NetBackup Future Platform and Feature Plans NetBackup Product Family Platform/Feature SupportĮnd of Life (EOL) announcement and platforms no longer supported by NetBackup NetBackup OpsCenter Web Browser Requirements NetBackup OpsCenter Operating System Requirements NetBackup OpsCenter Backup Product Support
#Windows server 2008 security checklist windows
Snapshot Client - VSS Snapshot Providers Support for Microsoft Windows Considerations Snapshot Client - Software-based Snapshot Methods Snapshot Client - Array-based Snapshot Methods SAN Media Server/SAN Client/FT Media Server The End of Life (EOL) for NetBackup running on RedHat, Oracle and CentOS 6.7 and older after NetBackup 8.1.1īare Metal Restore File System/Volume Manager Supportĭatabase and Application Agent Compatibilityĭeduplication Supported Operating Systems Customers can also request a cost quote from Veritas Consulting services to perform the migration or if the customer has Business Critical Services (BCS) they can contract the BCS team for migration assistance.īoth platforms will remain supported on older versions of NetBackup and will follow the published Product End of Life Policy guidelines ( ). To enable this NetBackup Engineering plans to release either a process or tool to assist customers in migrating from these platforms to a supported platform.
#Windows server 2008 security checklist upgrade
These operating systems will no longer be supported commencing with the planned NetBackup release in mid CY2018.Ĭustomers will need to migrate to a supported version of either a Linux or Solaris prior to attempting to upgrade to the planned End of Life release. This EOL does not apply to client support for either platform. Verify that the connection security rules are protecting network traffic.Disclaimer: The End of Life (EOL) for NetBackup Master and Media Servers running on HPUX and AIX.
Be sure to add at least one for each operating system supported by a different GPO in the group.Īdd Test Computers to the Membership Group for a Zone
Link the GPO to the domain level of the Active Directory organizational unit hierarchy.Īdd your test computers to the membership group for the encryption zone. Modify GPO Filters to Apply to a Different Zone or Version of WindowsĪdd the encryption requirements for the zone.Ĭonfigure the Rules to Require Encryption on Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2 Modify the group memberships and WMI filters so that they are correct for the encryption zone and the version of Windows for which this GPO is intended. Make a copy of the domain isolation GPOs to serve as a starting point for the GPOs for the encryption zone. After you create the copies, modify the main rule to require encryption in addition to the authentication required by the rest of the isolated domain. You can then copy those GPOs for use with the encryption zone. This checklist assumes that you have already created the GPO for the isolated domain as described in Checklist: Implementing a Domain Isolation Policy Design. Rules for the encryption zone are typically the same as those for the isolated domain, with the exception that the main rule requires encryption in addition to authentication.Ĭhecklist: Configuring encryption zone rules for Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, or Windows Server 2008 R2Ī GPO for Windows 8, Windows 7, Windows Vista, Windows Server 2012, Windows Server 2008, and Windows Server 2008 R2 can simply be copied and then customized. This checklist includes tasks for configuring connection security rules and IPsec settings in your GPOs to implement the encryption zone in an isolated domain.