Please enter search query.
Search <book_title>...
Veritas Access Appliance Initial Configuration Guide
Last Published:
2020-02-21
Product(s):
Appliances (7.4.2)
Platform: Access Appliance OS
- Getting to know the Access Appliance
- Preparing to configure the appliance
- Configuring the appliance for the first time
- Getting started with the Veritas Access GUI
- Storage management
- Network connection management
- Configuring network address settings on the appliance nodes
- About the Veritas Remote Management Console
- Monitoring the appliance
- Resetting the appliance to factory settings
- Appliance security
- About Access appliance user account privileges
- About the Access Appliance intrusion detection system
- About Access appliance operating system security
- Recommended IPMI settings on the Access appliance
- Troubleshooting
Reviewing SDCS events on the Access Appliance
The SDCS logs can help in detecting security breaches and abnormal activity on the appliance.
The SDCS logs include some the following details for each event:
When - The timestamp of the logged event.
Who - Which user(s) was logged on when the event took place.
What - The description of the event and the resource involved.
How - The process name, process ID, operation permissions, and sandbox details.
Severity - The severity of the event.
More Information