* * * READ ME * * * * * * InfoScale 7.0.1 * * * * * * Patch 3 * * * Patch Date: 2017-05-09 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- InfoScale 7.0.1 Patch 3 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- Windows Server 2008 R2 X64 Windows Server 2012 R2 X64 Windows 2012 X64 BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * InfoScale Enterprise 7.0 * InfoScale Foundation 7.0 * InfoScale Storage 7.0 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: Patch_7_0_15303_129_3866918 * 3866918 (3854164) When the logged-on user is a nested domain user with administrative privileges, the user is not able to perform Storage Foundation for Windows (SFW) administrative tasks on the SFW server. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following incidents: Patch ID: Patch_7_0_15303_129_3866918 * 3866918 (Tracking ID: 3854164) SYMPTOM: When the logged-on user is a nested domain user with administrative privileges, the user is not able to perform SFW administrative tasks on the SFW server. DESCRIPTION: When you connect to the SFW server through the logged-on user option as a nested domain user (with administrative rights on the server), you are able to connect to the VEA server but are unable to perform any SFW-related administrative operation on the server. This is due to a limitation in the existing Windows API for the nested domain user. RESOLUTION: This issue has been resolved by using the LDAP provider to fetch the user information from the active directory. The LDAP provider checks the nested user privileges and reports if the user has admin privileges. FILE / VERSION: vxvea3.dll / 3.4.951.0 OBGUI.jar / NA ci.jar / NA obCommon.jar / NA INSTALLING THE PATCH -------------------- This package contains self-extracting files that are specific to the processor architecture and operating system version. Choose the appropriate file for your computer's configuration. Download the appropriate hotfix executable to a temporary location on your system. You can install this hotfix using the GUI or from the command line. Instructions for both options are provided below. To install the hotfix using the GUI ----------------------------------- 1. Double click the hotfix executable file to extract the contents to a default location on the cluster node. The files are extracted to: "%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates" The Hotfix Installer Wizard is automatically launched after the files are extracted. 2. Click "Next" on the Welcome screen. The 'Hotfix Installation Task' screen lists the tasks that are performed by the installer. 3. Click "Install Hotfix" to begin the hotfix installation. The status of each installation task is updated as it completes. 4. After the tasks are complete, click "Next" and then click "Finish" to complete the installation process. 5. If prompted to restart the server, do so. To install the hotfix using the command line -------------------------------------------- 1. At the command prompt, run one of the following commands to extract the hotfix files to the default location: C:\temp> .exe/x or C:\temp> .exe/extract 2. From the command prompt, navigate to the default location where the hotfix files are extracted. The files are extracted to: "%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\ " 3. At the command prompt, run the following command to install the hotfix: VxHF.exe /install: /silent Here, is the name of the hotfix file excluding the OS, platform, and .exe extension. 4. Follow the instructions displayed in the command prompt to complete the hotfix installation. 5. If prompted to restart the server, do so at this time. REMOVING THE PATCH ------------------ Additional Notes ---------------- - To confirm the installation of a hotfix, run the following command: vxhf.exe /list On the system, vxhf.exe is located at: "%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\ " The output of this command lists the hotfixes installed on a system. - The hotfix installer (vxhf.exe) creates and stores logs at: "%allusersprofile%\Application Data\Veritas\VxHF" - For general information about the hotfix installer (vxhf.exe), please refer to the following technote: http://www.veritas.com/docs/TECH73446 - To view a list of hotfixes already installed on a system, please refer to the steps mentioned in the following technote: http://www.veritas.com/docs/TECH73438 - For information on uninstalling a hotfix, please refer to the steps mentioned in the following technote: http://www.veritas.com/docs/TECH73443 SPECIAL INSTRUCTIONS -------------------- Disclaimer This fix is provided without warranty of any kind including the warranties of title or implied warranties of merchantability, fitness for a particular purpose and non-infringement. Veritas disclaims all liability relating to or arising out of this fix. It is recommended that the fix be evaluated in a test environment before implementing it in your production environment. When the fix is incorporated into a Storage Foundation for Windows maintenance release, the resulting Hotfix or Service Pack must be installed as soon as possible. Veritas Technical Services will notify you when the maintenance release (Hotfix or Service Pack) is available if you sign up for notifications from the Veritas support site https://www.veritas.com/support and/or from Veritas Services and Operations Readiness Tools (SORT) http://sort.veritas.com. OTHERS ------ NONE