-
公开(公告)号:US11531641B2
公开(公告)日:2022-12-20
申请号:US16189813
申请日:2018-11-13
申请人: QUEST SOFTWARE INC.
发明人: Goutham Rao , Ratna Manoj Bolla , Vinod Jayaraman
IPC分类号: G06F16/00 , G06F16/11 , G06F16/17 , G06F16/174
摘要: Mechanisms are provided for adjusting a configuration of data stored in a storage system. According to various embodiments, a storage module may be configured to store a configuration of data. A processor may be configured to identify an estimated performance level for the storage system based on a configuration of data stored on the storage system. The processor may also be configured to transmit an instruction to adjust the configuration of data on the storage system to meet the service level objective when the estimated performance level fails to meet a service level objective for the storage system.
-
公开(公告)号:US10956247B2
公开(公告)日:2021-03-23
申请号:US15824888
申请日:2017-11-28
申请人: QUEST SOFTWARE INC.
发明人: Jake Seigel , Sohail Ali , Derek Jury
摘要: A system, method, and computer-readable medium are disclosed for collecting and transmitting diagnostics information via a diagnostic information operation. The diagnostic information operation begins with a system periodically writing diagnostic information such as diagnostic errors and warnings to non-volatile local storage contained within the system. Upon detection of a failure, the user activates an NFC-enabled device (such as a mobile device) and positions the NFC-enabled device within NFC range of the failed system. The failed system then communicates the diagnostic information stored within the non-volatile local storage to NFC-enabled device.
-
公开(公告)号:US10681026B2
公开(公告)日:2020-06-09
申请号:US15832563
申请日:2017-12-05
申请人: QUEST SOFTWARE
摘要: A system for auditing authorized key files associated with secure shell (SSH) servers is disclosed. In an example, the system may include a purpose-built SSH audit server. The SSH audit server may be configured to receive an authorized key file and a list of users. The SSH audit sever may generate and provide unique registration codes for each of the users in the list. The SSH audit server may associate particular users with particular public keys as each of the users accesses the SSH audit server using a public key and inputs a registration code.
-
公开(公告)号:US10594701B1
公开(公告)日:2020-03-17
申请号:US16153282
申请日:2018-10-05
申请人: Quest Software Inc.
摘要: In one embodiment, a method is performed by a computer system. The method includes receiving base attribute values of a registrant device. The method further includes determining similarities of the base attribute values to a reference string to yield base similarity values. The method also includes registering the registrant device for policy enforcement using the base similarity values. Furthermore, the method includes, responsive to a trigger, determining target attribute values of a target device. Also, the method includes determining similarities of the target attribute values to the reference string to yield target similarity values. Moreover, the method includes, responsive to the target similarity values satisfying a similarity threshold in relation to the base similarity values, configuring policy enforcement such that the target device is treated as the registrant device.
-
公开(公告)号:US10552220B2
公开(公告)日:2020-02-04
申请号:US14869758
申请日:2015-09-29
申请人: QUEST SOFTWARE INC.
摘要: Aspects of the present invention provide systems and methods that ascertain appropriate time windows for when a task or tasks are best suited to be performed and also for appropriately sizing the number of tasks so that they can be completed within a window or windows. In embodiments, a system for estimating a system resource comprises a component selection system configured to receive a selection of one or more components and/or one or more metrics to be monitored. In embodiments, an analyzer uses at least some of the gathered data to determine one or more resource capacity windows for performing a task or tasks and determines an appropriate job size or sizes for scheduling the tasks to be performed within the one or more resource capacity windows.
-
公开(公告)号:US10405155B2
公开(公告)日:2019-09-03
申请号:US15792528
申请日:2017-10-24
申请人: Quest Software Inc.
摘要: The present disclosure provides for information handling systems and methods to configure and manage any number of heterogeneous devices. In various embodiments, a shared device configuration is simultaneously applied to a selected group of otherwise incompatible heterogeneous devices that may use different communication protocols and operating systems. Certain embodiments create and maintain a database of configuration and operational information that is accessible across platforms. A group device configuration may be automatically applied to all devices in the selected group via a batch command. Some embodiments allow independent heterogeneous devices that have similar functionality to have different device configuration settings.
-
公开(公告)号:US10389754B2
公开(公告)日:2019-08-20
申请号:US14845756
申请日:2015-09-04
申请人: QUEST SOFTWARE INC.
发明人: David Mortman
摘要: A system, method, and computer-readable medium are disclosed for performing a cloud environment governance policy operation which provides a governance policy framework for use within cloud environments. In various embodiments, the cloud environment governance policy operation expands identify access management (IAM) systems to understand not only users but also resources. Additionally, in various embodiments, the cloud environment governance policy operation provides governance packs to abstract cloud resources and compliance/governance/regulatory regimes via a common open language.
-
公开(公告)号:US10268550B2
公开(公告)日:2019-04-23
申请号:US15289769
申请日:2016-10-10
申请人: Quest Software Inc.
摘要: A recovery solution can employ virtualization software to create a virtualized Active Directory forest from a source Active Directory forest. A recovery agent can be installed on the domain controllers prior to creating copies of the domain controllers in the virtualized forest. Additionally, the recovery agent can be added to a list of trusted applications if the domain controller includes security software. The recovery solution can employ the virtualization software to store a command file at a known directory path. This command file can include commands that should be executed on the virtualized domain controller to configure it properly. The recovery agent can be configured to periodically scan the known directory path to determine whether a command file has been stored in the directory. If the recovery agent locates a command file, it can extract and execute any commands in the command file.
-
公开(公告)号:US10256978B2
公开(公告)日:2019-04-09
申请号:US15806198
申请日:2017-11-07
申请人: QUEST SOFTWARE INC.
发明人: Murali Bashyam , Tarun K. Tripathy
摘要: Techniques and mechanisms described herein facilitate the encryption of content using content-based encryption keys. According to various embodiments, data stream may include one or more data chunks. A client machine may apply a hash function to a data chunk to determine a fingerprint value. A cryptographic protocol shared with a remote server may be applied to the fingerprint value to determine a data chunk encryption key. The data chunk encryption key may be used to encrypt the data chunk, and the encrypted data chunk may be sent to the remote server for storage.
-
公开(公告)号:US10248314B2
公开(公告)日:2019-04-02
申请号:US14731278
申请日:2015-06-04
申请人: QUEST SOFTWARE INC.
IPC分类号: G06F3/06
摘要: A method for migrating a nickname cache via a migration manager is described. The method includes the migration manager locating where the nickname cache is stored and locating where the nickname cache is to be migrated. Once the source and target devices are located, the migration manager can generate any necessary transformations so that the data migrated from the source device to the target device is compatible. The nickname cache can then be extracted from the source device, transformed and stored into the nickname cache of the target device.
-
-
-
-
-
-
-
-
-