Abstract:
An extensible management console may use a discovery mechanism to detect and identify security services across a network. After identification, the console may download and install an adapter so that the security service may be monitored and controlled using the extensible management console. A catalog of security services may be obtained from a catalog server and used to scan various devices, registries, file systems, and active services to detect and identify security services that may be added to the extensible management console.
Abstract:
A backup system stores configuration data for several interdependent systems in a single backup store. As the systems are being configured and when changes are made to the systems, the backup store is updated with the change. The systems may be configured with each system having a designated role. During a restore operation, an otherwise unallocated system may assume a particular role and use the configuration logic defined for the role that may be taken from the backup store. The system may perform the restore in conjunction with the other systems and the interdependencies with the systems.