• menu
  • netapp
  • Docs
  • English
    • English
    • 日本語
    • 한국어
    • 简体中文
    • 繁體中文
    • Deutsch
    • Español
    • Français
    • Italiano
  • All NetApp
    • BlueXP
    • Support
    • Knowledge Base
    • Training
  • All docs
  • ONTAP
ONTAP 9
  • ONTAP docs
  • Release Notes
  • System Manager integration with BlueXP
  • Introduction and concepts
    • ONTAP concepts
      • Overview
      • ONTAP platforms
      • Cluster storage
      • High-availability pairs
      • AutoSupport and Active IQ Digital Advisor
      • Network architecture
        • Overview
        • Logical ports
        • Support for industry-standard network technologies
        • RDMA
      • Client protocols
      • Disks and aggregates
        • Overview
        • Aggregates and RAID groups
        • Root-data partitioning
      • Volumes, qtrees, files, and LUNs
      • Storage virtualization
        • Overview
        • SVM use cases
        • Cluster and SVM administration
        • System Manager insights
        • Namespaces and junction points
      • Path failover
        • Overview
        • NAS path failover
        • SAN path failover
      • Load balancing
      • Replication
        • Snapshot copies
        • SnapMirror disaster recovery and data transfer
        • SnapMirror Cloud backups to object Storage
        • SnapVault archiving
        • Cloud backup and support for traditional backups
        • MetroCluster continuous availability
      • Storage efficiency
        • Overview
        • Thin provisioning
        • Deduplication
        • Compression
        • FlexClone volumes, files, and LUNs
        • Capacity measurements in System Manager
      • Security
        • Client authentication and authorization
        • Administrator authentication and RBAC
        • Virus scanning
        • Encryption
        • WORM storage
      • Application aware data management
      • FabricPool
  • Set up, upgrade and revert ONTAP
    • Set up ONTAP
      • Get started
      • Set up a cluster with System Manager
      • Set up a cluster with the CLI
        • Create the cluster on the first node
        • Join remaining nodes to the cluster
        • Convert management LIFs from IPv4 to IPv6
        • Check your cluster with Active IQ Config Advisor
        • Synchronize the system time across the cluster
        • Commands for managing symmetric authentication on NTP servers
        • Additional system configuration tasks to complete
      • Configure All SAN Array software
        • Overview
        • ASA configuration support and limitations
    • Upgrade ONTAP
      • Overview
      • When to upgrade ONTAP
      • Prepare for an ONTAP upgrade
        • Preparation summary
        • Choose your target ONTAP release
        • Confirm configuration support
        • Identify common configuration errors
        • Upgrade paths
        • Create an upgrade plan
        • Verify LIF failover configuration
        • Verify SVM routing configuration
        • Special considerations
          • Summary of special considerations
          • Mixed version clusters
          • MetroCluster upgrade requirements
          • SAN configurations
          • SnapMirror
            • Prepare SnapMirror relationships
            • Verify compatibility of ONTAP versions
          • DP-type relationships
          • Deduplicated volumes and aggregates
          • NetApp Storage Encryption
          • Netgroups
          • LDAP clients using SSLv3
          • Session-oriented protocols
          • SSH public keys
          • Load sharing mirrors (8.3)
        • Reboot SP or BMC
      • Download the ONTAP software image
      • ONTAP upgrade methods
        • Overview of upgrade methods
        • Automated upgrades
          • Automated nondisruptive using System Manager
          • Automated nondisruptive using the CLI
          • Automated disruptive for single node clusters
        • Manual upgrades
          • Install software package
          • Manual nondisruptive non-MetroCluster
          • Manual nondisruptive MetroCluster (4 or 8 node)
          • Manual nondisruptive MetroCluster (2-node)
          • Manual disruptive
      • What to do after an ONTAP upgrade
        • Summary of post-upgrade verifications
        • Verify the cluster
        • Verify all LIFs are on home ports
        • Special configurations
          • Summary of post-upgrade special configurations
          • Network configuration
          • EMS LIF service
          • Networking and storage status
          • SAN configuration
          • KMIP server connections
          • Load-sharing mirror source volumes
          • SnapMirror operations
          • User accounts that can access the Service Processor
        • Update the DQP
    • Firmware and system updates
      • Overview
      • How automatic updates are scheduled for installation
      • Enable automatic updates
      • Modify automatic updates
      • Manage recommended automatic updates
      • Update firmware manually
    • Revert ONTAP
      • Overview
      • Do I need technical support?
      • What are the revert paths?
      • What should I read before I revert?
        • Pre-reversion resources
        • Revert considerations
      • What should I verify before I revert?
      • What else should I check before I revert?
        • Summary of pre-revert checks
        • SnapMirror
          • SnapMirror Synchronous relationships
          • SnapMirror/SnapVault relationships
        • SnapLock
        • Split FlexClone volumes
        • FlexGroup volumes
        • SMB servers in workgroup mode
        • Deduplicated volumes
        • Snapshot copies
        • User accounts that use SHA-2 hash function
        • Anti-ransomware licensing
        • S3 NAS buckets
        • 2 or 4-node MetroCluster
        • Disable IPsec
      • How do I get and install the revert software image?
      • Revert my cluster
      • What should I do after reverting my cluster?
        • Verify cluster and storage health
        • Enable automatic switchover for MetroCluster configurations
        • Enable and revert LIFs to home ports
        • Enable Snapshot copy policies
        • Verify client access (SMB and NFS)
        • Verify IPv6 firewall entries
        • Revert password hash function
        • Maually update SP firmware
        • Verify user accounts that can access the Service Processor
  • Cluster administration
    • Cluster management with System Manager
      • Administration overview
      • Use System Manager to access a Cluster
      • Enable new features
      • Download a cluster configuration
      • View and submit support cases
      • Manage maximum capacity limit of a storage VM
      • Monitor capacity with System Manager
      • Manage AutoSupport with System Manager
      • Monitor risks with Active IQ Digital Advisor
      • Gain insights to help optimize your system
      • View hardware configurations and determine problems
      • Manage nodes
        • Reboot, shut down, take over, and give back nodes
        • Add nodes to cluster
    • Cluster management with the CLI
      • Overview
      • Cluster and SVM administrators
        • Roles
        • Manage access to System Manager
        • What the cluster management server is
        • Types of SVMs
      • Access the cluster by using the CLI (cluster administrators only)
        • Access the cluster by using the serial port
        • Access the cluster by using SSH
        • SSH login security
        • Enable Telnet or RSH access to the cluster
        • Access the cluster by using Telnet
        • Access the cluster by using RSH
      • Use the ONTAP command-line interface
        • Overview
        • Different shells for CLI commands (cluster administrators only)
        • Methods of navigating CLI command directories
        • Rules for specifying values in the CLI
        • Methods of viewing command history and reissuing commands
        • Keyboard shortcuts for editing CLI commands
        • Use of administrative privilege levels
        • Set the privilege level in the CLI
        • Set display preferences in the CLI
        • Methods of using query operators
        • Methods of using extended queries
        • Methods of customizing show command output by using fields
        • About positional parameters
        • Methods of accessing ONTAP man pages
      • Manage CLI sessions (cluster administrators only)
        • Record a CLI session
        • Commands for managing records of CLI sessions
        • Commands for managing the automatic timeout period of CLI sessions
      • Cluster management (cluster administrators only)
        • Display information about the nodes in a cluster
        • Display cluster attributes
        • Modify cluster attributes
        • Display the status of cluster replication rings
        • About quorum and epsilon
        • What system volumes are
      • Manage node attributes
        • Display node attributes
        • Modify node attributes
        • Rename a node
      • Manage nodes
        • Add nodes to the cluster
        • Remove nodes from the cluster
        • Access a node’s log, core dump, and MIB files by using a web browser
        • Access the system console of a node
        • Manage node root volumes and root aggregates
        • Start or stop a node
        • Manage a node by using the boot menu
      • Configure the SP/BMC network
        • Isolate management network traffic
        • Considerations for the SP/BMC network configuration
        • Enable the SP/BMC automatic network configuration
        • Configure the SP/BMC network manually
        • Modify the SP API service configuration
      • Manage nodes remotely using the SP/BMC
        • Overview
        • About the Service Processor (SP)
        • About the Baseboard Management Controller (BMC)
        • Methods of managing SP/BMC firmware updates
        • When the SP/BMC uses the network interface for firmware updates
        • Accounts that can access the SP
        • Access the SP/BMC from an administration host
        • Access the SP/BMC from the system console
        • Relationship among the SP CLI, SP console, and system console sessions
        • Manage the IP addresses that can access the SP
        • Use online help at the SP/BMC CLI
        • Commands to manage a node remotely
        • About the threshold-based SP sensor readings and status values of the system sensors command output
        • About the discrete SP sensor status values of the system sensors command output
        • Commands for managing the SP from ONTAP
        • ONTAP commands for BMC management
        • BMC CLI commands
      • Manage audit logging for management activities
        • How ONTAP implements audit logging
        • Changes to audit logging in ONTAP 9
        • Display audit log contents
        • Manage audit GET request settings
        • Manage audit log destinations
      • Manage the cluster time (cluster administrators only)
        • Commands for managing the cluster time
      • Manage the banner and MOTD
        • Overview
        • Create a banner
        • Manage the banner
        • Create an MOTD
        • Manage the MOTD
      • Manage licenses (cluster administrators only)
        • Overview
        • License types and licensed method
        • Commands for managing licenses
      • Manage jobs and schedules
        • Job categories
        • Commands for managing jobs
        • Commands for managing job schedules
      • Back up and restore cluster configurations (cluster administrators only)
        • What configuration backup files are
        • How the node and cluster configurations are backed up automatically
        • Commands for managing configuration backup schedules
        • Commands for managing configuration backup files
        • Find a configuration backup file to use for recovering a node
        • Restore the node configuration using a configuration backup file
        • Find a configuration to use for recovering a cluster
        • Restore a cluster configuration from an existing configuration
        • Synchronize a node with the cluster
      • Manage core dumps (cluster administrators only)
        • Commands for managing core dumps
      • Monitor a storage system
        • Overview
        • Use AutoSupport and Active IQ Digital Advisor
        • When and where AutoSupport messages are sent
        • How AutoSupport creates and sends event-triggered messages
        • Types of AutoSupport messages and their content
        • What AutoSupport subsystems are
        • AutoSupport size and time budgets
        • Files sent in event-triggered AutoSupport messages
        • Log files sent in AutoSupport messages
        • Files sent in weekly AutoSupport messages
        • How AutoSupport OnDemand obtains delivery instructions from technical support
        • Structure of AutoSupport messages sent by email
        • AutoSupport severity types
        • Requirements for using AutoSupport
        • Set up AutoSupport
        • Upload core dump files
        • Upload performance archive files
        • Get AutoSupport message descriptions
        • Commands for managing AutoSupport
        • Information included in the AutoSupport manifest
        • AutoSupport case suppression during scheduled maintenance windows
        • Troubleshoot AutoSupport when messages are not received
        • Troubleshoot AutoSupport message delivery over HTTP or HTTPS
        • Troubleshoot AutoSupport message delivery over SMTP
        • Troubleshoot the AutoSupport subsystem
      • Monitor the health of your system
        • Overview
        • How health monitoring works
        • Ways to respond to system health alerts
        • System health alert customization
        • How health alerts trigger AutoSupport messages and events
        • Available cluster health monitors
        • Receive system health alerts automatically
        • Respond to degraded system health
        • Example of responding to degraded system health
        • Configure discovery of cluster and management network switches
        • Verify the monitoring of cluster and management network switches
        • Commands for monitoring the health of your system
        • Display environmental information
      • Manage web services
        • Overview
        • Manage access to web services
        • Manage the web protocol engine
        • Commands for managing the web protocol engine
        • Configure SAML authentication for web services
        • Configure access to web services
        • Commands for managing web services
        • Commands for managing mount points on the nodes
        • Manage SSL
        • Commands for managing SSL
        • Troubleshoot web service access problems
      • Verify the identity of remote servers using certificates
        • Overview
        • Verify digital certificates are valid using OCSP
        • View default certificates for TLS-based applications
      • Mutually authenticating the cluster and a KMIP server
        • Overview
        • Generate a certificate signing request for the cluster
        • Install a CA-signed server certificate for the cluster
        • Install a CA-signed client certificate for the KMIP server
    • Disk and tier (aggregate) management
      • Overview
      • Manage local tiers (aggregates)
        • Overview
        • Prepare to add a local tier (aggregate)
          • Overview
          • Local tiers (aggregates) and RAID groups
          • Mirrored and unmirrored local tiers (aggregates)
          • Fast zeroing of drives
          • Manually assign disk ownership
        • Add (create) a local tier (aggregate)
          • Overview
          • Workflow to add a local tier (aggregate)
          • Determine the number of disks or disk partitions required for a local tier (aggregate)
          • Decide which local tier (aggregate) creation method to use
          • Add (create) local tiers (aggregates) automatically
          • Add (create) local tiers (aggregates) manually
        • Manage the use of local tiers (aggregates)
          • Overview
          • Rename a local tier (aggregate)
          • Set media cost of a local tier (aggregate)
          • Determine drive and RAID group information for a local tier (aggregate)
          • Assign local tiers (aggregates) to storage VMs (SVMs)
          • Determine which volumes reside on a local tier (aggregate)
          • Determine and control a volume’s space usage in a local tier (aggregate)
          • Determine space usage in a local tier (aggregate)
          • Relocate local tier (aggregate) ownership within an HA pair
          • Delete a local tier (aggregate)
          • Commands for relocating local tiers (aggregates)
          • Commands for managing local tiers (aggregates)
        • Add capacity (disks) to a local tier (aggregate)
          • Overview
          • Workflow to add capacity to a local tier (expanding an aggregate)
          • Methods to create space in a local tier (aggregate)
          • Add disks to a local tier (aggregate)
          • Add drives to a node or shelf
          • Correct misaligned spare partitions
      • Manage disks
        • Overview
        • How hot spare disks work
        • How low spare warnings can help you manage your spare disks
        • Additional root-data partitioning management options
        • When you need to update the Disk Qualification Package
        • Disk and partition ownership
          • Overview
          • About auto-assignment of disk ownership
          • Display disk and partition ownership
          • Change auto-assignment settings for disk ownership
          • Manually assign ownership of disks
          • Manually assign ownership of partitioned disks
          • Set up an active-passive configuration on nodes using root-data partitioning
          • Set up an active-passive configuration on nodes using root-data-data partitioning
          • Remove ownership from a disk
        • Remove a failed disk
        • Disk sanitization
          • Overview
          • When sanitization cannot be performed
          • What happens if sanitization is interrupted
          • Tips for managing local tiers (aggregates) containing data to be sanitized
          • Sanitize a disk
        • Commands for managing disks
        • Commands for displaying space usage information
        • Commands for displaying information about storage shelves
      • Manage RAID configurations
        • Overview
        • Default RAID policies for local tiers (aggregates)
        • RAID protection levels for disks
        • Drive and RAID group information for a local tier (aggregate)
        • Convert from RAID-DP to RAID-TEC
        • Convert RAID-TEC to RAID-DP
        • Considerations for sizing RAID groups
        • Customize the size of your RAID groups
      • Manage Flash Pool local tiers (aggregates)
        • Overview
        • Flash Pool local tier (aggregate) caching policies
        • Manage Flash Pool caching policies
          • Overview
          • Determine whether to modify the caching policy of Flash Pool local tiers (aggregates)
          • Modify caching policies of Flash Pool local tiers (aggregates)
          • Set the cache-retention policy for Flash Pool local tiers (aggregates)
        • Flash Pool SSD partitioning for Flash Pool local tiers (aggregates) using storage pools
        • Flash Pool candidacy and optimal cache size
        • Create a Flash Pool local tier (aggregate) using physical SSDs
        • Create a Flash Pool local tier (aggregate) using SSD storage pools
          • Overview
          • Determine whether a Flash Pool local tier (aggregate) is using an SSD storage pool
          • Add cache by adding an SSD storage pool
          • Create a Flash Pool using SSD storage pool allocation units
          • Determine the impact to cache size of adding SSDs to an SSD storage pool
          • Add SSDs to an SSD storage pool
          • Commands for managing SSD storage pools
    • FabricPool tier management
      • Overview
      • Benefits of storage tiers by using FabricPool
      • Considerations and requirements for using FabricPool
      • About FabricPool tiering policies
      • FabricPool management workflow
      • Configure FabricPool
        • Prepare for FabricPool configuration
          • Overview
          • Add a connection to the cloud
          • Install a FabricPool license
          • Install a CA certificate if you use StorageGRID
          • Install a CA certificate if you use ONTAP S3
          • Set up an object store as the cloud tier for FabricPool
            • Overview
            • Set up StorageGRID as the cloud tier
            • Set up ONTAP S3 as the cloud tier
            • Set up Alibaba Cloud Object Storage as the cloud tier
            • Set up Amazon S3 as the cloud tier
            • Set up Google Cloud Storage as the cloud tier
            • Set up IBM Cloud Object Storage as the cloud tier
            • Set up Azure Blob Storage for the cloud as the cloud tier
            • Set up object stores for FabricPool in a MetroCluster configuration
          • Test object store throughput performance before attaching to a local tier
          • Attach the cloud tier to an aggregate
          • Tier data to local bucket
      • Manage FabricPool
        • Overview
        • Determine how much data in a volume is inactive by using inactive data reporting
        • Add or move volumes to FabricPool as needed
          • Create a volume for FabricPool
          • Move a volume to FabricPool
        • Object tagging using user-created custom tags
          • Overview
          • Assign a new tag during volume creation
          • Modify an existing tag
          • Delete a tag
          • View existing tags on a volume
          • Check object tagging status on FabricPool volumes
        • Monitor the space utilization for FabricPool
        • Manage storage tiering by modifying a volume’s tiering policy or tiering minimum cooling period
        • Archive volumes with FabricPool (video)
        • Use cloud migration controls to override a volume’s default tiering policy
        • Promote data to the performance tier
          • Overview
          • Promote all data from a FabricPool volume to the performance tier
          • Promote file system data to the performance tier
          • Check the status of a performance tier promotion
          • Trigger scheduled migration and tiering
      • Manage FabricPool mirrors
        • Overview
        • Create a FabricPool mirror
        • Monitor FabricPool mirror resync status
        • Display FabricPool mirror details
        • Promote a FabricPool mirror
        • Remove a FabricPool mirror
        • Replace an existing object store using a FabricPool mirror
        • Replace a FabricPool mirror on a MetroCluster configuration
      • Commands for managing aggregates with FabricPool
    • SVM data mobility
      • Overview
      • Migrate an SVM
      • Monitor migration
      • Pause and resume migration
      • Cancel migration
      • Manually cut over clients
      • Manually remove source SVM
    • HA pair management
      • Overview
      • How hardware-assisted takeover works
      • How automatic takeover and giveback works
      • Automatic takeover commands
      • Automatic giveback commands
      • Manual takeover commands
      • Manual giveback commands
      • Testing takeover and giveback
      • Commands for monitoring an HA pair
      • Commands for enabling and disabling storage failover
      • Halt or reboot a node without initiating takeover
    • Rest API management with System Manager
      • Rest log overview
      • Access the REST API log
  • Volume administration
    • Volume and LUN management with System Manager
      • Overview
      • Manage volumes
      • Add a volume
      • Add LUNs
      • Expand volumes and LUNs
      • Recover deleted volumes
      • Save storage space
      • Balance load by moving LUNs
      • Balance loads by moving volumes to another tier
      • Use Ansible Playbooks to add or edit volumes or LUNs
      • Manage storage efficiency policies
      • Manage resources using quotas
      • Limit resource use
      • Clone data with FlexClone
      • Search, filter, and sort
      • Capacity measurements
    • Logical storage management with the CLI
      • Overview
      • Create and manage volumes
        • Create a volume
        • Enable large volume and large file support
        • SAN volumes
          • About
          • Configure volume provisioning options
          • Determine space usage in a volume or aggregate
          • Delete Snapshot copies automatically
          • Configure volumes to automatically provide more space when they are full
          • Configure volumes to automatically grow and shrink their size
          • Requirements for enabling both autoshrink and automatic Snapshot copy deletion
          • How the autoshrink functionality interacts with Snapshot copy deletion
          • Address FlexVol volume fullness and overallocation alerts
          • Address aggregate fullness and overallocation alerts
          • Considerations for setting fractional reserve
        • Display file or inode usage
        • Control and monitoring I/O performance to FlexVol volumes by using Storage QoS
        • Delete a FlexVol volume
        • Protection against accidental volume deletion
        • Delete directories
          • Overview
        • Commands for managing FlexVol volumes
        • Commands for displaying space usage information
      • Move and copy volumes
        • How moving a FlexVol volume works
        • Considerations and recommendations when moving volumes
        • Requirement for moving volumes in SAN environments
        • Move a volume
        • Commands for moving volumes
        • Methods for copying a volume
      • Use FlexClone volumes to create efficient copies of your FlexVol volumes
        • Overview
        • Create a FlexClone volume
        • Split a FlexClone volume from its parent volume
        • Determine the space used by a FlexClone volume
        • Considerations for creating a FlexClone volume from a SnapMirror source or destination volume
      • Use FlexClone files and FlexClone LUNs to create efficient copies of files and LUNs
        • Overview
        • Create a FlexClone file or FlexClone LUN
        • View node capacity for creating and deleting FlexClone files and FlexClone LUNs
        • View the space savings due to FlexClone files and FlexClone LUNs
        • Methods to delete FlexClone files and FlexClone LUNs
        • How a FlexVol volume can reclaim free space with autodelete setting
          • Overview
          • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
          • Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted
          • Commands for configuring deletion of FlexClone files
      • Use qtrees to partition your FlexVol volumes
        • Overview
        • Obtain a qtree junction path
        • Qtree name restrictions
        • Convert a directory to a qtree
          • Overview
          • Convert a directory to a qtree using a Windows client
          • Convert a directory to a qtree using a UNIX client
        • Commands for managing and configuring qtrees
      • Logical space reporting and enforcement for volumes
        • Overview
        • What logical space reporting shows
        • What logical space enforcement does
        • Enable logical space reporting and enforcement
        • Manage SVM capacity
      • Use quotas to restrict or track resource usage
        • Overview of the quota process
          • Quota process
          • Differences among hard, soft, and threshold quotas
          • About quota notifications
          • Why you use quotas
          • What quota rules, quota policies, and quotas are
          • Quota targets and types
          • Special kinds of quotas
            • How default quotas work
            • How you use explicit quotas
            • How derived quotas work
            • How you use tracking quotas
          • How quotas are applied
          • Considerations for assigning quota policies
          • How quotas work with users and groups
            • Overview
            • How you specify UNIX users for quotas
            • How you specify Windows users for quotas
            • How default user and group quotas create derived quotas
            • How quotas are applied to the root user
            • How quotas work with special Windows groups
            • How quotas are applied to users with multiple IDs
            • How ONTAP determines user IDs in a mixed environment
            • How quotas with multiple users work
            • How you link UNIX and Windows names for quotas
          • How quotas work with qtrees
          • How tree quotas work
            • Overview
            • How user and group quotas work with qtrees
            • How default tree quotas on a FlexVol volume create derived tree quotas
            • How default user quotas on a FlexVol volume affect quotas for the qtrees in that volume
          • How qtree changes affect quotas
            • Overview
            • How deleting a qtree affects tree quotas
            • How renaming a qtree affects quotas
            • How changing the security style of a qtree affects user quotas
          • How quotas are activated
            • Overview
            • When you can use resizing
            • When a full quota reinitialization is required
          • How you can view quota information
            • Overview
            • How you can use the quota report to see what quotas are in effect
            • Why enforced quotas differ from configured quotas
            • Use the quota report to determine which quotas limit writes to a specific file
            • Commands for displaying information about quotas
            • When to use the volume quota policy rule show and volume quota report commands
          • Difference in space usage displayed by a quota report and a UNIX client
            • Overview
            • How the ls command accounts for space usage
            • How the df command accounts for file size
            • How the du command accounts for space usage
          • Examples of quota configuration
        • Set up quotas on an SVM
        • Modify (or Resizing) quota limits
        • Reinitialize quotas after making extensive changes
        • Commands to manage quota rules and quota policies
        • Commands to activate and modify quotas
      • Use deduplication, data compression, and data compaction to increase storage efficiency
        • Overview
        • Enable deduplication on a volume
        • Disable deduplication on a volume
        • Manage automatic volume-level background deduplication on AFF systems
        • Manage aggregate-level inline deduplication on AFF systems
        • Manage aggregate-level background deduplication on AFF systems
        • Temperature-sensitive storage efficiency overview
        • Storage efficiency behavior with volume move and SnapMirror
        • Set storage efficiency modes
        • Change volume inactive data compression threshold
        • Check volume efficiency mode
        • Change volume efficiency mode
        • View volume footprint savings with or without temperature-sensitive storage efficiency
        • Enable data compression on a volume
        • Move between secondary compression and adaptive compression
        • Disable data compression on a volume
        • Manage inline data compaction for AFF systems
        • Enable inline data compaction for FAS systems
        • Inline storage efficiency enabled by default on AFF systems
        • Enable storage efficiency visualization
        • Create a volume efficiency policy to run efficiency operations
          • Overview
          • Assign a volume efficiency policy to a volume
          • Modify a volume efficiency policy
          • View a volume efficiency policy
          • Disassociate a volume efficiency policy from a volume
          • Delete a volume efficiency policy
        • Manage volume efficiency operations manually
          • Overview
          • Run efficiency operations manually
          • Use checkpoints to resume efficiency operation
          • Resume a halted efficiency operation
          • Run efficiency operations manually on existing data
        • Manage volume efficiency operations using schedules
          • Run efficiency operations depending on the amount of new data written
          • Run efficiency operations using scheduling
        • Monitor volume efficiency operations
          • View efficiency operations and status
          • View efficiency space savings
          • View efficiency statistics of a FlexVol volume
        • Stop volume efficiency operations
        • Information about removing space savings from a volume
      • Rehost a volume from one SVM to another SVM
        • Overview
        • Rehost SMB volumes
        • Rehost NFS volumes
        • Rehost SAN volumes
        • Rehost volumes in a SnapMirror relationship
        • Features that do not support volume rehost
      • Storage limits
      • Recommended volume and file or LUN configuration combinations
        • Overview
        • Determine the correct volume and LUN configuration combination for your environment
        • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
        • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
        • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
      • Cautions and considerations for changing file or directory capacity
        • Considerations for changing the maximum number of files allowed on a FlexVol volume
        • Cautions for increasing the maximum directory size for FlexVol volumes
        • Rules governing node root volumes and root aggregates
        • Relocate root volumes to new aggregates
      • Features supported with FlexClone files and FlexClone LUNs
        • Overview
        • How deduplication works with FlexClone files and FlexClone LUNs
        • How Snapshot copies work with FlexClone files and FlexClone LUNs
        • How access control lists work with FlexClone files and FlexClone LUNs
        • How quotas work with FlexClone files and FlexClone LUNs
        • How FlexClone volumes work with FlexClone files and FlexClone LUNs
        • How NDMP works with FlexClone files and FlexClone LUNs
        • How volume SnapMirror works with FlexClone files and FlexClone LUNs
        • How volume move affects FlexClone files and FlexClone LUNs
        • How space reservation works with FlexClone files and FlexClone LUNs
        • How an HA configuration works with FlexClone files and FlexClone LUNs
    • Provision NAS storage for large file systems using FlexGroup volumes
    • FlexGroup volumes management with the CLI
      • Overview
      • What a FlexGroup volume is
      • Supported and unsupported configurations for FlexGroup volumes
      • FlexGroup volume setup
        • Workflow
        • Enable 64-bit NFSv3 identifiers on an SVM
        • Provision a FlexGroup volume automatically
        • Create a FlexGroup volume
      • Manage FlexGroup volumes
        • Monitor the space usage of a FlexGroup volume
        • Increase the size of a FlexGroup volume
        • Reduce the size of a FlexGroup volume
        • Configure FlexGroup volumes to automatically grow and shrink their size
        • Delete directories rapidly on a cluster
        • Manage client rights to delete directories rapidly
        • Create qtrees with FlexGroup volumes
        • Use quotas for FlexGroup volumes
        • Enable storage efficiency on a FlexGroup volume
        • Protect FlexGroup volumes using Snapshot copies
        • Move the constituents of a FlexGroup volume
        • Use aggregates in FabricPool for existing FlexGroup volumes
        • Rebalance FlexGroup volumes
      • Data protection for FlexGroup volumes
        • Workflow
        • Create a SnapMirror relationship for FlexGroup volumes
        • Create a SnapVault relationship for FlexGroup volumes
        • Create a unified data protection relationship for FlexGroup volumes
        • Create an SVM disaster recovery relationship for FlexGroup volumes
        • Transition an existing FlexGroup SnapMirror relationship to SVM DR
        • Convert a FlexVol volume to a FlexGroup volume within an SVM-DR relationship
        • Considerations for creating SnapMirror cascade and fanout relationships for FlexGroups
        • Considerations for creating a SnapVault backup relationship and a unified data protection relationship for FlexGroup volumes
        • Monitor SnapMirror data transfers for FlexGroup volumes
      • Manage data protection operations for FlexGroup volumes
        • Disaster recovery for FlexGroup volumes
          • Workflow
          • Activate the destination FlexGroup volume
          • Reactivate the original source FlexGroup volume after disaster
          • Reverse a SnapMirror relationship between FlexGroup volumes during disaster recovery
        • Expand FlexGroup volumes in a SnapMirror relationship
          • Overview
          • Expand the source FlexGroup volume of a SnapMirror relationship
          • Expand the destination FlexGroup volume of a SnapMirror relationship
        • Perform a SnapMirror single file restore from a FlexGroup volume
        • Restore a FlexGroup volume from a SnapVault backup
        • Disable SVM protection on a FlexGroup volume
        • Enable SVM protection on a FlexGroup volume
      • Convert FlexVol volumes to FlexGroup volumes
        • Overview
        • Convert a FlexVol volume to a FlexGroup volume
        • Convert a FlexVol volume SnapMirror relationship to a FlexGroup volume SnapMirror relationship
    • Improve performance for multiple clients with FlexCache
    • FlexCache volumes management with the CLI
      • Overview
      • Benefits of FlexCache volumes
      • Typical FlexCache deployments
      • Supported and unsupported features for FlexCache volumes
      • FlexCache volume creation
        • Workflow
        • Add a FlexCache license
        • Process to create a FlexCache volume
          • Create a FlexCache volume
          • Guidelines for sizing a FlexCache volume
          • Considerations for auditing FlexCache volumes
      • Manage a FlexCache relationship
        • Synchronize properties of a FlexCache volume from an origin volume
        • Update the configurations of a FlexCache relationship
        • Enable file access time updates
        • Enable global file locking
        • Prepopulate a FlexCache volume
        • Delete a FlexCache relationship
  • Network management
    • Manage your network with System Manager
      • Overview
      • View and manage your network
      • Auto detect wiring issues
      • Download network data for reporting
    • Set up NAS path failover with the CLI
      • ONTAP 9.8 and later
        • About NAS path failover for ONTAP 9.8 and later
        • Workflow NAS path failover
          • Overview
          • Worksheet for NAS path failover configuration
          • Create IPspaces
          • Move broadcast domains
          • Repair port reachability
          • Create SVMs
          • Create LIFs
          • Configure DNS services
      • ONTAP 9.7 and earlier
        • Set up NAS path failover (ONTAP 9.0-9.7 CLI)
        • Workflow NAS path failover
          • Overview
          • Worksheet for NAS path failover configuration
          • Create IPspaces
          • Determine which ports can be used for a broadcast domains
          • Remove ports from a broadcast domain
          • Create a broadcast domain
          • Create a subnet
          • Create SVMs
          • Create LIFs
          • Configure DNS services
          • Configure dynamic DNS services
    • Manage your network with the CLI
      • Network management overview
      • Upgrade considerations
        • Network features by release
        • Verify your networking configuration after upgrading to ONTAP 9.8 or later
      • Networking components of a cluster
        • Overview
        • Network cabling guidelines
        • Relationship between broadcast domains, failover groups, and failover policies
      • Configure network ports (cluster administrators only)
        • Overview
        • Combine physical ports to create interface groups
        • Configure VLANs over physical ports
        • Modify network port attributes
        • Modify MTU setting for interface group ports
        • Monitor the health of network ports
        • Monitor the reachability of network ports in ONTAP 9.8 and later
        • Convert 40GbE NIC ports into multiple 10GbE ports for 10GbE connectivity
        • Removing a NIC from the node on ONTAP 9.7 or earlier
        • Removing a NIC from the node on ONTAP 9.8 or later
      • Configure IPspaces (cluster administrators only)
        • Overview
        • Example of using IPspaces
        • Standard properties of IPspaces
        • Create IPspaces
        • Display IPspaces
        • Delete an IPspace
      • Configure broadcast domains (cluster administrators only)
        • ONTAP 9.8 and later
          • About broadcast domains for ONTAP 9.8 and later
          • Example of using broadcast domains
          • Add a broadcast domain
          • Add or remove ports from a broadcast domain
          • Split broadcast domains
          • Merge broadcast domains
          • Change the MTU value for ports in a broadcast domain
          • Display broadcast domains
          • Delete a broadcast domain
        • ONTAP 9.7 and earlier
          • About broadcast domains for ONTAP 9.7 and earlier
          • Example of using broadcast domains
          • Create a broadcast domain
          • Add or remove ports from a broadcast domain
          • Split broadcast domains
          • Merge broadcast domains
          • Change the MTU value for ports in a broadcast domain
          • Display broadcast domains
          • Delete a broadcast domain
      • Configure failover groups and policies for LIFs
        • Overview
        • Create a failover group
        • Configure failover settings on a LIF
        • Commands for managing failover groups and policies
      • Configure subnets (cluster administrators only)
        • Overview
        • Create a subnet
        • Add or remove IP addresses from a subnet
        • Change subnet properties
        • Display subnets
        • Delete a subnet
      • Configure LIFs (cluster administrators only)
        • Overview
        • LIF compatibility with port types
        • LIF roles in ONTAP 9.5 and earlier
        • LIFs and service policies
        • Configure LIF service policies
        • Create a LIF
        • Modify a LIF
        • Migrate a LIF
        • Revert a LIF to its home port
        • ONTAP 9.8 or later-Recover from an incorrectly configured cluster LIF
        • Delete a LIF
        • Configure virtual IP (VIP) LIFs
      • Configure host-name resolution
        • Overview
        • Configure DNS for host-name resolution
        • Manage the hosts table (cluster administrators only)
      • Balance network loads to optimize user traffic (cluster administrators only)
        • Overview
        • How DNS load balancing works
        • Create a DNS load balancing zone
        • Add or remove a LIF from a load balancing zone
      • Secure your network
        • Configure network security using Federal Information Processing Standards (FIPS)
        • Configure IP security (IPsec) over wire encryption
        • Configure firewall policies for LIFs
        • Commands for managing firewall service and policies
      • Configure QoS marking (cluster administrators only)
        • Overview
        • DSCP marking for UC compliance
        • Modify QoS marking values
        • Display QoS marking values
      • Manage SNMP on the cluster (cluster administrators only)
        • Overview
        • What MIBs are
        • SNMP traps
        • Create an SNMP community and assign it to a LIF
        • Configure SNMPv3 users in a cluster
        • Configure traphosts to receive SNMP notifications
        • Commands for managing SNMP
      • Manage routing in an SVM
        • Overview
        • Create a static route
        • Enable multipath routing
        • Delete a static route
        • Display routing information
        • Remove dynamic routes from routing tables
      • ONTAP port usage on a storage system
        • Overview
        • ONTAP internal ports
      • View network information
        • Overview
        • Display network port information
        • Display information about a VLAN (cluster administrators only)
        • Display interface group information (cluster administrators only)
        • Display LIF information
        • Display routing information
        • Display DNS host table entries (cluster administrators only)
        • Display DNS domain configurations
        • Display information about failover groups
        • Display LIF failover targets
        • Display LIFs in a load balancing zone
        • Display cluster connections
        • Commands for diagnosing network problems
        • Display network connectivity with neighbor discovery protocols
  • NAS storage management
    • Manage NAS protocols with System Manager
      • NAS storage overview
      • VMware datastores
      • Home directories
      • Linux servers
      • Export policies
      • Windows servers
      • Both Windows and Linux
      • Secure client access with Kerberos
      • Provide client access with name services
      • Manage directories and files
      • Manage host-specific users and groups
      • Monitor NFS active clients
      • Enable NAS storage
        • Enable Linux servers
        • Enable Windows servers
        • Enable Both Windows and Linux
    • Configure NFS with the CLI
      • Overview
      • Workflow
      • Preparation
        • Assess physical storage requirements
        • Assess networking requirements
        • Decide where to provision new NFS storage capacity
        • Worksheet for gathering NFS configuration information
      • Configure NFS access to an SVM
        • Create an SVM
        • Verify that the NFS protocol is enabled on the SVM
        • Open the export policy of the SVM root volume
        • Create an NFS server
        • Create a LIF
        • Enable DNS for host-name resolution
        • Configure name services
          • Overview
          • Configure the name service switch table
          • Configure local UNIX users and groups
            • Overview
            • Create a local UNIX user
            • Load local UNIX users from a URI
            • Create a local UNIX group
            • Add a user to a local UNIX group
            • Load local UNIX groups from a URI
          • Work with netgroups
            • Overview
            • Load netgroups into SVMs
            • Verify the status of netgroup definitions
          • Create an NIS domain configuration
          • Use LDAP
            • Overview
            • Create a new LDAP client schema
            • Install the self-signed root CA certificate on the SVM
            • Create an LDAP client configuration
            • Associate the LDAP client configuration with SVMs
            • Verify LDAP sources in the name service switch table
        • Use Kerberos with NFS for strong security
          • Overview
          • Verify permissions for Kerberos configuration
          • Create an NFS Kerberos realm configuration
          • Configure NFS Kerberos permitted encryption types
          • Enable Kerberos on a data LIF
      • Add storage capacity to an NFS-enabled SVM
        • Overview
        • Create an export policy
        • Add a rule to an export policy
        • Create a volume or qtree storage container
          • Create a volume
          • Create a qtree
        • Secure NFS access using export policies
          • Overview
          • Manage the processing order of export rules
          • Assign an export policy to a volume
          • Assign an export policy to a qtree
        • Verify NFS client access from the cluster
        • Test NFS access from client systems
      • Where to find additional information
      • How ONTAP exports differ from 7-Mode exports
        • Overview
        • Comparison of exports in 7-Mode and ONTAP
        • Examples of ONTAP export policies
    • Manage NFS with the CLI
      • Overview
      • Understand NAS file access
        • Namespaces and junction points
          • Overview
          • What the typical NAS namespace architectures are
        • How ONTAP controls access to files
          • Overview
          • Authentication-based restrictions
          • File-based restrictions
        • How ONTAP handles NFS client authentication
          • Overview
          • How ONTAP uses name services
          • How ONTAP grants SMB file access from NFS clients
          • How the NFS credential cache works
      • Create and manage data volumes in NAS namespaces
        • Create data volumes with specified junction points
        • Creating data volumes without specifying junction points
        • Mounting or unmounting existing volumes in the NAS namespace
        • Displaying volume mount and junction point information
      • Configure security styles
        • How security styles affect data access
          • What the security styles and their effects are
          • Where and when to set security styles
          • Decide which security style to use on SVMs
          • How security style inheritance works
          • How ONTAP preserves UNIX permissions
          • Manage UNIX permissions using the Windows Security tab
        • Configure security styles on SVM root volumes
        • Configure security styles on FlexVol volumes
        • Configure security styles on qtrees
      • Set up file access using NFS
        • Overview
        • Secure NFS access using export policies
          • How export policies control client access to volumes or qtrees
          • Default export policy for SVMs
          • How export rules work
          • Manage clients with an unlisted security type
          • How security types determine client access levels
          • Manage superuser access requests
          • How ONTAP uses export policy caches
          • How the access cache works
          • How access cache parameters work
          • Removing an export policy from a qtree
          • Validating qtree IDs for qtree file operations
          • Export policy restrictions and nested junctions for FlexVol volumes
        • Using Kerberos with NFS for strong security
          • ONTAP support for Kerberos
          • Requirements for configuring Kerberos with NFS
          • Specifying the user ID domain for NFSv4
        • Configure name services
          • How ONTAP name service switch configuration works
          • Use LDAP
            • Overview
            • LDAP signing and sealing concepts
            • LDAPS concepts
            • Enable LDAP RFC2307bis support
            • Configuration options for LDAP directory searches
            • Improve performance of LDAP directory netgroup-by-host searches
            • Use LDAP fast bind for nsswitch authentication
            • Display LDAP statistics
        • Configure name mappings
          • Overview
          • How name mapping works
          • Multidomain searches for UNIX user to Windows user name mappings
          • Name mapping conversion rules
          • Create a name mapping
          • Configure the default user
          • Commands for managing name mappings
        • Enable access for Windows NFS clients
        • Enable the display of NFS exports on NFS clients
      • Manage file access using NFS
        • Enable or disable NFSv3
        • Enable or disable NFSv4.0
        • Enable or disable NFSv4.1
        • Manage NFSv4 storepool limits
        • Enable or disable pNFS
        • Controlling NFS access over TCP and UDP
        • Controlling NFS requests from nonreserved ports
        • Handling NFS access to NTFS volumes or qtrees for unknown UNIX users
        • Considerations for clients that mount NFS exports using a nonreserved port
        • Performing stricter access checking for netgroups by verifying domains
        • Modifying ports used for NFSv3 services
        • Commands for managing NFS servers
        • Troubleshooting name service issues
        • Verifying name service connections
        • Commands for managing name service switch entries
        • Commands for managing name service cache
        • Commands for managing name mappings
        • Commands for managing local UNIX users
        • Commands for managing local UNIX groups
        • Limits for local UNIX users, groups, and group members
        • Manage limits for local UNIX users and groups
        • Commands for managing local netgroups
        • Commands for managing NIS domain configurations
        • Commands for managing LDAP client configurations
        • Commands for managing LDAP configurations
        • Commands for managing LDAP client schema templates
        • Commands for managing NFS Kerberos interface configurations
        • Commands for managing NFS Kerberos realm configurations
        • Commands for managing export policies
        • Commands for managing export rules
        • Configure the NFS credential cache
          • Reasons for modifying the NFS credential cache time-to-live
          • Configure the time-to-live for cached NFS user credentials
        • Manage export policy caches
          • Flush export policy caches
          • Display the export policy netgroup queue and cache
          • Checking whether a client IP address is a member of a netgroup
          • Optimizing access cache performance
        • Manage file locks
          • About file locking between protocols
          • How ONTAP treats read-only bits
          • How ONTAP differs from Windows on handling locks on share path components
          • Display information about locks
          • Breaking locks
        • How FPolicy first-read and first-write filters work with NFS
        • Modifying the NFSv4.1 server implementation ID
        • Manage NFSv4 ACLs
          • Benefits of enabling NFSv4 ACLs
          • How NFSv4 ACLs work
          • Enable or disable modification of NFSv4 ACLs
          • How ONTAP uses NFSv4 ACLs to determine whether it can delete a file
          • Enable or disable NFSv4 ACLs
          • Modifying the maximum ACE limit for NFSv4 ACLs
        • Manage NFSv4 file delegations
          • Enable or disable NFSv4 read file delegations
          • Enable or disable NFSv4 write file delegations
        • Configure NFSv4 file and record locking
          • About NFSv4 file and record locking
          • Specifying the NFSv4 locking lease period
          • Specifying the NFSv4 locking grace period
        • How NFSv4 referrals work
        • Enable or disable NFSv4 referrals
        • Displaying NFS statistics
        • Displaying DNS statistics
        • Displaying NIS statistics
        • Support for VMware vStorage over NFS
        • Enable or disable VMware vStorage over NFS
        • Enable or disable rquota support
        • NFSv3 and NFSv4 performance improvement by modifying the TCP transfer size
        • Modifying the NFSv3 and NFSv4 TCP maximum transfer size
        • Configure the number of group IDs allowed for NFS users
        • Controlling root user access to NTFS security-style data
      • Supported NFS versions and clients
        • Overview
        • NFSv4.0 functionality supported by ONTAP
        • Limitations of ONTAP support for NFSv4
        • ONTAP support for NFSv4.1
        • ONTAP support for NFSv4.2
        • ONTAP support for parallel NFS
        • Use of hard mounts
      • NFS and SMB file and directory naming dependencies
        • Overview
        • Characters a file or directory name can use
        • Case-sensitivity of file and directory names in a multiprotocol environment
        • How ONTAP creates file and directory names
        • How ONTAP handles multi-byte file, directory, and qtree names
        • Configure character mapping for SMB file name translation on volumes
        • Commands for managing character mappings for SMB file name translation
    • Manage NFS over RDMA
      • Overview
      • Configure NICS and NFS
      • Configure LIFs
      • Modify the NFS settings
    • Configure SMB with the CLI
      • Overview
      • Workflow
      • Preparation
        • Assess physical storage requirements
        • Assess networking requirements
        • Decide where to provision new SMB storage capacity
        • Worksheet for gathering SMB configuration information
      • Configure SMB access to an SVM
        • Overview
        • Create an SVM
        • Verify that the SMB protocol is enabled on the SVM
        • Open the export policy of the SVM root volume
        • Create a LIF
        • Enable DNS for host-name resolution
        • Set up an SMB server in an Active Directory domain
          • Configure time services
          • Commands for managing symmetric authentication on NTP servers
          • Create an SMB server in an Active Directory domain
          • Create keytab files for SMB authentication
        • Set up an SMB server in a workgroup
          • Overview
          • Create an SMB server in a workgroup
          • Create local user accounts
          • Create local groups
          • Manage local group membership
        • Verify enabled SMB versions
        • Map the SMB server on the DNS server
      • Configure SMB client access to shared storage
        • Overview
        • Create a volume or qtree storage container
          • Create a volume
          • Create a qtree
        • Requirements and considerations for creating an SMB share
        • Create an SMB share
        • Verify SMB client access
        • Create SMB share access control lists
        • Configure NTFS file permissions in a share
        • Verify user access
    • Manage SMB with the CLI
      • Overview
      • SMB server support
        • Overview
        • Supported SMB versions and functionality
        • Unsupported Windows features
        • Configure NIS or LDAP name services on the SVM
        • How ONTAP name service switch configuration works
      • Manage SMB servers
        • Modify SMB servers
        • Use options to customize SMB servers
          • Available SMB server options
          • Configure SMB server options
          • Configure the grant UNIX group permission to SMB users
          • Configure access restrictions for anonymous users
          • Manage how file security is presented to SMB clients for UNIX security-style data
            • Overview
            • Enable or disable the presentation of NTFS ACLs for UNIX security-style data
            • How ONTAP preserves UNIX permissions
            • Manage UNIX permissions using the Windows Security tab
        • Manage SMB server security settings
          • How ONTAP handles SMB client authentication
          • Guidelines for SMB server security settings in an SVM disaster recovery configuration
          • Display information about CIFS server security settings
          • Enable or disable required password complexity for local SMB users
          • Modify the CIFS server Kerberos security settings
          • Set the CIFS server minimum authentication security level
          • Configure strong security for Kerberos-based communication by using AES encryption
          • Enable or disable AES encryption for Kerberos-based communication
          • Use SMB signing to enhance network security
            • Overview
            • How SMB signing policies affect communication with a CIFS server
            • Performance impact of SMB signing
            • Recommendations for configuring SMB signing
            • Guidelines for SMB signing when multiple data LIFS are configured
            • Enable or disable required SMB signing for incoming SMB traffic
            • Determining whether SMB sessions are signed
            • Monitor SMB signed session statistics
          • Configure required SMB encryption on SMB servers for data transfers over SMB
            • Overview
            • Performance impact of SMB encryption
            • Enable or disable required SMB encryption for incoming SMB traffic
            • Determine whether clients are connected using encrypted SMB sessions
            • Monitor SMB encryption statistics
          • Secure LDAP session communication
            • LDAP signing and sealing concepts
            • Enable LDAP signing and sealing on the CIFS server
            • Configure LDAP over TLS
              • Export a copy of the self-signed root CA certificate
              • Install the self-signed root CA certificate on the SVM
              • Enable LDAP over TLS on the CIFS server
        • Configure SMB Multichannel for performance and redundancy
        • Configure default Windows user to UNIX user mappings on the SMB server
          • Configure the default UNIX user
          • Configure the guest UNIX user
          • Map the administrators group to root
        • Display information about what types of users are connected over SMB sessions
        • Command options to limit excessive Windows client resource consumption
        • Improve client performance with traditional and lease oplocks
          • Overview
          • Write cache data-loss considerations when using oplocks
          • Enable or disable oplocks when creating SMB shares
          • Commands for enabling or disabling oplocks on volumes and qtrees
          • Enable or disable oplocks on existing SMB shares
          • Monitor oplock status
        • Apply Group Policy Objects to SMB servers
          • Overview
          • Supported GPOs
          • Requirements for using GPOs with your CIFS server
          • Enable or disable GPO support on a SMB server
          • How GPOs are updated on the SMB server
            • Overview
            • What to do if GPO updates are failing
          • Manually updating GPO settings on the CIFS server
          • Display information about GPO configurations
          • Display detailed information about restricted group GPOs
          • Display information about central access policies
          • Display information about central access policy rules
        • Commands for managing CIFS servers computer account passwords
        • Manage domain controller connections
          • Display information about discovered servers
          • Reset and rediscover servers
          • Manage domain controller discovery
          • Add preferred domain controllers
          • Commands for managing preferred domain controllers
          • Enable SMB2 connections to domain controllers
          • Enable encrypted connections to domain controllers
        • Use null sessions to access storage in non-Kerberos environments
          • Overview
          • How the storage system provides null session access
          • Grant null users access to file system shares
        • Manage NetBIOS aliases for SMB servers
          • Overview
          • Add a list of NetBIOS aliases to the CIFS server
          • Remove NetBIOS aliases from the NetBIOS alias list
          • Display the list of NetBIOS aliases on CIFS servers
          • Determine whether SMB clients are connected using NetBIOS aliases
        • Manage miscellaneous SMB server tasks
          • Stop or start the CIFS server
          • Move CIFS servers to different OUs
          • Modify the dynamic DNS domain on the SVM before moving the SMB server
          • Join anSVM to an Active Directory domain
          • Display information about NetBIOS over TCP connections
          • Commands for managing CIFS servers
          • Enable the NetBios name service
        • Use IPv6 for SMB access and SMB services
          • Requirements for using IPv6
          • Support for IPv6 with SMB access and CIFS services
          • How CIFS servers use IPv6 to connect to external servers
          • Enable IPv6 for SMB (cluster administrators only)
          • Disable IPv6 for SMB
          • Monitor and display information about IPv6 SMB sessions
      • Set up file access using SMB
        • Configure security styles
          • How security styles affect data access
            • What the security styles and their effects are
            • Where and when to set security styles
            • Decide which security style to use on SVMs
            • How security style inheritance works
            • How ONTAP preserves UNIX permissions
            • Manage UNIX permissions using the Windows Security tab
          • Configure security styles on SVM root volumes
          • Configure security styles on FlexVol volumes
          • Configure security styles on qtrees
        • Create and manage data volumes in NAS namespaces
          • Overview
          • Create data volumes with specified junction points
          • Create data volumes without specifying junction points
          • Mount or unmount existing volumes in the NAS namespace
          • Display volume mount and junction point information
        • Configure name mappings
          • Overview
          • How name mapping works
          • Multidomain searches for UNIX user to Windows user name mappings
          • Name mapping conversion rules
          • Create a name mapping
          • Configure the default user
          • Commands for managing name mappings
        • Configure multidomain name-mapping searches
          • Enable or disable multidomain name mapping searches
          • Reset and rediscover trusted domains
          • Display information about discovered trusted domains
          • Add, remove, or replace trusted domains in preferred trusted domain lists
          • Display information about the preferred trusted domain list
        • Create and configure SMB shares
          • Overview
          • What the default administrative shares are
          • SMB share naming requirements
          • Directory case-sensitivity requirements when creating shares in a multiprotocol environment
          • Use SMB share properties
            • Overview
            • Add or remove share properties on an existing SMB share
          • Optimize SMB user access with the force-group share setting
          • Create an SMB share with the force-group share setting
          • View information about SMB shares using the MMC
          • Commands for managing SMB shares
        • Secure file access by using SMB share ACLs
          • Guidelines for managing SMB share-level ACLs
          • Create SMB share access control lists
          • Commands for managing SMB share access control lists
        • Secure file access by using file permissions
          • Configure advanced NTFS file permissions using the Windows Security tab
          • Configure NTFS file permissions using the ONTAP CLI
          • How UNIX file permissions provide access control when accessing files over SMB
        • Secure file access by using Dynamic Access Control (DAC)
          • Overview
          • Supported Dynamic Access Control functionality
          • Considerations when using Dynamic Access Control and central access policies with CIFS servers
          • Enable or disable Dynamic Access Control
          • Manage ACLs that contain Dynamic Access Control ACEs when Dynamic Access Control is disabled
          • Configure central access policies to secure data on CIFS servers
          • Display information about Dynamic Access Control security
          • Revert considerations for Dynamic Access Control
          • Where to find additional information about configuring and using Dynamic Access Control and central access policies
        • Secure SMB access using export policies
          • How export policies are used with SMB access
          • How export rules work
          • Examples of export policy rules that restrict or allow access over SMB
          • Enable or disable export policies for SMB access
        • Secure file access by using Storage-Level Access Guard
          • Overview
          • Use cases for using Storage-Level Access Guard
          • Workflow to configure Storage-Level Access Guard
          • Configure Storage-Level Access Guard
          • Effective SLAG matrix
          • Display information about Storage-Level Access Guard
          • Remove Storage-Level Access Guard
      • Manage file access using SMB
        • Use local users and groups for authentication and authorization
          • How ONTAP uses local users and groups
            • Local users and groups concepts
            • Reasons for creating local users and local groups
            • How local user authentication works
            • How user access tokens are constructed
            • Guidelines for using SnapMirror on SVMs that contain local groups
            • What happens to local users and groups when deleting CIFS servers
            • How you can use Microsoft Management Console with local users and groups
            • Guidelines for reverting
          • What local privileges are
            • List of supported privileges
            • Assign privileges
          • Guidelines for using BUILTIN groups and the local administrator account
          • Requirements for local user passwords
          • Predefined BUILTIN groups and default privileges
          • Enable or disable local users and groups functionality
            • Overview
            • Enable or disable local users and groups
            • Enable or disable local user authentication
          • Manage local user accounts
            • Modify local user accounts
            • Enable or disable local user accounts
            • Change local user account passwords
            • Display information about local users
            • Display information about group memberships for local users
            • Delete local user accounts
          • Manage local groups
            • Modify local groups
            • Display information about local groups
            • Manage local group membership
            • Display information about members of local groups
            • Delete a local group
            • Update domain user and group names in local databases
          • Manage local privileges
            • Add privileges to local or domain users or groups
            • Remove privileges from local or domain users or groups
            • Reset privileges for local or domain users and groups
            • Display information about privilege overrides
        • Configure bypass traverse checking
          • Overview
          • Allow users or groups to bypass directory traverse checking
          • Disallow users or groups from bypassing directory traverse checking
        • Display information about file security and audit policies
          • Overview
          • Display information about file security on NTFS security-style volumes
          • Display information about file security on mixed security-style volumes
          • Display information about file security on UNIX security-style volumes
          • Display information about NTFS audit policies on FlexVol volumes using the CLI
          • Display information about NFSv4 audit policies on FlexVol volumes using the CLI
          • Ways to display information about file security and audit policies
        • Manage NTFS file security, NTFS audit policies, and Storage-Level Access Guard on SVMs using the CLI
          • Overview
          • Use cases for using the CLI to set file and folder security
          • Limits when using the CLI to set file and folder security
          • How security descriptors are used to apply file and folder security
          • Guidelines for applying file-directory policies that use local users or groups on the SVM disaster recovery destination
          • Configure and apply file security on NTFS files and folders using the CLI
            • Create an NTFS security descriptor
            • Add NTFS DACL access control entries to the NTFS security descriptor
            • Create security policies
            • Add a task to the security policy
            • Apply security policies
            • Monitor the security policy job
            • Verify the applied file security
          • Configure and apply audit policies to NTFS files and folders using the CLI
            • Create an NTFS security descriptor
            • Add NTFS SACL access control entries to the NTFS security descriptor
            • Create security policies
            • Add a task to the security policy
            • Apply security policies
            • Monitor the security policy job
            • Verify the applied audit policy
          • Considerations when managing security policy jobs
          • Commands for managing NTFS security descriptors
          • Commands for managing NTFS DACL access control entries
          • Commands for managing NTFS SACL access control entries
          • Commands for managing security policies
          • Commands for managing security policy tasks
          • Commands for managing security policy jobs
        • Configure the metadata cache for SMB shares
          • How SMB metadata caching works
          • Enable the SMB metadata cache
          • Configure the lifetime of SMB metadata cache entries
        • Manage file locks
          • About file locking between protocols
          • How ONTAP treats read-only bits
          • How ONTAP differs from Windows on handling locks on share path components
          • Display information about locks
          • Breaking locks
        • Monitor SMB activity
          • Display SMB session information
          • Display information about open SMB files
          • Determine which statistics objects and counters are available
          • Display statistics
      • Deploy SMB client-based services
        • Use offline files to allow caching of files for offline use
          • Overview
          • Requirements for using offline files
          • Guidelines for deploying offline files
          • Configure offline files support on SMB shares using the CLI
          • Configure offline files support on SMB shares by using the Computer Management MMC
        • Use roaming profiles to store user profiles centrally on a SMB server associated with the SVM
          • Overview
          • Requirements for using roaming profiles
          • Configure roaming profiles
        • Use folder redirection to store data on a SMB server
          • Overview
          • Requirements for using folder redirection
          • Configure folder redirection
        • Access the ~snapshot directory from Windows clients using SMB 2.x
        • Recover files and folders using Previous Versions
          • Overview
          • Requirements for using Microsoft Previous Versions
          • Use the Previous Versions tab to view and manage Snapshot copy data
          • Determine whether Snapshot copies are available for Previous Versions use
          • Create a Snapshot configuration to enable Previous Versions access
          • Guidelines for restoring directories that contain junctions
      • Deploy SMB server-based services
        • Manage home directories
          • How ONTAP enables dynamic home directories
          • Home directory shares
            • Add a home director share
            • Home directory shares require unique user names
            • What happens to static home directory share names after upgrading
          • Add a home directory search path
          • Create a home directory configuration using the %w and %d variables
          • Configure home directories using the %u variable
          • Additional home directory configurations
          • Commands for managing search paths
          • Display information about an SMB user’s home directory path
          • Manage accessibility to users' home directories
        • Configure SMB client access to UNIX symbolic links
          • How ONTAP enables you to provide SMB client access to UNIX symbolic links
          • Limits when configuring UNIX symbolic links for SMB access
          • Control automatic DFS advertisements in ONTAP with a CIFS server option
          • Configure UNIX symbolic link support on SMB shares
          • Create symbolic link mappings for SMB shares
          • Commands for managing symbolic link mappings
        • Use BranchCache to cache SMB share content at a branch office
          • Overview
          • Requirements and guidelines
            • BranchCache version support
            • Network protocol support requirements
            • ONTAP and Windows hosts version requirements
            • Reasons ONTAP invalidates BranchCache hashes
            • Guidelines for choosing the hash store location
            • BranchCache recommendations
          • Configure BranchCache
            • Overview
            • Requirements for configuring BranchCache
            • Configure BranchCache on the SMB server
            • Where to find information about configuring BranchCache at the remote office
          • Configure BranchCache-enabled SMB shares
            • Overview
            • Create a BranchCache-enabled SMB share
            • Enable BranchCache on an existing SMB share
          • Manage and monitor the BranchCache configuration
            • Modify BranchCache configurations
            • Display information about BranchCache configurations
            • Change the BranchCache server key
            • Pre-computing BranchCache hashes on specified paths
            • Flush hashes from the SVM BranchCache hash store
            • Display BranchCache statistics
            • Support for BranchCache Group Policy Objects
            • Display information about BranchCache Group Policy Objects
          • Disable BranchCache on SMB shares
            • Overview
            • Disable BranchCache on a single SMB share
            • Stop automatic caching on all SMB shares
          • Disable or enable BranchCache on the SVM
            • What happens when you disable or reenable BranchCache on the CIFS server
            • Disable or enable BranchCache
          • Delete the BranchCache configuration on SVMs
            • What happens when you delete the BranchCache configuration
            • Delete the BranchCache configuration
          • What happens to BranchCache when reverting
        • Improve Microsoft remote copy performance
          • Overview
          • How ODX works
          • Requirements for using ODX
          • Guidelines for using ODX
          • Use cases for ODX
          • Enable or disable ODX
        • Improve client response time by providing SMB automatic node referrals with Auto Location
          • Overview
          • Requirements and guidelines for using automatic node referrals
          • Support for SMB automatic node referrals
          • Enable or disable SMB automatic node referrals
          • Use statistics to monitor automatic node referral activity
          • Monitor client-side SMB automatic node referral information using a Windows client
        • Provide folder security on shares with access-based enumeration
          • Overview
          • Enable or disable access-based enumeration on SMB shares
          • Enable or disable access-based enumeration from a Windows client
      • NFS and SMB file and directory naming dependencies
        • Overview
        • Characters a file or directory name can use
        • Case-sensitivity of file and directory names in a multiprotocol environment
        • How ONTAP creates file and directory names
        • How ONTAP handles multi-byte file, directory, and qtree names
        • Configure character mapping for SMB file name translation on volumes
        • Commands for managing character mappings for SMB file name translation
    • Provide S3 client access to NAS data
      • Overview
      • NAS data requirements
      • Enable S3 multi-protocol access
      • Create S3 NAS bucket
      • Enable S3 client users
    • SMB configuration for Microsoft Hyper-V and SQL Server
      • Overview
      • Configure ONTAP for Microsoft Hyper-V and SQL Server over SMB solutions
      • Nondisruptive operations for Hyper-V and SQL Server over SMB
        • What are nondisruptive operations?
        • Protocols that enable nondisruptive operations over SMB
        • Key concepts about nondisruptive operations for Hyper-V and SQL Server over SMB
        • How SMB 3.0 functionality supports nondisruptive operations over SMB shares
        • What the Witness protocol does to enhance transparent failover
        • How the Witness protocol works
      • Share-based backups with Remote VSS
        • Overview
        • Remote VSS concepts
        • Example of a directory structure used by Remote VSS
        • How SnapManager for Hyper-V manages Remote VSS-based backups for Hyper-V over SMB
      • How ODX copy offload is used with Hyper-V and SQL Server over SMB shares
      • Configuration requirements and considerations
        • ONTAP and licensing requirements
        • Network and data LIF requirements
        • SMB server and volume requirements for Hyper-V over SMB
        • SMB server and volume requirements for SQL Server over SMB
        • Continuously available share requirements and considerations for Hyper-V over SMB
        • Continuously available share requirements and considerations for SQL Server over SMB
        • Remote VSS considerations for Hyper-V over SMB configurations
        • ODX copy offload requirements for SQL Server and Hyper-V over SMB
      • Recommendations for SQL Server and Hyper-V over SMB configurations
      • Plan the Hyper-V or SQL Server over SMB configuration
        • Complete the volume configuration worksheet
        • Complete the SMB share configuration worksheet
      • Create ONTAP configurations for nondisruptive operations with Hyper-V and SQL Server over SMB
        • Overview
        • Verify that both Kerberos and NTLMv2 authentication are permitted (Hyper-V over SMB shares)
        • Verify that domain accounts map to the default UNIX user
        • Verify that the security style of the SVM root volume is set to NTFS
        • Verify that required CIFS server options are configured
        • Configure SMB Multichannel for performance and redundancy
        • Create NTFS data volumes
        • Create continuously available SMB shares
        • Add the SeSecurityPrivilege privilege to the user account (for SQL Server of SMB shares)
        • Configure the VSS shadow copy directory depth (for Hyper-V over SMB shares)
      • Manage Hyper-V and SQL Server over SMB configurations
        • Configure existing shares for continuous availability
        • Enable or disable VSS shadow copies for Hyper-V over SMB backups
      • Use statistics to monitor Hyper-V and SQL Server over SMB activity
        • Determine which statistics objects and counters are available
        • Display SMB statistics
      • Verify that the configuration is capable of nondisruptive operations
        • Use health monitoring to determine whether nondisruptive operation status is healthy
        • Display nondisruptive operation status by using system health monitoring
        • Verify the continuously available SMB share configuration
        • Verify LIF status
        • Determine whether SMB sessions are continuously available
          • Display SMB session information
          • Display information about open SMB files
  • SAN storage management
    • SAN concepts
      • SAN provisioning with iSCSI
      • iSCSI service management
        • Overview
        • How iSCSI authentication works
        • iSCSI initiator security management
        • iSCSI endpoint isolation
        • What CHAP authentication is
        • How using iSCSI interface access lists to limit initiator interfaces can increase performance and security
        • iSNS server registration requirement
      • SAN provisioning with FC
      • SAN provisioning with NVMe
      • About SAN volumes
        • Overview
        • Configure volume provisioning options
        • SAN volume configuration options
        • Requirement for moving volumes in SAN environments
        • Considerations for setting fractional reserve
      • About host-side space management
        • Overview
        • Automatic host-side space management with SCSI thinly provisioned LUNs
        • Enable space allocation for SCSI thinly provisioned LUNs
        • Host support for SCSI thin provisioning
        • Simplified host management with SnapCenter
      • About igroups
      • Example of how igroups give LUN access
      • Specify initiator WWPNs and iSCSI node names for an igroup
      • Storage virtualization with VMware and Microsoft copy offload
        • Overview
        • How LUN access works in a virtualized environment
        • Considerations for LIFs in cluster SAN environments
        • Improve VMware VAAI performance for ESX hosts
        • Microsoft Offloaded Data Transfer (ODX)
    • SAN administration
      • SAN provisioning
        • Overview
        • Configure switches for FCoE
        • System requirements
        • What to know before you create a LUN
        • Verify or add the FC or iSCSI license
        • Provision SAN storage
      • NVMe provisioning
        • Overview
        • License requirements
        • NVMe support and limitations
        • Configure an SVM for NVMe
        • Provision NVMe storage
        • Map an NVMe namespace to a subsystem
      • Manage LUNs
        • Edit LUN QoS Policy
        • Convert a LUN into a namespace
        • Take a LUN offline
        • Resize a LUN
        • Move a LUN
        • Delete a LUN
        • What to know before copying LUNs
        • Examine configured and used space of a LUN
        • Control and monitor I/O performance to LUNs using Storage QoS
        • Tools available to effectively monitor your LUNs
        • Capabilities and restrictions of transitioned LUNs
        • I/O misalignments on properly aligned LUNs
        • Ways to address issues when LUNs go offline
        • Troubleshoot iSCSI LUNs not visible on the host
      • Manage igroups and portsets
        • Ways to limit LUN access with portsets and igroups
        • Manage igroups and initiators
        • Create nested igroup
        • Map igroup to multiple LUNs
        • Create a portset and bind to an igroup
        • Manage portsets
        • Selective LUN Map
      • Manage iSCSI protocol
        • Configure your network for best performance
        • Configure an SVM for iSCSI
        • Define a security policy method for an initiator
        • Delete an iSCSI service for an SVM
        • Get more details in iSCSI session error recoveries
        • Register the SVM with an iSNS server
        • Resolve iSCSI error messages on the storage system
        • iSCSI LIF failover for ASA platforms
      • Manage FC protocol
        • Configure an SVM for FC
        • Delete an FC service for an SVM
        • Recommended MTU configurations for FCoE jumbo frames
      • Manage NVMe protocol
        • Start the NVMe/FC service for an SVM
        • Delete NVMe/FC service from an SVM
        • Resize a NVMe namespace
        • Convert a namespace into a LUN
        • Set up secure authentication over NVMe/TCP
        • Disable secure authentication over NVMe/TCP
      • Manage systems with FC adapters
        • Overview
        • Commands for managing FC adapters
        • Configure FC adapters
        • View adapter settings
        • Change the UTA2 port from CNA mode to FC mode
        • Change the CNA/UTA2 target adapter optical modules
        • Supported port configurations for X1143A-R6 adapters
        • Configure X1143A-R6 adapter ports
        • Prevent loss of connectivity when using the X1133A-R6 adapter
      • Manage LIFs for all SAN protocols
        • Overview
        • Configure an NVMe LIF
        • What to know before moving a SAN LIF
        • Remove a SAN LIF from a port set
        • Move a SAN LIF
        • Delete a LIF in a SAN environment
        • SAN LIF requirements for adding nodes to a cluster
        • Configure iSCSI LIFs to return FQDN to host iSCSI SendTargets Discovery Operation
      • Recommended volume and file or LUN configuration combinations
        • Overview
        • Determine the correct volume and LUN configuration combination for your environment
        • Calculate rate of data growth for LUNs
        • Configuration settings for space-reserved files or LUNs with thick-provisioned volumes
        • Configuration settings for non-space-reserved files or LUNs with thin-provisioned volumes
        • Configuration settings for space-reserved files or LUNs with semi-thick volume provisioning
    • SAN data protection
      • Overview
      • Effect of moving or copying a LUN on Snapshot copies
        • Overview
        • Restore a single LUN from a Snapshot copy
        • Restore all LUNs in a volume from a Snapshot copy
        • Delete one or more existing Snapshot copies from a volume
      • Use FlexClone LUNs to protect your data
        • Overview
        • Reasons for using FlexClone LUNs
        • How a FlexVol volume can reclaim free space with autodelete setting
        • Configure a FlexVol volume to automatically delete FlexClone files and FlexClone LUNs
        • Clone LUNs from an active volume
        • Create FlexClone LUNs from a Snapshot copy in a volume
        • Prevent a specific FlexClone file or FlexClone LUN from being automatically deleted
      • Configure and use SnapVault backups in a SAN environment
        • Overview
        • Access a read-only LUN copy from a SnapVault backup
        • Restore a single LUN from a SnapVault backup
        • Restore all LUNs in a volume from a SnapVault backup
      • How you can connect a host backup system to the primary storage system
      • Back up a LUN through a host backup system
    • SAN configuration reference
      • Overview
      • Considerations for iSCSI configurations
        • Overview
        • Ways to configure iSCSI SAN hosts with single nodes
        • Ways to configure iSCSI SAN hosts with HA pairs
        • Benefits of using VLANs in iSCSI configurations
      • Considerations for FC-NVMe configurations
      • Considerations for FC configurations
        • Overview
        • Ways to configure FC and FC-NVMe SAN hosts with single nodes
        • Ways to configure FC & FC-NVMe SAN hosts with HA pairs
        • FC switch configuration best practices
        • Supported number of FC hop counts
        • FC target port supported speeds
        • FC Target port configuration recommendations
      • Manage systems with FC adapters
        • Overview
        • Commands for managing FC adapters
        • Configure FC adapters for initiator mode
        • Configure FC adapters for target mode
        • Display information about an FC target adapter
        • Change the FC adapter speed
        • Supported FC ports
        • Prevent loss of connectivity when using the X1133A-R6 adapter
      • Manage X1143A-R6 adapters
        • Overview
        • Configure the ports
        • Change the UTA2 port from CNA mode to FC mode
        • Change the CNA/UTA2 target adapter optical modules
        • View adapter settings
      • Ways to Configure FCoE
        • Overview
        • FCoE initiator and target combinations
        • FCoE supported hop count
      • Fibre Channel and FCoE zoning
        • Overview
        • World Wide Name-based zoning
        • Individual zones
        • Single-fabric zoning
        • Dual-fabric HA pair zoning
        • Zoning restrictions for Cisco FC and FCoE switches
      • Requirements for shared SAN configurations
      • Host support for multipathing
        • Overview
        • When host multipathing software is required
        • Recommended number of paths from host to nodes in cluster
      • Configuration limits
        • Determine the number of supported nodes for SAN configurations
        • Determine the number of supported hosts per cluster in FC and FC-NVMe configurations
        • Determine the supported number of hosts in iSCSI configurations
        • FC switch configuration limits
        • Calculate queue depth
        • Set queue depths
      • Considerations for SAN configurations in a MetroCluster environment
        • Overview
        • Prevent port overlap between switchover and switchback
  • S3 object storage management
    • S3 configuration
      • Overview
      • S3 support in ONTAP 9
        • ONTAP S3 architecture and use cases
        • ONTAP version support for S3 object storage
        • ONTAP S3 supported actions
        • ONTAP S3 interoperability
        • ONTAP S3 validated third-party solutions
      • About the S3 configuration process
        • Workflow
        • Assess physical storage requirements
        • Assess networking requirements
        • Decide where to provision new S3 storage capacity
      • Configure S3 access to an SVM
        • Create an SVM for S3
        • Create and install a CA certificate on the SVM
        • Create an S3 service data policy
        • Create data LIFs
        • Create intercluster LIFs for remote FabricPool tiering
        • Create the S3 object store server
      • Add storage capacity to an S3-enabled SVM
        • Create a bucket
        • Create a bucket lifecycle rule
        • Create an S3 user
        • Create or modify S3 groups
        • Create or modify access policy statements
          • About bucket and object store server policies
          • Modify a bucket policy
          • Create or modify an object store server policy
        • Enable client access to S3 object storage
          • Enable ONTAP S3 access for remote FabricPool tiering
          • Enable ONTAP S3 access for local FabricPool tiering
          • Enable client access from an S3 app
      • Storage service definitions
    • Protect buckets with S3 SnapMirror
      • Overview
      • Mirror and backup protection on a remote cluster
        • Create mirror for new bucket
        • Create mirror for existing bucket
        • Takeover from destination
        • Restore from destination
      • Mirror and backup protection on the local cluster
        • Create mirror for new bucket
        • Create mirror for existing bucket
        • Takeover from destination
        • Restore from destination
      • Backup protection with cloud targets
        • Requirements for cloud targets
        • Create backup for new bucket
        • Create backup for existing bucket
        • Restore from cloud target
      • Modify mirror policy
    • Audit S3 events
      • Overview
      • Plan a configuration
      • Create and enable the configuration
      • Select buckets for auditing
      • Modify the configuration
      • Show configurations
  • Security and data encryption
    • Security with System Manager
    • Manage administrator authentication and RBAC
      • Overview
      • Workflow
      • Configuration worksheets
      • Create login accounts
        • Overview
        • Enable local account access
          • Overview
          • Enable password account access
          • Enable SSH public key accounts
          • Enable multifactor authentication (MFA) accounts
            • Overview
            • Manage multifactor authentication with System Manager
            • Enable MFA with SSH and TOTP
            • Configure local user account for MFA with TOTP
            • Reset TOTP configuration
            • Disable TOTP secret key
          • Enable SSL certificate accounts
        • Enable Active Directory account access
        • Enable LDAP or NIS account access
        • Configure SAML authentication
      • Manage access-control roles
        • Overview
        • Modify the role assigned to an administrator
        • Define custom roles
        • Predefined roles for cluster administrators
        • Predefined roles for SVM administrators
        • Control administrator access with System Manager
      • Manage administrator accounts
        • Overview
        • Associate a public key with an administrator account
        • Manage SSH public keys and X.509 certificates for an administrator account
        • Generate and install a CA-signed server certificate
        • Manage certificates with System Manager
        • Configure Active Directory domain controller access
        • Configure LDAP or NIS server access
        • Change an administrator password
        • Lock and unlock an administrator account
        • Manage failed login attempts
        • Enforce SHA-2 on administrator account passwords
        • Diagnose and correct file access issues with System Manager
      • Manage multi-admin verification
        • Overview
        • Manage administrator groups
        • Enable and disable multi-admin verification
        • Manage protected operation rules
        • Request execution of protected operations
        • Manage protected operation requests
    • Protect against ransomware
      • Overview
      • Use cases and considerations