IMPORTANT:Because of their distinct architectures, Novell File Reporter Version 1.0.x and Version 2.6 cannot be integrated. If you have Novell File Reporter 1.0.x deployed in your network and want to keep it, be aware that you cannot import Version 1.0.x data to Version 2.6 and vice versa. You must ensure that the Version 1.0.x NFR Engine and data reside on servers where no components of Version 2.6 reside.
If you decide to install either the Novell File Reporter 2.6 NFR Engine or the NFR Agent on a server where a Novell File Reporter Version 1.0.x component is installed, you must fully remove the Version 1.0.x component before installing the Version 2.6 component.
Before you install Novell File Reporter, review the following table to understand how different technologies might affect how you proceed.
Technology |
Notes |
---|---|
Windows and Windows Networking |
The NFR Engine runs on a Windows operating system and uses basic TCP/IP networking inherent to the operating system. |
Microsoft Internet Information Server (IIS) |
Novell File Reporter is accessed and managed via a Web browser. The Web service is an ASP.NET application that runs in conjunction with IIS. The installer and configuration utilities automatically configure IIS and manage most aspects of the installation for you. The NFR Engine and Web service must run on the same system in this release of the software. |
DNS |
In order to access the Novell File Reporter Web service with a browser, the Web site name as registered with IIS must be used. In other words, the raw IP address does not work. You need to create a DNS entry for the name in the environment, or the entry needs to be added to the hosts file on every machine accessing the Novell File Reporter system. |
Database |
Novell File Reporter utilizes a Microsoft SQL Server or PostgreSQL database as the back end data store. The database must be accessible from the server running the NFR Engine. If you choose to use SQL Server, the instance must be configured according to the parameters specified in Section 5.0, Installing an SQL Server Instance that Supports Novell File Reporter. The Novell File Reporter ISO image includes a preconfigured PostgreSQL installation and configuration package for Windows and Linux. If you use either of these packages, most of the details of installing and configuring the PostgreSQL database are taken care of for you. |
Active Directory and Windows Server (Option) |
You can use Novell File Reporter to report on Active Directory and Windows file systems. If so, Novell File Reporter makes use of a proxy object and group in Active Directory that is used by the system as part of day-to-day operations. You should be familiar with the Windows network that you will be reporting against with Novell File Reporter as well as with basic Windows file system and Active Directory terminology and operations. |
eDirectory and NetWare / OES (Option) |
You can use Novell File Reporter to report on eDirectory and Novell file systems. If so, Novell File Reporter makes use of a proxy object and group in eDirectory that is used by the system as part of day-to-day operations. You should be familiar with the Novell network that you will be reporting against with Novell File Reporter as well as with basic Novell file system and eDirectory terminology and operations. |
You need to decide the scope of your installation and decide whether you will use eDirectory or Active Directory as your primary identity system.
The primary identity system is used by Novell File Reporter for licensing, administrative authentication, and authorization. It is also the source for user email address information used by the notification subsystem.
Scope |
Primary Identity System |
---|---|
Single eDirectory tree |
The given eDirectory tree |
Multiple eDirectory trees |
Choose one of the eDirectory trees |
Single Active Directory forest |
The given AD forest |
Single Active Directory forest and single eDirectory tree |
Pick one:
Note: Changing the primary identity system between eDirectory and Active Directory is non-trivial. |
Single Active Directory forest and multiple eDirectory trees |
Pick one:
Note: Changing the primary identity system between eDirectory and Active Directory is non-trivial. |
The NFR Engine server host should have significant CPU, disk, and memory for all but the smallest installations.
The NFR Engine runs on any of the following 64-bit Windows Servers:
Windows Server 2012 R2
Windows Server 2012
Windows Server 2008 R2
NOTE:If possible, the NFR Engine should not be installed on a Domain Controller.
Scope |
NFR Engine Host Server Configuration Requirement |
---|---|
eDirectory only |
Novell Client Installed |
Active Directory only |
Joined to the domain |
Both eDirectory and Active Directory |
Both:
|
IMPORTANT:Database deployment recommendations are detailed in Section 2.3, Database Deployment Recommendations.
You can utilize either a PostgreSQL database or a Microsoft SQL Server database. Here are some considerations for choosing one over the other:
If you have a Microsoft Licensing Agreement that entitles you to Microsoft SQL Server, you might prefer to utilize Microsoft SQL Server.
If you are proficient with Linux and have SUSE Linux Enterprise Server 11 or Novell Open Enterprise Server 11 already deployed, you might prefer to utilize the PostgreSQL database running on either of these two platforms.
If you prefer to manage Windows servers rather than Linux servers, you might want to utilize a Microsoft SQL Server database.
If you have expertise with Microsoft products, you might want to utilize a Microsoft SQL Server database.
I you decide to utilize a PostgreSQL database, rather than a Microsoft SQL Server database, you should consider the following when determining on which platform to run it:
Database Location |
Same Server as NFR Engine |
Comments |
---|---|---|
Windows |
Yes |
Easiest to install and manage. Compact installation footprint. |
Windows |
No |
Better performance than installing together with NFR Engine. |
Linux |
Not applicable |
Best performance. |
Based on the scope you choose, determine which targets must be scanned and what types of information you need to collect by creating a chart such as the following:
Name of Target Volume or Share |
Scan File System Data? (Yes | No) |
Scan Security Data? (Yes | No) |
Scan Trending Data? (Yes | No) |
---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|