exe, 202
L Large Duplicate Files (predefined report set),
146 Large Files (predefined report set), 146 Large Folder Object Summary (predefined
report set), 146 Large Users Summary (predefined report set),
146 logon account, Task Scheduler, 267
M macros
message macros, 223 maintenance policy, 84 managed object policies
copying, 78 creating, 73 deleting, 78 in a clustered environment, 194 introduction, 72 modifying properties, 79 propagation, 83 renaming, 79 SCAlloc command, 160 SCBlock command, 163
SCSRM command, 168 space allocation options, 229 transparent, 84
managed objects applying a policy to, 108 creating, 96 deleting, 103 in a clustered environment, 194 introduction, 90 modifying properties, 103 owner information stored in AD fields, 185 trending, 232 troubleshooting, 283
management information block (MIB), 226 management pane, 10 MAPI, 6 Media Files (predefined report set), 146 messages
using macros in, 223 MIB (management information block), 226 Microsoft event log
application event log, 187 Microsoft Management Console, introduction,
10 Microsoft Office Files (predefined report set),
146 MMC, introduction, 10 modifying
computer policy properties, 88 file group properties, 112 global properties, 63 managed object policy properties, 79 managed object properties, 103 preferred group properties, 153 preferred machine properties, 155 report collector schedule properties, 115 report definition properties, 122 report set properties, 137
Most Commonly Used Files (predefined report set), 146
mount point support, 85
293
msibuild.bat, 56 msiuninstall.bat, 59
N NETLOGON shared directory, 164 Network Appliance Filers
auto detection, 180 computer policies, 181 configuring file blocking, 183 configuring SNMP for space allocation
alarms, 182 converting to Qtrees, 182 file blocking, 173 macro limitations, 223 shares, 35, 96 space allocation, 174 space allocation examples, 176 troubleshooting, 283 UNIX clients, 173 using with StorageCentral, 171
new features StorageCentral 5.0, 7 StorageCentral 5.1, 6 StorageCentral 5.2, 3
New Files (predefined report set), 146 non-administrative users, required
permissions, 239
O ODBC and SQL Server, 202 ODBC data sources
DSN path, 192 SCTrendDB, 232
overdraft limit introduction, 227 used with disk space limit, 218
owning files, rules, 228
P parameters
COMPUTERPOLICIES, 56 REBOOT, 56
Passive limit (space allocation option), 229 permissions
for Active Directory, 248 for DCOM, 249 for help desk users, 243 for non-administrative users, 239 for registry, 248 for running reports, 246 for service account, 248 for WMI, 253 introduction, 237 standard, for StorageCentral, 241 task scheduler logon account, 267
Pinpoint Security Problems (predefined report set), 146
policies applying to a managed object, 108 computer policies, 85 introduction, 72 managed object policies, 72
predefined report sets, 146 preferred groups
creating, 151 deleting, 152 in a clustered environment, 194 introduction, 150 modifying properties, 153 renaming, 152
preferred machines applying a computer policy to, 153 deleting, 155 introduction, 150 modifying properties, 155 starting or stopping service, 154
product benefits, 1 programs
294 StorageCentral User Guide
DCOMCNFG, 249 SCAlloc, 160 SCBlock, 163 SCReport, 165 SCSRM, 168
propagating MO policy properties, 83 properties
audit window, 158 computer policies, 88 file group, 112 global, 63 managed object, 103 managed object policies, 79 preferred group, 153 preferred machine, 155 report collector schedule, 115 report definition, 122 report set, 137
Q QAPolicyV5.mdb, 194 QAQuotasV4.dat, 194 qasvr.tlb, 164 Qtrees and Network Appliance Filers, 182 QuotaAdvisor Server (service)
configuring SQL Server support, 202 performance affected, 274 permissions required, 248, 249
R REBOOT parameter, 56 refreshing
audit data, 159 registry, permissions needed to access, 248 renaming
file group, 113 managed object policy, 79 preferred group, 152 report definition, 123 report set, 143
Report Break, 126 report collector schedules
modifying properties, 115 report collectors
adding, 114 deleting, 115 introduction, 114
report definitions copying, 123 creating, 119 deleting, 121 introduction, 118 modifying properties, 122 renaming, 123
Report Detail, 124 Report Graphs, 133 Report Query, 124 report sets
copying, 142 creating, 136 deleting, 137 introduction, 135 modifying properties, 137 predefined, 146 renaming, 143 running, 143 SCReport command, 165
Report Sort, 128 Report Total, 129 reports
ActiveReports component (CAB file), 40 AD fields in custom reports, 185 Break, 126 Detail, 124 Graphs, 133 introduction, 117 permissions required to run, 246 Query, 124 Sort, 128 Totals, 129
requirements, 20
295
Reset high-water mark (space allocation option), 229
roadmap for upgrading, 23 running reports
permissions required, 246 running report sets, 143
S SC5InstallUtility.dll, 56 SC5SilentInstall.exe, 56 SC5SilentUninstall.exe, 59 SCAlloc command, 160 SCAudit.mdb (audit database), 202 SCBlock command, 163 SCDisplayLimit.exe, 164 scheduled jobs
deleting, 115 schema extension, verifying, 54 schema modifications, 13 SCPerm.exe, 239, 241 SCRead group
adding groups to new directory, 260 adding groups to WQuinn container, 261 adding users to groups, 259
SCRead group, 239 SCReport command, 165 SCSQL.bat
configuring SC to use SQL Server, 202 converting SQL Server data for Unicode
support, 60 SCSRM command, 168 SCSRMDB database, 202 SCSRMDB.sql, 202 SCSRMDB2U.sql, 60 SCSRMDBU.sql, 202 SCTrend.mdb (trending database), 202, 232 SCTrendDB data source, 232 SCWrite group
adding groups to new directory, 260 adding groups to WQuinn container, 261
adding users to groups, 259 SCWrite group, 239 Send disk full error code (space allocation
option), 229 server
and computer policies, 85 applying a computer policy to, 88
service permissions, 248 restarting when configuring SQL Server
support, 202 starting or stopping on preferred machines,
154 service account
permissions, 248 shares
creating as part of SC install process, 35 refreshing the MMC, 96
silent installation, 56 uninstallation, 59
SNMP MIB, 226 settings for NetApp Filers, 182
soft limit, 176 space allocation
alarm settings, 211 alarms for NetApp Filers and SNMP, 182 by group, 222 options, 229 predefined reports, 146
space allocation and NetApp Filers examples, 176 introduction, 174
Space Allocation Summary (predefined report set), 146
Space Allocation Trend Summary (predefined report set), 146
Space by Folder Object Summary (predefined report set), 146
296 StorageCentral User Guide
Space by Group Summary (predefined report set), 146
Space by User Summary (predefined report set), 146
SQL Server configuring SC to use, 202 converting data to support Unicode, 60
SR_*.txt, 143 starting service on preferred machines, 154 stopping service on preferred machines, 154 StorageCentral
best practices, 269 clustered server support, 194 introduction, 1 new features in 5.2, 3 requirements, 20 upgrading, 23 using with Network Appliance Filers, 171
StorageCentralQFE.bat, 56 StorageCentralSRM5 cluster resource, 194 support, 16 system requirements, 20
T Task Scheduler logon account, 267 technical support, 16 threshold, 176 transparent policies, 84 trend database
in a clustered environment, 194 introduction, 232
trending introduction, 232
troubleshooting overview, 283
U Unicode
database conversion, 60
in SQL Server, 202 uninstallation process
regular instructions, 55 silent procedure, 59
UNIX clients and file blocking on NetApp Filers, 173
upgrade roadmap, 23 user space allocation
by group, 222 utilities
SC5SilentInstall.exe, 56 SC5SilentUninstall.exe, 59
V verifying the installation
AD edition, 46 AD schema extension, 54 NetApp editions, 48 Standard edition, 43
viewing audit database contents, 156 preferred machine properties, 155
virus checking, 194
W Weekly Storage (predefined report set), 146 what's new
StorageCentral 5.0, 7 StorageCentral 5.1, 6 StorageCentral 5.2, 3
Windows Management Instrumentation (WMI), permissions required for use, 253
WMI (Windows Management Instrumentation), permissions required for use, 253
WQRptSvr application configuring the DCOM account, 249 running reports, 246
WQuinn container, 261
297