background image

9

 

 

Server

 

and

 

Object

 

Directory

 

Optimisation

 

 

Endpoint

 

to

 

Server

 

Communication

 ‐ 

Network

 

Load

 

Estimation

  

Endpoint

 

Encryption

 

network

 

traffic

 

is

 

the

 

easiest

 

to

 

consider

 

in

 

terms

 

of

 

“synchronization

 

events”.

 

Each

 

time

 

a

 

system

 

starts

 

it

 

tries

 

to

 

connect

 

to

 

a

 

designated

 

EEPC

 

database

 

communication

 

server

 

and

 

update

 

its

 

profile.

 

It

 

may

 

also

 

(depending

 

upon

 

configuration)

 

try

 

to

 

connect

 

periodically.

 

In

 

large

 

deployments,

 

the

 

first

 

step

 

in

 

estimating

 

the

 

network

 

load

 

caused

 

by

 

Endpoint

 

Encryption

 

is

 

to

 

estimate

 

the

 

peak

 

number

 

of

 

concurrent

 

synchronization

 

events.

  

This

 

is

 

related

 

to

 

the

 

user

 

working

 

practices.

  

For

 

example,

 

if

 

2000

 

users

 

switch

 

their

 

systems

 

on

 

at

 

9

 

A.M,

 

the

 

“9

 

A.M.”

 

effect

 

can

 

be

 

diluted

 

by

 

setting

 

optional

 

boot

 

sync

 

delay

 

and

 

offset

 

times

 

to

 

spread

 

the

 

load

 

across,

 

for

 

example

 

one

 

hour.

  

 

Once

 

peak

 

flow

 

is

 

estimated,

 

double

 

it

 

to

 

give

 

some

 

safety,

 

then

 

work

 

on

 

an

 

estimate

 

of

 

7

 

KB

 

per

 

user

 

per

 

sync

 

(this

 

is

 

a

 

very

 

high

 

approximation

 

based

 

on

 

total

 

update

 

of

 

the

 

user

 

every

 

two

 

sync

 

events).

  

A

 

typical

 

Windows

 

server,

 

in

 

our

 

experience,

 

can

 

accept

 

100

 

connections

 

per

 

second

 

per

 

server,

 

with

 

a

 

default

 

maximum

 

wait

 

time

 

of

 

30

 

seconds

 

for

 

pending

 

connections.

  

 

The

 

maximum

 

capability

 

of

 

a

 

single

 

Communications

 

Server,

 

taking

 

the

 

capacity

 

of

 

the

 

network

 

to

 

be

 

100

 

Mbps

 

(1

 

million

 

bits

 

per

 

second)

 

is

 

20

 

synchronizations

 

of

 

data

 

a

 

second.

 

A

 

Windows

 

server

 

OS

 

can

 

establish

 

connections

 

about

 

every

 

10ms,

 

and

 

can

 

handle

 

unlimited

 

connections

 

(although

 

eventually

 

it

 

will

 

run

 

out

 

of

 

clock

 

cycles

 

and

 

memory).

  

 

Once

 

established,

 

a

 

connection

 

can

 

take

 

an

 

unlimited

 

amount

 

of

 

time

 

to

 

finish,

 

though

 

the

 

default

 

timeout

 

on

 

establishing

 

a

 

connection

 

is

 

30

 

seconds.

  

If

 

there

 

are

 

more

 

than

 

100

 

attempted

 

connections

 

per

 

second,

 

the

 

queue

 

cannot

 

be

 

longer

 

than

 

3,000

 

connections.

  

 

The

 

default

 

settings

 

of

 

the

 

Communication

 

Server

 

limit

 

the

 

queue

 

to

 

200

 

entries

 

(a

 

balance

 

between

 

taking

 

connections

 

and

 

processing

 

connections).

  

After

 

that

 

point,

 

the

 

connections

 

are

 

refused.

  

This

 

is

 

a

 

reasonable

 

“real

 

world”

 

setting.

  

As

 

long

 

as

 

the

 

profile

 

of

 

the

 

system

 

is

 

set

 

to

 

retry

 

the

 

connection

 

after,

 

for

 

example,

 

four

 

hours,

 

there

 

is

 

no

 

loss

 

of

 

function.

  

Setting

 

the

 

queue

 

length

 

to

 

more

 

than

 

1500

 

can

 

result

 

in

 

poor

 

performance

 

from

 

the

 

server

 

as

 

it

 

tries

 

to

 

service

 

so

 

many

 

connections.

  

 

In

 

real

 

terms

 

we

 

can

 

say

 

that

 

as

 

a

 

general

 

maximum

 

case,

 

the

 

Endpoint

 

Encryption

 

Server

 

is

 

limited

 

to

 

100

 

connections

 

per

 

second,

 

with

 

a

 

sustained

 

load.

  

Saturation

 

in

 

our

 

experience

 

is

 

reached

 

when

 

there

 

is

 

more

 

than

 

1400

 

synchronization

 

events

 

per

 

minute

 

(1200

 

accepted

 

and

 

processed,

 

200

 

queued).

  

Achieving

 

this

 

load

 

in

 

the

 

real

 

world

 

requires

 

a

 

massive,

 

badly

 

planned

 

and

 

configured

 

population

 

of

 

systems.

  

Current

 

customers

 

with

 

40000

 

+

 

installations

 

rarely

 

exceed

 

the

 

200

 

current

 

connection

 

points,

 

most

 

of

 

which

 

are

 

administrators

 

performing

 

configuration

 

changes.

  

 

The

 

operating

 

system

 

or

 

disk

 

controller

 

caches

 

most

 

of

 

Endpoint

 

Encryption’s

 

database,

 

so

 

eventually

 

the

 

common

 

files

 

will

 

be

 

supplied

 

from

 

RAM

 

rather

 

than

 

across

 

the

 

connection

 

to

 

the

 

database

 

host,

 

or,

 

from

 

disk.

  

Using

 

the

 

compressed

 

version

 

of

 

the

 

database

 

can

 

improve

 

performance

 

by

 

a

 

small

 

amount,

 

however,

 

it

 

is

 

useful

 

when

 

corporate

 

backup

 

software

 

has

 

difficulty

 

archiving

 

the

 

database.

  

 

This

 

rough

 

calculation

 

tells

 

us

 

that

 

we

 

need

 

one

 

Endpoint

 

Encryption

 

Server

 

per

 

1400

 

events

 

a

 

minute

 

minimum;

 

however,

 

experiencing

 

the

 

system

 

in

 

action

 

will

 

give

 

true

 

feedback.

 

It

 

is

 

often

 

the

 

case

 

that

 

modern

 

hardware

 

outperforms

 

paper

 

estimations.

  

 

Estimating

 

the

 

Size

 

of

 

the

 

Object

 

Directory

  

The

 

base

 

size

 

of

 

an

 

Endpoint

 

Encryption

 

5.x

 

Object

 

Directory

 

is

 

around

 

150

 

MB.

 

Because

 

you

 

add

 

new

 

users

 

and

 

systems,

 

the

 

ODB

 

grows

 

accordingly.

  

It

 

also

 

grows

 

in

 

size

 

as

 

systems

 

synchronize

 

and

 

upload

 

audit

 

information.

  

 
 

Содержание ENDPOINT ENCRYPTION ENTERPRISE - BEST PRACTICES GUIDE

Страница 1: ...1 McAfee Endpoint Encryption Enterprise Best Practices Guide November 2009...

Страница 2: ...d No part of this publication may be reproduced transmitted transcribed stored in a retrieval system or translated into any language in any form or by any means without the written permission of McAfe...

Страница 3: ...OF 5000 USER MACHINE OBJECT DIRECTORY 10 VIRTUAL SERVERS 10 GLOBAL DEPLOYMENTS 11 OPTIMISATION ACTIONS 11 OPTIMISATION ACTIONS OVERVIEW 12 NAME INDEXING DBCFG INI 13 WARNINGS 13 DBCFG INI 13 GROUP SI...

Страница 4: ...19 CLEARING THE AUDIT 19 DELETED ITEMS CLEANUP 20 CHECKING FOR DATABASE CORRUPTION 20 WHY DOES THE DATABASE GET CORRUPTED 20 ORPHANED OBJECTS 21 RESTORE COMMANDS 21 CLEANUP COMMANDS 21 DUMP MACHINE D...

Страница 5: ...e product and the environment in which it is being used before arriving at any decision on implementation strategy Calculations and figures in this guide are based on field evidence and not theoretica...

Страница 6: ...a distributed way For example the Web Helpdesk component can be installed on a dedicated web server while the rest of the components are on a separate Endpoint Encryption Server However the majority o...

Страница 7: ...hared Server can be used for low numbers Please see Virtual Server section in this guide Virtual hardware has to be of higher specification if resources are shared See Page 11 2000 5000 users systems...

Страница 8: ...nvironment has not been fully tested at this time in engineering Load Balancing Given the best configuration is usually a single high performance server with DAS then the least optimal way to perform...

Страница 9: ...s The default settings of the Communication Server limit the queue to 200 entries a balance between taking connections and processing connections After that point the connections are refused This is a...

Страница 10: ...use of Virtual Servers is a result of Lack of resources dedicated to the virtual server Dynamically assigned resources to the virtual server which starves it of the necessary performance during peak p...

Страница 11: ...y is necessary it is better to include endpoints from all regions in the pilot phase Optimisation Actions NOTE These are generic recommendations based on experience but not always be suitable for your...

Страница 12: ...me to five minutes Disable NTFS Last Access Update with a registry change Increase the size of the NTFS Master File Table MFT with a registry change Optimize backups Exclude the Object Directory and t...

Страница 13: ...smaller than 5000 systems otherwise you find the number by multiplying the number of users or systems in the database by 0 6 Example If the number of users in the database is 10 000 the Locktimeout s...

Страница 14: ...lable from your McAfee representative Attribs SingleFile No If this is set to Yes the attributes for objects will be placed into a single file instead of each one having their own file Not generally u...

Страница 15: ...ours NOTE A similar setting KeepAliveInterval has a default 1000 1 second this setting is correct so do not change this Last Access Time Stamp NtfsDisableLastAccessUpdate With large databases it is po...

Страница 16: ...3 or 4 instead of the default value of 1 Object Directory Backup Tool Setup If you set up your Object Directory backup tool make sure it is not running too many times a day because the in between tim...

Страница 17: ...ed you schedule EEPC command line tool SBADMCL to cleanup machine audit and the user audit See Endpoint Encryption Object Directory Maintenance section below File Cache on Raid Hard Drive Controller L...

Страница 18: ...containing old deleted users systems and other objects and are found through the System tab in the Endpoint Encryption Manager These objects can slow searches down If these objects are needed for aud...

Страница 19: ...ds please see the Endpoint Encryption Scripting Tool User Guide which is found in most normal installations of the Endpoint Encryption Manager Extracting and Clearing Audit from the Database The audit...

Страница 20: ...within the Object Directory is renamed The extension of the folder is renamed from RMV to WPE With a very large database these empty removed folders can sometimes slow down searches In a test lab try...

Страница 21: ...have a full backup of SBDATA before doing this Restore Commands To restore orphaned user objects back into a group use this command SBADMCL Command RestoreUsers Adminuser Admin Adminpwd mypassword Gr...

Страница 22: ...ects in the DumpMaDesc log can be deleted from the database If the normal deletion doesn t work use Windows Explorer to browse to the actual location in the database and delete the physical folder In...

Страница 23: ...utes servicing each client EEPC has excellent password synchronization across all the endpoint clients a user is assigned to It is therefore logical that adding thousands of users to each machine will...

Страница 24: ...nate Requests This option stops the machine from entering hibernation mode Note this option is not supported in Vista With later versions of EEPC v5 x this should normally be left disabled to allow no...

Страница 25: ...ppear as a fixed drive and therefore swaps with the fixed disk after booting from it It can cause recovery problems with Remove or Emergency Boot for example Alternatively use with a floppy disk drive...

Страница 26: ...tion to encrypted data Using one autoboot user for too many machines Instead use more autoboot users to reduce the multiple connections and load on the autoboot user object in the database Autoboot us...

Отзывы: