Upload
finceptum-oy
View
143
Download
0
Embed Size (px)
Citation preview
© Novell, Inc. All rights reserved.4
Poissa näkyvistä, pois mielestä
Kopiosuojattu?
Sisäinen ääniviesti? Asiakaslistoja?
Webinaari?
© Novell, Inc. All rights reserved.5
The tool set ..
1. File reporter to:
1. Discover
2. Classify
3. Analyze rights assignments
2. Storage Manager1. Groom unwanted data
2. Create policies to automate deployment
3. Populate data files
© Novell, Inc. All rights reserved.7
Folder SummaryFolder Summary
File ExtensionFile Extension
Duplicate FileDuplicate File
Date AgeDate Age
OwnerOwner
Storage CostStorage Cost
ComparisonComparison
Stale DataStale Data
Directory QuotaDirectory Quota
Aggregate ReportsAggregate Reports
Type 1 - Direct AssignmentsType 1 - Direct Assignments
Type 2 - Access to PathType 2 - Access to Path
Type 3 - Access for IdentityType 3 - Access for Identity
Policy Target PathsPolicy Target Paths
Managed PathsManaged Paths
Volume Free SpaceVolume Free Space
Size and File CountSize and File Count
Scan HistoryScan History
TrendingTrending
NSM IntegratedNSM Integrated
Security
Security
ManagementManagementF
ile Syste
mF
ile Syste
m
Reporting Options
© Novell, Inc. All rights reserved.14
The tool set ..
1. File reporter to:
1. Discover
2. Classify
3. Analyze rights assignments
2. Storage Manager1. Groom unwanted data
2. Create policies to automate deployment
3. Populate data files
© Novell, Inc. All rights reserved.16
Novell Storage Manager
Identity-driven Storage Provisioning
CreateUser
Vault Files
Deferred Delete
Delete Immediate
Automate Transfers & Moves
Delete User
Set / Manage File Rights & Ownership
Provision Role Based
Data
Manage Quota
Manage Renames
Home Folder Profile Path
Auxiliary
RD
S P
ath
Collaborative
Identity Management
Identity Management
HR SystemHR System
Disabled User Policy
Manage Profile Attributes
NSM Reports
Analyze
File Grooming
NSM Policies
© Novell, Inc. All rights reserved.17
Novell Storage Manager Components
NSM Agent
Storage Policies
NSM Engine
Delegated Work
NSM Event Monitor
Directory Services
• Collaborative Storage Policies• User Storage Policies• Auxiliary Storage Policies• Block Policies
• Server to Server File Copies• Vaulting of Home Folders• File Template Copies
• Provision Home Folder• Assign Rights• Rename Home Folder• Set / Update Profile Attribute• Clean Up Home Folder• Provision Collaborative
Storage• Delegate Work to Agent
• Create User • Move User • Rename User• Create Group• Add and Remove Member from
Group• Delete User
© Novell, Inc. All rights reserved.19
Novell Storage Manager automatically provisions storage & assigns file system rights for the manager and team members
English Department
Groups Groups
Example - Adding Members to Shared Storage Groups
Employee Share Policy
Wanda LangfordLocation = London
HRHR
London Employees
© Novell, Inc. All rights reserved.20
Identity-Driven Data MigrationsEnforce Policy Path Option
RJones
KJackson
BSmith
RCroom
DWyatt
Seamless Migration of Users Data to new servers with No Downtime
Migrate Data
Old Servers
You Are Moving …
Storage Policy
BSmith
RJones
KJackson
RCroom
DWyatt
CORP
AMS PAR LON
Admin issues the “Enforce Policy Path” option, which will move data.
\\Server2\home
\\Server1\home
© Novell, Inc. All rights reserved.21
Policy Path Redistribution• Add one or more target paths to existing NSM Policy
• Distribute data to new paths based on distribution type
• Allows you to quickly free up disk space on existing volumes by re-distributing data to new target paths.
© Novell, Inc. All rights reserved.24
Demo
Identity-driven Storage Provisioning
CreateUser
Vault Files
Deferred Delete
Delete Immediate
Automate Transfers & Moves
Delete User
Set / Manage File Rights & Ownership
Provision Role Based
Data
Manage Quota
Manage Renames
Home Folder Profile Path
Auxiliary
RD
S P
ath
Collaborative
Identity Management
Identity Management
HR SystemHR System
Disabled User Policy
Manage Profile Attributes
NSM Reports
Analyze
File Grooming
NSM Policies
© Novell, Inc. All rights reserved.27
Our head office has mandated we migrate to
Microsoft Enterprise Server ..
© Novell, Inc. All rights reserved.30
Cross Empire Data Migration - CEDM
• Multiple migration template options
© Novell, Inc. All rights reserved.31
Security Transforms• Allow transfer of owner and security information directly from the
source to the target
• Driven by source/target object mapping definition file
• Follows a published format
• Built using mapping interface or may be built externally by customer/consultant
• Once built, can be used for multiple migration operations through the wizard
TargetDS
TargetDS
Source
DS
Source
DS
Map
CEDM Mapping
InterfaceCEDM Migration
Subsystem
BSanchez.sales.cctecmatches
CN=“Beth Sanchez”.OU=sales.DC=cctec.DC=org
© Novell, Inc. All rights reserved.32
File System Right Conversion - CEDM
• Customize file system rights as needed
© Novell, Inc. All rights reserved.33
Sales
\\WIN2012\Shares
Windows 2012
Security Transforms ExampleFolder to Folder Option
NW65 / OES
HR
Medical
• Quota Options
• Migration Filters
• Staging Options
Migration Options
DeptDeptUsersUsers
eDirTreeeDirTreecctec.orgcctec.org
Preserve file system metadata
NSM for AD
Transform Rights & Owner
Optional Quota Settings
Map
Identity Map
• Owner Options Dept Shares
Sales
HR
Medical
Dept Shares
Sales
HR
Medical
\\NW65\VOL1
Verify rights and owner coverage
Security Transforms
• Users• Groups• Containers• Org Roles• <any class>
• Users• Groups
Previe
w Source
Transform rights
EmployeesEmployeesGroupsGroups
Sales
HR
Medical
BSmith
RJones
KJackson
BSmith
RJones
KJackson
Get Users logged out of servers
© Novell, Inc. All rights reserved.34
Phase 2Phase 2
Two Phase Cross Empire Data Migration
Phase 1Phase 1Monday AM Friday PM Saturday AM Sunday PM
• Migrate vast majority of data• Let users keep working• Keep track of any files skipped because they were
open or otherwise not able to be migrated
• Force users off • Migrate files
skipped in phase 1.• Find and migrate
anything that was changed or created since the start of phase 1
• Verify that all files on the source were migrated to the target
© Novell, Inc. All rights reserved.35
Identity Map
Explosive growth of unstructured data Explosive growth of unstructured data