Request doc changesEdit this pageLearn how to contribute
ON THIS PAGE
    • Product and Solutions
    • Support and Training
    • Cloud Central
    • Community
    • Blog
    • Customer Stories
    • Contact
    Menu bars
    netapp-mark netapp-logo
    English globe
    • English
    • 日本語
    • 한국어
    • 简体中文
    • 繁體中文
    • Deutsch
    • Español
    • Français
    Available PDFs
    • PDF of this doc site
      • Introduction and concepts
        • ONTAP concepts
          • Network architecture
          • Disks and aggregates
          • Storage virtualization
          • Path failover
          • Replication
          • Storage efficiency
          • Security
        • ONTAP and the cloud
          • Data protection and the cloud
          • Move entire workloads to the cloud
            • Storage protocols
          • Performance and efficiency in the cloud
          • Manage ONTAP in the cloud
          • Compliance and the cloud
      • Set up, upgrade and revert ONTAP
        • Set up ONTAP
          • Set up a cluster with the CLI
          • Configure All SAN Array software
        • Upgrade ONTAP
          • Upgrade without Upgrade Advisor
            • What should I verify before I upgrade without Upgrade Advisor?
          • What should I verify before I upgrade with or without Upgrade Advisor?
            • Special considerations
              • MetroCluster configurations
              • SnapMirror
          • Which upgrade method should I use?
            • Manual nondisruptive using the CLI
              • MetroCluster configurations
          • What should I do after my upgrade?
            • Verify special configurations
        • Revert ONTAP
          • What should I read before I revert?
          • What else should I check before I revert?
            • SnapMirror
          • What should I do after reverting my cluster?
      • Cluster administration
        • Cluster management with System Manager
          • Manage nodes
        • Cluster management with the CLI
          • Cluster and SVM administrators
          • ONTAP management interface basics
            • Access the cluster by using the CLI (cluster administrators only)
            • Use the ONTAP command-line interface
              • About the different shells for CLI commands (cluster administrators only)
            • Manage CLI sessions (cluster administrators only)
              • Manage records of CLI sessions
          • Use the ONTAP command-line interface
            • About the different shells for CLI commands (cluster administrators only)
          • Cluster management basics (cluster administrators only)
          • Manage nodes
            • Rules governing node root volumes and root aggregates
            • Start or stop a node
            • Manage a node remotely using the SP/BMC
              • Configure the SP/BMC network
              • Access the SP/BMC
          • Manage audit logging for management activities
          • Manage the banner and MOTD
          • Manage licenses (cluster administrators only)
          • Manage jobs and schedules
          • Back up and restore cluster configurations (cluster administrators only)
            • Manage configuration backups
            • Recovering a node configuration
            • Recover a cluster configuration
          • Monitor a storage system
            • Manage AutoSupport with the CLI
              • Troubleshoot AutoSupport
            • Monitor the health of your system
          • Manage access to web services
            • Configure SAML authentication for web services
            • Manage web services
          • Verify the identity of remote servers using certificates
            • Mutually authenticating the cluster and a KMIP server
        • Disk and tier (aggregate) management
          • Manage local tiers (aggregates)
            • Prepare to add a local tier (aggregate)
            • Add (create) a local tier (aggregate)
            • Manage the use of local tiers (aggregates)
            • Add capacity (disks) to a local tier (aggregate)
          • Manage disks
            • Disk and partition ownership
            • Disk sanitization
          • Manage RAID configurations
          • Manage Flash Pool local tiers (aggregates)
            • Manage Flash Pool caching policies
            • Create a Flash Pool local tier (aggregate) using SSD storage pools
        • FabricPool tier management
          • Configure FabricPool
            • Prepare for FabricPool configuration
              • Set up an object store as the cloud tier for FabricPool
          • Manage FabricPool
            • Add or move volumes to FabricPool as needed
            • Object tagging using user-created custom tags
            • Promote data to the performance tier
          • Manage FabricPool mirrors
        • SVM data mobility
        • HA pair management
        • Rest API management with System Manager
      • Volume administration
        • Volume and LUN management with System Manager
        • Logical storage management with the CLI
          • Create and manage volumes
            • SAN volumes
            • Delete directories
          • Move and copy volumes
          • Use FlexClone volumes to create efficient copies of your FlexVol volumes
          • Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
            • How a FlexVol volume can reclaim free space with autodelete setting
          • Use qtrees to partition your FlexVol volumes
            • Convert a directory to a qtree
          • Logical space reporting and enforcement for volumes
          • Use quotas to restrict or track resource usage
            • Overview of the quota process
              • Special kinds of quotas
              • How quotas work with users and groups
              • How tree quotas work
              • How qtree changes affect quotas
              • How quotas are activated
              • How you can view quota information
              • Difference in space usage displayed by a quota report and a UNIX client
          • Use deduplication, data compression, and data compaction to increase storage efficiency
            • Create a volume efficiency policy to run efficiency operations
            • Manage volume efficiency operations manually
            • Manage volume efficiency operations using schedules
            • Monitor volume efficiency operations
          • Rehost a volume from one SVM to another SVM
          • Recommended volume and file or LUN configuration combinations
          • Cautions and considerations for changing file or directory capacity
          • Features supported with FlexClone files and FlexClone LUNs
        • FlexGroup volumes management with the CLI
          • FlexGroup volume setup
          • Manage FlexGroup volumes
          • Data protection for FlexGroup volumes
          • Manage data protection operations for FlexGroup volumes
            • Disaster recovery for FlexGroup volumes
            • Expand FlexGroup volumes in a SnapMirror relationship
          • Convert FlexVol volumes to FlexGroup volumes
        • FlexCache volumes management with the CLI
          • FlexCache volume creation
            • Process to create a FlexCache volume
          • Manage a FlexCache relationship
      • Network management
        • Manage your network with System Manager
        • Set up NAS path failover with the CLI
          • ONTAP 9.8 and later
            • Workflow NAS path failover
          • ONTAP 9.7 and earlier
            • Workflow NAS path failover
        • Manage your network with the CLI
          • Upgrade considerations
          • Networking components of a cluster
          • Configure network ports (cluster administrators only)
          • Configure IPspaces (cluster administrators only)
          • Configure broadcast domains (cluster administrators only)
            • ONTAP 9.8 and later
            • ONTAP 9.7 and earlier
          • Configure failover groups and policies for LIFs
          • Configure subnets (cluster administrators only)
          • Configure LIFs (cluster administrators only)
          • Configure host-name resolution
          • Balance network loads to optimize user traffic (cluster administrators only)
          • Secure your network
          • Configure QoS marking (cluster administrators only)
          • Manage SNMP on the cluster (cluster administrators only)
          • Manage routing in an SVM
          • ONTAP port usage on a storage system
          • View network information
      • NAS storage management
        • Manage NAS protocols with System Manager
          • Enable NAS storage
        • Configure NFS with the CLI
          • Preparation
          • Configure NFS access to an SVM
            • Configure name services
              • Configure local UNIX users and groups
              • Work with netgroups
              • Use LDAP
            • Use Kerberos with NFS for strong security
          • Add storage capacity to an NFS-enabled SVM
            • Create a volume or qtree storage container
            • Secure NFS access using export policies
          • How ONTAP exports differ from 7-Mode exports
        • Manage NFS with the CLI
          • Understand NAS file access
            • Namespaces and junction points
            • How ONTAP controls access to files
            • How ONTAP handles NFS client authentication
          • Create and manage data volumes in NAS namespaces
          • Configure security styles
            • How security styles affect data access
          • Set up file access using NFS
            • Secure NFS access using export policies
            • Using Kerberos with NFS for strong security
            • Configure name services
              • Use LDAP
            • Configure name mappings
          • Manage file access using NFS
            • Configure the NFS credential cache
            • Manage export policy caches
            • Manage file locks
            • Manage NFSv4 ACLs
            • Manage NFSv4 file delegations
            • Configure NFSv4 file and record locking
          • Supported NFS versions and clients
          • NFS and SMB file and directory naming dependencies
        • Manage NFS over RDMA
        • Configure SMB with the CLI
          • Preparation
          • Configure SMB access to an SVM
            • Set up an SMB server in an Active Directory domain
            • Set up an SMB server in a workgroup
          • Configure SMB client access to shared storage
            • Create a volume or qtree storage container
        • Manage SMB with the CLI
          • SMB server support
          • Manage SMB servers
            • Use options to customize SMB servers
              • Manage how file security is presented to SMB clients for UNIX security-style data
            • Manage SMB server security settings
              • Use SMB signing to enhance network security
              • Configure required SMB encryption on SMB servers for data transfers over SMB
              • Secure LDAP session communication
                • Configure LDAP over TLS
            • Configure default Windows user to UNIX user mappings on the SMB server
            • Improve client performance with traditional and lease oplocks
            • Apply Group Policy Objects to SMB servers
              • How GPOs are updated on the SMB server
            • Manage domain controller connections
            • Use null sessions to access storage in non-Kerberos environments
            • Manage NetBIOS aliases for SMB servers
            • Manage miscellaneous SMB server tasks
            • Use IPv6 for SMB access and SMB services
          • Set up file access using SMB
            • Configure security styles
              • How security styles affect data access
            • Create and manage data volumes in NAS namespaces
            • Configure name mappings
            • Configure multidomain name-mapping searches
            • Create and configure SMB shares
              • Use SMB share properties
            • Secure file access by using SMB share ACLs
            • Secure file access by using file permissions
            • Secure file access by using Dynamic Access Control (DAC)
            • Secure SMB access using export policies
            • Secure file access by using Storage-Level Access Guard
          • Manage file access using SMB
            • Use local users and groups for authentication and authorization
              • How ONTAP uses local users and groups
              • What local privileges are
              • Enable or disable local users and groups functionality
              • Manage local user accounts
              • Manage local groups
              • Manage local privileges
            • Configure bypass traverse checking
            • Display information about file security and audit policies
            • Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
              • Configure and apply file security on NTFS files and folders using the CLI
              • Configure and apply audit policies to NTFS files and folders using the CLI
            • Configure the metadata cache for SMB shares
            • Manage file locks
            • Monitor SMB activity
          • Deploy SMB client-based services
            • Use offline files to allow caching of files for offline use
            • Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
            • Use folder redirection to store data on a SMB server
            • Recover files and folders using Previous Versions
          • Deploy SMB server-based services
            • Manage home directories
              • Home directory shares
            • Configure SMB client access to UNIX symbolic links
            • Use BranchCache to cache SMB share content at a branch office
              • Requirements and guidelines
              • Configure BranchCache
              • Configure BranchCache-enabled SMB shares
              • Manage and monitor the BranchCache configuration
              • Disable BranchCache on SMB shares
              • Disable or enable BranchCache on the SVM
              • Delete the BranchCache configuration on SVMs
            • Improve Microsoft remote copy performance
            • Improve client response time by providing SMB automatic node referrals with Auto Location
            • Provide folder security on shares with access-based enumeration
          • NFS and SMB file and directory naming dependencies
        • Provide S3 client access to NAS data
        • SMB configuration for Microsoft Hyper-V and SQL Server
          • Nondisruptive operations for Hyper-V and SQL Server over SMB
          • Share-based backups with Remote VSS
          • Configuration requirements and considerations
          • Plan the Hyper-V or SQL Server over SMB configuration
          • Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
          • Manage Hyper-V and SQL Server over SMB configurations
          • Use statistics to monitor Hyper-V and SQL Server over SMB activity
          • Verify that the configuration is capable of nondisruptive operations
            • Determine whether SMB sessions are continuously available
      • SAN storage management
        • SAN administration
          • SAN provisioning
          • NVMe provisioning
          • Manage LUNs
          • Manage igroups and portsets
            • Selective LUN Map
          • Manage iSCSI protocol
          • Manage FC protocol
          • Manage NVMe protocol
          • Manage systems with FC adapters
          • Manage LIFs for all SAN protocols
          • Recommended volume and file or LUN configuration combinations
          • Data protection methods in SAN environments
            • Effect of moving or copying a LUN on Snapshot copies
            • Use FlexClone LUNs to protect your data
            • Configure and use SnapVault backups in a SAN environment
          • SAN configurations in a MetroCluster environment
          • SAN concepts
            • About SAN host provisioning
              • iSCSI service management
                • iSNS server registration requirement
            • About SAN volumes
            • About host-side space management
            • Storage virtualization with VMware and Microsoft copy offload
              • Microsoft Offloaded Data Transfer (ODX)
        • SAN configuration reference
          • Considerations for iSCSI configurations
          • Considerations for FC configurations
          • Manage systems with FC adapters
            • Manage X1143A-R6 adapters
          • Ways to Configure FCoE
          • Fibre Channel and FCoE zoning
          • Host support for multipathing
          • Configuration limits
      • S3 object storage management
        • S3 configuration
          • S3 support in ONTAP 9
          • About the S3 configuration process
          • Configure S3 access to an SVM
          • Add storage capacity to an S3-enabled SVM
            • Create or modify access policy statements
            • Enable client access to S3 object storage
        • Protect buckets with S3 SnapMirror
          • Mirror and backup protection on a remote cluster
          • Mirror and backup protection on the local cluster
          • Backup protection with cloud targets
        • Audit S3 events
      • Security and data encryption
        • Manage security with System Manager
        • Manage administrator authentication and RBAC with the CLI
          • Create login accounts
            • Enable local account access
          • Manage access-control roles
          • Manage administrator accounts
            • Generate and install a CA-signed server certificate
            • Configure Active Directory domain controller access
            • Configure LDAP or NIS server access
          • Manage multi-admin verification
        • Ransomware protection
        • Antivirus configuration
          • About NetApp antivirus protection
          • Configure scanner pools
          • Configure on-access scanning
          • Configure on-demand scanning
          • Troubleshoot connectivity issues
        • NAS auditing and security tracing
          • Audit NAS events on SVMs
            • How auditing works
            • SMB events that can be audited
            • Create a file and directory auditing configuration on SVMs
            • Configure file and folder audit policies
            • Display information about audit policies applied to files and directories
            • CLI change events that can be audited
            • Manage auditing configurations
          • Use FPolicy for file monitoring and management on SVMs
            • How FPolicy works
              • How FPolicy works with external FPolicy servers
            • Plan the FPolicy configuration
              • Plan the FPolicy external engine configuration
              • Plan the FPolicy event configuration
              • Plan the FPolicy policy configuration
              • Plan the FPolicy scope configuration
            • Create the FPolicy configuration
            • Modify FPolicy configurations
            • Display information about FPolicy configurations
            • Manage FPolicy server connections
          • Use security tracing to verify or troubleshoot file and directory access
            • Perform security traces
        • Manage encryption with System Manager
        • Manage encryption with the CLI
          • Configure NetApp Volume Encryption
            • Configure NVE
              • Configure external key management
            • Encrypt volume data with NVE
          • Configure NetApp hardware-based encryption
            • Configure external key management
            • Configure onboard key management
          • Manage NetApp encryption
            • Securely purge data on an encrypted volume
            • Make data on a FIPS drive or SED inaccessible
      • Data protection and disaster recovery
        • Data protection with System Manager
        • Cluster and SVM peering with the CLI
          • Prepare for cluster and SVM peering
          • Configure intercluster LIFs
          • Configure peer relationships
        • Data protection with the CLI
          • Manage local Snapshot copies
            • Configure custom Snapshot policies
            • Manage the Snapshot copy reserve
            • Restore files from Snapshot copies
          • SnapMirror volume replication
            • SnapMirror licensing
          • Manage SnapMirror volume replication
            • Configure a replication relationship one step at a time
              • Customize a replication policy
            • Serve data from a SnapMirror DR destination volume
            • Restore files from a SnapMirror destination volume
          • Manage SnapMirror SVM replication
            • Replicate SVM configurations
            • Serve data from an SVM DR destination
            • Reactivate the source SVM
          • Manage SnapMirror root volume replication
          • SnapMirror technical details
        • Archive and compliance using SnapLock technology
          • Configure SnapLock
          • Manage WORM files
        • Consistency groups management
        • SnapMirror Business Continuity
          • Planning
          • Manage SnapMirror for Business Continuity using System Manager
          • Installation and setup using the ONTAP CLI
          • Administration
          • Troubleshooting
        • Mediator service for MetroCluster and SnapMirror Business Continuity
        • Manage MetroCluster sites with System Manager
        • Data protection using tape backup
          • Manage tape drives
          • About tape drives
            • Tape devices overview
            • Tape aliasing
          • Transfer data using ndmpcopy
          • NDMP for FlexVol volumes
            • About NDMP modes of operation
            • Environment variable
          • Manage node-scoped NDMP mode for FlexVol volumes
          • Manage SVM-scoped NDMP mode for FlexVol volumes
          • About dump engine for FlexVol volumes
          • About SMTape engine for FlexVol volumes
          • Monitor tape backup and restore operations for FlexVol volumes
            • What the dump and restore event log message format is
          • Error messages for tape backup and restore of FlexVol volumes
            • Backup and restore error messages
            • NDMP error messages
            • Dump error messages
            • SMTape error messages
        • NDMP configuration
          • Configure SVM-scoped NDMP
          • Configure node-scoped NDMP
        • Replication between NetApp Element software and ONTAP
          • Enable SnapMirror in Element software
          • Configure a replication relationship
            • Customize a replication policy
            • Create a replication relationship
          • Serve data from a SnapMirror DR destination volume
      • Event and performance monitoring
        • Monitor cluster performance with System Manager
        • Monitor and manage cluster performance using the CLI
          • Monitor performance
            • Install Active IQ Unified Manager
            • Set up basic monitoring tasks
          • Manage performance issues
            • Perform basic infrastructure checks
              • Check protocol settings on the storage system
            • Manage workloads
              • Guarantee throughput with QoS
        • File System Analytics
        • EMS configuration
          • Configure EMS event notifications with the CLI
          • Update deprecated EMS event mapping
    Collection of separate PDF docs

    Creating your file...

    This may take a few minutes. Thanks for your patience.
    Your file is ready
    All ONTAP product documentation
    • ONTAP docs
    • Release Notes
    • System Manager integration with BlueXP
    • Introduction and concepts
      • ONTAP concepts
        • Overview
        • ONTAP platforms
        • Cluster storage
        • High-availability pairs
        • AutoSupport and Active IQ Digital Advisor
        • Network architecture
          • Overview
          • Logical ports
          • Support for industry-standard network technologies
          • RDMA
        • Client protocols
        • Disks and aggregates
          • Overview
          • Aggregates and RAID groups
          • Root-data partitioning
        • Volumes, qtrees, files, and LUNs
        • Storage virtualization
          • Overview
          • SVM use cases
          • Cluster and SVM administration
          • Namespaces and junction points
        • Path failover
          • Overview
          • NAS path failover
          • SAN path failover
        • Load balancing
        • Replication
          • Snapshot copies
          • SnapMirror disaster recovery and data transfer
          • SnapMirror Cloud backups to object Storage
          • SnapVault archiving
          • Cloud backup and support for traditional backups
          • MetroCluster continuous availability
        • Storage efficiency
          • Thin provisioning
          • Deduplication
          • Compression
          • Capacity measurements in System Manager
          • FlexClone volumes, files, and LUNs
        • Security
          • Client authentication and authorization
          • Administrator authentication and RBAC
          • Virus scanning
          • Encryption
          • WORM storage
        • Application aware data management
      • ONTAP and the cloud
        • Overview
        • Data protection and the cloud
          • Overview
          • Data replication
          • High availability
          • Encryption of data at rest
          • Antivirus protection
        • Move entire workloads to the cloud
          • Storage protocols
            • File sharing with NFS and SMB
            • iSCSI
          • AutoSupport and Active IQ Digital Advisor
          • Storage VMs
          • FlexGroup volumes
        • Performance and efficiency in the cloud
          • Overview
          • FabricPool
          • Storage Efficiency
        • Manage ONTAP in the cloud
          • Overview
          • Event and performance monitoring
          • Volume management
          • Volume move
          • ONTAP updates
        • Compliance and the cloud
          • NetApp Cloud Data Sense
          • Data sovereignty
          • SnapLock WORM storage
    • Set up, upgrade and revert ONTAP
      • Set up ONTAP
        • Decide which setup method to use
        • Set up a cluster with System Manager
        • Set up a cluster with the CLI
          • Create the cluster on the first node
          • Join remaining nodes to the cluster
          • Check your cluster with Active IQ Config Advisor
          • Synchronize the system time across the cluster
          • Commands for managing symmetric authentication on NTP servers
          • Additional system configuration tasks to complete
        • Configure All SAN Array software
          • Overview
          • ASA configuration support and limitations
      • Upgrade ONTAP
        • Overview
        • Upgrade Paths
        • Upgrade with Upgrade Advisor
        • Upgrade without Upgrade Advisor
          • Should I upgrade without Upgrade Advisor?
          • What should I read before I upgrade?
          • What should I verify before I upgrade without Upgrade Advisor?
            • Overview
            • Cluster upgrade limits
            • Current cluster activity
        • What should I verify before I upgrade with or without Upgrade Advisor?
          • Overview of pre-upgrade verifications
          • Cluster health
          • Storage health
          • Reboot SP or BMC
          • SVM routing configuration
          • LIF failover configuration
          • Status (HA, LDAP, DNS, MetroCluster networking and storage)
          • All LIFs are on home ports
          • Common configuration errors
          • Special considerations
            • Summary of special considerations
            • Mixed version clusters
            • SAN configurations
            • MetroCluster configurations
              • Upgrade requirements
              • Network and storage status
            • Advanced Data Partitioning
            • Deduplicated volumes and aggregates
            • SnapMirror
              • Upgrade requirements
              • Prepare SnapMirror relationships
            • SnapLock
            • Load-sharing mirrors in ONTAP 8.3
            • NetApp Storage Encryption
            • Netgroups
            • LDAP clients using SSLv3
            • Session-oriented protocols
            • SSH public keys
            • Dp-type relationships
        • How do I get and install the upgrade software image?
        • Which upgrade method should I use?
          • Overview of upgrade methods
          • Automated nondisruptive using System Manager
          • Automated nondisruptive using the CLI
          • Automated disruptive using the CLI
          • Manual nondisruptive using the CLI
            • Non-MetroCluster configurations
            • MetroCluster configurations
              • 4 or 8 node
              • 2-node 9.2 or earlier
          • Manual disruptive using the CLI
        • What should I do after my upgrade?
          • Overview of post-upgrade verifications
          • Verify your cluster
          • Verify all LIFs are on home ports
          • Verify special configurations
            • Summary for verifications for special configurations
            • Verify your network configuration
            • Verify your networking and storage status
            • Verify your SAN configuration
            • Reconfigure KMIP server connections
            • Relocate moved load-sharing mirror source volumes
            • Resume SnapMirror operations
            • Set the desired NT ACL permissions display level for NFS clients
            • Enforce SHA-2 on administrator passwords
            • Change in user accounts that can access the Service Processor
            • Remove EMS LIF service from network service polices
          • Update the DQP
      • Update firmware
      • Revert ONTAP
        • Overview
        • Do I need technical support?
        • What are the revert paths?
        • What should I read before I revert?
          • Pre-reversion resources
          • Revert considerations
        • What should I verify before I revert?
        • What else should I check before I revert?
          • Summary of pre-revert checks
          • SnapMirror
            • SnapMirror Synchronous relationships
            • SnapMirror/SnapVault relationships
          • SnapLock
          • Split FlexClone volumes
          • FlexGroup volumes
          • SMB servers in workgroup mode
          • Deduplicated volumes
          • Snapshot copies
          • User accounts that use SHA-2 hash function
          • Anti-ransomware licensing
          • S3 NAS buckets
          • 2 or 4-node MetroCluster
          • Disable IPsec
        • How do I get and install the revert software image?
        • Revert my cluster
        • What should I do after reverting my cluster?
          • Verify cluster and storage health
          • Enable automatic switchover for MetroCluster configurations
          • Enable and revert LIFs to home ports
          • Enable Snapshot copy policies
          • Verify client access (SMB and NFS)
          • Verify IPv6 firewall entries
          • Revert password hash function
          • Maually update SP firmware
          • Verify user accounts that can access the Service Processor
    • Cluster administration
      • Cluster management with System Manager
        • Administration overview
        • Use System Manager to access a Cluster
        • Enable new features
        • View and submit support cases
        • Monitor capacity with System Manager
        • Monitor risks with Active IQ Digital Advisor
        • Gain insights to help optimize your system
        • View hardware configurations and determine problems
        • Manage nodes
          • Reboot, shut down, take over, and give back nodes
          • Add nodes to cluster
      • Cluster management with the CLI
        • Overview
        • Cluster and SVM administrators
          • Roles
          • Manage access to System Manager
          • What the cluster management server is
          • Types of SVMs
        • ONTAP management interface basics
          • Access the cluster by using the CLI (cluster administrators only)
            • Access the cluster by using the serial port
            • Access the cluster by using SSH
            • SSH login security
            • Enable Telnet or RSH access to the cluster
            • Access the cluster by using Telnet
            • Access the cluster by using RSH
          • Use the ONTAP command-line interface
            • Overview
            • About the different shells for CLI commands (cluster administrators only)
              • Overview
              • Access of nodeshell commands and options in the clustershell
              • Display available nodeshell commands
            • Methods of navigating CLI command directories
            • Rules for specifying values in the CLI
            • Methods of viewing command history and reissuing commands
            • Keyboard shortcuts for editing CLI commands
            • Use of administrative privilege levels
            • Set the privilege level in the CLI
            • Set display preferences in the CLI
            • Methods of using query operators
            • Methods of using extended queries
            • Methods of customizing show command output by using fields
            • About positional parameters
            • Methods of accessing ONTAP man pages
          • Manage CLI sessions (cluster administrators only)
            • Manage records of CLI sessions
              • Overview
              • Record a CLI session
              • Commands for managing records of CLI sessions
            • Commands for managing the automatic timeout period of CLI sessions
        • Use the ONTAP command-line interface
          • About the different shells for CLI commands (cluster administrators only)
            • Overview
            • Access of nodeshell commands and options in the clustershell
            • Display available nodeshell commands
          • Methods of navigating CLI command directories
          • Rules for specifying values in the CLI
          • Methods of viewing command history and reissuing commands
          • Keyboard shortcuts for editing CLI commands
          • Use of administrative privilege levels
          • Set the privilege level in the CLI
          • Set display preferences in the CLI
          • Methods of using query operators
          • Methods of using extended queries
          • Methods of customizing show command output by using fields
          • About positional parameters
          • Methods of accessing ONTAP man pages
        • Cluster management basics (cluster administrators only)
          • Display information about the nodes in a cluster
          • Display cluster attributes
          • Modify cluster attributes
          • Display the status of cluster replication rings
          • About quorum and epsilon
          • What system volumes are
        • Manage nodes
          • Display node attributes
          • Modify node attributes
          • Rename a node
          • Add nodes to the cluster
          • Remove nodes from the cluster
          • Access a node’s log, core dump, and MIB files by using a web browser
          • Access the system console of a node
          • Rules governing node root volumes and root aggregates
            • Overview
            • Free up space on a node’s root volume
            • Relocate root volumes to new aggregates
          • Start or stop a node
            • Overview
            • Reboot a node at the system prompt
            • Boot ONTAP at the boot environment prompt
            • Shut down a node
          • Manage a node by using the boot menu
          • Manage a node remotely using the SP/BMC
            • Overview
            • About the SP
            • What the Baseboard Management Controller does
            • Configure the SP/BMC network
              • Isolate management network traffic
              • Considerations for the SP/BMC network configuration
              • Enable the SP/BMC automatic network configuration
              • Configure the SP/BMC network manually
              • Modify the SP API service configuration
            • Methods of managing SP/BMC firmware updates
            • When the SP/BMC uses the network interface for firmware updates
            • Access the SP/BMC
              • Accounts that can access the SP
              • Access the SP/BMC from an administration host
              • Access the SP/BMC from the system console
              • Relationship among the SP CLI, SP console, and system console sessions
              • Manage the IP addresses that can access the SP
            • Use online help at the SP/BMC CLI
            • Commands to manage a node remotely
            • About the threshold-based SP sensor readings and status values of the system sensors command output
            • About the discrete SP sensor status values of the system sensors command output
            • Commands for managing the SP from ONTAP
            • ONTAP commands for BMC management
            • BMC CLI commands
        • Manage audit logging for management activities
          • How ONTAP implements audit logging
          • Changes to audit logging in ONTAP 9
          • Display audit log contents
          • Manage audit GET request settings
          • Manage audit log destinations
        • Manage the cluster time (cluster administrators only)
        • Commands for managing the cluster time
        • Manage the banner and MOTD
          • Overview
          • Create a banner
          • Manage the banner
          • Create an MOTD
          • Manage the MOTD
        • Manage licenses (cluster administrators only)
          • Overview
          • License types and licensed method
          • Commands for managing licenses
        • Manage jobs and schedules
          • Job categories
          • Commands for managing jobs
          • Commands for managing job schedules
        • Back up and restore cluster configurations (cluster administrators only)
          • What configuration backup files are
          • Manage configuration backups
            • How the node and cluster configurations are backed up automatically
            • Commands for managing configuration backup schedules
            • Commands for managing configuration backup files
          • Recovering a node configuration
            • Find a configuration backup file to use for recovering a node
            • Restore the node configuration using a configuration backup file
          • Recover a cluster configuration
            • Find a configuration to use for recovering a cluster
            • Restore a cluster configuration from an existing configuration
          • Synchronize a node with the cluster
        • Manage core dumps (cluster administrators only)
        • Commands for managing core dumps
        • Monitor a storage system
          • Use AutoSupport and Active IQ Digital Advisor
          • Manage AutoSupport with System Manager
          • Manage AutoSupport with the CLI
            • Overview
            • When and where AutoSupport messages are sent
            • How AutoSupport creates and sends event-triggered messages
            • Types of AutoSupport messages and their content
            • What AutoSupport subsystems are
            • AutoSupport size and time budgets
            • Files sent in event-triggered AutoSupport messages
            • Log files sent in AutoSupport messages
            • Files sent in weekly AutoSupport messages
            • How AutoSupport OnDemand obtains delivery instructions from technical support
            • Structure of AutoSupport messages sent by email
            • AutoSupport severity types
            • Requirements for using AutoSupport
            • Set up AutoSupport
            • Upload core dump files
            • Upload performance archive files
            • Get AutoSupport message descriptions
            • Commands for managing AutoSupport
            • Information included in the AutoSupport manifest
            • AutoSupport case suppression during scheduled maintenance windows
            • Troubleshoot AutoSupport
              • Troubleshoot AutoSupport when messages are not received
              • Troubleshoot AutoSupport message delivery over HTTP or HTTPS
              • Troubleshoot AutoSupport message delivery over SMTP
              • Troubleshoot the AutoSupport subsystem
          • Monitor the health of your system
            • Overview
            • How health monitoring works
            • Ways to respond to system health alerts
            • System health alert customization
            • How health alerts trigger AutoSupport messages and events
            • Available cluster health monitors
            • Receive system health alerts automatically
            • Respond to degraded system health
            • Example of responding to degraded system health
            • Configure discovery of cluster and management network switches
            • Verify the monitoring of cluster and management network switches
            • Commands for monitoring the health of your system
          • Display environmental information
        • Manage access to web services
          • Overview
          • Manage the web protocol engine
          • Commands for managing the web protocol engine
          • Configure SAML authentication for web services
            • Configure SAML authentication
            • Disable SAML authentication
            • Troubleshoot issues with SAML configuration
          • Manage web services
            • Overview
            • Commands for managing web services
            • Commands for managing mount points on the nodes
          • Manage SSL
          • Commands for managing SSL
          • Configure access to web services
          • Troubleshoot web service access problems
        • Verify the identity of remote servers using certificates
          • Overview
          • Verify digital certificates are valid using OCSP
          • View default certificates for TLS-based applications
          • Mutually authenticating the cluster and a KMIP server
            • Overview
            • Generate a certificate signing request for the cluster
            • Install a CA-signed server certificate for the cluster
            • Install a CA-signed client certificate for the KMIP server
      • Disk and tier (aggregate) management
        • Overview
        • Manage local tiers (aggregates)
          • Overview
          • Prepare to add a local tier (aggregate)
            • Overview
            • Local tiers (aggregates) and RAID groups
            • Mirrored and unmirrored local tiers (aggregates)
            • Fast zeroing of drives
            • Manually assign disk ownership
          • Add (create) a local tier (aggregate)
            • Overview
            • Workflow to add a local tier (aggregate)
            • Determine the number of disks or disk partitions required for a local tier (aggregate)
            • Decide which local tier (aggregate) creation method to use
            • Add (create) local tiers (aggregates) automatically
            • Add (create) local tiers (aggregates) manually
          • Manage the use of local tiers (aggregates)
            • Overview
            • Rename a local tier (aggregate)
            • Set media cost of a local tier (aggregate)
            • Determine drive and RAID group information for a local tier (aggregate)
            • Assign local tiers (aggregates) to storage VMs (SVMs)
            • Determine which volumes reside on a local tier (aggregate)
            • Determine and control a volume’s space usage in a local tier (aggregate)
            • Determine space usage in a local tier (aggregate)
            • Relocate local tier (aggregate) ownership within an HA pair
            • Delete a local tier (aggregate)
            • Commands for relocating local tiers (aggregates)
            • Commands for managing local tiers (aggregates)
          • Add capacity (disks) to a local tier (aggregate)
            • Overview
            • Workflow to add capacity to a local tier (expanding an aggregate)
            • Methods to create space in a local tier (aggregate)
            • Add disks to a local tier (aggregate)
            • Add drives to a node or shelf
            • Correct misaligned spare partitions
        • Manage disks
          • Overview
          • How hot spare disks work
          • How low spare warnings can help you manage your spare disks
          • Additional root-data partitioning management options
          • When you need to update the Disk Qualification Package
          • Disk and partition ownership
            • Overview
            • About auto-assignment of disk ownership
            • Display disk and partition ownership
            • Change auto-assignment settings for disk ownership
            • Manually assign ownership of disks
            • Manually assign ownership of partitioned disks
            • Set up an active-passive configuration on nodes using root-data partitioning
            • Set up an active-passive configuration on nodes using root-data-data partitioning
            • Remove ownership from a disk
          • Remove a failed disk
          • Disk sanitization
            • Overview
            • When sanitization cannot be performed
            • What happens if sanitization is interrupted
            • Tips for managing local tiers (aggregates) containing data to be sanitized
            • Sanitize a disk
          • Commands for managing disks
          • Commands for displaying space usage information
          • Commands for displaying information about storage shelves
        • Manage RAID configurations
          • Overview
          • Default RAID policies for local tiers (aggregates)
          • RAID protection levels for disks
          • Drive and RAID group information for a local tier (aggregate)
          • Convert from RAID-DP to RAID-TEC
          • Convert RAID-TEC to RAID-DP
          • Considerations for sizing RAID groups
          • Customize the size of your RAID groups
        • Manage Flash Pool local tiers (aggregates)
          • Overview
          • Flash Pool local tier (aggregate) caching policies
          • Manage Flash Pool caching policies
            • Overview
            • Determine whether to modify the caching policy of Flash Pool local tiers (aggregates)
            • Modify caching policies of Flash Pool local tiers (aggregates)
            • Set the cache-retention policy for Flash Pool local tiers (aggregates)
          • Flash Pool SSD partitioning for Flash Pool local tiers (aggregates) using storage pools
          • Flash Pool candidacy and optimal cache size
          • Create a Flash Pool local tier (aggregate) using physical SSDs
          • Create a Flash Pool local tier (aggregate) using SSD storage pools
            • Overview
            • Determine whether a Flash Pool local tier (aggregate) is using an SSD storage pool
            • Add cache by adding an SSD storage pool
            • Create a Flash Pool using SSD storage pool allocation units
            • Determine the impact to cache size of adding SSDs to an SSD storage pool
            • Add SSDs to an SSD storage pool
            • Commands for managing SSD storage pools
      • FabricPool tier management
        • Overview
        • Benefits of storage tiers by using FabricPool
        • Considerations and requirements for using FabricPool
        • About FabricPool tiering policies
        • FabricPool management workflow
        • Configure FabricPool
          • Prepare for FabricPool configuration
            • Overview
            • Add a connection to the cloud
            • Install a FabricPool license
            • Install a CA certificate if you use StorageGRID
            • Install a CA certificate if you use ONTAP S3
            • Set up an object store as the cloud tier for FabricPool
              • Overview
              • Set up StorageGRID as the cloud tier
              • Set up ONTAP S3 as the cloud tier
              • Set up Alibaba Cloud Object Storage as the cloud tier
              • Set up AWS S3 as the cloud tier
              • Specify the AWS S3 configuration information
              • Set up Google Cloud Storage as the cloud tier
              • Set up IBM Cloud Object Storage as the cloud tier
              • Set up Azure Blob Storage for the cloud as the cloud tier
              • Set up object stores for FabricPool in a MetroCluster configuration
            • Attach the cloud tier to an aggregate
            • Tier data to local bucket
        • Manage FabricPool
          • Overview
          • Determine how much data in a volume is inactive by using inactive data reporting
          • Add or move volumes to FabricPool as needed
            • Create a volume for FabricPool
            • Move a volume to FabricPool
          • Object tagging using user-created custom tags
            • Overview
            • Assign a new tag during volume creation
            • Modify an existing tag
            • Delete a tag
            • View existing tags on a volume
            • Check object tagging status on FabricPool volumes
          • Monitor the space utilization for FabricPool
          • Manage storage tiering by modifying a volume’s tiering policy or tiering minimum cooling period
          • Archive volumes with FabricPool (video)
          • Use cloud migration controls to override a volume’s default tiering policy
          • Promote data to the performance tier
            • Overview
            • Promote all data from a FabricPool volume to the performance tier
            • Promote file system data to the performance tier
            • Check the status of a performance tier promotion
            • Trigger scheduled migration and tiering
        • Manage FabricPool mirrors
          • Overview
          • Create a FabricPool mirror
          • Monitor FabricPool mirror resync status
          • Display FabricPool mirror details
          • Promote a FabricPool mirror
          • Remove a FabricPool mirror
          • Replace an existing object store using a FabricPool mirror
          • Replace a FabricPool mirror on a MetroCluster configuration
        • Commands for managing aggregates with FabricPool
      • SVM data mobility
        • Overview
        • Migrate an SVM
        • Monitor migration
        • Pause and resume migration
        • Cancel migration
        • Manually cut over clients
        • Manually remove source SVM
      • HA pair management
        • Overview
        • How hardware-assisted takeover works
        • How automatic takeover and giveback works
        • Automatic takeover commands
        • Automatic giveback commands
        • Manual takeover commands
        • Manual giveback commands
        • Testing takeover and giveback
        • Commands for monitoring an HA pair
        • Commands for enabling and disabling storage failover
        • Halt or reboot a node without initiating takeover
      • Rest API management with System Manager
        • Rest log overview
        • Access the REST API log
    • Volume administration
      • Volume and LUN management with System Manager
        • Overview
        • Manage volumes
        • Add a volume
        • Add LUNs
        • Expand volumes and LUNs
        • Recover deleted volumes
        • Save storage space
        • Balance load by moving LUNs
        • Balance loads by moving volumes to another tier
        • Use Ansible Playbooks to add or edit volumes or LUNs
        • Manage storage efficiency policies
        • Manage resources using quotas
        • Limit resource use
        • Clone data with FlexClone
        • Search, filter, and sort
        • Capacity measurements
      • Logical storage management with the CLI
        • Overview
        • Create and manage volumes
          • Create a volume
          • SAN volumes
            • About
            • Configure volume provisioning options
            • Determine space usage in a volume or aggregate
            • Delete Snapshot copies automatically
            • Configure volumes to automatically provide more space when they are full
            • Configure volumes to automatically grow and shrink their size
            • Requirements for enabling both autoshrink and automatic Snapshot copy deletion
            • How the autoshrink functionality interacts with Snapshot copy deletion
            • Address FlexVol volume fullness and overallocation alerts
            • Address aggregate fullness and overallocation alerts
            • Considerations for setting fractional reserve
          • Display file or inode usage
          • Control and monitoring I/O performance to FlexVol volumes by using Storage QoS
          • Delete a FlexVol volume
          • Protection against accidental volume deletion
          • Delete directories
            • Overview
          • Commands for managing FlexVol volumes
          • Commands for displaying space usage information
        • Move and copy volumes
          • How moving a FlexVol volume works
          • Considerations and recommendations when moving volumes
          • Requirement for moving volumes in SAN environments
          • Move a volume
          • Commands for moving volumes
          • Methods for copying a volume
        • Use FlexClone volumes to create efficient copies of your FlexVol volumes
          • Overview
          • Create a FlexClone volume
          • Split a FlexClone volume from its parent volume
          • Determine the space used by a FlexClone volume
          • Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
        • Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
          • Overview
          • Create a FlexClone file or FlexClone LUN
          • View node capacity for creating and deleting FlexClone files and FlexClone LUNs
          • View the space savings due to FlexClone files and FlexClone LUNs
          • Methods to delete FlexClone files and FlexClone LUNs
          • How a FlexVol volume can reclaim free space with autodelete setting
            • Overview
            • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
            • Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted
            • Commands for configuring deletion of FlexClone files
        • Use qtrees to partition your FlexVol volumes
          • Overview
          • Obtain a qtree junction path
          • Qtree name restrictions
          • Convert a directory to a qtree
            • Overview
            • Convert a directory to a qtree using a Windows client
            • Convert a directory to a qtree using a UNIX client
          • Commands for managing and configuring qtrees
        • Logical space reporting and enforcement for volumes
          • Overview
          • What logical space reporting shows
          • What logical space enforcement does
          • Enable logical space reporting and enforcement
        • Use quotas to restrict or track resource usage
          • Overview of the quota process
            • Quota process
            • Differences among hard, soft, and threshold quotas
            • About quota notifications
            • Why you use quotas
            • What quota rules, quota policies, and quotas are
            • Quota targets and types
            • Special kinds of quotas
              • How default quotas work
              • How you use explicit quotas
              • How derived quotas work
              • How you use tracking quotas
            • How quotas are applied
            • Considerations for assigning quota policies
            • How quotas work with users and groups
              • Overview
              • How you specify UNIX users for quotas
              • How you specify Windows users for quotas
              • How default user and group quotas create derived quotas
              • How quotas are applied to the root user
              • How quotas work with special Windows groups
              • How quotas are applied to users with multiple IDs
              • How ONTAP determines user IDs in a mixed environment
              • How quotas with multiple users work
              • How you link UNIX and Windows names for quotas
            • How quotas work with qtrees
            • How tree quotas work
              • Overview
              • How user and group quotas work with qtrees
              • How default tree quotas on a FlexVol volume create derived tree quotas
              • How default user quotas on a FlexVol volume affect quotas for the qtrees in that volume
            • How qtree changes affect quotas
              • Overview
              • How deleting a qtree affects tree quotas
              • How renaming a qtree affects quotas
              • How changing the security style of a qtree affects user quotas
            • How quotas are activated
              • Overview
              • When you can use resizing
              • When a full quota reinitialization is required
            • How you can view quota information
              • Overview
              • How you can use the quota report to see what quotas are in effect
              • Why enforced quotas differ from configured quotas
              • Use the quota report to determine which quotas limit writes to a specific file
              • Commands for displaying information about quotas
              • When to use the volume quota policy rule show and volume quota report commands
            • Difference in space usage displayed by a quota report and a UNIX client
              • Overview
              • How the ls command accounts for space usage
              • How the df command accounts for file size
              • How the du command accounts for space usage
            • Examples of quota configuration
          • Set up quotas on an SVM
          • Modify (or Resizing) quota limits
          • Reinitialize quotas after making extensive changes
          • Commands to manage quota rules and quota policies
          • Commands to activate and modify quotas
        • Use deduplication, data compression, and data compaction to increase storage efficiency
          • Overview
          • Enable deduplication on a volume
          • Disable deduplication on a volume
          • Manage automatic volume-level background deduplication on AFF systems
          • Manage aggregate-level inline deduplication on AFF systems
          • Manage aggregate-level background deduplication on AFF systems
          • Temperature-sensitive storage efficiency overview
          • Set storage efficiency modes
          • Check volume efficiency mode
          • Change volume efficiency mode
          • View temperature sensitive storage efficiency physical footprint savings
          • Enable data compression on a volume
          • Move between secondary compression and adaptive compression
          • Disable data compression on a volume
          • Manage inline data compaction for AFF systems
          • Enable inline data compaction for FAS systems
          • Inline storage efficiency enabled by default on AFF systems
          • Enable storage efficiency visualization
          • Create a volume efficiency policy to run efficiency operations
            • Overview
            • Assign a volume efficiency policy to a volume
            • Modify a volume efficiency policy
            • View a volume efficiency policy
            • Disassociate a volume efficiency policy from a volume
            • Delete a volume efficiency policy
          • Manage volume efficiency operations manually
            • Overview
            • Run efficiency operations manually
            • Use checkpoints to resume efficiency operation
            • Resume a halted efficiency operation
            • Run efficiency operations manually on existing data
          • Manage volume efficiency operations using schedules
            • Run efficiency operations depending on the amount of new data written
            • Run efficiency operations using scheduling
          • Monitor volume efficiency operations
            • View the status of efficiency operations
            • View efficiency space savings
            • View efficiency statistics of a FlexVol volume
          • Stop volume efficiency operations
          • Information about removing space savings from a volume
        • Rehost a volume from one SVM to another SVM
          • Overview
          • Rehost CIFS volumes
          • Rehost NFS volumes
          • Rehost SAN volumes
          • Rehost volumes in a SnapMirror relationship
          • Features that do not support volume rehost
        • Storage limits
        • Recommended volume and file or LUN configuration combinations
          • Overview
          • Determine the correct volume and LUN configuration combination for your environment
          • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
          • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
          • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
        • Cautions and considerations for changing file or directory capacity
          • Considerations for changing the maximum number of files allowed on a FlexVol volume
          • Cautions for increasing the maximum directory size for FlexVol volumes
          • Rules governing node root volumes and root aggregates
          • Relocate root volumes to new aggregates
        • Features supported with FlexClone files and FlexClone LUNs
          • Overview
          • How deduplication works with FlexClone files and FlexClone LUNs
          • How Snapshot copies work with FlexClone files and FlexClone LUNs
          • How access control lists work with FlexClone files and FlexClone LUNs
          • How quotas work with FlexClone files and FlexClone LUNs
          • How FlexClone volumes work with FlexClone files and FlexClone LUNs
          • How NDMP works with FlexClone files and FlexClone LUNs
          • How volume SnapMirror works with FlexClone files and FlexClone LUNs
          • How volume move affects FlexClone files and FlexClone LUNs
          • How space reservation works with FlexClone files and FlexClone LUNs
          • How an HA configuration works with FlexClone files and FlexClone LUNs
      • FlexGroup volumes management with System Manager
      • FlexGroup volumes management with the CLI
        • Overview
        • What a FlexGroup volume is
        • Supported and unsupported configurations for FlexGroup volumes
        • FlexGroup volume setup
          • Workflow
          • Enable 64-bit NFSv3 identifiers on an SVM
          • Provision a FlexGroup volume automatically
          • Create a FlexGroup volume
        • Manage FlexGroup volumes
          • Monitor the space usage of a FlexGroup volume
          • Increase the size of a FlexGroup volume
          • Reduce the size of a FlexGroup volume
          • Configure FlexGroup volumes to automatically grow and shrink their size
          • Delete directories rapidly on a cluster
          • Manage client rights to delete directories rapidly
          • Create qtrees with FlexGroup volumes
          • Use quotas for FlexGroup volumes
          • Enable storage efficiency on a FlexGroup volume
          • Protect FlexGroup volumes using Snapshot copies
          • Move the constituents of a FlexGroup volume
          • Use aggregates in FabricPool for existing FlexGroup volumes
          • Rebalance FlexGroup volumes
        • Data protection for FlexGroup volumes
          • Workflow
          • Create a SnapMirror relationship for FlexGroup volumes
          • Create a SnapVault relationship for FlexGroup volumes
          • Create a unified data protection relationship for FlexGroup volumes
          • Create an SVM disaster recovery relationship for FlexGroup volumes
          • Transition an existing FlexGroup SnapMirror relationship to SVM DR
          • Convert a FlexVol volume to a FlexGroup volume within an SVM-DR relationship
          • Considerations for creating SnapMirror cascade and fanout relationships for FlexGroups
          • Considerations for creating a SnapVault backup relationship and a unified data protection relationship for FlexGroup volumes
          • Monitor SnapMirror data transfers for FlexGroup volumes
        • Manage data protection operations for FlexGroup volumes
          • Disaster recovery for FlexGroup volumes
            • Workflow
            • Activate the destination FlexGroup volume
            • Reactivate the original source FlexGroup volume after disaster
            • Reverse a SnapMirror relationship between FlexGroup volumes during disaster recovery
          • Expand FlexGroup volumes in a SnapMirror relationship
            • Overview
            • Expand the source FlexGroup volume of a SnapMirror relationship
            • Expand the destination FlexGroup volume of a SnapMirror relationship
          • Perform a SnapMirror single file restore from a FlexGroup volume
          • Restore a FlexGroup volume from a SnapVault backup
          • Disable SVM protection on a FlexGroup volume
          • Enable SVM protection on a FlexGroup volume
        • Convert FlexVol volumes to FlexGroup volumes
          • Overview
          • Convert a FlexVol volume to a FlexGroup volume
          • Convert a FlexVol volume SnapMirror relationship to a FlexGroup volume SnapMirror relationship
      • FlexCache volumes management with System Manager
      • FlexCache volumes management with the CLI
        • Overview
        • Benefits of FlexCache volumes
        • Typical FlexCache deployments
        • Supported and unsupported features for FlexCache volumes
        • FlexCache volume creation
          • Workflow
          • Add a FlexCache license
          • Process to create a FlexCache volume
            • Create a FlexCache volume
            • Guidelines for sizing a FlexCache volume
            • Considerations for auditing FlexCache volumes
        • Manage a FlexCache relationship
          • View the connection status of a FlexCache relationship
          • Synchronize properties of a FlexCache volume from an origin volume
          • Update the configurations of a FlexCache relationship
          • Enable file access time updates
          • Enable global file locking
          • Prepopulate a FlexCache volume
          • Delete a FlexCache relationship
    • Network management
      • Manage your network with System Manager
        • Overview
        • View and manage your network
        • Auto detect wiring issues
        • Download network data for reporting
      • Set up NAS path failover with the CLI
        • ONTAP 9.8 and later
          • About NAS path failover for ONTAP 9.8 and later
          • Workflow NAS path failover
            • Overview
            • Worksheet for NAS path failover configuration
            • Create IPspaces
            • Move broadcast domains
            • Repair port reachability
            • Create SVMs
            • Create LIFs
            • Configure DNS services
        • ONTAP 9.7 and earlier
          • Set up NAS path failover (ONTAP 9.0-9.7 CLI)
          • Workflow NAS path failover
            • Overview
            • Worksheet for NAS path failover configuration
            • Create IPspaces
            • Determine which ports can be used for a broadcast domains
            • Remove ports from a broadcast domain
            • Create a broadcast domain
            • Create a subnet
            • Create SVMs
            • Create LIFs
            • Configure DNS services
            • Configure dynamic DNS services
      • Manage your network with the CLI
        • Network management overview
        • Upgrade considerations
          • Network features by release
          • Verify your networking configuration after upgrading to ONTAP 9.8 or later
        • Networking components of a cluster
          • Overview
          • Network cabling guidelines
          • Relationship between broadcast domains, failover groups, and failover policies
        • Configure network ports (cluster administrators only)
          • Overview
          • Combine physical ports to create interface groups
          • Configure VLANs over physical ports
          • Modify network port attributes
          • Modify MTU setting for interface group ports
          • Monitor the health of network ports
          • Monitor the reachability of network ports in ONTAP 9.8 and later
          • Convert 40GbE NIC ports into multiple 10GbE ports for 10GbE connectivity
          • Removing a NIC from the node on ONTAP 9.7 or earlier
          • Removing a NIC from the node on ONTAP 9.8 or later
        • Configure IPspaces (cluster administrators only)
          • Overview
          • Example of using IPspaces
          • Standard properties of IPspaces
          • Create IPspaces
          • Display IPspaces
          • Delete an IPspace
        • Configure broadcast domains (cluster administrators only)
          • ONTAP 9.8 and later
            • About broadcast domains for ONTAP 9.8 and later
            • Example of using broadcast domains
            • Add a broadcast domain
            • Add or remove ports from a broadcast domain
            • Split broadcast domains
            • Merge broadcast domains
            • Change the MTU value for ports in a broadcast domain
            • Display broadcast domains
            • Delete a broadcast domain
          • ONTAP 9.7 and earlier
            • About broadcast domains for ONTAP 9.7 and earlier
            • Example of using broadcast domains
            • Create a broadcast domain
            • Add or remove ports from a broadcast domain
            • Split broadcast domains
            • Merge broadcast domains
            • Change the MTU value for ports in a broadcast domain
            • Display broadcast domains
            • Delete a broadcast domain
        • Configure failover groups and policies for LIFs
          • Overview
          • Create a failover group
          • Configure failover settings on a LIF
          • Commands for managing failover groups and policies
        • Configure subnets (cluster administrators only)
          • Overview
          • Create a subnet
          • Add or remove IP addresses from a subnet
          • Change subnet properties
          • Display subnets
          • Delete a subnet
        • Configure LIFs (cluster administrators only)
          • Overview
          • LIF compatibility with port types
          • LIF roles in ONTAP 9.5 and earlier
          • LIFs and service policies
          • Configure LIF service policies
          • Create a LIF
          • Modify a LIF
          • Migrate a LIF
          • Revert a LIF to its home port
          • ONTAP 9.8 or later-Recover from an incorrectly configured cluster LIF
          • Delete a LIF
          • Configure virtual IP (VIP) LIFs
        • Configure host-name resolution
          • Overview
          • Configure DNS for host-name resolution
          • Manage the hosts table (cluster administrators only)
        • Balance network loads to optimize user traffic (cluster administrators only)
          • Overview
          • How DNS load balancing works
          • Create a DNS load balancing zone
          • Add or remove a LIF from a load balancing zone
        • Secure your network
          • Configure network security using Federal Information Processing Standards (FIPS)
          • Configure IP security (IPsec) over wire encryption
          • Configure firewall policies for LIFs
          • Commands for managing firewall service and policies
        • Configure QoS marking (cluster administrators only)
          • Overview
          • DSCP marking for UC compliance
          • Modify QoS marking values
          • Display QoS marking values
        • Manage SNMP on the cluster (cluster administrators only)
          • Overview
          • What MIBs are
          • SNMP traps
          • Create an SNMP community and assign it to a LIF
          • Configure SNMPv3 users in a cluster
          • Configure traphosts to receive SNMP notifications
          • Commands for managing SNMP
        • Manage routing in an SVM
          • Overview
          • Create a static route
          • Enable multipath routing
          • Delete a static route
          • Display routing information
          • Remove dynamic routes from routing tables
        • ONTAP port usage on a storage system
          • Overview
          • ONTAP internal ports
        • View network information
          • Overview
          • Display network port information
          • Display information about a VLAN (cluster administrators only)
          • Display interface group information (cluster administrators only)
          • Display LIF information
          • Display routing information
          • Display DNS host table entries (cluster administrators only)
          • Display DNS domain configurations
          • Display information about failover groups
          • Display LIF failover targets
          • Display LIFs in a load balancing zone
          • Display cluster connections
          • Commands for diagnosing network problems
          • Display network connectivity with neighbor discovery protocols
    • NAS storage management
      • Manage NAS protocols with System Manager
        • NAS storage overview
        • VMware datastores
        • Home directories
        • Linux servers
        • Export policies
        • Windows servers
        • Both Windows and Linux
        • Secure client access with Kerberos
        • Provide client access with name services
        • Manage directories and files
        • Manage host-specific users and groups
        • Monitor NFS active clients
        • Enable NAS storage
          • Enable Linux servers
          • Enable Windows servers
          • Enable Both Windows and Linux
      • Configure NFS with the CLI
        • Overview
        • Workflow
        • Preparation
          • Assess physical storage requirements
          • Assess networking requirements
          • Decide where to provision new NFS storage capacity
          • Worksheet for gathering NFS configuration information
        • Configure NFS access to an SVM
          • Create an SVM
          • Verify that the NFS protocol is enabled on the SVM
          • Open the export policy of the SVM root volume
          • Create an NFS server
          • Create a LIF
          • Enable DNS for host-name resolution
          • Configure name services
            • Overview
            • Configure the name service switch table
            • Configure local UNIX users and groups
              • Overview
              • Create a local UNIX user
              • Load local UNIX users from a URI
              • Create a local UNIX group
              • Add a user to a local UNIX group
              • Load local UNIX groups from a URI
            • Work with netgroups
              • Overview
              • Load netgroups into SVMs
              • Verify the status of netgroup definitions
            • Create an NIS domain configuration
            • Use LDAP
              • Overview
              • Create a new LDAP client schema
              • Install the self-signed root CA certificate on the SVM
              • Create an LDAP client configuration
              • Associate the LDAP client configuration with SVMs
              • Verify LDAP sources in the name service switch table
          • Use Kerberos with NFS for strong security
            • Overview
            • Verify permissions for Kerberos configuration
            • Create an NFS Kerberos realm configuration
            • Configure NFS Kerberos permitted encryption types
            • Enable Kerberos on a data LIF
        • Add storage capacity to an NFS-enabled SVM
          • Overview
          • Create an export policy
          • Add a rule to an export policy
          • Create a volume or qtree storage container
            • Create a volume
            • Create a qtree
          • Secure NFS access using export policies
            • Overview
            • Manage the processing order of export rules
            • Assign an export policy to a volume
            • Assign an export policy to a qtree
          • Verify NFS client access from the cluster
          • Test NFS access from client systems
        • Where to find additional information
        • How ONTAP exports differ from 7-Mode exports
          • Overview
          • Comparison of exports in 7-Mode and ONTAP
          • Examples of ONTAP export policies
      • Manage NFS with the CLI
        • Overview
        • Understand NAS file access
          • Namespaces and junction points
            • Overview
            • What the typical NAS namespace architectures are
          • How ONTAP controls access to files
            • Overview
            • Authentication-based restrictions
            • File-based restrictions
          • How ONTAP handles NFS client authentication
            • Overview
            • How ONTAP uses name services
            • How ONTAP grants SMB file access from NFS clients
            • How the NFS credential cache works
        • Create and manage data volumes in NAS namespaces
          • Create data volumes with specified junction points
          • Creating data volumes without specifying junction points
          • Mounting or unmounting existing volumes in the NAS namespace
          • Displaying volume mount and junction point information
        • Configure security styles
          • How security styles affect data access
            • What the security styles and their effects are
            • Where and when to set security styles
            • Decide which security style to use on SVMs
            • How security style inheritance works
            • How ONTAP preserves UNIX permissions
            • Manage UNIX permissions using the Windows Security tab
          • Configure security styles on SVM root volumes
          • Configure security styles on FlexVol volumes
          • Configure security styles on qtrees
        • Set up file access using NFS
          • Overview
          • Secure NFS access using export policies
            • How export policies control client access to volumes or qtrees
            • Default export policy for SVMs
            • How export rules work
            • Manage clients with an unlisted security type
            • How security types determine client access levels
            • Manage superuser access requests
            • How ONTAP uses export policy caches
            • How the access cache works
            • How access cache parameters work
            • Removing an export policy from a qtree
            • Validating qtree IDs for qtree file operations
            • Export policy restrictions and nested junctions for FlexVol volumes
          • Using Kerberos with NFS for strong security
            • ONTAP support for Kerberos
            • Requirements for configuring Kerberos with NFS
            • Specifying the user ID domain for NFSv4
          • Configure name services
            • How ONTAP name service switch configuration works
            • Use LDAP
              • Overview
              • LDAP signing and sealing concepts
              • LDAPS concepts
              • Enable LDAP RFC2307bis support
              • Configuration options for LDAP directory searches
              • Improve performance of LDAP directory netgroup-by-host searches
              • Use LDAP fast bind for nsswitch authentication
              • Display LDAP statistics
          • Configure name mappings
            • Overview
            • How name mapping works
            • Multidomain searches for UNIX user to Windows user name mappings
            • Name mapping conversion rules
            • Create a name mapping
            • Configure the default user
            • Commands for managing name mappings
          • Enable access for Windows NFS clients
          • Enable the display of NFS exports on NFS clients
        • Manage file access using NFS
          • Enable or disable NFSv3
          • Enable or disable NFSv4.0
          • Enable or disable NFSv4.1
          • Enable or disable pNFS
          • Controlling NFS access over TCP and UDP
          • Controlling NFS requests from nonreserved ports
          • Handling NFS access to NTFS volumes or qtrees for unknown UNIX users
          • Considerations for clients that mount NFS exports using a nonreserved port
          • Performing stricter access checking for netgroups by verifying domains
          • Modifying ports used for NFSv3 services
          • Commands for managing NFS servers
          • Troubleshooting name service issues
          • Verifying name service connections
          • Commands for managing name service switch entries
          • Commands for managing name service cache
          • Commands for managing name mappings
          • Commands for managing local UNIX users
          • Commands for managing local UNIX groups
          • Limits for local UNIX users, groups, and group members
          • Manage limits for local UNIX users and groups
          • Commands for managing local netgroups
          • Commands for managing NIS domain configurations
          • Commands for managing LDAP client configurations
          • Commands for managing LDAP configurations
          • Commands for managing LDAP client schema templates
          • Commands for managing NFS Kerberos interface configurations
          • Commands for managing NFS Kerberos realm configurations
          • Commands for managing export policies
          • Commands for managing export rules
          • Configure the NFS credential cache
            • Reasons for modifying the NFS credential cache time-to-live
            • Configure the time-to-live for cached NFS user credentials
          • Manage export policy caches
            • Flush export policy caches
            • Display the export policy netgroup queue and cache
            • Checking whether a client IP address is a member of a netgroup
            • Optimizing access cache performance
          • Manage file locks
            • About file locking between protocols
            • How ONTAP treats read-only bits
            • How ONTAP differs from Windows on handling locks on share path components
            • Display information about locks
            • Breaking locks
          • How FPolicy first-read and first-write filters work with NFS
          • Modifying the NFSv4.1 server implementation ID
          • Manage NFSv4 ACLs
            • Benefits of enabling NFSv4 ACLs
            • How NFSv4 ACLs work
            • Enable or disable modification of NFSv4 ACLs
            • How ONTAP uses NFSv4 ACLs to determine whether it can delete a file
            • Enable or disable NFSv4 ACLs
            • Modifying the maximum ACE limit for NFSv4 ACLs
          • Manage NFSv4 file delegations
            • Enable or disable NFSv4 read file delegations
            • Enable or disable NFSv4 write file delegations
          • Configure NFSv4 file and record locking
            • About NFSv4 file and record locking
            • Specifying the NFSv4 locking lease period
            • Specifying the NFSv4 locking grace period
          • How NFSv4 referrals work
          • Enable or disable NFSv4 referrals
          • Displaying NFS statistics
          • Displaying DNS statistics
          • Displaying NIS statistics
          • Support for VMware vStorage over NFS
          • Enable or disable VMware vStorage over NFS
          • Enable or disable rquota support
          • NFSv3 and NFSv4 performance improvement by modifying the TCP transfer size
          • Modifying the NFSv3 and NFSv4 TCP maximum transfer size
          • Configure the number of group IDs allowed for NFS users
          • Controlling root user access to NTFS security-style data
        • Supported NFS versions and clients
          • Overview
          • NFSv4.0 functionality supported by ONTAP
          • Limitations of ONTAP support for NFSv4
          • ONTAP support for NFSv4.1
          • ONTAP support for NFSv4.2
          • ONTAP support for parallel NFS
          • Use of hard mounts
        • NFS and SMB file and directory naming dependencies
          • Overview
          • Characters a file or directory name can use
          • Case-sensitivity of file and directory names in a multiprotocol environment
          • How ONTAP creates file and directory names
          • How ONTAP handles multi-byte file, directory, and qtree names
          • Configure character mapping for SMB file name translation on volumes
          • Commands for managing character mappings for SMB file name translation
      • Manage NFS over RDMA
        • Overview
        • Configure NICS and NFS
        • Configure LIFs
        • Modify the NFS settings
      • Configure SMB with the CLI
        • Overview
        • Workflow
        • Preparation
          • Assess physical storage requirements
          • Assess networking requirements
          • Decide where to provision new SMB storage capacity
          • Worksheet for gathering SMB configuration information
        • Configure SMB access to an SVM
          • Overview
          • Create an SVM
          • Verify that the SMB protocol is enabled on the SVM
          • Open the export policy of the SVM root volume
          • Create a LIF
          • Enable DNS for host-name resolution
          • Set up an SMB server in an Active Directory domain
            • Configure time services
            • Commands for managing symmetric authentication on NTP servers
            • Create an SMB server in an Active Directory domain
            • Create keytab files for SMB authentication
          • Set up an SMB server in a workgroup
            • Overview
            • Create an SMB server in a workgroup
            • Create local user accounts
            • Create local groups
            • Manage local group membership
          • Verify enabled SMB versions
          • Map the SMB server on the DNS server
        • Configure SMB client access to shared storage
          • Overview
          • Create a volume or qtree storage container
            • Create a volume
            • Create a qtree
          • Requirements and considerations for creating an SMB share
          • Create an SMB share
          • Verify SMB client access
          • Create SMB share access control lists
          • Configure NTFS file permissions in a share
          • Verify user access
      • Manage SMB with the CLI
        • Overview
        • SMB server support
          • Overview
          • Supported SMB versions and functionality
          • Unsupported Windows features
          • Configure NIS or LDAP name services on the SVM
          • How ONTAP name service switch configuration works
        • Manage SMB servers
          • Modify SMB servers
          • Use options to customize SMB servers
            • Available SMB server options
            • Configure SMB server options
            • Configure the grant UNIX group permission to SMB users
            • Configure access restrictions for anonymous users
            • Manage how file security is presented to SMB clients for UNIX security-style data
              • Overview
              • Enable or disable the presentation of NTFS ACLs for UNIX security-style data
              • How ONTAP preserves UNIX permissions
              • Manage UNIX permissions using the Windows Security tab
          • Manage SMB server security settings
            • How ONTAP handles SMB client authentication
            • Guidelines for SMB server security settings in an SVM disaster recovery configuration
            • Display information about CIFS server security settings
            • Enable or disable required password complexity for local SMB users
            • Modify the CIFS server Kerberos security settings
            • Set the CIFS server minimum authentication security level
            • Configure strong security for Kerberos-based communication by using AES encryption
            • Enable or disable AES encryption for Kerberos-based communication
            • Use SMB signing to enhance network security
              • Overview
              • How SMB signing policies affect communication with a CIFS server
              • Performance impact of SMB signing
              • Recommendations for configuring SMB signing
              • Guidelines for SMB signing when multiple data LIFS are configured
              • Enable or disable required SMB signing for incoming SMB traffic
              • Determining whether SMB sessions are signed
              • Monitor SMB signed session statistics
            • Configure required SMB encryption on SMB servers for data transfers over SMB
              • Overview
              • Performance impact of SMB encryption
              • Enable or disable required SMB encryption for incoming SMB traffic
              • Determine whether clients are connected using encrypted SMB sessions
              • Monitor SMB encryption statistics
            • Secure LDAP session communication
              • LDAP signing and sealing concepts
              • Enable LDAP signing and sealing on the CIFS server
              • Configure LDAP over TLS
                • Export a copy of the self-signed root CA certificate
                • Install the self-signed root CA certificate on the SVM
                • Enable LDAP over TLS on the CIFS server
          • Configure SMB Multichannel for performance and redundancy
          • Configure default Windows user to UNIX user mappings on the SMB server
            • Configure the default UNIX user
            • Configure the guest UNIX user
            • Map the administrators group to root
          • Display information about what types of users are connected over SMB sessions
          • Command options to limit excessive Windows client resource consumption
          • Improve client performance with traditional and lease oplocks
            • Overview
            • Write cache data-loss considerations when using oplocks
            • Enable or disable oplocks when creating SMB shares
            • Commands for enabling or disabling oplocks on volumes and qtrees
            • Enable or disable oplocks on existing SMB shares
            • Monitor oplock status
          • Apply Group Policy Objects to SMB servers
            • Overview
            • Supported GPOs
            • Requirements for using GPOs with your CIFS server
            • Enable or disable GPO support on a SMB server
            • How GPOs are updated on the SMB server
              • Overview
              • What to do if GPO updates are failing
            • Manually updating GPO settings on the CIFS server
            • Display information about GPO configurations
            • Display detailed information about restricted group GPOs
            • Display information about central access policies
            • Display information about central access policy rules
          • Commands for managing CIFS servers computer account passwords
          • Manage domain controller connections
            • Display information about discovered servers
            • Reset and rediscover servers
            • Manage domain controller discovery
            • Add preferred domain controllers
            • Commands for managing preferred domain controllers
            • Enable SMB2 connections to domain controllers
            • Enable encrypted connections to domain controllers
          • Use null sessions to access storage in non-Kerberos environments
            • Overview
            • How the storage system provides null session access
            • Grant null users access to file system shares
          • Manage NetBIOS aliases for SMB servers
            • Overview
            • Add a list of NetBIOS aliases to the CIFS server
            • Remove NetBIOS aliases from the NetBIOS alias list
            • Display the list of NetBIOS aliases on CIFS servers
            • Determine whether SMB clients are connected using NetBIOS aliases
          • Manage miscellaneous SMB server tasks
            • Stop or start the CIFS server
            • Move CIFS servers to different OUs
            • Modify the dynamic DNS domain on the SVM before moving the SMB server
            • Join anSVM to an Active Directory domain
            • Display information about NetBIOS over TCP connections
            • Commands for managing CIFS servers
            • Enable the NetBios name service
          • Use IPv6 for SMB access and SMB services
            • Requirements for using IPv6
            • Support for IPv6 with SMB access and CIFS services
            • How CIFS servers use IPv6 to connect to external servers
            • Enable IPv6 for SMB (cluster administrators only)
            • Disable IPv6 for SMB
            • Monitor and display information about IPv6 SMB sessions
        • Set up file access using SMB
          • Configure security styles
            • How security styles affect data access
              • What the security styles and their effects are
              • Where and when to set security styles
              • Decide which security style to use on SVMs
              • How security style inheritance works
              • How ONTAP preserves UNIX permissions
              • Manage UNIX permissions using the Windows Security tab
            • Configure security styles on SVM root volumes
            • Configure security styles on FlexVol volumes
            • Configure security styles on qtrees
          • Create and manage data volumes in NAS namespaces
            • Overview
            • Create data volumes with specified junction points
            • Create data volumes without specifying junction points
            • Mount or unmount existing volumes in the NAS namespace
            • Display volume mount and junction point information
          • Configure name mappings
            • Overview
            • How name mapping works
            • Multidomain searches for UNIX user to Windows user name mappings
            • Name mapping conversion rules
            • Create a name mapping
            • Configure the default user
            • Commands for managing name mappings
          • Configure multidomain name-mapping searches
            • Enable or disable multidomain name mapping searches
            • Reset and rediscover trusted domains
            • Display information about discovered trusted domains
            • Add, remove, or replace trusted domains in preferred trusted domain lists
            • Display information about the preferred trusted domain list
          • Create and configure SMB shares
            • Overview
            • What the default administrative shares are
            • SMB share naming requirements
            • Directory case-sensitivity requirements when creating shares in a multiprotocol environment
            • Use SMB share properties
              • Overview
              • Add or remove share properties on an existing SMB share
            • Optimize SMB user access with the force-group share setting
            • Create an SMB share with the force-group share setting
            • View information about SMB shares using the MMC
            • Commands for managing SMB shares
          • Secure file access by using SMB share ACLs
            • Guidelines for managing SMB share-level ACLs
            • Create SMB share access control lists
            • Commands for managing SMB share access control lists
          • Secure file access by using file permissions
            • Configure advanced NTFS file permissions using the Windows Security tab
            • Configure NTFS file permissions using the ONTAP CLI
            • How UNIX file permissions provide access control when accessing files over SMB
          • Secure file access by using Dynamic Access Control (DAC)
            • Overview
            • Supported Dynamic Access Control functionality
            • Considerations when using Dynamic Access Control and central access policies with CIFS servers
            • Enable or disable Dynamic Access Control
            • Manage ACLs that contain Dynamic Access Control ACEs when Dynamic Access Control is disabled
            • Configure central access policies to secure data on CIFS servers
            • Display information about Dynamic Access Control security
            • Revert considerations for Dynamic Access Control
            • Where to find additional information about configuring and using Dynamic Access Control and central access policies
          • Secure SMB access using export policies
            • How export policies are used with SMB access
            • How export rules work
            • Examples of export policy rules that restrict or allow access over SMB
            • Enable or disable export policies for SMB access
          • Secure file access by using Storage-Level Access Guard
            • Overview
            • Use cases for using Storage-Level Access Guard
            • Workflow to configure Storage-Level Access Guard
            • Configure Storage-Level Access Guard
            • Effective SLAG matrix
            • Display information about Storage-Level Access Guard
            • Remove Storage-Level Access Guard
        • Manage file access using SMB
          • Use local users and groups for authentication and authorization
            • How ONTAP uses local users and groups
              • Local users and groups concepts
              • Reasons for creating local users and local groups
              • How local user authentication works
              • How user access tokens are constructed
              • Guidelines for using SnapMirror on SVMs that contain local groups
              • What happens to local users and groups when deleting CIFS servers
              • How you can use Microsoft Management Console with local users and groups
              • Guidelines for reverting
            • What local privileges are
              • List of supported privileges
              • Assign privileges
            • Guidelines for using BUILTIN groups and the local administrator account
            • Requirements for local user passwords
            • Predefined BUILTIN groups and default privileges
            • Enable or disable local users and groups functionality
              • Overview
              • Enable or disable local users and groups
              • Enable or disable local user authentication
            • Manage local user accounts
              • Modify local user accounts
              • Enable or disable local user accounts
              • Change local user account passwords
              • Display information about local users
              • Display information about group memberships for local users
              • Delete local user accounts
            • Manage local groups
              • Modify local groups
              • Display information about local groups
              • Manage local group membership
              • Display information about members of local groups
              • Delete a local group
              • Update domain user and group names in local databases
            • Manage local privileges
              • Add privileges to local or domain users or groups
              • Remove privileges from local or domain users or groups
              • Reset privileges for local or domain users and groups
              • Display information about privilege overrides
          • Configure bypass traverse checking
            • Overview
            • Allow users or groups to bypass directory traverse checking
            • Disallow users or groups from bypassing directory traverse checking
          • Display information about file security and audit policies
            • Overview
            • Display information about file security on NTFS security-style volumes
            • Display information about file security on mixed security-style volumes
            • Display information about file security on UNIX security-style volumes
            • Display information about NTFS audit policies on FlexVol volumes using the CLI
            • Display information about NFSv4 audit policies on FlexVol volumes using the CLI
            • Ways to display information about file security and audit policies
          • Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
            • Overview
            • Use cases for using the CLI to set file and folder security
            • Limits when using the CLI to set file and folder security
            • How security descriptors are used to apply file and folder security
            • Guidelines for applying file-directory policies that use local users or groups on the SVM disaster recovery destination
            • Configure and apply file security on NTFS files and folders using the CLI
              • Create an NTFS security descriptor
              • Add NTFS DACL access control entries to the NTFS security descriptor
              • Create security policies
              • Add a task to the security policy
              • Apply security policies
              • Monitor the security policy job
              • Verify the applied file security
            • Configure and apply audit policies to NTFS files and folders using the CLI
              • Create an NTFS security descriptor
              • Add NTFS SACL access control entries to the NTFS security descriptor
              • Create security policies
              • Add a task to the security policy
              • Apply security policies
              • Monitor the security policy job
              • Verify the applied audit policy
            • Considerations when managing security policy jobs
            • Commands for managing NTFS security descriptors
            • Commands for managing NTFS DACL access control entries
            • Commands for managing NTFS SACL access control entries
            • Commands for managing security policies
            • Commands for managing security policy tasks
            • Commands for managing security policy jobs
          • Configure the metadata cache for SMB shares
            • How SMB metadata caching works
            • Enable the SMB metadata cache
            • Configure the lifetime of SMB metadata cache entries
          • Manage file locks
            • About file locking between protocols
            • How ONTAP treats read-only bits
            • How ONTAP differs from Windows on handling locks on share path components
            • Display information about locks
            • Breaking locks
          • Monitor SMB activity
            • Display SMB session information
            • Display information about open SMB files
            • Determine which statistics objects and counters are available
            • Display statistics
        • Deploy SMB client-based services
          • Use offline files to allow caching of files for offline use
            • Overview
            • Requirements for using offline files
            • Guidelines for deploying offline files
            • Configure offline files support on SMB shares using the CLI
            • Configure offline files support on SMB shares by using the Computer Management MMC
          • Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
            • Overview
            • Requirements for using roaming profiles
            • Configure roaming profiles
          • Use folder redirection to store data on a SMB server
            • Overview
            • Requirements for using folder redirection
            • Configure folder redirection
          • Access the ~snapshot directory from Windows clients using SMB 2.x
          • Recover files and folders using Previous Versions
            • Overview
            • Requirements for using Microsoft Previous Versions
            • Use the Previous Versions tab to view and manage Snapshot copy data
            • Determine whether Snapshot copies are available for Previous Versions use
            • Create a Snapshot configuration to enable Previous Versions access
            • Guidelines for restoring directories that contain junctions
        • Deploy SMB server-based services
          • Manage home directories
            • How ONTAP enables dynamic home directories
            • Home directory shares
              • Add a home director share
              • Home directory shares require unique user names
              • What happens to static home directory share names after upgrading
            • Add a home directory search path
            • Create a home directory configuration using the %w and %d variables
            • Configure home directories using the %u variable
            • Additional home directory configurations
            • Commands for managing search paths
            • Display information about an SMB user’s home directory path
            • Manage accessibility to users' home directories
          • Configure SMB client access to UNIX symbolic links
            • How ONTAP enables you to provide SMB client access to UNIX symbolic links
            • Limits when configuring UNIX symbolic links for SMB access
            • Control automatic DFS advertisements in ONTAP with a CIFS server option
            • Configure UNIX symbolic link support on SMB shares
            • Create symbolic link mappings for SMB shares
            • Commands for managing symbolic link mappings
          • Use BranchCache to cache SMB share content at a branch office
            • Requirements and guidelines
              • BranchCache version support
              • Network protocol support requirements
              • ONTAP and Windows hosts version requirements
              • Reasons ONTAP invalidates BranchCache hashes
              • Guidelines for choosing the hash store location
              • BranchCache recommendations
            • Configure BranchCache
              • Overview
              • Requirements for configuring BranchCache
              • Configure BranchCache on the SMB server
              • Where to find information about configuring BranchCache at the remote office
            • Configure BranchCache-enabled SMB shares
              • Overview
              • Create a BranchCache-enabled SMB share
              • Enable BranchCache on an existing SMB share
            • Manage and monitor the BranchCache configuration
              • Modify BranchCache configurations
              • Display information about BranchCache configurations
              • Change the BranchCache server key
              • Pre-computing BranchCache hashes on specified paths
              • Flush hashes from the SVM BranchCache hash store
              • Display BranchCache statistics
              • Support for BranchCache Group Policy Objects
              • Display information about BranchCache Group Policy Objects
            • Disable BranchCache on SMB shares
              • Overview
              • Disable BranchCache on a single SMB share
              • Stop automatic caching on all SMB shares
            • Disable or enable BranchCache on the SVM
              • What happens when you disable or reenable BranchCache on the CIFS server
              • Disable or enable BranchCache
            • Delete the BranchCache configuration on SVMs
              • What happens when you delete the BranchCache configuration
              • Delete the BranchCache configuration
            • What happens to BranchCache when reverting
          • Improve Microsoft remote copy performance
            • Overview
            • How ODX works
            • Requirements for using ODX
            • Guidelines for using ODX
            • Use cases for ODX
            • Enable or disable ODX
          • Improve client response time by providing SMB automatic node referrals with Auto Location
            • Overview
            • Requirements and guidelines for using automatic node referrals
            • Support for SMB automatic node referrals
            • Enable or disable SMB automatic node referrals
            • Use statistics to monitor automatic node referral activity
            • Monitor client-side SMB automatic node referral information using a Windows client
          • Provide folder security on shares with access-based enumeration
            • Overview
            • Enable or disable access-based enumeration on SMB shares
            • Enable or disable access-based enumeration from a Windows client
        • NFS and SMB file and directory naming dependencies
          • Overview
          • Characters a file or directory name can use
          • Case-sensitivity of file and directory names in a multiprotocol environment
          • How ONTAP creates file and directory names
          • How ONTAP handles multi-byte file, directory, and qtree names
          • Configure character mapping for SMB file name translation on volumes
          • Commands for managing character mappings for SMB file name translation
      • Provide S3 client access to NAS data
        • Overview
        • NAS data requirements
        • Enable S3 multi-protocol access
        • Create S3 NAS bucket
        • Enable S3 client users
      • SMB configuration for Microsoft Hyper-V and SQL Server
        • Overview
        • Configure ONTAP for Microsoft Hyper-V and SQL Server over SMB solutions
        • Nondisruptive operations for Hyper-V and SQL Server over SMB
          • What are nondisruptive operations?
          • Protocols that enable nondisruptive operations over SMB
          • Key concepts about nondisruptive operations for Hyper-V and SQL Server over SMB
          • How SMB 3.0 functionality supports nondisruptive operations over SMB shares
          • What the Witness protocol does to enhance transparent failover
          • How the Witness protocol works
        • Share-based backups with Remote VSS
          • Overview
          • Remote VSS concepts
          • Example of a directory structure used by Remote VSS
          • How SnapManager for Hyper-V manages Remote VSS-based backups for Hyper-V over SMB
        • How ODX copy offload is used with Hyper-V and SQL Server over SMB shares
        • Configuration requirements and considerations
          • ONTAP and licensing requirements
          • Network and data LIF requirements
          • SMB server and volume requirements for Hyper-V over SMB
          • SMB server and volume requirements for SQL Server over SMB
          • Continuously available share requirements and considerations for Hyper-V over SMB
          • Continuously available share requirements and considerations for SQL Server over SMB
          • Remote VSS considerations for Hyper-V over SMB configurations
          • ODX copy offload requirements for SQL Server and Hyper-V over SMB
        • Recommendations for SQL Server and Hyper-V over SMB configurations
        • Plan the Hyper-V or SQL Server over SMB configuration
          • Complete the volume configuration worksheet
          • Complete the SMB share configuration worksheet
        • Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
          • Overview
          • Verify that both Kerberos and NTLMv2 authentication are permitted (Hyper-V over SMB shares)
          • Verify that domain accounts map to the default UNIX user
          • Verify that the security style of the SVM root volume is set to NTFS
          • Verify that required CIFS server options are configured
          • Configure SMB Multichannel for performance and redundancy
          • Create NTFS data volumes
          • Create continuously available SMB shares
          • Add the SeSecurityPrivilege privilege to the user account (for SQL Server of SMB shares)
          • Configure the VSS shadow copy directory depth (for Hyper-V over SMB shares)
        • Manage Hyper-V and SQL Server over SMB configurations
          • Configure existing shares for continuous availability
          • Enable or disable VSS shadow copies for Hyper-V over SMB backups
        • Use statistics to monitor Hyper-V and SQL Server over SMB activity
          • Determine which statistics objects and counters are available
          • Display SMB statistics
        • Verify that the configuration is capable of nondisruptive operations
          • Use health monitoring to determine whether nondisruptive operation status is healthy
          • Display nondisruptive operation status by using system health monitoring
          • Verify the continuously available SMB share configuration
          • Verify LIF status
          • Determine whether SMB sessions are continuously available
            • Display SMB session information
            • Display information about open SMB files
    • SAN storage management
      • SAN administration
        • SAN provisioning
          • Overview
          • Configure switches for FCoE
          • System requirements
          • What to know before you create a LUN
          • Verify or add the FC or iSCSI license
          • VMware datastores
          • Linux servers
          • Windows servers
          • Other hosts
        • NVMe provisioning
          • Overview
          • License requirements
          • NVMe support and limitations
          • Configure an SVM for NVMe
          • SUSE Linux
          • Other NVMe hosts
          • Map an NVMe namespace to a subsystem
        • Manage LUNs
          • Edit LUN QoS Policy
          • Convert a LUN into a namespace
          • Take a LUN offline
          • Resize a LUN
          • Move a LUN
          • Delete a LUN
          • What to know before copying LUNs
          • Examine configured and used space of a LUN
          • Control and monitor I/O performance to LUNs using Storage QoS
          • Tools available to effectively monitor your LUNs
          • Capabilities and restrictions of transitioned LUNs
          • I/O misalignments on properly aligned LUNs
          • Ways to address issues when LUNs go offline
          • Troubleshoot iSCSI LUNs not visible on the host
        • Manage igroups and portsets
          • Ways to limit LUN access with portsets and igroups
          • Manage igroups and initiators
          • Create nested igroup
          • Map igroup to multiple LUNs
          • Create a portset and bind to an igroup
          • Manage portsets
          • Selective LUN Map
            • Overview
            • Determine whether SLM is enabled on a LUN map
            • Modify the SLM reporting-nodes list
        • Manage iSCSI protocol
          • Configure your network for best performance
          • Configure an SVM for iSCSI
          • Define a security policy method for an initiator
          • Delete an iSCSI service for an SVM
          • Get more details in iSCSI session error recoveries
          • Register the SVM with an iSNS server
          • Resolve iSCSI error messages on the storage system
          • iSCSI LIF failover for ASA platforms
        • Manage FC protocol
          • Configure an SVM for FC
          • Delete an FC service for an SVM
          • Recommended MTU configurations for FCoE jumbo frames
        • Manage NVMe protocol
          • Start the NVMe/FC service for an SVM
          • Delete NVMe/FC service from an SVM
          • Resize a NVMe namespace
          • Convert a namespace into a LUN
          • Set up secure authentication over NVMe/TCP
          • Disable secure authentication over NVMe/TCP
        • Manage systems with FC adapters
          • Overview
          • Commands for managing FC adapters
          • Configure FC adapters
          • View adapter settings
          • Change the UTA2 port from CNA mode to FC mode
          • Change the CNA/UTA2 target adapter optical modules
          • Supported port configurations for X1143A-R6 adapters
          • Configure X1143A-R6 adapter ports
          • Prevent loss of connectivity when using the X1133A-R6 adapter
        • Manage LIFs for all SAN protocols
          • Overview
          • Configure an NVMe LIF
          • What to know before moving a SAN LIF
          • Remove a SAN LIF from a port set
          • Move a SAN LIF
          • Delete a LIF in a SAN environment
          • SAN LIF requirements for adding nodes to a cluster
          • Configure iSCSI LIFs to return FQDN to host iSCSI SendTargets Discovery Operation
        • Recommended volume and file or LUN configuration combinations
          • Overview
          • Determine the correct volume and LUN configuration combination for your environment
          • Calculate rate of data growth for LUNs
          • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
          • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
          • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
        • Data protection methods in SAN environments
          • Overview
          • Effect of moving or copying a LUN on Snapshot copies
            • Overview
            • Restore a single LUN from a Snapshot copy
            • Restore all LUNs in a volume from a Snapshot copy
            • Delete one or more existing Snapshot copies from a volume
          • Use FlexClone LUNs to protect your data
            • Overview
            • Reasons for using FlexClone LUNs
            • How a FlexVol volume can reclaim free space with autodelete setting
            • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
            • Clone LUNs from an active volume
            • Create FlexClone LUNs from a Snapshot copy in a volume
            • Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted
          • Configure and use SnapVault backups in a SAN environment
            • Overview
            • Access a read-only LUN copy from a SnapVault backup
            • Restore a single LUN from a SnapVault backup
            • Restore all LUNs in a volume from a SnapVault backup
          • How you can connect a host backup system to the primary storage system
          • Back up a LUN through a host backup system
        • SAN configurations in a MetroCluster environment
          • Overview
          • Prevent port overlap between switchover and switchback
        • SAN concepts
          • About SAN host provisioning
            • SAN provisioning with iSCSI
            • iSCSI service management
              • Overview
              • How iSCSI authentication works
              • iSCSI initiator security management
              • iSCSI endpoint isolation
              • What CHAP authentication is
              • How using iSCSI interface access lists to limit initiator interfaces can increase performance and security
              • iSNS server registration requirement
                • What iSNS is
                • How SVMs interact with an iSNS server
                • Commands for managing iSNS
            • SAN provisioning with FC
            • SAN provisioning with NVMe
          • About SAN volumes
            • Overview
            • Configure volume provisioning options
            • SAN volume configuration options
            • Requirement for moving volumes in SAN environments
            • Considerations for setting fractional reserve
          • About host-side space management
            • Overview
            • Automatic host-side space management with SCSI thinly provisioned LUNs
            • Enable space allocation for SCSI thinly provisioned LUNs
            • Host support for SCSI thin provisioning
            • Simplified host management with SnapCenter
          • About igroups
          • Example of how igroups give LUN access
          • Specify initiator WWPNs and iSCSI node names for an igroup
          • Storage virtualization with VMware and Microsoft copy offload
            • Overview
            • How LUN access works in a virtualized environment
            • Considerations for LIFs in cluster SAN environments
            • Improve VMware VAAI performance for ESX hosts
            • Microsoft Offloaded Data Transfer (ODX)
              • Overview
              • Requirements for using ODX
              • Use cases for ODX
      • SAN configuration reference
        • Overview
        • Considerations for iSCSI configurations
          • Overview
          • Ways to configure iSCSI SAN hosts with single nodes
          • Ways to configure iSCSI SAN hosts with HA pairs
          • Benefits of using VLANs in iSCSI configurations
        • Considerations for FC-NVMe configurations
        • Considerations for FC configurations
          • Overview
          • Ways to configure FC and FC-NVMe SAN hosts with single nodes
          • Ways to configure FC & FC-NVMe SAN hosts with HA pairs
          • FC switch configuration best practices
          • Supported number of FC hop counts
          • FC target port supported speeds
          • FC Target port configuration recommendations
        • Manage systems with FC adapters
          • Overview
          • Commands for managing FC adapters
          • Configure FC adapters for initiator mode
          • Configure FC adapters for target mode
          • Display information about an FC target adapter
          • Change the FC adapter speed
          • Supported FC ports
          • Prevent loss of connectivity when using the X1133A-R6 adapter
          • Manage X1143A-R6 adapters
            • Overview
            • Configure the ports
            • Change the UTA2 port from CNA mode to FC mode
            • Change the CNA/UTA2 target adapter optical modules
            • View adapter settings
        • Ways to Configure FCoE
          • Overview
          • FCoE initiator and target combinations
          • FCoE supported hop count
        • Fibre Channel and FCoE zoning
          • Overview
          • World Wide Name-based zoning
          • Individual zones
          • Single-fabric zoning
          • Dual-fabric HA pair zoning
          • Zoning restrictions for Cisco FC and FCoE switches
        • Requirements for shared SAN configurations
        • Host support for multipathing
          • Overview
          • When host multipathing software is required
          • Recommended number of paths from host to nodes in cluster
        • Configuration limits
          • Determine the number of supported nodes for SAN configurations
          • Determine the number of supported hosts per cluster in FC and FC-NVMe configurations
          • Determine the supported number of hosts in iSCSI configurations
          • FC switch configuration limits
          • Calculate queue depth
          • Set queue depths
        • Considerations for SAN configurations in a MetroCluster environment
    • S3 object storage management
      • S3 configuration
        • Overview
        • S3 support in ONTAP 9
          • ONTAP S3 architecture and use cases
          • ONTAP version support for S3 object storage
          • ONTAP S3 supported actions
          • ONTAP S3 interoperability
        • About the S3 configuration process
          • Workflow
          • Assess physical storage requirements
          • Assess networking requirements
          • Decide where to provision new S3 storage capacity
        • Configure S3 access to an SVM
          • Create an SVM for S3
          • Create and install a CA certificate on the SVM
          • Create an S3 service data policy
          • Create data LIFs
          • Create intercluster LIFs for remote FabricPool tiering
          • Create the S3 object store server
        • Add storage capacity to an S3-enabled SVM
          • Create a bucket
          • Create an S3 user
          • Create or modify S3 groups
          • Create or modify access policy statements
            • About bucket and object store server policies
            • Modify a bucket policy
            • Create or modify an object store server policy
          • Enable client access to S3 object storage
            • Enable ONTAP S3 access for remote FabricPool tiering
            • Enable ONTAP S3 access for local FabricPool tiering
            • Enable client access from an S3 app
        • Storage service definitions
      • Protect buckets with S3 SnapMirror
        • Overview
        • Mirror and backup protection on a remote cluster
          • Create mirror for new bucket
          • Create mirror for existing bucket
          • Takeover from destination
          • Restore from destination
        • Mirror and backup protection on the local cluster
          • Create mirror for new bucket
          • Create mirror for existing bucket
          • Takeover from destination
          • Restore from destination
        • Backup protection with cloud targets
          • Requirements for cloud targets
          • Create backup for new bucket
          • Create backup for existing bucket
          • Restore from cloud target
        • Modify mirror policy
      • Audit S3 events
        • Overview
        • Plan a configuration
        • Create and enable the configuration
        • Select buckets for auditing
        • Modify the configuration
        • Show configurations
    • Security and data encryption
      • Manage security with System Manager
        • Security overview
        • Multi-factor authentication
        • Control administrator access
        • Diagnose and correct file access issues
        • Manage certificates
      • Manage administrator authentication and RBAC with the CLI
        • Overview
        • Workflow
        • Configuration worksheets
        • Create login accounts
          • Overview
          • Enable local account access
            • Overview
            • Enable password account access
            • Enable SSH public key accounts
            • Enable SSH multifactor authentication (MFA)
            • Enable SSL certificate accounts
          • Enable Active Directory account access
          • Enable LDAP or NIS account access
          • Configure SAML authentication
        • Manage access-control roles
          • Overview
          • Modify the role assigned to an administrator
          • Define custom roles
          • Predefined roles for cluster administrators
          • Predefined roles for SVM administrators
        • Manage administrator accounts
          • Overview
          • Associate a public key with an administrator account
          • Generate and install a CA-signed server certificate
            • Overview
            • Generate a certificate signing request
            • Install a CA-signed server certificate
          • Configure Active Directory domain controller access
            • Overview
            • Configure an authentication tunnel
            • Create an SVM computer account on the domain
          • Configure LDAP or NIS server access
            • Overview
            • Configure LDAP server access
            • Configure NIS server access
            • Create a name service switch
          • Change an administrator password
          • Lock and unlock an administrator account
          • Manage failed login attempts
          • Enforce SHA-2 on administrator account passwords
        • Manage multi-admin verification
          • Overview
          • Manage administrator groups
          • Enable and disable multi-admin verification
          • Manage protected operation rules
          • Request execution of protected operations
          • Manage protected operation requests
      • Ransomware protection
        • Overview
        • Use cases and considerations
        • Enable
        • Enable by default
        • Pause
        • Respond to abnormal activity
        • Recover data after an attack
        • Modify Snapshot copy options
      • Antivirus configuration
        • Overview
        • About NetApp antivirus protection
          • Understanding NetApp virus scanning
          • Virus scanning workflow
          • Antivirus architecture
        • Vscan server installation and configuration
        • Configure scanner pools
          • Overview
          • Create a scanner pool on a single cluster
          • Create scanner pools in MetroCluster configurations
          • Apply a scanner policy on a single cluster
          • Apply scanner policies in MetroCluster configurations
          • Commands for managing scanner pools
        • Configure on-access scanning
          • Create an on-access policy
          • Enable an on-access policy
          • Modify the Vscan file-operations profile for an SMB share
          • Commands for managing on-access policies
        • Configure on-demand scanning
          • Overview
          • Create an on-demand task
          • Schedule an on-demand task
          • Run an on-demand task immediately
          • Commands for managing on-demand tasks
        • Enable virus scanning on an SVM
        • Reset the status of scanned files
        • View Vscan event log information
        • Troubleshoot connectivity issues
          • Potential connectivity issues involving the scan-mandatory option
          • Commands for viewing Vscan server connection status
      • NAS auditing and security tracing
        • Overview
        • Audit NAS events on SVMs
          • Overview
          • How auditing works
            • Basic auditing concepts
            • How the ONTAP auditing process works
          • Auditing requirements and considerations
          • Limitations for the size of audit records on staging files
          • What the supported audit event log formats are
          • View audit event logs
          • SMB events that can be audited
            • Overview
            • Determine what the complete path to the audited object is
            • Considerations when auditing symlinks and hard links
            • Considerations when auditing alternate NTFS data streams
          • NFS file and directory access events that can be audited
          • Plan the auditing configuration
          • Create a file and directory auditing configuration on SVMs
            • Create the auditing configuration
            • Enable auditing on the SVM
            • Verify the auditing configuration
          • Configure file and folder audit policies
            • Overview
            • Configure audit policies on NTFS security-style files and directories
            • Configure auditing for UNIX security style files and directories
          • Display information about audit policies applied to files and directories
            • Display information about audit policies using the Windows Security tab
            • Display information about NTFS audit policies on FlexVol volumes using the CLI
            • Ways to display information about file security and audit policies
          • CLI change events that can be audited
            • Overview
            • Manage file-share event
            • Manage audit-policy-change event
            • Manage user-account event
            • Manage security-group event
            • Manage authorization-policy-change event
          • Manage auditing configurations
            • Manually rotate the audit event logs
            • Enable and disable auditing on SVMs
            • Display information about auditing configurations
            • Commands for modifying auditing configurations
            • Delete an auditing configuration
            • What the process is when reverting
          • Troubleshoot auditing and staging volume space issues
        • Use FPolicy for file monitoring and management on SVMs
          • How FPolicy works
            • What the two parts of the FPolicy solution are
            • What synchronous and asynchronous notifications are
            • Roles that cluster components play with FPolicy implementation
            • How FPolicy works with external FPolicy servers
              • Overview
              • How control channels are used for FPolicy communication
              • How privileged data access channels are used for synchronous communication
              • How FPolicy connection credentials are used with privileged data access channels
              • What granting super user credentials for privileged data access means
              • How FPolicy manages policy processing
            • What the node-to-external FPolicy server communication process is
            • How FPolicy services work across SVM namespaces
          • FPolicy configuration types
          • How FPolicy passthrough-read enhances usability for hierarchical storage management
          • Requirements, considerations, and best practices for configuring FPolicy
          • What the steps for setting up an FPolicy configuration are
          • Plan the FPolicy configuration
            • Plan the FPolicy external engine configuration
              • Additional information about configuring FPolicy external engines to use SSL authenticated connections
              • Certificates do not replicate in SVM disaster recovery relationships with a non-ID-preserve configuration
              • Restrictions for cluster-scoped FPolicy external engines with MetroCluster and SVM disaster recovery configurations
              • Complete the FPolicy external engine configuration worksheet
            • Plan the FPolicy event configuration
              • Overview
              • List of supported file operation and filter combinations that FPolicy can monitor for SMB
              • Supported file operation and filter combinations that FPolicy can monitor for NFSv3
              • Supported file operation and filter combinations that FPolicy can monitor for NFSv4
              • Complete the FPolicy event configuration worksheet
            • Plan the FPolicy policy configuration
              • Overview
              • Requirement for FPolicy scope configurations if the FPolicy policy uses the native engine
              • Complete the FPolicy policy worksheet
            • Plan the FPolicy scope configuration
              • Overview
              • Complete the FPolicy scope worksheet
          • Create the FPolicy configuration
            • Create the FPolicy external engine
            • Create the FPolicy event
            • Create the FPolicy policy
            • Create the FPolicy scope
            • Enable the FPolicy policy
          • Modify FPolicy configurations
            • Commands for modifying FPolicy configurations
            • Enable or disabling FPolicy policies
          • Display information about FPolicy configurations
            • How the show commands work
            • Commands for displaying information about FPolicy configurations
            • Display information about FPolicy policy status
            • Display information about enabled FPolicy policies
          • Manage FPolicy server connections
            • Connect to external FPolicy servers
            • Disconnect from external FPolicy servers
            • Display information about connections to external FPolicy servers
            • Display information about the FPolicy passthrough-read connection status
        • Use security tracing to verify or troubleshoot file and directory access
          • How security traces work
          • Types of access checks security traces monitor
          • Considerations when creating security traces
          • Perform security traces
            • Overview
            • Create security trace filters
            • Display information about security trace filters
            • Display security trace results
            • Modify security trace filters
            • Delete security trace filters
            • Delete security trace records
            • Delete all security trace records
          • Interpret security trace results
        • Where to find additional information
      • Manage encryption with System Manager
        • Encrypt stored data (software)
        • Encrypt stored data (hardware)
      • Manage encryption with the CLI
        • Overview
        • Configure NetApp Volume Encryption
          • Overview
          • NetApp Volume Encryption workflow
          • Configure NVE
            • Determine whether your cluster version supports NVE
            • Install the license
            • Configure external key management
              • Overview
              • Install SSL certificates on the cluster
              • Enable external key management in ONTAP 9.6 and later (NVE)
              • Enable external key management in ONTAP 9.5 and earlier
              • Manage keys with Azure or Google key managements services
            • Enable onboard key management in ONTAP 9.6 and later (NVE)
            • Enable onboard key management in ONTAP 9.5 and earlier (NVE)
            • Enable onboard key management in newly added nodes
          • Encrypt volume data with NVE
            • Overview
            • Enable aggregate-level encryption with VE license
            • Enable encryption on a new volume
            • Enable encryption on an existing volume with the volume encryption conversion start command
            • Enable encryption on an existing volume with the volume move start command
            • Enable node root volume encryption
        • Configure NetApp hardware-based encryption
          • Overview
          • Hardware-based encryption workflow
          • Configure external key management
            • Overview
            • Collect network information in ONTAP 9.2 and earlier
            • Install SSL certificates on the cluster
            • Enable external key management in ONTAP 9.6 and later (HW-based)
            • Enable external key management in ONTAP 9.5 and earlier
            • Configure clustered external key server
            • Create authentication keys in ONTAP 9.6 and later
            • Create authentication keys in ONTAP 9.5 and earlier
            • Assign a data authentication key to a FIPS drive or SED (external key management)
          • Configure onboard key management
            • Enable onboard key management in ONTAP 9.6 and later
            • Enable onboard key management in ONTAP 9.5 and earlier
            • Assign a data authentication key to a FIPS drive or SED (onboard key management)
          • Assign a FIPS 140-2 authentication key to a FIPS drive
          • Enable cluster-wide FIPS-compliant mode for KMIP server connections
        • Manage NetApp encryption
          • Unencrypting volume data
          • Move an encrypted volume
          • Delegate authority to run the volume move command
          • Change the encryption key for a volume with the volume encryption rekey start command
          • Change the encryption key for a volume with the volume move start command
          • Rotate authentication keys for NetApp Storage Encryption
          • Delete an encrypted volume
          • Securely purge data on an encrypted volume
            • Overview
            • Securely purge data on an encrypted volume without a SnapMirror relationship
            • Securely purge data on an encrypted volume with an Asynchronous SnapMirror relationship
            • Scrub data on an encrypted volume with a Synchronous SnapMirror relationship
          • Change the onboard key management passphrase
          • Back up onboard key management information manually
          • Restore onboard key management encryption keys
          • Restore external key management encryption keys
          • Replace SSL certificates
          • Replace a FIPS drive or SED
          • Make data on a FIPS drive or SED inaccessible
            • Overview
            • Sanitize a FIPS drive or SED
            • Destroy a FIPS drive or SED
            • Emergency shredding of data on an FIPS drive or SED
          • Return a FIPS drive or SED to service when authentication keys are lost
          • Return a FIPS drive or SED to unprotected mode
          • Remove an external key manager connection
          • Modify external key management server properties
          • Transition to external key management from onboard key management
          • Transition to onboard key management from external key management
          • What happens when key management servers are not reachable during the boot process
          • Disable encryption by default with ONTAP 9.7 and later
    • Data protection and disaster recovery
      • Data protection with System Manager
        • Data protection overview
        • Create custom data protection policies
        • Configure Snapshot copies
        • Recalculate reclaimable space
        • Enable or disable client access to Snapshot copy directory
        • Recover from Snapshot copies
        • Prepare for mirroring and vaulting
        • Configure mirrors and vaults
        • Resynchronize a protection relationship
        • Restore a volume from an earlier Snapshot copy
        • Recover from Snapshot copies
        • Restore to a new volume
        • Reverse resynchronize a protection relationship
        • Serve data from a destination
        • Configure storage VM disaster recovery
        • Serve data from an SVM DR destination
        • Reactivate a source storage VM
        • Resynchronize a destination storage VM
        • Back up data to the cloud using SnapMirror
        • Back up data using Cloud Backup
      • Cluster and SVM peering with the CLI
        • Overview
        • Prepare for cluster and SVM peering
          • Peer basics
          • Prerequisites for cluster peering
          • Use shared or dedicated ports
          • Use custom IPspaces to isolate replication traffic
        • Configure intercluster LIFs
          • Configure intercluster LIFs on shared data ports
          • Configure intercluster LIFs on dedicated ports
          • Configure intercluster LIFs in custom IPspaces
        • Configure peer relationships
          • Create a cluster peer relationship
          • Create an intercluster SVM peer relationship
          • Add an intercluster SVM peer relationship
        • Enable cluster peering encryption on an existing peer relationship
        • Remove cluster peering encryption from an existing peer relationship
        • Where to find additional information
      • Data protection with the CLI
        • Overview
        • Manage local Snapshot copies
          • Overview
          • Configure custom Snapshot policies
            • Overview
            • When to configure a custom Snapshot policy
            • Create a Snapshot job schedule
            • Create a Snapshot policy
          • Manage the Snapshot copy reserve
            • Overview
            • When to increase the Snapshot copy reserve
            • How deleting protected files can lead to less file space than expected
            • Monitor Snapshot copy disk consumption
            • Check available Snapshot copy reserve on a volume
            • Modify the Snapshot copy reserve
            • Autodelete Snapshot copies
          • Restore files from Snapshot copies
            • Restore a file from a Snapshot copy on an NFS or SMB client
            • Enable and disable NFS and SMB client access to Snapshot copy directory
            • Restore a single file from a Snapshot copy
            • Restore part of a file from a Snapshot copy
            • Restore the contents of a volume from a Snapshot copy
        • SnapMirror volume replication
          • About
          • Asynchronous SnapMirror disaster recovery basics
          • SnapMirror Synchronous disaster recovery basics
          • About workloads supported by StrictSync and Sync policies
          • Vault archiving using SnapMirror technology
          • SnapMirror unified replication basics
          • XDP replaces DP as the SnapMirror default
          • When a destination volume grows automatically
          • Fan-out and cascade data protection deployments
          • SnapMirror licensing
            • Overview
            • Install a SnapMirror Cloud license
          • DPO systems feature enhancements
        • Manage SnapMirror volume replication
          • SnapMirror replication workflow
          • Configure a replication relationship in one step
          • Configure a replication relationship one step at a time
            • Create a destination volume
            • Create a replication job schedule
            • Customize a replication policy
              • Create a custom replication policy
              • Define a rule for a policy
              • Define a schedule for creating a local copy on the destination
            • Create a replication relationship
            • Initialize a replication relationship
            • Example: Configure a vault-vault cascade
          • Convert an existing DP-type relationship to XDP
          • Convert the type of a SnapMirror relationship
          • Convert the mode of a SnapMirror Synchronous relationship
          • Serve data from a SnapMirror DR destination volume
            • Make the destination volume writeable
            • Configure the destination volume for data access
            • Reactivate the original source volume
          • Restore files from a SnapMirror destination volume
            • Restore a single file, LUN, or NVMe namespace from a SnapMirror destination
            • Restore the contents of a volume from a SnapMirror destination
          • Update a replication relationship manually
          • Resynchronize a replication relationship
          • Delete a volume replication relationship
          • Manage storage efficiency
          • Use SnapMirror global throttling
        • About SnapMirror SVM replication
        • Manage SnapMirror SVM replication
          • Replicate SVM configurations
            • SnapMirror SVM replication workflow
            • Criteria for placing volumes on destination SVMs
            • Replicate an entire SVM configuration
            • Exclude LIFs and related network settings from SVM replication
            • Exclude network, name service, and other settings from SVM replication
            • Specify aggregates to use for SVM DR relationships
            • SMB only: Create a SMB server
            • Exclude volumes from SVM replication
          • Serve data from an SVM DR destination
            • SVM disaster recovery workflow
            • Make SVM destination volumes writeable
          • Reactivate the source SVM
            • Source SVM reactivation workflow
            • Reactivate the original source SVM
            • Reactivate the original source SVM (FlexGroup volumes only)
          • Convert volume replication relationships to an SVM replication relationship
          • Delete an SVM replication relationship
        • Manage SnapMirror root volume replication
          • Overview
          • Create and initializing load-sharing mirror relationships
          • Update a load-sharing mirror relationship
          • Promote a load-sharing mirror
        • SnapMirror technical details
          • Use path name pattern matching
          • Use extended queries to act on many SnapMirror relationships
          • Ensure a common Snapshot copy in a mirror-vault deployment
          • Compatible ONTAP versions for SnapMirror relationships
          • SnapMirror limitations
      • Archive and compliance using SnapLock technology
        • What SnapLock is
        • Configure SnapLock
          • Overview
          • Install the license
          • Initialize the ComplianceClock
          • Create a SnapLock aggregate
          • Create and mount a SnapLock volume
          • Set the retention time
          • Create an audit log
          • Verify SnapLock settings
        • Manage WORM files
          • Overview
          • Commit files to WORM
          • Commit Snapshot copies to WORM on a vault destination
          • Mirror WORM files for disaster recovery
          • Retain WORM files during litigation
          • Delete WORM files
        • Move a SnapLock volume
        • Tamperproof Snapshot copy locking
        • SnapLock APIs
      • Consistency groups management
        • Overview
        • Consistency group limits
        • Configure a single consistency group
        • Configure a hierarchical consistency group
        • Protect
        • Modify
        • Clone
        • Delete
      • SnapMirror Business Continuity
        • Overview
        • Key concepts
        • Planning
          • Prerequisites
          • Considerations and limits
          • ONTAP access options
          • Prepare to use the ONTAP CLI
          • Prepare to use the ONTAP Mediator
          • Summary of deployment best practices
        • Manage SnapMirror for Business Continuity using System Manager
          • Configure Mediator
          • Configure protection for business continuity
          • Reestablish original protection relationship after unplanned failover
        • Installation and setup using the ONTAP CLI
          • High level deployment workflow
          • Install ONTAP Mediator Service and confirm the ONTAP cluster configuration
          • Initialize the ONTAP Mediator
          • Create a consistency group relationship
          • Initialize a consistency group
          • Mapping LUNs to the application hosts
        • Administration
          • Create a common snapshot copy
          • Perform a planned failover
          • Automatic unplanned failover operations
          • Basic monitoring
          • Add and remove volumes in a consistency group
          • Resume protection in a fan-out configuration
          • Convert existing relationships to SM-BC relationships
          • SM-BC upgrade and revert considerations
          • Remove an SM-BC configuration
          • Remove ONTAP Mediator
        • Troubleshooting
          • SnapMirror delete operation fails in takover state
          • Failure creating a SnapMirror relationship and initializing consistency group
          • Planned failover unsuccesful
          • Mediator not reachable or Mediator quorum status is false
          • Automatic unplanned failover not triggered on Site B
          • Link between Site B and Mediator down and Site A down
          • Link between Site A to Mediator Down and Site B down
          • SM-BC SnapMirror delete operation fails when fence is set on destination volumes
          • Volume move operation stuck when primary site is down
          • Release operation fails when unable to delete Snapshot copy
          • Volume move reference Snapshot copy shows as the newest
      • Mediator service for MetroCluster and SnapMirror Business Continuity
        • Install or upgrade
        • Manage
      • Manage MetroCluster sites with System Manager
        • MetroCluster overview
        • Set up a MetroCluster site
        • Set up MetroCluster peering
        • Configure a MetroCluster site
        • Perform MetroCluster switchover and switchback
        • Modify address, netmask, and gateway in a MetroCluster IP
        • Troubleshoot problems with a MetroCluster
      • Data protection using tape backup
        • Tape backup overview
        • Tape backup and restore workflow
        • Use cases for choosing a tape backup engine
        • Manage tape drives
          • Overview
          • Commands for managing tape drives, media changers, and tape drive operations
          • Use a nonqualified tape drive
          • Assign tape aliases
          • Remove tape aliases
          • Enable or disable tape reservations
          • Commands for verifying tape library connections
        • About tape drives
          • Qualified tape drives overview
          • Format of the tape configuration file
          • How the storage system qualifies a new tape drive dynamically