+ All Categories
Home > Documents > VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171...

VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171...

Date post: 24-Jul-2020
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
307
VERITAS StorageCentral™ 5.2 User’s Guide Windows N113648
Transcript
Page 1: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

VERITAS StorageCentral™ 5.2 User’s Guide Windows

N113648

Page 2: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Disclaimer

The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. VERITAS Software Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual.

VERITAS Legal Notice

Copyright © 2003 VERITAS Software Corporation. All rights reserved. VERITAS, the VERITAS Logo, and all VERITAS product names and slogans are trademarks or registered trademarks of VERITAS Software Corporation. VERITAS and the VERITAS logo, Reg. U.S. Pat. & Tm. Off. Other product names and/or slogans mentioned herein may be trademarks or registered trademarks of their respective companies.

VERITAS Software Corporation 350 Ellis Street Mountain View, CA 94043 USA Phone 650-527-8000 Fax 650-527-2908 www.veritas.com

Page 3: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Contents

Chapter 1. Getting Started ..................................................................................... 1 Introduction to StorageCentral ..................................................................................................................1

Product Benefits ....................................................................................................................................1 Related Products ...................................................................................................................................2

What's New in StorageCentral 5.2 .............................................................................................................3 Features Related to the Active Directory...........................................................................................3 Features Related to Network Appliance Filers.................................................................................3 Other New Features and Capabilities ................................................................................................4

What's New in StorageCentral 5.1 .............................................................................................................6 What's New in StorageCentral 5.0 .............................................................................................................7 MMC Overview .........................................................................................................................................10 Active Directory .........................................................................................................................................13

Schema Modifications ........................................................................................................................13 StorageCentral Schema in the Active Directory .............................................................................13 Display Structure ................................................................................................................................14 Installation Notes................................................................................................................................14

Getting Technical Support ........................................................................................................................16

Chapter 2. Installation and Upgrade.................................................................... 19 Introduction to the Installation Process ..................................................................................................19 Requirements..............................................................................................................................................20

Agents...................................................................................................................................................20 Collector ...............................................................................................................................................21 Console.................................................................................................................................................21 Network Appliance Filer ...................................................................................................................22 Remote Agent......................................................................................................................................22

Upgrade Roadmap.....................................................................................................................................23 Upgrading from Earlier Releases of StorageCentral SRM to VERITAS StorageCentral 5.2 .....23 Compatibility Between VERITAS StorageCentral 5.2 and Earlier Releases ...............................27

StorageCentral 5.2 and StorageCentral 4.1...............................................................................27 StorageCentral 5.2 and StorageCentral SRM 5 ........................................................................27

Installation Worksheet ..............................................................................................................................29 Installation Checklist .................................................................................................................................35 Customizing the ActiveReports Component (CAB File)......................................................................40 Verifying the Installation ..........................................................................................................................42

i

Page 4: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Installation Verification: Standard Edition.....................................................................................43 Installation Verification: Active Directory Edition........................................................................46 Installation Verification: Network Appliance Editions ................................................................48 Installation Verification: AD Extended the Schema......................................................................54

Uninstalling StorageCentral .....................................................................................................................55 Silent Installation........................................................................................................................................56 Silent Uninstallation ..................................................................................................................................59 Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2 ......................................................................................................................................60

Chapter 3. Using StorageCentral......................................................................... 63 Viewing and Modifying Global Properties ............................................................................................63

Audit Tab .............................................................................................................................................64 Event Log Tab......................................................................................................................................64

Space Allocation...........................................................................................................................64 File Blocking .................................................................................................................................65

File Blocking Tab.................................................................................................................................65 Mail Tab ...............................................................................................................................................66

Exchange Mail Settings ...............................................................................................................66 SMTP Mail Settings .....................................................................................................................67 Using Active Directory for E-mail.............................................................................................67

Network Appliance Tab.....................................................................................................................68 Remote Agent Tab ..............................................................................................................................68 Reports Tab..........................................................................................................................................68 Space Allocation Tab ..........................................................................................................................69 SQL Server Tab....................................................................................................................................70 Trending Tab .......................................................................................................................................70 Version Tab..........................................................................................................................................71

Policies.........................................................................................................................................................72 Introduction to Policies ......................................................................................................................72 Managed Object Policies ....................................................................................................................72

Introduction to Managed Object Policies .................................................................................72 Creating a New Managed Object Policy...................................................................................73

The New Policy Wizard.......................................................................................................74 Policy Name Dialog Box......................................................................................................74 Policy Attributes Dialog Box...............................................................................................74 Policy Preferences Dialog Box ............................................................................................75 Set Space Allocation Dialog Box.........................................................................................75 Space Allocation Alarm Dialog Boxes ...............................................................................76 File Groups Dialog Box........................................................................................................76

ii

Page 5: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

File Blocking Alarm Dialog Box .........................................................................................77 File Blocking Filter Dialog Box ...........................................................................................77

Deleting a Managed Object Policy ............................................................................................78 Copying a Managed Object Policy ............................................................................................78 Renaming a Managed Object Policy .........................................................................................79 Viewing and Modifying Managed Object Policy Properties .................................................79

Allocation Properties............................................................................................................80 File Blocking Properties .......................................................................................................81 Preferences.............................................................................................................................82

Managed Object Policy Propagation.........................................................................................83 Transparent Policies ....................................................................................................................84

Computer Policies...............................................................................................................................85 Introduction to Computer Policies............................................................................................85 Creating a New Computer Policy .............................................................................................86 Deleting a Computer Policy .......................................................................................................87 Viewing and Modifying Computer Policy Properties............................................................88 Applying a Computer Policy .....................................................................................................88

Managed Objects........................................................................................................................................90 Introduction to Managed Objects .....................................................................................................90

Overview.......................................................................................................................................90 Managed Object Details Pane ....................................................................................................91

Sorting the Display...............................................................................................................92 Selecting Columns to Display in the Managed Object Grid ...........................................92 Filtering the Contents of the Managed Object Grid.........................................................93 Network Appliance Filers and the Grid............................................................................93 Viewing the Contents of a Folder.......................................................................................94

Refreshing the Managed Object Database................................................................................94 Automatically........................................................................................................................94 Manually................................................................................................................................94

Running a Report Against a Managed Object .........................................................................95 Managed Objects and the Microsoft Application Event Log.................................................95

Creating a New Managed Object......................................................................................................96 The New Managed Object Wizard............................................................................................97 Folders Dialog Box ......................................................................................................................97 Folder Options Dialog Box .........................................................................................................98 User Options Dialog Box ............................................................................................................98 Select Users Dialog Box...............................................................................................................99 Select Object Type Dialog Box ...................................................................................................99 Set Space Allocation Dialog Box..............................................................................................100 Alarm Dialog Boxes...................................................................................................................100 File Groups Dialog Box.............................................................................................................101

iii

Page 6: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

File Blocking Alarm Dialog Box...............................................................................................101 File Blocking Filter Dialog Box.................................................................................................102

Deleting a Managed Object .............................................................................................................103 Viewing and Modifying Managed Object Properties ..................................................................103

Folder Space Allocation or User Space Allocation................................................................104 Space Allocation Tab..........................................................................................................105 Alarm Tabs ..........................................................................................................................105

Auto Detect Subfolders.............................................................................................................106 Auto Detect All Users ...............................................................................................................106 File Blocking ...............................................................................................................................107

File Groups Tab...................................................................................................................107 Alarm Tab............................................................................................................................107 Filters Tab ............................................................................................................................108

Applying a Policy to a Managed Object .................................................................................108 File Groups................................................................................................................................................110

Introduction to File Groups.............................................................................................................110 Creating a New File Group .............................................................................................................110 Deleting a File Group .......................................................................................................................111 Viewing and Modifying File Group Properties............................................................................112 Copying a File Group.......................................................................................................................113 Renaming a File Group ....................................................................................................................113

Report Collectors......................................................................................................................................114 Introduction to Report Collectors...................................................................................................114 Adding a Report Collector...............................................................................................................114 Deleting a Report Collector .............................................................................................................115 Deleting a Scheduled Job .................................................................................................................115 Viewing and Modifying a Report Collector Schedule.................................................................115

Reports.......................................................................................................................................................117 Introduction to Reports....................................................................................................................117

Limitations..................................................................................................................................117 Report Definitions.............................................................................................................................118

Introduction to Report Definitions..........................................................................................118 Creating a New Report Definition ..........................................................................................119 Deleting a Report Definition ....................................................................................................121 Viewing and Modifying Report Definition Properties.........................................................122 Copying a Report Definition....................................................................................................123 Renaming a Report Definition .................................................................................................123 Report Detail ..............................................................................................................................124 Report Query..............................................................................................................................124 Report Break...............................................................................................................................126 Report Sort..................................................................................................................................128

iv

Page 7: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report Total ................................................................................................................................129 Report Summary Query............................................................................................................130 Report Summary Sort................................................................................................................131 Report Summary Total..............................................................................................................132 Report Graph..............................................................................................................................133

Report Sets .........................................................................................................................................135 Introduction to Report Sets ......................................................................................................135 Creating a New Report Set .......................................................................................................136 Deleting a Report Set.................................................................................................................137 Viewing and Modifying Report Set Properties .....................................................................137

Filter Tab..............................................................................................................................138 Format Tab ..........................................................................................................................139 Output Tab ..........................................................................................................................139 Content Tab .........................................................................................................................141

Copying a Report Set ................................................................................................................142 Renaming a Report Set..............................................................................................................143 Running a Report Set ................................................................................................................143

Running a Report Set Interactively ..................................................................................143 Running a Report Set Batch ..............................................................................................145

Predefined Report Sets..............................................................................................................146 Preferred Groups and Machines............................................................................................................150

Introduction to Preferred Groups and Preferred Machines........................................................150 Creating a New Preferred Group ...................................................................................................151 Deleting a Preferred Group .............................................................................................................152 Renaming a Preferred Group ..........................................................................................................152 Viewing and Modifying Preferred Group Properties..................................................................153 Applying a Computer Policy to a Preferred Machine .................................................................153 Starting or Stopping Service on a Preferred Machine..................................................................154 Deleting a Preferred Machine .........................................................................................................155 Viewing and Modifying Preferred Machine Properties ..............................................................155

Audit Data.................................................................................................................................................156 Introduction to Audit Data..............................................................................................................156

Removing Expired Data............................................................................................................157 Viewing and Modifying Audit Properties ....................................................................................158 Deleting an Audit Record................................................................................................................158 Refreshing Audit Data .....................................................................................................................159

Command Line Commands ...................................................................................................................160 Command SCAlloc ...........................................................................................................................160 Command SCBlock...........................................................................................................................163 Command SCDisplayLimit .............................................................................................................164 Command SCReport.........................................................................................................................165

v

Page 8: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Command SCSRM............................................................................................................................168

Chapter 4. Working with NetApp Filers............................................................. 171 Introduction to Using StorageCentral with Network Appliance Filers ...........................................171

Controlling the Filer from StorageCentral.....................................................................................171 File Blocking and Network Appliance Filers .......................................................................................173 Space Allocation and Network Appliance Filers.................................................................................174 Space Allocation and Network Appliance Filers—Examples............................................................176 Auto Detection and Network Appliance Filers ...................................................................................180 Computer Policies and Network Appliance Filers..............................................................................181 Configuring the Filer to Work with SC.................................................................................................182

Converting to Qtrees on Network Appliance Filers ....................................................................182 Configuring SNMP for Space Allocation on Network Appliance Filers...................................182 Configuring File Blocking on Network Appliance Filers............................................................183

Chapter 5. Reference.......................................................................................... 185 AD Fields in Custom Reports.................................................................................................................185 Application Event Log ............................................................................................................................187 Auto Detection .........................................................................................................................................190

User.....................................................................................................................................................190 Subfolder............................................................................................................................................190

Handling Exceptions .................................................................................................................191 Centralized Database...............................................................................................................................192 Cluster Support ........................................................................................................................................194

Types of Clusters...............................................................................................................................194 Architecture .......................................................................................................................................195

Managed Objects........................................................................................................................195 SRM Policies, Reports, and File Groups .................................................................................195 The StorageCentralSRM5 Cluster Resource...........................................................................196

Managing Policies in a Cluster........................................................................................................196 Active Directory Cluster Configuration .................................................................................197 Standard Edition Cluster Configuration ................................................................................198

Installing StorageCentral in a Cluster ............................................................................................199 VERITAS Cluster Server Support...................................................................................................201

Configuring SQL Server Support ..........................................................................................................202 Description of File Blocking Alarm Settings ........................................................................................205

File Blocking Tab...............................................................................................................................205 Notification Tab ................................................................................................................................206 Execute Tab........................................................................................................................................208

vi

Page 9: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report Tab..........................................................................................................................................209 Description of Space Allocation Alarm Settings..................................................................................211

Threshold Tab....................................................................................................................................212 Notification Tab ................................................................................................................................213 Execute Tab........................................................................................................................................215 Report Tab..........................................................................................................................................215 Extend Tab .........................................................................................................................................217

Disk Space Limit ......................................................................................................................................218 Include and Exclude Filters ....................................................................................................................219 Group Associations..................................................................................................................................220 Group Space Allocation ..........................................................................................................................222 Message Macros .......................................................................................................................................223

File Blocking Macros ........................................................................................................................223 Space Allocation Macros..................................................................................................................224

MIB.............................................................................................................................................................226 Overdraft Limit ........................................................................................................................................227 Rules of File Ownership..........................................................................................................................228 Space Allocation Options........................................................................................................................229 Trending....................................................................................................................................................232

Removing Expired Data...................................................................................................................233 Types of Space Allocation.......................................................................................................................234 Unauthorized and Authorized Files......................................................................................................236

Chapter 6. Permissions...................................................................................... 237 Introduction to Permissions ...................................................................................................................237

Standard StorageCentral Security ..................................................................................................238 Advanced StorageCentral Security ................................................................................................238

Standard StorageCentral Security..........................................................................................................239 Two Levels of Non-Administrative User Access to StorageCentral..........................................239 Standard Permissions for StorageCentral......................................................................................241

Advanced StorageCentral Security........................................................................................................243 Permissions for Help Desk Users ...................................................................................................243 Permissions for Running SRM Reports .........................................................................................246 Permissions for Service Account ....................................................................................................248 Permissions for the Registry and Active Directory......................................................................248 Permissions for DCOM ....................................................................................................................249 Permissions for WMI........................................................................................................................253 Adding Users to the SCRead and SCWrite Groups and Assigning Permissions ....................259 Adding the SCRead and SCWrite Groups to a New Directory and Assigning Permissions .260

vii

Page 10: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Adding the SCRead and SCWrite Groups to the WQuinn Container in the Active Directory and Assigning Permissions .............................................................................................................261 Setting Up the Task Scheduler Logon Account ............................................................................267

Chapter 7. Best Practices................................................................................... 269 Introduction to Best Practices.................................................................................................................269 General ......................................................................................................................................................271

Establish Corporate SRM Policies...................................................................................................271 Tell Users That Storage Resource Management Is Beginning ....................................................273 Create Managed Objects and Apply Policies During Off Hours ...............................................274 Monitor Overall Disk Consumption ..............................................................................................274

Running Reports ......................................................................................................................................275 Use Predefined Report Sets .............................................................................................................275 Create Your Own Report Definitions and Report Sets ................................................................276

Space Allocation.......................................................................................................................................277 Implement Passive Limits Initially.................................................................................................277 Use Auto Detect Managed Objects.................................................................................................278 Use Disk Full Error Message ...........................................................................................................278 Use Overdrafts ..................................................................................................................................279

File Blocking .............................................................................................................................................280 Create File Blocking Policies That Suit Your Site's Needs...........................................................280 Create Customized File Blocking Messages..................................................................................281

Educating Users .......................................................................................................................................282 .......................................................................................................................282 Identify User Reports

Chapter 8. Troubleshooting ............................................................................... 283 Quota Alerts Are Not Triggered From a Network Appliance Filer...........................................283 Login Failure .....................................................................................................................................284 Managed Objects Fail to Display (1 of 2) .......................................................................................284 Managed Objects Fail to Display (2 of 2) .......................................................................................285 E-mail Is Not Received From Alarms ............................................................................................285 No Audit Records are Displayed in the MMC While Connected to a Remote Domain .........286 User Account Is Marked “Safe for Delegation” Differently in Windows 2003 Server Where Domain or Forest Level Functionality Has Been Raised to Windows 2003 Native Mode......287

viii

Page 11: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter 1. Getting Started

Introduction to StorageCentral Welcome to VERITAS StorageCentral™, a comprehensive storage capacity optimization solution. StorageCentral addresses the key storage management areas: controlling and monitoring disk space usage, reporting on storage content, and monitoring the health of your storage. It is a real-time storage resource management system for Windows 2000 (and above).

StorageCentral is designed to be a simple yet powerful product, focused on solving immediate storage problems with a minimum amount of setup and planning. With features like auto detection, detailed reporting, and policies, storage policies can be established and enforced with a minimum of administrative intervention. Storage reporting is designed to allow for storage problems to be quickly isolated and resolved on a real-time basis.

Installation requirements for StorageCentral are minimal, and this product is not dependent on any other products being installed to work properly. The installation is completely self-contained.

StorageCentral:

• Limits the users' disk space by monitoring and enforcing disk usage policies in real time

• Generates detailed reports of space consumption

• Prevents unwanted files from being saved on the servers

Product Benefits Control. StorageCentral controls the users' storage habits and prevents "runaway disk consumption." Simply select the appropriate disk space allocations by user, workgroup, or enterprise.

1

Page 12: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Enforcement. StorageCentral enforces pre-configured storage policies that have been set.

Continuity. StorageCentral eliminates or reduces system crashes, downtime, and loss of productivity due to lack of disk space or unnecessary space upgrades.

User Awareness. StorageCentral notifies the users of attempts to violate a certain storage policy and educates them about appropriate disk space usage, restricting their wasteful storage habits.

Efficiency. StorageCentral maximizes disk space usage and prolongs the performance of disk space investment, lowering overall storage total cost of ownership.

Recovery. StorageCentral reclaims wasted disk space and identifies which files are not backed up.

Related Products StorageCentral Explorer Snap-In is a tool that enables system administrators and regular users to easily access managed objects from Windows Explorer. System administrators using Explorer Snap-In can create new managed objects, delete managed objects, and view and modify managed object properties. Regular users can also use this product to view managed objects.

To learn if StorageCentral Explorer Snap-In is available at your site, contact the head of your organization's Information Technology group.

Related Sections • To learn what you need to run StorageCentral on your system, read the section

“Requirements” on page 20.

• For an overview of what you must do to install StorageCentral, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.

2 StorageCentral User Guide

Page 13: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

What's New in StorageCentral 5.2 StorageCentral 5.2 has a variety of new features and capabilities.

Features Related to the Active Directory • Information presented regarding the AD property level. StorageCentral uses

scoping rules when taking properties from the AD. (For example, if an OU does not have properties defined, StorageCentral applies the domain-level properties to the OU.) However, previous versions of StorageCentral did not tell users which properties were being applied to their computer. StorageCentral 5.2 provides a new field called Property Level on the Version tab (page 71) of the Properties dialog box to tell you from where your computer is getting its properties—from your computer, your OU, or the domain. This field is present only in AD editions of StorageCentral.

• Applying a computer policy stored in the AD to a computer you are installing. If you are installing an AD edition of StorageCentral and there are computer policies stored in the AD, the installation wizard gives you the opportunity to apply an existing computer policy to the computer you are installing. Using an existing computer policy saves you time and effort because you do not have to create a new one.

Features Related to Network Appliance Filers • New information presented in the managed object grid for objects residing on

a Network Appliance Filer. Previous versions of StorageCentral displayed no information in the grid about Network Appliance Filer volumes that were offline. You can read more about this in the section “Introduction to Managed Objects” on page 90.

3

Page 14: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Issuing simple Network Appliance Filer commands from StorageCentral. You can turn a Network Appliance Filer’s quotas on or off from the grid in the managed object details pane. You can also resize and restart quotas. You can read more about this in the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

• User quota support for Network Appliance Filers. StorageCentral now supports user quotas on Network Appliance Filers. This means you can apply a quota (that is, space allocation) policy to a specific user (or users) within a Network Appliance qtree.

Other New Features and Capabilities • The ability to run under Windows 2003. StorageCentral 5.2 supports the latest

Windows operating system—Windows 2003 Standard, Enterprise, and Data Center.

• Unicode support. StorageCentral 5.2 supports Unicode strings. The alert message and names of policies, file groups, report definitions, report sets, and managed objects can all be Unicode. The audit and trend databases may store Unicode information if you configure them to do so.

• Increased control over the amount of data StorageCentral stores. You can now specify how long StorageCentral retains audit and trend data. Also, you can now specify which actions (such as creating or deleting a managed object) generate an application event log record. For more information, read about the Audit, Trending, and Event Log tabs in the section “Viewing and Modifying Global Properties” at the beginning of Chapter 3.

• Two levels of access for non-administrative users. In this version of the product there are two levels of access to StorageCentral for non-administrative users: Read and Full Control.

o Read access allows non-administrative users to run storage reports and view policies, managed objects, file blocking groups, report definitions, report sets, and global settings.

4 StorageCentral User Guide

Page 15: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

o Full Control access allows them to add, delete, and modify policies, managed objects, file blocking groups, report definitions, report sets, and global settings as well as perform the functions allowed by Read access.

For more information, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.

• Reports run against a larger number of files. This version of StorageCentral doubles the maximum number of files (from approximately 8 million to approximately 16 million) that can be processed when generating reports.

Related Sections To learn about features added in the previous versions of StorageCentral, read the sections “What's New in StorageCentral 5.1” and “What's New in StorageCentral 5.0”.

5

Page 16: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

What's New in StorageCentral 5.1 StorageCentral 5.1 has these new features:

• Support for Network Appliance’s Filer machine. StorageCentral now provides quota and file-blocking support for Network Appliance Filer machines. For additional information, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

• Support for MAPI. StorageCentral now has the ability to use MS Exchange for sending e-mail. Note: Microsoft introduced a security patch for MS Outlook that prompts the user for permission prior to sending e-mail when the sender is a program such as StorageCentral. This security patch was introduced to prevent viruses from sending e-mail to all addresses in the global address book. The presence of this security patch means that for every e-mail StorageCentral attempts to send, the user must give permission.

• Simplified permission requirements. We have moved the location of the QA database from the root directory of the drive to a folder in the root. This folder is called "SCSRMQuota". This change means that read/write permissions are no longer required for the root directory, only the new folder.

Related Sections To learn about features added in the previous version of StorageCentral, read the section “What's New in StorageCentral 5.0”.

6 StorageCentral User Guide

Page 17: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

What's New in StorageCentral 5.0 StorageCentral 5.0 has many new features.

Usability • Centralized Console. StorageCentral provides a console that manages the entire

Windows enterprise including server appliances based on Microsoft’s Windows-Powered Server Appliance Kit, and direct-attached Windows NT, 2000, Advanced, Terminal, Cluster, and Datacenter Servers and storage area networks (SANs). All Windows-based storage can be managed centrally and the console integrates seamlessly with other frameworks with SNMP and scriptable interfaces.

• MMC-Based Interface. Conforming to the standard Microsoft Management Console interface makes navigating through StorageCentral simple and intuitive.

• Web User Interface. With enhanced accessibility, the web interface makes it easier to remotely control StorageCentral policies and settings as well as report on storage usage. StorageCentral leverages IIS and other Microsoft technologies to distribute SRM-based information to more people on an as-needed basis. Users can view their storage reports via any intranet server or kiosk, while systems managers and help desk personnel can check the server storage status whenever required.

• Best Practice SRM Policies. To make it easier to configure an SRM system, StorageCentral provides pre-configured policies that implement best practices. Administrators can simply select from a menu of best practice policies and make any necessary custom edits, such as inserting a help desk number, and apply them to servers.

• Alarm History. To make it easier to reuse frequently used automated alerting messages, StorageCentral keeps a history of previously used alert messages. Administrators can simply select from a menu of previously used alert messages and make any necessary custom edits, or create new alerts, which will also be stored in the alert history.

7

Page 18: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Scalability • Enhanced Support of Microsoft’s Windows 2000 Active Directory for

centralized storage policy propagation. StorageCentral has the ability to write storage policy definitions inside the Windows 2000 Active Directory, thereby mandating the automation of storage policy across the enterprise. Storage policies include space allocation alarms and actions, scheduled SRM report generation, blocking of unauthorized content such as MP3 files, and integration with data protection and availability products.

• Windows Installer and SMS Installation. StorageCentral installs on any number of Windows servers efficiently and with minimal administrator effort. Administrators simply install StorageCentral on a Microsoft SMS server, which propagates the installation out to tens, hundreds, or even thousands of specified servers across the enterprise.

• RapidScan (TM). Reports run 700 percent faster than previous StorageCentral releases by reporting on file meta data stored in the NTFS Master File Table. Rather than "touching" each file when running storage usage reports, StorageCentral simply runs against the NTFS Master File Table. This makes reporting on a large scale quicker and more resource-efficient.

• File Blocking by Type and Header. StorageCentral blocks unwanted file types such as MP3 files, even if clever users attempt to disguise unauthorized file types as legitimate file types. Because of scanning by file type and by header information, StorageCentral is virtually impossible to fool.

SRM Reporting • Enhanced SRM Reporting. Reports include capacity planning, details trend

analysis, reports by Active Folder hierarchy, integration with Active Folder user profiles, nightly backup capacity, enhanced security reporting, reporting on extended attributes, and reporting on percentage of space allocations. Also, a robust custom-report generator enables users to narrow down the contents of an initial report by applying additional filtering and sorting criteria.

• Chargeback Reporting. IT departments can implement disk usage accountability by department, division, location, or workgroup.

8 StorageCentral User Guide

Page 19: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Drill-Down Reporting. To probe further into the summary reports, users simply click on any summary report item to generate the detailed information that supports the summary data. For example, by clicking on the summary report called "graphic files," which shows a sum total number of these files and the total amount of space they use, a detailed report listing each individual file will be generated. From the detail, the user can view, move, or delete individual files or groups of files by right-clicking the item(s) from a web browser.

• Multiple-Alarm Actions. As the result of any individual disk utilization alarm being activated, multiple actions can execute. For example, at 80% of the object’s disk space allocation, StorageCentral can run disk cleanup reports, extend the volume, notify the administrator, e-mail the user, and submit data to the Microsoft application event log.

9

Page 20: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

MMC Overview The MMC (Microsoft Management Console) is divided into two panes.

• The left pane is the management pane and includes the Tree tab also known as the console tree. The console tree displays items that are available in a given console.

• The right pane contains the details pane. The details pane displays information about items in the console tree.

If Active Directory is not being supported, the console tree for StorageCentral contains the following items:

• My Computer. StorageCentral is a Storage Resource Management system that provides disk space limit monitoring and control in real time. Use the following tools to monitor and control disk space:

o Managed Objects—Configure objects to manage and control space allocation and file blocking settings. Create new managed objects, delete existing managed objects, and view/modify the properties of the managed objects.

o Policies—Configure policies to define rules and specify actions on managed objects. Define space limit and file blocking properties of the policies. Create new policies, delete existing policies, and view/modify the properties of the policies.

o File Groups—Configure file selection masks for effective blocking.

o Reports—Define and generate storage management reports to analyze disk consumption.

o Audit—Space allocation and file blocking actions may be viewed in the audit window.

• Microsoft Windows Network. Users have the ability to connect to remote servers allowing for centralized management of groups, policies, managed objects, and reports.

10 StorageCentral User Guide

Page 21: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Preferred Machines. Machines selected by the user for quick access. This is a user-specific setting.

• Report Collectors. Servers designated to run reports.

If Active Directory is being supported, the StorageCentral tree displays as a sub-tree of Machine, Domain, Site, OU, and AD root node. The Managed Objects node displays all the objects for the scope of its level. In the example below, clicking on the Managed Objects node for Sales will display all the managed objects in the Sales OU.

For example:

ADTest (DC) File Groups Policies Reports Managed Objects Sales(OU) File Groups Policies Reports Managed Objects Server1 File Groups Policies Reports Managed Objects Server2 File Groups Policies Reports Managed Objects ServerN File Groups Policies Reports Managed Objects Marketing(OU) OU N (OU)

11

Page 22: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections In addition to using the graphical user interface, you can manipulate StorageCentral through its command line interface. For more information about the CLI, read the section “Command SCSRM” on page 168.

12 StorageCentral User Guide

Page 23: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Active Directory StorageCentral provides support of Microsoft’s Windows 2000 (and above) Active Directory for centralized storage policy management. StorageCentral has the ability to write storage policy definitions inside the Active Directory (AD), thereby allowing the application of storage policy across the enterprise. Storage policies include space allocation alarms and actions, scheduled report generation, blocking of unauthorized files by file type or content, and integration with data protection and availability products.

StorageCentral requires a specific tree structure and data types. To meet these requirements, the Active Directory schema must be extended. This results in StorageCentral information being self-contained which among other benefits facilitates more efficient searching. Microsoft ADSI is used to extend the schema.

Schema Modifications The StorageCentral installation will extend the schema. Two new attributes will be added—"wquinn-DataType" and "wquinn-String". Two new classes will be added—"wquinn-Container" and "wquinn-Value". The installation will copy StorageCentral environment data from the local registry to the Active Directory domain.

StorageCentral Schema in the Active Directory StorageCentral integrates with Active Directory at the policy level. All space allocation, file blocking, and report definitions may be stored in the Active Directory. The structure of the Active Directory mirrors the structure in the registry.

Classes:

Name Class Distinguished Name CN=wquinn-Container classSchema CN=wquinn-Container,

CN=Schema,CN=Configuration, DC=yourcompanydomainname, DC=com

13

Page 24: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Name Class Distinguished Name CN=wquinn-Value classSchema CN=wquinn-Value,

CN=Schema,CN=Configuration, DC= yourcompanydomainname, DC=com

CN=wquinn-DataType attributeSchema CN=wquinn-DataType, CN=Schema, CN=Configuration, DC= yourcompanydomainname, DC=com

CN=wquinn-String attributeSchema CN=wquinn-String, CN=Schema, CN=Configuration, DC= yourcompanydomainname, DC=com

Display Structure The StorageCentral tree is displayed as a sub-tree of the following entities: Machine, Domain, Site, OU, and AD Root Node.

For example, the Managed Objects node displays all the objects for the scope of its level. Clicking on the Managed Object node for Departments displays all the managed objects for all machines in the Departments OU.

Installation Notes • The machine where StorageCentral is installed should be in an Active Directory

domain.

• The user who installs the product should have the following privileges from the Active Directory domain controller: Schema Admin, Domain Admin, and Enterprise Admin.

14 StorageCentral User Guide

Page 25: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections To learn how Active Directory affects the way the MMC console tree displays, read the section “MMC Overview” on page 10.

15

Page 26: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Getting Technical Support VERITAS Software Corporation offers you a variety of support options.

Accessing the VERITAS Support Web Site The VERITAS Support Web site allows you to:

• contact the VERITAS Support staff and post questions to them

• get the latest patches, upgrades, and utilities

• view the StorageCentral Frequently Asked Questions (FAQ) page

• search the knowledge base for answers to technical support questions

• receive automatic notice of product updates

• find out about StorageCentral training

• read current white papers related to StorageCentral

The address for the VERITAS Support Web site is http://support.veritas.com.

Subscribing to VERITAS E-mail Notification Service Subscribe to the VERITAS e-mail notification service to be informed of software alerts, newly published documentation, Beta programs, and other services.

Go to http://support.veritas.com. Select a product and click E-mail Notifications on the right side of the page. Your customer profile ensures you receive the latest VERITAS technical information pertaining to your specific interests.

16 StorageCentral User Guide

Page 27: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Accessing VERITAS Telephone and Fax Support Telephone support for StorageCentral is only available with a valid support contract. To contact VERITAS for technical support, go to http://support.veritas.com. Specify StorageCentral as the product and click Contact Support on the right side of the page. Find the appropriate phone number in the list that displays.

Contacting VERITAS Licensing For license information, call 1-650-527-0300 or fax 1-650-527-0952.

17

Page 28: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

18 StorageCentral User Guide

Page 29: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter 2. Installation and Upgrade

Introduction to the Installation Process The steps below summarize what you must do to install StorageCentral on your system.

Step To do this… Refer to this section… 1 Verify you have the hardware and software needed

to install StorageCentral on your system

“Requirements” (page 20)

2 Gather the information you will need during the installation process

“Installation Worksheet” (page 29)

3 Install StorageCentral

“Installation Checklist” (page 35)

4 Verify that you correctly installed and configured StorageCentral.

“Verifying the Installation” (page 42)

5 Optional: By default, StorageCentral stores audit and trend data in a Microsoft Access database. If you choose to store these data in Microsoft SQL Server, you must configure StorageCentral to save the data there.

“Configuring SQL Server Support” (page 202)

Important: The installation must be performed by a member of the Domain Admins group.

Related Sections • To learn about your options for upgrading StorageCentral, read the section

“Upgrade Roadmap” on page 23.

• To learn how you can silently install and uninstall StorageCentral, read the sections “Silent Installation” (page 56) and “Silent Uninstallation” (page 59).

19

Page 30: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• To remove StorageCentral from your computer, read the section “Uninstalling StorageCentral” on page 55.

• To learn about using Active Directory, read the section “Active Directory” on page 13.

• To take advantage of the Unicode support in StorageCentral 5.2, you must convert your audit and trend data. To do so, read the section “Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2” on page 60.

Requirements This section lists what you need to run StorageCentral on your system.

Agents • One of the following operating systems:

o Windows XP Professional

o Windows NT 4, service pack 6a

o Windows 2000 Professional Server, Advanced Server, or Datacenter Server

o Windows Server 2003 Standard, Enterprise, or Datacenter Edition

• 128 MB RAM for Windows Professional or 256 MB for others

• 6 MB of disk space are required to install an agent, plus additional space to run StorageCentral

20 StorageCentral User Guide

Page 31: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Collector • One of the following operating systems:

o Windows XP Professional

o Windows NT 4, service pack 6a

o Windows 2000 Professional Server, Advanced Server, or Datacenter Server

o Windows Server 2003 Standard, Enterprise, or Datacenter Edition

• Internet Explorer 5.5 or later

• 256 MB RAM for Windows Professional or 512 MB for others

• 33 MB of disk space are required to install a collector, plus additional space to run StorageCentral

Console • One of the following operating systems:

o Windows XP Professional

o Windows 2000 Professional Server, Advanced Server, or Datacenter Server

o Windows Server 2003 Standard, Enterprise, or Datacenter Edition

• Internet Explorer 5.5 or later

• 256 MB RAM for Windows Professional or 512 MB for others

• 50 MB of disk space are required to install the MMC console, plus additional space to run StorageCentral

21

Page 32: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Network Appliance Filer This section applies only if you are installing a Network Appliance edition of StorageCentral.

• Data ONTAP version 6.4 (or later) from Network Appliance must be installed on the Filer to provide support for third-party products (such as StorageCentral).

• The CIFS protocol must be enabled on the Filer you want to manage.

• SNMP must be configured on both the Filer and remote agent to generate traps for your remote agent. You will configure SNMP to do this when you install StorageCentral.

• The StorageCentral remote agent and MMC must be installed and executed within the same domain as the Network Appliance Filer(s) that they are intended to manage.

Remote Agent This section applies only if you are installing a Network Appliance edition of StorageCentral.

• One of the following operating systems:

o Windows XP Professional

o Windows 2000 Professional Server, Advanced Server, or Datacenter Server

o Windows Server 2003 Standard, Enterprise, or Datacenter Edition

• Internet Explorer 5.5 or later

• 128 MB RAM for Windows Professional or 256 MB for others

• 6 MB of disk space are required to install a remote agent, plus additional space to run StorageCentral

22 StorageCentral User Guide

Page 33: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Simple Network Management Protocol (SNMP) support must be operational on the remote agent so that StorageCentral can report on space allocation violations on the Filer.

• The StorageCentral remote agent and MMC must be installed and executed within the same domain as the Network Appliance Filer(s) that they are intended to manage.

Note: Installing the remote agent on a Windows 2000 (or above) cluster is not supported.

Upgrade Roadmap This section provides instructions to upgrade your current version of StorageCentral. It also provides information about compatibility between versions.

Upgrading from Earlier Releases of StorageCentral SRM to VERITAS StorageCentral 5.2

This release of StorageCentral allows you to upgrade most installations of StorageCentral (4.1, 5.0, and 5.1) without having to uninstall the current installation. Exceptions are:

• Version 5.0 Builds 197 and 219. These require that the product be manually removed prior to installation.

• Version 5.0 or 5.1 Standard Edition to Active Directory (AD) Edition. Upgrading an earlier Standard edition to the 5.2 AD edition is not supported. To achieve this you must first upgrade to 5.2 Standard, then upgrade 5.2 Standard to 5.2 AD.

Upgrading from FileScreen 2000 is also supported in the instructions below.

To upgrade to VERITAS StorageCentral 5.2, refer to the table below. Locate the version you have currently installed in the Upgrade From column, confirm the Upgrade To column contains the appropriate edition of 5.2, and follow the steps as shown.

23

Page 34: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Upgrade From

Upgrade To Instructions

4.1, build 450 or higher

5.2 Standard Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. A migration tool runs as a part of the installation procedure. It converts StorageCentral 4.1 quotas, screening rules, and reports. When prompted, select Yes to uninstall StorageCentral 4.1 and install 5.2 Standard.

4.1 + FileScreen 2000

5.2 Standard 1. Save FileScreen registry under the WQUINN key.

2. Uninstall FileScreen.

3. Restore the registry.

4. Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2.

5.0 (builds 197 and 219) Standard

5.2 Standard 1. Remove any QFEs associated with StorageCentral SRM 5 in the reverse order in which you installed them.

2. Remove StorageCentral SRM 5. Choose to save any entities if asked. Ignore any message requesting a reboot.

3. Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2.

24 StorageCentral User Guide

Page 35: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Upgrade From

Upgrade To Instructions

5.0 (builds 197 and 219) AD

5.2 AD 1. Remove any QFEs associated with StorageCentral SRM 5 in the reverse order in which you installed them.

2. Remove StorageCentral SRM 5. Choose to save any entities if asked. Ignore any message requesting a reboot.

3. Install StorageCentral 5.2 AD by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. Choose to restore any previously saved entities.

5.0 (builds 220 and 230) Standard

5.2 Standard Install StorageCentral 5.2 Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. The installation process will uninstall the older version of StorageCentral 5.2. Choose to save any entities if asked. Choose to restore any previously saved entities. If you are upgrading from StorageCentral 5.0 and have SQL Server configured for auditing and trending, you need to reconfigure the user name and password used to access the SQL Server database after installing StorageCentral 5.2: 1. On the StorageCentral management pane,

highlight My Computer, Preferred Machine, or OU, right-click and choose Properties. The Properties dialog box displays.

2. Click the SQL Server tab. 3. Enter the user name and password. 4. Click OK.

25

Page 36: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Upgrade From

Upgrade To Instructions

5.0 (builds 220 and 230) AD

5.2 AD Install StorageCentral 5.2 AD by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. The installation process will uninstall the older version of StorageCentral and install 5.2. Choose to save any entities if asked. Choose to restore any previously saved entities. If you are upgrading from StorageCentral 5.0 and have SQL Server configured for auditing and trending, you need to reconfigure the user name and password used to access the SQL Server database after installing StorageCentral 5.2: 1. On the StorageCentral management pane,

highlight My Computer, Preferred Machine, or OU, right-click and choose Properties. The Properties dialog box displays.

2. Click the SQL Server tab. 3. Enter the user name and password. 4. Click OK.

5.1 (build 229) NetApp Standard

5.2 NetApp Standard

Install StorageCentral 5.2 NetApp Standard by following the steps in the section “Introduction to the Installation Process” at the beginning of Chapter 2. The installation process will uninstall the older version of StorageCentral and install 5.2. Choose to save any entities if asked. Choose to restore any previously saved entities. Note: The name of the share that is located on the Network Appliance Filer and that is used by StorageCentral must be changed—the installation worksheet and checklist contain the details.

26 StorageCentral User Guide

Page 37: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Compatibility Between VERITAS StorageCentral 5.2 and Earlier Releases

This section explains compatibility issues between StorageCentral 5.2 and earlier releases.

StorageCentral 5.2 and StorageCentral 4.1

When upgrading from StorageCentral version 4.1 to version 5.2, two alarm notification fields (Notify Administrator and Record Alarm) in a transparent template are not set to transparent. This is because these fields did not exist in version 4.1.

StorageCentral 5.2 and StorageCentral SRM 5

This section explains compatibility issues between StorageCentral 5.2 and earlier releases of StorageCentral SRM 5. Unless specifically stated, a 5.2 environment can be managed by a 5.0 or 5.1 environment and vice versa.

• StorageCentral 5.2 policies, managed objects, file groups, report definitions, and report sets can be managed by a StorageCentral SRM 5 MMC unless they contain Unicode data. Versions 5.0 and 5.1 cannot work with Unicode data.

• StorageCentral SRM 5.0 and 5.1 policies, managed objects, file groups, report definitions, and report sets, can be managed by a StorageCentral 5.2 MMC.

• An Active HTML report generated by a 5.2 collector on behalf of a request made by a 5.2 agent or MMC cannot be viewed on a computer that has the 5.0 or 5.1 MMC installed. However, the same report can be sent to a machine that has only older versions of ActiveX controls installed.

• New features added in StorageCentral 5.2 cannot be managed by a 5.0 or 5.1 MMC. These features include:

o Displaying the property level in the AD editions

o E-mail support for the Exchange Server

o Controlling which events will be logged in the Microsoft event log

27

Page 38: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

o Specifying the retention period for audit and trend data

o Configuring SQL Server user name and password

• StorageCentral 5.2 can store audit and trend data in a SQL Server database in either ANSI or Unicode format. StorageCentral SRM 5.0 and 5.1 can only store audit and trend data in ANSI format. For more information, read the section “Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2” on page 60.

• StorageCentral 5.2 does not support StorageCentral SRM 5.0 builds 197 and 219.

Related Sections • To remove StorageCentral from your computer, read the section “Uninstalling

StorageCentral” on page 55.

• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

28 StorageCentral User Guide

Page 39: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Installation Worksheet The installation wizard that StorageCentral uses will prompt you for a variety of information. The installation process will go more smoothly if you have this information available in one place before you start.

You may print this section and fill in the blanks below with the information you need.

Option and Description Your Answer License Agreements

Before installing StorageCentral you will be asked to accept the terms of a VERITAS Software Corporation license agreement. You can find a copy of this agreement on the CD in the \docs folder.

Yes/No: _______

Customer Information The product asks for a user name, the organization, and serial number. Only the serial number is required to continue the installation process. You can find the serial number in the VIP Product License Certificate provided by VERITAS. We recommend you save the key in a file and use copy/paste when required during the install.

User: ______________________ Organization: ______________________ Serial Number: _______________________

Active Directory Support If you are installing or upgrading to an Active Directory (AD) edition of StorageCentral, you will perform two important tasks during installation.

1. You must extend the AD schema using a

program called ExtSche; you can find this program on the installation CD. StorageCentral makes use of its own data types and values and therefore requires the extension. You must have write access to the root of the AD to perform the extension, which implies Schema Admin and Domain Admin privileges. The installation checklist tells you how to use ExtSche.

Yes/No: _______

29

Page 40: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Option and Description Your Answer

2. You must populate the AD. The process that populates the AD executes during the installation and takes data from the registry and places it into the AD. However, this process executes only if two conditions are true: You instruct it to execute, and the AD does not already contain StorageCentral data. During installation you will be given the opportunity to populate the AD.

o If you are performing a clean installation

(that is, not an upgrade), then on at least one machine you must select all components to be installed and answer Yes to the question Populate Active Directory? that the installation wizard presents on the Active Directory Support dialog box. Until the AD is populated, an AD edition of StorageCentral will not work properly. VERITAS recommends you install all components on the first machine and then populate the AD.

o If this is an upgrade, then you must determine which machine in your enterprise contains the set of data that you want loaded to the AD. Then, when upgrading StorageCentral on that machine, you will answer Yes to the question Populate the Active Directory? that the installation wizard presents on the Active Directory Support dialog box.

30 StorageCentral User Guide

Page 41: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Option and Description Your Answer Until the AD is populated, an AD edition of StorageCentral will not work properly. VERITAS recommends you work with the machine that contains the appropriate set of data first and then populate the AD.

Computer Policies

If you are installing an AD edition of StorageCentral and there are computer policies stored in the AD, the installation wizard gives you the opportunity to apply an existing computer policy to the computer you are installing.

If you select a policy: You must choose, on the Custom Setup dialog box, to install the agent in order for StorageCentral to apply the policy.

Computer policy you want to apply: _____________________

Destination Folders These are the folders in which the product files will be installed and where the audit and trend databases will be placed. During an upgrade the process uses the same directories that the older release used.

The audit and trend databases are used through the ODBC data source. By default, the User Interface (UI) looks only at the local Microsoft Access database even if the UI focus is on another server or another domain. Use a centralized database to see the records for all computers in the domain which the UI is connected to.

Install: _____________________ Databases: _____________________

31

Page 42: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Option and Description Your Answer Restore Entities

If you are upgrading or performing a re-installation, the installation wizard asks if you want to carry forward any existing entities it finds. Entities are: managed objects, file groups, report sets and report definitions, preferred machines, audit and trend databases, and reports and quarantine directories.

Managed Objects (Yes/No): _______ File groups (Yes/No): ____ Report sets/definitions (Yes/No): _____ Preferred machines (Yes/No): _____ Audit and trend db (Yes/No): _______ Reports directory (Yes/No): _____ Quarantine directory (Yes/No): _____

Custom Setup The installation process allows you to choose features to be installed. The default is to install everything.

Agent (Yes/No): _______ Agent/Command Line (Yes/No): ____ Collector (Yes/No): _______ User Interface/MMC (Yes/No): _____

32 StorageCentral User Guide

Page 43: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Option and Description Your Answer Administrator Password

An account with domain administrator privileges is required for the services to run. Do not use System account. See the section “Permissions for Service Account” on page 248 for details.

User Name: _____________ Domain: ________________ Password: ______________

Mail Information For alarms and reports to be mailed, you will have to provide the details of the mail server. You can choose to use Microsoft’s Exchange server or an SMTP mail server. If you are installing an Active Directory edition of StorageCentral, you can also choose to use the AD mail facility as a source of e-mail addresses.

Exchange Profile: ________________ Exchange Password: ______________ SMTP Server: _________________ SMTP Sender (login ID or e-mail address): ___________________ SMTP Password: _________________ Use AD (Yes/No): _______

* * * * * The following items apply only to Network Appliance support * * * * *

Veritas Share on the Filer

StorageCentral needs to store data on all Filers. A share called "Veritas" must exist before the Filers can be added to a remote agent’s management list.

(You will do this as part of the installation process.)

33

Page 44: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Option and Description Your Answer Administrator Access to the Filer

StorageCentral requires administrator access to the Filer. This access is required to get and set quotas, and to register itself for file blocking requests.

Administrator: _________________ Password: _________________

Enable File Screening The Filer needs to be configured to have file screening turned on.

(You will do this as part of the installation process.)

SNMP The Filer generates SNMP traps for all quota violations. You will have to use the Network Appliance FilerView application to set the appropriate destination.

(You will do this as part of the installation process.)

Related Sections • For an overview of the installation process, read the section “Introduction to the

Installation Process” at the beginning of Chapter 2.

• To see the specifics of the installation process, read the section “Installation Checklist” on page 35.

34 StorageCentral User Guide

Page 45: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Installation Checklist The chart below summarizes the installation instructions and to which StorageCentral edition a step applies.

STD NetApp STD

AD NetApp AD

1. Extend schema No No Maybe Maybe 2. Configure for NetApp Editions

No Yes No Yes

3. Install StorageCentral Yes Yes Yes Yes 4. Reboot the machine Yes Yes Yes Yes 5. Create a share No Yes No Yes 6. Configure remote agent No Yes No Yes 7. Add Filer to a preferred group

No Yes No Yes

8. Enable file blocking on the Filer

No Yes No Yes

9. Set SNMP on the Filer No Yes No Yes

Key to columns in the chart above:

• STD = StorageCentral Standard Edition

• NetApp STD = StorageCentral for Network Appliance Standard Edition

• AD = StorageCentral Active Directory Edition

• NetApp AD = StorageCentral for Network Appliance Active Directory Edition

You may print this section and check off the steps as you complete them.

The installation process will go more smoothly if you complete the installation worksheet (page 29) before proceeding with the installation checklist.

35

Page 46: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

STEP COMMENTS DONE 1. Extend schema.

If you are installing or upgrading to a StorageCentral Active Directory edition and have never previously installed the Active Directory edition anywhere in your entire enterprise, you must extend the Active Directory schema. The account executing the schema extension program must have Schema Admin and Domain Admin privileges. Follow these steps:

1. Start a command prompt.

2. Locate a program called ExtSche in the \Utilities\Active Directory folder on the CD and execute it by typing this: ExtSche /x

The program will indicate success or failure. If the program fails, try setting the correct permissions and rerun the program. If problems persist, contact VERITAS technical support. You can read instructions to verify that the schema was properly extended on page 54.

36 StorageCentral User Guide

Page 47: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

STEP COMMENTS DONE 2. Configure for NetApp Editions.

Perform this step only if you are installing one of the StorageCentral for Network Appliance editions. SNMP support is required on the remote agent machine. Do the following on the remote agent:

1. Click Start | Settings | Control Panel | Add/Remove Programs.

2. Click Add/Remove Windows Components, select Management and Monitoring Tools, and click Details.

3. If Simple Network Management Protocol is not selected, then select it and proceed with its installation.

3. Install StorageCentral. Locate and run the "setup.exe" that applies to the StorageCentral edition you are installing. Allow the wizard to proceed to a normal finish. Update each panel in the wizard according to the answers you have laid out in the installation worksheet.

4. Reboot the machine.

The following steps apply only if the product installed is one of the StorageCentral for Network Appliance editions. 5. Create a share.

Using a Network Appliance tool, create a share named "Veritas" on each Network Appliance Filer that StorageCentral will manage. Note: Creating a folder on the Filer is not the same as creating a share.

37

Page 48: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

STEP COMMENTS DONE 6. Configure remote agent.

Configure the remote agent by doing the following:

1. Start the MMC. Do this by clicking Start | Programs | VERITAS StorageCentral.

2. Select the properties of the machine that has StorageCentral for Network Appliance installed.

3. On the Network Appliance tab, click Add and proceed to add the Network Appliance Filers to the list of managed machines.

7. Add Filer to a preferred group. The Network Appliance Filers added to the remote agent in the previous step must now be added to a preferred group. For more information about preferred groups and preferred machines, see the section “Introduction to Preferred Groups and Preferred Machines” on page 150.

8. Enable file blocking on the Filer. For detailed instructions, read the section “Configuring File Blocking on Network Appliance Filers” on page 183.

9. Set SNMP on the Filer. For detailed instructions, read the section “Configuring SNMP for Space Allocation on Network Appliance Filers” on page 182.

Related Sections • For an overview of the installation process, read the section “Introduction to the

Installation Process” at the beginning of Chapter 2.

• For instructions to install StorageCentral in a cluster, read the section “Cluster Support” on page 194.

38 StorageCentral User Guide

Page 49: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• To remove StorageCentral from your computer, read the section “Uninstalling StorageCentral” on page 55.

• During installation you are given the option to specify mail information on the Mail Information dialog box. If you chose to not provide the mail parameters during installation, you may do so later using the global Properties dialog box. You can read more about this in the section “Viewing and Modifying Global Properties” at the beginning of Chapter 3.

39

Page 50: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Customizing the ActiveReports Component (CAB File) Every time you install the Collector component of StorageCentral, a CAB file containing the OCXs required for running reports is installed on a local server. A copy of this CAB file is also located (available) on the VERITAS web site and can be downloaded from there. On the Reports tab of the global Properties dialog box, the support URL by default points to the VERITAS web site. You can leave this URL pointing to the VERITAS web site, and all downloads for the CAB file will come from VERITAS; or you can place a copy of the CAB file on an Intranet web server. If you choose to leave a local copy for downloading, all Collectors must be modified accordingly. Use method 1 below to modify the support URL. When the decision is made as to the location of the CAB file, all unreferenced copies can be deleted.

Note: The VERITAS copy of the CAB file gets updated from time to time. If you chose to use a local copy of the CAB file, you will have to replace it with an upgraded copy when a new upgrade is available.

You may download the CAB from a local Intranet web server using one of the two methods below.

Requirements: Microsoft Internet Information Server 4.0 and above.

Method 1

1. Copy the StorageCentralSRM5.CAB file from the Installation Path\Reports\Cabs folder to a virtual folder existing on a web server.

2. Modify the support URL in the MMC user interface. To modify the support URL in the MMC user interface, go to the global Properties | Reports | Support URL. Specify a new URL such as http://<web server>/<virtual folder>/StorageCentralSRM5.CAB.

Method 2

1. Create a new virtual folder on your web server.

2. Copy the StorageCentralSRM5.CAB file from the Installation Path\Reports\Cabs folder to the virtual folder.

40 StorageCentral User Guide

Page 51: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

3. From Windows Explorer, right-click the virtual folder and choose Properties | Web Sharing.

4. Select Share this folder option. Use the default name or give any alias you want.

5. Modify the support URL in the MMC user interface. To do so, go to the global Properties | Reports | Support URL. Specify a new URL such as http://<webserver>/<virtual folder>/StorageCentralSRM5.CAB.

Note: In case you have a TCP port configured on your web server and the port number is other than 80, you must specify the port number in the URL as follows: http://<web server:port number>/<new virtual folder>/StorageCentralSRM5.CAB. To test if the CAB file is located at this address, enter the URL from the Internet Explorer address bar and a file download dialog should display. Advanced users can use the Microsoft Internet Information Server console to perform the above steps.

Related Sections • For information about the support URL, read the “Reports Tab” section (page 68)

of the section "Viewing and Modifying Global Properties."

• For information about report formats, read the “Format Tab” section (page 139) of the section "Viewing and Modifying Report Set Properties.".

41

Page 52: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Verifying the Installation Although not required, VERITAS Software Corporation recommends that you verify that StorageCentral was installed and configured properly on your system. The chart below provides instructions to perform the verification.

If you installed this edition...

...do this:

Standard 1. Verify StorageCentral installed properly on your server (page 43).

Network Appliance Standard

1. Verify StorageCentral is working properly with the Network Appliance Filer to manage storage on the Filer (page 48).

2. Optionally verify StorageCentral, installed on the remote agent, is able to manage its own local storage (page 43).

Active Directory 1. Verify that the AD extended the schema properly (page 54).

2. Verify StorageCentral installed properly on your server (page 46).

Network Appliance Active Directory

1. Verify that the AD extended the schema properly (page 54).

2. Verify StorageCentral is working properly with the Network Appliance Filer to manage storage on the Filer (page 48).

3. Optionally verify StorageCentral, installed on the remote agent, is able to manage its own local storage (page 46).

42 StorageCentral User Guide

Page 53: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

For an overview of the installation process, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.

Installation Verification: Standard Edition Use this section to verify the Standard edition of StorageCentral is able to manage local storage of the server on which it is installed.

Follow each of the steps below in order.

1. Create a folder at the root of the C: drive called SC5IVP. This folder is temporary; it will not hold much data and you will delete it at the end of this procedure. Note: If you choose to not place this folder in the root of the C: drive then you must modify the references to the SC5IVP folder in the instructions that follow.

2. Start StorageCentral by double-clicking its icon on your Windows desktop.

3. Expand My Computer. It expands to list File Groups, Policies, Reports, and Managed Objects.

4. Click Managed Objects. An empty right pane (except for the heading line) displays.

5. Right-click in the right pane and choose New. The New Managed Object Wizard starts.

6. Click Next. The list of drives available displays in the Folders dialog box.

7. Expand the C: drive by clicking on the . A list of the folders located in the rootof the C: drive displays.

8. Select the box ( ) next to the SC5IVP folder. A check mark appears in the box, and the SC5IVP folder displays in the Selected Folders area.

9. Click Next. The Folder Options dialog box displays.

43

Page 54: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

10. In the Folder Policy area click the button and select 250MB limit witblocking.

h

11. Click Next. The User Options dialog box displays, but we will ignore it for this test.

12. Click Next. The Completing… dialog box displays.

13. Click Finish. In the right pane, there are now two managed objects called

C:\SC5IVP associated with your server. One has a folder icon ( ).

14. Right-click this C:\SC5IVP managed object and choose Properties.

15. Click Yes to confirm the modification of properties.

16. On the Space Allocation tab, change the Disk space limit from 250 to 5.

17. To the right of the Disk space limit field, click the button and select

18. Still on the Space Allocation tab, clear the check box next to Always save open

20. C5IVP managed object that has a shield

Kilobytes.

files.

19. Click OK to save the changes.

In the right-pane, right-click the C:\S

icon ( ) and choose Properties.

21. Click Yes to confirm the modification of properties.

ox.

the Properties dialog box.

22. Click the Alarm tab.

23. Select the Check file content check box.

24. Click the Actions button. The Actions dialog box displays.

25. On the Notification tab, select the Quarantine File check b

26. Click OK to save and return to

44 StorageCentral User Guide

Page 55: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

27. Click OK to save the changes.

28. Click OK on the dialog that identifies unavailable signatures.

29. Copy a simple text file that is less than 5 KB to the SC5IVP folder. The file

30. le text file that is larger than 5 KB to the SC5IVP folder. The copy should fail because you instructed StorageCentral to allow only 5 KB of

32. Delete the simple text file you copied to the SC5IVP folder. The folder should

33. , start.wav) into SC5IVP. This copy should fail because the policy

you applied (“250MB limit with blocking”) blocks media files, and WAV files are

35. Make a copy of the same WAV file in a folder other than SC5IVP and rename it

36. should contents as well as its filename when

Files\VERITAS\StorageCentral\5.2\Quarantine) and you will see the file you

The verification process for this edition of StorageCentral is complete. You have proved that the StorageCentral space allocation and file blocking capabilities are working.

should copy successfully.

Attempt to copy a simp

storage in that folder.

31. Click OK on the dialog box that identifies the error.

now be empty.

From the C:\WINNT\Media folder, copy a WAV file that is smaller than 5 KB (for example

media files.

34. Click OK on the dialog box that identifies the error.

such that the extension identifies it as a TXT file.

Attempt to copy this newly renamed file to the SC5IVP folder. The copy fail because StorageCentral checks a file’sdetermining if it should be blocked. Using Windows Explore, locate the Quarantine folder (usually C:\Program

attempted to copy to the SC5IVP folder.

37. Delete the SC5IVP folder and its contents.

45

Page 56: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Installation Verification: Active Directory Edition Use this section to verify the Active Directory edition of StorageCentral is able to manage local storage of the server on which it is installed.

Follow each of the steps below in order.

1. Create a folder at the root of the C: drive called SC5IVP. This folder is temporary; it will not hold much data and you will delete it at the end of this procedure. Note: If you choose to not place this folder in the root of the C: drive then you must modify the references to the SC5IVP folder in the instructions that follow.

2. Start StorageCentral by double-clicking its icon on your Windows desktop.

3. Click Managed Objects.

4. Right-click in the right pane and choose New. The Select a Computer dialog box displays.

5. Select your computer by clicking the box ( ) next to your computer name.

6. Click OK and the New Managed Object Wizard starts.

7. Click Next. The list of drives available displays in the Folders dialog box.

8. Expand the C: drive by clicking on the . A list of the folders located in the root of the C: drive displays.

9. Select the box ( ) next to the SC5IVP folder. A check mark appears in the boxand the SC5IVP folder displays in the Selected Folders area.

,

10. Click Next. The Folder Options dialog box displays.

11. In the Folder Policy area click the button and select 250MB limit with blocking.

12. Click Next. The User Options dialog box displays, but we will ignore it for this test.

46 StorageCentral User Guide

Page 57: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

13. Click Next. The Completing… dialog box displays.

14. Click Finish. In the right pane you will see two managed objects called

C:\SC5IVP for the server you are working with. One has a folder icon ( ).

15. Right-click this C:\SC5IVP managed object and choose Properties.

16. Click Yes to confirm the modification of properties.

17. On the Space Allocation tab, change the Disk space limit from 250 to 5.

18. To the right of the Disk space limit field, click the button and select Kilobytes.

19. Still on the Space Allocation tab, clear the check box next to Always save open files.

20. Click OK to save the changes.

21. In the right-pane, right-click the C:\SC5IVP managed object that has a shield

icon ( ) and choose Properties.

22. Click Yes to confirm the modification of properties.

23. Click the Alarm tab.

24. Select the Check file content check box.

25. Click the Actions button. The Actions dialog box displays.

26. On the Notification tab, select the Quarantine File check box.

27. Click OK to save and return to the Properties dialog box.

28. Click OK to save the changes.

29. Click OK on the dialog that identifies unavailable signatures.

30. Copy a simple text file that is less than 5 KB to the SC5IVP folder. The file should copy successfully.

47

Page 58: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

31. Attempt to copy a simple text file that is larger than 5 KB to the SC5IVP folder. The copy should fail because you instructed StorageCentral to allow only 5 KB of storage in that folder.

32. Click OK on the dialog box that identifies the error.

33. Delete the simple text file you copied to the SC5IVP folder. The folder should now be empty.

34. From the C:\WINNT\Media folder, copy a WAV file that is smaller than 5 KB (for example, start.wav) into SC5IVP. This copy should fail because the policy you applied (“250MB limit with blocking”) blocks media files, and WAV files are media files.

35. Click OK on the dialog box that identifies the error.

36. Make a copy of the same WAV file in a folder other than SC5IVP and rename it such that the extension identifies it as a TXT file.

37. Attempt to copy this newly renamed file to the SC5IVP folder. The copy should fail because StorageCentral checks a file’s contents as well as its filename when determining if it should be blocked. Using Windows Explore, locate the Quarantine folder (usually C:\Program Files\VERITAS\StorageCentral\5.2\Quarantine) and you will see the file you attempted to copy to the SC5IVP folder.

38. Delete the SC5IVP folder and its contents.

The verification process for this edition of StorageCentral is complete. You have proved that the StorageCentral space allocation and file blocking capabilities are working.

Installation Verification: Network Appliance Editions Use this section to verify that the Network Appliance edition (Standard or Active Directory) of StorageCentral you installed on the remote agent can manage storage on the Network Appliance Filer.

48 StorageCentral User Guide

Page 59: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Follow each of the steps below in order.

1. Using NetApp software, create a qtree on the Filer called SC5IVPQT. This qtree is temporary; it will not hold much data and you will delete it at the end of this procedure. Note: If you choose to not create a new qtree and use an existing qtree then you must modify the references to the SC5IVPQT qtree in the instructions that follow.

2. Using NetApp software, create a share named SC5IVPSHARE using the newly created qtree as the mount point.

3. Start StorageCentral by double-clicking its icon on your Windows desktop.

4. Right-click Preferred Machines and choose New | Preferred Group. The New Preferred Group Wizard starts.

5. Click Next.

6. Enter a name for this new temporary preferred group—call it IVP—and click Next. The Select Computer dialog box displays.

7. In the Computers section locate the NetApp Filer you are using and click the box ( ) next to its name. Still in the Computers section, locate the computer you are using for the remote agent and click the box next to its name. You should now see both computer names in the Selected Computers area.

8. Click Next.

9. Click Finish to exit the New Preferred Group Wizard.

10. Expand the newly created IVP group by clicking the next to its name, select the remote agent, and right-click. Select Properties.

11. Click the Network Appliance tab and you should see the name of the NetApp Filer you are working with.

49

Page 60: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

12. Click Cancel.

13. Expand the NetApp Filer by clicking the next to its name and right-click its name. Select Properties.

14. Click the Remote Agent tab and you should see the name of the remote agent you are currently working with in the Remote Agent text area. You should also see the user name—the one used during the installation.

15. Click Cancel.

16. Click the Managed Objects associated with the NetApp Filer. In the right pane you will see the existing managed objects (if any).

17. Right-click in the right pane and choose New. The New Managed Object Wizard starts.

18. Click Next. A list of volumes available displays in the Folders dialog box.

19. Expand the volume that the SC5IVPQT qtree is located on and select the box next to the SC5IVPQT folder. A check mark appears in the box, and the SC5IVPQT folder displays in the Selected Folders area.

20. Click Next. The Folder Options dialog box displays.

21. In the Folder Policy area click the button and select 250MB limit with alerts.

22. Click Next. The User Options dialog box displays, but we will ignore it for this test.

23. Click Next. The Completing… dialog box displays.

24. Click Finish. In the right pane you will see a managed object called <volume>\SC5IVPQT for the NetApp Filer you are working with. It has a folder

icon ( ) that represents the quota object.

25. Right-click the SC5IVPQT quota object and choose Properties.

26. Click Yes to confirm the modification of properties.

50 StorageCentral User Guide

Page 61: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

27. On the Space Allocation tab, change the Disk space limit from 250 to 8.

28. To the right of the Disk Space Limit field, click the button and select

29.

30. restart. Depending on the size of your filer, the restart can take many seconds.

Kilobytes.

Click OK to save the changes.

Right-click the SC5IVPQT quota object and select Quota Management | Quotas

Wait until the restart is complete. Click the refresh button ( ) repeatedly untithe Quotas Initializing message

l is replaced by a list of all the quotas on the Filer.

KB to the SC5IVPSHARE he Filer to allow only 8 KB

33. that identifies the error.

HARE folder. The folder

37.

izard

39. displays in the Folders dialog box.

40.

Note: The names may be confusing. A good practice is to keep the share names

31. Copy a simple text file that is less than 8 KB to the SC5IVPSHARE folder. The file should copy successfully.

32. Attempt to copy a simple text file that is larger than 8folder. The copy should fail because you instructed tof storage in that folder.

Click OK on the dialog box

34. Delete the simple text file you copied to the SC5IVPSshould now be empty.

35. Right-click the SC5IVPQT object and select Delete.

36. Click OK to confirm the delete.

Create a new folder called ABC in the SC5IVPSHARE folder.

38. Back in the MMC with the Managed Objects for the NetApp Filer selected, right-click in the right pane and choose New. The New Managed Object Wstarts.

Click Next. A list of volumes available

Select the volume on which the SC5IVPQT qtree is located and expand it; you will see the newly created ABC folder.

51

Page 62: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

the same as the qtree names, which are also known as the mount point names. StorageCentral is forced to use the mount point name.

pears in the box, and the folder displays in the Selected Folders area.

42. . The Folder Options dialog box displays.

41. Select the box next to the ABC folder. A check mark ap

Click Next

43. In the Folder Policy area click the button and select 250MB limit with blocking.

ut we will ignore it for this

47.

48. In the right pane you will see a managed object called It has a

44. Click Next. The User Options dialog box displays, btest.

45. Click Next. The Completing… dialog box displays.

46. Click Finish.

Click OK to the message stating that ABC is not a qtree.

<volume>\SC5IVPQT\ABC for the NetApp Filer you are working with.

shield icon ( ) that represents the file blocking object.

49. Right-click the SC5IVPQT\ABC blocking object and choose Properties.

properties.

the Quarantine File check box.

56. Click OK to save the changes.

50. Click Yes to confirm the modification of

51. Click the Alarm tab.

52. Select the Check file content check box.

53. Click the Actions button. The Actions dialog box displays.

54. On the Notification tab, select

55. Click OK to save and return to the Properties dialog box.

52 StorageCentral User Guide

Page 63: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

57. Click OK to the dialog that identifies unavailable signatures.

Until notified otherwise, you must execute the following steps from a machine other than the one on which the remote agent is running. File blocking is not available by design if the request is mad

58. IVPSHARE\ABC. This copy should fail because the policy you applied (“250MB limit with

59.

may be a bit confusing but the Filer returns an error to Windows that is consistent with the message; StorageCentral has no control over

60. Make a copy of the same WAV file in a folder other than SC5IVPSHARE\ABC

61. the SC5IVPSHARE\ABC folder. The copy will be successful because StorageCentral can only check a file’s contents after it has

62. bserve the file in the ABC folder—it will be removed shortly after it gets

k OK.

Perf

63. tine folder (usually C:\Program Files\VERITAS\StorageCentral\5.2\Quarantine) and you will see the file you

64. Delete the SC5IVPSHARE folder and its contents. Then delete the SC5IVPQT

n of StorageCentral is complete. You have proved that the NetApp Filer’s space allocation and file blocking capabilities are working and manageable through StorageCentral.

e by the remote agent.

From the C:\WINNT\Media folder, copy a WAV file into SC5

blocking”) blocks media files, and WAV files are media files.

Click OK on the dialog box (or boxes) that identifies the error. Note: The error message

the text of the message.

and rename it such that the extension identifies it as a TXT file.

Copy this newly renamed file to

been closed by the application.

Ocopied.

If you receive a Messenger Service message, clic

orm the remaining steps from the remote agent machine.

Using Windows Explore, locate the Quaran

copied to the SC5IVPSHARE\ABC folder.

qtree.

The verification process for this editio

53

Page 64: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Installation Verification: AD Extended the Schema Use this section to verify that the Active Directory schema was extended during the installation process. You will use this section only if you are installing an AD edition of StorageCentral.

Follow each of the steps below in order.

1. If necessary, install ADSI Edit by installing the AdminPak.

2. Launch ADSI Edit.

3. Right-click the ADSI Edit object, then right-click and select Connect to....

4. In the Connection Point area, select Naming Context and from its dropdown list, choose Schema.

5. Click OK.

6. Expand the schema under the ADSI Edit object.

7. Click the expanded entry CN=schema, ... and the right pane populates with entries.

8. When the right pane is fully populated, scroll to the end. The presence of the following means the Active Directory schema was properly extended:

o wQuinn-Container

o wQuinn-Value

o wQuinn-DataType

o wQuinn-String

54 StorageCentral User Guide

Page 65: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Uninstalling StorageCentral To uninstall StorageCentral, do the following:

1. From your PC’s desktop, select Start | Settings | Control Panel | Add/Remove Programs.

2. Find the StorageCentral product in the list and click it.

3. Click Remove. The system asks you to confirm that you want to uninstall StorageCentral.

4. Click Yes to confirm you want to uninstall the product. StorageCentral uninstalls, and then the system tells you the computer must be restarted to complete the uninstallation process.

5. Click Yes to restart your computer now or click No to restart your computer later.

Note: Any entities created before uninstalling StorageCentral are automatically saved. They will be available to the installation wizard the next time it is run. The StorageCentral entities are:

o Managed objects o File groups o Report sets and report definitions o Preferred machines o Audit and trend databases o Reports directory o Quarantine directory o Network Appliance Filer registry

Related Sections For an overview of the installation process, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.

55

Page 66: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Silent Installation Administrators can script automatic installations of the software by creating a batch file that inputs all basic information that would occur during a monitored installation.

Notes: This installation requires one reboot of the server. The silent install process does not support the installation of the Web UI. The silent install does not provide the option to populate the Active Directory; therefore, it must not be used until the Active Directory has been populated.

Creating the msibuild.bat File To run the silent installation procedure, do the following:

1. Use the installation worksheet (page 29) to gather the information you will provide when you run the installation utility (below).

2. Copy the SC5SilentInstall.exe utility from the installation CD (at 5.2/STDEdition) to a folder on your hard drive. You may see other copies of this utility—they are identical. You must execute the utility from your hard drive and not the CD because it generates a file that is placed in the folder from which it is run.

3. Copy the companion DLLs named SC5InstallUtility.dll and gwinsock.dll to the same folder on your hard drive.

4. Execute the installation utility.

5. Enter the required information on the dialog box that displays. (This is the information you would normally enter during an attended installation.) Then click Generate. The resulting file, msibuild.bat, together with the appropriate product’s .msi file

56 StorageCentral User Guide

Page 67: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

(located on the CD), must be used in conjunction with the software distribution package you have at your disposal.

6. Edit the msibuild.bat file.

o If you are installing an AD edition of StorageCentral, add this property before the /qn command: COMPUTERPOLICIES="computer-policy-name" where computer-policy-name is the name of the computer policy you want to apply to the computer you are installing.

o If you want the install to perform the required reboot, remove the REBOOT=“ReallySuppress” property. This will cause the server to reboot automatically after install is complete. The server will boot to the Logon screen.

Note: During a silent installation, StorageCentral automatically selects (that is, carries forward) any entities it detects. This means any entities created when StorageCentral was used after a previous installation are available after the silent installation. The StorageCentral entities are:

o Managed objects o File groups o Report sets and report definitions o Preferred machines o Audit and trend databases o Reports directory o Quarantine directory o Network Appliance Filer registry

Executing the msibuild.bat File To execute the silent install, you can either run it from Start | Run or from the command prompt (Start | Programs | Accessories | Command Prompt).

Do the following:

1. Change the directory to the folder that contains the batch file and .msi file.

57

Page 68: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

2. If you are performing a silent upgrade, copy the file StorageCentralQFE.bat from the installation CD to the folder you just changed to.

3. Type msibuild.bat and press Enter. For example: D:\Silent\msibuild.bat

The install begins. You will not see any prompts or windows pop up. However, you will see the entire batch command in the command prompt window. By default, the server will not reboot.

For information about the commands and switches you may use to customize your msibuild.bat file, go to this web site:

http://www.microsoft.com/technet/treeview/default.asp?url=/TechNet/prodtechnol/winxppro/proddocs/sag_WinInstall_Command_Line_Syntax.asp

Related Section “Silent Uninstallation” (page 59)

58 StorageCentral User Guide

Page 69: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Silent Uninstallation To run the silent uninstallation procedure, do the following:

1. Copy the SC5SilentUninstall.exe utility from the installation CD (at 5.2/STDEdition) to a folder on your hard drive. You may see other copies of this utility—they are identical. You must execute the utility from your hard drive and not the CD because it generates a file that is placed in the folder from which it is run.

2. Execute the SC5SilentUninstall.exe utility and answer the questions that StorageCentral asks. StorageCentral then builds the msiuninstall.bat file.

This msiuninstall.bat file, together with the appropriate product’s .msi file (located on the CD), must be used in conjunction with the software distribution package you have at your disposal.

Related Section “Silent Installation” (page 56)

59

Page 70: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Converting Microsoft Access and Microsoft SQL Server Databases to Run Under StorageCentral 5.2

StorageCentral 5.2 supports Unicode. To take advantage of this support, you must convert your audit and trend data, whether they are stored in Microsoft Access or Microsoft SQL Server.

This section provides instructions for converting your Access or SQL Server database to run under StorageCentral 5.2.

If Your Data is In Microsoft Access If your data is already stored in Access 2000 format, you need take no action. StorageCentral 5.2 will be able to store Unicode data in the Access database.

If your data is stored in Access 97 format and you do not want to take advantage of the StorageCentral 5.2 Unicode support, you need take no action. All versions of StorageCentral will be able to access the database, but StorageCentral 5.2 will be unable to store Unicode data in the Access database.

If your data is stored in Access 97 format and you want to take advantage of the StorageCentral 5.2 Unicode support, do the following:

1. Upgrade StorageCentral to version 5.2.

2. Manually convert the Access database from 97 to 2000 format.

All versions of StorageCentral will be able to access the database, and StorageCentral 5.2 will be able to store Unicode data in the Access database.

If Your Data is In SQL Server If you do not want to take advantage of the StorageCentral 5.2 Unicode support, you need take no action. All versions of StorageCentral will be able to access the database, but StorageCentral 5.2 will be unable to store Unicode data in SQL Server.

60 StorageCentral User Guide

Page 71: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

If your data is stored in Access 97 format and you want to take advantage of the StorageCentral 5.2 Unicode support, follow the steps below.

1. Upgrade StorageCentral to version 5.2.

2. Copy the files SCSQL.bat and SCSRMDB2U.sql from the <install-directory>\DB directory of the computer on which StorageCentral is installed to the computer on which SQL Server is installed. SCSRMDB2U.sql contains SQL statements that the conversion program, SCSQL.bat, uses.

3. Convert the SQL Server data by typing the following: SCSQL /c username password where username is an account that can create databases, tables, and indexes, and password is the password for this account.

StorageCentral 5.2 will be able to access SQL Server and store Unicode data there. However, StorageCentral 5.0 will be unable to access the database.

Related Sections For an overview of the installation process, read the section “Introduction to the Installation Process” at the beginning of Chapter 2.

61

Page 72: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

62 StorageCentral User Guide

Page 73: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter 3. Using StorageCentral

Viewing and Modifying Global Properties The Properties dialog box presents tabs that allow you to configure global properties for an individual machine (or OU when supporting Active Directory).

You will not always see all the tabs. Which tabs display is a function of what computer you are working on and which edition of StorageCentral is installed on the computer. The chart below summarizes under what conditions you will see each tab.

Tab See page number

Non-NetApp Computer

Remote Agent for a NetApp Filer

NetApp Filer

Audit 64 X X Event Log 64 X X File Blocking 65 X X X Mail 66 X X X Network Appliance 68 X Remote Agent 68 X Reports 68 X X X Space Allocation 69 X X SQL Server 70 X X Trending 70 X X X Version 71 X X

To view and modify global properties:

1. On the management pane, highlight My Computer, an OU, domain, or a preferred machine. Then right-click and choose Properties. The Properties dialog box displays. The remaining sections in this section describe the tabs on this dialog box.

2. View and modify properties as required.

63

Page 74: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

3. Click OK to modify the properties -or- click Cancel to discard modifications.

Audit Tab Period The number of days StorageCentral keeps the audit data. A value of 0

specifies that StorageCentral is to keep the data indefinitely. Setting a long retention period causes StorageCentral to use more disk space for storing data.

For additional information about audit data, read the section “Introduction to Audit Data” on page 156.

Event Log Tab On the Event Log tab you can specify which events will generate a record in the Microsoft application event log.

Space Allocation

Action Comment Creating an Object Select this action if you want StorageCentral to create a record

in the application event log when a space allocation managed object is created.

Modifying an Object's Properties

Select this action if you want StorageCentral to create a record in the application event log when a space allocation managed object is modified.

Deleting an Object Select this action if you want StorageCentral to create a record in the application event log when a space allocation managed object is deleted.

StorageCentral defaults to creating a record in the application event log for each space allocation action.

64 StorageCentral User Guide

Page 75: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

File Blocking

Action Comment Creating an Object Select this action if you want StorageCentral to create a record

in the application event log when a file blocking managed object is created.

Modifying an Object's Properties

Select this action if you want StorageCentral to create a record in the application event log when a file blocking managed object is modified.

Deleting an Object Select this action if you want StorageCentral to create a record in the application event log when a file blocking managed object is deleted.

StorageCentral defaults to not creating a record in the application event log for any file blocking action.

For more information about event log, read the section “Application Event Log” on page 187.

File Blocking Tab Quarantine file location

Applicable only to file content blocking. The blocked file will be placed in a quarantine folder. You can modify the location for quarantined files.

65

Page 76: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Excluded users and groups

Users and/or groups globally excluded from being blocked for any types of files. Click Add to select users and groups to exclude. The exclusion is implemented on a server-wide basis. For example, if an object is blocked for graphics files, but you would like "Domain Admins" to be excluded from the screen, add the group "Domain Admins" to the excluded users and groups list. Notes You can exclude by user and by group on non-Network Appliance computers; you can exclude only by user on Network Appliance computers. If the quarantine option is not selected and/or the file location is not provided, the blocked file will be deleted.

Mail Tab StorageCentral can use e-mail to notify you when an alarm goes off and to send you reports.

On the Mail tab you can specify the parameters that enable StorageCentral to use e-mail: Exchange mail settings, SMTP mail settings, and whether it is to use Active Directory for e-mail.

Exchange Mail Settings

Profile The Microsoft Exchange profile to be used when the address book is required.

Password The Exchange password (if required).

66 StorageCentral User Guide

Page 77: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

SMTP Mail Settings

You must specify a mail server and mail sender if you want to perform the following actions:

• E-mail alarm notifications. To have StorageCentral e-mail an alarm notification, you must fill in the Mail To field, or Mail To and Mail CC fields, of an alarm's Notification tab.

• E-mail reports from alarm actions. To have StorageCentral e-mail a report from an alarm action, you must fill in the Mail To field, or Mail To and Mail CC fields, of an alarm's Report tab.

• E-mail interactive reports after they run. To have StorageCentral e-mail an interactive report after it runs, you must fill in the Mail the report to the following email address field on the Output tab of a report set's properties dialog box.

• E-mail batch reports after they run. To have StorageCentral e-mail a batch report after it runs, you must fill in the Mail To field, or Mail To and Mail CC fields, after pressing the Mail button on the Run Report dialog box.

Mail Server

SMTP server, from which e-mail alerts and reports are sent

Mail Sender

From address in e-mail. You may need to provide the sender's login ID (for example, DJones) or the sender's e-mail address (for example, [email protected]).

Password E-mail password

Using Active Directory for E-mail

If you want StorageCentral to retrieve the e-mail address from Active Directory, select the Use Active Directory for email check box. This helps send notification messages through alarm actions.

If you want StorageCentral to not retrieve the e-mail address using Active Directory, leave the check box clear.

67

Page 78: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Network Appliance Tab On this tab you can add and delete Network Appliance Filers from the list of known Filers.

To add a Filer, do the following:

1. Click Add. The Select Computer dialog box displays.

2. Identify a Network Appliance Filer by doing one of the following:

o Typing its fully qualified path name in the box

o Clicking the browse (...) button, finding the Filer using the Browse for Computer dialog box, and clicking OK

3. Click OK on the Select Computer dialog box.

To delete a Filer from the list, highlight a Filer in the list and click Remove.

Remote Agent Tab User name The user name you use to access the Network Appliance

remote agent. Password and Confirm Password

The password associated with the user name.

Reports Tab Exclude OS files OS files are excluded from reports Exclude DLL files DLL files are excluded from reports Exclude Administrators

Administrator files are excluded from reports

Include user shares User shares included in reports

68 StorageCentral User Guide

Page 79: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Include Administrator shares

Administrator shares included in reports

Report output folder Folder where reports and batch files will be saved. If no value is specified, reports and batch files are stored in the StorageCentral \Reports folder.

Support URL URL for downloading ActiveReports component used in Active HTML reports. For information about customizing the ActiveReports component, read the section “Customizing the ActiveReports Component (CAB File)” on page 40.

Cost per GB This value is used in the Chargeback by Account Number report to charge back the departments (OUs) within the company for the cost of storage and for its maintenance. $80 per GB is a default setting that can be changed. For additional details, see the description of the Chargeback by Account Number report; this description is located on the Description tab of the report's Properties dialog box.

Account code Any AD field to total on (Department is a default). AD fields are supported in Active Directory editions only. For additional details, see the description of the Chargeback by Account Number report; this description is located on the Description tab of the report's Properties dialog box.

Space Allocation Tab Auto detect disks Mounted drives can automatically be detected and a storage

management policy can be applied to ensure data protection. Use policy The managed object policy to use for auto detection of disks. Allow active limit on devices

This option allows the users to set an active space limit on partitions (non-system disks). This check box is not selected by default. Use this option with caution because an active limit on devices will enforce a device space limit.

69

Page 80: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Minimum limit The smallest limit (in bytes) given to a managed object during auto detection operations. Enter a minimum space limit amount if a policy is not selected from the Use policy drop-down list. Use policy is linked to the Apply Policy option in Auto detection Settings in the Managed Objects. If the Apply Policy is left blank, the value in the Minimum limit box will be used.

SQL Server Tab If you want to store StorageCentral audit and trend data in Microsoft SQL Server (rather than in the default Microsoft Access database), you will provide the values below as you follow the instructions in the section “Configuring SQL Server Support” on page 202.

User The SQL Server user name Password The password associated with the user name

Trending Tab Enable collection

Enables space allocation collection. At trend intervals, managed object information will be saved to a database. You may run trend reports to view the trend information from the database.

Start Time Time data should start to be collected Collection Interval

Time interval between space allocation collections

Period The number of days StorageCentral keeps the trend data. A value of 0 specifies that StorageCentral is to keep the data indefinitely. Setting a long retention period causes StorageCentral to use more disk space for storing data.

For additional information about trend data and how to report on it, read the section “Trending” on page 232.

70 StorageCentral User Guide

Page 81: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Version Tab On this tab you can do the following:

• View product version information.

• View technical support information.

• Enter a new license key. VERITAS Software Corporation supplies you with a new license key after you upgrade your existing license; you must then enter the new license key on this tab.

• View the property level. (This field displays only if you are running an Active Directory edition of StorageCentral.) The value in this field tells you from where your computer is getting its properties; the properties can come from your computer, your OU, or the domain.

Related Sections For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

71

Page 82: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Policies

Introduction to Policies StorageCentral provides two types of policies: managed object policies and computer policies.

• A managed object policy is a set of space allocation and/or file blocking properties that define a managed object, such as a drive or folder. To learn more about this type of policy, read the section “Introduction to Managed Object Policies” on page 72.

• A computer policy is a "policy for applying managed object policies to servers." A computer policy includes devices, folders under these devices, and managed object policies. When a computer policy is applied to a server, the included managed object policies are applied to the devices and folders on that server. To learn more about this type of policy, read the section “Introduction to Computer Policies” on page 85.

Managed Object Policies

Introduction to Managed Object Policies

Managed object policies are available for use with managed objects, such as drives or folders. A managed object policy can contain both space allocation and file blocking properties. Predefined managed object policies are shipped with the product, but you can also create custom polices.

Both predefined and custom policies can be selected when creating a managed object. This not only saves time but decreases the chance for clerical errors because the policy properties are only entered once and the policy can be applied to multiple managed objects.

72 StorageCentral User Guide

Page 83: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Optionally, you can automatically propagate policy changes to managed objects that are using that policy.

For managed object policies, you can:

• Create a new policy

• Create a transparent policy

• Delete a policy

• Copy a policy

• Rename a policy

• View and modify the properties of a policy

Related Sections “Creating a New Managed Object Policy” (page 73) “Deleting a Managed Object Policy” (page 78) “Copying a Managed Object Policy” (page 78) “Renaming a Managed Object Policy” (page 79) “Viewing and Modifying Managed Object Policy Properties” (page 79) “Transparent Policies” (page 84)

“Space Allocation Options” (page 229) provides explanations of the options you can select when creating or modifying the space allocation properties of a managed object policy.

“Introduction to Computer Policies” (page 85) is an introduction to policies for computers.

Creating a New Managed Object Policy

This section assists you in using the New Policy Wizard, which enables you to create a managed object policy that has space allocation and/or file blocking properties associated with it.

73

Page 84: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

To start the New Policy Wizard, do the following:

On the management pane, highlight Policies, right-click, and click New | Managed Object Policy.

The New Policy Wizard starts. The remainder of this section explains how to use the wizard’s dialog boxes.

The New Policy Wizard The dialog boxes presented in this section are:

• Policy Name (page 74)

• Policy Attributes (page 74)

• Policy Preferences (page 75)

• Set Space Allocation (page 75)

• Space Allocation Alarm n (page 76)

• File Groups (page 76)

• File Blocking Alarm (page 77)

• File Blocking Filter (page 77)

Not every dialog box documented in this section will display; your choice on the Policy Attributes dialog box determines which dialog boxes display later in the wizard.

Policy Name Dialog Box Use the Policy Name dialog box to name the managed object policy you are creating. Do not use these characters in the policy name: + # = ; : , /

Policy Attributes Dialog Box Use the Policy Attributes dialog box to specify if the managed object policy you are creating is to contain space allocation properties, file blocking properties, or both.

74 StorageCentral User Guide

Page 85: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Policy Preferences Dialog Box On the Policy Preferences dialog box, do the following:

• Specify if the policy is to propagate changes to managed objects, or be a transparent policy (a maintenance policy), or neither. See the sections “Managed Object Policy Propagation” (page 83) and “Transparent Policies” (page 84) for additional information.

• Optionally associate a user or group with the policy.

Set Space Allocation Dialog Box This dialog box displays if you selected the Space allocation check box on the Policy Attributes dialog box.

On the Set Space Allocation dialog box, do the following:

• Enter the disk space limit and specify a qualifier -- that is, a unit of size (such as megabytes) or the percentage of something (such as percentage of space currently being used) -- from the drop-down list. The disk space limit determines the maximum amount of space the managed object may use. On a Network Appliance Filer, the disk space limit must be 1 K or larger. For additional information, read the section “Limitations” (page 174) in the section "Space Allocation and Network Appliance Filers." For information about disk space limits, read the section “Disk Space Limit” on page 218.

• Enter the overdraft limit and specify a qualifier from the drop-down list. The overdraft limit is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The overdraft limit does not apply if the managed object resides on a Network Appliance Filer. For more information about overdraft limits, read the section “Overdraft Limit” on page 227.

75

Page 86: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Select the space allocation options you want. Read the section “Space Allocation Options” on page 229 for an explanation of these options. The options marked with an asterisk do not apply if the managed object resides on a Network Appliance Filer.

Space Allocation Alarm Dialog Boxes These dialog boxes display if you selected the Space allocation check box on the Policy Attributes dialog box.

There are multiple space allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.

On the alarm setting dialog boxes (Space Allocation Alarm 1, Space Allocation Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” on page 211 for an explanation of the information you can provide on the alarm setting dialog boxes.

• Enter information about the alarm’s threshold.

• Click Actions to add the following information about the alarm:

o Notification

o Execute

o Report

o Extend

File Groups Dialog Box This dialog box displays if you selected the File blocking check box on the Policy Attributes dialog box.

On the File Groups dialog box, check a file group(s) to specify that StorageCentral should block (or not block) the file types specified in that file group.

For an introduction to working with file groups, read the section “Introduction to File Groups” on page 110.

76 StorageCentral User Guide

Page 87: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

File Blocking Alarm Dialog Box This dialog box displays if you selected the File blocking check box on the Policy Attributes dialog box.

On the File Blocking Alarm dialog box, enter information about the file blocking alarm. Read the section “Description of File Blocking Alarm Settings” on page 205 for an explanation of the information you can provide on the dialog box.

• Specify one or more blocking options.

• Click Actions to add the following information about the alarm:

o Notification

o Execute

o Report

File Blocking Filter Dialog Box This dialog box displays if you selected the File blocking check box on the Policy Attributes dialog box.

On the File Blocking Filter dialog box, optionally specify folders to include and exclude from the file-blocking process. Use these buttons:

Add folders to the list.

Remove folders from the list.

and Move folders up and down in the list. The order of the folders does not affect the way StorageCentral processes them; ordering them is for your convenience only.

Related Sections • For an introduction to managed objects, read the section “Introduction to

Managed Objects” on page 90.

77

Page 88: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• For an explanation of space allocation, read the section “Types of Space Allocation” on page 234.

• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

• Other related sections:

“Include and Exclude Filters” (page 219) “Group Associations” (page 220)

Deleting a Managed Object Policy

To delete a managed object policy:

1. On the management pane, expand Policies.

2. Highlight the policy to delete and right-click. Click Delete. A message displays prompting for confirmation.

3. Click Yes to delete the policy.

Copying a Managed Object Policy

To copy a managed object policy:

1. On the management pane, highlight Policies.

2. In the details pane, right-click the policy you want to copy. Choose Copy.

3. Right-click in the details pane and choose Paste. A new managed object policy, named "Copy of <policy you selected>", displays in the list.

4. Rename the new policy by right-clicking it and choosing Rename, entering the new name in the text field, and pressing Enter.

78 StorageCentral User Guide

Page 89: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

5. Change the properties of the new policy as appropriate. See page 79 for additional information.

Renaming a Managed Object Policy

To rename a managed object policy:

1. On the management pane, expand Policies.

2. Highlight the policy to rename and right-click. Click Rename.

3. Enter the new name in the text field and press Enter.

Viewing and Modifying Managed Object Policy Properties

This section assists you in viewing and modifying the properties of a managed object policy.

Note: If you are a non-administrative user, you can modify the properties only if you have "Full Control" permission. For more information, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.

To view or modify a managed object policy’s properties, do the following:

1. On the management pane, expand Policies.

2. Click a policy.

3. In the details pane, double-click Allocation, Blocking, or Preferences. If a policy does not have that type of property associated with it, you are given the option to add that type (allocation or blocking) of information.

79

Page 90: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Allocation Properties If you select the allocation icon, StorageCentral presents you with the Allocation Properties dialog box containing these tabs:

• Space Limit

• Alarm n

You may view or modify the properties specified on these tabs.

Space Limit Tab On the Space Limit tab, do the following:

• Enter the disk space limit and specify a qualifier—that is, a unit of size (such as megabytes) or the percentage of something (such as percentage of space currently being used)—from the drop-down list. The disk space limit determines the maximum amount of space the managed object may use. On a Network Appliance Filer, the disk space limit must be 1 K or larger. For additional information, read the section “Limitations” (page 174) in the section "Space Allocation and Network Appliance Filers." For information about disk space limits, read the section “Disk Space Limit” on page 218.

• Enter the overdraft limit and specify a qualifier from the drop-down list. The overdraft limit is the amount of space by which the disk space limit can be exceeded before enforces the disk space limit. The overdraft limit does not apply if the managed object resides on a Network Appliance Filer. For more information about overdraft limits, read the section “Overdraft Limit” on page 227.

• Select the space allocation options you want. Read the section “Space Allocation Options” on page 229 for an explanation of these options. The options marked with an asterisk do not apply if the managed object resides on a Network Appliance Filer.

80 StorageCentral User Guide

Page 91: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Alarm Tabs There are multiple space allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.

On the alarm tabs (Alarm 1, Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” on page 211 for an explanation of the information you can provide on the alarm tabs.

• Enter information about the alarm’s threshold.

• Click Actions to add the following information about the alarm:

o Notification

o Execute

o Report

o Extend

File Blocking Properties If you select the file blocking icon, StorageCentral presents you with the Blocking dialog box containing these tabs:

• Groups

• Alarm

• Filters

You may view or modify the properties specified on these tabs.

Groups Tab On the Groups tab, check a file group(s) to specify that should block (or not block) the file types specified in that file group.

For an introduction to working with file groups, read the section “Introduction to File Groups” on page 110.

81

Page 92: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Alarm Tab On the Alarm tab, enter information about the file blocking alarm. Read the section “Description of File Blocking Alarm Settings” on page 205 for an explanation of the information you can provide on the tab.

• Specify one or more blocking options.

• Click Actions to add the following information about the alarm:

o Notification

o Execute

o Report

Filters Tab On the Filters tab, optionally specify folders to include and exclude from the file-blocking process. Use these buttons:

Add folders to the list.

Remove folders from the list.

and Move folders up and down in the list. The order of the folders does not affect the way processes them; ordering them is for your convenience only.

Preferences If you select the preferences icon, StorageCentral presents you with the Preferences Properties dialog box containing the Preferences tab.

On this tab you may do the following:

• Specify if the policy is to propagate changes to managed objects, or be a transparent policy (a maintenance policy), or neither.

82 StorageCentral User Guide

Page 93: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

See the sections “Managed Object Policy Propagation” (page 83) and “Transparent Policies” (page 84) for additional information.

• Optionally associate a user or group with the policy.

Related Sections • For an introduction to managed object policies, read the section “Introduction to

Managed Object Policies” on page 72.

• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

• Other related sections:

“Include and Exclude Filters” (page 219) “Group Associations” (page 220)

Managed Object Policy Propagation

You can select to propagate policy properties to associated managed objects. For propagation to function correctly, the policy propagation option must be selected before the policy is used in the creation of a managed object or applied to a managed object.

After the policy and managed object are associated, all changes to the policy will be reflected in the managed object. However, if the properties of a managed object are modified, the associated policy and the managed object will no longer be linked and the association will be removed.

During policy propagation, if there is an auto detect object on the folder, no space allocation object will be created on that folder.

Related Sections • “Creating a New Managed Object Policy” (page 73)

• “Viewing and Modifying Managed Object Policy Properties” (page 79)

83

Page 94: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Transparent Policies

A transparent policy is a maintenance policy you use to make individual changes to policies that have been applied to multiple existing managed objects. A transparent policy allows you to change the properties you do want changed and ignore properties you do not want changed.

For example, say you have several managed objects, each having different space allocation property values. You could unselect the "reset high-water mark" option on each of the policies by using a transparent policy without changing the properties that differ from policy to policy. The transparent policy allows you to sensitize (turn on) the policy properties you want to change, and ignore (turn off) those you do not want to change.

When applied to existing policies, only the properties turned on in the transparent policy will be modified. When creating a transparent policy, the check boxes next to the fields are used to turn on or turn off a field. A field with a check box means the field is set to transparent, and that field will be ignored when the transparent policy is applied. That field is also grayed out.

Transparent polices are created the same way as "regular" managed object policies. However, when creating a transparent policy, the leftmost check boxes are used to indicate which properties to use or ignore. Selecting a check box for a field indicates that the field is set to transparent and that field will be ignored when the policy is applied.

The New Policy Wizard allows you to specify that the policy is to be transparent on the Policy Preferences dialog box. Be sure the Transparent Policy check box is selected. This sets all properties to transparent, allowing you to sensitize only the desired properties.

Related Sections • “Creating a New Managed Object Policy” (page 73)

84 StorageCentral User Guide

Page 95: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Computer Policies

Introduction to Computer Policies

Computer policies are a very valuable feature, especially with large deployments. A computer policy is a "policy for applying managed object policies to servers." When a computer policy is applied to a server, the included managed object policies are applied to the devices and folders on that server.

Computer policies consist of the following properties: policy name, devices to apply the policy to, folders within the device to apply policies to, and actions such as auto detect disks, auto detect folders, and folder policies.

Define computer policies and then apply computer policies to servers.

For computer policies, you may:

• Create a new policy

• Delete a policy

• View and modify the properties of a policy

• Apply a computer policy

Notes:

• When you use an Active Directory edition of StorageCentral, you can use computer policies to implement policies across the enterprise very quickly.

• Blocking rules are placed on the folder itself, not on the children. With blocking rules, "auto detect folders" and "apply to folder" are treated identically, meaning the blocking rule is placed on the parent folder only.

• Computer policies currently do not have mount point support. This feature will be included in the future.

85

Page 96: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections “Creating a New Computer Policy” (page 86) “Deleting a Computer Policy” (page 87) “Viewing and Modifying Computer Policy Properties” (page 88) “Applying a Computer Policy” (page 88) “Introduction to Managed Object Policies” (page 72) is an introduction to policies for managed objects.

Creating a New Computer Policy

To create a computer policy:

1. On the management pane, highlight Policies and right-click. Click New, then click Computer Policy -or- on the details pane, right-click. Click New, then click Computer Policy -or- expand Polices, highlight Computer Policies, right-click and click New, click Computer Policy.

2. The Welcome dialog box for the New Policy Wizard displays. Click Next.

3. On the Policy Name dialog box, enter a name for the computer policy you are creating. Do not use the following characters in the computer policy name: + # = ; : , /

4. Click Next.

5. On the Select Devices dialog box, select the devices to include and exclude from the computer policy. Click Next.

6. On the Select Folders dialog box, enter folder names to include for each selected device. Click Next.

7. Select a device policy (optional) and the policy to use when automatically detecting mounted drives.

8. Select policies to use for folders and/or a policy used when subfolders are automatically detected. Click Next.

9. Select report sets and collector information.

86 StorageCentral User Guide

Page 97: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

10. Click Schedule to enter schedule information for the reports including schedule interval, time of day, days of week, and days of month. Click OK.

11. Click Next.

12. The Completing the New Policy Wizard dialog box displays. Click Finish to create the computer policy.

Related Sections “Introduction to Computer Policies” (page 85) “Deleting a Computer Policy” (page 87) “Viewing and Modifying Computer Policy Properties” (page 88) “Applying a Computer Policy” (page 88)

Deleting a Computer Policy

To delete a computer policy:

1. On the management pane, expand Computer Policies.

2. On the details pane, highlight the computer policy to delete and right-click. Click Delete.

3. A message displays prompting for confirmation.

4. Click Yes to delete the computer policy.

Related Sections “Introduction to Computer Policies” (page 85) “Creating a New Computer Policy” (page 86) “Viewing and Modifying Computer Policy Properties” (page 88) “Applying a Computer Policy” (page 88)

87

Page 98: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Viewing and Modifying Computer Policy Properties

To view or modify computer policy properties:

1. On the management pane, expand Policies. Click Computer Policies.

2. On the details pane, highlight a computer policy and right-click. Click Properties or double-click on the computer policy.

3. View and modify as many properties as required.

4. Click OK to modify the properties -or- click Cancel to return to the details pane.

Related Sections “Introduction to Computer Policies” (page 85) “Creating a New Computer Policy” (page 86) “Deleting a Computer Policy” (page 87) “Applying a Computer Policy” (page 88)

Applying a Computer Policy

To apply a computer policy to a server:

1. On the management pane, select a server to apply a policy to, right-click, and click Apply Computer Policy.

2. The Select Computers dialog displays if the Apply option is selected at the OU level. Select computers where to apply policy. Click OK.

3. On the Select Computer Policy dialog, select computer policies to apply.

4. Click OK to apply the computer policy.

Notes: If the managed objects do not exist, they are created and the actions specified in the policy are applied to each new managed object. If the "Create folder" option is selected, the folder is created before the managed object is created. If the managed object already exists, the managed object is not created.

88 StorageCentral User Guide

Page 99: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections “Introduction to Computer Policies” (page 85) “Creating a New Computer Policy” (page 86) “Deleting a Computer Policy” (page 87) “Viewing and Modifying Computer Policy Properties” (page 88)

89

Page 100: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Managed Objects

Introduction to Managed Objects This section contains these sections:

• An introduction to managed objects

• An explanation of the managed objects details pane (page 91)

• Instructions to refresh the managed object database (page 94)

• Instructions to run a report against a managed object (page 95)

• Instructions to control the number of entries that StorageCentral sends to the application event log (page 95)

Overview

Managed objects are objects with a space allocation and/or file blocking policies associated with them. A managed object may consist of a file, directory, share, or partition. When using AD, objects may be managed for an OU, Site, or Domain.

When you choose Managed Objects from the management pane, a list of the managed objects displays in the details pane. You may do the following:

• Create and delete managed objects

• View and modify the properties of a managed object

• Set the frequency with which StorageCentral automatically refreshes the contents of the details pane

• Control the appearance of the grid

90 StorageCentral User Guide

Page 101: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Specify the contents of the grid

• Run a report against a managed object

• Apply a policy to a managed object

• On Network Appliance Filers: Turn quotas on and off, resize quotas, and restart quotas

Managed Object Details Pane

For each managed object, the following fields display in the grid in the details pane:

Field Description High-water The highest amount of disk space limit that was ever used on a

particular managed object even if files were deleted Managed Object

Managed object name (folder name) The column header changes to "Managed Object (Filtered)" if you apply a filter to the grid as described in the section “Filtering the Contents of the Managed Object Grid,” below. If a Network Appliance Filer is not online, a row displays with a managed object of volume-name — status. Read more about this in the section "Network Appliance Filers and the Grid," below.

Mode Indicates whether space allocation or file blocking is enforced. Valid values are Active and Passive.

% Used Percentage used of the space limit: o Red: 90 – 100 o Yellow: 60 – 89 o Green: 0 – 59

Policy Name of policy applied to a managed object Server Name of the server where a managed object is located Space Limit Maximum amount of space that can be used for a managed object Space Used Space actually used by a managed object

91

Page 102: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Field Description Type Type of managed object:

— folder space allocation

— user space allocation

— auto detect subfolders

— auto detect all users

— file blocking

User Owner of the managed object

Sorting the Display You can sort on any of these columns by clicking the column header.

Sel nFollow

2.

in the managed object grid.

e details pane.

grid layout with the original

ecti g Columns to Display in the Managed Object Grid these steps:

1. On the details pane, right-click and select Choose Columns.

Select columns to display from the list.

3. Use the Move Up and Move Down buttons to reorder the columns. The first column in the list will be the left-most column

4. Click OK to accept the selected columns and order -or- click Cancel to discard the selections and return to th

Note: Use the Restore button to revert back to the originalcolumns and column order selected.

92 StorageCentral User Guide

Page 103: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Filtering the Contents of the Managed Object Grid You can filter the contents of the grid so that only those managed objects that meet spe

Follow

3. Select filter options including allocation fields to filter on and a range of values.

4. Click the Advanced button to enter advanced filter options. From here, you can fi e.

5. C

Notes:

grid, the header of the managed objects . You

Network Appliance Filers and the Grid

For example: You have defined a folder named Accounting on volume Prime on your

w labeled

at a volume is initializing by displaying a row with ializing”. After the managed object has

is replaced with rows for the managed objects on that volume.

cific criteria will display.

these steps:

1. On the details pane, right-click in the blank area and click Filter Objects.

2. Select one or more object types you want to see such as folder limit or blocking.

lter by policy name, user name, server name, or mod

lick OK to apply the filter.

Click Restore to revert to the original filter options.

When you filter the contents of thecolumn changes from "Managed Object" to "Managed Object (Filtered)"may need to widen the column to see this entire header.

The grid does not present space allocation or file-blocking managed objects for a Network Appliance Filer volume that is not online. Instead, you see a row with a managed object of volume-name — status.

Network Appliance Filer to have file blocking properties. If Prime is online, you see a row labeled Prime\Accounting. However, if this volume is offline, you see a roPrime — Offline.

Additionally, the grid informs you th-name — quota initthe message “volume

initialized, the row

93

Page 104: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

VieDo the f

1. On the details pane, right-click a managed object in the grid and click Explorer.

2. The Windows Explorer window displays. The selected managed object is e selected folder can be viewed

Refreshing the Managed Object Database

aged t an

Automatically To smanage

1. On the details pane, right-click and select Auto Refresh Frequency.

tes nges.

ManuaManually refreshing the display does not recreate the object, it just recalculates the curr t

• To refresh specific managed objects, go to the details pane and select one or more managed objects. Then right-click and choose Scan.

wing the Contents of a Folder ollowing:

highlighted on the left pane. The contents of thon the right pane.

Usage information about the managed object is stored in a database when the manobject is created. Data about the managed object may be refreshed automatically ainterval you specify, or manually whenever you want.

et the frequency with which StorageCentral automatically refreshes the list of d objects displayed in the grid, follow these steps:

2. On the Auto Refresh Frequency dialog box, use the up and down arrows to adjust the time values in minutes and seconds. The default value is 15 minu00 seconds. Click OK to save your cha

lly

en space limit and updates the database.

• To refresh all managed objects, click the refresh button ( ).

94 StorageCentral User Guide

Page 105: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Running a Report Against a Managed Object

To run a report against a managed object, right-click the managed object in the gridchoose Run Report. The Run Report dialog box displ

and ays.

For Set” on

Managed Objects and the Microsoft Application Event Log

You can ft app g by following these instructions:

2. Click the Event Log tab.

nt to generate a record in the event log.

4.

See the Viewing and Modifying Global Properties” for additional information.

Related Sect

• To find from the mana g the Filer from StorageCentral” (page 171). With these commands you can turn a Filer's quotas on or off, and you can resize and restart quotas.

eleting a Managed Object” (page 103)

an explanation of the Run Report dialog box, read the section “Running a Report page 143.

control how much information StorageCentral writes to the Microsolication event lo

1. On the StorageCentral management pane, highlight My Computer, an OU, or a preferred machine. Then right-click and choose Properties. The Properties dialog box displays.

3. Select the actions you wa

Click OK.

section “Event Log Tab” (page 64) in the section “

ions

out how you can issue simple Network Appliance Filer commandsged object details pane, read the section “Controllin

• Other related sections:

“Creating a New Managed Object” (page 96) “D

95

Page 106: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

“Viewing and Modifying Managed Object Properties” (page 103) “Applying a Policy to a Managed Object” (page 108)

Creating a New Managed Object This sec ch enables you to create a managed object that has space allocation and/or file blocking properties asso

To start ged Object Wizard, do the following:

1. On mNew -or- In the managed object details pane, right-click and click New.

2. log box displays if the managed object you want to identify could reside on more than one computer. For example, you see this

o You are running an Active Directory edition of StorageCentral and you are working at the root level

aged object on a computer that is part of a preferred group

If the Select a Computer dialog box displays, specify the computer on which you object.

The ew starts. The remainder of this section explains how to use the wizard’s dialog boxes.

tion assists you in using the New Managed Object Wizard, whi

ciated with it.

the New Mana

the anagement pane, highlight Managed Objects, right-click, and click | Object.

The Select a Computer dia

dialog box if:

o You attempt to create a man

want the managed

N Managed Object Wizard

96 StorageCentral User Guide

Page 107: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

The New Managed Object Wizard

The a n this section are:

• Set Space Allocation (page 100)

)

• File Blocking Alarm (page 101)

will display; your choices on some of the dialog boxes early in the wizard determine which dialog boxes display later in the wizard.

Use the Folders dialog box to select the managed objects (volumes, folders, or files) to whi y

Note: Ishare th rd, refresh the MMC, and restart the wizard. To refresh, click the refresh button located in the row of but s

di log boxes presented i

• Folders (page 97)

• Folder Options (page 98)

• User Options (page 98)

• Select Users (page 99)

• Select Object Type (page 99)

• Alarm n (page 100

• File Groups (page 101)

• File Blocking Filter (page 102)

Not every dialog box documented in this section

Folders Dialog Box

ch ou want to apply space allocation and/or file blocking policies.

f you are working with a Network Appliance Filer and have recently added a at does not display in the list of folders, you must exit the wiza

ton above the managed object details pane.

97

Page 108: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Folder Options Dialog Box

ubfolders.

cy optionally select an existing managed object policy

from the Use policy drop-down list. If you do not select an existing policy here

• To a olders of the managed object(s) you selected, select the object pinforma 190.

User O

On the Uobject apply t l ways, but not both.

• To monitor all users, select Auto detect all users within the folder. You may .

he .

heck for user or group associations check box and select an existing policy from the first Use policy drop-down list.

• to restrict a specific user or users in the folder you specified on the Folders dialog box, select Apply policy to specific users

m

cond Use policy drop-down list.

On the Folder Options dialog box, you may choose to apply a policy to the managed object(s) you selected and/or choose to apply a policy to a managed object’s s

• To apply a policy to the managed object(s) you selected, select the Apply polito folder check box. Then

first , you will define a policy “on the fly” later in the wizard.

pply a policy to the subfApply policy to subfolders check box. Then select an existing managed

olicy from the second Use policy drop-down list. For additional tion, read about auto detecting subfolders on page

ptions Dialog Box

ser Options dialog box, specify which users the restrictions on this managed o. You may specify users in one of severa

further refine this choice

o To exempt administrators from the restriction you are creating, select tExclude administrators check box

o To apply policies associated with each user’s primary group, select the C

To apply a managed object policy

within the folder. (You will specify the specific users on the Select Users dialogbox that follows.) Then optionally select an existing managed object policy frothe se

98 StorageCentral User Guide

Page 109: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Select Us

This dialog box folder check box on the dialog box.

The Select Us rshould apply to

• If y domain\user name, click Insert, type it into the User Name click OK.

you want to select from a list of all available users, click ; the dialog lays. Select a machine or domain, select one or more users, and click

OK.

• If you know the user's name (for example, David Smith) but not the user name user; the Find User dialog box displays.

of the dialog box.

2. Select the user you want and click Add; the user is then listed in the Selected box. You may specify more than one user by holding the CTRL

he user in the list and click

Select

Use the pe dialog box to specify if the managed object policy you are creating “on the fly” is to contain space allocation properties, file blocking properties, or both.

ers Dialog Box

displays if you selected the Apply policy to specific users within the User Options

e s dialog box gives you multiple ways to specify which user(s) the policy .

ou know the user's dialog box, and

• If Add Userbox disp

(for example, DSmith), click Find

1. Enter either a complete or partial name in the Full Name box and clickFind Now. All user names matching your criteria display in the middle

key as you select users.

3. Click OK.

To remove a user already in the Select Users list, highlight tRemove.

Object Type Dialog Box

Select Object Ty

99

Page 110: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Set Sp

This dia lays if you selected the Space allocation check box on the Select Obj t

On the S

e limit determines the maximum amount of space the managed

1 K or larger. For

For information about disk space limits, read the section “Disk Space Limit” on page 218.

t limit and specify a qualifier from the drop-down list.

it is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The overdraft limit

For more information about overdraft limits, read the section “Overdraft Limit”

age 229 for an explanation of these options.

ly if the managed object resides

on a Network Appliance Filer.

Alarm Dialog Boxes

These dialo xes display if you selected the Space allocation check box on the Select Object Type dialog box.

ace Allocation Dialog Box

log box dispec Type dialog box.

et Space Allocation dialog box, do the following:

Enter the disk space limit and specify a qualifier—that is, a unit of size (such as megabytes) or the percentage of something (such as percentage of space currently being used)—from the drop-down list. The disk spacobject may use. On a Network Appliance Filer, the disk space limit must be additional information, read the section “Limitations” (page 174) in the section "Space Allocation and Network Appliance Filers."

• Enter the overdraf The overdraft lim

does not apply if the managed object resides on a Network Appliance Filer.

on page 227.

• Select the space allocation options you want. Read the section “Space AllocationOptions” on p

The options marked with an asterisk do not app

g bo

100 StorageCentral User Guide

Page 111: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

There are m p allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.

On the alarm ng dialog boxes (Alarm 1, Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” (page 211) for an explanation of the information you can provide on the alarm

o Report

File Groups Dialog Box

On the File G up(s) to specify that StorageCentral sho d in that file group.

For i ction to File Groups” on p

File Blocking Alarm Dialog Box

This dialog box displays if you selected the File blocking check box on the Select Object Type dialog box.

ulti le space

setti

setting dialog boxes.

• Enter information about the alarm’s threshold.

• Click Actions to add the following information about the alarm:

o Notification

o Execute

o Extend

This dialog box displays if you selected the File blocking check box on the Select Object Type dialog box.

roups dialog box, select a file grould block (or not block) the file types specifie

an ntroduction to working with file groups, read the section “Introduage 110.

101

Page 112: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

On the File Blocking Alarm dialog box, enter information about the file blocking alarm.

ion about the alarm:

o Notifi

o Execute

o Repo

File Blocking Filt

his dialog box displays if you selected the File blocking check box on the Select Object Type dialog box.

lter dialog box, optionally specify folders to include and exclude rocess. Use these buttons:

Read the section “Description of File Blocking Alarm Settings” (page 205) for an explanation of the information you can provide on the dialog box.

Specify one or more blocking options.

• Click Actions to add the following informat

cation

rt

er Dialog Box

T

On the File Blocking Fifrom the file-blocking p

st.

Add folders to the li

ers from the list.

Remove fold

and Move folders up and down in the list. The order of the folders does not affect the way StorageCentral processes them; ordering them is for your convenience only.

Related Sections

• For an introduction to managed objects, read the section “Introduction to Managed Objects” on page 90.

102 StorageCentral User Guide

Page 113: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• For an explanation of space allocation, read the section “Types of Space Allocation” on page 234.

• For information about working with Network Appliance Filers, read the section

.

e 219) “Group Associations” (page 220)

DeTo delete a managed object:

Then right-

“Introd

Viewing and Modifying Managed Object Properties This section assists you in viewing and modifying the properties of a managed object.

N are a non-administrative user, you can modify the properties only if you have "Full Control" permission. For more information, read the section “Two Levels of Non-Administrat page 239.

“Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4

• Other related sections:

“Include and Exclude Filters” (pag

leting a Managed Object

1. On the details pane, select one or more managed objects to delete.click and click Delete.

2. A message displays prompting for confirmation.

3. Click Yes to delete the managed object(s).

Related Sections

uction to Managed Objects” (page 90)

ote: If you

ive User Access to StorageCentral” on

103

Page 114: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

To view or modify a managed object’s properties, do the following:

In the managed object details pane, right-click a managed object in the grid and click Prop

Which properties disp object you selected.

These are the types of man select from the grid:

This icon in ...represents this type of managed object:

erties.

lay depends on the type of managed

aged objects that you may

the grid...

Folder space allocation (see page 104)

ce allocation (see page 104)User spa

Auto detect subfolders (see page 106)

Auto detect all users (see page 106)

File blocking (see page 107)

Folder Space Allocation or User Space Allocation

llocation” or “user space allocation” type, Stora

You may view or modify the properties specified on these tabs.

Note: Ipropert d to the m

If you select a managed object of “folder space ageCentral presents you with the following property tabs:

Space Allocation

Alarm n

f a policy is associated with the managed object, modifying the managed object ies will break the association. Changes to the policy will no longer be propagateanaged object.

104 StorageCentral User Guide

Page 115: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Space AOn the S cation tab, do the following:

egabytes) or the percentage of something (such as percentage of space

bject may use.

e Filer, the disk space limit must be 1 K or larger. For additional information, read the section “Limitations” (page 174) in the section

or information about disk space limits, read the section “Disk Space Limit” on

• Enter the overdraft limit and specify a qualifier from the drop-down list.

t twork Appliance Filer.

ad the section “Space Allocation

object resides on a nce Filer.

Alarm TabThere are multiple allocation alarms available, with the first alarm being the most severe. Network Appliance Filers support only two alarms.

On the alarm 1, Alarm 2, etc.), enter information about none, one, or all of the alarms. Read the section “Description of Space Allocation Alarm Settings” on page 211 for an explanation of the information you can provide on the alarm tabs.

llocation Tab pace Allo

• Enter the disk space limit and specify a qualifier—that is, a unit of size (such as mcurrently being used)—from the drop-down list. The disk space limit determines the maximum amount of space the managedo On a Network Applianc

"Space Allocation and Network Appliance Filers." Fpage 218.

The overdraft limit is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The overdraft limidoes not apply if the managed object resides on a Ne For more information about overdraft limits, read the section “Overdraft Limit” on page 227.

• Select the space allocation options you want. ReOptions” on page 229 for an explanation of these options. The options marked with an asterisk do not apply if the managed

Network Applia

s space

tabs (Alarm

105

Page 116: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Enter information about the alarm’s threshold.

o Report

If yoyou wit

On s that Sto

Auto Detect All Users

If you select a managed object of “auto detect all users” type, StorageCentral presents Detection dialog box.

• Use the drop-down list to specify the policy that StorageCentral is to use.

• Select the Exclude administrators check box to exempt administrators from the on on this managed object.

e Check for group associations check box to apply policies associated with each user’s primary group.

• Click Actions to add the following information about the alarm:

o Notification

o Execute

o Extend

Auto Detect Subfolders

u select a managed object of “auto detect subfolders” type, StorageCentral presents h the Auto Detection dialog box.

thi dialog box you may use the drop-down list to specify the managed object policy rageCentral is to use.

you with the Auto

On this dialog box you may:

restricti

• Select th

106 StorageCentral User Guide

Page 117: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

File Blocking

If you select a managed object of “file blocking” type, StorageCentral presents you with the following property tabs:

• File Groups

• Alarm

pecified on these tabs.

File rOn the File G should block (or not b

For an intro g with file groups, read the section “Introduction to File Groups” on

Alarm TabOn the Alarm tab, enter information about the file blocking alarm. Read the section

of File Blocking Alarm Settings” on page 205 for an explanation of the

options.

• Click Actions ormation about the alarm:

o Notifi

o Execute

o Repo

• Filters

You may view or modify the properties s

G oups Tab roups tab, check a file group(s) to specify that StorageCentral

lock) the file types specified in that file group.

duction to workin page 110.

“Description information you can provide on the tab.

• Specify one or more blocking

to add the following inf

cation

rt

107

Page 118: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Filters Tab On the Fbloc n

ilters tab, optionally specify folders to include and exclude from the file-ki g process. Use these buttons:

Add folders to the list.

Remove folders from the list.

and does not affecMove folders up and down in the list. The order of the folders

t the way StorageCentral processes them; ordering them is for your convenience only.

Related Sections

d the section “Introduction to

Allocation” on page 234.

For information about working with Network Appliance Filers, read the section e

Other related sections:

Ap y

Applyin managed object. If pro

• For an introduction to managed objects, reaManaged Objects” on page 90.

• For an explanation of space allocation, read the section “Types of Space

• “Introduction to Using StorageCentral with Network Appliance Filers” at thbeginning of Chapter 4.

“Include and Exclude Filters” (page 219) “Group Associations” (page 220)

pl ing a Policy to a Managed Object

g a policy to a managed object associates that policy with thepagation is enabled, any changes to the policy will be reflected in the managed object.

108 StorageCentral User Guide

Page 119: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

To apply a policy to a managed object:

n the details pane, select one or more managed objects to associate with a olicy, right-click, and choose Apply Policy.

isplays. Select a policy from the list by checking ly that policy to the managed object -or- click

location or file blocking) of the selected managed object will be displayed in the policy list.

• If managed object properties are modified, the policy association will be broken. t changes to the policy will not be reflected in the managed

object.

1. Op

2. The Apply Policy dialog box dthe box and click Apply to appCancel to return to the details pane without selecting a policy.

Notes:

• Only policies that have the attributes (space al

Any subsequen

109

Page 120: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

File Groups

IntroductFile groups consist of a set of unauthorized and authorized files that StorageCentral is to block from the system. File groups are also used as selection criteria by reports. For example, a G unauthorized files with extensions *.jpg and *.bmp, but authorize the specific file important.jpg. Predefined file groups are available file groups.

Related Sections

“Creat“Deleting a File Group” (page 111) “Viewing and Modifying File Group Properties” (page 112)

e 113) ge 113)

Creating a New File Group

, right-click, and click New | ties dialog box displays.

2. Enter a name for the file group in the File group name box.

ption box. ile group is used as a

ion to File Groups

raphics file group might contain

, and you can create customized

ing a New File Group” (page 110)

“Copying a File Group” (pag“Renaming a File Group” (pa

To create a new file group:

1. On the management pane, highlight File GroupsFile Group. The File Group Proper

3. Enter up to 50 characters of descriptive text in the DescriStorageCentral shows this description in a report if this ffilter in the report set.

110 StorageCentral User Guide

Page 121: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

4. Enter unauthorized and/or authorized files. Full wild carding in file names is supported. Use the following buttons:

— to enter a file name

— to remove files from the list

— to move files up the list

— to move files down the list

For a e section “Unauthorized and Authorized File

5. Click

Delet

1. On the management pane, highlight File Groups.

2. On the details pane, highlight a file group, right-click, and click Delete.

3. A message displays prompting for confirmation.

dditional information, read ths” on page 236.

OK to create the new file group.

ing a File Group To delete a file group:

4. Click Yes to delete the file group.

111

Page 122: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

ViewiTo view or modify file group properties:

1. nagement pane, highlight File Groups.

2. On the details pane, double-click the file group you want to view or modify. The File Group Properties dialog box displays.

descriptive text in the Description box. hows this description in a report if this file group is used as a

filter in the report set.

4. Add and remove unauthorized and authorized files. Full wild carding in file

ng and Modifying File Group Properties

On the ma

3. Enter up to 50 characters ofStorageCentral s

names is supported. Use the following buttons:

— to enter a file name

— to remove files from the list

— to move files up the list

— to move files down the list

For additional information, read the section “Unauthorized and Authorized Files” on page 236.

5. Click OK to modify the file group properties.

Note: You cannot change the file group's name on the File Group Properties dialog box. To change a file group name, read the section “Renaming a File Group” on page 113.

112 StorageCentral User Guide

Page 123: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Copying a File Group :

1. On the management pane, highlight File Groups.

hoose Copy.

5. Change the properties of the new file group as appropriate as described on page 112.

RenaminTo rena

1.

2. ails pane, highlight a file group, right-click and click Rename.

3. Enter the new name in the text field and press Enter.

To copy a file group

2. On the details pane, right-click the file group you want to copy. C

3. Right-click in the details pane and choose Paste. A new file group, named "Copy of <file group you selected>", displays in the list.

4. Rename the new file group by right-clicking it and choosing Rename, entering the new name in the text field, and pressing Enter.

g a File Group me a file group:

On the management pane, highlight File Groups.

On the det

113

Page 124: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report

Intr cReport collecto s. Report collectors allow you to off-load r the management console to additional resources. Machines with the full version of StorageCentral or the Collector component, available through the custom installation, may be designated as report collectors and

Re

“Deleting a Report Collector” (page 115) ule” (page 115)

For instructions on running a report, read the section “Running a Report Set” on page 143.

Adding a Report Collector To add

1. On the management pane, highlight Report Collectors, right-click and click New

Collectors

odu tion to Report Collectors rs are machines used to run report

rt processing, which can be intensive, from epo

selected when scheduling reports.

lated Sections

“Adding a Report Collector” (page 114)

“Viewing and Modifying a Report Collector Sched“Deleting a Scheduled Job” (page 115)

a report collector:

| Collector.

2. Enter a computer name. You may also use the browse button (...) to select a computer name.

3. Click OK to add a report collector.

114 StorageCentral User Guide

Page 125: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

DeTo delet rt collector:

nagement pane, expand Collectors. Click on a computer, right-click, and click Delete.

2. A message will be displayed prompting for confirmation.

3. Click Yes to delete the report collector.

Deleting a Scheduled Job To d e uled job:

1. On the management pane, expand Collectors. Click on a computer to view scheduled jobs for that collector. Highlight a job, right-click, and click Delete.

2. A message displays prompting for confirmation.

3. Click Yes to delete the scheduled job.

Viewing and Modifying a Report Collector Schedule To view or modify the schedule for each report collector:

1. On the management pane, expand Report Collectors and click on a collector machine to view its schedule.

2. Right-click on a scheduled job. Click Properties.

3. View and modify as many properties as required relating to the scheduled job. Task, Schedule, and Settings properties may be modified.

4. Click OK to modify the properties.

leting a Report Collector e a repo

1. On the ma

el te a sched

115

Page 126: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

The following fields are displayed for each scheduled job:

• Name

• Schedule

• Creator

• Command

• Next Run Time

• Last Run Time

• Last Result

116 StorageCentral User Guide

Page 127: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Reports

IntReportman eidentify types an ations being stored on non-designated servers or partitions, and identify

Limita

If you own on the Acti

If you are ru ndows Server 2003 and Internet Explorer Enhanced S StorageCentral reports are blocked and you get a warnin e report web page to the Trusted zone, the report is allo d properly the first time. However, if you reload the p rly.

Related S t

• For n on “Introduction to Rep

• For ction “Introduction to Report Sets” (pag 3

roduction to Reports s provide an overview of disk consumption as well as information required to

ag space effectively. Reports can provide a wealth of information such as ing inappropriate file types being stored on corporate resources, identifying filed ing files not being included in the backup policies.

applic

tions

ning StorageCentral under Windows NT, you are unable to drill dveX reports.

are run

nning StorageCentral under Wiecurity Configuration is enabled,g prompt from IE. If you add thwe to launch but does not open

age, the report does open prope

ec ions

an i troduction to report definitions, read the sectiort Definitions” (page 118).

an introduction to report sets, read the see 1 5).

117

Page 128: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report D

Introd

Report d report d

• A standard report definition is limited in what the user can modify, such as which l.

dard report definitions have this icon:

efinitions

uction to Report Definitions

efinitions define the content and appearance of a report. There are two types ofefinitions: standard and custom.

columns to display. All standard report definitions ship with StorageCentra On the details pane, stan

• A custom report definition is designed using the StorageCentral custom report stom reports are highly configurable by the user. Some custom report

o create your own.

t definition:

rt Break” (page 126)

“Report Sort” (page 128)

o “Report Summary Query” (page 130)

o “Report Summary Sort” (page 131)

information or summary formation. Detail information might be a list of files that meet a specific

writer. Cudefinitions ship with StorageCentral; you can als These sections contain instructions for you to create a custom repor

o “Report Detail” (page 124)

o “Report Query” (page 124)

o “Repo

o

o “Report Total” (page 129)

o “Report Summary Total” (page 132)

o “Report Graph” (page 133)

A custom report definition can report on detail in

118 StorageCentral User Guide

Page 129: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

criteria, while summary information might provide the total amount of storage each user is using.

rough the data. When a report definition provides summary information, StorageCentral produces the report in two passes. The

g 100 MB of storage, Douglas is using 240 MB of storage, and so on).

de

When a report definition provides detail information, StorageCentral produces the report in one pass th

first past produces raw data (for example, a list of the seven files user Mark is storing, and their sizes), and the second pass summarizes the data (the fact that Mark is usin

When you specify summary parameters—Summary Query, Summary Sort, Summary Total—you tell StorageCentral that the report definition is to provisummary information.

On the details pane, custom report definitions have this icon:

Rel

“Deleting a Report Definition” (page 121)

Creati

To creat

2. ox ew Report Definition Wizard displays. Click Next.

ation objects, Space allocation history). Click Next.

ated Sections “Creating a New Report Definition” (page 119)

“Viewing and Modifying Report Definition Properties” (page 122) “Copying a Report Definition” (page 123) “Renaming a Report Definition” (page 123)

For an introduction to report sets, read the section “Introduction to Report Sets”on page 135.

ng a New Report Definition

e a new report definition:

1. On the management pane, expand the Reports branch.

Right-click Definitions and choose New | Definition. The Welcome dialog bof the N

3. On the Report Definition Name dialog box, enter the report definition name and select the data source for the report (Active file system, Space alloc

119

Page 130: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Note: Do not use the following characters in the report definition name: + # = ; : ,/

cription dialog box, enter the report description that will be used in

5. lected for l information.

6. On the Detail dialog box, select the columns to display in the file detail for a report. Selected Fields are columns that will display on the report. See the

e 124) for additional information. Click Next.

See the section “Report Sort” (page 128) for additional information. Click Next.

8. On the Report Break dialog box, select the fields to display in the report. See rmation. Click Next.

determined by the order of the fields in the Selected Fields list. See the section

ary query to define the files that are selected for the report. See the section “Report Summary Query”

Click Next.

mary Sort dialog box, define the order of the files in the report e the section “Report Summary Sort” (page 131) for additional

12. otals, which Selected Fields list. See the

for additional information. Click Next.

13. On the Graph dialog box, select graph options for the report. See the section “Report Graph” (page 133) for additional information. Click Next.

4. On the Desthe report. Click Next.

On the Query dialog box, create a query to define the files that are sethe report. See the section “Report Query” (page 124) for additionaClick Next.

section “Report Detail” (pag

7. On the Sort dialog box, define the order of the files in a report.

the section “Report Break” (page 126) for additional info

9. On the Total dialog box, select the order of the columns' totals, which are

“Report Total” (page 129) for additional information. Click Next.

10. On the Summary Query dialog box, create a summ

(page 130) for additional information.

11. On the Sumsummary. Seinformation. Click Next.

On the Summary Total dialog box, select the order of the columns tare determined by the order of the fields in the section “Report Summary Total” (page 132)

120 StorageCentral User Guide

Page 131: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

14. A Completing the Report Definition Wizard dialog box displays. Click Finish

Rel d“Introduction to Report Definitions” (page 118)

“Viewing and Modifying Report Definition Properties” (page 122)

“Renaming a Report Definition” (page 123)

Deleting

Only custom (u

To delete a

1. On the m

2. Click D efinitions displays in the details pane.

3. On the d ort definition to delete and choose Delete.

4. A messa

5. Click Ye

Related Sections “Introduction to Report Definitions” (page 118)

difying Report Definition Properties” (page 122) “Copying a Report Definition” (page 123)

a Report Definition” (page 123)

to create a new report definition.

ate Sections

“Deleting a Report Definition” (page 121)

“Copying a Report Definition” (page 123)

a Report Definition

ser-defined) report definitions can be deleted.

report definition:

anagement pane, expand the Reports branch.

efinitions. The list of report d

etails pane, right-click the rep

ge displays prompting for confirmation.

s to delete report definition.

“Creating a New Report Definition” (page 119) “Viewing and Mo

“Renaming

121

Page 132: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Viewing and Modifying Report Definition Properties

efinition:

3. On the details pane, right-click a report definition and choose Properties.

4. iew and modify properties as required.

rt definition (

To view or modify a report d

1. On the management pane, expand the Reports branch.

2. Click Definitions. The list of report definitions displays in the details pane.

A tabbed dialog box displays listing properties for the report. V

o If you are updating the properties of a standard repo ), StorageCentral presents tabs for properties unique to that report

o If you are updating the properties of a custom report definition (

definition.

), d these sections about the tabs StorageCentral presents:

– “Report Total” (page 129) – “Report Summary Query” (page 130) – “Report Summary Sort” (page 131)

tal” (page 132) 3)

ick Cancel to return to the details pane.

Related Sections

“Creating a New Report Definition” (page 119) “Deleting a Report Definition” (page 121) “Copying a Report Definition” (page 123) “Renaming a Report Definition” (page 123)

rea

– “Report Detail” (page 124) – “Report Query” (page 124) – “Report Break” (page 126) – “Report Sort” (page 128)

– “Report Summary To– “Report Graph” (page 13

5. Click OK to modify the report definition properties -or- cl

“Introduction to Report Definitions” (page 118)

122 StorageCentral User Guide

Page 133: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Copying a Report Definition

To copy

1.

2. finition you want to copy, and choose Copy.

in the details pane and choose Paste. A new report definition, named report definition you selected>", displays in the list.

hange the properties of the new report definition as appropriate as described on page 122.

R s tion to Report Definitions” (page 118)

g a Ng and ies” (page 122)

a Report Definition” (page 121) enaming a Report Definition” (page 123)

enaming a Report Definition

To rename a report definition:

nagement pane, expand the Reports branch.

me in the text field and press Enter.

a report definition:

On the management pane, expand the Reports branch.

Click Definitions, right-click the report de

3. Right-click"Copy of <

4. Rename the new report definition by right-clicking it and choosing Rename, entering the new name in the text field, and pressing Enter.

5. C

elated Section“Introduc“Creatin“Viewin“Deleting “R

ew Report Definition” (page 119) Modifying Report Definition Propert

R

1. On the ma

2. Click Definitions, highlight a report definition to rename, right-click, and click Rename.

3. Enter the new na

123

Page 134: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Rel d 118)

“Creating a New Report Definition” (page 119) Report Definition” (page 121)

“Viewing and Modifying Report Definition Properties” (page 122) “Copyin age 123)

Re r

Use Detail to define the columns that will appear for the file detail for a report. Detail is display w per file. The order of the columns is determined by the order of the fields in he Selected Fields list with the top field appearing on the left column.

How to:

Add a field to the Selected Fields column

In the Fields column, double-click the field name to add -or-

ate Sections “Introduction to Report Definitions” (page

“Deleting a

g a Report Definition” (p

po t Detail

ed as one ro t

select the field name and click the button.

Delete a field from the Selected Fields

In the Selected Fields column, select the field name to delete

from the list and click the button.

column Change order in In the Selected Fields column, select the field namethe Selected

to move and

Fields column use the and arrow buttons.

Report Query

Use Report Queries to define the files that are selected for the report. You may type the ld or use the query builder to create it.

There are two types of queries: simple and complex.

query directly into the Query fie

Queries

124 StorageCentral User Guide

Page 135: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Simple query formula: <Field Name> <Operator> <Value>

Example:

SizeAllocatedKB > 1024

cated size greater than 1024 KB.

• C plex q (Sim rator> (Simple Query) -or- NOT uery)

Example:

(Si Th 4 KB an

Date values are represented inside curly brackets in the form {MM D

Parenthesis are not necessary, but they ensure that the proper evaluation is done. As in arit ewithout

These e (SizeAllocatedKB > 1024) AND (CreatedDays < 30)

KB > 1024 AND CreatedDays < 30

These e NOT(SizeAllocatedKB > 1024) AND (CreatedDays < 30) NOT(SizeAllocatedKB > 1024 AND CreatedDays < 30)

The example selects all files with an allo

om uery formula: ple Query) <Ope

(Simple Q

zeAllocatedKB > 1024) AND (CreatedDays < 30)

e example selects all files with the allocated size greater than 102d a creation date less than 30 days old.

/ D/YYYY HH:MM:SS}. The time portion of the date is optional.

hm tic, operations within parenthesis are evaluated first. The order of precedence parenthesis is NOT AND OR.

xpressions are the same:

SizeAllocated

xpressions are different:

125

Page 136: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Defining a Query Expression Use the following field selectors to define a query expression:

• Use the Field Name list to select a column name to insert into the query at the cursor position.

• Use the Operator list to select an operator to insert into the query at the cursor position. These are the relations you may use:

$ Contains substring < Less than <= Less than or equal to <> Not equal to = Equal to > Greater than >= Greater than or equal to AND Both simple expressions must be true for the result to be true NOT Inverts the result of an expression. If an expression is true, it is

made false; if false, it is made true OR Either simple expression must be true for the result to be true

• The Query is the edit area where the query is entered. You may edit it directly r use the query builder to place fields in it.

o c ays false, f rror is found, the

rsor is positio of the error is he

R mm

Report Break

Report Breaks allows you to define a summary break in the report, and it depends on the sort that has been defined. A summary break is associated with a sort column. A

o

• Use Verify tevaluate tocu

heck the query syntax. A query that has syntax errors will alw so no files will be selected with it. I a syntax e

ned at the error and a message about the naturedisplayed in t

elated Sections

Query status field.

“Report Su ary Query” (page 130)

126 StorageCentral User Guide

Page 137: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

break occurs whenever the value changes from one row to the next in the associated sort column or any other major sort column. You may then define totaling actions for a s k.

U ort Break otaling is associated with the s bre subtotals to occur w valu sort column. After the report break is ass rt totals is similar to d inal tota ulated for the group of rows

the report break, not for all the rows.

iate the report break with the directory sort and define your totals there. This would give you the totals for every directory by the file owner. You may create a summary report of just report breaks by not defining the detail line. As a result only the Report Breaks are printed.

nt is displayed in the leftmost column. Double-clicking an individual data element brings up its p psumma

How o

Add a field to the In the Fields column, double-click the field name to add -or-

ummary brea

se Rep s to control subtotaling in the report. Subtort. A reporthenever the

ak associated with a sort column will causee changes in that column or any other majorociated with a sort column, defining the repo

efining f ls. The difference is that the totals are calcin

Example: If a report is sorted on file owner and directory, you might want to show total usage for each directory within each file owner. You would assoc

Selected Fields These are the file information data elements you are displaying. The top eleme

ro erties, which you may use to control how the individual data element is rized.

t :

Selected Fields column select the field name and click the button.

Delete a field from In the Selected FithFields

elds column, select the field name to delete e Selected

column from the list and click the button.

Changeth eFields

column, select the field name to move order in In the Selected Fieldse S lected

column and use the and arrow buttons.

127

Page 138: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

An action property controls the action on the data element. The action properties are:

DisSUM plays the sum of all the values in the column. MIN Dis nplays the smallest value in the colum . MAX Displays the largest value in the column. AVERAGE Displays the average value in the column. STORE Dis mn. plays the last row's value in the coluRESET Controls when the value is reset to zero.

S he Br he sort element used to trol break. The field names that display in the Break at drop-down list

ere specified on the Report Sort property (page 128).

Sort

the files in a custom report (the rows of a report). Sort is specified as sort keys. For example:

• en the rows of the report will be in alphabetical order by the File Name.

is sorted in Date Created descending order, then the rows will be the newest to the oldest order.

a report is sorted on Date Created and then File Name, the overall report will be displayed in Date Created order.

ore rows h he s in F

elections from tetermine the con

eak at drop-down list let you specify tdw

Report

Use Sort to define the order ofdefined by the order of the data elements

If a report is sorted on File Name, th

• If a report shown in

If you sort on more than one column, then the first sort column will control the overall order of the report and the subsequent sort columns will be defined in the order within the overall or major order. For example:

• If

• If two or mbe displayed

ave t ame creation date, then within that date they willile Name order.

128 StorageCentral User Guide

Page 139: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

H

ld to the Selected Fields column

In t name to add -or-

select the field name and click the

ow to:

Add a fie he Fields column, double-click the field

button.

Delete a field from

In the Selected Fields column, select the field name to delete the

Selected Fields n

from the list and click the

colum

button.

Change ordelected

um

t the field name to move r in In the Selected Fields column, selecthe Se

and use the Fields col n and arrow buttons.

may be in ascending or descending order. To change a sort's direction, double-click the phrase "Ascending" or "Descending" next to an item in the Selected Fields

Related Sections “Report Break” (page 126)

(page 131)

the totals displayed at the end of the report. These totals are for all the lu ined by the order eft colu n

How to:

Add a fie to the Selecte column

column, double-click the field name to add -or-

and click the

A sort

column.

“Report Summary Sort”

Report Total

Use Total to controlva es in the column you are totaling. The order of the Total columns is determ

of the fields in the Selected Fields list with the top field appearing in the lm .

ld d Fields

In the Fields

select the field button.

Delete a d frothe Sele elcolumn

ted Fields column, select the field name to delete

e list and click the

fiel m In the Seleccted Fi ds

from th button.

129

Page 140: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Change n Selecte s column

ove order i the In the Selected Fields column, select the field name to md Field

and use the and arrow buttons.

The Total has an action property that controls how the column is totaled. The actions are:

Sum Displays the sum of all the values in the column. Min Displays the smallest value in the column. Max Displays the largest value in the column. Average Displays the average value in the column. Store . Displays the last rows value in the column

Related“Report Summary Total” (page 132)

You may type the query directly into the Query field or use thque

• an operator in the query. These are

Sections

Report Summary Query

Use Summary Query to define the query expression to control file selection during summarization of the custom report.

e query builder to create it. Use the following field selectors to define a ry expression:

• Use the Field Name drop-down list to insert a column name in the query.

Use the Operator drop-down list to insertthe relations you may use:

$ Contains substring < Less than <= Less than or equal to <> Not equal to = Equal to > Greater than >= Greater than or equal to

130 StorageCentral User Guide

Page 141: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

AND Both simple expressions must be true for the result to be true NOT Inverts the result o ression. If an expression is true, it is

adf an exp

m e false; if false, it is made true OR Eithe r t o be true r simple expression must be true fo he result t

ery is th d. You may edit it directly or ery builder to place fields in it.

Verify button to verify ery that has syntax errors ys eval so d with it. If a syntax error

is found, the cursor is positioned at the error and a message about the nature of the error is displayed in the Query status field.

(page 124) for details on query syntax.

Report Summary Sort

Use Summary Sort to define the order of the columns in a custom report to sort on for mary Sort is defined by the order of the data elements ple:

Date Created descending order, then the rows will be shown in the newest to the oldest order.

If you sort on more than one column, then the first sort column will control the overall order of the report an hin the overall or major or

rt is s ill isplayed

two or more rows have the same creation date, then within that date they will be displayed in File Name order.

• The Quuse the qu

e edit area where the query is entere

• Use thewill alwa

the query syntax. A quuate to false, no files will be selecte

Related Sections See “Report Query”

summarization. Like Sort, Sumspecified as sort keys. For exam

• If a report is sorted on File Name, then the rows of the report will be in alphabetical order by the File Name.

• If a report is sorted in

d the subsequent sort columns will be defined in the order witder. For example:

• If a repobe d

• If

orted on Date Created and then File Name, the overall report win Date Created order.

131

Page 142: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

H

e Selected Fields column

s e field name to add -or-

select the field name and click the

ow to:

Add a field to th In the Field column, double-click th

button.

Delete a field from the Selected

In the Selected Fields column, select the field name to delete

from the Fields column list and click the button.

Change orderelected

column

ield name to move in In the Selected Fields column, select the f

and use the and arrow buthe SFields ttons.

ary sort may be ange a sort's direction, -click the phrase "Ascending" or "Descending" next to an item in the Selected

Fields column.

Related“Report Sort” (page 128)

stom report. These summary totals are for tal columns

th the top field

How to:

the Selected e field name to add -or-

nd click the

Adouble

summ in ascending or descending order. To ch

Sections

Report Summary Total

A summary may be created instead of a detailed report. Use Summary Total to select the columns to summarize on at the end of the cuall the values in the column you are totaling. The order of the Summary Tois determined by the order of the fields in the Selected Fields list wiappearing in the left column.

Add a field to In the Fields column, double-click th

Fields column select the field a button.

Delete a field

Selected Fields column

In the Selected Fields column, select the field name to delete

from the list and click the from the

button.

132 StorageCentral User Guide

Page 143: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Change order in

Fields column

In the Selected Fields column, select the field name to move the Selected

and use the and arrow buttons.

Like the Total, the Summary Total has an action property that controls how the column . The actions are: is totaled

Sum Displays the sum of all the values in the column. Min Displays the smallest value in the column. Max Displays the largest value in the column. Average Displays the average value in the column. Store Displays the last rows value in the column.

Related Sections Report Tot

Report Graph

eport Graph allows you to define a graph to include in the report. You may select the to display: pie, bar, or plot. Graph settings determine the data to be used xis as well as the line break.

The graph settings are described below.

XT selects snapshot was taken.

The option from the drop-down list:

Stamp

“ al” (page 129)

Rtype of graphfor X- and Y a

Note: The plot graph option is available only for trending reports.

Axis he X axis the time when the

Time The time data was collected

133

Page 144: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

X Axis Label The X axis label. The option from the drop-down list:

label TimeStamp The TimeStamp

important that the Y axis be included in the Detail of the report. Failure to do so may result in an application failure or a k gr

e drop-down list:

High-water The highest usage the object has ever showed

Y Axis The Y axis is the capacity of the object at the time when the snapshot was taken. It is

blan aph.

Options from th

Object The object name Overdraft The space limit overdraft Server The server name SID The user's Security Identifier Space Limit The object space limit Space Used The space used at the time data was collected TimeStamp The time data was collected

Line BrThe line nstitute a new line. If object is used, then Storage . Only the first line has regression analysis perform

Options

High-water The highest usage the object has ever showed

eak break determines what is used to coCentral draws one line for each objected on it.

from the drop-down list:

Object The object name Overdraft The space limit overdraft Server The server name SID The user's Security Identifier Space Limit The object space limit Space Use data was collected d The space used at the timeTimeStamp The time data was collected

134 StorageCentral User Guide

Page 145: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

For example: Y axis = Space Used, and line break = Object. This shows the space used for e

RegresDisplays a regression line in the graph depicting the trend as an ascending or descending line ysis.

Repo

Introduction to Report Sets

Report sreports re user-defined reports written using the Custom Report Writer.

Related

Set” (page 137)

ical user interface, you can

ns” (page 118).

ach object at each TimeStamp.

sion Line

. The regression line is used to forecast future usage based on historical anal

rt Sets

ets are containers for detailed reports. A report set can contain one or many and can be a combination of standard and custom reports. Custom reports a

Sections “Creating a New Report Set” (page 136) “Deleting a Report “Viewing and Modifying Report Set Properties” (page 137) “Copying a Report Set” (page 142) “Renaming a Report Set” (page 143) “Running a Report Set” (page 143)

For information about the report sets that come pre-packaged with StorageCentral, read the section “Predefined Report Sets” on page 146.

In addition to running report sets through the graphalso run them through the command line interface. For more information, read the section “Command SCReport” on page 165.

For an introduction to report definitions, read the section “Introduction to Report Definitio

135

Page 146: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Creating a New Report Set

To creat

1. rt Sets, right-click - On the details pane, right-click. Click

2. A Report Set Wizard will guide you through creating a new report set.

port Set Wizard . Click Next.

port set name. The following characters should not be used in the rep rt set name: + # = ; : , /

5. Click Next.

6. On the Filter dialog, define the selection criteria for the report set. Select as many Modifying

Report Set Properties” on page 137 for additional information. Click Next.

at dialog, select output formatting for the report set. This includes sizes. See the section “Viewing and e 137 for additional information. Click

8. should be saved and t set. See the section “Viewing and

Modifying Report Set Properties” on page 137 for additional information. Click Next.

to include in the report set. selected. You can also view properties of a

perties button.

10. A Completing the Report Set Wizard dialog displays. Click Finish to create a ew

anagement pane without creating a new report set.

e a new report set:

On the management pane, expand Reports. Highlight Repoand click New. Click Report Set -or New. Click Report Set.

3. A Welcome to the Re page displays

4. On the Enter Report Set Name dialog, enter the reo

of the available options as desired. See the section “Viewing and

7. On the Formthe report format and how to display the Modifying Report Set Properties” on pagNext.

On the Output dialog, specify where the report set optionally where to e-mail the repor

9. On the Content dialog, select the report definitions Multiple report definitions can bereport definition by clicking the Pro

new report set -or- click Back to modify the properties before creating a nreport set -or- click Cancel to return to the m

136 StorageCentral User Guide

Page 147: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Rel d“Introduction to Report Sets” (page 135) “De age 137) “Viewing and Modifying Report Set Properties” (page 137) “Co n ge 142) “Renam “Ru n ge 143)

Report Set

the

3. A mes e displays prompting for confirmation.

4. Click Y

Related Sections tro

“Creat rt Set” (page 136) “View difying Report Set Properties” (page 137) “CopyRena

unn

Viewing and

To view or modify report set properties:

1. On the management pane, highlight Report Sets.

2. On the details pane, highlight a target report set, right-click, and choose Properties -or- double-click on a report set.

ate Sections

leting a Report Set” (p

pyi g a Report Set” (paing a Report Set” (page 143)

nni g a Report Set” (pa

Deleting a

1. On the management pane, highlight Report Sets.

2. On details pane, highlight a Report Set, right-click, and click Delete.

sag

es to delete the report set -or- click No to cancel deletion.

“In duction to Report Sets” (page 135) ing a New Repoing and Moing a Report Set” (page 142) ming a Report Set” (page 143) “

“R ing a Report Set” (page 143)

Modifying Report Set Properties

137

Page 148: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

3. A prop

o 138)

o Fo

o Ou

o Co n

Filter Tab Reports can be ort set.

By name Choose this option to filter files by name using standard file selection masks. Use semicolons to enter multiple file selection masks.

Entering *.exe;*.dll will select all the "exe" and "dll" files.

erties dialog box displays. There are four tabs:

Filter (page

rmat (page 139)

tput (page 139)

nte t (page 141)

filtered by defining selection criteria for the rep

Example:

By file group

Choose this option to filter by predefined file groups.

er I y be filtered by the name of t EA

f filter by screening group selected, files maBy ushe file owner.

xample: dmin* includes all files whose owner's name begins with Admin.

T e r ER

Report length

he number of records to include in the report set. By default all thecords will be included in the report set.

xample: eport length of 50 would include the first 50 records.

138 StorageCentral User Guide

Page 149: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

File attributes

Fi A

o Read Only: the file is read-only. en: the file is hidden.

o System: the file is a system file. : the file is .

: the file has be up. a di

Dark GBl

les may be selected based on six standard file attributes.

ttributes:

o Hidd

o Compressed compressedo Archive en changed and not backedo Directory: the file is rectory.

check—select if the attribute is present ray check—do not filter, attribute is ignored ank—select if the attribute is absent

Format Tab Reports can be cr

CSV As applications.

eated in several different formats.

comma-delimited format that can be imported into most preadsheets or database

DBF Report output is in a flat database format. Excel Report output in Microsoft Excel format (xls). HTML Presents the report in a traditional browser, which does not require any

special controls. File management capabilities are not available with this format.

Active HTML

This option provides a spreadsheet-style output displayed in the Microsoft Explorer. This style provides for sorting as well as for limited file management, such as copy, move, and delete. In addition, a file launch feature, which will launch a file based on file associations, is available. This functionality requires that the ActiveX controls are loaded on the client machine viewing the report.

Text Report output in the text format (txt). Show sizes in

Units in report: Bytes, Kilobytes (KB), Megabytes (MB), or Gigabytes (GB).

Output Tab Save and mail options.

139

Page 150: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Save threport to

e

the following folder

r tory

c:\reports\duplicates.htm

n is specified and if the format represented by this ported in the report set (see the section “Format Tab”

ill generate a report in that format.

ve the a value in the Save the

port to the following folder field, the value takes precedence over

Folder where the report output will be written. The directory path ofile name may be entered either separately or together. If the direcdoes not exist, create it. Example:

Directory path: c:\reports

File name: duplicates.htm

Directory and filename: If a file extensioextension is sup

n page 139), report DLL wo Batch files created by entering a value in the Batch Command field (documented below) are also saved to the folder specified in Sareport to the following folder. If you specifyrethe value in the Report Output Folder field of the global properties Reports tab (page 68).

Mail the report to the following email address

E-m aail ddress where the report will be sent

140 StorageCentral User Guide

Page 151: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Batch CComm

reates a batch file with a command that was entered in this field. ered either when creating a new e existing report set properties.

r JPEG files that are older than r the del "#" command in the Batch

Command field on the Output tab. The report will produce a set of

Del brian1.jpg Del brian2.jpg

pg

format (JPEG) and file age (older than 01/01/04) are specified in query, go to the

ition, click the

e 68), the value takes

folder field of the Output tab (documented elsewhere in this section), the value takes precedence over the default and the

rty value.

t, the report would generate a batch file ll the JPEG files older than 01/01/04. To

run the batch file.

and The batch command may be entreport set or when modifying th Example: If users want to delete all of thei01/01/04, they should ente

commands similar to these:

Del brian3.j File the query of the actual report definition. To enter the Content tab, select the appropriate report definProperties button, and select the Query tab. The batch file has the same filename as the generated report except that it has an extension of BAT. The batch file is stored in one of several locations.

o By default, it is stored in the StorageCentral \Reports folder. o If you specify a value in the Report Output Folder field of the

global properties Reports tab (pagprecedence over the default.

o If you specify a value in the Save the report to the following

global destination prope After running the report sewith delete commands for adelete all these JPEG files,

Content Tab Use the Content tab to modify the content of the report set. Select the report definitions to include in the report set.

141

Page 152: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections “Introduction to“Creating a New Rep

Report Sets” (page 135) ort Set” (page 136)

Copyi

To copy

1.

2. ort set you want to copy, and choose Copy.

3. Right-click in the details pane and choose Paste. A new report set, named "Copy >", displays in the list.

Rename, entering the new name in the text field, and pressing Enter.

ort set as appropriate as described on page 137.

Related“Introduction to Report Sets” (page 135)

Deleting a Report Set” (page 137)

“Running a Report Set” (page 143)

“Deleting a Report Set” (page 137) “Copying a Report Set” (page 142) “Renaming a Report Set” (page 143) “Running a Report Set” (page 143) “Introduction to File Groups” (page 110)

ng a Report Set

a report set:

On the management pane, expand the Reports branch.

Click Report Sets, right-click the rep

of <report set you selected

4. Rename the new report set by right-clicking it and choosing

5. Change the properties of the rep

Sections

“Creating a New Report Set” (page 136) ““Renaming a Report Set” (page 143)

142 StorageCentral User Guide

Page 153: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Renam

To rena

2.

3. Enter.

Related Sections age 135)

Creating a New Report Set” (page 136)

g a Report Set” (page 143)

Running

You can run

Running a Report Set Interactively 1. On m

Storage

2. Double- e report set you want to run.

he Run interactively option is selected.

ing a Report Set

me a report set:

1. On the management pane, expand the Report branch.

Click Report Sets, highlight a report set to rename, right-click, and click Rename.

Enter the new name in the text field and press

“Introduction to Report Sets” (p““Deleting a Report Set” (page 137) “Viewing and Modifying Report Set Properties” (page 137) “Copying a Report Set” (page 142) “Runnin

a Report Set

report sets in one of two ways: interactively or batch.

the anagement pane, expand Reports and then click Report Sets.

Central lists the existing report sets on the details pane.

click th The Run Report dialog box displays.

3. Make sure t

4. Optionally change the value in the Collector box if you want to use a different report collector. You might want to use a different report collector if you expect the report to

143

Page 154: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

return a large number of files (records). This might happen if you are running a single report against multiple managed objects. In a case like this, the collection process may take a lot of memory.

5.

ant to run the report set. You may select more than one. How long the report

. Click OK when you finish.

g box, click Submit.

Output is also sent to one of several locations.

By default, it goes to the StorageCentral \Reports folder.

rts kes precedence over

the default.

eld

After ex

• .

ou in a file; this name displays in the Report Status field of the Run Report dialog box and in the web browser's Address field. However,

Click the ... button to the right of the Object(s) box; the Select Folder dialog box displays. Select the computer, drive, folder, or sub-folder against which you wset will execute is a function of the reports being run and the number of files being examined

6. On the Run Report dialo The report set begins running. When the report set finishes running, the output displays on your screen in the format specified on the Format tab (page 139) of the report set's properties. (Oneexception: If the report's format is DBF, the report does not display on your screen.)

o

o If you specify a value in the Report Output Folder field of the Repotab (page 68) of the global properties, the value ta

o If you specify a value in the Save the report to the following folder fiof the Output tab of the report set's properties dialog box, the valuetakes precedence over the default and the report destination property value.

amining the report on your screen, you may do one or more of the following:

Print it

• Save it to a hard drive for future examination. (StorageCentral automatically saves the report for y

you probably want to name the file yourself and place it in a location of your choosing.)

144 StorageCentral User Guide

Page 155: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Send it to another user by selecting File | Send | Page by E-mail from the web

• if it permits. For example, some reports is is called drilling

pen, delete, and move individual files.

Note: You are unable to drill down if you are running StorageCentral under

RunninUse batrecurring b

Runnin he instruct specify when t area. If you want to e-mail the report after it runs, click Mail and specify the recipients.

ot run, do one of the following:

ane, find a report that did not run according to schedule, and look for any error

ges. The solutio on the kind of error.

• On the management find a report that didSR_timestamp.txt ditimestamp value is reptime in that order.

• In case a report is sch ask scheduler llec

none.

e \Program .log rors.

• View the Task Scheduler log. The log will indicate if the job was submitted and ran successfully, with regards to the schedule process.

browser's menu.

Take action directly from the reportenable you to run another report to get additional details; thdown. Other reports enable you to o

Windows NT.

g a Report Set Batch ch reports when you want to run a report set at a specific time, either once or on a

asis.

g a report set as a scheduled job is similar to running it interactively. Follow tions for running an interactive report set, but select the Schedule job option and

to run the report set by providing values in the Schedule repor

If a scheduled report set does n

• On the management pane, expand the Report Collectors. On the details p

messa n will depend

pane, expand the Report Collectors. On the details pane, not run according to schedule, and check if the text file splayed in the Command path exists on the disk. The resented in numbers showing the year, month, day, and

eduled on a remote collector, check if the taccount on that co tor has access to your computer. Give access if there is

• Check thfile for er

Files\Veritas\StorageCentral\5.2\bin\StorageReports

145

Page 156: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections Rep

“Creating a New Rep“Deleting a Report Se

and Modif“Copying a Report Se“Renaming a Report

For information abouStorageCentral, read

For an introduction t page 1

addition to runninrun

the

Predefined Report Sets

T the repor

“Introduction to ort Sets” (page 135) ort Set” (page 136) t” (page 137)

“Viewing ying Report Set Properties” (page 137) t” (page 142)

Set” (page 143)

t the report sets that come pre-packaged with the section “Predefined Report Sets” on page 146.

o report collectors, read the section “Introduction to Report Collectors” on

In

14.

g report sets through the StorageCentral graphical user them through the command line interface. For minterface, you can

information, readore

section “Command SCReport” on page 165.

his section defines t sets that come pre-packaged with StorageCentral.

Report Set Description Best Practices A representation of storage management best practices

. The that is a good starting point for disk space analysisBest Practices Report gives an overall indication ofsystem's disk health. This

your report identifies files by type,

duplicate files, large scale files, files not being backed up, most commonly used files, and nightly backup requirements. This report contains drill-down capabilities so you may access file detail.

Chargeback Summary

Allows you to view the files by any property contained within the user profile in the Active Directory and assignsa dollar value to the storage used by those files.

Daily Storage Provides daily storage usage details for the managed object.

146 StorageCentral User Guide

Page 157: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report Set Description Disk Drive Summary d type. Lists all partitions and their capacity, free space an

You may drill into the partition for more detailed information.

Duplicate Files an excessive Identifies duplicate files that may useamount of space. This information is useful for cleaning up disk space quickly.

File Type Summary Provides usage details for the disk profile. Drill down into category details by double-clicking a category in the pie chart or from the report table. In addition, files are sorted by file groups, and the size of each file group is calculated.

Files Created This Month ay

Identifies files based on when the file was created. This is useful for determining environment changes that mhave caused system or disk capacity problems.

Files Not Accessed in Over One Year

Identifies files that have not been accessed in over one year.

Files Not Being BaUp

cked

p

Identifies files that have been modified but have not beenbacked up according to the NTFS archive bit. This bit is used by backup applications to indicate a file's backustatus.

Files To Remove Identifies various temporary file types that can be removed from the system.

Graphic Files Displays all the graphics files contained in the object. This is useful for locating graphic files by name or type.

Insecure Files Displays "at risk" files. Files with access to all are considered "at risk" files.

Internet Files Displays all the files contained in the managed object with extensions *.htm, *.html, *.url, and *@*.

Large Duplicate Files Selects large files that contain duplicate copies within the passed directory path. Files that have a close name matand the same size can be considered duplicates. A cl

ch ose

be a duplicate.

match is done by comparing the number of letters in thefile name that are the same, starting with the left-most letter and proceeding right. Optionally, the files maycompared before being counted as

Large Files Identifies large files based on the file's size. This is useful for locating and recovering disk space quickly.

147

Page 158: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report Set Description Large Folder ObSummary

ject seful to quickly locate large folder objects.

Identifies folder objects larger than 2 MB. This information is u

Large Users Summary ace usage by user identifier.

Identifies space by user. This information is useful to track sp

Media Files Displays all the media files contained in the object. This is useful for locating media files by name or type.

Microsoft Office Files Displays all Microsoft Office files contained in the object. e This is useful for locating Microsoft Office files by nam

or type. Most Commonly Used Files

Presents the amount of raw capacity accessed each day. This is useful for balancing applications, data, and users across available resources and to prevent under-used or over-burdened file servers.

New Files Identifies files created today. This is useful for determining environment changes that may have caused system or disk capacity problems.

Pinpoint Security Problems

This report is for advanced users. Understanding of file security is necessary to make use of this information. This report identifies files that contain undefined Access Control Entries (ACEs) within an Access Control List (ACL) and also identifies files that have an undefined owner. Undefined ACEs impact file system performance as well as system security integrity, whereas files that have an undefined owner are useful to pinpoint potential security breaches, orphaned files and to ensure files are owned by the proper user.

Space Allocation Summary

Identifies all of the space limits defined on the server.

Space Allocation Trend Summary

Reads the trending database (SCTrend.mdb) and reports about the space allocation objects, space used by them, their space limit, the owner, and other information.

Space By Folder Object Summary

Identifies all the folder objects in the managed object to the depth specified in the report content property. This information is useful to quickly identify large folder objects and folder object trees.

Space By Group Summary

Identifies space by file group. This information is useful to track space usage by group identifier.

148 StorageCentral User Guide

Page 159: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report Set Description Space By User Displays the utilization by each user in the domain for the Summary selected path. Weekly Storage Provides weekly storage usage details for the managed

object.

Related Sections For an introduction to report sets, read the section “Introduction to Report Sets” on page 135.

149

Page 160: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Preferred

Introduc d Preferred Machines A prefer ters. The purpose rs in one place. W r does not have to these comput

Preferred cess. This is a user-s istry.

For preferred machines, you may:

• Delete a preferred group

Rename a preferred group

• nd modify preferred group properties

For

• App

• Star n them

• Run report

• Clear properties (available only in AD editions)

Groups and Machines

tion to Preferred Groups anred group is a named logical entity that contains one or more compu of creating a preferred group is to group commonly used computehen target computers are included in the preferred group, the use

browse through the Microsoft Windows Network and can manage ers directly from the preferred group.

machines are computers included in the preferred group for quick acpecific setting stored in the local reg

• Create a new preferred group

For a preferred group, you may:

• Run a report on all objects in the preferred group

View a

a single preferred machine, you may:

ly computer policy (available only in AD editions)

t and stop services (available only in computers with the agent installed o)

150 StorageCentral User Guide

Page 161: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Delete a preferred machine

• View and modify preferred machine properties

referred Group” (page 151)

“Renaming a Preferred Group” (page 152) “Viewing and Modifying Preferred Group Properties” (page 153)

to a Preferred Machine” (page 153) ice on a Preferred Machine” (page 154)

Machine” (page 155)

)

Creating a New Preferred Group group:

ose New |

2. On the Welcome to the New Preferred Group Wizard dialog box, click Next.

log box, enter the name of the group and click

o Expand the Computers list and select computers to include in the group.

o Right-click in the Selected computers area and click Add. The Add computer dialog box displays. Type the name of the computer you want to add and then click OK.

Related Sections “Creating a New P“Deleting a Preferred Group” (page 152)

“Applying a Computer Policy“Starting or Stopping Serv“Deleting a Preferred“Viewing and Modifying Preferred Machine Properties” (page 155) “Running a Report Set” (page 143

To create a new preferred

1. On the management pane, right-click Preferred Machines. ChoPreferred Group.

3. On the Preferred Group Name diaNext.

4. On the Select Computer dialog box, do one of the following:

5. Click Next.

151

Page 162: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

6. On the Completing the Preferred Group Wizard dialog box, click Finish to create the preferred group.

Relate

“Int ge 150)

Deleting a Preferred Group To delete a

1. On the m select the Del o

2. A messa . Click Yes to delete the

Related Sections

ed Groups and Preferred Machines” (page 150)

Renaming a Preferred Group

Related Sections

“Introduction to Preferred Groups and Preferred Machines” (page 150)

d Sections

roduction to Preferred Groups and Preferred Machines” (pa

preferred group:

anagement pane, right-click the preferred group to delete and ete ption from the menu.

ge displays prompting for confirmationpreferred group.

“Introduction to Preferr

To rename a preferred group:

1. On the management pane, right-click the preferred group to rename and select the Rename option from the menu.

2. Enter the new name in the text field and press Enter.

152 StorageCentral User Guide

Page 163: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Vie ying Preferred Group Properties

1. On the management pane, right-click the preferred group and select the Properties option from the menu.

o Add a computer to the list by expanding the Computers list and selecting computers to include in the group.

ter to the list by right-clicking in the Selected computers alogd t

Related Sections

“Introduction to Preferred Groups and Preferred Machines” (page 150)

Applying a Computer Policy to a Preferred Machine

tral. To do so, follow these steps:

1. On the management pane, expand a preferred group, right-click the target computer, and select the Apply Computer Policy option from the menu.

d click OK.

wing and ModifTo view and modify preferred group properties:

2. On the Select Computers tab, do one of the following:

o Add a compuarea and clicking Add. The Add computer di box displays. Type the name of the computer you want to add an hen click OK.

o Remove a computer from the list by highlighting it in the Selected computers area and clicking Remove.

3. Click Apply and then click OK to save your modifications -or- click Cancel to return to the management pane.

You can apply a computer policy to a single preferred machine only if you are running an Active Directory edition of StorageCen

2. On the Select Computer Policy dialog, select a policy to apply an

153

Page 164: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections

“Introduction to Preferred Groups and Preferred Machines” (page 150)

Starting or Stopping Service on a Preferred Machine This s ce tion provides instructions to start or stop service on a preferred machine.

Starting Service

A computer that has no service turned on is marked with the symbol and nothing displays in the details pane.

To start service, go to the management pane and expand a preferred group. Right-click a

t and trend data that have exceeded their retention period. The retention periods were specified on the Audit and Trending tabs beginni

Stopping Service

A computer that has a service turned on is marked with the

target computer and click Start Service.

When the service starts, StorageCentral deletes audi

, as documented in the section “Viewing and Modifying Global Properties” at the ng of Chapter 3.

symbol and its file groups,

To stop service, go to the management pane and expand a preferred group. Right-click a target computer and click Stop Service.

Related Sections

Groups and Preferred Machines” (page 150)

policies, reports, and managed objects display in the details pane.

“Introduction to Preferred

154 StorageCentral User Guide

Page 165: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Deleting a Preferred Machine te a preferred machine:

1. On the management pane, expand a preferred group, right-click the computer to delete, and select the Delete option from the menu.

confirmation. Click Yes to delete the

“Introduction to Preferred Groups and Preferred Machines” (page 150)

ViewiTo view a efe properties:

1. On the man gemcomputer, and se e organized on a se hich tabs display is a function of what computer y rking computer.

2. View ify the propert Refer to the sectio roperties” at the beginning o a tabs you see.

3. C to modi ons.

Related Sections

• “Introduction to P

To dele

2. A message displays prompting forcomputer.

Related Sections

ng and Modifying Preferred Machine Properties nd modify pr rred machine

a ent pane, expand preferred group, right-click the target lect the Properties option from the menu. The properties arries of tabs. W

ou are wo on and which edition of StorageCentral is installed on the

or mod ies on the tabs.

n “Viewing and Modifying Global Pf Chapter 3 for detailed description of the options available on the

lick OK fy the properties -or- click Cancel to discard modificati

referred Groups and Preferred Machines” (page 150)

155

Page 166: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Audit Data

Introduct to Audy view space allocation and file blocking actions in the Audit window. To save

n creating a managed object or e Notification tab.

2. The data stored in the audit database and displayed in the grid includes:

iption

ion it Data You maand later view space allocation and blocking actions, whedefining a managed object policy, select Record alarm option on th

To view space allocation and blocking actions:

1. On the management pane, expand Audit. In the details pane, a grid with audit data displays.

Field Name DescrFile Name The fully-qualified file name that triggered the alarm

action. For example, this is the file that was being updated when the quota was exceeded or a prohibited file type for file blocking.

Message The message that was configured for the alarm action(s) on the Notification tab when defining the policy or managed object.

Object The drive, partition, folder, or filename, etc. that was being monitored by the managed object.

Policy Name The policy name, assuming the managed object is associated with a policy. You can create managed objects that have no policy association.

Server The Windows server name where the managed object resides.

Status This identifies whether the action that caused the alarm to be triggered was "Allowed" or "Denied". "Allowed" basically means that the space allocation or file blocking object was defined as being passive, whereas "Denied" indicates that the object was active, or non-passive.

Time The date and time that the alarm was triggered.

156 StorageCentral User Guide

Page 167: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Field Name Description Type This identifies the type of managed object. "ALLOC" is

objects, whereas "BLOCK" is displayed for space allocation displayed for file blocking objects.

User e file operation which triggered the alarm. The user and domain name are provided. The user that performed th

ID A sequential number that is assigned to each audit record.

Note: You can change the order of the fields in the grid.

IMP he ODBC d osoft Access database even if the UI focus is on another server or another domain. Use a cenconnect

Re

After an se for n days, StorageCentral deletes it. The value for Audit tab, which is documented in the sect perties” at the beginning of Chapter 3.

rameters for your system. Read the section “Audit Tab” (page 64) in the section “Viewing and Modifying Global Properties” for an

• ain, use a centralized t the centralized database, read

on page 192.

Support” on page 202.

ORTANT The Audit Database (as well as the Trend Database) is used through tata source. By default, the User Interface (UI) looks only at the local Micr

tralized database to see the records for all computers in the domain which the UI is ed to.

moving Expired Data

audit record has been in its databan is specified in the Period field on the

ion “Viewing and Modifying Global Pro

Related Sections

• You may change the audit pa

explanation of the parameters.

To see the audit records for all computers in the domMicrosoft Access database. For information abouthe section “Centralized Database”

• You may choose to have StorageCentral store its audit data in Microsoft SQL Server. However, you must first configure StorageCentral to use SQL Server to store this data. For instructions, read the section “Configuring SQL Server

157

Page 168: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Other related sections:

ing an Audit Record” (page 158) “Viewing and Modifying Audit Properties” (page 158)

Viewing and Modifying Audit Properties To view or modify audit properties:

1. On the management pane, expand Audit. In the details pane, a grid with the audit information displays. Right-click on the grid and click Properties.

2. On the Columns tab, view and modify the columns displayed and the columns' order. Use the Move up and Move down buttons to change the columns' order.

3. On the Date tab, you may filter records by date.

4. On the Custom tab, you may filter records by: user name, policy name, object name, file name, access, and type.

5. Click OK to modify the properties.

Deleting an Audit Record To manually delete an audit record:

1. On the management pane, expand Audit. In the details pane, a grid with audit information displays. Right-click on the grid and click Delete.

2. A message displays prompting for confirmation.

3. Click Yes to delete the record.

To find out how StorageCentral automatically deletes old audit records, read the section “Removing Expired Data” (page 157) in the section "Introduction to Audit Data."

“Delet

“Refreshing Audit Data” (page 159)

158 StorageCentral User Guide

Page 169: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Refreshing Audit Data

1. On the management pane, expand Audit. In the details pane, a grid with audit information displays.

grid and click Refresh -or- click the refresh icon on the toolbar.

To refresh audit data:

2. Right-click on the

159

Page 170: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Command Line Commands

Command SCAlloc Use this commap es.

Command Syntax

S loc [\\ser

S er ”]

S [\\ser [[/I | /L] | [/U “domain\user”]] [/X]

S \\ser | /L] | [/U “domain\user”]] [:KB | /R[:KB | :MB | :GB] “number”] [/[-]W] [/[-]E] [/X]

S er “policy” [[/I | /L] | [/U “domain\user”]]

S [\\ser “domain\user”]] [:KB | ber”] [/[-]W] [/[-]E] ]

SCAlloc [\\server] /D

SCAlloc [\\server] /D[Y] /O “object” [[/I | /L] | [/U “domain\user”]]

rver] /S /O “object”

SCAlloc -]Z /O “object”

nd to perform functions related to space allocation managed object olici

CAl ver] /LIST

CAlloc [\\s ver] /SHOW [/O “object

CAlloc ver] /A /O “object” /T “policy”

CAlloc [ ver] /A /O “object” [[/I [/P :MB | :GB] “number”] [

CAlloc [\\s ver] /M /O “object” /T [/X]

CAlloc ver] /M /O “object” [[/I | /L] | [/U [/P :MB | :GB] “number”] [/R[:KB | :MB | :GB] “num [/X

A[Y] /O “object”

SCAlloc [\\se

SCAlloc [\\server] /Y [/O “object”]

[\\server] /[

160 StorageCentral User Guide

Page 171: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

/LIST List all space allocation policies /SHO/A

Default space limit is 10 MB

/D[A]

/S /Y can each individual managed object on each volume

/Y /O “object” = Scan each individual managed object on the

/X

/O Managed object name uto detect subfolders

/L

/P:KB Space limit in kilobytes in megabytes

/P:GB/R Overdraft in bytes (default)

/R:MBs

/[-]E /[-]W Save open files (default), -W Do not save open files

olume, -Z Disable volume /U er] /? Help

SCAlloc /a /o C:\Test /t "100 MB Limit" Adds a space allocation object on C:\Test using the "100 MB Limit" managed object policy

W Show all space allocation managed objects Add

o o Default overdraft value is 0 MB

[Y] Delete[All][No confirmation] /M Modify

Scan the named managed object /Y = S

named volume Delay the scan until an SCAlloc command is issued with a /S or /Y switch

/I Enable aEnable auto detect users

/T Policy name /P Space limit in bytes (default)

/P:MB Space limit Space limit in gigabytes

/R:KB Overdraft in kilobytes Overdraft in megabytes

/R:GB Overdraft in gigabyteActive limit (default), -E Passive limit

/[-]Z Enable vUser or group, [Domain\Us

Examples

161

Page 172: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

SCAlloc /a /x /o C:\Test /t "100 MB Limit"

SCA oc /a /o C:\ /p:mb 10 /r:kb 2 /e /u Domain\Joe

SCAlloc /a /l /o C:\Test /t "100 MB Limit"

SCA o

SCAlloc /d /o C:\Test Deletes the space allocation object on C:\Test

SCAlloc /d /l /o C:\Test detect user object on C:\Test

Deletes the auto detect folder object on C:\Test

SCAlloc /m /o C:\Test /p:mb 5 /-e

Scans the managed object C:\Test

SCAlloc /y ota managed objects

SCAlloc /y /o s a on volume C:\

Adds a space allocation object on C:\Test using the "100 MB Limit" managed object policy and does not perform a scan

llAdds a user allocation object on C:\ with user Domain\Joe

Adds an auto detect user object on C:\Test using the "100 MB Limit" managedobject policy

ll c /a /i /o C:\Test /t "100 MB Limit" Adds an auto detect folder object on C:\Test using the "100 MB Limit" managed object policy

SCAlloc /d /o C:\ /u Domain\Joe Deletes the user allocation object on C:\ with user Domain\Joe

Deletes the auto

SCAlloc /d /i /o C:\Test

Modifies the space allocation object C:\Test

SCAlloc /s /o C:\Test

Scans all the qu

C:\ Scan ll the quota managed objects

162 StorageCentral User Guide

Page 173: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

R ted Sec

“Comm d that enables you to perform

• “Command SCBlock” (page 163) explains the command that enables you to perform functions on file-blocking managed object policies.

mand SCReport” (page 165) explains the command that enables you to

• al through its graphical user interface. For more information about

MC Overview” on page 10.

Command SCBlock erform functions related to file-blocking managed object policies.

Co m

SCBlock

SCB ck

SCB ck [\\server] /A /O “object” /P “policy”

SCBlock

SCBlock [\\server] /D[Y] /O “object”

SCBlock [\\server] /S

/A Add /D[A][Y] Delete[All][No confirmation]

ela tions

• and SCSRM” (page 168) explains the comman functions on all managed object policies.

• “Comproduce reports.

In addition to using the command line interface, you can manipulate StorageCentrthis GUI, read the section “M

Use this command to p

m and Syntax

[\\server] /LIST

lo [\\server] /SHOW

lo

[\\server] /DA[Y]

/SHOW Show all managed objects /LIST List all file-blocking policies

163

Page 174: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

/P Policy name /O Managed object name /S /?

Examp

SCBject C:\Users having the "Monitor Office Files" managed

bject policy

SCBloc

Re

• “Command SCAlloc” (page 160) explains the command that enables you to space allocation managed object policies.

• In addition to using the command line interface, you can manipulate StorageCentral through its graphical user interface. For more information about this GUI, read the section “MMC Overview” on page 10.

Command SCDisplayLimit The SCDisplayLimit.exe command displays a message showing users their current space

ion. The command displays the information during logon.

Notify driver to scan managed objects Help

les

lock /a /o C:\Users /p "Monitor Office Files" Adds the managed obo

k \\NTDEV /d /o C:\Test Deletes the managed object C:\Test on machine \\NTDEV

lated Sections

“Command SCSRM” (page 168) explains the command that enables you to perform functions on all managed object policies.

perform functions on

• “Command SCReport” (page 165) explains the command that enables you to produce reports.

allocation usage informat

164 StorageCentral User Guide

Page 175: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Before this command can be used, the domain administrator must follow these steps to configure the user's logon script to run SCDisplayLimit.exe during logon:

r.tlb from the CD’s \Utilities\Logon directory to the NETLOGON shared directory on the domain controller.

Th ory is located in a directory similar to this: you ipts

CrSC Fo d:

Co on script to run the script created in step 2 by entering the scr "displaylimit.cmd" in the above example) in the Logon Script box of the Profile tab on the user's Properties dialog box.

Related Section

dditio al through isection “M

CommanUse this comm rts.

Command Syntax

SCReport [\\server] /LIST

1. Copy SCDisplayLimit.exe and qasv

e NETLOGON shared directr-system-drive:\winnt\SYSVOL\sysvol\your-domain-name\Scr

2. eate a logon script in the NETLOGON shared directory to run DisplayLimit.exe.

r example, the following script file might be named DisplayLimit.cm echo displaylimit script \\NTDEV\C$\winnt\SYSVOL\sysvol\wquinn.com\Scripts\

SCDisplayLimit /hd pause

3. nfigure a user's logipt name (

In a n to using the command line interface, you can manipulate StorageCentrts graphical user interface. For more information about this GUI, read the

MC Overview” on page 10.

d SCReport and to perform functions related to producing repo

165

Page 176: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

SCReport [\\server] /F “parameter file”

[/

/O /M Specify "Mail To" addresses separated by a semicolon. The values

lues (if any) specified

ies dialog box. If you do not use the /M switch, SCReport will e-mail the report output to the

the following email

/D name /F Specify the batch command (parameter file) file name

r /?

mmand

If the report object of the /O switch contains the root of two or more

example, C:\ and D:\) separated by a pipe character and SCReport incorrectly interprets what you type as the

SCReport /R "File Type Summary" /O "C:\|D:\"

o SCReport /R "File Type Summary" /O "C:|D:"

SCReport [\\server] /R “report set” /O “object” [/M “email”] D “output directory or file name”]

/LIST List all report set names /R Specify report set name

Specify one or more managed objects separated by a pipe line

you specify for the /M switch override the vain the Mail the report to the following email address field on the Output tab of the report set's propert

value specified in the Mail the report to address field. Specify the output directory or file

/UF Specify user filteHelp

Notes: e used in the batch coThe /R, /O, /M, /D, and /UF switches can bfile.

partitions (forenclosed in quotes, escape sequence and the report is only run against the first partition. For example, typing this causes the problem:

To work around this problem, type one of the following: o SCReport /R "File Type Summary" /O "C:\\|D:\\"

166 StorageCentral User Guide

Page 177: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Ex p

SCRepo

managed objects.

ummary" /o C:\ /m [email protected] t named File Type Summary against the C:\ volume and send

SCReport /r "Best Practices" /o C:\ /d C:\report.html Run the report set named Best Practices against the C:\ volume and send the

amed C:\Report.html.

s" /o C:\ /d C:\Output Run the report set named Best Practices against the C:\ volume and send the

t Run the batch command file named Param.txt.

R Se

“Com SRM” (page 168) explains the command that enables you to perfo policies.

“Com ) explains the command that enables you to perfo on space allocation managed object policies.

“Com SCBlock” (page 163) explains the command that enables you to perform tions on file-blocking managed object policies.

• For a list and explanation of the report sets that come with StorageCentral, read the section “Predefined Report Sets” on page 146.

am les

rt \\NTDEV /r "Best Practices" /o "C:\Test|D:\Test" Run the report set named Best Practices against the C:\Test and D:\Test

SCReport /r "File Type SRun the report sethe output to the [email protected] e-mail address.

output to a file n

SCReport /r "Best Practice

output to a file in folder C:\Output.

SCReport /f C:\Param.txt Run a report set using the instructions in the batch command file named C:\Param.txt.

SCReport \\NTDEV /f \\NTDEV\VeritasReportParameters\Param.tx

elated ctions

• mand SCrm functions on all managed object

• mand SCAlloc” (page 160rm functions

• mandfunc

167

Page 178: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• In addition to running report sets through the command line interface, you can interface. For more

CoUse this form functions related to all managed object policies.

Comm

T

SCSRM [\\server] /SHOW

SCSRM

SCSRM “policy” [[/I | /L] | [/U “domain\user”]]

SCSRM [\\server] /D[Y] /O “object” [[/I | /L] | [/U “domain\user”]]

anaged object policies /S O/A /D ]/M/O Managed object name /I /L detect users /P Policy name /U/?

run them through the StorageCentral graphical user information, read the section “Running a Report Set” on page 143.

mmand SCSRM command to per

and Syntax

SCSRM [\\server] /LIS

[\\server] /A /O “object” /P “policy” [[/I | /L] | [/U “domain\user”]]

[\\server] /M /O “object” /P

/LIST List all mH W Show all managed objects

Add [Y Delete[No confirmation] Modify

Enable auto detect subfolders Enable auto

User or group, [Domain\User] Help

168 StorageCentral User Guide

Page 179: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Examples

SCSRM /a /o C:\Test /p “250MB Limit with blocking” Adds both an allocation and a blocking object on C:\Test using the “250MB Limit with blocking” managed object policy

SCSRM /a /l /o C:\Test /p “100MB Limit” Adds an auto detect user object on C:\Test using the “100MB Limit” managed object policy

SCSRM /m /i /o C:\Test /p “100MB Limit” Modifies the auto detect folder object on C:\Test using the “100MB Limit” managed object policy

SCSRM /d /o C:\Test Deletes managed object on C:\Test

SCSRM \\NTDEV /d /i /o C:\Test Deletes the auto detect folder object and blocking object on C:\Test on machine \\NTDEV if the object exists

Related Sections

• “Command SCAlloc” (page 160) explains the command that enables you to perform functions on space allocation managed object policies.

• “Command SCBlock” (page 163) explains the command that enables you to perform functions on file-blocking managed object policies.

• “Command SCReport” (page 165) explains the command that enables you to produce reports.

• In addition to using the command line interface, you can manipulate StorageCentral through its graphical user interface. For more information about this GUI, read the section “MMC Overview” on page 10.

169

Page 180: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

170 StorageCentral User Guide

Page 181: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter .4 Working with NetApp Filers

Introduction to Using StorageCentral with Network Appliance Filers

Stor eblockin Filer.

Storagedifferenthat no APIs thallocatio rced directly by the Filer, while file blocking is enforced by third-party software, such as StorageCentral for Network Appliance, running on a machine other than the Filer.

rements that must be met before you can use StorageCentral with your Networ inst ed“Requir mplete explanation of what you need to run StorageCentral.

ControllingYou can turn Network Appliance Filer’s quotas on or off from the grid in the managed object detail

f, , and choose Quotas on.

Wa etimes nothing happens and no error message displays. This may happen when there are until all e online before turning on quotas.

ag Central for Network Appliance provides support for space allocation, file g, and reporting against the Network Appliance

Central for Network Appliance provides support for the Filer in a manner quite t from that for directly attached storage devices. The reason for this difference is third-party software runs on the Filer. Network Appliance has provided a set of at can be used to set and manage space allocation and file blocking. Space n is enfo

There are several requik Appliance Filer. For example, the proper version of Data ONTAP must be

all on the Filer, and the Filer must have CIFS enabled. Read the section ements” on page 20 for a co

the Filer from StorageCentral a

s pane. You can also resize and restart quotas.

• To turn all quotas on, point in the grid to a volume with its quotas turned ofright-click

rning: If you attempt to turn on quotas on a volume that is online, som

quotas defined for a different volume that is offline. If this happens, wait volumes ar

171

Page 182: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• To turn all quotas off, point to one of the Filer’s quotas in the grid, right-click,and choose Quota Management | Quotas off.

• To resize all quotas, point to one of the Filer's quotas in the grid, right-click, and

s

as when there are quotas defined for a different volume that

is offline. If this happens, wait until all volumes are online before restarting quotas.

Re• For information about specific StorageCentral features and Network Appliance

o “File Blocking and Network Appliance Filers” (page 173)

o “Space Allocation and Network Appliance Filers” (page 174)

etection and Network Appliance Filers” (page 180)

o “Computer Policies and Network Appliance Filers” (page 181)

• For information about configuring the Network Appliance Filer, read these sections:

o “Converting to Qtrees on Network Appliance Filers” (page 182)

o “Configuring SNMP for Space Allocation on Network Appliance Filers” (page 182)

o “Configuring File Blocking on Network Appliance Filers” (page 183)

choose Quota Management | Resize quotas.

• To restart all quotas, point to one of the Filer's quotas in the grid, right-click, and choose Quota Management | Restart quotas.

Warning: If you attempt to restart quotas on a volume that is online, the quotafor that volume may disappear and be replaced with an entry that reads “quotoff.” This may happen

lated Sections

Filers, read these sections:

o “Auto D

172 StorageCentral User Guide

Page 183: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• For information about macros you can use to generate notification messages from Network Appliance Filers, read the section “Message Macros” on page 223.

File Blocking and Network Appliance Filers t for file blocking, as provided by prior versions of StorageCentral, is

provided. However, all blocking requests are sent over the network from the Filer to the Stor e

For file blocking to be enabled, file screening on the Network Appliance Filer must be enabled Blocking on Network Appliance Filers” on page 183.

LimStorageCentral does not block files residing on Network Appliance Filers under these conditio

• ough a UNIX client; only files added or modified through a Windows machine can be blocked on Filers

• The file blocking request originated from the remote agent

rm used

Full suppor

ag Central for Network Appliance agent (remote agent) for servicing.

. For instructions, read the section “Configuring File

itations

ns:

The files were added or modified thr

Note: File blocking is the term used by StorageCentral, while file screening is the teby Network Appliance.

173

Page 184: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Space Allocation and Network Appliance Filers The File oes not match that provided by StorageCentral.

The File

• Has hard and soft limits, and a threshold—all specified by numbers. Each of

ation on a qtree.

he next multiple of 4. For example, a quota established at 1 K becomes 4 K, while a 6 K quota becomes 8 K.

The following is true of StorageCentral when working with Microsoft Windows-

ermine if the space allocation is passive or not, and a single value for the space allocation. Up to 5 alarms can be set, all based off the space

ercentage.

n on any folder or file on a disk.

Wit h orageCentral has implemented space allocation support in a fashion that mimics, as closely as possible, the support found in its Win w the values available through the Filer. For examples of this, read the section “Space Allocation and Network Appliance Filers—Examples” on page 17

Limit ioIf a man ides on a Network Appliance Filer is renamed, Stora eC bout the newly renamed object. The object will no longer display objects.

r has a paradigm for space allocation that d

r...

these numbers can cause an alarm to be triggered.

• Only supports space alloc

• Rounds all quotas up to t

controlled objects...

• Has a flag to det

allocation amount as a p

• Supports space allocatio

h t ese differences in mind, St

do s environment while using

6.

at ns aged object that res

g entral will not know a in the list of managed

174 StorageCentral User Guide

Page 185: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Network Appliance requires that a Filer's quotas be 1 K or larger. This size limit applies to quotas you set explicitly and implicitly.

• If you try to create a quota on a qtree using the "% of Size Used" units with a percent value that results in a quota of less than 1 K, a quota rule with all null values is created on the Filer.

Space allocation features on the Filer that StorageCentral does not support:

and soft

e allocatio

ip

StorageCentral space allocation features not available for Filer support:

• Always save open files

• ater mark

isk full error co

• Folders below root level

• If you manually create a quota with a space limit of 1-1023 bytes, a quota rule with all null values is created on the Filer.

• File limits, hard

• Default spac n

• Mult le users on one quota

• Overdraft limit

Reset high-w

• Send d de

• Exclude from folder limit

• Activate below value (an option associated with alarms)

Notify user (an action option)

• Extend (an action option)

Alarms 3, 4, and 5

• File space allocation

175

Page 186: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Space Allocation and Network Appliance Filers—Examples This section provides numerical examples of the information presented in the section “Space Allocation and Network Appliance Filers” on page 174.

BaSay you used the FilerView application to establish a quota on the Network Appliance Filer es:

e Limit

ckground

with these valu

Disk SpacSoft Hard

eshold Thr

40 MB 50 MB 30 MB

If you then viewed this configuration using StorageCentral, this is what you would see o box w ing the managed object (that is, the Filer’s qtree):

Passive Limit Checkbox

Disk Space Limit Alarm 1 Alarm 2

n the Properties dialog hen examin

Not selected 50 MB 100% 80%

An expl

FilerView. Put another way, the space allocation limit for this managed object is active.

• hat is the value of the hard disk space limit on the Filer.

• StorageCentral automatically sets Alarm 1’s percentage to 100%.

anation of these values:

• The Passive Limit check box is not selected because you specified a hard disk space limit through

StorageCentral sets the disk space limit to 50 MB because t

176 StorageCentral User Guide

Page 187: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• StorageCentral computes Alarm 2’s percentage using the Filer’s soft and hard disk space limits—the 40 MB soft disk space limit is 80% of the 50 MB hard disk

Example 1: Turn Passive Limit On S e example in the “Bac d” section, torageCentral to hange the properties of the managed object. Specifically, select the Passive Limit check

box to change the space allocation limit for this managed object from active to passive.

sive Limit Checkbox

Disk Space Limit Alarm 1 Alarm 2

space limit.

tarting with th presented kgroun use Sc

Pas

Selected 50 MB 100% 80%

en use iew to view the properties of this quota on the Filer, you would ee this:

Isf you th d FilerV

Disk Space Limit So

shold Threft Hard

50 MB -- 40 MB

An l

• space limit is 50 MB because the StorageCentral disk space limit becomes the Filer’s soft disk space limit.

• limit is passive rather than active.

• The threshold is 40 MB because it is 80% of the 50 MB StorageCentral disk space orageCentral Alarm 2.)

exp anation of these values:

The soft disk

There is no hard disk space limit because the space allocation

limit. (The 80% comes from the St

177

Page 188: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Examp nge ce LS e example d in the “Bac d” section, torageCentral to h f th ged object. Spec ge ace limit

50 MB to 100 MB.

eckbox

le 2: Cha the Disk Spa imit tarting with th

ange the properties opresentee mana

kgrounifically, chan

use Sthe disk spc

from

Passive Limit Ch

Disk Space Limit Alarm 1 Alarm 2

Not selected 100 100% 80% MB

I en use iew to view the properties of this quota on the Filer, you would ee this: f you th d FilerV

s

Disk Space Limit So

hreshold Tft Hard

80 MB 100 MB --

An l

• space limit is computed as a percentage of the hard disk space limit. The percentage used in this calculation (80%) comes from Alarm 2 of

• The hard disk space limit has a value because there is an active (not passive) space allocation limit. This value (100 MB) comes from the StorageCentral disk space limit.

• There is no threshold because StorageCentral supports only two alarms on Filers, and the second alarm sets the soft disk space limit.

Example 3: Change Alarm 2 Starting with the example presented in the “Background” section, use StorageCentral to change the properties of the managed object. Specifically, change the value of Alarm 2 from 80% to 40%.

exp anation of these values:

The soft disk

StorageCentral.

178 StorageCentral User Guide

Page 189: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Passive Limit Checkbox

Disk Space Limit Alarm 1 Alarm 2

Not selected 50 MB 100% 40%

If you then used FilerView to view the properties of this quota on the Filer, you would see this:

Disk Space Limit Soft Hard

Threshold

20 MB 50 MB --

An explanation of these values:

• The soft disk space limit is computed as a percentage of the hard disk space limit. The percentage used in this calculation (40%) comes from Alarm 2 of StorageCentral.

• The hard disk space limit has a value because there is an active (not passive) space allocation limit. This value (50 MB) comes from the StorageCentral disk space limit.

• There is no threshold because StorageCentral supports only two alarms on Filers, and the second alarm sets the soft disk space limit.

179

Page 190: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Auto Detection and Network Appliance Filers This feature is not supported with the Network Appliance Filer.

Related Sections To learn more about the auto detection feature in StorageCentral, read the section “AutDetection” (page 190)

o .

180 StorageCentral User Guide

Page 191: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Computer Policies and Network Appliance Filers This feature is not supported with the Network Appliance Filer.

Related Sections To learn more about computer policies in StorageCentral, read the section “Computer Policies” (page 85).

181

Page 192: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Configuring the Filer to Work with SC

Converting to Qtrees on Network Appliance Filers Applying quotas to objects on the Filer can only be done when the object is defined thro qtree. If a root level directory needs to have quota management

To convert a root level directory, follow the steps below. Take care during this process to prevent access to the folders during the conversion and take backups before conversion.

Configuring SNMP for Space Allocation on Network Ap

ncluding e-mail) for the administrators. For this to happen SNMP must be configured correctly in the Filer.

Using the FilerView application provided by Network Appliance, follow the steps below to configure a Filer that StorageCentral is managing.

1. Click SNMP.

2. Click Configure.

3. Set SNMP Enabled to Yes.

ugh the Filer as a applied to it and it is not a qtree then it must be converted.

1. Rename the existing folder.

2. Create a qtree with the name of the original folder.

3. Move the data from the saved folder to the qtree.

4. Remove the renamed folder.

pliance Filers When space allocation on a Filer is exceeded, the Filer can generate SNMP traps that can be used to create notifications (i

182 StorageCentral User Guide

Page 193: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

4. Set Traps Enabled to Yes.

5. Set Auth Traps to Yes.

6. Under Communities, set the first unused row to: Read-Only, Public

7. Set the Traphosts, which correspond to the community, to the name of the remote agent. A fully qualified host name is recommended.

8. Click Apply.

Repeat these steps for each of the other Filers that StorageCentral is managing.

Configuring File Blocking on Network Appliance Filers File blocking must be enabled on the Filers for the StorageCentral agent to successfully register.

Using a Microsoft Windows command window, issue a telnet command against the Filer and connect to the Filer. After a connection has been established, enter this command:

fpolicy enable default

Related Sections

For information about the fpolicy command, refer to the Data ONTAP documentation from Network Appliance.

183

Page 194: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

184 StorageCentral User Guide

Page 195: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter 5. Reference

AD Fields in Custom Reports that contain information about the managed object owners (a

er). The AD fields are supported only in ay select AD fields from the Field Name

drop-down list or Fields list when creating custom reports (when creating new report definitions). The Field Name and Fields lists appear on the following dialogs: Query, Detail, Sort, Report Break, Total, Summary Query, Summary Sort, and Summary Total.

The AD fields are useful when you want to view the owner information from the managed object against which you are running a report. If several users own one managed object, the report created using AD fields will display information about all owners of that managed object.

Some of the AD fields are:

• Account Expires

• Company

• Country Code

• Employee ID

• Given Name

• Home Phone

• Machine

• Mail

• Name

• Owner

AD fields are the fieldsmanaged object could be a file or foldStorageCentral Active Directory editions. You m

185

Page 196: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Street Address

Re“Introduction to Reports” (page 117) “Creating a New Report Definition” (page 119)

• Title

lated Sections

186 StorageCentral User Guide

Page 197: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Applica EvenS entral nd warning messa example, your event log m ilar to this:

tion t Log torageC defaults to creating a record in the application event log for error a

ges as well as for space allocation and file blocking actions. Foray look sim

187

Page 198: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

The lication event log are discussed in the table below.

FiName

fields displayed in the app

eld Description

Type Indicates event type: an error message, a warning message, or an ation message. For example, the message may say the ng:

informfollowi

o Error: "Space limit exceeded for object X on C:\Test. Currspace used is 10MB."

ent

o Warning: "Space limit is approaching for object X on C:\Test. Current space used is 10MB. Please perform cleaning on your files. Failure to do so may restrict future access to HELEN2000."

o Information: "Space Allocation object on C:\Test was successfully modified."

Please note that the wording of the actual messages may differ from the one in our examples.

Date The date when an event occurred. Time The time when an event occurred. Source Indicates event source: Space Allocation Server or File Blocking

Server. Category None Event ID ID A numerical event ID. User N/A Computer Local computer name.

The records in the application event log can be filtered by any single field or a combination of fields. For example, you may filter the records just by event Source or by event Type, Source, and ID.

To access the application event log on a Windows 2000 computer:

1. Open computer management.

2. Click System Tools.

188 StorageCentral User Guide

Page 199: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

3. Click Event Viewer.

pplication.

Related Sections nformation about space allocation and file blocking actions, read the section wing and Modifying Global Properties” at the beginning of Chapter 3.

4. Click A

For i“Vie

189

Page 200: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Auto D

User “Auto detect all users” is a space allocation limit set on a folder so that a user who owns a fil napplied is enabluser spa a predefined policy. These are ideal for public shares.

Subfoldeentral applies a managed object policy you select

, a managed object) you specify. StorageCentral also applies this policy to any subfolders created in the future.

Subfolders are detected one level beneath the managed object. This is ideal for user home folders.

For example, say this was your current directory structure:

\Users \Ethan \Jessica \Martha

If you specified an "auto detect subfolders" policy for the \Users managed object, that policy will apply to the existing \Users\Ethan, \Users\Jessica, and \Users\Martha subfolders. Also, the policy will apply to any subfolders created in the future (for example, \Users\Douglas).

You can use "auto detect subfolders" on the Folder Options dialog box (see page 98) when you create a managed object.

etection Two types of auto detection are available: user and subfolder.

e i the folder will automatically be assigned a space limit. This space limit will be to any new owner of a file as well. If the auto detection all users space allocationed, any new user who allocates space within the managed object will be given a ce limit. This space limit is based on

r With "auto detect subfolders," StorageCto all subfolders of a folder (that is

190 StorageCentral User Guide

Page 201: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Handling Exceptions

a larger space limit than others, set these individually before ubfolders" managed object. Existing managed objects are not

uto detect subfolders" y to accomplish this.

olicy ,

Relat“Ty“Ru“Gr

If some subfolders requirecreating the "auto detect schanged by auto detection. An example of how this can work:

• The problem: In the directory structure shown above, the system administrator wants to apply a 250 MB limit on all users. Applying an "apolicy on the \Users managed object would be an easy waHowever, Ethan says he requires a larger limit.

• The solution: The system administrator applies (1) a policy with a 500 MB limit on the \Users\Ethan subfolder, and then (2) an "auto detect subfolders" pwith a 250 MB limit on the \Users subfolder that will apply to Jessica, Marthaand any users added in the future.

ed Sections pes of Space Allocation” (page 234) les of File Ownership” (page 228) oup Associations” (page 220)

191

Page 202: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

CentrageCentral installed on them

, all events occurring on different computers are displayed on the details pane of the StorageCentral Audit branch. Events are the space allocation and file blocking actions.

For the database to be centralized, install both StorageCentral and the database locally on the same computer. Every time you install StorageCentral on other computers, you must point their databases to the computer with the local database. To point numerous computers to one centralized database, change the destination folder path on the Destination Folder dialog during installation. To change the destination folder after installation, you must change DSN path in the ODBC data source.

To change SCAuditDB or SCTrendDB System DSN on Windows 2000:

1. Click Start | Settings | Control Panel.

2. Double-click Administrative Tools.

3. Double-click Data Sources (ODBC).

4. Click the System DSN tab in the ODBC Data Source Administrator dialog box.

5. Select the data source (SCAuditDB or SCTrendDB) you want to change and click Configure.

6. Click Select on the ODBC Microsoft Access Setup dialog box.

7. Select a drive and/or directory on the Select Database dialog box. This is a new destination folder.

8. Click OK to save changes.

lized Database A centralized database means that all computers with Storaaccess the same database. When your database is centralized

192 StorageCentral User Guide

Page 203: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections Audit Data” (page 156) e 232)

Settings” (page 211)

“Introduction to “Trending” (pag“Description of File Blocking Alarm Setting” (page 205) “Description of Space Allocation Alarm

193

Page 204: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Clusterws NT/2000 and

meets IBM’s ClusterProven standard.

Clustered servers provide high availability and load balancing by attaching two or more d disk array.

TyA Windows 2000 clustered server can be installed using Windows 2000 Advanced Server and Clustering Services. Two or more servers are attached to a single storage device.

assive and active/active.

es

d without interruption.

• Active/Active cluster. To support load balancing and high availability, the cluster resources are split among two or more nodes. Each node in the cluster is the preferred owner of different resources. In the event of a failure of either cluster node, the shared resources on that node failover to the remaining cluster node(s) and users continue to access these resources without interruption.

Support StorageCentral provides support for clustered servers running Windo

servers to a single share

This section contains these sections:

• “Types of Clusters” (page 194)

• “Architecture” (page 195)

• “Managing Policies in a Cluster” (page 196)

• “Installing StorageCentral in a Cluster” (page 199)

• “VERITAS Cluster Server Support” (page 201)

pes of Clusters

StorageCentral supports two cluster types: active/p

• Active/Passive cluster. To support high availability, the shared cluster resourcare made available on one node of the cluster at a time. In the event of a failure on the active cluster node, the shared resources failover to the passive node anusers may continue to connect to the cluster

194 StorageCentral User Guide

Page 205: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Ars in

olicy information is

Managed Objects

Managed objects are stored on the shared cluster disk in a file called \QAQuotasV4.dat. Policy settings are stored in a file called \SCSRMQuota\QAPolicyV5.mdb. Because they are stored on the shared disk itself, the managed object information is always available to

storage. Objects are managed by the each node in the cluster.

anaged object information is stored on the drive itself. The

QuotaAdvisor Server service automatically resumes alarm actions on the remaining cluster node. No intervention by the Administrator is necessary.

objects are stored in the registry of

orts, and File Groups

rts, and file groups is handled differently depending e Directory support. When using Active Directory, the

available. With the Standard edition, are replicated between the cluster

nodes by the StorageCentralSRM5 cluster resource.

chitecture StorageCentral supports the high availability of its managed objects and policieseveral ways. This section looks at where managed object and pstored, and how it is made available before and after cluster failover.

the node in the cluster that is managing theStorageCentral services that are installed on

In the event of a failover, the cluster service on the secondary node detects the failure and issues a mount request for the shared cluster drives. The StorageCentral driver detects this mount request and begins managing objects on that drive after it comes online. Thisis possible because the m

A file blocking object is handled differently. Theseeach machine. The failover of file blocking objects is handled by the StorageCentralSRM5 cluster resource, which is discussed later.

SRM Policies, Rep

The failover of storage policies, repoon whether you selected Activpolicies are stored in AD and are therefore always they are stored in the registry of each machine, and

195

Page 206: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

The StorageCentralSRM5 Cluster Resource

The failover of policies and other registry-based information is handled by the StorageCentralSRM5 cluster resource. A resource of the name “[GROUP NAME] StorageCentralSRM5” is created for each disk group. This resource makes sure the policy information on each cluster node is identical before and after failover. This ensures that SRM policies continue to function regardless of which cluster node is managing the storage.

Managing Policies in a Cluster e a hine

up. There are two methods to grouping cluster nodes depending on which edition of StorageCentral you purchased: Active

r Standard.

To manage StorageCentral managed objects in a cluster, we recommend you creatsingle group in which all nodes in the cluster can be viewed. You will add the macnames of each member of the cluster to this gro

Directory o

196 StorageCentral User Guide

Page 207: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Active Directory Cluster Configuration

To view all managed objects in your cluster, first create an Organizational Unit for the cluster. In our example, the OU is 2000CLUSTER. Then, add both computers in the cluster to the 2000CLUSTER OU.

|___OU=2000CLUSTER |___2000CLUSVFS01 |___2000CLUSVFS02

To view

Domain.company.com |

|

managed objects, click the Managed Objects folder beneath the OU.

197

Page 208: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

If y up instead (see the tion Cluster Configuration,” below).

Standard Edition Cluster Configuration

To v wmachine na

ou prefer not to create an OU for your cluster, you may use a preferred gro section “Standard Edi

ie all managed objects in your cluster, create a preferred group and add the mes of your cluster members to it.

198 StorageCentral User Guide

Page 209: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

To create a preferred group, follow the instructions in the section “Creating a New Preferred Group” on page 151.

Installing StorageCentral in a Cluster To install StorageCentral in a cluster, do the following:

1. Ensure that your cluster meets the minimum requirements of StorageCentral (see page 20).

199

Page 210: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

2. Prepare a service account for the StorageCentral services. The account should be a member of the Domain Administrators group for ease of setup. If a domain

uld either add this account to the local s. See the section “Permissions for Service

3. Obtain your mail configuration information. For SMTP, you require the SMTP

include a

ted on

5. Install StorageCentral on the first node in the cluster. At the end of the y

ctive resources from this node to another using Cluster Administrator. Then

atically failover.)

6. Afte as restarted, install StorageCentral on the second one. Answer “No” when prompted to restart. Then move the active resources to the first

7. When S tral has been installed and all cluster nodes have been restarted, move all resources back to their preferred node if necessary.

8. databases must be changed. By default, they re stored locally. However, in a clustered environment they must use a shared

.

StorageCentral is now installed on your cluster.

user account is used instead, you shoAdministrators, or assign permissionAccount” on page 248 for more information.

server address (that is, mail.yourdomain.com) and the sender address ([email protected]), and your password. (Note: If you password, you may require a login ID instead of sender address.)

4. Make sure all nodes in the cluster are online. All nodes must be online to install the new resource type. If a node is not online, the resource type is not creit and you may be unable to move resources to that node.

a

installation procedure, you are prompted to restart. Answer “No” and move anarestart the node. (Note: If the node is the only preferred owner of the resources, you may simply want to restart, and the resources will autom

r the first node h

node and restart.

torageCen

The location of the audit and trendadatabase. Follow the instructions in the section “Configuring SQL Server Support” on page 202

200 StorageCentral User Guide

Page 211: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

If y files from your virus scanner forming a virus check on these files during a failover may cause problems. In some DSK bringing the storage offline. These are the files to exclude:

• QAQuotasV4.dat is on each drive at the root level

• QAPoli

VERITAS CStorage r, the regi f VCS may be used to maintain consistency of StorageCentral registry information.

The following keys should be replicated:

• HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\StorageCentral SRM .

• HKEY_ E\WQuinn\StorageCentral SRM\5.0\Groups

• HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\StorageCentral SRM .

• HK CHINE\SOFTWARE\WQuinn\StorageCentral SRM\5.0\ReportSet

• \StorageCentral SRM\5.0\Rules

• uinn\StorageCentral SRM\5.0\ServerPolicies

See the VERITAS Cluster Server System Administrator’s Guide for information on configuring

ou use antivirus software, exclude certain StorageCentral. Per cases, the cluster service may begin a CHK

cyV5.mdb is in a root-level folder called SCSRMQuota on each drive

luster Server Support Central does not have direct support for VERITAS Cluster Server 2.0. Howevestry replication feature o

\5 0\Definitions

LOCAL_MACHINE\SOFTWAR

\5 0\Policies

EY_LOCAL_MA

HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn

HKEY_LOCAL_MACHINE\SOFTWARE\WQ

registry replication.

201

Page 212: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Configuring SThis section ps you must follow to configure StorageCentral to use Microsoft SQL Server as its repository for audit and trending data.

You can store StorageCentral data in one of two formats in SQL Server —ANSI or Unicode. St g nly ANSI data in SQL Server, but StorageCentral 5.2 can store either ANSI or Unicode data in SQL Server. Storing your data in ANS oom and is backward compatible to StorageCentral 5.0, but means you cannot use foreign character sets. If you want to take dvantage of Unicode support and store your data in SQL Server, you must use

StorageCentral 5.2 and configure it to use the Unicode version of SQL Server. The ions that follow enable you to choose the ANSI or Unicode version of SQL Server.

he same computer as SQL Server, copy the following files to one directory on the SQL Server computer.

o SCSRMDB.sql (if you are going to install the ANSI version of SQL Server) or SCSRMDBU.sql (if you are going to install the Unicode version)

These files are located in the <install-directory>\DB directory of the computer on which StorageCentral is installed. Note: Running the batch file in the next step will drop the existing SQL Server SCSRMDB database.

QL Server Support presents the ste

ora eCentral 5.0 can store o

I format takes up less r

a

instruct

1. If StorageCentral is installed on the same computer as SQL Server, go to step 2. If StorageCentral is not installed on t

o SCSQL.bat

202 StorageCentral User Guide

Page 213: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

2. Run the SCSQL batch file by typing the following:

o swi f "a" if you are using the ANSI version of SQL Server; it h L Server

user s

o pass

SCSQL.bat calls the ISQL.exe command, which in turn creates the SCSRMDB database and its tables.

sions to the SCSRMDB database.

ssword by following these instructions:

a. O entral management pane, highlight My Computer, P ties. The P

b. Click the SQL Server tab.

c. E

d. C

5. Remove o SN for SCAuditDB and SCTrendDB on each machine on which StorageCentral is installed.

6. Configure hine using the

7. Provide th ns:

a. O r, Preferred Machine, or OU, right-click and click Properties. The Properties dialog box displays.

SCSQL /switch username password where

tch has a value oas a value of "u" if you are using the Unicode version of SQ

o name is an account that can create databases, tables, and indexe

word is the password for this account

3. Set user permis

4. Provide the SQL Server user name and pa

n the StorageCreferred Machine, or OU, right-click and click Properroperties dialog box displays.

nter the user name and password.

lick OK.

r rename the previous ODBC D

the ODBC DSN for SCAuditDB and SCTrendDB on each macSCSRMDB database in SQL Server.

e SQL Server user name and password by following these instructio

n the StorageCentral management pane, highlight My Compute

203

Page 214: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

b. Click the SQL Server tab.

.

d. Cli

8. Close the M

o Qu

o Fil en Server

N

• The user na st be the same as that in the ODBC SCSRMDB

he ODBC rties to S

c. Enter the user name and password

ck OK.

MC UI and restart these services:

otaAdvisor Server

eScre

otes:

me and password you specify in step 4 muconnection, and this account must have the permission to access the database in SQL Server.

• Taccess the

DSN should use the access method specified in database propeCSRMDB database.

204 StorageCentral User Guide

Page 215: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Descrip FileFor the alarm setting, y

Tab De

tion of Blocking Alarm Settings ou can enter certain categories of information on tabs.

scription File blocking Options to customize the file blocking process (page 205) Notification Notific

who sh 6) ation message and options relating to the message and ould receive notification (page 20

Execute ions that will occur if alarm is activated (page 208) ActReport Report to run when alarm is activated (page 209)

File Blocking TaThe following threshold options can be selected:

Field D

b

escription Passive Files can be either monitored (passive) or blocked. Check file content

Ib Wp age: " s have been selected for use with Content Checking File Blocking. This feature relies on registered signatures that do not exist for the following file types: a list of file types." As new file types appear on the market, they may not necessarily be included in our list of known file extensions. To check file content of such new file types, they need to be added to our list and file signatures need to be created for them. If you have seen new file types in your environment and you want them be blocked by content, please contact VERITAS technical support (see page 16) and our staff will create file signatures for these new file types.

ndicates if only the file extension should be checked when locking files or whether file content should also be checked.

hen you select "Check file content" option for file blocking olicies or managed objects, you may get the following messFile Group(s) containing the following file extension

205

Page 216: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Notification Tab The following notification options can be entered:

Field Description Message Notification message that can be sent to the user, administrator,

and/or Microsoft application event log when the threshold alarmis activated. Message macros can be inserted in the message focustomized output; see the section “Message Macros” on page 22for a list of the

r

3 se macros.

e selected; click ... to view previously used age that can be selected later

Previous messages can b

messages. Click + to save a mess.

Notify user Send o erformed the I/O that Stormessage this capability using this com ssage-text

s n tification message to the user who p caused the threshold to be exceeded.

ageCentral uses Windows messaging to deliver alarm s. You can test or troubleshoot

mand: NET SEND username meNotify administrator

Sen an alar

ds notification message to the administrator when m has been activated.

Send SNMP trap

Use clienmes

ral SNMP

SNMP traps to send the notification message to an SNMPt. The machine name, username, object name, and threshold

sage will be sent to the SNMP client. Go to page 226 for information about the StorageCentregistered MIB.

Record alarm s been activated. Writes information to the audit database that an alarm ha

Quarantine file

Applies to file content blocking only. The blocked file will be copied to the quarantine folder.

206 StorageCentral User Guide

Page 217: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Field Description Mail to and Mail CC

E-mail address(es) where the notification messand copied. Do the following to send e-ma

age will be sent il:

If you are using the AD to get the e-mail address of the e's recipient, use [USER NO DOMAIN].

NO DOMAIN]@domain.com. You can use this

Y R NO DOMAIN] in the Mail t You this o the sectio Two sepa a and semi

o messag

o If you are not using the AD to get the e-mail address of the message's recipient, use [USERformat only if the user name that triggered the alarm is also used in the e-mail address.

ou may also use the macro [OWNEo and Mail CC fields.

must set e-mail options in the global properties page before ption will work; read about the Mail tab (page 66) inn “Viewing and Modifying Global Properties”.

rators between e-mail addresses are supported: commcolon.

Subject The subje essage ct line of an e-mail notification mSend to event log

Sends notification message to the Microsoft application event log. I t e options are Severe, Warning, and Informational. You can also specify the server name of the event l“

f this option is selected, you can choose the message level fromhe message drop-down list; th

og to be updated. For more information, read the section Application Event Log” on page 187.

207

Page 218: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Execute Tab The ll

Field Description

fo owing actions will occur when the alarm is activated:

R tprograset of command

batch files. Usually, this is a batch file execution or a "net send." Do not execute a command that requires interaction with the

ardcoded or macros

o [DOMAIN NO QUOTES]—domain name without quotes o [MESSAGE]—notification message o [MESSAGE NO QUOTES]—notification message without

quotes o [OBJECT NAME]—managed object against which a file

blocking action was triggered o [OWNER]—owner of the file o [OWNER NO QUOTES]—owner without quotes o [USER]—user who triggered action o [USER NO DOMAIN]—user without domain name o [USER NO DOMAIN NO QUOTES]—user without

domain name or quotes o [USER NO QUOTES]—user without quotes

Note: When a program or command is executed by StorageCentral for Network Appliance, it is executed on the remote agent and not the Network Appliance Filer.

un his m or

Executes a valid Windows 2000 (and above) command including

s desktop. Parameters to batch files can be hcan be used.

Macros supported are: o [DOMAIN]—domain name

208 StorageCentral User Guide

Page 219: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Report Tab The following actions will occur when the alarm is activated:

Field Description Collector The report collector you want to use to run the report. For more

information, read the section “Introduction to Report Collectors” on page 114.

Report set Report set to run. Click ... for a list of report sets from which you may choose. For more information, read the section “Introduction to Report Sets” on page 135.

Save to Folder where report is to be saved Mail to and Mail CC

E-mail address(es) where the report will be sent and copied. Do the following to send e-mail:

f the

ou are not using the AD to get the e-mail address of

ormat only if the user name that triggered the alarm is

] in the

You must set e-mail options in the global properties page before this option will work; read about the Mail tab (page 66) in the section “Viewing and Modifying Global Properties”. Two separators between e-mail addresses are supported: comma and semicolon.

o If you are using the AD to get the e-mail address omessage's recipient, use [USER NO DOMAIN].

o If ythe message's recipient, use [USER NO DOMAIN]@domain.com. You can use this falso used in the e-mail address.

You may also use the macro [OWNER NO DOMAINMail to and Mail CC fields.

Subject Subject line of an e-mail report Schedule interval

Schedule interval for the report o Immediately—no further input required o Today—enter time to run the report o Tomorrow—enter time to run report o Next—enter time, days of week, and days of month

209

Page 220: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections • For information about file blocking with Network Appliance Filers, read the

section “File Blocking and Network Appliance Filers” (page 173).

or infoons

o

o

o

o icy Properties” (page 79)

• Fsecti

rmation about using the options described in this section, read these :

“Creating a New Managed Object” (page 96)

“Viewing and Modifying Managed Object Properties” (page 103)

“Creating a New Managed Object Policy” (page 73)

“Viewing and Modifying Managed Object Pol

210 StorageCentral User Guide

Page 221: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Description of Space Allocation Alarm Settings A resholds all cify actions to occur when a threshold value (a p of a spac or non-Network Applia ce Filers.

drops below the threshold. For exam le, if threshold 3 is 70% and threshold 2 is 80% and the space limit is 71%, threshold 3 is alue first drops below 70% value raises above 80%.

For e settin

Tab D

larm th ow you to speercentage e allocation) is exceeded. You may configure five alarm settings f

nce computers and two alarm settings for Network Applian

ted only once until the percentage of used spaceA threshold is activap activated. Threshold 3 will not be activated again, unless the v. Threshold 2 will be activated if more files are saved and the

ach alarm g, you can enter certain categories of information on tabs.

escription Threshold Pe

(prcentage of disk space that can be used before an alarm occurs age 212)

Notification Nsh tion (page 213)

otification message and options relating to the message and who ould receive notifica

Execute Commands to run when alarm is activated (page 215) Report Report to run when alarm is activated (page 215) Extend Di vated (page 217) sk space limit adjusted when alarm is acti

211

Page 222: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Threshold Tab T threshhe following old options can be entered:

Field Description Alarm threshold

Percenta will occur. Valid values space limit c entage is based on the disk pace limit alone and does not consider the overdraft limit. Thre f "war me actions. Threthe fthe l enerally, the f

ge of space limit that needs to be exceeded before the actions

for the alarm threshold can be larger than 100%, because an be passive or active. This perc

ssholds do not enforce space limits, they are simply a means oning" users and/or taking so

sholds are exceeded in reverse order so that, of five thresholds, ifth threshold is exceeded first. This way the fifth threshold is east critical and the first threshold is the most critical. G

d would have a value in the 90%–100% range. irst thresholActivate below

Alar e thre

his e hre

o 90%, Activate below value check box selected, and a notification message of, “Thank you for freeing up disk space.”

The second message displays when the percent of disk space used drops below the threshold of 90%.

value

m will be activated if current disk space used falls below thshold value.

Tt

check box can be used to send the user different messages as thshold is crossed each way. For example: o Alarm 1 could be configured with a threshold of 90%,

Activate below value check box cleared, and a notificationmessage of, “Your disk is getting full; please delete or archive unneeded files.” Alarm 2 could be configured with a threshold of

212 StorageCentral User Guide

Page 223: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Notification Tab The following notifi can be entered: cation options

Field Description Message Notification message that can be sent to the user, administrato

and/or Microsoft application event log when the threshold alarm is activa

r,

ted. Message macros can be inserted in the essage for customized output; see the section “Message

r a list of these macros. Pre ly used m Click + to save a message that can be selected late

mMacros” on page 223 fo

vious messages can be selected; click ... to view previousessages.

r. Notify user Sen I/O

that cau to be exceeded. Storage g to deliver alarm mes t this capability using this comma

ds notification message to the user who performed the sed the threshold

Central uses Windows messaginsages. You can test or troubleshoo

nd: NET SEND username message-text Notify administrator

Sen tor when an alarm has

ds notification message to the administra been activated.

Send SNMP trap

Use P clien T d threshold

es

SNMP traps to send the notification message to an SNMhe machine name, usernat. me, object name, an

sage will be sent to the SNMP client. m Go to page 226 information about the StorageCentral SNMP registered MIB.

Record alarm m has been activated. Writes information to the audit database that an alar

213

Page 224: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Field Description Mail to and Mail CC

-mail address of the DOMAIN].

e AD to get the e-mail address of the message's recipient, use [USER NO DOMAIN]@domain.com. You can use this format only if the user name that triggered the alarm is

YouMa You obal properties page before this optisection

wo separators between e-mail addresses are supported:

E-mail address(es) where the notification message will be sent and copied. Do the following to send e-mail:

o If you are using the AD to get the emessage's recipient, use [USER NO

o If you are not using th

also used in the e-mail address.

may also use the macro [OWNER NO DOMAIN] in the il to and Mail CC fields.

must set e-mail options in the glon will work; read about the Mail tab (page 66) in the

“Viewing and Modifying Global Properties”.

Tcomma and semicolon.

Subject message The subject line of an e-mail notificationSend to event log

ends notification message to the Microsoft application event

ame of the event log to be updated. For more information, read

Slog. If this option is selected, you can choose the message level from the message drop-down list; the options are Severe, Warning, and Informational. You can also specify the server nthe section “Application Event Log” on page 187.

214 StorageCentral User Guide

Page 225: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Execute Tab Field Description Run this

set s

Executes a valid Windows 2000 (and above) command including sually, this is a batch file execution or a "net send."

the

ported are:

MAIN NO QUOTES]—domain name without quotes

o [MESSAGE]—notification message n message

o [OBJECT NAME]—managed object against which a quota threshold was exceeded

o [OWNER]—owner of the file o [OWNER NO QUOTES]—owner without quotes

R NO DOMAIN NO QUOTES]—user without domain name or quotes

Note: When a program or command is executed by

remote agent and not the Network Appliance Filer.

program orof command

batch files. UDo not execute a command that requires interaction with desktop. Parameters to batch files can be hardcoded or macros can be used. Macros sup

o [DOMAIN]—domain name o [DO

o [MESSAGE NO QUOTES]—notificatiowithout quotes

o [USER]—user who triggered action o [USER NO DOMAIN]—user without domain name o [USE

o [USER NO QUOTES]—user without quotes

StorageCentral for Network Appliance, it is executed on the

Report TabField

Description

Collector The report collector you want to use to run the report. For more

on page 114. information, read the section “Introduction to Report Collectors”

215

Page 226: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Field Description Report set Report set to run. Click ... for a list of report sets from which you

may choose. For more information, read the section “Introduction to Report Sets” on page 135.

Save to Folder where report is to be saved Mail the report to the following address

E-mail recipient of the report

Mail to and E-mail address(es) where the report will be sent and copied. Do Mail CC the following to send e-mail:

t the e-mail address of the O DOMAIN]. the e-mail address of

m. You can use this t triggered the alarm is

You may also use the macro [OWNER NO DOMAIN] in the

before he

ing and Modifying Global Properties”.

separators between e-mail addresses are supported: comma and semicolon.

o If you are using the AD to gemessage's recipient, use [USER NIf you are not using the AD to geo tthe message's recipient, use [USER NO DOMAIN]@domain.coformat only if the user name thaalso used in the e-mail address.

Mail to and Mail CC fields. You must set e-mail options in the global properties page this option will work; read about the Mail tab (page 66) in tsection “View Two

Subject The subject line of an e-mail report Schedule interval —no further input required

o Tomorrow—enter time to run report

Schedule interval for the report o Immediatelyo Today—enter time to run the report

o Next—enter time, days of week, and days of month

216 StorageCentral User Guide

Page 227: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Extend Tab The following options to adjust the disk space limit can be entered:

Field Description Space limit amount

This allows the disk space limit to be increased when the threshold is exceeded. Disk space limit can be in bytes, kilobytes, or megabytes.

Repeat value Controls the number of times the disk space limit can be increased.

Current Shows the number of times the disk space limit has been increased.

Clicking the Clear button resets the value in the Current field to 0.

lated Sections Re• For information about working with Network Appliance Filers, read the section

“Introduction to Using StorageCentral with Network Appliance Filers” at the f Chapter 4.

section “Space Allocation and Network Appliance Filers” (page 174).

erties” (page 103)

d Object Policy Properties” (page 79)

beginning o

• For information about space allocation with Network Appliance Filers, read the

• For information about using the options described in this section, read these sections:

o “Creating a New Managed Object” (page 96)

o “Viewing and Modifying Managed Object Prop

o “Creating a New Managed Object Policy” (page 73)

o “Viewing and Modifying Manage

217

Page 228: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Disk Space Limit The disk space limit determines the maximum amount of space a managed object mayuse. When the disk space limit is exceeded, the overdraft limit (page 227) will be used

before allocation failure occurs. All policy actions are based on the disk space limit. In

Bytes Disk space limit represented in bytes.

addition, the alarms that can be set are activated by the disk space limit and all monitor screen percentages are based on the disk space limit as well.

Disk space limit definition also depends on the option selected from the drop-down list.

KB Disk space limit represented in kilobytes. MB Disk space limit represented in megabytes. GB Disk space limit represented in gigabytes. TB Disk space limit represented in terabytes. % of Current Sets the disk space limit to a percentage of the current used

space.

ation is recalculated based on the current usage.

Used

If current disk space used is 100 MB and % of current used option is selected and 150 entered, then the disk space limit will be set to 150 MB. When a policy using % of current used is propagated, the space alloc

% of Space Limit

Sets the disk space limit to a percentage of the current disk space limit.

limit is 100 MB and the % of space limit option is selected and 150% entered, then the disk space limit

50 MB.

If the current space

will be set to 1% of Device

If device capacity is 100 MB and % of device option is selected and 50 entered, then the

Sets the disk space limit to a percentage of the device.

disk space limit will be set to 50 MB. Use Device Capacity

Sets the disk space limit to the size of the device.

218 StorageCentral User Guide

Page 229: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Include and Exclude Filters

Include Filters Use include filters to refine the file blocking policy to a set of folders within a managed object.

For example, you may want to block only the "Temporary Internet Files" folder under the "C:\Winnt\Profiles" object. In this case, your managed object would be "C:\Winnt\Profiles," and your include filter would be "Temporary Internet Files." You could accomplish the same goal by making "C:\Winnt" your managed object, but this time the include filter would be "*\Temporary Internet Files." The "*\" relates the relative position of the include filter folder to the managed object. This is useful when applying blocking policies to a large set of objects contained in a folder structure.

Exclude Filters Use exclude filters to refine the file blocking policy to a set of folders within a managed object.

For example, you may want to block the "D:\Users\David" folder but exclude the Temp folder. In this case, your managed object would be "D:\Users\David," and your exclude filter would be "Temp." You could accomplish the same goal by making "D:\Users" your managed object, but this time the exclude filter would be "*\Temp." The "*\" relates the relative position of the exclude filter to the managed object. This is useful to exclude known classes of files or folders from the file blocking process.

Note: Files can also be filtered by name or type. This is done in the Files Blocking Group using the "Authorized" and "Unauthorized" fields. See the section “Introduction to File Groups” on page 110 for additional information.

219

Page 230: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Group Associations A user space allocation can also be applied based on the primary group of a user. An Auto detect all Users space allocation can be instructed to look for group associations.

For Auto detect all Users, the primary group of the user who owns the file being writtenwill be obtained. Then this primary group will be referenced to see if any policies have been associated with it. If a policy is found, the poli

cy properties defined in it will be applied to that user. If a policy is not found, then the policy specified in the Auto detect

ExYou have created three policies: a Students policy of 20 MB, a Teachers policy of 50 MB, and an Everyone policy of 10 MB. The Students policy has been associated with the

achers policy has been associated with the Teachers group. The group association.

You have created the Auto detect all Users space allocation on the D:\Public share with the following properties:

• Check for group associations

• Exclude administrators

When user JDoe writes a file to D:\Public, and he belongs to both the Students and Teachers groups, but his primary group is Students, the Students policy will be applied and he will have a 20 MB space allocation.

When user TJones writes a file to D:\Public, and he belongs to both the Students and Teachers groups, but his primary group is Teachers, the Teachers policy will be applied and he will have a 50 MB space allocation.

all Users space allocation will be used.

This is a two-step process. First, a policy must be created that is associated with a group. Second, the Auto detect all Users space allocation must be created and told to look for group associations. The following example illustrates this process.

ample

Students group. The TeEveryone policy has no

220 StorageCentral User Guide

Page 231: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

When user BSmith writes a file to D:\Public, and he belongs to both the Students and Teachers groups, but his primary group is Janitors, the Everyone policy will be applied

10 MB space allocation.

ore d be

location.

and he will have a

If a specific user space allocation was set on any of these users' D:\Public folder befcreating the Auto detect space allocation, all the policies and associations woulignored and the size of the file would be applied to the appropriate user space al

221

Page 232: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Group Space Allocation A on is a typ ation. The Group Space allocation is a specified up. It can be artition. of space th n t tions work in the same fa ations. in the Object for any s roup

N file ownership by a mon, it is possible. To limit a Group to nt of disk space, p Share. G st be a member u are limiting th e by limiting Share. Third party applications m a file to a mmonly, the A owns strators group copies a opied not to the SID of the u rs of lied a specific Space al he membersh

Related Sections “Group Associations” (page 220)

Group Space allocati e of User Space alloc the space limit set for

set on a folder or p SID that is associated with an individual Gro

The Group Space allocation limits the amount caat the Group’s SID can own i

shion as User Space alhe Object. Group Space allo The Group SID must own floc

pace to be charged to the Giles

Space allocation.

ote: Though group is uncom a certain amou set a Folder Space allocation on the Grouenerally, you mu of that Group to write a file; therefore, yoe Group as a whol the size of the Groupay apply ownership of specific group SID. More codministrators group often

file, the ownership of the c files. If a member of the Adminifile is changed to Administrators,

a particular Group can also be appser who copied the file. Uselocation based on t ip in that Group.

222 StorageCentral User Guide

Page 233: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

MessagMacro creating ion lists the file b llocation mac age field on the N alarm's Act also provides a d s substituted ification message.

N os are applicab y StorageCentral for N macro (*) in the lists below.

File Blocking Macros Macro D

e Macros s can be used when

locking and space a notification messages. This sectros you can use in the Mess

otification tab of an ions dialog box. The sectionescription of what i for each macro in the not

ote: Not all macr le to messages generated betwork Appliance. These s are identified by an asterisk

escription

[BLOCKING GROUP] File blocking group used

[DOMAIN] * Domain name

[FILE NAME] * Name of file that caused the action

[FILE OWNER] * Owner of the file that caused the action

[FILE SPEC] * File path and name

[OBJECT NAME] Name of object that caused the action

[OBJECT NAME SHARE] Shared name of the object; that is, you can share "h" as h:\ drive and the macro will display the share name

[OWNER] Owner of file that caused the action

[OWNER NO DOMAIN] Owner of file that caused the action but does not include domain information

[POLICY NAME] Name of policy applied

[SERVER NAME] Server name where an alarm is activated

[USER] Current user who caused the action

[USER NO DOMAIN] Current user who caused the action but does not include domain information

223

Page 234: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Space Allocation Macros Macro Description [ACTIVATE TYPE] Activate above or below threshold value [ALARM NUMBER] Alarm numbers 1-5 [ALARM PERCENT] Percentage of the disk space limit that can be

used before an alarm occurs [CURRENT USAGE] Current space use in bytes [CURRENT USAGE KB] Current space use in kilobytes [CURRENT USAGE MB] Current space use in megabytes [DOMAIN] Domain name [FILE NAME] Name of the f ion ile that caused the act[FILE OWNER] Owner of the tion file that caused the ac[FILE SPEC] File path and name [FREE SPACE LIMIT] Unused space limit in bytes [FREE SPACE LIMIT KB] Unused space limit in kilobytes [FREE SPACE LIMIT MB] Unused space limit in megabytes [HIGHWATER] * High-water mark in bytes [HIGHWATER KB] * High-water mark in kilobytes [HIGHWATER MB] * High-water mark in megabytes [OBJECT DIR OWNER] * Evaluates to the owner of the directory that the

space allocation is set on. For example, if the space allocation is set on D:\Finance and the NTFS owner of D:\Finance is "\\Domain\Beancounter," then the [OBJECT DIR OWNER] macro evaluates to "Beancounter".

[OBJECT NAME] Evaluates to the directory name that the space allocation is set on. For example, if the space allocation is set on D:\users\jdoe, then the [OBJECT NAME] macro evaluates to "jdoe".

[OBJECT NAME SHARE] * Shared name of the object; that is, you can share "h" as h:\ drive and the macro will display the share name

[OPENED FILE] * File that caused the action [OVERDRAFT] * Overdraft in bytes [OVERDRAFT KB] * Overdraft in kilobytes [OVERDRAFT MB] * Overdraft in megabytes

224 StorageCentral User Guide

Page 235: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Macro Description [OWNER] * Owner of file that caused the action [OWNER NO DOMAIN] * Owner of file that caused the action without

domain name [PERCENT FREE] Percent of free space limit [PERCENT USED] Percent of used space limit [POLICY NAME] Name of policy applied [SERVER NAME] Server name where an alarm is triggered [SPACE LIMIT] Disk space limit in bytes [SPACE LIMIT KB] Disk space limit in kilobytes [SPACE LIMIT MB] Disk space limit in megabytes [USER] * ho caused the action Current user w[USER N ser name of the user who

on that triggered mple, if the user is ," then the [USER NO

DOMAIN] macro evaluates to "Mark".

O DOMAIN] * Evaluates to the uperformed the write operatithe alarm. For exa"\\Domain\Mark

Related Sections For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

225

Page 236: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

MIB This section documents the StorageCentral SNMP registered MIB (management information block) and related values.

Entity Value StorageCentral SNMP registered MIB 1.3.6.1.4.1.3083 Machine name 1.3.6.1.4.1.3083.2.1.0 O tbjec name 1.3.6.1.4.1.3083.2.2.0 User name 1.3.6.1.4.1.3083.2.3.0 Message 1.3.6.1.4.1.3083.2.4.0

226 StorageCentral User Guide

Page 237: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Overdraft Limit The overdraft limit is the amount of space by which the disk space limit can be exceeded before StorageCentral enforces the disk space limit. The disk space limit will not be enforced until the disk space limit plus the overdraft limit amount has been reached. The overdraft limit acts as between the disk space limit and when an I/O o s an e

The overdr limit can

Bytes Overdraft l ented in bytes

a safety factorperation return

aft

rror. All policy actions are based on the disk space limit.

be represented in the following formats:

imit represKB Overdraft limit represented in kilobytes MB Overdraft limit represented in megabytes GB Overdraft limit represented in gigabytes TB Overdraft limit represented in terabytes

Related Sections “Disk Space Limit” (page 218)

227

Page 238: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Rules o nersThe user who creates athe Administrators Group. If a member of the Administrators Group creates a file, then the Administrators Gr

File ownership is also modified by the "Take Ownership" facility in Windows Explorer. Files are created in the ays:

1. Create a new f el, or Windows E

2. Copy an existifolder is a newcopy.

When moving a file from ition, a new file is not created. The file systeownership does not ch

Files do not inherit thecompression and perm

f File Ow hip file owns a file. The only exception is if the user is a member of

oup SID owns the file, not the user.

following w

ile using an application such as Microsoft Word, Microsoft Excxplorer.

ng file from one folder to another folder. The file in the target file and thus, the ownership is that of the user performing the

one folder to another on the same partm simply modifies the pointers of the file. Therefore, file ange.

ownership of the folder in which they exist. Files do inherit sions, but not file ownership. is

228 StorageCentral User Guide

Page 239: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Space A ation OpIn addition to the disk ng space allocation options are available to

lloc tions ace limit and the overdraft limit, the followisp

enable you to customize a managed object policy:

Field Description Always save open files

n

B space limit and is currently at 49 MB. The user opens a file, adds 5 MB of content to that file, and then tries to save the file. Because the space limit for that user is now exceeded the file would not be saved unless the Always save open files option is selected.

A single I/O that exceeds the space limit will be allowed to complete, but the next I/O will fail (if the Passive limit optiois not selected). Example: A user has a 50 M

This option may not be used with a policy for a Network Appliance Filer.

229

Page 240: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Field Description Exclude fromfold

er limit

This option will exclude a user (or a group) from the space limit calculation. Any files owned by the user will be excluded from the space limit. In addition, the space limit will not be in

se it

A \Public folder may be limited to 500 MB. However, the

Public in conjunction with a space limit on the

by the Administrators Group SID, not by this

be used with a policy for a Network

effect for that user. This option is only available for user space limits becaudoesn't make sense to exclude a disk space limit from itself. Example:

Administrators Group should not be limited from writing to this folder and the files owned by Administrators should not be counted against the space allocation on \Public. This can be accomplished by setting a disk space limit of 500 MB on \Administrators Group SID of the device capacity that is instructed to exclude from folder limit. (In this case, apply a space allocation to a group, because when a member of the Administrators Group writes a file, the file is ownedindividual user.) This option may not Appliance Filer.

Pa ore, I/O operations

limit set on the

ssive limit The limit will not be enforced and, therefwill never be stopped. However, the alarms will still be activated after the space limit is reached. It is strongly suggested that any disk spacesystem or boot partition be passive. If a disk space limit is set on the system or boot partition and is not passive, there may be trouble booting as system startup performs I/O to the system partition.

230 StorageCentral User Guide

Page 241: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Field Description Reset high-water mark

This option resets the high-water mark. The high-water mark is the highest amount of disk space limit that was ever used on a particular object even if files were deleted. This option may not be used with a policy for a Network Appliance Filer.

Send disk full error code

This option sends the "disk full" error code instead of the "not enough quota is available" error code. Windows 95 clients do

ll" error code. This option may not be used with a policy for a Network Appliance Filer.

not interpret the "not enough quota is available" error code, but they do interpret the "disk fu

Related Sections • For information about working with Network Appliance Filers, read the section

“Introduction to Using StorageCentral with Network Appliance Filers” at the beginning of Chapter 4.

• For information about disk space limits and overdraft limits, read the sections “Disk Space Limit” (page 218) and “Overdraft Limit” (page 227), respectively.

• For information about using the options described in this section, read these sections:

o “Creating a New Managed Object” (page 96)

o “Viewing and Modifying Managed Object Properties” (page 103)

o “Creating a New Managed Object Policy” (page 73)

o “Viewing and Modifying Managed Object Policy Properties” (page 79)

231

Page 242: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Trending StorageCentral supports managed object trending. Managed object trending collects historical data about your managed objects and stores it in a database. You can then run trend reports on any managed objects including disks, directories, and users.

Trend dAccess d

• allation, an ODBC data source called "SCTrendDB" is added. This

pecified in the server or D properties.

• o see the records for all computers in the domain which the UI is connected to, lized database.

Regardlcollect t

d

as been collected, it can be reported on using the Space Allocation Trend Summary report set. You can also create your own trend report sets with plotted

mary

ata (along with audit data) can be stored in one of two places: A Microsoft atabase (the default) or Microsoft SQL Server.

During instdata source points to the SCTrend.mdb Microsoft Access database; the default installation directory for this database is \VERITAS\StorageCentral\5.2\DB. Data is collected for all managed objects at the interval sA

• To override the default and store the data in Microsoft SQL Server, follow the instructions in the section “Configuring SQL Server Support” on page 202.

Tuse a centra

ess of where the trend data is stored, you must configure StorageCentral to he data. Follow these instructions:

1. Right-click the server or AD root, and click Properties.

2. Select the Trending tab. Specify the trending parameters for your system. Reathe section “Trending Tab” (page 70) in the section “Viewing and Modifying Global Properties” for an explanation of the parameters.

After trend data h

graphs and a variety of output by modifying the Space Allocation Trend Sumreport definition in your report sets.

232 StorageCentral User Guide

Page 243: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Re

Related Sections To learn about predefined report sets (including the Space Allocation Trend Summary),

fined Report Sets” on page 146.

moving Expired Data After a trend record has been in its database for n days, StorageCentral deletes it. The value for n was specified in the Period field on the Trending tab (page 70), which is documented in the section “Viewing and Modifying Global Properties”.

read the section “Prede

233

Page 244: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Types of Space Allocation There are two types of space allocations available: folder space allocation and user (SID) space allocation.

• A folder space allocation is the space limit set on a file, folder, or partition. This type of space allocation limits the size of the managed object regardless of who

a 50 MB folder space allocation is set on the managed object c:\users\JDoe, that folder and all of its contents will be limited to 50 MB regardless of who owns

rites files to that folder.

on is the space limit set on a specified SID that is associated with an individual user. User space allocations can be set on a file, folder, or

.

Example:

c:\Public, then JDoe will be limited to 50 MB of space in c:\Public. Only files that

Not U artition. If the system does not have sufficient space to write files, the system may fail. Also, if the system parmay notthe syst partitio assive limit" option on any space allocation set on the system partition.

and folders "on the desktop". These files are stored in s\<username>\Desktop. To control disk space usage on the

p

eleting a file through Explorer typically does not delete the file; instead, it renames it to e Recycle Bin folder. If the user’s space allocation is on his or her own folder, this will

writes to, or who owns files in, the managed object. Example: If

the files in that folder or who w

• A user space allocati

partition. It limits the amount of space that the user’s SID can own in the object

If a 50 MB user space allocation is set on user JDoe on the managed object

JDoe owns will be applied to the limit.

e: se caution when placing space allocations on the system p

tition does not have enough space to write temporary files during boot, the system restart. You can avoid this by using caution when placing space allocations on

em partition or system folders. If you wish to keep track of growth on the systemn, you should use the "P

Users may create files %systemroot%\Profilesystem partition, you may want to set modest space allocations for users on their desktofolders.

Dth

234 StorageCentral User Guide

Page 245: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

relieve his or her space limit. Howethe partition, the used amount may act

ver, if a user's space allocation is on the root folder of ually increase on deletion. This is because the

Recycle Bin must store additional information to allow the file to be restored. If a user's space allocation is established on the root folder, then all is well. However, if you choose to place the user’s space allocation on his or her login folder, make sure you also place a

ecycle Bin to eliminate the possibility of users storing large amounts of data in the Recycle Bin to circumvent their space limits

Related Sections “Group Space Allocation” (page 222) Rul of )

space allocation for that user on the R

(allocations).

es File Ownership” (page 228

235

Page 246: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Unauthor eUnauth will not allow to be written. Files can be blocked by extension and/or name. For example, if you specify *.mp3, Stor e y files wit

Authori to the u , even though *.mp3 files may be unauthorized, the specific file music.mp3 can be added to the authorized file list and then allowed to be written.

Wa n following could p

1. You create a file group that unauthorizes all files (*.*), but authorizes files with

2. You create a policy that uses this file group with "Check file content" turned on.

3. You create a managed object using this policy.

4. A user renames a .jpg file so that it has a file type of .doc.

5. tored by the managed object. StorageCentral does not block the file because the extension is authorized. The

Related Sections For info and unauthorized files, read the section “Introduction to File Groups” on page 110.

iz d and Authorized Files orized files are those files that StorageCentral

ag Central will block all mp3 files from being written. If you specify test.doc, onlh that specific name will be blocked.

zed files are the files that are allowed to be written; they are typically exceptionsnauthorized rules. For example

Note: Full wildcarding is supported.

rni g: StorageCentral does not check the content of an authorized file. Theotentially happen:

specific extensions (*.doc and *.xls).

The user copies the file into the folder being moni

file can be opened using the "open with" option of an application that's capable of viewing image files.

rmation about file groups that contain authorized

236 StorageCentral User Guide

Page 247: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter 6. Permissions

Introduction to Permissions oups—standard

gement.

• Creating storage policies, managed objects, and report definitions

control who may create and apply policies. The administrative control is especially necessary in the configuration, setup, and

ative

roduct requires permissions to various objects. To control user access to StorageCentral and its objects, the proper rights and permissions must be assigned to

indows global domain groups.

Storage resource management (SRM) functions can be divided in two grand advanced mana

Standard storage resource management includes the following functions:

• Viewing space allocation and file blocking managed objects

• Executing storage reports

Advanced storage resource management includes the following functions:

• Modifying storage policies, managed objects, and report definitions

• Applying storage policies to managed objects

Advanced storage resource management should be limited to system administrators because they understand the effects SRM may have on business continuity and system performance. Specific user rights, permissions to file system objects, registry entries, and Active Directory objects are required to

implementation phases of SRM initiatives. After SRM policies, managed objects, and administrative and user reports are created, the on-going maintenance of managed objects and report execution may be delegated to the users without full administrrights.

StorageCentral uses Windows security to protect against unauthorized users modifyingstorage policies, managed objects, and report definitions. Additionally, the architecture of the p

individual users or user groups such as the Help Desk group. Much of the permissions are assigned by the StorageCentral installation, which sets up a security access schemeusing standard W

237

Page 248: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

The following is required for StorageCentral to function correctly:

d the “Permissions for WMI” on page 253.

• If the report collector does not reside on the same computer as the agent, the Scheduler on the report collector must be configured to run under the ice account used in the installation. For information about how to set up the

Sta

ss

• For information about standard permissions required to access StorageCentral, n “Standard Permissions for StorageCentral” on page 241.

Ad

• For information about permissions required to run StorageCentral reports, read the section “Permissions for Running SRM Reports” on page 246.

about DCOM permissions, read the section “Permissions for

• The correct access for the Windows Management Instrumentation (WMI) must be set on all agent computers. For information about WMI permissions, reasection

TaskservTask Scheduler logon account, read the section “Setting Up the Task Scheduler Logon Account” on page 267.

ndard StorageCentral Security • For information about two levels of non-administrative user access to

StorageCentral, read the section “Two Levels of Non-Administrative User Acceto StorageCentral” on page 239.

read the sectio

vanced StorageCentral Security • For information about permissions for help desk users, read the section

“Permissions for Help Desk Users” on page 243.

• For informationDCOM” on page 249.

For information about service account permissions, read the section “Permissions for Service Account” on page 248.

238 StorageCentral User Guide

Page 249: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Standard St

Two LevStorage

Non-admThere ar on-administrative users: Read and Full s to run storage definitio e users to king groups, report defi oRead ac

Read and Full Control access is assigned through SCRead and SCWrite groups. If the Permissions Utility SCPerm.exe is run automatically during installation, it adds SCRead

the Permissions Utility SCRead group

s) are set up during the installation for the objects created and used by StorageCentral. These objects reside in the system registry, Active Directory, and installation

The use ded t e at least Read access to StorageCentral w sers ll have Full Control access. The membership in sers who are not members of the

dministrators group to still manage StorageCentral. This security scheme is designed so that it does not disable the existing access. If users already have Full Control access,

torageCentral, assigning them to SCRead group will give them Read access.

Important: Although the users added to S ve ad ss to S its objects, it is not the s administrativ s to the entire n

orageCentral Security

els of Non-Administrative User Access to Central inistrative users are the users who are not included in the Administrators group. e two levels of access to StorageCentral for n

Control. Read access to StorageCentral allows non-administrative userreports and view policies, managed objects, file blocking groups, report ns, report sets, and global settings. Full Control access allows non-administrativadd, delete, and modify policies, managed objects, file bloc

niti ns, report sets, and global settings as well as perform the functions allowed by cess.

and SCWrite groups to the domain SAM. The user running should be at least a member of the Domain Admins group. The implements Read access level to the registry and Active Directory entries. The SCWritegroup implements Full Control access level to the registry and Active Directory entries. The Active Control Lists (ACL

directory.

rs adhile the u

o the SCRead group wiladded to the SCWrite grou

l havp wi

the SCWrite group allows the uA

assigning them to SCRead group will not limit them to Read access. However, if users have no access to S

CWrite group ha ministrative accetorageCentral and same a e accesetwork system.

239

Page 250: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Ability to View and Drill Down Storage Reports

Any a storage report and h he OCX installe able to view a that report, only limited restrictions the on the file system access.

S

D orary files created in the % ctory. If no r ified, reports should the \Re p d d and SCWrite group e permis have Full C ort EMd n user; therefore, acc for the alled

torageCentral. Other users must have Full Control access to their %TEMP% directories for report drill-down to function correctly. To learn how to add SCRead and SCWrite groups to the %TEMP% directory, read the section “Adding the SCRead and SCWrite Groups to a New Directory and Assigning Permissions” on page 260.

Servic

The rvpermiss ount user to the SCWrite group and also assigns the "Increase Quota" right to the SCWrite group, which is inherited by that user. The "Increase Quota" right is required for space limits (quotas) to be properly created. For the Standard edition and Active Directory edition of StorageCentral the service account must be a domain level user. For more information about the service account permissions, read the section “Permissions for Service Account” (page 248).

Related Sections

• StorageCentral installation automatically adds the service account user to the SCWrite group. To learn how to add additional users to SCRead and SCWrite groups, read the section “Adding Users to the SCRead and SCWrite Groups and Assigning Permissions” on page 259.

• Currently StorageCentral sets up access control only on the WQuinn container in the Active Directory at the domain level. If you are going to use containers at

users who receivend drill down on

ave tby the

d will bey have

ecurity

uring report generation, temp will be TEMP% direeport directory is spec be created in ports or \Temirectory. The SCRea s are set by th sions utility toontrol access to the %TEMP% and repependent on the logo

s directory. The %Tess is set only

P% directory is user who inst

S

e Account

se ice account user is set by the permissions utility to have Full Control access. The ions utility automatically assigns the service acc

240 StorageCentral User Guide

Page 251: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

different levels, you should assign permissions to these containers. To learn how to assign permissions to the WQuinn container in the Active Directory, read the

e Groups to the WQuinn Container in issions” on page 261.

• The installation will set access control to the installation, bin, reports, database, f the reports, database, or quarantine

must be set on a new ry, y

• The correct access for WMI must be set on all agent computers for StorageCentral to function correctly. For information about WMI permissions, read the section “Permissions for WMI” on page 253.

• For information about other types of permissions, read the section “Introduction

Standard Permissions for StorageCentral Non-administrative users included in SCRead and SCWrite groups can access Stor e s the following permissions to SCRead

G p

section “Adding the SCRead and SCWritthe Active Directory and Assigning Perm

and quarantine directories. If location odirectory is changed after the installation, the access controldirectory. To learn how to add SCRead and SCWrite groups to a new directoread the section “Adding the SCRead and SCWrite Groups to a New Directorand Assigning Permissions” on page 260.

to Permissions” at the beginning of Chapter 6.

ag Central. The permissions utility SCPerm.exe grant and SCWrite groups:

rou Permission SCRead SE_ENABLE_DELEGATION SCWrite SE_INCREASE_QUOTA

SE_ENABLE_DELEGATION

The followin

Object Permission for Permission for roup

SCRead and SCWrite groups are added to the ACLs (Access Control Lists) for the g objects:

SCRead group SCWrite gAD domain root Read Read AD domain WQuinn container Read Full Control

241

Page 252: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

O c r Permission for group

bje t Permission foSCRead group SCWrite

Registry HKLM Read Read Re stHKLM StorageCentral\5.0

gi ry \Software\

Read Full Control

<Installation ad & Execute Read & Execute directory>\bin Re<Datab ad Full Control ase directory> Re<Reports directory> Full Control Full Control All SCSRMQuota directories Read Full Control %TEMP% directory Full Control Full Control % PTM % directory Full Control Full Control DC Mand W

O interfaces for WQRptSvr.exe QFileSvr.exe

Permit (to access and launch)

Permit (to access and launch)

Related Sections

• For more information about SCRead and SCWrite groups, read the section “Two

• ction

Levels of Non-Administrative User Access to StorageCentral” on page 239.

For information about other types of permissions, read the section “Introduto Permissions” at the beginning of Chapter 6.

242 StorageCentral User Guide

Page 253: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Advanced S

Permissions for Help Desk Users Help desk users can be given Full Control access by assigning them to the SCWrite group. If you want to limit access to this class of users, you can manually assign the access permissions on the server. Permissions required for different editions of

StorageCentral Standard Edition

to is is a requirement for creating or modifying a space

allocation managed object.

• t directories (that is, \Users).

sub keys.

and its sub directories.

Sto g

• s | Administrative Tools | Local Security Policy. In Local Policies choose User Rights Assignment to assign this

• naged object directories (that is, \Users).

torageCentral Security

StorageCentral are listed below.

• "Increase Quotas" right. Choose Start | Programs | Administrative Tools | Local Security Policy. In Local Policies choose User Rights Assignmentassign this right. Th

LIST permission to all managed objec

• FULL CONTROL permission to the registry key. HKEY_LOCAL_MACHINE\Software\Wquinn and its

• FULL CONTROL permission to the \Program Files\Precise directory

ra eCentral for Network Appliance Standard Edition

"Increase Quotas" right. Choose Start | Program

right.

LIST permission to all ma

243

Page 254: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• FULL CONTROL permission to the registry key HKEY_LOCAL_MACHINE\Software\Wquinn and its sub keys.

d its sub

ministrator rights to the Filer.

StorageCentral Active Directory Edition

• "Increase Quotas" right. C | Programs | Administrative Tools | olicy. In icies choo ssign

this right.

o all ma rect

• FULL CONTROL permission to the \Progra sub directories.

• FULL CONTROL permission to the Active Dedit this, run the ADSI (Active Directory Ser an be installed from the \Support Tools directoWindows 2003) CD-ROM. To add this utilit MMC," and press ENTER. In the MMC menu, chooClick the ADD button. Select ADSI in the lis

StorageCentral for Network Appliance A

• "Increase Quotas" right. Choose Start | Prog | Local Security Policy. In Local Policies choose Use Rights Assignment to assign this right.

• LIST permission to all managed object direct

• FULL CONTROL permission to the \Progra b directories.

• FULL CONTROL permission to the \Program Files\Precise directory andirectories.

• Full ad

hoose StartLocal Security P Local Pol se User Rights Assignment to a

• LIST permission t naged object di ories (that is, \Users).

m Files\Precise directory and its

irectory \WQuinn container. To vices Interface) MMC utility that cry of the Windows 2000 (and y, choose Start | Run, type "se "Console/Add/Remove Snapin". t. Click OK.

ctive Directory Edition

rams | Administrative Toolsr

ories (that is, \Users).

m Files\Precise directory and its su

244 StorageCentral User Guide

Page 255: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• FULL CONTROL permission to the Active Directory \WQuinn container. To edit this, run the ADSI (Active Directory Services Interface) MMC utility that can

up ls directo03) CD-ROM his utilit "MMC,"

and press ENTER. In the MC menu, choose "Console/Add/Remove Snapin". Click the ADD button. Se the list. Click OK.

• Full administrator rights to the Filer.

To Grant Permissions to the Active Directory \WQuinn Container

1. Log in as Administrator.

2. In the ADSI Editor, right-click the root "ADS K.

3. Expand the directory tree and select the \W choose Properties from the menu. Click the Advanced button.

4. Click the ADD button and select your help y are lick the View/E

5. In the Apply Onto box, select This object an e Allow check box for the FULL CONTROL p

es to cl pen sec

Related Sections

• For information about other types of permis ction to Permissions” at the beginning of Chapter

• For information about working with Network Appliance Filers, read the section “Introduction to Using StorageCentral with Network Appliance Filers” at the

apter 4.

be installed from the \SWindows 20

port Too. To add t

ry of the Windows 2000 (and y, choose Start | Run, type

Mlect ADSI in

I" and choose "Connect." Click O

Quinn container. Right-click andSecurity tab. Then click the

desk user or group. While theselected, c dit button.

d all child objects. Then select thermission.

6. Click OK three tim ose three o urity properties dialogs.

sions, read the section “Introdu 6.

beginning of Ch

245

Page 256: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Permissions for Running SRM Reports To execute a report, LIST permission is required to all drives and directories that will be reported on. READ permission is required if you want the report to return file ownership information. Although the report may not fail if the user has insufficient permissions, it may be returned blank or not include a list of all files that meetquery criteria.

the report

The following access permissions are required to the StorageCentral installation ion:

DRequired

directories assuming a default installat

irectory Permission Notes

C: all location of the StorageCentral directory

\Program Files\Veritas List Typical inst

C:StorageCentral\5.2\bin

ecause the r on the report

nerates a temporary file in this folder during report generation. This assumes that the WQRptSvr

running under the service account identity. Read the section “Permissions for DCOM” (page 249) for alternatives.

\Program Files\Veritas\ Read, Write This is required bDCOM servecollector ge

DCOM server on the collector is

C:\Program Files\Veritas\ StorageCentral\5.2\Reports

Full Control When a report is executed, an output file is created in this

are generated interactively.

r

rmissions for DCOM” (page 249) for alternatives.

directory on the report collector. This is also true when reports

This assumes that the WQRptSvDCOM server on the collector is running under the service account identity. Read the section “Pe

246 StorageCentral User Guide

Page 257: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Directory Permission Required

Notes

C:\Progand its sub-directories Execute,

rite

This is required for the computer where the report is being launched.

reports.

ram Files\Internet Explorer Read &

List folder contents, Read, W

This is required to support drill-down capabilities from Active-X

A share \WQReportParameters Modify This share must be created and accessible to users running reports.

StorageCentral report collector. By default, this share is created on the directory C:\Program Files\Veritas\StorageCentral\5.2\Reports with Everyone group

This share must reside on every

having Full Control access. C:\WinNT\TEMP Read, Write This is required because the

DCOM server on the report collector generates a temporary file in this folder during report generation.

Registry and Active Directory see notes The proper permissions must be assigned to the registry and Active Directory. For information about these permissions, read the section “Permissions for the Registry and Active Directory” on page 248.

Related Sections

For information about other types of permissions, read the section “Introduction to Permissions” at the beginning of Chapter 6.

247

Page 258: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Per Server

and FileScreen Server. These services should run under a specified service account. Due , the service account at times

does not have an interactive user to impersonate. It is recommended that the Quo Screen Server services run under a specified administrative account that has "Increase Quotas" right.

To assign the "Increase Quotas" right:

1. Choose Start | Programs | Administrative Tools | Local Security Settings.

Local Policies.

4. Assign "Increase Quotas" right to the service account.

Related Sections

For information about other types of permissions, read the section “Introduction to Permissions” at the beginning of Chapter 6.

Permissions for the Registry and Active Directory An interactive user (a user who runs the User Interface) and the two service accounts (QuotaAdvisor Server and FileScreen Server) need the following permissions to access the registry and Active Directory:

• READ permission to the \WQuinn container within the Active Directory is required for a user or group to read the properties of a policy in order to apply those properties to a managed object. Likewise for report execution, the properties of the report set must be read from the Active Directory. This is true only for an Active Directory edition of StorageCentral.

• READ permission to the registry key HKEY_LOCAL_MACHINE\Software\WQuinn and its sub keys. This is

rmissions for Service Account When the agent is installed, StorageCentral installs two services - QuotaAdviso

to the Auto Detect feature included with StorageCentral

taAdvisor Server and File

2. Choose User Rights Assignment in the

3. Right-click the Increase Quotas policy and choose Security.

248 StorageCentral User Guide

Page 259: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

required for report execution and application of a template policy to a managed object. The properties for reports and policies are stored in the registry for a Standard edition of StorageCentral.

• FULL permission to the registry key HKLM/Software/WQuinn/StorageCentralSRM/5.0/Devices. This is required in both the Standard and Active Directory editions in order to create or modify file blocking objects. The list of folders that have a file blocking policy applied to them resides in this registry key.

Related Sections

For information about other types of permissions, read the section “Introduction to Permissions” at the beginning of Chapter 6.

Permissions for DCOM The DCOM application WQRptSvr handles reports. The WQRptSvr is installed on a server called "Report Collector," which is dedicated to running reports. By default, the WQRptSvr DCOM server runs under the identity of the account you specified for StorageCentral services (read the section “Permissions for Service Account” on page 248). This account should be a member of Domain Administrators group. This is very similar to a feature of the Task Scheduler. In the Task Scheduler, you can schedule a job to run as another user. If the WQRptSvr on the Report Collector is running as the L unching User, the report will execute as the user running the user interface. If the report is cheduled, the report will execute as the user that the Task Scheduler is running as.

e managed console. The WQRptSvr account must have enough he file system and using DCOM.

• recommended if a non-administrative eport Collector on which many reports will

The StorageCDC C QRptSvr to the "Launching User." This can be done if the management console and the Report Collector

a

s

• Specifying an account for the WQRptSvr is required if the Report Collector is remote to thpermissions for accessing t

Specifying an account for the WQRptSvr is user needs to run reports, or for a Rbe scheduled.

entral DCOM server (WQRptSvr) can be configured using the OM NFG utility. If you wish to limit who will run reports, set W

249

Page 260: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

are installed on the same server. Permissions of an interactive user are used to generatreports. The users without permissions to the directories will be able to run reports, butthe output will n

e

ot include files to which they do not have at least LIST access.

t for WQRptSvr:

onfiguration Properties dialog.

4. Select WQRptSvr and click Properties.

5. On the Identity tab, select The launching user option to change the account.

To check or change the DCOM accoun

1. Choose Start | Run.

2. Run dcomcnfg.

3. Click the Applications tab on the Distributed COM C

250 StorageCentral User Guide

Page 261: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

If Wschedul

To change the AT service account:

1. Go to the \WINNT\Tasks folder.

QRptSvr is set to the "Launching User," you must change the AT service account for ed reports.

2. Choose Advanced/AT Service Account from the menu.

3. Stop and restart the Scheduler for this change to take effect.

251

Page 262: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

An interactive user (a user who runs the User Interface) and the two service accounts (QuotaAdvisor Server and FileScreen Server) need the following permissions to access StorageCentral:

For StorageCentral Standard Edition

• READ permissions to access local registry.

• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub keys.

For StorageCentral for Network Appliance Standard Edition

• READ permissions to access local registry.

• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub keys.

• Full administrator rights to the Filer.

For StorageCentral Active Directory Edition

• READ permissions to access local registry.

• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub keys.

• READ permissions to access the Active Directory \Wquinn container.

For StorageCentral for Network Appliance Active Directory Edition

• READ permissions to access local registry.

ys.

• READ permissions to access the Active Directory \Wquinn container.

• Key [HKEY_LOCAL_MACHINE\SOFTWARE\WQuinn\] and its sub ke

Full administrator rights to the Filer.

252 StorageCentral User Guide

Page 263: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections

ForPerm

Permissions for WMI Windows Management Instrumentation (WMI) is used by the StorageCentral wizards in the user interface to enumerate folders to which policies are applied. To be successful, a user running the user interface on a client machine must be added to the security for CIMV2 WMI Control.

To add a user or group to the security for CIMV2 WMI Control:

1. Click Start, choose Run and run mmc.

2. The Console1 window displays. From the menu bar at the top choose Console, then choose Add/Remove Snap-in.

3. Click the Add button on the Standalone tab.

4. Select WMI Control from the Available Standalone Snap-ins list and click the Add button.

5. On the Change managed computer dialog box, select Local computer and click Finish.

6. Close the Available Standalone Snap-ins dialog box.

information about other types of permissions, read the section “Introduction to issions” at the beginning of Chapter 6.

253

Page 264: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

7. Click OK on the Add/Remove Snap-in dialog box to add the WMI Control. The MMC tree should look as follows:

8. Select WMI Control (Local) in the MMC tree, right-click, and choose Properties.

the WMI Control (Local) Properties dialog box, click the Security tab, expand Root, select CIMV2, and click the Security button.

9. On

254 StorageCentral User Guide

Page 265: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

10. To add a specific user or group, click the Add button on the Security for

11. On the Select Users, Computers, or Groups dialog box, select a domain, select a user or group, click the Add button, and click OK.

up name displays on the Security for Root\CIMV2 dialog box. w

Root\CIMV2 dialog box.

12. The user or groTo assign permissions, select the user or group in the list and select the Allocheck box next to permissions required for that user or group.

255

Page 266: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

13. Control Settings for CIMV2 dialog box displays.

ontrol Settings for CIMV2 dialog box, select (highlight) the or group and click View/Edit.

On the Security for Root\CIMV2 dialog box, click Advanced. The Access

14. On the Access Cnewly added user

256 StorageCentral User Guide

Page 267: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

d subnamespaces." Click OK.

15. On the Permission Entry for CIMV2 dialog box, ensure that permissions are applied to "This namespace an

257

Page 268: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

16. Click four times to close all open windows.

Relate

For info read the section “Introduction to Permissions” at the beginning of Chapter 6.

d Sections

rmation about other types of permissions,

258 StorageCentral User Guide

Page 269: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Adding Users to the SCRead and SCWrite Groups and Assigning Permissions

The non-administrative users added to the SCRead group will have Read permission. The non-administrative users added to the SCWrite group will have Full Control permission. You can assign Read or Full Control permissions in two ways:

• By selecting a single user and making him or her a member of the SCRead or SCWrite group

• By selecting a group (SCRead or SCWrite) and adding a number of users to that group

To assign Read or Full Control permissions to a single non-administrative user with no access:

1. Choose Start | Programs | Administrative Tools | Active Directory Users and Computers.

2. Expand the Active Directory structure under the domain node in the left pane and select Users.

3. In the right pane, select the user you want to give access to, right-click and choose Properties in the menu.

4. On the Properties dialog box, click the Member Of tab.

5. On the Member Of tab, click the Add button.

6. On the Select Groups dialog box, do one of the following depending on your

ect SCRead group in the list, click the Add button, and click OK to assign Read access to the selected user.

o Select SCWrite group in the list, click the Add button, and click OK to ll Control access to the selected user.

needs:

o Sel

assign Fu

7. Click OK on the Properties dialog box.

259

Page 270: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

To add a number of non-administrative users to SCRead and SCWrite groups:

s and

der the domain node in the left pane and select Users.

3. In the right pane, select the SCRead or SCWrite group, right-click and choose

4 the Add button.

5. d click the Add button. Add one or more users. When you finish adding the users,

window.

For more information about the permissions for non-administrative users, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.

Adding the SCRead and SCWrite Groups to a New Directory and Assigning Permissions

When you move report or database directories, you should add the SCRead and SCWrite groups to the new directory's Access Control List (ACL) and then assign proper permissions to these groups.

To add the SCRead and SCWrite groups to a new directory:

1. Select a new directory in Windows Explorer in the left pane, right-click, and choose Properties in the menu.

1. Choose Start | Programs | Administrative Tools | Active Directory UserComputers.

2. Expand the Active Directory structure un

Properties in the menu.

. On the group Properties dialog box, select the Members tab and click

On the Select Users, Contacts, or Computers dialog box, select a user an

click OK.

6. Click OK on the Properties dialog box to save your changes and exit the

Related Sections

260 StorageCentral User Guide

Page 271: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

2. Click the Security tab on the directory Properties dialog box.

3. Click the Add button.

4. The Select Users, Computers, or Groups dialog box displays. Select the SCRead and SCWrite groups and click the Add button. Then click OK. The SCRead and SCWrite groups now display in the directory Properties dialog box.

5. Select the SCRead group. If this is the Reports directory, all permissions should be selected. If this is the Database directory, only Read & Execute, List Folder Contents, and Read permissions should be selected.

6. Select the SCWrite group. All permissions should be selected for this group. Select the Allow check box for Full Control permission. This automatically selects all permissions.

7. Click the Apply button. Then click OK. Now you have assigned proper permissions to the SCRead and SCWrite groups in the new directory.

Related Sections

For general information about the permissions for non-administrative users, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.

Adding the SCRead and SCWrite Groups to the WQuinn Container in the Active Directory and Assigning Permissions

A WQuinn container is a container in the Active Directory hierarchy where the product attributes, such as the key, policy, and report information, are stored. During the installation of StorageCentral the WQuinn container is created by default at the domain root in the Active Directory. In case you need to override a policy or another setting, you may create a WQuinn container at any other node in the Active Directory hierarchy (for example, at a single computer or a group).

The Permissions Utility program used during installation allows you to assign permissions to the WQuinn container only at the domain root. In this section you will

261

Page 272: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

learn how to use ADSI Edit to assign peDirectory that is not located at the doma

rmissions to the WQuinn container in the Active in root.

To assign permissions to the WQuinn container in the Active Directory:

mmc.exe file.

ap-

dd/Remove Snap-in dialog box displays. Select the Standalone tab and click the Add button.

4. The Add Standalone Snap-in dialog box displays. Select ADSI Edit in the list and click the Add button. Click Close.

n the Add/Remove Snap-in dialog box, click OK to close the dialog.

e in the left pane, right-click and

1. Choose Start | Run and run the

2. When the MMC console appears, click Console and choose Add/Remove Snin in the menu.

3. The A

5. O

6. In the MMC console, select the ADSI Edit nodchoose Connect in the menu.

262 StorageCentral User Guide

Page 273: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

7. The Connection dialog box displays. The entries in the Name and Naming Context text boxes should appear as shown:

8. Click OK on the Connection dialog box.

263

Page 274: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

The console window is now connected to the Active Directory for the domain as shown:

9.

10. Right-click the CN=WQUINN node and choose Properties from the menu.

11.

12. ead

Now yo

Expand the Domain NC node in the left pane and find the CN=WQUINN node that is not located at the domain root. The permission at the domain root CN=WQUINN has been changed during the installation.

The CN=WQUINN Properties dialog box displays. Select the Security tab and click the Add button.

The Select Users, Computers or Groups dialog box displays. Select the SCRand SCWrite groups in the list and click OK.

u have returned to the CN=WQUINN Properties dialog box.

264 StorageCentral User Guide

Page 275: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

13. Select the SCRead group on the Security tab. Make sure that the Allow check box is selected only for the Read permission as shown below:

Select the SCWrite group on the Security tab. Make sure that the Allow checbox is selected for the Full Control, Read, Write, Creat ll Child Objects, and Delete All Child Obj ts pa

14. k e A

ec ermissions. Selecting the Full Control permission utomatically selects all permissions.

265

Page 276: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

15. Click Apply on the CN=WQUINN Properties dialog box. Then click OK. This ndard ACL for the CN=WQUINN container in the Active

Related Sections

For general information about the permissions for non-administrative users, read the section “Two Levels of Non-Administrative User Access to StorageCentral” on page 239.

will change staDirectory.

266 StorageCentral User Guide

Page 277: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Setting Up the Task Scheduler Logon Account If the report collector does not reside on the same computer as the agent, the Task Scheduler must be configured to run under the service account used in the installation.

To configure the Task Scheduler logon account:

4. and enter

5. Open the Advanced menu bar item and choose Stop Using Task Scheduler.

6. Open the Advanced menu bar item and choose Start Using Task Scheduler.

Relate

“Int d

1. Open Windows Explorer on the computer with the report collector.

2. Go to My Computer | Control Panel | Scheduled Tasks.

3. Open the Advanced menu bar item and choose AT Service Account.

On the AT Service Account Configuration dialog, select This Accountthe service account name and password for StorageCentral. Click OK.

d Sections

ro uction to Permissions” at the beginning of Chapter 6

267

Page 278: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

268 StorageCentral User Guide

Page 279: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter 7. Best Practices

Introduction to Best Practices The best practices provide guidelines for creating corporate SRM policies and using StorageCentral to monitor and enforce those policies. The best practices were developed

ience of implementing StorageCentral in hundreds of corporations.

ftware Corporation has identified:

General

Ru• Use Predefined Report Sets (page 275)

• Create Your Own Report Definitions and Report Sets (page 276)

Space Allocation

• Use Auto Detect Managed Objects (page 278)

based on years of exper

These are the best practices that VERITAS So

• Establish Corporate SRM Policies (page 271)

• Tell Users That SRM Is Beginning (page 273)

• Create Managed Objects and Apply Policies During Off Hours (page 274)

• Monitor Overall Disk Consumption (page 274)

nning Reports

• Implement Passive Limits Initially (page 277)

269

Page 280: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• Use Disk Full Error Message (page 278)

• Use Overdrafts (page 279)

File B• Create File Blocking Policies That Suit Your Site's Needs (page 280)

• Create Customized File Blocking Messages (page 281)

Educating the Users

lo king c

• Identify User Reports (page 282)

270 StorageCentral User Guide

Page 281: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

General

Exp a

• Decide how much space to give each user.

the result of a storage audit. The audit have, and whether the disk

r

ll use at least passive limits with alarms. This encourages users to participate in

includes the notification message and specifies how the message will be delivered (screen pop-up or e-mail) and who will receive the message.

• Determine alarm thresholds.

thresholds allow you to specify actions to occur when a threshold value (a percentage of the space allocation) is exceeded. Although multiple alarm settings

old is activated only once until the percentage of used space drops below the threshold. For example, if threshold 3 is set at 70 percent and threshold 2 is set at 80 percent and 71 percent of the space limit is used, threshold 3 is activated. Threshold 3

Establish Corporate SRM Policies lan tion: Define your organization's goals by establishing corporate SRM policies.

The space limits are determined based onshould show how much space the users currentlyspace is being used appropriately (business data vs. personal or illicit data). Space limits are also based on available capacity. The space limit alarms may take many forms based on an individual need andthe "political" nature of limiting disk space. Some organizations prefer to monitoall users and enforce limits only for certain offenders. Most organizations wi

storage management. More strict environments such as a university would enforce all users and use alarms to warn of the space limit. A typical alarm

Alarm

can be configured, usually only two or three alarms are enough with the thresholds set at 80, 90, and 100 percent. A thresh

will not be activated again, unless the value first drops below 70 percent. Threshold 2 will be activated if more files are saved and the value raises above 80 percent.

271

Page 282: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

For more information about the space allocation alarm thresholds, read the “Threshold” section (page 212) in the section "Description of Space Allocation Alarm Settings".

• Determine notification messages to users. A customized notification message can be sent to a user when a space allocatior file blocking alarm is activated. For a space allocation alarm with a threshold set at 70 percen

on

t, the following message could be sent to the user: "Space limit is approaching for [USER] on [OBJECT NAME]. Current space used is [CURRENT USAGE MB]. Please perform some housecleaning on your files. Failure to do so may restrict future access to [SERVER NAME]." For more information about the space allocation notification messages, read the “Notification Tab” section (page 213) in the section "Description of Space Allocation Alarm Settings." For a file blocking alarm, the following message could be sent to the user: "The network detected that you may have attempted to save media files on [SERVER

ese files are not permitted. Contact John Smith at extension 1234 with or more information about the file blocking notification messages,

Determine which file types to block.

les with file extensions such as .exe and .vbs could turn out to be harmful viruses. Illegal .mp3 and .mpg files may take up a valuable disk space on your company's servers. Include unwanted file types in the list of unauthorized files when creating a new file group. For more information about the unauthorized files and file groups, read the

to ge 110).

Benefit: ization more easily implement StorageCentral and more quickly begin reaping the benefits of storage resource management.

NAME]. Thquestions." Fread the “Notification Tab” section (page 206) in the section "Description of File Blocking Alarm Settings."

• Consider that some executable fi

sections “Unauthorized and Authorized Files” (page 236) and “Introduction File Groups” (pa

Having clear goals helps your organ

272 StorageCentral User Guide

Page 283: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections

To learn about SRM policies, read the section “Introduction to Policies” (page 72).

earn about the variables you can use in custom messages, read the section ge Macros” on page 223.

• For general information about the best practices, read the section “Introduction

Tell Users That Storage Resource Management Is Beginning

being implemented. Specify when the SRM will start and what is being monitored. Explain benefits to the organization and let the users know whom to contact if they have questions or issues (for example, whom to ask when they want to

ion).

For example, you may send the following e-mail to all users in your organization or in a certain department: "As part of our organization's storage resource management policy, limits on users' disk space will be set on the company server to conserve space. The disk space liHelpDe

Benefit:on the o

Related Sections

For nPractice

• To l“Messa

to Best Practices” at the beginning of Chapter 7.

Explanation: Notify users in your organization that corporate storage resource management (SRM) is

increase a space allocat

mit per user is X. If you require additional disk space, contact [email protected]."

Increased acceptance from the user community, which leads to a faster return rganization’s investment in StorageCentral.

ge eral information about the best practices, read the section “Introduction to Best s” at the beginning of Chapter 7.

273

Page 284: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Create Managed Objects and Apply Policies Durination: Most managed object-policy relationships are created

s are created. We suggest that the initial application of space allocne during off hours because creating managed objects requires

though the persistent monitoring of disk I/O for policy enforcementpercent to overall system overhead, the initial application of a space a

a one-time scan of the managed object to determine currentg required to perform this scan depends on the numb

If it is a large folder, the scan can take some time and the processireflected primarily in the system process and the QuotaAdvisor Server se

which manages space limits and sends alarms).

This practice minimizes disruption to users and allows for anstem performance.

Related Sections

To learn more about StorageCentral policies, read the sections

g Off Hours Explan when new managed object ation policies should be do a disk scan.

Al adds less than 1 llocation policy

requires space consumption. The processin er of files stored in the object. ng will be

rvice (the SRM service,

Benefit: optimal CPU/sy

• “Introduction to 72) and “Introduction to Managed Object Policies” (page 72).

• For general information about the best practices, read the section “Introduction

MonitorExplanation: StorageCentral provides detailed disk consumption information in a format that allows administrators to take corrective actions.

• StorageCentral ships with pre-configured policies for monitoring disk consumption. For example, when the "Partition Alert" policy is applied to a partition, it calculates the size of the partition and sets the space allocation value to that amount.

Policies” (page

• To learn how to apply policies to managed objects, read the section “Applying a Policy to a Managed Object” on page 108.

to Best Practices” at the beginning of Chapter 7.

Overall Disk Consumption

274 StorageCentral User Guide

Page 285: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• When you crconfigure mu

eate space allocation policies or managed objects, you may ltiple alarm thresholds to customize to your needs.

• You may generate certain reports that allow you to monitor space by partition. k Drive Summary" report lists all partitions and their nd type.

Related Sections

Chapter 7.

Runnin

Use Predefined Report Sets Explanation: StorageCentral includes 26 predefined reports sets. The following reports will allow you to begin auditing your storage immediately:

• Space By User Object

• Space By Folder Object

• Duplicate Files

• Large Files

• File Type Summary

• Files Not Accessed in Over a Year

For example, the "Discapacity, free space a

Benefit: This practice saves the organization money by reducing wasted space on storage media and helps avoid down time associated with insufficient disk space. Administrators will be notified when disks approach their capacity so that they can take corrective actions before disk consumption reaches critical levels.

For general information about the best practices, read the section “Introduction to Best Practices” at the beginning of

g Reports

275

Page 286: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

For definitions of all the report sets that come with StorageCentral, read the section “Predefined Report Sets” on page 146.

ike "Do I have duplicate files?" and "How much space are my users using?"

Related Sections

For general information about the best practices, read the section “Introduction to Best Pra e

Create Your Own Report Definitions and Report Sets Exp atiowha hthe repo y n distributed or presented in a different fashion to different adminisrequires present e y report definitions and report sets from scratch using a custom report writer or adjust the parameters of the default ones.

to

rent value to different users. These reports can be detailed for use in file

out report definitions, read the section “Introduction to Report Definitions” (page 118).

• To learn how to create a report definition, read the section “Creating a New

Benefit: Using predefined report sets enables you to begin examining your storage immediately and answer questions l

ctic s” at the beginning of Chapter 7.

lan n: Because each organization has unique needs, it is important to determine t t ese are and configure custom reports that provide custom answers. Additionally,

rts ma eed to be trators, managers, and users. Determine what reports your organization , who needs to view those reports, and in what format the reports should be

ed. Then creat our own

Benefit: StorageCentral gives organizations the flexibility of creating reports unique their needs. The custom report writer provides the ability to create reports that have diffemanagement or can provide summary information for executive personnel.

Related Sections

• To learn ab

Report Definition” (page 119).

276 StorageCentral User Guide

Page 287: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• To learn how to create a report set, read the section “Creating a New Report Set” on page 136.

• For general information about the best practices, read the section “Introduction to Best Practices” at the beginning of Chapter 7.

Space

Implement Passive Limits Initially Expl a limits, users will not be hindered by space allocation enforcement; itor disk consumption. With passive limits, you can implement a space allocation value, rather than a percentage of current usage. For example, your corporate SRM policy may specify that each user’s home directory should be no larger than 100 MB. By implementing a passive 100 MB limit, you can quickly and easily determine who is violating that policy. Exceptions can be made, and space allocation can be enforced at a later date.

Benefit: Th rphase after StorageCentral is first installed. Frequently, the policies never need to be actually enforced to gain the benefit of implementing those policies. After the users

ties are being monitored on of what and how much they

eir own disk space.

One example of the customized alarm action is the following notification message sent to the user: "Space limit is approaching for [USER] on [OBJECT NAME]. Current space used is [CURRENT USAGE MB]. Please perform some house cleaning on your files. Failure to do so may restrict future access to [SERVER NAME]." For more information about the space allocation notification messages, read the “Notification Tab” section (page 213) in the section "Description of Space Allocation Alarm Settings."

To learn about report sets, read the section “Introduction to Report Sets” on page 135.

Allocation

an tion: By applying passive however, you can still mon

is p actice minimizes disruption to users during the information-gathering

realize that their space consumption and file-writing activithe corporate servers, they tend to be more conscientiousstore. Additionally, customized notification messages issued when space allocationalarm thresholds are exceeded educate the users and provide a means for them to manage th

277

Page 288: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Related Sections

• For information about a passive limit, read the section "Space Allocation Options" (page 229).

• For information about disk space limit and overdraft limit, read the sections “Disk Space Limit” (page 218) and “Overdraft Limit” (page 227), respectively.

• For general information about the best practices, read the section “Introduction

Use Auto Detect Managed Objects

on works for both subfolder objects and user objects. With Auto Detect Subfolders, a specified policy is applied to a subfolder as it is created under the chosen root. Likewise, with Auto Detect Users, a

le within the selected object. Auto because of its explicit benefit.

Benefit: This practice saves time and reduces the total cost of ownership by limiting the amount of administration and user interaction needed to manage your storage policies.

Rela

• For more information about auto detection, read the section “Auto Detection” on page 190.

• For general information about the best practices, read the section “Introduction to Best Practices” at the beginning of Chapter 7.

Use Disk FullExplanation: Wenforcement. St urn valid, supported Windows 2000 error messages back to a client when space allocation is

to Best Practices” at the beginning of Chapter 7.

Explanation: Auto detection automates the application of storage policies when new users or directories are added to the server. Auto detecti

specified policy is applied to each user that owns a fidetection should be implemented wherever possible

ted Sections

Error Message hen enforcing space allocation, send "Disk full" error message with orageCentral integrates with the operating system (OS) to ret

278 StorageCentral User Guide

Page 289: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

enfor d la "Disk fuhas sho do not p "Not enough quota is available" error message. "Disk full" is universally understood and properly handled by applications and operating systems, including the Apple Macintosh OS.

Benefit: Error messages are only returned if the space allocation policy is enforced. Regardless of enforcement, customized alarm actions still occur. Because the "Disk Full" error message is better understood by applications and client operating systems, the benefit of using this error message is reduced training for end users.

For gene to Best Practice

Explan aft or at least

y the size of the file the user is modifying.

verdraft limit, read the section “Overdraft Limit” on page 227.

t the "Always save open files" option, read the section “Space Allocation Options” on page 229.

ce . The two supported error messages are: "Not enough quota is avai ble" andll." Though both are fully supported Windows 2000 error messages, experience

wn that many Microsoft applications and non-Windows 2000 operating systemsroperly handle or translate the

Related Sections

ral information about the best practices, read the section “Introductions” at the beginning of Chapter 7.

Use Overdrafts ation: If enforcing space allocation, provide the appropriate overdr

use the "Always save open files" option. The overdraft allows for space allocation to be exceeded by the specified overdraft value. The "Always save open files" option allows quota to be exceeded only b

Benefit: You have flexible options to enforce the space allocation limit while still permitting users to perform their work.

Related Sections

• For more information about the o

• For more information abou

279

Page 290: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

• For general information about the best practices, read the section “Introductionto Best Practices” at the beginning of Chapter 7.

File Blo

Cr

to the standard ones.

Benefit: This gives you the flexibility to customize file groups or policies for your corporate standards.

Relate

• To learn about file groups, read the section “Introduction to File Groups” on page 110.

• To learn how to create a file group, read the section “Creating a New File Group” on page 110.

• ed

• ng a file blocking policy, read the section “Creating a New Managed Object Policy” on page 73.

• For general information about the best practices, read the section “Introduction

cking

eate File Blocking Policies That Suit Your Site's Needs Explanation: StorageCentral allows you to create your own file groups and file blockingpolicies in addition

d Sections

To learn about file blocking policies, read the section “Introduction to ManagObject Policies” on page 72.

To learn about creati

to Best Practices” at the beginning of Chapter 7.

280 StorageCentral User Guide

Page 291: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Create Customized File Blocking Messages Explanation: In StorageCentral, file blocking is integrated with the operating system so

at it is enforced d not as descriptive custom messa more detail to the user.

ile blocking messages are created when policy or managed ges are entered in a of the Notification tab on example, you may enter the following message: "The

y have attempted to save media files on [SERVER NAME]. itted. Contact John Sm ions." You messages when you ing policy or

naged object.

fication messages b r corporate .

Related Sections

” section ( ription of File Blocking Alarm Settings" for the opti

tion messages to the user.

riables you can the section “Message Macros” on page 223.

• For general information about the be e section “Introduction to Best Practices” at the beginning of

th returns a supported Windows 2000 error message when a blocking rule. The supported Windows 2000 error messages tend to be cryptic an

as one would like. Therefore, we suggest that you also create age within a file-blocking managed object policy that provides

The f a new file blockingobject is created. The messa

dialog box. For the Message are

the Actionsnetwork detected you maThese files are not perm

n modify file blockingith at extension 1234 with quest

cama

modify an existing file block

Benefit: Custominformation policy

ized noti etter inform users of you

• Read the “Notification Tab page 206) in the section "Descons StorageCentral provides for

customizing notifica

• To learn about the va use in custom messages, read

st practices, read th Chapter 7.

281

Page 292: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Educating Users

yExplan a space allocation

that directly affects a user. When th hes critical s based on SRM policies, the user shoiled reports that help him or her recov tral uses ActiveX

orer, whic dministrative actions to be taken listed in the report. For example ed, copied, moved, or

d directly from the browser. This enab tors to delegate file back to the users who own the

t: a corrective ing the burden dministrator.

Related Sections

out the best practi “Introduction to Best ices” at the beginning of Chapter 7.

Identif User Reports ation: A user report is a report that is typically implemented in

policy e user’s space consumption reacleveldeta

uld be not only notified, but also provided er wasted space. StorageCen

controls within the Internet Explagainst files

h allows a, a file can be launch

delete les system administramanagement data.

Benefi Informed users can take on the system a

action themselves, decreas

For general information ab ces, read the sectionPract

282 StorageCentral User Guide

Page 293: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Chapter 8. Troubleshooting

This section identifies some problems you ma ter with StorageCentral and offers estions for resolving the issue.

hese problems are addressed in this trouble

alerts are not triggered from a Network Appliance Filer (below)

in failure" error message

• Managed objects fail to display (page 284)

• Managed objects fail to display after displaying before (page 285)

received from alarms (p

played in d to a remote domain (page 286)

account is marked “Safe for De ation” differently in Windows 2003 Server (page 287)

Are Not Triggered From a Network Appliance

iolations on the Filer are not detected by the remote agent and tions are not triggered.

When a quota is exceeded on t s to send an SNMP trap to traphosts." The StorageCentral r traps as and rrive.

:

n the NetA n configured. If it is not, configure it using the instructions in uring SNMP for Space Allocation on Network Appliance Fi

y encounsugg

T shooting section:

• Quota

• The "log displays (page 284)

• E-mail is not age 285)

• No audit records are dis the MMC while connecte

• User leg

Quota AlertsFiler

Problem: Quota vassociated ac

Explanation:all defined "

he Filer it attemptemote agent will process the

when they a

Suggested solutions

1. Verify the SNMP service o pp Filer has beethe section “Configlers” (page 182).

283

Page 294: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

2. Verify the SNMP component has bee ost as the remote If it is not, follow the appropri cklist

u modified the system by following eithe must stop and e services on the remote agent.

e : The "log in failure" error message d

planation: This message displays when ay be denied if the space allocation and file bl log in.

Suggested solutions:

1. Check access to computer

fferent dothe following:

o Create a trust between the

o Add the current user to a known gro

bjects Fail to Display you are at the managed object gr

twork Appliance Filer volume that is onlin age plays.

y happen when there lume ffline. Possible solutions: (a) Turn on

n installed on the same hagent. ate step in the installation che(page 35).

If yo r suggested solution, yourestart th

Login FailurProblem isplays.

access to the computer is denied. Access mocking services cannot

Ex

2. If this computer is in a di main than the current login account, then do

domains

up in the destination domain

Managed O (1 of 2) Problem: If id and attempt to turn on quotas on a

e, nothing happens and no error messNedis

Explanation: This ma are quotas defined for a different vothat is o quotas only when all volumes are online.

284 StorageCentral User Guide

Page 295: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Managed Objects Fail to Display of 2) Problem: Objects that previously displaye f managed objects no longer show there.

aged object that reentral will not know ab renamed object. The object will

isplay in the list of managed objec

are at the managed ob start quotas on a e that is onlin

pear and be replaced with an entry that .” This may happen when defined for a different volum

ions: (a) Restart quotas only wh are online. (b) Wait until all mes are online before restarting quotas.

eived From Alaoblem: A space allocation or file blocking ication

ut no e-mail is received. That th ered can be verified he application event log for the

Verify e-mail settings:

o For the Standard edition, che e server global properties. Verify the r is specified, and the sender address and passwor e mail server is reachable from the server ru ntral using PING, or another mail client.

o For the Active Directory edition, check the Mail tab (see page 66) in the properties "StorageCentral (yourdomain)." Verify

rrect mail server is spe ss and password are correct. Verify that the m rver running StorageCentral us r mail client.

(2d in the list o

Explanation 1: If a man sides on a Network Appliance Filer is renamed, StorageC out the newlyno longer d ts.

Explanation 2: If you ject grid and attempt to reNetwork Appliance Filer volumdisap

e, the quotas for that volume may reads “quotas off

there are quotas e that is offline. Possible solut en all volumesvolu

E-mail Is Not Rec rms alarm is configured to e-mail a notifPr

to the user, b e alarm level was triggby checking t alarm message.

Suggested solutions:

1.

ck the Mail tab (see page 66) in th correct mail served are correct. Verify that thnning StorageCe

console root global the co cified, and the sender addre

ail server is reachable from the seing PING, or anothe

285

Page 296: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

2. If you selected the Use Active Dir age 66) in the server or AD properties, verify the address in Active Directory's Users and Computers. Th n the General tab of user account properties.

larm settings. On rm tab, click the Actions button. Make sure the Mail To field is filled in. Also verify a message has been

tered. (Read the section "Notific ctions “Description of File ing Alarm Settings” and “Descr e Allocation Alarm Settings”

for information about this check box.) settings are correct, also make sure this policy was applied to the m and check the settings in the

ct itself.

u are using a macro in the Mail T ddress fields, verify the is configured correctly. For macro should read: [USER

]@domain.com. Also on ID matches his or her il address. For Active Directo ail, use only [USER NO

DOMAIN].

5. Use the [USER] macro in your messa the message sent to the ation event log. Verify that the triggered the alarm.

isplayed in the MMC While Connected

as triggered for a m remote domain. The audit e Microsoft Access A he local computer, but this

audit record was not displayed in the MMC User Interface.

: By default, the Audit part of th ocal Microsoft Access database while the rest of th ected to the remote domain.

er, the program should look at the Mi ss database of the domain, ected to.

sted solution: Use a centralized databremote domain.

ectory for email check box (p user account has an e-mail

e e-mail address appears o

3. Check the policy a the policy Ala

en ation Tab" in the seBlock iption of Spac

If the policy anaged object,

obje

4. If yo o or Mail CC amacro regular e-mail, theNO DOMAIN verify the user's loge-ma ry or Exchange e-m

ge, and reviewapplic expected user

No Audit Records are Dto a Remote Domain

Problem: An alarm wdata was written to th

anaged object in audit database on t

Explanation e User Interface looks only at the le UI is conn

Howev crosoft Accewhich the User Interface is conn

Sugge ase to see the audit records for all computers in the

286 StorageCentral User Guide

Page 297: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

User Account Is Marked “Safe for Delegation” Differently in 3 Server Where D

ionality Has Been Raised to s 2003 Native Mode torageCentral Active Di nied" error

ived when trying to con te domain in Windows Server 2003.

: In Windows 2000 the user acco count safe for delegation. In Win

t be enabled for a user accouncipal Name) must be registered fo

lution: Allow a user to be tru

1. Open Active Directory Users and Co

console tree, click Users. Ri ou want to be trusted for legation and choose Properties.

tab and selec ollowing options as appropriate: ation to any t this user

ion to specific services e required for the Trust this user for delegati ices only option. Click OK.

4. If you cannot see the Delegation tab, ntax: Setspn /s

Type the following:

Setspn WQQASvr/servSetspn WQFSSvr/servername domain\user

user still receives "Access Denieremote serve ices should be restarted on the

Windows 200 omain or Forest Level WindowFunct

Problem: Usinmessage may be rece

g S rectory Edition the "Access Denect to a remote machine or a remo

unt has a property that a user can select todows Server 2003 running in native mode

Explanationmark the acdelegation mus t using a command Setspn. The SPN

r the service account when the service is (Service Prininstalled by setup.

sted for delegation.

mputers.

Suggested so

2. In the ght-click the user yde

3. Click the Delegation t one of the f service (Kerberos only) or Trusly. Further configuration will b

Trust this user for delegfor delegat on

on to specific serv

set the SPN first using the Setspn rvername domain\user. command. Use the sy ervicename/se

ername domain\user

Note: If a d" error message after uninstalling and then r, the servreinstalling StorageCentral on a

remote server.

287

Page 298: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...
Page 299: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

Index

A Access database

converting data to support Unicode, 60 access to StorageCentral, levels of, 237 Active Directory (AD)

computer policies, 85 effects on MMC console tree, 10 fields, 185 introduction, 13 permissions needed to access, 248 schema modifications, 13 verify schema extension, 54 WQuinn container, 261

ActiveReports component (CAB file), 40 adding

report collector, 114 SCRead, SCWrite groups to new directory,

260 SCRead, SCWrite groups to WQuinn

container, 261 users to SCRead, SCWrite groups, 259

adding, 114 AdminPak, 54 ADSI Edit, 54 alarm settings

file blocking, 205 space allocation, 211

Always save open files (space allocation option), 229

ANSI in SQL Server, 202 antivirus software, 194 application event log, 187 applying a computer policy to a server, 88 applying a policy to a managed object, 108

associations, group, 220 audit data

deleting, 158 introduction, 156 refreshing, 159 viewing, 156

audit database in a clustered environment, 194 viewing contents, 156

audit window, modifying properties, 158 auto detection

and NetApp Filers, 180

B backwards compatibility, 23 benefits to using StorageCentral, 1 best practices

apply policies off hours, 274 create file blocking policies, 280 create your own reports, 276 establish corporate policies, 271 file blocking messages, 281 identify user reports, 282 implement passive limits, 277 introduction, 269 monitor disk consumption, 274 use auto detect, 278 use disk full error code, 278 use overdrafts, 279 use predefined report sets, 275

C CAB file, 40 centralized databases, 192

289

Page 300: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

290 StorageCentral User Guide

chargeback Chargeback Summary (predefined report

set), 146 checklist for installation, 35 cluster support

overview, 194 commands

FPOLICY, 183 ISQL.exe, 202 SCAlloc, 160 SCBlock, 163 SCDisplayLimit, 164 SCReport, 165 SCSRM, 168

compatibility, 23 computer policies

and NetApp Filers, 181 applying, 88, 153 creating, 86 deleting, 87 introduction, 85 modifying properties, 88

COMPUTERPOLICIES parameter, 56 configuring

Microsoft SQL Server support, 202 SQL Server support, 202 StorageCentral to use MS SQL Server, 202

converting databases to run under SC 5.2, 60 copying

file group, 113 managed object policies, 78 report definition, 123 report set, 142

creating computer policy, 86 file group, 110 managed object, 96 managed object policies, 73 preferred group, 151 report definition, 119 report set, 136

customizing ActiveReports component (CAB file), 40

D Daily Storage (predefined report set), 146 Data ONTAP software, 183 databases, centralized, 192 DBF report output format, 143 DCOM, permissions required, 249 DCOMCNFG program, 249 deleting

audit data, 158 computer policy, 87 file group, 111 managed object, 103 managed object policy, 78 preferred group, 152 preferred machine, 155 report collector, 115 report definition, 121 report set, 137 scheduled job, 115

details pane, 10 Disk Drive Summary (predefined report set),

146 disk space limits

introduction, 218 used with overdraft limit, 227

DSN path, 192 Duplicate Files (predefined report set), 146

E escape sequence, 165 event log

application event log, 187 examples

space allocation and NetApp Filers, 176 exclude filters, 219 Exclude from folder limit (space allocation

option), 229

Page 301: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

291

extending the schema verifying, 54

F failover, 194 file blocking

alarm settings, 205 on NetApp Filers, 173

file blocking policy refining with filters, 219

file groups copying, 113 creating, 110 deleting, 111 introduction, 110 modifying properties, 112 renaming, 113

File Type Summary (predefined report set), 146

files (general) ownership rules, 228

files (specific) msibuild.bat, 56 msiuninstall.bat, 59 QAPolicyV5.mdb, 194 QAQuotasV4.dat, 194 SC5InstallUtility.dll, 56 SC5SilentInstall.exe, 56 SC5SilentUninstall.exe, 59 SCPerm.exe, 239, 241 SCSQL.bat, 60, 202 SCSRMDB.sql, 202 SCSRMDB2U.sql, 60 SCSRMDBU.sql, 202 SCTrend.mdb, 232 SR_*.txt, 143 StorageCentralQFE.bat, 56

Files Created This Month (predefined report set), 146

Files Not Accessed in Over One Year (predefined report set), 146

Files Not Being Backed Up (predefined report set), 146

Files to Remove (predefined report set), 146 FileScreen Server (service)

configuring SQL Server support, 202 permissions required, 248, 249

filtering audit data, 158

filters, include and exclude, 219 FPOLICY command, 183

G global properties

modifying, 63 Graphic Files (predefined report set), 146 group associations, 220 group space allocation, 222

H hard limit, 176 help desk users, required permissions, 243

I include filters, 219 Insecure Files (predefined report set), 146 installation process

checklist, 35 in a cluster, 194 introduction, 19 preparation worksheet, 29 silent procedure, 56

Internet Files (predefined report set), 146 introduction

Active Directory (AD), 13 audit data, 156 best practices, 269 computer policy, 85

Page 302: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

292 StorageCentral User Guide

file groups, 110 installation process, 19 managed object policy, 72 managed objects, 90 MMC, 10 permissions, 237 preferred groups, 150 preferred machines, 150 report collectors, 114 report definitions, 118 report sets, 135 StorageCentral, 1 using SC with NetApp Filers, 171

ISQL.exe, 202

L Large Duplicate Files (predefined report set),

146 Large Files (predefined report set), 146 Large Folder Object Summary (predefined

report set), 146 Large Users Summary (predefined report set),

146 logon account, Task Scheduler, 267

M macros

message macros, 223 maintenance policy, 84 managed object policies

copying, 78 creating, 73 deleting, 78 in a clustered environment, 194 introduction, 72 modifying properties, 79 propagation, 83 renaming, 79 SCAlloc command, 160 SCBlock command, 163

SCSRM command, 168 space allocation options, 229 transparent, 84

managed objects applying a policy to, 108 creating, 96 deleting, 103 in a clustered environment, 194 introduction, 90 modifying properties, 103 owner information stored in AD fields, 185 trending, 232 troubleshooting, 283

management information block (MIB), 226 management pane, 10 MAPI, 6 Media Files (predefined report set), 146 messages

using macros in, 223 MIB (management information block), 226 Microsoft event log

application event log, 187 Microsoft Management Console, introduction,

10 Microsoft Office Files (predefined report set),

146 MMC, introduction, 10 modifying

computer policy properties, 88 file group properties, 112 global properties, 63 managed object policy properties, 79 managed object properties, 103 preferred group properties, 153 preferred machine properties, 155 report collector schedule properties, 115 report definition properties, 122 report set properties, 137

Most Commonly Used Files (predefined report set), 146

mount point support, 85

Page 303: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

293

msibuild.bat, 56 msiuninstall.bat, 59

N NETLOGON shared directory, 164 Network Appliance Filers

auto detection, 180 computer policies, 181 configuring file blocking, 183 configuring SNMP for space allocation

alarms, 182 converting to Qtrees, 182 file blocking, 173 macro limitations, 223 shares, 35, 96 space allocation, 174 space allocation examples, 176 troubleshooting, 283 UNIX clients, 173 using with StorageCentral, 171

new features StorageCentral 5.0, 7 StorageCentral 5.1, 6 StorageCentral 5.2, 3

New Files (predefined report set), 146 non-administrative users, required

permissions, 239

O ODBC and SQL Server, 202 ODBC data sources

DSN path, 192 SCTrendDB, 232

overdraft limit introduction, 227 used with disk space limit, 218

owning files, rules, 228

P parameters

COMPUTERPOLICIES, 56 REBOOT, 56

Passive limit (space allocation option), 229 permissions

for Active Directory, 248 for DCOM, 249 for help desk users, 243 for non-administrative users, 239 for registry, 248 for running reports, 246 for service account, 248 for WMI, 253 introduction, 237 standard, for StorageCentral, 241 task scheduler logon account, 267

Pinpoint Security Problems (predefined report set), 146

policies applying to a managed object, 108 computer policies, 85 introduction, 72 managed object policies, 72

predefined report sets, 146 preferred groups

creating, 151 deleting, 152 in a clustered environment, 194 introduction, 150 modifying properties, 153 renaming, 152

preferred machines applying a computer policy to, 153 deleting, 155 introduction, 150 modifying properties, 155 starting or stopping service, 154

product benefits, 1 programs

Page 304: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

294 StorageCentral User Guide

DCOMCNFG, 249 SCAlloc, 160 SCBlock, 163 SCReport, 165 SCSRM, 168

propagating MO policy properties, 83 properties

audit window, 158 computer policies, 88 file group, 112 global, 63 managed object, 103 managed object policies, 79 preferred group, 153 preferred machine, 155 report collector schedule, 115 report definition, 122 report set, 137

Q QAPolicyV5.mdb, 194 QAQuotasV4.dat, 194 qasvr.tlb, 164 Qtrees and Network Appliance Filers, 182 QuotaAdvisor Server (service)

configuring SQL Server support, 202 performance affected, 274 permissions required, 248, 249

R REBOOT parameter, 56 refreshing

audit data, 159 registry, permissions needed to access, 248 renaming

file group, 113 managed object policy, 79 preferred group, 152 report definition, 123 report set, 143

Report Break, 126 report collector schedules

modifying properties, 115 report collectors

adding, 114 deleting, 115 introduction, 114

report definitions copying, 123 creating, 119 deleting, 121 introduction, 118 modifying properties, 122 renaming, 123

Report Detail, 124 Report Graphs, 133 Report Query, 124 report sets

copying, 142 creating, 136 deleting, 137 introduction, 135 modifying properties, 137 predefined, 146 renaming, 143 running, 143 SCReport command, 165

Report Sort, 128 Report Total, 129 reports

ActiveReports component (CAB file), 40 AD fields in custom reports, 185 Break, 126 Detail, 124 Graphs, 133 introduction, 117 permissions required to run, 246 Query, 124 Sort, 128 Totals, 129

requirements, 20

Page 305: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

295

Reset high-water mark (space allocation option), 229

roadmap for upgrading, 23 running reports

permissions required, 246 running report sets, 143

S SC5InstallUtility.dll, 56 SC5SilentInstall.exe, 56 SC5SilentUninstall.exe, 59 SCAlloc command, 160 SCAudit.mdb (audit database), 202 SCBlock command, 163 SCDisplayLimit.exe, 164 scheduled jobs

deleting, 115 schema extension, verifying, 54 schema modifications, 13 SCPerm.exe, 239, 241 SCRead group

adding groups to new directory, 260 adding groups to WQuinn container, 261 adding users to groups, 259

SCRead group, 239 SCReport command, 165 SCSQL.bat

configuring SC to use SQL Server, 202 converting SQL Server data for Unicode

support, 60 SCSRM command, 168 SCSRMDB database, 202 SCSRMDB.sql, 202 SCSRMDB2U.sql, 60 SCSRMDBU.sql, 202 SCTrend.mdb (trending database), 202, 232 SCTrendDB data source, 232 SCWrite group

adding groups to new directory, 260 adding groups to WQuinn container, 261

adding users to groups, 259 SCWrite group, 239 Send disk full error code (space allocation

option), 229 server

and computer policies, 85 applying a computer policy to, 88

service permissions, 248 restarting when configuring SQL Server

support, 202 starting or stopping on preferred machines,

154 service account

permissions, 248 shares

creating as part of SC install process, 35 refreshing the MMC, 96

silent installation, 56 uninstallation, 59

SNMP MIB, 226 settings for NetApp Filers, 182

soft limit, 176 space allocation

alarm settings, 211 alarms for NetApp Filers and SNMP, 182 by group, 222 options, 229 predefined reports, 146

space allocation and NetApp Filers examples, 176 introduction, 174

Space Allocation Summary (predefined report set), 146

Space Allocation Trend Summary (predefined report set), 146

Space by Folder Object Summary (predefined report set), 146

Page 306: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

296 StorageCentral User Guide

Space by Group Summary (predefined report set), 146

Space by User Summary (predefined report set), 146

SQL Server configuring SC to use, 202 converting data to support Unicode, 60

SR_*.txt, 143 starting service on preferred machines, 154 stopping service on preferred machines, 154 StorageCentral

best practices, 269 clustered server support, 194 introduction, 1 new features in 5.2, 3 requirements, 20 upgrading, 23 using with Network Appliance Filers, 171

StorageCentralQFE.bat, 56 StorageCentralSRM5 cluster resource, 194 support, 16 system requirements, 20

T Task Scheduler logon account, 267 technical support, 16 threshold, 176 transparent policies, 84 trend database

in a clustered environment, 194 introduction, 232

trending introduction, 232

troubleshooting overview, 283

U Unicode

database conversion, 60

in SQL Server, 202 uninstallation process

regular instructions, 55 silent procedure, 59

UNIX clients and file blocking on NetApp Filers, 173

upgrade roadmap, 23 user space allocation

by group, 222 utilities

SC5SilentInstall.exe, 56 SC5SilentUninstall.exe, 59

V verifying the installation

AD edition, 46 AD schema extension, 54 NetApp editions, 48 Standard edition, 43

viewing audit database contents, 156 preferred machine properties, 155

virus checking, 194

W Weekly Storage (predefined report set), 146 what's new

StorageCentral 5.0, 7 StorageCentral 5.1, 6 StorageCentral 5.2, 3

Windows Management Instrumentation (WMI), permissions required for use, 253

WMI (Windows Management Instrumentation), permissions required for use, 253

WQRptSvr application configuring the DCOM account, 249 running reports, 246

WQuinn container, 261

Page 307: VERITAS StorageCentral™ 5Command SCSRM.....168 Chapter 4. Working with NetApp Filers..... 171 Introduction to Using StorageCentral ...

297


Recommended