HP storeeasy 3000 Administrator's Manual page 4

Hide thumbs Also See for storeeasy 3000:
Table of Contents

Advertisement

Using storage elements.......................................................................................................32
Clustered server elements....................................................................................................32
Network adapter teaming........................................................................................................32
Management tools..................................................................................................................33
HP Systems Insight Manager...............................................................................................33
Management Agents..........................................................................................................33
5 File server management............................................................................34
File services management........................................................................................................34
Storage management utilities...............................................................................................34
Array management utilities.............................................................................................34
Array Configuration Utility..............................................................................................34
Disk Management utility.................................................................................................35
Guidelines for managing disks and volumes..........................................................................35
Scheduling defragmentation................................................................................................36
Disk quotas.......................................................................................................................36
Adding storage.................................................................................................................37
Expanding storage........................................................................................................37
Extending storage using Windows Storage Utilities............................................................37
Extend volumes using Disk Management.....................................................................37
Expanding storage using the Array Configuration Utility.....................................................38
Expand logical drive.................................................................................................38
Volume shadow copies............................................................................................................38
Shadow copy planning......................................................................................................39
Identifying the volume....................................................................................................39
Allocating disk space....................................................................................................39
Identifying the storage area............................................................................................40
Determining creation frequency.......................................................................................40
Shadow copies and drive defragmentation............................................................................40
Mounted drives..................................................................................................................40
Managing shadow copies..................................................................................................41
The shadow copy cache file...........................................................................................41
Enabling and creating shadow copies.............................................................................43
Viewing a list of shadow copies......................................................................................43
Set schedules................................................................................................................43
Viewing shadow copy properties.....................................................................................43
Redirecting shadow copies to an alternate volume.............................................................43
Disabling shadow copies...............................................................................................44
Managing shadow copies from the storage system desktop.....................................................44
Shadow Copies for Shared Folders......................................................................................45
SMB shadow copies......................................................................................................46
NFS shadow copies......................................................................................................47
Recovery of files or folders..............................................................................................47
Recovering a deleted file or folder...................................................................................47
Recovering an overwritten or corrupted file.......................................................................48
Recovering a folder.......................................................................................................48
Backup and shadow copies............................................................................................48
Shadow Copy Transport.....................................................................................................48
Folder and share management.................................................................................................49
Folder management...........................................................................................................49
Share management............................................................................................................55
Share considerations.....................................................................................................55
Defining Access Control Lists...........................................................................................55
4
Contents

Advertisement

Table of Contents
loading

Table of Contents