Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

The following steps are required in order to integrate DPOD into your monitored device(s) environment.

...

Note

It is highly recommended you create a dedicated user for DPOD.

More details available at Secure your Access to Monitored device

...

todo hk - where is this?

2. Prepare Network Time Protocol (NTP)

...

Note: It is imperative to disable SOAP Management URI. For more details, refer to the following document, clause 1.2 - http://www.redbooks.ibm.com/redpapers/pdfs/redp4446.pdf.

4. Backup Your Monitored Device(s)

Before you Add Monitored Devices to DPOD, it is imperative that you take backup of your entire system.
During the installation process DPOD will:

  • Create Log Targets automatically once you will initiate that step.

  • Enable system statistics
  • Create network aliases for DPOD
  • Perform other optional steps (e.g. Certificate Monitoring) todo: described in

As all these actions potentially alter system configuration, a backup is paramount in case a restore is required later on.

...