SlideShare a Scribd company logo
1 of 37
Download to read offline
© Novell, Inc. All rights reserved.1
Files Matter..
Novell FMS product advocates
Novell File Reporter
© Novell, Inc. All rights reserved.3
Tiedostoja on kaikkialla. Ja ne poikivat ...
© Novell, Inc. All rights reserved.4
Poissa näkyvistä, pois mielestä
Kopiosuojattu
?
Sisäinen ääniviesti? Asiakaslistoja
?
Webinaari?
© Novell, Inc. All rights reserved.5
The tool set ..
1. File reporter to:
1. Discover
2. Classify
3. Analyze rights assignments
2. Storage Manager
1. Groom unwanted data
2. Create policies to automate deployment
3. Populate data files
© Novell, Inc. All rights reserved.6
File Reporter arkkitehtuuri
© Novell, Inc. All rights reserved.7
Folder SummaryFolder Summary
File ExtensionFile Extension
Duplicate FileDuplicate File
Date AgeDate Age
OwnerOwner
Storage CostStorage Cost
ComparisonComparison
Stale DataStale Data
Directory QuotaDirectory Quota
Aggregate ReportsAggregate Reports
Type 1 - Direct AssignmentsType 1 - Direct Assignments
Type 2 - Access to PathType 2 - Access to Path
Type 3 - Access for IdentityType 3 - Access for Identity
Policy Target PathsPolicy Target Paths
Managed PathsManaged Paths
Volume Free SpaceVolume Free Space
Size and File CountSize and File Count
Scan HistoryScan History
TrendingTrending
NSM IntegratedNSM Integrated
SecuritySecurity
ManagementManagement
FileSystemFileSystem
Reporting Options
© Novell, Inc. All rights reserved.8
Reporting Options
© Novell, Inc. All rights reserved.9
Built-in Reports
© Novell, Inc. All rights reserved.10
Custom Query Reports - Report Designer
© Novell, Inc. All rights reserved.11
Custom Query Reports - Report Designer
Demo
© Novell, Inc. All rights reserved.13
We’ve analyzed our file usage. What
next?
© Novell, Inc. All rights reserved.14
The tool set ..
1. File reporter to:
1. Discover
2. Classify
3. Analyze rights assignments
2. Storage Manager
1. Groom unwanted data
2. Create policies to automate deployment
3. Populate data files
Novell Storage Manager
© Novell, Inc. All rights reserved.16
Novell Storage Manager
Identity-driven
Storage Provisioning
Create
User
Vault
Files
Deferred
Delete
Delete
Immediate
Automate
Transfers
& Moves
Delete
User
Set / Manage File
Rights & Ownership
Provision
Role Based
Data
Manage
Quota
Manage
Renames
Hom
e
Folder Profile
Path
Auxiliary
RDSPath
Collaborative
Identity
Management
Identity
Management
HR SystemHR System
Disabled
User Policy
Manage Profile
Attributes
NSM
Reports
Analyze
File
Grooming
NSM
Policies
© Novell, Inc. All rights reserved.17
Novell Storage Manager Components
NSM
Agent
Storage
Policies
NSM
Engine
Delegated
Work
NSM Event
Monitor
Directory Services
• Collaborative Storage Policies
• User Storage Policies
• Auxiliary Storage Policies
• Block Policies
• Server to Server File Copies
• Vaulting of Home Folders
• File Template Copies
• Provision Home Folder
• Assign Rights
• Rename Home Folder
• Set / Update Profile Attribute
• Clean Up Home Folder
• Provision Collaborative
Storage
• Delegate Work to Agent
• Create User
• Move User
• Rename User
• Create Group
• Add and Remove Member from
Group
• Delete User
© Novell, Inc. All rights reserved.18
Novell Storage Manager:
automate deployment
© Novell, Inc. All rights reserved.19
Novell Storage Manager
automatically provisions
storage & assigns file
system rights for the
manager and team
members
English
Department
GroupsGroups
Example - Adding Members to Shared Storage
Groups
Employee
Share Policy
Wanda Langford
Location = London
HRHR
London
Employees
© Novell, Inc. All rights reserved.20
Identity-Driven Data Migrations
Enforce Policy Path Option
RJones
KJackson
BSmith
RCroom
DWyatt
Seamless Migration of Users Data to
new servers with No Downtime
Migrate Data
Old Servers
You Are Moving …
Storage
Policy
BSmith
RJones
KJackson
RCroom
DWyatt
CORP
AMS PAR LO
N
Admin issues the
“Enforce Policy
Path” option, which
will move data.
Server2home
Server1home
© Novell, Inc. All rights reserved.21
Policy Path Redistribution
• Add one or more target paths to existing NSM Policy
• Distribute data to new paths based on distribution type
• Allows you to quickly free up disk space on existing volumes by re-
distributing data to new target paths.
© Novell, Inc. All rights reserved.22
Groom
© Novell, Inc. All rights reserved.23
Template
© Novell, Inc. All rights reserved.24
Demo
Identity-driven
Storage Provisioning
Create
User
Vault
Files
Deferred
Delete
Delete
Immediate
Automate
Transfers
& Moves
Delete
User
Set / Manage File
Rights & Ownership
Provision
Role Based
Data
Manage
Quota
Manage
Renames
Hom
e
Folder Profile
Path
Auxiliary
RDSPath
Collaborative
Identity
Management
Identity
Management
HR SystemHR System
Disabled
User Policy
Manage Profile
Attributes
NSM
Reports
Analyze
File
Grooming
NSM
Policies
© Novell, Inc. All rights reserved.25
Acme inc. Ready for filr..
© Novell, Inc. All rights reserved.26
Cross Empire Data Migration
© Novell, Inc. All rights reserved.27
Our head office has
mandated we migrate to
Microsoft Enterprise Server ..
Cross Empire Migration
© Novell, Inc. All rights reserved.29
Cross Empire Data Migration
© Novell, Inc. All rights reserved.30
Cross Empire Data Migration - CEDM
• Multiple migration template options
© Novell, Inc. All rights reserved.31
Security Transforms
• Allow transfer of owner and security information directly from the
source to the target
• Driven by source/target object mapping definition file
• Follows a published format
• Built using mapping interface or may be built externally by customer/consultant
• Once built, can be used for multiple migration operations through the wizard
Target
DS
Target
DS
Source
DS
Source
DS
Map
CEDM Mapping
Interface
CEDM Migration
Subsystem
BSanchez.sales.cctec
matches
CN=“Beth Sanchez”.OU=sales.DC=cctec.DC=org
© Novell, Inc. All rights reserved.32
File System Right Conversion - CEDM
• Customize file system rights as needed
© Novell, Inc. All rights reserved.33
Sales
WIN2012Shares
Windows
2012
Security Transforms Example
Folder to Folder Option
NW65 /
OES
HR
Medical
• Quota Options
• Migration Filters
• Staging Options
Migration Options
DeptDept
UsersUsers
eDirTreeeDirTree
cctec.orgcctec.org
Preserve file system metadata
NSM for AD
Transform
Rights & Owner
Optional Quota
Settings
Map
Identity Map
• Owner Options Dept Shares
Sales
HR
Medical
Dept Shares
Sales
HR
Medical
NW65VOL1
Verify rights and
owner coverage
Security Transforms
• Users
• Groups
• Containers
• Org Roles
• <any class>
• Users
• Groups
Preview
Source Transform
rights
EmployeesEmployees
GroupsGroups
Sales
HR
Medical
BSmith
RJones
KJackson
BSmith
RJones
KJackson
Get Users
logged out of
servers
© Novell, Inc. All rights reserved.34
Phase 2Phase 2
Two Phase Cross Empire Data
Migration
Phase 1Phase 1
Monday AM Friday PM Saturday AM Sunday PM
• Migrate vast majority of data
• Let users keep working
• Keep track of any files skipped because they were
open or otherwise not able to be migrated
• Force users off
• Migrate files
skipped in phase 1.
• Find and migrate
anything that was
changed or created
since the start of
phase 1
• Verify that all files
on the source were
migrated to the
target
© Novell, Inc. All rights reserved.35
Identity Map
Explosive growth of
unstructured data
Explosive growth of
unstructured data
© Novell, Inc. All rights reserved.36
Preview Migration
Files matter-fms

More Related Content

What's hot

virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
Gaurav Suri
 
ObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT
 
SQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorld
SQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorldSQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorld
SQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorld
Polish SQL Server User Group
 
EVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview DeckEVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview Deck
Erik Bussink
 

What's hot (20)

virtualization and hypervisors
virtualization and hypervisorsvirtualization and hypervisors
virtualization and hypervisors
 
Resume
ResumeResume
Resume
 
XenServer Design Workshop
XenServer Design WorkshopXenServer Design Workshop
XenServer Design Workshop
 
Integrating Novell Teaming within Your Existing Infrastructure
Integrating Novell Teaming within Your Existing InfrastructureIntegrating Novell Teaming within Your Existing Infrastructure
Integrating Novell Teaming within Your Existing Infrastructure
 
Zenoss & Cloud
Zenoss & CloudZenoss & Cloud
Zenoss & Cloud
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
ContainerCon EU 2016 - Software-Defined Storage and Container Schedulers
ContainerCon EU 2016 - Software-Defined Storage and Container SchedulersContainerCon EU 2016 - Software-Defined Storage and Container Schedulers
ContainerCon EU 2016 - Software-Defined Storage and Container Schedulers
 
Xen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentationXen server 6.1 technical sales presentation
Xen server 6.1 technical sales presentation
 
ObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product DatasheetObserveIT Remote Access Session Recorder - Product Datasheet
ObserveIT Remote Access Session Recorder - Product Datasheet
 
Introduction to failover clustering with sql server
Introduction to failover clustering with sql serverIntroduction to failover clustering with sql server
Introduction to failover clustering with sql server
 
Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)Zenoss presentation (nur nabilah hassan)
Zenoss presentation (nur nabilah hassan)
 
SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...
SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...
SCaLE 15x - How Container Schedulers and Software-Defined Storage will Change...
 
VMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphereVMworld 2015: Advanced SQL Server on vSphere
VMworld 2015: Advanced SQL Server on vSphere
 
Pvs slide
Pvs slidePvs slide
Pvs slide
 
Zenoss seminar
Zenoss seminarZenoss seminar
Zenoss seminar
 
CloudStackFinalProject
CloudStackFinalProjectCloudStackFinalProject
CloudStackFinalProject
 
Sysco Oracle Tour 2016 - What's new in FMW 12.2.1?
Sysco Oracle Tour 2016 - What's new in FMW 12.2.1?Sysco Oracle Tour 2016 - What's new in FMW 12.2.1?
Sysco Oracle Tour 2016 - What's new in FMW 12.2.1?
 
VMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep DiveVMworld 2015: Virtual Volumes Technical Deep Dive
VMworld 2015: Virtual Volumes Technical Deep Dive
 
SQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorld
SQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorldSQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorld
SQLDay2013_Denny Cherry - SQLServer2012inaHighlyAvailableWorld
 
EVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview DeckEVO-RAIL 2.0 Overview Deck
EVO-RAIL 2.0 Overview Deck
 

Viewers also liked

информационные процессы
информационные процессыинформационные процессы
информационные процессы
daha15638
 
Manned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyManned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. Army
Richard Lim
 
làm sao trị bệnh giảm ham muốn tình dục hiệu quả nhất
làm sao trị bệnh giảm ham muốn tình dục hiệu quả nhấtlàm sao trị bệnh giảm ham muốn tình dục hiệu quả nhất
làm sao trị bệnh giảm ham muốn tình dục hiệu quả nhất
vella201
 
Sharon Ellsley CV 2015 ss
Sharon Ellsley CV 2015 ssSharon Ellsley CV 2015 ss
Sharon Ellsley CV 2015 ss
Sharon Ellsley
 
Bab iv matematika
Bab iv matematikaBab iv matematika
Bab iv matematika
Firda_123
 
Top 8 testing engineer resume samples
Top 8 testing engineer resume samplesTop 8 testing engineer resume samples
Top 8 testing engineer resume samples
tonychoper2105
 

Viewers also liked (15)

Palestra o padrão mental da música para soluções criativas - 0303
Palestra   o padrão mental da música para soluções criativas - 0303Palestra   o padrão mental da música para soluções criativas - 0303
Palestra o padrão mental da música para soluções criativas - 0303
 
информационные процессы
информационные процессыинформационные процессы
информационные процессы
 
How to Improve Your Reach: Keys to Maximizing Your Website
How to Improve Your Reach: Keys to Maximizing Your WebsiteHow to Improve Your Reach: Keys to Maximizing Your Website
How to Improve Your Reach: Keys to Maximizing Your Website
 
Manned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. ArmyManned–Unmanned Teaming and the U.S. Army
Manned–Unmanned Teaming and the U.S. Army
 
Blog
BlogBlog
Blog
 
Invest in Mythica 4
Invest in Mythica 4Invest in Mythica 4
Invest in Mythica 4
 
làm sao trị bệnh giảm ham muốn tình dục hiệu quả nhất
làm sao trị bệnh giảm ham muốn tình dục hiệu quả nhấtlàm sao trị bệnh giảm ham muốn tình dục hiệu quả nhất
làm sao trị bệnh giảm ham muốn tình dục hiệu quả nhất
 
Polecane miejsce
Polecane miejscePolecane miejsce
Polecane miejsce
 
Ntics
NticsNtics
Ntics
 
Sharon Ellsley CV 2015 ss
Sharon Ellsley CV 2015 ssSharon Ellsley CV 2015 ss
Sharon Ellsley CV 2015 ss
 
Bab iv matematika
Bab iv matematikaBab iv matematika
Bab iv matematika
 
Top 8 testing engineer resume samples
Top 8 testing engineer resume samplesTop 8 testing engineer resume samples
Top 8 testing engineer resume samples
 
Documentos
DocumentosDocumentos
Documentos
 
Bike Safety
Bike SafetyBike Safety
Bike Safety
 
Slides giurisprudenza prodotti vita unit index linked
Slides giurisprudenza prodotti vita unit index linkedSlides giurisprudenza prodotti vita unit index linked
Slides giurisprudenza prodotti vita unit index linked
 

Similar to Files matter-fms

DBus PolicyKit and YaST
DBus PolicyKit and YaSTDBus PolicyKit and YaST
DBus PolicyKit and YaST
lslezak
 
GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell FilrGWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVA
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVA
 

Similar to Files matter-fms (20)

Best Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIXBest Practices for Deploying Enterprise Applications on UNIX
Best Practices for Deploying Enterprise Applications on UNIX
 
Data Lake and the rise of the microservices
Data Lake and the rise of the microservicesData Lake and the rise of the microservices
Data Lake and the rise of the microservices
 
DBus PolicyKit and YaST
DBus PolicyKit and YaSTDBus PolicyKit and YaST
DBus PolicyKit and YaST
 
Applications of Distributed Systems
Applications of Distributed SystemsApplications of Distributed Systems
Applications of Distributed Systems
 
11. dfs
11. dfs11. dfs
11. dfs
 
GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)GWAVACon - Files Matters (English)
GWAVACon - Files Matters (English)
 
GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell FilrGWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
GWAVACon 2013: Novell File Management Suite Enhancing Novell Filr
 
Linux Container Primitives and Runtimes (CON407-R1) - AWS re:Invent 2018
Linux Container Primitives and Runtimes (CON407-R1) - AWS re:Invent 2018Linux Container Primitives and Runtimes (CON407-R1) - AWS re:Invent 2018
Linux Container Primitives and Runtimes (CON407-R1) - AWS re:Invent 2018
 
12. dfs
12. dfs12. dfs
12. dfs
 
Cl107
Cl107Cl107
Cl107
 
The basics of remote data replication
The basics of remote data replicationThe basics of remote data replication
The basics of remote data replication
 
Leveraging Structured Data To Reduce Disk, IO & Network Bandwidth
Leveraging Structured Data To Reduce Disk, IO & Network BandwidthLeveraging Structured Data To Reduce Disk, IO & Network Bandwidth
Leveraging Structured Data To Reduce Disk, IO & Network Bandwidth
 
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
Data Analytics Using Container Persistence Through SMACK - Manny Rodriguez-Pe...
 
11 distributed file_systems
11 distributed file_systems11 distributed file_systems
11 distributed file_systems
 
Presentation atmos architecture overview
Presentation   atmos architecture overviewPresentation   atmos architecture overview
Presentation atmos architecture overview
 
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
Simplified, Robust and Speedy Novell Identity Manager Implementation with Des...
 
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and FutureGWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
GWAVACon 2013: Novell Open Enterprise Server - Roadmap and Future
 
Chapter-5-DFS.ppt
Chapter-5-DFS.pptChapter-5-DFS.ppt
Chapter-5-DFS.ppt
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 

More from Finceptum Oy

Responda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avulla
Responda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avullaResponda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avulla
Responda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avulla
Finceptum Oy
 

More from Finceptum Oy (20)

SAP on Linux the way to S/4HANA
SAP on Linux the way to S/4HANASAP on Linux the way to S/4HANA
SAP on Linux the way to S/4HANA
 
SAP Cloud Strategy
SAP Cloud StrategySAP Cloud Strategy
SAP Cloud Strategy
 
Yhä lisääntyvän tietoturvainformaation tehokas hallinta ja hyödyntäminen
Yhä lisääntyvän tietoturvainformaation tehokas hallinta ja hyödyntäminenYhä lisääntyvän tietoturvainformaation tehokas hallinta ja hyödyntäminen
Yhä lisääntyvän tietoturvainformaation tehokas hallinta ja hyödyntäminen
 
Tietoturvainformaation rikastaminen laadukkaamman tilannekuvan aikaansaamiseksi
Tietoturvainformaation rikastaminen laadukkaamman tilannekuvan aikaansaamiseksiTietoturvainformaation rikastaminen laadukkaamman tilannekuvan aikaansaamiseksi
Tietoturvainformaation rikastaminen laadukkaamman tilannekuvan aikaansaamiseksi
 
Käyttäjän vahva tunnistaminen
Käyttäjän vahva tunnistaminenKäyttäjän vahva tunnistaminen
Käyttäjän vahva tunnistaminen
 
Helppo pääsy ajasta, paikasta ja laitteesta riippumatta
Helppo pääsy ajasta, paikasta ja laitteesta riippumattaHelppo pääsy ajasta, paikasta ja laitteesta riippumatta
Helppo pääsy ajasta, paikasta ja laitteesta riippumatta
 
Käyttövaltuuksien ja -oikeuksien ajantasaisuuden ja oikeellisuuden varmistaminen
Käyttövaltuuksien ja -oikeuksien ajantasaisuuden ja oikeellisuuden varmistaminenKäyttövaltuuksien ja -oikeuksien ajantasaisuuden ja oikeellisuuden varmistaminen
Käyttövaltuuksien ja -oikeuksien ajantasaisuuden ja oikeellisuuden varmistaminen
 
Micro Focus identiteettien hallinnointi ja hallinta
Micro Focus identiteettien hallinnointi ja hallintaMicro Focus identiteettien hallinnointi ja hallinta
Micro Focus identiteettien hallinnointi ja hallinta
 
Fujitsu Finland tarjoaa SLES-alustalta asiakkailleen laadukkaita ja kustannus...
Fujitsu Finland tarjoaa SLES-alustalta asiakkailleen laadukkaita ja kustannus...Fujitsu Finland tarjoaa SLES-alustalta asiakkailleen laadukkaita ja kustannus...
Fujitsu Finland tarjoaa SLES-alustalta asiakkailleen laadukkaita ja kustannus...
 
Responda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avulla
Responda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avullaResponda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avulla
Responda 113 Linux-ympäristö hallinnoidaan SUSE Managerin avulla
 
NetIQ Advanced Authentication
NetIQ Advanced AuthenticationNetIQ Advanced Authentication
NetIQ Advanced Authentication
 
Vahvojen tunnusten hallinta
Vahvojen tunnusten hallintaVahvojen tunnusten hallinta
Vahvojen tunnusten hallinta
 
Lokienhallinnan ja SIEMin käyttötapauksia NetIQ Sentinel ratkaisulla
Lokienhallinnan ja SIEMin käyttötapauksia NetIQ Sentinel ratkaisullaLokienhallinnan ja SIEMin käyttötapauksia NetIQ Sentinel ratkaisulla
Lokienhallinnan ja SIEMin käyttötapauksia NetIQ Sentinel ratkaisulla
 
Maanmittauslaitos on lokienhallinnan edelläkävijä
Maanmittauslaitos on lokienhallinnan edelläkävijäMaanmittauslaitos on lokienhallinnan edelläkävijä
Maanmittauslaitos on lokienhallinnan edelläkävijä
 
Aditro hallitsee keskitettyä lokien hallintaa Sentinel-ratkaisulla
Aditro hallitsee keskitettyä lokien hallintaa Sentinel-ratkaisullaAditro hallitsee keskitettyä lokien hallintaa Sentinel-ratkaisulla
Aditro hallitsee keskitettyä lokien hallintaa Sentinel-ratkaisulla
 
Ostajan opas ohjelmistopohjaiseen tallennukseen
Ostajan opas ohjelmistopohjaiseen tallennukseenOstajan opas ohjelmistopohjaiseen tallennukseen
Ostajan opas ohjelmistopohjaiseen tallennukseen
 
5 vinkkiä parempaan linux-tietoturvaan
5 vinkkiä parempaan linux-tietoturvaan5 vinkkiä parempaan linux-tietoturvaan
5 vinkkiä parempaan linux-tietoturvaan
 
Files matter-zav11
Files matter-zav11Files matter-zav11
Files matter-zav11
 
SUSE Manager 2.1
SUSE Manager 2.1SUSE Manager 2.1
SUSE Manager 2.1
 
SUSE Storage 2015
SUSE Storage 2015SUSE Storage 2015
SUSE Storage 2015
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024What's New in Teams Calling, Meetings and Devices April 2024
What's New in Teams Calling, Meetings and Devices April 2024
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Connecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAKConnecting the Dots in Product Design at KAYAK
Connecting the Dots in Product Design at KAYAK
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
Measures in SQL (a talk at SF Distributed Systems meetup, 2024-05-22)
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Speed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in MinutesSpeed Wins: From Kafka to APIs in Minutes
Speed Wins: From Kafka to APIs in Minutes
 
ECS 2024 Teams Premium - Pretty Secure
ECS 2024   Teams Premium - Pretty SecureECS 2024   Teams Premium - Pretty Secure
ECS 2024 Teams Premium - Pretty Secure
 
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptxWSO2CONMay2024OpenSourceConferenceDebrief.pptx
WSO2CONMay2024OpenSourceConferenceDebrief.pptx
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 

Files matter-fms

  • 1. © Novell, Inc. All rights reserved.1 Files Matter.. Novell FMS product advocates
  • 3. © Novell, Inc. All rights reserved.3 Tiedostoja on kaikkialla. Ja ne poikivat ...
  • 4. © Novell, Inc. All rights reserved.4 Poissa näkyvistä, pois mielestä Kopiosuojattu ? Sisäinen ääniviesti? Asiakaslistoja ? Webinaari?
  • 5. © Novell, Inc. All rights reserved.5 The tool set .. 1. File reporter to: 1. Discover 2. Classify 3. Analyze rights assignments 2. Storage Manager 1. Groom unwanted data 2. Create policies to automate deployment 3. Populate data files
  • 6. © Novell, Inc. All rights reserved.6 File Reporter arkkitehtuuri
  • 7. © Novell, Inc. All rights reserved.7 Folder SummaryFolder Summary File ExtensionFile Extension Duplicate FileDuplicate File Date AgeDate Age OwnerOwner Storage CostStorage Cost ComparisonComparison Stale DataStale Data Directory QuotaDirectory Quota Aggregate ReportsAggregate Reports Type 1 - Direct AssignmentsType 1 - Direct Assignments Type 2 - Access to PathType 2 - Access to Path Type 3 - Access for IdentityType 3 - Access for Identity Policy Target PathsPolicy Target Paths Managed PathsManaged Paths Volume Free SpaceVolume Free Space Size and File CountSize and File Count Scan HistoryScan History TrendingTrending NSM IntegratedNSM Integrated SecuritySecurity ManagementManagement FileSystemFileSystem Reporting Options
  • 8. © Novell, Inc. All rights reserved.8 Reporting Options
  • 9. © Novell, Inc. All rights reserved.9 Built-in Reports
  • 10. © Novell, Inc. All rights reserved.10 Custom Query Reports - Report Designer
  • 11. © Novell, Inc. All rights reserved.11 Custom Query Reports - Report Designer
  • 12. Demo
  • 13. © Novell, Inc. All rights reserved.13 We’ve analyzed our file usage. What next?
  • 14. © Novell, Inc. All rights reserved.14 The tool set .. 1. File reporter to: 1. Discover 2. Classify 3. Analyze rights assignments 2. Storage Manager 1. Groom unwanted data 2. Create policies to automate deployment 3. Populate data files
  • 16. © Novell, Inc. All rights reserved.16 Novell Storage Manager Identity-driven Storage Provisioning Create User Vault Files Deferred Delete Delete Immediate Automate Transfers & Moves Delete User Set / Manage File Rights & Ownership Provision Role Based Data Manage Quota Manage Renames Hom e Folder Profile Path Auxiliary RDSPath Collaborative Identity Management Identity Management HR SystemHR System Disabled User Policy Manage Profile Attributes NSM Reports Analyze File Grooming NSM Policies
  • 17. © Novell, Inc. All rights reserved.17 Novell Storage Manager Components NSM Agent Storage Policies NSM Engine Delegated Work NSM Event Monitor Directory Services • Collaborative Storage Policies • User Storage Policies • Auxiliary Storage Policies • Block Policies • Server to Server File Copies • Vaulting of Home Folders • File Template Copies • Provision Home Folder • Assign Rights • Rename Home Folder • Set / Update Profile Attribute • Clean Up Home Folder • Provision Collaborative Storage • Delegate Work to Agent • Create User • Move User • Rename User • Create Group • Add and Remove Member from Group • Delete User
  • 18. © Novell, Inc. All rights reserved.18 Novell Storage Manager: automate deployment
  • 19. © Novell, Inc. All rights reserved.19 Novell Storage Manager automatically provisions storage & assigns file system rights for the manager and team members English Department GroupsGroups Example - Adding Members to Shared Storage Groups Employee Share Policy Wanda Langford Location = London HRHR London Employees
  • 20. © Novell, Inc. All rights reserved.20 Identity-Driven Data Migrations Enforce Policy Path Option RJones KJackson BSmith RCroom DWyatt Seamless Migration of Users Data to new servers with No Downtime Migrate Data Old Servers You Are Moving … Storage Policy BSmith RJones KJackson RCroom DWyatt CORP AMS PAR LO N Admin issues the “Enforce Policy Path” option, which will move data. Server2home Server1home
  • 21. © Novell, Inc. All rights reserved.21 Policy Path Redistribution • Add one or more target paths to existing NSM Policy • Distribute data to new paths based on distribution type • Allows you to quickly free up disk space on existing volumes by re- distributing data to new target paths.
  • 22. © Novell, Inc. All rights reserved.22 Groom
  • 23. © Novell, Inc. All rights reserved.23 Template
  • 24. © Novell, Inc. All rights reserved.24 Demo Identity-driven Storage Provisioning Create User Vault Files Deferred Delete Delete Immediate Automate Transfers & Moves Delete User Set / Manage File Rights & Ownership Provision Role Based Data Manage Quota Manage Renames Hom e Folder Profile Path Auxiliary RDSPath Collaborative Identity Management Identity Management HR SystemHR System Disabled User Policy Manage Profile Attributes NSM Reports Analyze File Grooming NSM Policies
  • 25. © Novell, Inc. All rights reserved.25 Acme inc. Ready for filr..
  • 26. © Novell, Inc. All rights reserved.26 Cross Empire Data Migration
  • 27. © Novell, Inc. All rights reserved.27 Our head office has mandated we migrate to Microsoft Enterprise Server ..
  • 29. © Novell, Inc. All rights reserved.29 Cross Empire Data Migration
  • 30. © Novell, Inc. All rights reserved.30 Cross Empire Data Migration - CEDM • Multiple migration template options
  • 31. © Novell, Inc. All rights reserved.31 Security Transforms • Allow transfer of owner and security information directly from the source to the target • Driven by source/target object mapping definition file • Follows a published format • Built using mapping interface or may be built externally by customer/consultant • Once built, can be used for multiple migration operations through the wizard Target DS Target DS Source DS Source DS Map CEDM Mapping Interface CEDM Migration Subsystem BSanchez.sales.cctec matches CN=“Beth Sanchez”.OU=sales.DC=cctec.DC=org
  • 32. © Novell, Inc. All rights reserved.32 File System Right Conversion - CEDM • Customize file system rights as needed
  • 33. © Novell, Inc. All rights reserved.33 Sales WIN2012Shares Windows 2012 Security Transforms Example Folder to Folder Option NW65 / OES HR Medical • Quota Options • Migration Filters • Staging Options Migration Options DeptDept UsersUsers eDirTreeeDirTree cctec.orgcctec.org Preserve file system metadata NSM for AD Transform Rights & Owner Optional Quota Settings Map Identity Map • Owner Options Dept Shares Sales HR Medical Dept Shares Sales HR Medical NW65VOL1 Verify rights and owner coverage Security Transforms • Users • Groups • Containers • Org Roles • <any class> • Users • Groups Preview Source Transform rights EmployeesEmployees GroupsGroups Sales HR Medical BSmith RJones KJackson BSmith RJones KJackson Get Users logged out of servers
  • 34. © Novell, Inc. All rights reserved.34 Phase 2Phase 2 Two Phase Cross Empire Data Migration Phase 1Phase 1 Monday AM Friday PM Saturday AM Sunday PM • Migrate vast majority of data • Let users keep working • Keep track of any files skipped because they were open or otherwise not able to be migrated • Force users off • Migrate files skipped in phase 1. • Find and migrate anything that was changed or created since the start of phase 1 • Verify that all files on the source were migrated to the target
  • 35. © Novell, Inc. All rights reserved.35 Identity Map Explosive growth of unstructured data Explosive growth of unstructured data
  • 36. © Novell, Inc. All rights reserved.36 Preview Migration