Dell Data ProtectionConfiguration Guide
10 Configuration Guidevfs.file.handler.event com.credant.guardian.server.vfs.EventFileHandlerEvent file handler.gatekeeper.resource $dell.home$/conf/g
Configuration Guide 11gkresource.xmlYou may change the parameters in <Compatibility Server install dir>\conf\gkresource.xml.We recommend that yo
12 Configuration Guiderun-service.confYo u m a y c h a n g e s o m e o f t h e following parameters in <Compatibility Server install dir>\c
Configuration Guide 132Configure the Core ServerThis chapter details the parameters that may be changed to tune the Core Server to your environment.On
14 Configuration GuideCredant.Server2.WindowsService.exe.ConfigRemove the following section:<!-- Web Services Configuration --><system.servic
Configuration Guide 15Add Compatibility Server’s Folder Location to Core Server Config FileThe Core Server, being a .Net application, can sometimes be
16 Configuration Guide
Configuration Guide 173Configure the Device ServerThis chapter details the parameters that may be changed to tune the Device Server to your environmen
18 Configuration Guiderun-service.confYou may change some of the following parameters in <Device Server install dir>\conf\run-service.conf. Thes
Configuration Guide 194Configure the Security ServerThis chapter details the parameters that may be changed to tune the Security Server to your enviro
____________________© 2014 Dell Inc. Registered trademarks and trademarks used in the DDP|E, DDP|ST, and DDP|CE suite of documents: Dell™ and the Dell
20 Configuration Guide
Configuration Guide 215Configure Encryption FeaturesThis section explains how to independently control encryption features.Prevent Temporary File Dele
22 Configuration GuideSlotted Activation is enabled and configured through the Shield installer or through the Shield workstation.For users requiring
Configuration Guide 23Depending on Shield version, the registry setting will automatically disappear or change from 1 to 0 after the poll is complete.
24 Configuration Guide
Configuration Guide 256Configure Components for Kerberos Authentication/AuthorizationThis section explains how to configure components for use with Ke
26 Configuration Guide4Go to <add key="epw" value="<encrypted value of the password>" /> and change "epw" to
Configuration Guide 27Remote Management Console Instructions1If needed, log on to the Remote Management Console.2Click Domains and click the Detail ic
28 Configuration Guide
Configuration Guide 297Assign Forensic Administrator RoleBy default, Forensic Authorization is enabled on back-end servers and disabled on front-end s
Configuration Guide 3Contents1 Configure the Compatibility Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5server_config.xm
30 Configuration Guide
Configuration Guide 318Cron ExpressionsThis section explains how to use cron expression formats and special characters.Introduction to Cron Expression
32 Configuration Guide• The / character is used to specify increments.0/15 in the seconds field means the seconds 0, 15, 30, and 45. 5/15 in the secon
Configuration Guide 33ExamplesExpression Meaning0 0 12 * * ? Fire at 12pm (noon) every day0 15 10 ? * * Fire at 10:15am every day0 15 10 * * ? Fire at
34 Configuration Guide
Configuration Guide 359Create a Self-Signed Certificate Using Keytool and Generate a Certificate Signing RequestNOTE: This section details the steps t
36 Configuration Guide•Organization: Enter the appropriate value (example, Dell).•City or locality: Enter the appropriate value (example, Austin).•Sta
Configuration Guide 37Figure 9-1. Example .CSR File2Follow your organizational process for acquiring an SSL server certificate from a Certificate Aut
38 Configuration Guide2Select Request a certificate and click Next >.Figure 9-2. Microsoft Certificate Services3Select Advanced Request and click
Configuration Guide 394Select the option to Submit a certificate request using a base64 encode PKCS #10 file and click Next >.Figure 9-4. Advanced
4 Configuration GuideForced Poll . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22Inventory O
40 Configuration Guide6Save the certificate. Select DER encoded and click Download CA certificate.Figure 9-6. Download CA Certificate7Save the certif
Configuration Guide 418Import the converted signing authority certificate. Return to the DOS window. Type:keytool -import -trustcacerts -file <csr-
42 Configuration Guide
0 XXXXXA0 X
Configuration Guide 51Configure the Compatibility ServerThis chapter details the parameters that may be changed to tune the Compatibility Server to yo
6 Configuration Guidermi.recovery.host To use Multi-Server EMS Recovery:<!--- uncomment and change host names to your fully qualified domain names
Configuration Guide 7triage.execute.time 0 0 0/6 * * Triage is the process of reconciling the users and groups that the Server already knows about.Th
8 Configuration Guidesecurity.authorization.method.IAdministrativeService.findLdapGroupsSystemAdmin,SecAdmin Roles required to find LDAP groups.securi
Configuration Guide 9db.schema.version.patch Patch version of database schema.dao.db.driver.dir $dell.home$/lib/mssql-microsoft Default location of th
Comments to this Manuals