HP Xw460c - ProLiant - Blade Workstation User Manual page 5

Hp insight control environment user guide
Hide thumbs Also See for Xw460c - ProLiant - Blade Workstation:
Table of Contents

Advertisement

Unassigned disks........................................................................................................................61
Reduced SCSI speed...................................................................................................................62
Host bus balancing.....................................................................................................................62
Performing Online Analysis...............................................................................................................62
Performing Offline Analysis...............................................................................................................63
Data reporting.................................................................................................................................64
Generating a Static Analysis Report..............................................................................................65
Generating a SQL queries list..................................................................................................65
Generating a System Summary Report...........................................................................................65
Generating a SQL queries list..................................................................................................66
Generating a CSV File Generator Report.......................................................................................66
Generating a SQL queries list..................................................................................................66
Generating a Server Availability Report.........................................................................................67
Generating a SQL queries list..................................................................................................67
Licensing Integrity and Storage Systems..............................................................................................67
Licensing virtual machine hosts and virtual machine guests....................................................................67
Monitoring administration.................................................................................................................68
Changing server monitoring status................................................................................................68
Enabling virtual machine host and virtual machine guests logging..........................................................69
Monitoring parameters................................................................................................................70
Number of samples....................................................................................................................71
Performance threshold setting.......................................................................................................71
Modifying the sample rate...........................................................................................................71
Modifying log days.....................................................................................................................71
Modifying Management Agents from the Control Panel..............................................................71
Modifying Management Agents from Internet Explorer...............................................................72
Setting performance thresholds..........................................................................................................72
Threshold values.........................................................................................................................74
Manual Log Purge.................................................................................................................................74
5 Deploying and securing servers..................................................................75
Configuring scripted installs ..............................................................................................................75
Configuring SAN-attached scripted install ..........................................................................................75
Configuring image installs.................................................................................................................75
Configuring HP BladeSystem enclosures .............................................................................................76
Using HP Insight Rapid Deployment software............................................................................................76
Deployment Console basics...............................................................................................................76
Connecting server blades..................................................................................................................77
Deploying the first server blade..........................................................................................................78
Reconfiguring the server blade..........................................................................................................78
Vulnerability scanning and deploying patches and fixes.............................................................................78
HP Vulnerability and Patch Management Pack (VPM) overview...............................................................78
Provided scan definitions..................................................................................................................79
Scanning for vulnerabilities...............................................................................................................79
Viewing, modifying, or canceling a scheduled task.........................................................................80
Viewing vulnerability scan results..................................................................................................80
Vulnerability scan results guidelines.........................................................................................80
Viewing vulnerability scan results by scan name........................................................................80
Viewing vulnerability scan results by scan system.......................................................................80
Customizing vulnerability scan definitions......................................................................................81
Deleting scan results...................................................................................................................81
Deleting scan results by scan name..........................................................................................81
Deleting scan results by system................................................................................................81
Deploying patches and fixes..............................................................................................................81
Deploying patches and fixes based on a vulnerability scan..............................................................81
Deploying patches without a vulnerability scan...............................................................................83
Viewing the patch repository........................................................................................................84
Table of Contents
5

Advertisement

Table of Contents
loading

Table of Contents