The following steps are required in order to integrate DPOD into your monitored device(s) environment.
...
Note |
---|
It is highly recommended you create a dedicated user for DPOD. |
More details available at Secure your Access to Monitored device
...
todo hk - where is this?
2. Prepare Network Time Protocol (NTP)
...
Note: It is imperative to disable SOAP Management URI. For more details, refer to the following document, clause 1.2 - http://www.redbooks.ibm.com/redpapers/pdfs/redp4446.pdf.
4. Backup Your Monitored Device(s)
Before you Add Monitored Devices to DPOD, it is imperative that you take backup of your entire system.
During the installation process DPOD will:
Create Log Targets automatically once you will initiate that step.
- Enable system statistics
- Create network aliases for DPOD
- Perform other optional steps (e.g. Certificate Monitoring) todo: described in
As all these actions potentially alter system configuration, a backup is paramount in case a restore is required later on.
...