XCP ng

Author: h | 2025-04-24

★★★★☆ (4.6 / 1364 reviews)

cloud voice bt

XCP-ng Center, the Windows management console for XCP-ng and XenServer. /! EOL-Notice /! Community-maintained only /! - Releases xcp-ng/xenadmin. 183 XCP-ng Download the latest XCP-ng ISO from the XCP-ng website. As of writing this, the latest version was 8.2.1 and it can be downloaded from the following link. Click Here To Download XCP-ng ISO. After downloading latest XCP-ng ISO, create bootable USB with XCP-ng ISO.

opra real time data

XCP-ng Center for XCP-ng 8.2

Pfx file for code signing. The shift towards secure hardware devices ensures higher protection for code signing certificates, reducing the risk of unauthorized access and enhancing overall security.Developers and organizations must stay informed about these changes to certificate issuance and storage requirements. Adapting to the updated standards and adopting secure hardware devices will contribute to maintaining integrity. Recommended: Simplifying Code Signing Certificate Delivery Methods (Private Key Storage Options)You can also have a trustworthiness of code signing processes, safeguarding digital assets, and mitigating potential security risks.Locked In:“locked-in” refers to securing cryptographic keys or sensitive data within a specific hardware device or security module. When a key or data is locked into a device, unauthorized individuals cannot easily extract or access it. This approach enhances the security of cryptographic operations by reducing the risk of crucial exposure or compromise.Hardware devices such as HSMs, cloud HSMs, and USB tokens employ techniques to lock cryptographic keys, including encryption, physical security mechanisms, and access controls, ensuring the keys remain protected and isolated from external threats.How to Set up a USB Token?USB tokens used for code signing typically require the presence of the physical token (plugged into the machine) during the signing process. These tokens may utilize different client software or drivers depending on the manufacturer or specific device. Despite these variations, the critical requirement remains: the USB token must be physically secure.Although resembling a regular memory stick, the USB token plays a critical role in the security of code signing operations. It serves as a secure storage device for cryptographic keys and certificates, ensuring that only authorized individuals with access to the token can perform code signing tasks. By requiring the physical presence of the USB token, the system adds an extra layer of security by preventing unauthorized access to the signing process.However, there can be challenges when using USB tokens in specific environments. For example, in the context of USB passthrough, which allows direct access to USB devices from virtual machines, Hyper-V Server does not support this feature. This limitation can complicate using USB tokens for code signing within Hyper-V Server environments.Alternative virtualization platforms such as XCP-ng may be used to work around this limitation. XCP-ng supports USB passthrough, enabling virtual machines to access the USB token directly for code signing purposes.Nevertheless, configuring USB passthrough in XCP-ng can be complex and time-consuming, adding potential hassle to the setup.Steps to Set Up USB RemotelyRegarding alternatives for USB passthrough, VirtualHere (VH) is a highly recommended option that offers excellent functionality and competitive pricing. Unlike vendors who may not explicitly support code signing tokens, VirtualHere has been proven to work effectively with such tokens.VirtualHere Server is compatible with various operating systems, including Windows, Linux, macOS, NAS servers, and even Raspberry Pi. The server license is tied to the host machine, so you must purchase an additional license if you decide to move the USB token to another host. However, considering the affordable $49, it is unlikely to impose a significant financial burden.To implement VirtualHere, install the VH

roku web remote

XCP-ng 7.4.1 - XCP-ng Blog

Sidebar permalink keywords summary sidebar xcp/xcp-bp-netapp-xcp-overview.html multithread, nas, analytics, directory tree, deletion, delete, prerequisites NetApp XCP transfers data by using multithreads and customizable features. It is designed for three major use cases - data move or migration, file-system analytics, and fast directory tree deletion. NetApp XCP transfers data by using multithreads and customizable features. It is designed for three major use cases: data move or migration, file-system analytics, and fast directory tree deletion.Data move or migrationNetApp XCP transfers data from any NAS to NetApp NAS. This process consists of four major operations: scan, copy, sync, and verify. There are some additional features that help the data monitoring and transfer:Scan. Provides a high-level layout of NAS and MapR/HDFS data.Copy. Performs a baseline data transfer.Sync. Performs the incremental data transfer.Verify. Performs a thorough verification of the target.Show (optional). Discovers NAS shares.The following figure illustrates XCP data migration and replication operations.File-system analyticsNetApp XCP natively enables you to identify, scrutinize, and analyze unstructured data to improve insights—a key requirement for enterprise customers who want to use those insights for better planning, to operationalize high-value digital assets, and for data governance through reporting and assessment.Customers that deal with sensitive data can use NetApp XCP to answer typical operational questions, such as the following:Where is my data?How much data and what types of files do we have?What data is actively used and how much is dormant?The following figure illustrates NetApp XCP file analytics communication from the GUI.DeleteIt can be very challenging for storage teams and Electronic Design Automation (EDA) workloads to clean up large directories, whether it’s stale data or test data that needs to be cleaned to recover storage space. XCP provides a fast delete functionality that can delete a complete directory tree. The NetApp XCP Delete function removes files and folders from a given NAS path. You can leverage the match filters to delete a specific set of files and folders. For a large number of files and folders, you can use the Force option, which does not require a confirmation to delete.Live Source Migration supportLive Source Migration support included in XCP 1.7 allows migration from a data source that is in active use (read and write activity). XCP leaves out files that are being used during the migration job, such as copy and sync running, and skipped files information is captured in the XCP log.This feature supports changes on the source but does

XCP-ng 8.2 - LTS - XCP-ng Blog

Followed by subscribers one by one, restart Cisco Tftp Service only where running.Reboot all Phones.Cisco Unified CM Administration > System > Enterprise Parameters.Select Reset then you will see a pop-up with the statement You are about to reset all devices in the system. This action cannot be undone. Continue?,select OK and then select Reset.Phones will now upload the new ITL while they reboot.CUPS specific certificateCUP-XMPP CertificateNote:Presented to a Cisco Jabber client, Third-Party XMPP client, or a CAXL based application when the XMPP session is being created.The associated trust-store is used to verify connections made by Cisco XCP Directory service in performing LDAP search operations for third-party XMPP clients.The associated trust-store is used by the Cisco XCP Router service when establishing secure connections between IM and Presence Service servers if the Routing Communication Type is set to Router-to-Router.This certificate will only need to be regenerated on the publisher since this certificate is pushed to all the nodes.If you click on Generate and save, this will remove the current certificate if the server is rebooted or services restarted.Log into Cisco Unified IM and Presence OS Administration Page of Publisher.Security -> Certificate ManagementFind Certificate List Where the Certificate contains cup-xmpp.Click on “cup-xmpp” certificate and you can view the old certificate.Next click “Generate CSR”.Make sure the below is selected.Choose Certificate Purpose “cup-xmpp”.Choose distribution as “Multi-Server SAN”.Applicable for cup-xmpp: In Subject Alternate Names fill in the applicable names for your setup.For example altNames: usdecups02.domain.com (dNSName) domain.com (dNSName) usdecups01.domain.com (dNSName)Remove or click the minus side for. XCP-ng Center, the Windows management console for XCP-ng and XenServer. /! EOL-Notice /! Community-maintained only /! - Releases xcp-ng/xenadmin. 183 XCP-ng Download the latest XCP-ng ISO from the XCP-ng website. As of writing this, the latest version was 8.2.1 and it can be downloaded from the following link. Click Here To Download XCP-ng ISO. After downloading latest XCP-ng ISO, create bootable USB with XCP-ng ISO.

XCP-ng 8.3 Alpha - XCP-ng Blog

Not support changes on the destination. During migration, the destination should not be active. Live Source Migration support is only available for NFS migrations.NoteNo special settings are required for Live Source Migrations.Prerequisites for XCPBefore you deploy NetApp XCP, the following prerequisites must be met:Verify the NFS ports used by the NFS server by running the following command:rpcinfo -p To access the location where you execute the XCP operations, such as on-premises or cloud instances (for example, Azure, AWS, or Google virtual machine [VM] instances), open the firewall ports for the NFS ports.Verify that the NFS port is accessible from the XCP server by using the telnet command 2049. The default port is 2049. If your environment has a different port, use that IP.For NFS, verify that the shares are accessible from the XCP server by using the showmount -e command.Increase the number of inodes on the destination volume to more than the file count (number of files) on the source files.Download the XCP license from the NetApp XCP License Portal. You must have a NetApp account in mysupport.netapp.com or you can register for free.Download the license and have it ready.Create one NFS share on-premises for each Azure NetApp volume or for the Cloud Volume Service (premium service level) in cloud for the XCP catalog.Create an NAS volume and configure the share for the data destination.For multiple XCP instances, you must have one or more servers or cloud instances to transfer the data from multiple source folders or files to the destination.The maxdir size (default is 308MB) defines the maximum file count (approximately one million) in a single folder. Increase the maxdir size value to increase the file count. Increasing the value has an effect on additional CPU cycles.In the cloud, NetApp recommends that you have ExpressRoute (Azure), Direct Connect (AWS), or Cloud Interconnect (GCP) between on-premises and cloud.

Using Packer with XCP-ng - XCP-ng Blog

Datastore is a real-time database for storing client sessions to the Cisco Client Profile Agent. Cisco Presence Datastore ttsoft The Cisco Presence Datastore caches presence data for users and replicates it between servers in a presence redundancy group for high availability operation. Cisco Route Datastore ttroute This service is used if you configure SIP federation for the IM and Presence Service, or enable Partitioned Intradomain Federation. Cisco SIP Registration Datastore ttreg The Cisco Presence SIP Registration Datastore is a real-time database for storing SIP Registration data. A Cisco DB cmoninit A Cisco DB acts as the Progress database engine. Cisco XCP Router jabberd The Cisco XCP Router must be running for all availability and messaging services to function properly on IM and Presence. This applies to both SIP-based and XMPP-based client messaging. After IM and Presence Service installation, the system turns on Cisco XCP Router by default. Cisco XCP Connection Manager cm The Cisco XCP Connection Manager enables XMPP clients to connect to the IM and Presence server. Cisco XCP Authentication Service auth The Cisco XCP Authentication Service handles all authentication requests from XMPP clients connecting to IM and Presence Service. Cisco Sync Agent syncAgent The Cisco Sync Agent keeps IM and Presence data synchronized with Cisco Unified Communications Manager data. It sends SOAP requests to the Cisco Unified Communications Manager for data of interest to IM and Presence Service and subscribes to change notifications from Cisco Unified Communications Manager and updates the IM and Presence Service IDS database. Cisco Client Profile Agent tomcat The Cisco Client Profile Agent service provides a secure SOAP interface over HTTPS for external client connections. Cisco Intercluster Sync Agent interClusterSyn The Cisco Intercluster Sync Agent service provides the following: DND propagation to Cisco Unified Communications Manager and syncs end-user information between IM and Presence Service clusters for intercluster SIP routing. Cisco XCP Message Archiver tc The Cisco XCP Message Archiver service supports the IM Compliance feature. The IM Compliance feature logs all messages sent to and from the IM and Presence server, including point-to-point messages, and messages from instant meeting (temporary) and chat rooms for the Chat feature. Messages are logged to an external Cisco-supported database. Cisco XCP SIP Federation Connection Manager cm_sip_fed The Cisco XCP SIP Federation Connection Manager supports interdomain federation with Microsoft OCS over SIP. You also turn on this service when your deployment contains an intercluster connection between an IM and Presence Service Release 9.0 cluster and a Cisco Unified Presence Release 8.6 cluster. View Presence Server Status Use Cisco Unified CM Administration to view the status of critical services and self-diagnostic test results for the IM and Presence Service node. Procedure Step 1 Select . The Find and List Servers window appears. Step 2 Select the server search parameters, and then click Find. Matching records appear. Step 3 Select the IM and Presence server that is listed in the Find and List Servers window. The Server Configuration window appears. Step 4 Click on the Presence Server Status link in

Understanding the storage stack in XCP-ng - XCP-ng

The other Auto-populated names to remove them from the SAN.The Key Length will be 2048 and the Hash Algorith will be SHA256.Click on Generate and wait until you get successful generation prompt.After successful generation close the window.Download CSR File and send it to the team that handles signing of certificates.After receiving the “.cer” file from this team, upload that certificate to the OS admin Publisher GUI. Make sure to choose correct certificate purpose as per the CSR file.Go to Security -> Certificate Management.Press Upload Certificate/Certificate chain.Select Certificate Purpose: cup-xmppChoose the .cer file and press Upload. After successful upload close the window.Redo step 3 from first section to view the new certificate and verify the expiration has changed to the new date.After all nodes have received the signed cup-xmpp certificate, the following services needs to be restarted in the following order:Make sure services are not restarted on all nodes simultaneously as that will disrupt services. Recommended to do the restart of services with a gap of minimum 15 minutes between nodes.Login into CLI of the Cisco IM and Presenece (CUPS servers) and restart Cisco Intercluster Sync Agent.Run the following command on the Publisher "utils service restart Cisco Intercluster Sync Agent".After the restart finishes on the Publisher, then run the same command on the Subscriber.Restart Cisco XCP Router services on all nodes. This can be done from either CLI or Serviceability web page.From CLI run the following command on the Publisher "utils service restart Cisco XCP Router".After the restart finishes on the. XCP-ng Center, the Windows management console for XCP-ng and XenServer. /! EOL-Notice /! Community-maintained only /! - Releases xcp-ng/xenadmin. 183 XCP-ng

Comments

User8505

Pfx file for code signing. The shift towards secure hardware devices ensures higher protection for code signing certificates, reducing the risk of unauthorized access and enhancing overall security.Developers and organizations must stay informed about these changes to certificate issuance and storage requirements. Adapting to the updated standards and adopting secure hardware devices will contribute to maintaining integrity. Recommended: Simplifying Code Signing Certificate Delivery Methods (Private Key Storage Options)You can also have a trustworthiness of code signing processes, safeguarding digital assets, and mitigating potential security risks.Locked In:“locked-in” refers to securing cryptographic keys or sensitive data within a specific hardware device or security module. When a key or data is locked into a device, unauthorized individuals cannot easily extract or access it. This approach enhances the security of cryptographic operations by reducing the risk of crucial exposure or compromise.Hardware devices such as HSMs, cloud HSMs, and USB tokens employ techniques to lock cryptographic keys, including encryption, physical security mechanisms, and access controls, ensuring the keys remain protected and isolated from external threats.How to Set up a USB Token?USB tokens used for code signing typically require the presence of the physical token (plugged into the machine) during the signing process. These tokens may utilize different client software or drivers depending on the manufacturer or specific device. Despite these variations, the critical requirement remains: the USB token must be physically secure.Although resembling a regular memory stick, the USB token plays a critical role in the security of code signing operations. It serves as a secure storage device for cryptographic keys and certificates, ensuring that only authorized individuals with access to the token can perform code signing tasks. By requiring the physical presence of the USB token, the system adds an extra layer of security by preventing unauthorized access to the signing process.However, there can be challenges when using USB tokens in specific environments. For example, in the context of USB passthrough, which allows direct access to USB devices from virtual machines, Hyper-V Server does not support this feature. This limitation can complicate using USB tokens for code signing within Hyper-V Server environments.Alternative virtualization platforms such as XCP-ng may be used to work around this limitation. XCP-ng supports USB passthrough, enabling virtual machines to access the USB token directly for code signing purposes.Nevertheless, configuring USB passthrough in XCP-ng can be complex and time-consuming, adding potential hassle to the setup.Steps to Set Up USB RemotelyRegarding alternatives for USB passthrough, VirtualHere (VH) is a highly recommended option that offers excellent functionality and competitive pricing. Unlike vendors who may not explicitly support code signing tokens, VirtualHere has been proven to work effectively with such tokens.VirtualHere Server is compatible with various operating systems, including Windows, Linux, macOS, NAS servers, and even Raspberry Pi. The server license is tied to the host machine, so you must purchase an additional license if you decide to move the USB token to another host. However, considering the affordable $49, it is unlikely to impose a significant financial burden.To implement VirtualHere, install the VH

2025-04-18
User2357

Sidebar permalink keywords summary sidebar xcp/xcp-bp-netapp-xcp-overview.html multithread, nas, analytics, directory tree, deletion, delete, prerequisites NetApp XCP transfers data by using multithreads and customizable features. It is designed for three major use cases - data move or migration, file-system analytics, and fast directory tree deletion. NetApp XCP transfers data by using multithreads and customizable features. It is designed for three major use cases: data move or migration, file-system analytics, and fast directory tree deletion.Data move or migrationNetApp XCP transfers data from any NAS to NetApp NAS. This process consists of four major operations: scan, copy, sync, and verify. There are some additional features that help the data monitoring and transfer:Scan. Provides a high-level layout of NAS and MapR/HDFS data.Copy. Performs a baseline data transfer.Sync. Performs the incremental data transfer.Verify. Performs a thorough verification of the target.Show (optional). Discovers NAS shares.The following figure illustrates XCP data migration and replication operations.File-system analyticsNetApp XCP natively enables you to identify, scrutinize, and analyze unstructured data to improve insights—a key requirement for enterprise customers who want to use those insights for better planning, to operationalize high-value digital assets, and for data governance through reporting and assessment.Customers that deal with sensitive data can use NetApp XCP to answer typical operational questions, such as the following:Where is my data?How much data and what types of files do we have?What data is actively used and how much is dormant?The following figure illustrates NetApp XCP file analytics communication from the GUI.DeleteIt can be very challenging for storage teams and Electronic Design Automation (EDA) workloads to clean up large directories, whether it’s stale data or test data that needs to be cleaned to recover storage space. XCP provides a fast delete functionality that can delete a complete directory tree. The NetApp XCP Delete function removes files and folders from a given NAS path. You can leverage the match filters to delete a specific set of files and folders. For a large number of files and folders, you can use the Force option, which does not require a confirmation to delete.Live Source Migration supportLive Source Migration support included in XCP 1.7 allows migration from a data source that is in active use (read and write activity). XCP leaves out files that are being used during the migration job, such as copy and sync running, and skipped files information is captured in the XCP log.This feature supports changes on the source but does

2025-04-21
User9702

Not support changes on the destination. During migration, the destination should not be active. Live Source Migration support is only available for NFS migrations.NoteNo special settings are required for Live Source Migrations.Prerequisites for XCPBefore you deploy NetApp XCP, the following prerequisites must be met:Verify the NFS ports used by the NFS server by running the following command:rpcinfo -p To access the location where you execute the XCP operations, such as on-premises or cloud instances (for example, Azure, AWS, or Google virtual machine [VM] instances), open the firewall ports for the NFS ports.Verify that the NFS port is accessible from the XCP server by using the telnet command 2049. The default port is 2049. If your environment has a different port, use that IP.For NFS, verify that the shares are accessible from the XCP server by using the showmount -e command.Increase the number of inodes on the destination volume to more than the file count (number of files) on the source files.Download the XCP license from the NetApp XCP License Portal. You must have a NetApp account in mysupport.netapp.com or you can register for free.Download the license and have it ready.Create one NFS share on-premises for each Azure NetApp volume or for the Cloud Volume Service (premium service level) in cloud for the XCP catalog.Create an NAS volume and configure the share for the data destination.For multiple XCP instances, you must have one or more servers or cloud instances to transfer the data from multiple source folders or files to the destination.The maxdir size (default is 308MB) defines the maximum file count (approximately one million) in a single folder. Increase the maxdir size value to increase the file count. Increasing the value has an effect on additional CPU cycles.In the cloud, NetApp recommends that you have ExpressRoute (Azure), Direct Connect (AWS), or Cloud Interconnect (GCP) between on-premises and cloud.

2025-04-12
User9156

Datastore is a real-time database for storing client sessions to the Cisco Client Profile Agent. Cisco Presence Datastore ttsoft The Cisco Presence Datastore caches presence data for users and replicates it between servers in a presence redundancy group for high availability operation. Cisco Route Datastore ttroute This service is used if you configure SIP federation for the IM and Presence Service, or enable Partitioned Intradomain Federation. Cisco SIP Registration Datastore ttreg The Cisco Presence SIP Registration Datastore is a real-time database for storing SIP Registration data. A Cisco DB cmoninit A Cisco DB acts as the Progress database engine. Cisco XCP Router jabberd The Cisco XCP Router must be running for all availability and messaging services to function properly on IM and Presence. This applies to both SIP-based and XMPP-based client messaging. After IM and Presence Service installation, the system turns on Cisco XCP Router by default. Cisco XCP Connection Manager cm The Cisco XCP Connection Manager enables XMPP clients to connect to the IM and Presence server. Cisco XCP Authentication Service auth The Cisco XCP Authentication Service handles all authentication requests from XMPP clients connecting to IM and Presence Service. Cisco Sync Agent syncAgent The Cisco Sync Agent keeps IM and Presence data synchronized with Cisco Unified Communications Manager data. It sends SOAP requests to the Cisco Unified Communications Manager for data of interest to IM and Presence Service and subscribes to change notifications from Cisco Unified Communications Manager and updates the IM and Presence Service IDS database. Cisco Client Profile Agent tomcat The Cisco Client Profile Agent service provides a secure SOAP interface over HTTPS for external client connections. Cisco Intercluster Sync Agent interClusterSyn The Cisco Intercluster Sync Agent service provides the following: DND propagation to Cisco Unified Communications Manager and syncs end-user information between IM and Presence Service clusters for intercluster SIP routing. Cisco XCP Message Archiver tc The Cisco XCP Message Archiver service supports the IM Compliance feature. The IM Compliance feature logs all messages sent to and from the IM and Presence server, including point-to-point messages, and messages from instant meeting (temporary) and chat rooms for the Chat feature. Messages are logged to an external Cisco-supported database. Cisco XCP SIP Federation Connection Manager cm_sip_fed The Cisco XCP SIP Federation Connection Manager supports interdomain federation with Microsoft OCS over SIP. You also turn on this service when your deployment contains an intercluster connection between an IM and Presence Service Release 9.0 cluster and a Cisco Unified Presence Release 8.6 cluster. View Presence Server Status Use Cisco Unified CM Administration to view the status of critical services and self-diagnostic test results for the IM and Presence Service node. Procedure Step 1 Select . The Find and List Servers window appears. Step 2 Select the server search parameters, and then click Find. Matching records appear. Step 3 Select the IM and Presence server that is listed in the Find and List Servers window. The Server Configuration window appears. Step 4 Click on the Presence Server Status link in

2025-04-05
User1291

Is used when devices lose their trusted statusNoTrust Verification Service (TVS)cup-xmppPresented to a Cisco Jabber client, Third-Party XMPP client, or a CAXL based application when the XMPP session is being created.YesCisco XCP Connection Manager, Cisco XCP Web Connection Manager, Cisco XCP Directory service and Cisco XCP Router servicecup-xmpp-s2sPresented for XMPP interdomain federation when connecting to externally federated XMPP systemsNoCisco XCP XMPP Federation Connection ManagercupUsed for internal server communication.NoCisco SIP Proxy and Cisco Presence EngineAUTHZUsed for Keys for OAuth Refresh LoginsNoCUCM/CUC/CUPS/UCCX Versions 10.X and Later - Certificate RegenerationIn general the same applies to UC systems version 8.x and 9.x, besides that these do not support multi SAN certificates, so each server needs it's own CA signed certificate.Warning:DO NOT regenerate CallManager and TVS certificates at the same time. This will cause an unrecoverable mismatch to the installed ITL on the phone to the newly generated ITL in CUCM causing the need to remove the ITL from ALL phones in the cluster.Note:* When regenerating certificates, it is advised that this action be performed after hours due to the needs of restarting services and rebooting all phones in the cluster.** Monitor phone registration through RTMT tool.*** Check Relevant Certificates Procedure as per UC nodes for CUC/CUPS/UCCXTo regenerate expiring or expired certificates please follow the procedures below.Common certificatesTomcat CertificateNote: This certificate will only need to be regenerated on the publisher since it is pushed to all the nodes.Specific note for UCCX:When updating the Tomcat certificate in CUCM it has to be uploaded to the tomcat-trust

2025-04-08
User5554

Image to Azure Storage Cost Reduction Project to reduce Standby Image to Azure costs via improved disk provisioning and usage. In Development Exchange Online Archiving Extend M365 Exchange backup with Online Archives. In Development Cove Continuity Granular Restore Adding file- and folder-level restore capability to Standby Image and One-time Restore. In Research Google Workspace Backup Solution We aim to design and develop a Google Workspace backup solution that provides comprehensive, secure, and reliable data backup for Google Workspace services, including Gmail, Google Drive and Shared Drive. The solution will cater to our MSP partners and IT Pro who need robust data protection for business continuity, compliance, and operational efficiency. In Research Notifications for critical configuration changes Implementing advanced monitoring for critical backup configurations, with the ability to notify users of changes made. In Research User Offboarding Automation Simplify offboarding of users removed or deactivated in Microsoft by applying automation policy for the tenant in Cove M365. In Research Entra ID Security Groups for M365 users Group-based protection for M365 users, addressing different data protection requirements for various organizational units. In Research Executive Summary Reports Adding a regularly scheduled executive summary report for MSPs to provide end customers to highlight the value of services provided. In Research Support for Alternative Hypervisors for Restore Exploring support for additional hypervisors, such as Proxmox, VE, Acropolis HV, and XCP-ng. In Research Transparent and predictable SharePoint billing Added a new billing policy for tenants with many SharePoint users. In Research PSA integrations for ticketing Implement

2025-04-12

Add Comment