0% found this document useful (0 votes)
30 views68 pages

DPA 6.4 Technical Differences Student Guide

The document outlines the technical differences and enhancements in Data Protection Advisor (DPA) version 6.4, including new platform qualifications, data collection improvements, and rebranding changes following the Dell EMC merger. Key updates include support for additional applications, cloud infrastructure qualifications, and new reporting capabilities such as License Usage and Front-End Terabytes metrics. It also introduces new user role attributes and the ability to discover multiple backup servers using CSV files.

Uploaded by

Shashank
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views68 pages

DPA 6.4 Technical Differences Student Guide

The document outlines the technical differences and enhancements in Data Protection Advisor (DPA) version 6.4, including new platform qualifications, data collection improvements, and rebranding changes following the Dell EMC merger. Key updates include support for additional applications, cloud infrastructure qualifications, and new reporting capabilities such as License Usage and Front-End Terabytes metrics. It also introduces new user role attributes and the ability to discover multiple backup servers using CSV files.

Uploaded by

Shashank
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 68

Welcome to Data Protection Advisor 6.4 Technical Differences.

Copyright © 2017 Dell Inc. or its subsidiaries. All Rights Reserved. Dell, EMC, and other trademarks are
trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective
owners. Published in the USA.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS IS.” DELL EMC MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY
KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Use, copying, and distribution of any DELL EMC software described in this publication requires an applicable software license. The trademarks, logos,
and service marks (collectively "Trademarks") appearing in this publication are the property of DELL EMC Corporation and other parties. Nothing
contained in this publication should be construed as granting any license or right to use any Trademark without the prior written permission of the party
that owns the Trademark.

AccessAnywhere Access Logix, AdvantEdge, AlphaStor, AppSync ApplicationXtender, ArchiveXtender, Atmos, Authentica, Authentic Problems,
Automated Resource Manager, AutoStart, AutoSwap, AVALONidm, Avamar, Aveksa, Bus-Tech, Captiva, Catalog Solution, C-Clip, Celerra, Celerra
Replicator, Centera, CenterStage, CentraStar, EMC CertTracker. CIO Connect, ClaimPack, ClaimsEditor, Claralert ,CLARiiON, ClientPak,
CloudArray, Codebook Correlation Technology, Common Information Model, Compuset, Compute Anywhere, Configuration Intelligence, Configuresoft,
Connectrix, Constellation Computing, CoprHD, EMC ControlCenter, CopyCross, CopyPoint, CX, DataBridge , Data Protection Suite. Data Protection
Advisor, DBClassify, DD Boost, Dantz, DatabaseXtender, Data Domain, Direct Matrix Architecture, DiskXtender, DiskXtender 2000, DLS ECO,
Document Sciences, Documentum, DR Anywhere, DSSD, ECS, elnput, E-Lab, Elastic Cloud Storage, EmailXaminer, EmailXtender , EMC Centera,
EMC ControlCenter, EMC LifeLine, EMCTV, Enginuity, EPFM. eRoom, Event Explorer, FAST, FarPoint, FirstPass, FLARE, FormWare, Geosynchrony,
Global File Virtualization, Graphic Visualization, Greenplum, HighRoad, HomeBase, Illuminator , InfoArchive, InfoMover, Infoscape, Infra, InputAccel,
InputAccel Express, Invista, Ionix, Isilon, ISIS,Kazeon, EMC LifeLine, Mainframe Appliance for Storage, Mainframe Data Library, Max Retriever, MCx,
MediaStor , Metro, MetroPoint, MirrorView, Mozy, Multi-Band Deduplication,Navisphere, Netstorage, NetWitness, NetWorker, EMC OnCourse,
OnRack, OpenScale, Petrocloud, PixTools, Powerlink, PowerPath, PowerSnap, ProSphere, ProtectEverywhere, ProtectPoint, EMC Proven, EMC
Proven Professional, QuickScan, RAPIDPath, EMC RecoverPoint, Rainfinity, RepliCare, RepliStor, ResourcePak, Retrospect, RSA, the RSA logo,
SafeLine, SAN Advisor, SAN Copy, SAN Manager, ScaleIO Smarts, Silver Trail, EMC Snap, SnapImage, SnapSure, SnapView, SourceOne, SRDF,
EMC Storage Administrator, StorageScope, SupportMate, SymmAPI, SymmEnabler, Symmetrix, Symmetrix DMX, Symmetrix VMAX, TimeFinder,
TwinStrata, UltraFlex, UltraPoint, UltraScale, Unisphere, Universal Data Consistency, Vblock, VCE. Velocity, Viewlets, ViPR, Virtual Matrix, Virtual
Matrix Architecture, Virtual Provisioning, Virtualize Everything, Compromise Nothing, Virtuent, VMAX, VMAXe, VNX, VNXe, Voyence, VPLEX, VSAM-
Assist, VSAM I/O PLUS, VSET, VSPEX, Watch4net, WebXtender, xPression, xPresso, Xtrem, XtremCache, XtremSF, XtremSW, XtremIO, YottaYotta,
Zero-Friction Enterprise Storage.

Revision Date: 7/2017

Revision Number: MR-7WP-DPA64TD.10

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 1
This course covers an overview of the enhancements, features, and functionality in the Data Protection
Advisor (DPA) 6.4 release.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 2
This module focuses on new platform qualifications with DPA 6.4. It also covers enhancements in data
collection and rebranding changes resulting from the Dell EMC merger.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 3
This lesson covers new platform qualifications and rebranding changes to DPA.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 4
New applications that have been qualified with DPA 6.4 are Spectrum Protect (formally TSM) 8.1, and
Avamar 7.5. In terms of new platforms, Windows Server 2016 is also supported.

Qualifications cover testing the existing DPA functionality only, and do not include support for new
features.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 5
DPA 6.4 has been qualified in cloud infrastructures such as Amazon Web Services (AWS) and Microsoft
Azure. DPA now supports deployment of DPA on premises or within AWS or Azure, for discovery and
monitoring of NetWorker, Avamar Virtual Edition, and Data Domain VE on premises or within AWS or
Azure.

The qualified target OS for DPA components in cloud environment are Windows Server 2012 and SUSE
12. Qualified applications in cloud are Avamar 7.5, NetWorker 9.1, and DataDomain Virtual Edition 3.1.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 6
In DPA 6.4, Dell EMC, and EMC logo images were removed from the UI. This is due to requirements with
the IDPA project.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 7
This lesson covers changes in data collection within DPA 6.4.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 8
Usage Intelligence is a market-leading capability that enables the collection, transfer, analysis, and
reporting of software usage and entitlement data across all DELL EMC Information Infrastructure (II)
products through a single pane of glass. This new capability is included in the EMC Secure Remote
Services (ESRS) Virtual Edition and is a FREE solution available to customers. All DELL EMC products
have a goal to move onto “Usage Intelligence”. Usage intelligence gives customers the ability to
understand how much software license is consumed with live deployed systems today. The Usage
Intelligence enables DELL EMC to track customer adoption more effectively for forecasting, planning, and
prioritization.

Front-End Terabytes or FETB is a metric for the capacity in terabytes that Avamar protects before
deduplication. All partial terabytes are rounded down. For example, if the actual collected FETB value for
an Avamar server is 800 GB, it is reported as 0.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 9
DPA 6.4 collects the FETB metric from the new version of Avamar. Supported version is Avamar 7.5.

First DPA collects the FETB numbers from each Avamar host it monitors and stores the data in the DPA
database.

Next, DPA aggregates these numbers per license type, for example, Avamar.

Finally, DPA sends aggregated values to ESRS every 24 hours, which then go to DELL EMC to determine
the license usage of customers.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 10
A new report called “License Usage” is included in DPA 6.4, and is used to show FETB values.

In this example, an Avamar server is configured to protect 1 TB of data.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 11
DPA started supporting DB2 database in version 6.3. DPA version 6.4 has been enhanced to gather the
database backup size.

DB2 backup size data collection is only applicable for DB2 v11.1.1.1 or above. Also, customers must
configure Event Monitor for their DB2 instances.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 12
Prior to DPA 6.4, only Oracle RMAN backup job data was gathered. Now with version 6.4, DPA also
collects restore jobs data.

The example shows the “All Restores” report with information about RMAN restore jobs.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 13
Previously DPA could only include the size of the backup for MS SQL jobs, and not the actual size the
data was taking on disk.

With DPA 6.4, protected size is gathered for each job from MS SQL.

In this example, the backup job size is only 2 MB, although the same data was taking 5 MB of disk space.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 14
DPA 6.4 has extended support for TSM. Now DPA can gather TSM encryption status of tape volumes.

Two new pieces of data are collected, whether encryption is enabled and the encryption manager being
used.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 15
Now DPA can collect TSM VM client group names and make that information available for reports.

In order to do that, DPA now queries data from the Extended Summary Table on TSM.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 16
Before DPA 6.4, when a user discovered an object via the Discovery Wizard, data for that object would be
gathered from that point forward.

Now with DPA 6.4, the Job Monitor gathers two weeks of historical data the first time the request runs.
Therefore, when a new application server is discovered, DPA gathers job data for the past 14 days.

This is enabled out-of-the-box for Avamar, NetWorker, and TSM.

Reports can show historical data immediately after discovery.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 17
DPA 6.4 introduces a new option for Avamar, NetWorker, and TSM Job Monitor request called “The
amount of seconds in the job collection interval”.

This option controls the maximum amount of historical data that the Job Monitor collects in a single run.
Default value is one day. That means that the first time the application is discovered, the Job Monitor
request looks back for two weeks of data, but in this example only collects one day of job data per request
run, until the two weeks of data is gathered.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 18
This module focused on new platform qualifications with DPA 6.4. It also covered enhancements in data
collection and rebranding changes resulting from the Dell EMC merger.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 19
This module focuses on new features and security enhancements with DPA 6.4.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 20
This lesson covers discovering of multiple backup servers using CSV, new roles privileges in DPA, Site
attribute and locations.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 21
Previous versions of DPA had the ability to discover multiple objects using a CSV file, like hosts, Data
Domain, and switches. Now DPA 6.4 can also discover some applications hosts using CSV.

Multiple Avamar and Oracle RMAN servers can be discovered with help of a CSV file.

In this example you can see additional options that can be added to the CSV file. The new fields are Agent
Name, Application Type, Application Name, Application Port, Application Credential Name and Application
Additional Credential Name.

These new columns can be added to the end of an existing CSV file. All the previous entries in the CSV
file will work as before.

Rediscovery of backup servers is not supported.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 22
This screenshot shows the Discovery Wizard after you have imported a CSV file. The green box highlights
the new options used to discover applications.

The red box shows an example of discovering both an Oracle RMAN and an Avamar server, with the
corresponding parameters in the application columns. Agent name, application type and application name
were specified for both applications. The Oracle RMAN application also requires application port and
credential to be properly discovered.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 23
Discovering backup servers using CSV files has a few limitations and caveats.

A DPA agent should exist and be assigned to the object being discovered. If an agent doesn’t exist, the
application object will be skipped during discovery.

Host monitoring options are not applicable for Avamar and RMAN discoveries, thus users won’t be able to
use those options when discovering backup servers.

For RMAN discovery, monitoring type cannot be selected. In this case, the ControlFile option is always
used.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 24
A new attribute has been added to User Role properties, “assign/unassign attributes”. When the privilege
is selected, the user role can assign/unassign existing attributes, but the role won’t be able to add, modify,
or delete attributes unless it also has “manage system settings” privileges.

If the “manage existing objects and groups” privilege is assigned to a role, “Assign/unassign attributes”
privilege is also automatically assigned.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 25
If a user is assigned a role with no “Assign/unassign attributes” privilege set, two things will happen.

First, the “Custom Attributes” tab in the object properties dialog is disabled, so no attributes can be
assigned or unassigned.

And secondly, when an object is selected from the Inventory > Object Search tab, the “Set Attributes”
button is unavailable.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 26
DPA 6.4 defines two new entities, Site and Location.

Location is a geographical point around the globe. Location consists of a Fully Qualified City Name
(FQCN) and longitude and latitude coordinates. FQCN is defined as City, Region and Country. For
example, City of London, England, United Kingdom. DPA maintains an internal database of around
150,000 locations. Users cannot add, delete or modify locations, but can select any existing location when
creating sites.

Site is a logical grouping of hardware or software assets. A site is defined as a Site Name and a location,
selected from the locations database.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 27
A new “Manage Sites” option was added to the “Admin > System” section. When you click “Manage
Sites”, the Manage Sites dialog is displayed. From there you can create, edit and delete sites. To create a
new site, click “Create Site”. The Create Site dialog is displayed. Here you can type a name for your new
site, and select a location by clicking “Select Location”.

The Select Location dialog is displayed. Type a location name to search the list. Then select the desired
location and click OK.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 28
Once one or more sites have been defined, you can assign them to objects as attributes.

DPA 6.4 adds a new predefined attribute type called “Site”. The Site attribute can be used to assign a site
values to any object in DPA, except groups.

Once the site attribute has been assigned to objects, it can be used to filter objects in the “Inventory >
Object Search” section. Just click the “Attributes” field, then from the Attributes list, include the Site
attribute and select any site value you want.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 29
DPA 6.4 has a predefined group type called “Sites”. It can be found in “Inventory > Group
Management”.

The Sites group is used to group objects by site. First level is the site name, while second level includes
all objects with the Site property set to that particular site.

Content for the Sites group is generated automatically. The group is updated when a new site is added,
removed or renamed, or when the Site attribute is assigned or unassigned to an object.

The Sites group is read only and cannot be modified by users.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 30
This lesson covers new security features and settings.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 31
DPA 6.4 includes many new security features and enhancements.

During fresh installs, DPA 6.4 now offers a new security option that configures the DPA service to use
Transport Layer Security (TLS) protocol version 1.2 only. The “Use TLS 1.2 only” option is available under
the Advanced Installation Options, and is disabled by default, as DPA services running TLS 1.2 only are
supported with DPA Agent version 6.3 and later only. Prior versions of DPA supported TLS protocol
versions 1.0, 1.1, and 1.2, so the new option in DPA 6.4 helps to strengthen security requirements for
incoming connections.

Upgrading from previous versions of DPA will not affect configuration because customer may have their
own custom settings for protocols and cypher suites. After upgrading to DPA 6.4, if you want to use TLS
1.2 only, you must first upgrade all DPA agents to version 6.3 or above before enabling this option.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 32
A new CLI command has been added in DPA 6.4 to configure the minimal TLS protocol level.

Here we present a couple of examples on how to set minimal TLS levels to 1.2 and 1.0.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 33
In previous versions of DPA, a default self-signed SSL certificate was shipped for all installations for all
customers.

With DPA 6.4, a new unique certificate and key store password are generated during installation.

In case of upgrade, the existing configuration is not affected. Customers may have their own certificate
configured, so upgrading to a new DPA version doesn’t change it.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 34
During DPA installation, the Administrator and Datastore passwords must be set. The default password
policy enforces the following minimum requirements: nine characters, one uppercase character, one
lowercase character, one special character, and one numerical character.

The password screen is presented during fresh installations only. Existing Administrator and Datastore
passwords are not modified during upgrades.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 35
A new “Security Settings” option has been added to the “Admin > User & Security” section. By clicking
Security Settings, the Security Settings dialog is displayed. From here a number of new options can be
set. The first group of options is Password Policy.

Options available in this group are: Minimum number of characters, Must use uppercase character, Must
use lowercase character, Must use special character, Must use numeric character. Minimum number of
characters can be set from 4 to 20.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 36
Once a password policy has been set, DPA will enforce the policy when users try to change their
passwords.

The password rules are displayed when changing passwords from the user management interface.

If changing the Administrator password from the CLI, a similar hint is displayed.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 37
DPA can be configured to prevent a user from selecting passwords that are identical to the N previous
passwords for that particular user.

From the Security Settings dialog, the second group of options is for password history. “Limit of password
history” can range from 1 to 10 and represents the size of the password history to track. Default value is 1,
and means that the user can’t select the last used password only.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 38
In case of password history policy violation, an error is displayed in the UI, as well as in the CLI for the
dpa app pwd command.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 39
The third group of options in the Security Settings dialog is Login Limit. This feature prevents brute-force
request attempts.

The “limit of login attempts” ranges from 1 to 10. If reached, the user account is temporarily locked. The
default is five attempts.

“Lockout timeout” ranges from 1 to 60 minutes. Specifies the period of time the account will stay
inaccessible after reaching “limit of login attempts” and being locked. Default is three minutes.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 40
After a failed login attempt, if there are 3 or fewer attempts left, a warning message with the remaining
attempts left is displayed.

In case of limit of login attempts is reached, a warning message with the lockout period will be displayed.

During the account lockout, all requests to the server on behalf of that particular user will be rejected.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 41
The final group of options in the Security Settings dialog is “Password Expiration”.

When Password Expiration is enabled, DPA users are required to change their passwords regularly.

“Password expiration period” ranges from 30 to 180 and specifies the maximum password age. Default
value is 90 days.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 42
After a Password Expiration policy is set, any user that logs in using a password less than 7 days from the
expiration date will receive a warning message.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 43
In case the password has already expired, during login the user will receive a warning message
requesting that the password be changed. The user then will be presented with the Change Password
dialog.

All requests to the server on behalf of this user will be rejected until the password is changed.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 44
This module focused on new features and security enhancements with DPA 6.4

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 45
This module focuses on new serviceability and usability features of DPA 6.4.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 46
This lesson covers new serviceability features.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 47
The Application patch number is now is in the login screen, the main screen and the about dialog screen,
along with the version.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 48
Agent patch number now can be found in System Settings UI. This can be useful if there are many agents
installed and it will identify them.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 49
Agent patch number also can be found in some agent related reports. Here we see it appears in the Data
Collection Agent Errors report and a copy of unsupported agents in the Modify Custom Template UI.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 50
There is a new CLI command, dpa ds version for querying DPA datastore version and patch
number.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 51
Before DPA 6.4, the datastore log was configured to use default GMT time zone for all installations. Now
the log time is set to use the local time zone of the host when datastore is installed or upgraded.

A new CLI command has been added to configure log time zone.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 52
Federated reports are now run in debug mode, the same as any other report.
To troubleshoot potential issues two sets of debug logs are generated. One set is generated on regional
DPA server(s) as if the report was run directly on them.
On a federated DPA server additional logs are generated to track execution of federated reports.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 53
DPA now requires the installer, prior to upgrade, to ensure the DPA Datastore has been backed up with a
special checkbox.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 54
DS export tracking now tracks datastore exports made by the customer via the CLI command. The
command, dpa ds export will now record start and end time stamps, export command, size,
filename/location, and status of the datastore.

DPA uses standard alerting to notify the customer about the fact that last export was too old. By default
the export status is verified every 2 hours.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 55
The DPA System Settings Max Age Notification has been added to the System Settings. It identifies
what the maximum time between successful exports should be. The default is 1 week. If the time of last
export exceeds the max age setting an alert is generated.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 56
Under Advisor > Alerts an alert will be displayed if the time of last export exceeds the max age setting.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 57
DPA 6.4 adds a new DB Export History report. It displays the following information about DS export
history. This includes the Export Command and Export Command Output, Export Files, Path and Size,
Start and End times, and Status.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 58
This lesson covers new usability features.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 59
Email can now be set in the User Properties. It Is not mandatory nor is it used in any email notifications
from the server. It may be used in future features.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 60
Report and dashboard tabs can now be closed via right-click on the context menu. The options are Close
Tab, Close All, or Close Others.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 61
For data sources in the Report Editor, the Interval Type default value of User Interval now defaults to No
Interval.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 62
The Report /Dashboard Template Editors are now expanded by default. Editors now offer full available
space when opened.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 63
Previously DPA hid all UI filters by default. Filters had to be enabled with Show Filter. Now filters are
shown by default in:
• System/Custom report templates
• System/Custom dashboard templates
• All tabs in Object Library
• Default data collection requests

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 64
Discovery Wizard now shows a reminder during the discovery of Windows hosts from a DPA UNIX server
to use a Windows Agent if Remote Agent is chosen. This is applicable for both manual and CSV
installations.

This is only applicable for Host requests.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 65
There are new UI changes in Inventory. The Object Library tab’s column Member is now renamed to
Display in all tabs. The Hosts tab has removed the Type and Real Name columns.

The Applications tab has removed the Path and Member columns. It has added a Display name which
will display both name plus the path making it possible to perform a search using the full name of object.

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 66
This module covered new serviceability and usability features in DPA 6.4

Copyright © 2017 Dell Inc. Data Protection Advisor 6.4 Technical Differences 67
This course covered an overview of the new enhancements, features, and functionality in the Data
Protection Advisor (DPA) 6.4 release.

Copyright © 2017 Dell Inc. Course Name 68

You might also like