37
© Novell, Inc. All rights reserved. 1 Files Matter.. Novell FMS product advocates

Files matter-fms

Embed Size (px)

Citation preview

© Novell, Inc. All rights reserved.1

Files Matter..

Novell FMS product advocates

Novell File Reporter

© Novell, Inc. All rights reserved.3

Tiedostoja on kaikkialla. Ja ne poikivat ...

© Novell, Inc. All rights reserved.4

Poissa näkyvistä, pois mielestä

Kopiosuojattu?

Sisäinen ääniviesti? Asiakaslistoja?

Webinaari?

© Novell, Inc. All rights reserved.5

The tool set ..

1. File reporter to:

1. Discover

2. Classify

3. Analyze rights assignments

2. Storage Manager1. Groom unwanted data

2. Create policies to automate deployment

3. Populate data files

© Novell, Inc. All rights reserved.6

File Reporter arkkitehtuuri

© Novell, Inc. All rights reserved.7

Folder SummaryFolder Summary

File ExtensionFile Extension

Duplicate FileDuplicate File

Date AgeDate Age

OwnerOwner

Storage CostStorage Cost

ComparisonComparison

Stale DataStale Data

Directory QuotaDirectory Quota

Aggregate ReportsAggregate Reports

Type 1 - Direct AssignmentsType 1 - Direct Assignments

Type 2 - Access to PathType 2 - Access to Path

Type 3 - Access for IdentityType 3 - Access for Identity

Policy Target PathsPolicy Target Paths

Managed PathsManaged Paths

Volume Free SpaceVolume Free Space

Size and File CountSize and File Count

Scan HistoryScan History

TrendingTrending

NSM IntegratedNSM Integrated

Security

Security

ManagementManagementF

ile Syste

mF

ile Syste

m

Reporting Options

© Novell, Inc. All rights reserved.8

Reporting Options

© Novell, Inc. All rights reserved.9

Built-in Reports

© Novell, Inc. All rights reserved.10

Custom Query Reports - Report Designer

© Novell, Inc. All rights reserved.11

Custom Query Reports - Report Designer

Demo

© Novell, Inc. All rights reserved.13

We’ve analyzed our file usage. What next?

© Novell, Inc. All rights reserved.14

The tool set ..

1. File reporter to:

1. Discover

2. Classify

3. Analyze rights assignments

2. Storage Manager1. Groom unwanted data

2. Create policies to automate deployment

3. Populate data files

Novell Storage Manager

© Novell, Inc. All rights reserved.16

Novell Storage Manager

Identity-driven Storage Provisioning

CreateUser

Vault Files

Deferred Delete

Delete Immediate

Automate Transfers & Moves

Delete User

Set / Manage File Rights & Ownership

Provision Role Based

Data

Manage Quota

Manage Renames

Home Folder Profile Path

Auxiliary

RD

S P

ath

Collaborative

Identity Management

Identity Management

HR SystemHR System

Disabled User Policy

Manage Profile Attributes

NSM Reports

Analyze

File Grooming

NSM Policies

© Novell, Inc. All rights reserved.17

Novell Storage Manager Components

NSM Agent

Storage Policies

NSM Engine

Delegated Work

NSM Event Monitor

Directory Services

• Collaborative Storage Policies• User Storage Policies• Auxiliary Storage Policies• Block Policies

• Server to Server File Copies• Vaulting of Home Folders• File Template Copies

• Provision Home Folder• Assign Rights• Rename Home Folder• Set / Update Profile Attribute• Clean Up Home Folder• Provision Collaborative

Storage• Delegate Work to Agent

• Create User • Move User • Rename User• Create Group• Add and Remove Member from

Group• Delete User

© Novell, Inc. All rights reserved.18

Novell Storage Manager: automate deployment

© Novell, Inc. All rights reserved.19

Novell Storage Manager automatically provisions storage & assigns file system rights for the manager and team members

English Department

Groups Groups

Example - Adding Members to Shared Storage Groups

Employee Share Policy

Wanda LangfordLocation = London

HRHR

London Employees

© Novell, Inc. All rights reserved.20

Identity-Driven Data MigrationsEnforce Policy Path Option

RJones

KJackson

BSmith

RCroom

DWyatt

Seamless Migration of Users Data to new servers with No Downtime

Migrate Data

Old Servers

You Are Moving …

Storage Policy

BSmith

RJones

KJackson

RCroom

DWyatt

CORP

AMS PAR LON

Admin issues the “Enforce Policy Path” option, which will move data.

\\Server2\home

\\Server1\home

© Novell, Inc. All rights reserved.21

Policy Path Redistribution• Add one or more target paths to existing NSM Policy

• Distribute data to new paths based on distribution type

• Allows you to quickly free up disk space on existing volumes by re-distributing data to new target paths.

© Novell, Inc. All rights reserved.22

Groom

© Novell, Inc. All rights reserved.23

Template

© Novell, Inc. All rights reserved.24

Demo

Identity-driven Storage Provisioning

CreateUser

Vault Files

Deferred Delete

Delete Immediate

Automate Transfers & Moves

Delete User

Set / Manage File Rights & Ownership

Provision Role Based

Data

Manage Quota

Manage Renames

Home Folder Profile Path

Auxiliary

RD

S P

ath

Collaborative

Identity Management

Identity Management

HR SystemHR System

Disabled User Policy

Manage Profile Attributes

NSM Reports

Analyze

File Grooming

NSM Policies

© Novell, Inc. All rights reserved.25

Acme inc. Ready for filr..

© Novell, Inc. All rights reserved.26

Cross Empire Data Migration

© Novell, Inc. All rights reserved.27

Our head office has mandated we migrate to

Microsoft Enterprise Server ..

Cross Empire Migration

© Novell, Inc. All rights reserved.29

Cross Empire Data Migration

© Novell, Inc. All rights reserved.30

Cross Empire Data Migration - CEDM

• Multiple migration template options

© Novell, Inc. All rights reserved.31

Security Transforms• Allow transfer of owner and security information directly from the

source to the target

• Driven by source/target object mapping definition file

• Follows a published format

• Built using mapping interface or may be built externally by customer/consultant

• Once built, can be used for multiple migration operations through the wizard

TargetDS

TargetDS

Source

DS

Source

DS

Map

CEDM Mapping

InterfaceCEDM Migration

Subsystem

BSanchez.sales.cctecmatches

CN=“Beth Sanchez”.OU=sales.DC=cctec.DC=org

© Novell, Inc. All rights reserved.32

File System Right Conversion - CEDM

• Customize file system rights as needed

© Novell, Inc. All rights reserved.33

Sales

\\WIN2012\Shares

Windows 2012

Security Transforms ExampleFolder to Folder Option

NW65 / OES

HR

Medical

• Quota Options

• Migration Filters

• Staging Options

Migration Options

DeptDeptUsersUsers

eDirTreeeDirTreecctec.orgcctec.org

Preserve file system metadata

NSM for AD

Transform Rights & Owner

Optional Quota Settings

Map

Identity Map

• Owner Options Dept Shares

Sales

HR

Medical

Dept Shares

Sales

HR

Medical

\\NW65\VOL1

Verify rights and owner coverage

Security Transforms

• Users• Groups• Containers• Org Roles• <any class>

• Users• Groups

Previe

w Source

Transform rights

EmployeesEmployeesGroupsGroups

Sales

HR

Medical

BSmith

RJones

KJackson

BSmith

RJones

KJackson

Get Users logged out of servers

© Novell, Inc. All rights reserved.34

Phase 2Phase 2

Two Phase Cross Empire Data Migration

Phase 1Phase 1Monday AM Friday PM Saturday AM Sunday PM

• Migrate vast majority of data• Let users keep working• Keep track of any files skipped because they were

open or otherwise not able to be migrated

• Force users off • Migrate files

skipped in phase 1.• Find and migrate

anything that was changed or created since the start of phase 1

• Verify that all files on the source were migrated to the target

© Novell, Inc. All rights reserved.35

Identity Map

Explosive growth of unstructured data Explosive growth of unstructured data

© Novell, Inc. All rights reserved.36

Preview Migration