Integration concepts The indexing process is started from the Data Protector GUI as a post-restore operation, driven by special pre-exec and post-exec scripts bundled with Data Protector. To avoid potential exposures of sensitive data, the integration enables customers complete control over what is indexed. Acquired metadata tags stored in the IDOL Server can later be used in the legal hold use cases and for e-discovery and other purposes where full-content keyword search is required. Interactively selected Data Protector backup data is exposed to the automatic indexing process driven by the IDOL Server (on-demand indexing).
#Hp data protector express 3.5 manual full#
The Data Protector IDOL Server integration together with the IDOL Server overcomes this limitation by introducing advanced functionality for performing restore based on full content search. Introduction The selective restore capabilities of Data Protector have been limited to the restore-by-query functionality available in its graphical user interface. The white paper ends with a glossary, which explains some of the frequently used terms, and references to relevant resources on the web. Where needed, cross-references point to Data Protector and IDOL Server documentation items. The white paper includes information which, together with information in the Data Protector end-user documentation and the IDOL Server end-user documentation, guides you through all usage aspects of the Data Protector IDOL Server integration (integration): installation and configuration, indexing Data Protector backup images, restoring on a basis of full content search, and troubleshooting.
![hp data protector express 3.5 manual hp data protector express 3.5 manual](https://3.bp.blogspot.com/--znqXyRmT9I/Tfnr_fmAsBI/AAAAAAAAAEw/2ZikSzzkqTc/s1600/hp+data+protector+3.jpg)
12ΔΆ Summary This technical white paper describes the integration of HP Data Protector (Data Protector) with Autonomy IDOL Server (IDOL Server), which introduces e-discovery for enterprise environments where Data Protector is used as the data protection application. 9 Problems and workarounds Glossary For more information Call to action. 1 HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary.