Administrator's Guide

Network adapter teaming........................................................................................................31
Management tools..................................................................................................................31
HP Systems Insight Manager...............................................................................................31
Management Agents..........................................................................................................31
5 File server management............................................................................32
File services management........................................................................................................32
Storage management utilities...............................................................................................32
Array management utilities.............................................................................................32
Array Configuration Utility..............................................................................................32
Disk Management utility.................................................................................................33
Guidelines for managing disks and volumes..........................................................................33
Scheduling defragmentation................................................................................................33
Disk quotas.......................................................................................................................34
Adding storage.................................................................................................................34
Expanding storage........................................................................................................35
Extending storage using Windows Storage Utilities............................................................35
Extend volumes using Disk Management.....................................................................35
Expanding storage for EVA arrays using HP P6000 Command View....................................35
Expanding storage using the Array Configuration Utility.....................................................36
Expand logical drive.................................................................................................36
Volume shadow copies............................................................................................................36
Shadow copy planning......................................................................................................37
Identifying the volume....................................................................................................37
Allocating disk space....................................................................................................37
Identifying the storage area............................................................................................38
Determining creation frequency.......................................................................................38
Shadow copies and drive defragmentation............................................................................38
Mounted drives..................................................................................................................38
Managing shadow copies..................................................................................................39
The shadow copy cache file...........................................................................................39
Enabling and creating shadow copies.............................................................................41
Viewing a list of shadow copies......................................................................................41
Set schedules................................................................................................................41
Viewing shadow copy properties.....................................................................................41
Redirecting shadow copies to an alternate volume.............................................................41
Disabling shadow copies...............................................................................................42
Managing shadow copies from the storage system desktop.....................................................42
Shadow Copies for Shared Folders......................................................................................43
SMB shadow copies......................................................................................................44
NFS shadow copies......................................................................................................45
Recovery of files or folders..............................................................................................45
Recovering a deleted file or folder...................................................................................45
Recovering an overwritten or corrupted file.......................................................................46
Recovering a folder.......................................................................................................46
Backup and shadow copies............................................................................................46
Shadow Copy Transport.....................................................................................................46
Folder and share management.................................................................................................47
Folder management...........................................................................................................47
Share management............................................................................................................53
Share considerations.....................................................................................................53
Defining Access Control Lists...........................................................................................53
Integrating local file system security into Windows domain environments..............................53
Comparing administrative (hidden) and standard shares....................................................54
Managing shares..........................................................................................................54
4 Contents