1 / 13

Veritas Configuration Manager

Learn why configuration changes cause downtime and steps customers should take to avoid outages with Veritas Configuration Manager. Discover core functionality, track changes, compare servers, map dependencies, and more.

bandak
Download Presentation

Veritas Configuration Manager

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Veritas Configuration Manager José María Fernández Jose_fernandez@symantec.com

  2. Why do configuration changes cause downtime? App1 User App2 User App3 User IT Staff

  3. What Steps Should Customers Take? 1. Stop unauthorized changes 2. Correlate incidents with change 3. Proactively avoid outages with proper impact analysis 4. Integrate these controls into processes such as change and incident mgmt

  4. MAP DEPENDENCIES COMPARE SERVERS TRACK CHANGES AUTO DISCOVER Veritas Configuration Manager: Core Functionality

  5. WHAT IS DISCOVERED? WHAT IS TRACKED? WHAT CONSUMABLES ARE CREATED? Custom Applications Who? Enterprise Applications Database Software When? Middleware Software Infrastructure Software Before/After? OS & Patch Levels Inventory Reports Compliance Impacted? Change Audits File System Network I/O Memory CPU How Does Veritas Configuration Manager work?

  6. VCM System Architecture Core Platform Value Extraction Managed Servers VCM Server Web UI Reporting Comparison Integration Lightweight VCM Agents Configuration Repository

  7. Enterprise Architecture

  8. Hardware Configuration

  9. Software Configuration

  10. Service View, Dependency Map and Change Notification

  11. Change Audit: Who, When, What

  12. Change Details: Before / After

  13. & QUESTIONS ANSWERS

More Related