Veritas Disaster Recovery Advisor 5.4 Deployment Requirements

Description

About this document
Intended audience

Chapter 1 DRA deployment architecture
Deployment environment
DRA server
Oracle environment and licensing
Web client requirements
Credentials and collection methods used

Appendix A Methods for secure privilege provisioning
sudo on UNIX hosts
UNIX Privilege Manager
Suggested Oracle grant provisioning
Suggested MS SQL Server grant provisioning
Commands used to collect data from NetApp
Queries used to scan EMC ECC
Configuring DRA for ECC scanning over JDBC SSL (Oracle)

Terms of use for this information are found in Legal Notices.

Search

Survey

Did this article answer your question or resolve your issue?

No
Yes

Did this article save you the trouble of contacting technical support?

No
Yes

How can we make this article more helpful?

Email Address (Optional)