• Release notes
  • Get started
    • Learn about ONTAP
      • Network architecture
      • Disks and local tiers
      • Storage virtualization
      • Path failover
      • Replication
      • Storage efficiency
      • Security
    • Set up an ONTAP cluster
  • Upgrade and revert ONTAP
    • Upgrade ONTAP
      • Prepare for an ONTAP upgrade
        • Prepare to upgrade without Upgrade Advisor
          • Special considerations
            • SnapMirror
      • ONTAP upgrade methods
        • Manual upgrades
      • What to do after an ONTAP upgrade
        • Special configurations
    • Firmware, system, and security updates
    • Revert ONTAP
      • Prepare for an ONTAP revert
        • Perform ONTAP version specific pre-revert checks
          • Any ONTAP 9 version
          • ONTAP 9.18.1
          • ONTAP 9.17.1
          • ONTAP 9.16.1
          • ONTAP 9.14.1
          • ONTAP 9.12.1
          • ONTAP 9.11.1
          • ONTAP 9.6
      • What to do after an ONTAP revert
  • Cluster administration
    • Cluster management with System Manager
    • License management
    • Cluster management with the CLI
      • Cluster and SVM administrators
      • Access the cluster by using the CLI (cluster administrators only)
      • Use the ONTAP command-line interface
      • Cluster management (cluster administrators only)
      • Manage nodes
      • Configure the SP/BMC network
      • Manage nodes remotely using the SP/BMC
      • Manage the banner and MOTD
      • Back up and restore cluster configurations (cluster administrators only)
    • Disk and tier management
      • Manage local tiers
        • Add (create) a local tier
        • Manage the use of local tiers
        • Add capacity (disks) to a local tier
      • Manage disks
        • Disk and partition ownership
        • Disk sanitization
      • Manage RAID configurations
      • Manage Flash Pool local tiers
        • Manage Flash Pool caching policies
        • Create a Flash Pool local tier using SSD storage pools
    • FabricPool tier management
      • Configure FabricPool
        • Prepare for FabricPool configuration
          • Set up an object store as the cloud tier for FabricPool
      • Manage FabricPool
        • Manage volumes for FabricPool
      • Manage FabricPool mirrors
    • SVM data mobility
    • HA pair management
    • REST API management with System Manager
  • Volume administration
    • Volume and LUN management with System Manager
      • Manage volumes
    • Logical storage management with the CLI
      • Create and manage volumes
        • SAN volumes
      • Move and copy volumes
      • Use FlexClone volumes to create efficient copies of your FlexVol volumes
      • Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
        • How a FlexVol volume can reclaim free space with autodelete setting
      • Use qtrees to partition your FlexVol volumes
        • Directory to qtree conversions
      • Logical space reporting and enforcement for volumes
      • Use quotas to restrict or track resource usage
        • Overview of the quota process
          • Special kinds of quotas
          • How quotas work with users and groups
          • How tree quotas work
          • How quotas are activated
          • How you can view quota information
          • Difference in space usage displayed by a quota report and a UNIX client
      • Use deduplication, data compression, and data compaction to increase storage efficiency
        • Create a volume efficiency policy to run efficiency operations
        • Manage volume efficiency operations manually
        • Manage volume efficiency operations using schedules
        • Monitor volume efficiency operations
      • Rehost a volume from one SVM to another SVM
      • Recommended volume and file or LUN configuration combinations
      • Cautions and considerations for changing file or directory capacity
      • Features supported by FlexClone files and FlexClone LUNs
    • FlexGroup volumes management
      • FlexGroup volume setup
      • Manage FlexGroup volumes
      • Data protection for FlexGroup volumes
      • Manage data protection operations for FlexGroup volumes
        • Disaster recovery for FlexGroup volumes
        • Expand FlexGroup volumes in a SnapMirror relationship
      • Convert FlexVol volumes to FlexGroup volumes
    • FlexCache volumes management
      • FlexCache write-back
      • FlexCache duality
      • Manage FlexCache volumes
      • FlexCache for hotspot remediation
  • Network management
    • Get started
    • NAS path failover workflow
    • Network ports
      • Configure network ports
        • Monitor network ports
    • IPspaces
    • Broadcast domains
    • Failover groups and policies
    • Subnets (cluster administrators only)
    • Logical interfaces (LIFs)
      • LIF overview
      • Manage LIFs
    • Balance network loads
    • Host name resolution
    • Secure your network
      • Configure IPsec in-flight encryption
    • QoS marking (cluster administrators only)
    • Manage SNMP (cluster administrators only)
    • Manage routing in an SVM
    • ONTAP network information
      • View network connectivity with neighbor discovery protocols
  • NAS storage management
    • Manage NAS protocols with System Manager
      • Enable NAS storage
    • Configure NFS
      • Preparation
      • Configure NFS access to an SVM
        • Configure name services
          • Configure local UNIX users and groups
          • Work with netgroups
          • Use LDAP
        • Use Kerberos with NFS for strong security
      • Add storage capacity to an NFS-enabled SVM
        • Create a volume or qtree storage container
        • Secure NFS access using export policies
      • How ONTAP exports differ from 7-Mode exports
    • Manage NFS
      • Understand NAS file access
        • Namespaces and junction points
        • How ONTAP controls access to files
        • How ONTAP handles NFS client authentication
      • Create and manage data volumes in NAS namespaces
      • Configure security styles
        • How security styles affect data access
      • Set up file access using NFS
        • Secure NFS access using export policies
        • Using Kerberos with NFS for strong security
        • Configure name services
          • Use LDAP
        • Configure name mappings
      • Manage file access using NFS
        • Configure the NFS credential cache
        • Manage export policy caches
        • Manage file locks
        • Manage NFSv4 ACLs
        • Manage NFSv4 file delegations
        • Configure NFSv4 file and record locking
      • Supported NFS versions and clients
      • Parallel NFS
        • Introduction
        • Plan
      • NFS and SMB file and directory naming dependencies
    • Manage NFS trunking
      • Configure a new NFS server and exports for trunking
      • Adapt existing NFS exports for trunking
    • Manage NFS over RDMA
    • Configure SMB with the CLI
      • Preparation
      • Configure SMB access to an SVM
        • Set up an SMB server in an Active Directory domain
        • Set up an SMB server in a workgroup
      • Configure SMB client access to shared storage
        • Create a volume or qtree storage container
    • Manage SMB with the CLI
      • SMB server support
      • Manage SMB servers
        • Use options to customize SMB servers
          • Manage how file security is presented to SMB clients for UNIX security-style data
        • Manage SMB server security settings
          • Use SMB signing to enhance network security
          • Configure required SMB encryption on SMB servers for data transfers over SMB
          • Secure LDAP session communication
            • Configure LDAP over TLS
        • Configure default Windows user to UNIX user mappings on the SMB server
        • Improve client performance with traditional and lease oplocks
        • Apply Group Policy Objects to SMB servers
          • How GPOs are updated on the SMB server
        • Manage domain controller connections
        • Use null sessions to access storage in non-Kerberos environments
        • Manage NetBIOS aliases for SMB servers
        • Manage miscellaneous SMB server tasks
        • Use IPv6 for SMB access and SMB services
      • Set up file access using SMB
        • Configure security styles
          • How security styles affect data access
        • Create and manage data volumes in NAS namespaces
        • Configure name mappings
        • Configure multidomain name-mapping searches
        • Create and configure SMB shares
          • Use SMB share properties
        • Secure file access by using SMB share ACLs
        • Secure file access by using file permissions
        • Secure file access by using Dynamic Access Control (DAC)
        • Secure SMB access using export policies
        • Secure file access by using Storage-Level Access Guard
      • Manage file access using SMB
        • Use local users and groups for authentication and authorization
          • How ONTAP uses local users and groups
          • What local privileges are
          • Enable or disable local users and groups functionality
          • Manage local user accounts
          • Manage local groups
          • Manage local privileges
        • Configure bypass traverse checking
        • Display information about file security and audit policies
        • Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
          • Configure and apply file security on NTFS files and folders using the CLI
          • Configure and apply audit policies to NTFS files and folders using the CLI
        • Configure the metadata cache for SMB shares
        • Manage file locks
        • Monitor SMB activity
      • Deploy SMB client-based services
        • Use offline files to allow caching of files for offline use
        • Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
        • Use folder redirection to store data on a SMB server
        • Recover files and folders using Previous Versions
      • Deploy SMB server-based services
        • Manage home directories
          • Home directory shares
        • Configure SMB client access to UNIX symbolic links
        • Use BranchCache to cache SMB share content at a branch office
          • Requirements and guidelines
          • Configure BranchCache
          • Configure BranchCache-enabled SMB shares
          • Manage and monitor the BranchCache configuration
          • Disable BranchCache on SMB shares
          • Disable or enable BranchCache on the SVM
          • Delete the BranchCache configuration on SVMs
        • Improve Microsoft remote copy performance
        • Improve client response time by providing SMB automatic node referrals with Auto Location
        • Provide folder security on shares with access-based enumeration
      • NFS and SMB file and directory naming dependencies
    • Provide S3 client access to NAS data
    • SMB configuration for Microsoft Hyper-V and SQL Server
      • Nondisruptive operations for Hyper-V and SQL Server over SMB
      • Share-based backups with Remote VSS
      • Configuration requirements and considerations
      • Plan the Hyper-V or SQL Server over SMB configuration
      • Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
      • Manage Hyper-V and SQL Server over SMB configurations
      • Use statistics to monitor Hyper-V and SQL Server over SMB activity
      • Verify that the configuration is capable of nondisruptive operations
        • Determine whether SMB sessions are continuously available
  • SAN storage management
    • SAN concepts
      • iSCSI service management
      • SAN volumes
      • SAN copy offload
    • SAN administration
      • SAN provisioning
      • NVMe provisioning
      • Manage LUNs
      • Manage igroups and portsets
      • Manage iSCSI protocol
      • Manage FC protocol
      • Manage NVMe protocol
      • Manage systems with FC adapters
      • Manage LIFs for all SAN protocols
      • Recommended volume and file or LUN configuration combinations
    • SAN data protection
      • Configure and use SnapVault backups in a SAN environment
    • SAN configuration reference
      • iSCSI configurations
      • FC configurations
      • FCoE configurations
      • FC and FCoE zoning
      • SAN configurations in a MetroCluster environment
      • Configuration limits
  • S3 object storage management
    • Learn about S3 support in ONTAP 9
    • Plan
    • Configure
      • About the S3 configuration process
      • Configure S3 access to an SVM
      • Add storage capacity to an S3-enabled SVM
      • Create or modify access policy statements
      • Enable client access to S3 object storage
    • Protect buckets with SnapMirror S3
      • Mirror and backup protection on a remote cluster
      • Mirror and backup protection on the local cluster
      • Backup protection with cloud targets
    • Protect S3 data with snapshots
    • Audit S3 events
  • Authentication and access control
    • Manage administrator authentication and RBAC
      • Create login accounts
        • Enable local account access
          • Enable multifactor authentication (MFA) accounts
      • Manage access-control roles
      • Manage administrator accounts
      • Manage multi-admin verification
      • Manage dynamic authorization
    • Authentication and authorization using OAuth 2.0
      • Concepts
        • Client authorization
      • Configure and deploy
    • Authentication and authorization using WebAuthn MFA
    • Manage web services
    • Verify the identity of remote servers using certificates
    • Mutually authenticate the cluster and a KMIP server
  • Security and data encryption
    • Autonomous Ransomware Protection
      • Enable ARP
    • Virus protection with Vscan
      • About NetApp antivirus protection
      • Vscan server installation and configuration
      • Configure scanner pools
      • Configure on-access scanning
      • Configure on-demand scanning
      • Monitor and troubleshoot connectivity issues
    • Audit NAS events on SVMs
      • How auditing works
      • SMB events that can be audited
      • Create a file and directory auditing configuration on SVMs
      • Configure file and folder audit policies
      • Display information about audit policies applied to files and directories
      • CLI change events that can be audited
      • Manage auditing configurations
    • Use FPolicy for file monitoring and management on SVMs
      • Understand FPolicy
      • Plan the FPolicy configuration
        • Plan the FPolicy external engine configuration
        • Plan the FPolicy event configuration
        • Plan the FPolicy policy configuration
        • Plan the FPolicy scope configuration
      • Create the FPolicy configuration
      • Manage FPolicy configurations
        • Modify FPolicy configurations
        • Display information about FPolicy configurations
        • Manage FPolicy server connections
    • Verify access using security tracing
      • Perform security traces
    • Manage encryption with System Manager
    • Manage encryption with the CLI
      • Configure NetApp volume and aggregate encryption
        • Configure NVE
          • Configure external key management
        • Encrypt volume data with NVE or NAE
      • Configure NetApp hardware-based encryption
        • Configure external key management
        • Configure onboard key management
      • Manage NetApp encryption
        • Securely purge data on an encrypted volume
        • Make data on a FIPS drive or SED inaccessible
  • Data protection and disaster recovery
    • Cluster and SVM peering
      • Prepare for cluster and SVM peering
      • Configure intercluster LIFs
      • Configure peer relationships
    • Manage local snapshots
      • Configure custom snapshot policies
      • Manage snapshots manually
      • Manage the snapshot reserve
      • Restore files from snapshots
    • SnapMirror volume replication
      • Learn about SnapMirror volume replication
      • Configure SnapMirror volume replication
        • Configure a replication relationship one step at a time
          • Customize a SnapMirror replication policy
      • Manage SnapMirror volume replication
        • Serve data from a SnapMirror DR destination volume
        • Restore files from a SnapMirror destination volume
    • Manage SnapMirror SVM replication
      • Replicate SVM configurations
      • Serve data from a SnapMirror SVM DR destination
      • Reactivate the SnapMirror source SVM
    • Manage SnapMirror root volume replication
    • Back up to the cloud
    • Archive and compliance using SnapLock technology
      • Configure SnapLock
      • Manage WORM files
    • Consistency groups
    • SnapMirror active sync
      • Introduction
      • Plan
      • Configure
      • Manage SnapMirror active sync and protect data
      • Troubleshoot
    • ONTAP Mediator for MetroCluster and SnapMirror active sync
      • Install or upgrade
    • Data protection using tape backup
      • Manage tape drives
      • About tape drives
        • Tape devices overview
        • Tape aliasing
      • Transfer data between storage systems
      • NDMP for FlexVol volumes
        • About NDMP modes of operation
        • Environment variable
      • Manage node-scoped NDMP mode for FlexVol volumes
      • Manage SVM-scoped NDMP mode for FlexVol volumes
      • About dump engine for FlexVol volumes
      • About SMTape engine for FlexVol volumes
      • Monitor tape backup and restore operations for FlexVol volumes
        • What the dump and restore event log message format is
      • Error messages for tape backup and restore of FlexVol volumes
        • Backup and restore error messages
        • NDMP error messages
        • Dump error messages
        • SMTape error messages
    • NDMP configuration
      • Configure SVM-scoped NDMP
      • Configure node-scoped NDMP
  • Event, performance, and health monitoring
    • Monitor cluster performance with System Manager
    • Monitor and manage cluster performance using the CLI
      • Perform basic infrastructure checks
        • Check protocol settings on the storage system
      • Manage workloads
        • Guarantee throughput with QoS
    • Monitor and manage cluster performance with Unified Manager
      • Monitor performance
        • Install Active IQ Unified Manager
        • Set up basic monitoring tasks
    • Audit logging
    • AutoSupport
      • Learn about AutoSupport
      • Plan
      • Configure
      • Upload files using AutoSupport
      • Troubleshoot
    • Health monitoring
    • File System Analytics
    • EMS configuration
      • Configure EMS event notifications with the CLI
      • Update deprecated EMS event mapping