Computer Associates BABNWUP900NE6 Clients Agents Guide - Page 3

Contents, Auto Discovery of Client Agents for Windows, UNIX, Linux, and Mac OS X - virus

Page 3 highlights

Contents Chapter 1: Introducing the Client Agents 7 Agent Features ...7 Supported Client Systems ...8 How Client Agents Work...9 Agent Features ...9 Push Technology ...9 Proactive Backup for Windows 10 Windows Computer Name Resolution 10 Security Features ...10 Intelligent Client-to-Server Data Encryption 11 Integrated Virus Scanning and Repair for Windows and NetWare 11 Auto Discovery of Client Agents for Windows, UNIX, Linux, and Mac OS X 11 Multiple Network Interface Cards for Windows 12 Enhanced Network Connectivity for Windows 12 Real-Time Remote Browsing for Windows and NetWare 12 Backup Verification Global Options 12 CRC Verification for Windows and NetWare 13 Access Control Lists for Windows, UNIX, Linux, Mainframe Linux, and Mac OS X 13 Extended Attributes for Linux and FreeBSD 13 File System Specific Flags for Linux and FreeBSD 13 Data Compression for Windows, UNIX, Linux, Mainframe Linux, and Mac OS X 13 Multistreaming for Windows, UNIX, Mainframe Linux, and Linux 14 Multiplexing ...14 Snapshot and Direct I/O Features for Solaris and HP-UX Systems 15 Chapter 2: Installing the Client Agents 17 System Requirements...17 Installation Considerations 17 Client Agent for Windows 17 Client Agent for NetWare 18 Enterprise Option for OpenVMS 19 Install the Client Agents ...19 Common Agent Automatic Installation 19 Common Agent Configuration File for UNIX, Linux, and Mac OS X 20 Common Agent Components 21 Common Agent Port Numbers 21 Host Equivalence User Credentials 23 Contents iii

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73

Contents
Chapter 1: Introducing the Client Agents
7
Agent Features
.....................................................................................................................
7
Supported Client Systems
......................................................................................................
8
How Client Agents Work
.........................................................................................................
9
Agent Features
.....................................................................................................................
9
Push Technology
.............................................................................................................
9
Proactive Backup for Windows
.........................................................................................
10
Windows Computer Name Resolution
................................................................................
10
Security Features
..........................................................................................................
10
Intelligent Client-to-Server Data Encryption
.......................................................................
11
Integrated Virus Scanning and Repair for Windows and NetWare
..........................................
11
Auto Discovery of Client Agents for Windows, UNIX, Linux, and Mac OS X
..............................
11
Multiple Network Interface Cards for Windows
...................................................................
12
Enhanced Network Connectivity for Windows
.....................................................................
12
Real-Time Remote Browsing for Windows and NetWare
.......................................................
12
Backup Verification Global Options
...................................................................................
12
CRC Verification for Windows and NetWare
........................................................................
13
Access Control Lists for Windows, UNIX, Linux, Mainframe Linux, and Mac OS X
.....................
13
Extended Attributes for Linux and FreeBSD
.......................................................................
13
File System Specific Flags for Linux and FreeBSD
...............................................................
13
Data Compression for Windows, UNIX, Linux, Mainframe Linux, and Mac OS X
.......................
13
Multistreaming for Windows, UNIX, Mainframe Linux, and Linux
...........................................
14
Multiplexing
..................................................................................................................
14
Snapshot and Direct I/O Features for Solaris and HP-UX Systems
.........................................
15
Chapter 2: Installing the Client Agents
17
System Requirements
..........................................................................................................
17
Installation Considerations
...................................................................................................
17
Client Agent for Windows
................................................................................................
17
Client Agent for NetWare
................................................................................................
18
Enterprise Option for OpenVMS
........................................................................................
19
Install the Client Agents
.......................................................................................................
19
Common Agent Automatic Installation
....................................................................................
19
Common Agent Configuration File for UNIX, Linux, and Mac OS X
.........................................
20
Common Agent Components
...........................................................................................
21
Common Agent Port Numbers
.........................................................................................
21
Host Equivalence User Credentials
...................................................................................
23
Contents
iii