Unassigned disks
........................................................................................................................
61
Reduced SCSI speed
...................................................................................................................
62
Host bus balancing
.....................................................................................................................
62
Performing Online Analysis
...............................................................................................................
62
Performing Offline Analysis
...............................................................................................................
63
Data reporting
.................................................................................................................................
64
Generating a Static Analysis Report
..............................................................................................
65
Generating a SQL queries list
..................................................................................................
65
Generating a System Summary Report
...........................................................................................
65
Generating a SQL queries list
..................................................................................................
66
Generating a CSV File Generator Report
.......................................................................................
66
Generating a SQL queries list
..................................................................................................
66
Generating a Server Availability Report
.........................................................................................
67
Generating a SQL queries list
..................................................................................................
67
Licensing Integrity and Storage Systems
..............................................................................................
67
Licensing virtual machine hosts and virtual machine guests
....................................................................
67
Monitoring administration
.................................................................................................................
68
Changing server monitoring status
................................................................................................
68
Enabling virtual machine host and virtual machine guests logging
..........................................................
69
Monitoring parameters
................................................................................................................
70
Number of samples
....................................................................................................................
71
Performance threshold setting
.......................................................................................................
71
Modifying the sample rate
...........................................................................................................
71
Modifying log days
.....................................................................................................................
71
Modifying Management Agents from the Control Panel
..............................................................
71
Modifying Management Agents from Internet Explorer
...............................................................
72
Setting performance thresholds
..........................................................................................................
72
Threshold values
.........................................................................................................................
74
Manual Log Purge
.................................................................................................................................
74
5 Deploying and securing servers
..................................................................
75
Configuring BladeSystem servers and image installs using the HP Insight Rapid Deployment software
...............
75
Configuring scripted installs
..............................................................................................................
75
Configuring SAN-attached scripted install
..........................................................................................
75
Configuring image installs
.................................................................................................................
75
Configuring HP BladeSystem enclosures
.............................................................................................
76
Using HP Insight Rapid Deployment software
............................................................................................
76
Deployment Console basics
...............................................................................................................
76
Connecting server blades
..................................................................................................................
77
Deploying the first server blade
..........................................................................................................
78
Reconfiguring the server blade
..........................................................................................................
78
Vulnerability scanning and deploying patches and fixes
.............................................................................
78
HP Vulnerability and Patch Management Pack (VPM) overview
...............................................................
78
Provided scan definitions
..................................................................................................................
79
Scanning for vulnerabilities
...............................................................................................................
79
Viewing, modifying, or canceling a scheduled task
.........................................................................
80
Viewing vulnerability scan results
..................................................................................................
80
Vulnerability scan results guidelines
.........................................................................................
80
Viewing vulnerability scan results by scan name
........................................................................
80
Viewing vulnerability scan results by scan system
.......................................................................
80
Customizing vulnerability scan definitions
......................................................................................
81
Deleting scan results
...................................................................................................................
81
Deleting scan results by scan name
..........................................................................................
81
Deleting scan results by system
................................................................................................
81
Deploying patches and fixes
..............................................................................................................
81
Deploying patches and fixes based on a vulnerability scan
..............................................................
81
Deploying patches without a vulnerability scan
...............................................................................
83
Viewing the patch repository
........................................................................................................
84
Table of Contents
5