Enlighten DSM/Workgroup
EnlightenDSM/Advanced
Reference Manual, Release 3BList of Figures
| Table of Contents | List of Figures | List of Tables |
- Figure 1-1. License Advisory window
- Figure 1-2. Online Help window
- Figure 2-1. Session Preferences window
- Figure 2-2. Alter Menu window
- Figure 2-3. Network Pool Configuration window
- Figure 2-4. Network Pool Add window
- Figure 2-5. User Authorization Configuration window
- Figure 2-6. Add User Authorization window
- Figure 2-7. EMD Data Expiration Parameters window
- Figure 2-8. About Enlighten window
- Figure 3-1. Current User Accounts List
- Figure 3-2. Create New User Account window
- Figure 3-3. Creating Multiple New Users
- Figure 3-4. Changing User Account Password
- Figure 3-5. User Account Information
- Figure 3-6. Query User Account Information window
- Figure 3-7. Currently Configured User Groups
- Figure 3-8. New User Group window
- Figure 3-9. User Group List window
- Figure 3-10. Logged in users
- Figure 3-11. Active processes list
- Figure 3-12. CPU Summary window
- Figure 3-13. New User Template Configuration window
- Figure 3-14. New User Template Add window
- Figure 4-1. Configured Printers window
- Figure 4-2. Add a New Print Service window
- Figure 4-3. Add a New Print Service window
- Figure 4-4. Add a New Print Service window
- Figure 4-5. Printer Queue Status window
- Figure 4-6. Create Custom Printer Model window
- Figure 4-7. TTY Configuration window
- Figure 4-8. Adding a TTY port
- Figure 5-1. Host Entry Configuration window
- Figure 5-2. Add Host Entry window
- Figure 5-3. Import Host Entries File window
- Figure 5-4. Network Host Configuration window
- Figure 5-5. Host Naming Services Configuration window
- Figure 5-6. Modify Host Naming Services window
- Figure 5-7. Naming Services Overrides window
- Figure 5-8. Create Naming Service Override window
- Figure 5-9. Domain Name Servers window
- Figure 5-10. Add Domain Name Server window
- Figure 5-11. Add Domain Name Server window
- Figure 5-12. Configuring mail exchange information
- Figure 5-13. Add Mail Exchanger Host window
- Figure 5-14. Configuring servers
- Figure 5-15. Add NIS Server window
- Figure 5-16. Add NIS server
- Figure 5-17. Add NIS+ server
- Figure 5-18. Delete NIS and NIS+ Servers
- Figure 5-19. Mounted filesystems on hosts of the current pool
- Figure 5-20. The NFS Partition window
- Figure 5-21. Exportable directories
- Figure 5-22. Export a Filesystem window
- Figure 6-1.
Security Report—Vital files
- Figure 6-2. Security Report—Filesystem devices
- Figure 6-3. Security Report—Boot and shutdown script checks
- Figure 6-4. Security Report—Crontab contents
- Figure 6-5. Security Report—Password file integrity
- Figure 6-6. Security Report—Group file integrity
- Figure 6-7. Security Report—User home directories
- Figure 6-8. Security Report—Attempted break-ins
- Figure 6-9. Password Check Parameters window
- Figure 7-1. Disk Usage By Filesystem window
- Figure 7-2. Select Disk Partitions window
- Figure 7-3. Disk Usage Information by Users window
- Figure 7-4. File Systems Detail window
- Figure 7-5. Statistical File Summary
- Figure 7-6. File Permissions
- Figure 7-7. Select Disk Partitions window
- Figure 7-8. Disk Usage Information By Group window
- Figure 7-9. Currently mounted filesystems
- Figure 7-10. File Search Query window
- Figure 7-11. Select Disk Partitions window
- Figure 7-12. Processes by Filesystem window
- Figure 7-13. Currently mounted filesystems
- Figure 7-14. Save Selected Disk Snapshots window
- Figure 7-15. Currently mounted filesystems
- Figure 7-16. Select Saved Snapshots window
- Figure 7-17. User Files Changed
- Figure 7-18. Changed Files
- Figure 7-19. Search fields
- Figure 7-20. List of Changed Files window
- Figure 8-1. Archive Device Configuration window
- Figure 8-2. Archive Device Add window
- Figure 8-3. Tape Operations window
- Figure 8-4. Backup Partitions window
- Figure 8-5. Restore Files window
- Figure 8-6. Backup Catalog Query window
- Figure 8-7. List of matching files
- Figure 8-8. Scheduled Backup Configuration window
- Figure 8-9. Add Scheduled Backup window
- Figure 8-10. Backup Logs Configuration window
- Figure 9-1. Summary of Processes by TTY window
- Figure 9-2. Swap Space Usage window
- Figure 9-3. Shutting down and rebooting hosts
- Figure 9-4. Status of pending shutdowns or reboots
- Figure 9-5. Crontab Configuration window
- Figure 9-6. Add Crontab Entry window
- Figure 9-7. Finding cron jobs
- Figure 9-8. Cron security status of hosts
- Figure 9-9. Modify Crontab User Access window
- Figure 9-10. Synchronizing a host clock
- Figure 9-11. Setting up a synchronization process
- Figure 9-12. Resetting a host clock
- Figure 9-13. Configuring mail aliases
- Figure 9-14. Creating a new mail alias
- Figure 9-15. Mail alias summary
- Figure 9-16. Finding mail aliases
- Figure 9-17. Remote File Distribution Configuration window
- Figure 9-18. Add Remote File Distribution Job window
- Figure 9-19. Remote File Distribution Logs window
- Figure 10-1. Events Configuration window
- Figure 10-2. Status Map window
- Figure 10-3. Host Overview window
- Figure 10-4. Host Overview-Host Notes window
- Figure 10-5. Query Events Messages window
- Figure 10-6. New Event Messages
- Figure A-1. Evaluate window