Veritas CommandCentral™ Storage Change Manager 5.1.1 User's Guide

Article:DOC2502  |  Created: 2010-08-12  |  Updated: 2010-08-12  |  Article URL http://www.symantec.com/docs/DOC2502
Article Type
Documentation


Description



Table of Contents:
About Veritas CommandCentral Storage Change Manager
What you can do with CommandCentral Storage Change Manager
Where to find more information
CommandCentral Storage Change Manager on the Web
Getting help
About CommandCentral Storage Change Manager documentation
Commenting on product documentation
About the CommandCentral Storage Change Manager Console
Logging in to the CommandCentral Storage Change Manager Console
Logging out of the CommandCentral Storage Change Manager Console
Changing your password
Installing security certificates in supported web browsers
Working with tables
About the hyperlinks that display in tables
About the icons that display in tables
Performing tasks in tables
About searching for information in tables
Searching for information in tables
About filtering the information in tables
Filtering the information in tables
Resetting table filters
Grouping information in tables
Expanding and collapsing all groups in a table
Specifying table columns
Sorting information in tables
Accessing multiple pages of data in tables
Adjusting the width of table columns
Printing table contents
Saving table contents
Table options
Managing tasks
About a task's status
Checking the status of tasks
Running a task immediately
Running a task again
Cancelling a task
Accessing online help
Online help options
About the Dashboard
Viewing the Dashboard
Viewing data from the Dashboard's graphs
About viewing your storage resources
Viewing hosts
Viewing storage arrays
Viewing fabrics
Viewing switches
Viewing zones
Viewing active zones
Viewing defined zones
Viewing zone aliases
Viewing zone sets
Viewing a host's storage
Viewing a host's volumes
Viewing a host's disk groups
Viewing clusters
Viewing applications
Viewing paths
About unidentified adapters
Viewing unidentified adapters
About unenclosed devices
Viewing unenclosed devices
About monitoring changes to your storage resources
About change messages
About aggregate change messages
About effects and impacts
Viewing changes to your storage resources
About custom policies
About storage service policies
About compliance policies
About a custom policy's status
About the Path Outage policy
Creating storage service policies
Policy Conditions panel options
Policy Properties panel options
Creating compliance policies
Create New Policy Welcome panel options
Policy Conditions panel options for switches
Policy Conditions panel options for storage arrays
Policy Conditions panel options for HBAs
Working with your custom policies
Viewing custom policies
Editing custom policies
Enabling custom policies
Disabling custom policies
Deleting custom policies
Applying custom policies to your storage resources
Activating custom policies on your storage resources
Deactivating custom policies from your storage resources
Removing custom policies from your storage resources
Specifying an SMTP server to receive emails of violations to policies
About violations
About a violation's status
About resolving violations
Viewing violations
Clearing violations
About best practice policies
Viewing best practice policies
Editing best practice policies
Enabling best practice policies
Disabling best practice policies
About risks
Viewing risks
About default reports
About the Policy Coverage report
About the Policy Violation Trends report
About the Resolve Time Efficiency report
About the Changes in the Data Center report
Viewing default reports
Drilling down to detail reports in the Policy Coverage report
Changing a default report's time frame
Customize Report options
Exporting report data
Archiving reports
Specifying a directory for archived reports
Creating archived reports
Viewing archived reports
Deleting archived reports
About creating ad hoc custom reports
How the Management Server discovers storage resources through agentless capabilities
Deciding how to correlate unidentified adapters (HBAs) to hosts
Manually correlating unidentified adapters (HBAs) to hosts
Manually correlating unidentified adapters to hosts by specifying host information
Manually correlating unidentified adapters to hosts by matching patterns in zone names or zone aliases
Manually correlating unidentified adapters to hosts by importing a CSV file
Automatically correlating unidentified adapters (HBAs) to hosts
Enabling the automatic correlation process
Adding CSV records for the automatic correlation process
Removing CSV records used for agentless discovery
Adding agentless rules
Running agentless rules
Editing agentless rules
Enabling agentless rules
Disabling agentless rules
Removing agentless rules
Starting the automatic correlation process
Approving the correlations that CommandCentral Storage Change Manager detects
Viewing the list unidentified adapters that were automatically correlated
Disabling the automatic correlation process
Navigating the CommandCentral Storage Change Manager Console
Accessibility features in dialog boxes

Attachments

Veritas CommandCentral™ Storage Change Manager 5.1.1 User's Guide
ccscm_user_511.pdf (1.4 MBytes)

Article URL http://www.symantec.com/docs/DOC2502


Terms of use for this information are found in Legal Notices