BACKBOX Users Manual
BACKBOX Users Manual
com
Copyright © 2021 BackBox Software LTD. All rights reserved.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
into any language, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise,
without prior written permission from BackBox Software LTD.
All copyright, confidential information, patents, design rights and all other intellectual property rights of whatsoever
nature contained herein are and shall remain the sole and exclusive property of BackBox Software LTD. The
information furnished herein is believed to be accurate and reliable.
However, no responsibility is assumed by BackBox Software LTD for its use, or for any infringements of patents or
other rights of third parties resulting from its use.
The BackBox name and BackBox logo are trademarks or registered trademarks of BackBox Limited.
All other trademarks are the property of their respective owner
LIST OF TABLES
Table 1: Functions of Sidebar Screen Navigation Buttons ................................................................................... 24
Table 2: Widgets .................................................................................................................................................. 30
Table 3: Settings Screens ..................................................................................................................................... 34
Table 4: Settings Tab ............................................................................................................................................ 39
Table 5: Maintenance Tab ................................................................................................................................... 41
Table 6: Customizations Tab ................................................................................................................................ 41
Table 7: Cluster Tab ............................................................................................................................................. 42
Table 8: Audit Log Filter ....................................................................................................................................... 47
Table 9: Authentication Template Fields ............................................................................................................. 52
Table 10: Notification Alerts Columns ................................................................................................................. 58
Table 11: New Notification Configuration Fields ................................................................................................. 60
Table 12: Backups Jobs Screen: Fields and Buttons ............................................................................................. 62
Table 13: New Backup Job Configuration Fields .................................................................................................. 64
Table 14: Device Fields......................................................................................................................................... 67
Table 15: Devices Toolbar Buttons ...................................................................................................................... 69
Table 16: Device Details Fields and Buttons ........................................................................................................ 75
Table 17: Device History Buttons ......................................................................................................................... 78
Table 18: Task Job Fields ...................................................................................................................................... 90
Table 19: Option Configuration Scripting Tabs .................................................................................................. 117
Table 20: Options Columns of Dynamic Fields ................................................................................................... 118
BackBox provides comprehensive backup/restoration management, the ability to automate any kind of task,
signature-based health checks and compliance, and jumpbox functionality.
The intuitive dashboard uses a single pane to display all your devices (network/security/telephony/etc.) so
that you can easily see the status of backups and selected IntelliChecks signatures.
BackBox enables security and network administrators to manage complete backup schedules and
monitor the health of every device in the system, with configurable status alerts.
BackBox’s unique multi-check engine ensures backups have run successfully and verifies that all saved
configurations meet the criteria needed for successful restoration.
Features
• Automated Backup & Recovery
• Task Automation
• Inventory Management
• Network Visualization
• IntelliChecks + Trends
• Access Management
• Single application for backup/restore of all security and networking devices
• Intelligent automation for device mgmt. tasks, health checks, and compliance
• Support for over 180 vendors with out-of-the-box connection scripts
• Web-based management for alerts, notifications, and reports
• Multiple authentication options and granular user role options
• Jumpbox functionality with video capture and indexed keyword searches
• Live dashboard with real-time backup and monitor status display
System Requirements
The following are the minimum hardware requirements:
• Intel 4 CPU
• Disk space: 250GB (estimated for 6 months of backups)
• Memory: 8GB
• At least one network interface card (NIC)
• CD-ROM drive (for physical hardware installations)
Prerequisites
• Static IP address
• DNS server IP address (and DNS suffix)
• IP address of SMTP server (and routing/SMTP access between the BackBox server
and the SMTP server)
• Routes through firewalls to target devices on required ports
• Chrome or Firefox browser. IE doesn’t follow HTML5 and causes GUI errors
Note: If Dynamic configuration is selected then the VM will automatically configure, and the BackBox
Access screen appears. See Figure 4.
Logging In
To login to BackBox, in your web browser, enter the IP address or host name:
https://<BackBox_IP_or_Hostname>
Enter your BackBox Username and Password and press Enter. The following default values appear:
Username: admin
Password: "password" (default supplied with system)
If this is the first time you have logged into the GUI, you will be taken through the First Time Configuration
Wizard, to help you get your BackBox instance correctly set up and ready to go.
Once you agree to the terms and click Next, you will see this screen:
This is where you choose between Management (main unit) or Agent (dependent unit). Agent units
are only able to accept commands from a Management unit, so be sure you already have a
Management unit before choosing Agent. Click Next when ready.
Best Practice:
BackBox strongly recommends that you change the default passwords for the admin user
•
(admin/password) and the CLI ID root user (root/HayaldaB@gan1).
Browse to your license file and import it. If you don’t have it yet, just click Next.
Configure your global retention option. The default value is 30 meaning there will be 30 backups
retained for each device. The number of backups retained will increase storage requirements.
Best Practice:
This should match your company’s retention policy for devices. It can be overridden at the device level.
More retention requires more storage.
Best Practice:
Store the encryption key in a safe place. Your key is unique to your installation. Click Finish to
implement your choices and then restart Backbox.
After restarting, the Login screen reappears. When you login again, the Dashboard’s System Status
screen is displayed.
At the top left of the screen are displayed the time and date. On the right side are an Alerts button
as well as buttons for Username, Help and Logout. Clicking the Alerts button displays the
Notification Alerts screen. (The button is highlighted when there are indeed
notification alerts.) Clicking on Help displays BackBox Online Help.
CLI: open a CLI window to BackBox.
The dashboard includes widgets that the user can add or remove.
There are two types of widgets, system widgets, and automation-related widgets. See Understanding the
Dashboard covered later in this guide.
Best Practice:
Users can also create separate views and replace them in the dashboard view dropdown.
You can change the width of a column by placing your mouse cursor at the right side of thecolumn’s
head and dragging the column guide right or left to widen or narrow the width; forexample, in the
following screen, the Notification column will be altered by dragging:
You can also reposition columns by pressing on an empty space in a column’s head and
dragging the entire column right or left.
Sorting a Table
You can sort tables by any column by clicking the Sort button located at the right side of the head of the
column by which you want to sort; a menu like the following is displayed:
Select an option and click outside the menu. For a quick sort, just click the column’s name at the top of
the column: clicking the name toggles between Ascending and Descending sort orders.
By clicking Group in the above example, the table’s rows with identical vendors will be
collapsed into single rows; each row indicates how many items have been grouped, like this:
Clicking the Expand/Collapse buttons /. in the left column of a row displays/collapses the rows
underneath, like this:
By using the features to display and sort columns and to group rows, you can create easy to read tables
that give you the data you need.
Button Description
Devices is where you can manage backups and restores, and functionality
around your infrastructure.
Devices has four options:
• Devices is where you can add/edit/remove device profiles, and view
statuses for a device’s tasks backups, and IntelliChecks.
• Groups will allow you to set functional or operational hierarchies to
simplify management.
• IP Address Mgmt. will show you your IP segments and their members.
• Network Map will graphically display all devices and show how they
connect to each other.
With Discovery the user will able to scan the network with SNMP and add
devices automatically to BackBox with defined rules.
Schedules is where you to create, modify, and delete schedules used for
backups, tasks, IntelliChecks, and reports.
System Backups
Configure IntelliChecks
Trends
Selecting Trends displays a dropdown menu that lets you decide according to which IntelliChecks
group or single signature you wish the Trends graph to display data.
For graphs that support multiple display formats you can choose a format by clicking the ChartDisplay
icon (three bars), and then making your choice from the dropdown menu.
Table 2: Widgets
Widget Description
Dashboard view gives the user the option to create several views of widgets and replace between them.
The following table provides an overview of the screens accessible from Settings.
Screen Description
Access Rules Displays the settings that control the local Firewall of the BackBox server.
This determines which IP address can access the web interfaces and the CLI interfaces.
Administration Displays general settings for backup retention, execution time, and server IP address.
Agents Displays a list of agents and their IP addresses. It also shows which operating systems are
assigned to the agent.
Alerts Displays the fields for setting alert protocols. There are three different protocols:
SNMP, SMTP, and Syslog.
Auditing Auditing gives the ability to view the logs of BackBox, including audit logs, messages,
VSFTPD etc.
Date and Time Displays the fields where the date and time are set. The time can be set as Static or NTP.
DNS Displays the DNS settings that specify the location of the domain name servers.
Interfaces Displays the interfaces which define the connections to the devices in the system
and whether the link is up or down. They are used in routing entry definitions.
Sites Displays information about existing sites, such as the number of devices
assigned, and the number of users. You can also add, delete, and edit sites.
System Logs Displays a detailed log of each user’s activity while in the system.
Interfaces
Interfaces displays basic network information. When the Status button is green, it indicates the link
is up; when it is red , the link is down.
Editing an Interface
You can edit the interface by selecting the interface you want to edit and clicking the Edit button .
You can edit the IP address, subnet mask and other settings as shown here:
Deleting a Route
To delete a route:
In the list of routes, select the route you want to delete and click the Delete button
You are prompted to confirm the delete. Click Yes.
Note: The tab defaults to the NTP (Network Time Protocol) view. Click the Static button to view
the current date, place, and time.
Note: The SNMP monitoring and SNMP traps have three versions to choose from: v1, v2c, or v3. Each
version has different fields to be completed. Complete the appropriate fields in the desired protocol
and click Save.
Administration
The Administration screen is used to add and edit general settings, perform maintenance tasks,
implement customizations such as uploading a logo, and create clusters of devices:
Field Description
Encrypt Backup Files Files may be encrypted while at rest using AES-256
Lock Site Devices to Site Agents Enables/disables locking site devices to site agents.
Enable incident information collection Helps integrate with 3rd party software ticketing
systems
Field Description
Download Tech Support Info Downloads and zips the common log files.
Clear SSH Keys Wipes out existing keys and forces reloading for all
SSH keys.
Proxy Enter the Name, Port, and creds for the Proxy
Customizations Tab:
Field Description
Upload Custom Logo Replace the default BB logo with another logo.
Cluster Tab:
Table 7: Cluster Tab
Field Description
Licenses
The License screen enables uploading a license and displays information about the current license. The
fields are populated when the license is uploaded.
To add an Access Rule, click Add to display the following dialog box:
Sites
A site is a logical partition which contains devices, device groups, templates, or backup instructions. It
is a mechanism used by the Global administrator to delegate administration of all aspects of the
BackBox application to local servers. These local servers are managed by site administrators who
control the configuration, notifications, and backup jobs. Creating sites is an efficient and effective way
to help organize and manage the devices and backups in larger and more complex installations.
Sites help users know what devices they are authorized to access. Sites can be assigned based on the
combination of geographic location, device type, and whatever other criteria the Global BackBox
Administrator may determine is useful for their BackBox installation.
For each site, the Sites screen displays site information, including site name, and number of devices,
users, retention (how long backups are retained), and the number of simple and complex licenses for
backups and IntelliChecks.
Adding a Site
1. On the Sites screen, click the Add button to display the New Site Configuration dialog
box:
2. Type a name for the site, fill in the appropriate fields, and click Save. The new site is
displayed in the list.
3. Choose if to override global size deviation verification of backups to site
4. Create access rules to networks
5. Add logo to site
Editing a Site
1. On the Sites screen, in the list of sites, click the site whose settings you want to change
and click the Edit button .
2. Make the relevant changes and click Save.
Agents
Agents are used to manage backups when there are larger installations with multiple servers in an off-
site network. On the Sidebar, under Settings, click Agents. The Agents screen appears:
Adding an Agent
1. On the Agents screen, click the Add button. The Configure New Agent dialog box appears.
2. Fill in the agent’s name, IP address, password (customer created and used to authenticate the mgmt.
and agent instances to one another), and site; then click Save.
Note: File Replication will result in backup files from the Agent being copied back to
the Mgmt. server, resulting in redundant backups. Replicate and delete option will first copy the file to
the management and then erase it from the management.
Upgrading an Agent
You can upgrade an agent to a new version by clicking the Upgrade button .
Deleting an Agent
1. On the Agents screen, select the agent to be deleted.
2. Click the Delete button . A prompt requesting confirmation appears.
3. Click Yes.
Auditing
BackBox allows administrators to audit each user who accesses the system. The program keeps a
detailed log of each action performed in the system, as well the object of the action. The log details each
time a user logs-in, adds, updates, or deletes. It also records the objects of these actions such as devices,
backup jobs, time and date, etc.
For example, if a device group is changed, the log will show which user made the change,what the
change was, when it was done and whether the change was successful.
When you click Auditing, the following is displayed:
The screen displays five types of logs: Auditing, Messages, Secure. General and Vsftpd. These are
explained in the following sections.
Criterion Description
Action You can filter for the following actions: Login, Add,
Update, Delete
On some of the items displayed, there is more detailed log information available. To view the additional
log details, click the View Change button at the end of the row. The Audit Details Log screen appears:
You can download message logs to your computer by clicking the Download Log button
at the end of the Messages row.
To open the VSFTPD’s Trail Log, click the View Log button in the View column of the VSFTPD
row. The VSFTPD Trail Log appears. You can download the VSFTPD log by clicking the Download Log
button at the end of the VSFTPD row.
Authentication Templates
BackBox allows you to create templates to store common credentials and simplify password
management for large groups of devices. When the password for that group changes, you change the
password once in the template, causing all the device profiles using the template to use that new
password, when running backups, tasks, etc.
2. Complete the fields as detailed in the following table and click Save.
Field Description
Device Authentication
Cyberark
To use Cyberark authentication to devices, please select the option.
Help button will give you details about configuring the authentication.
You can test the connectivity to Cyberark with the test button.
Wallix Bastion
To use Wallix authentication to devices, please select the option.
You will need to enter the server IP and the port to use.
Arcon
To use Arcon authentication to devices, please select the option.
You will need to choose the server protocol, server IP, and port.
Thycotic
To use Thycotic authentication to devices, please select the option.
You will need to choose the server protocol, server IP, and port.
2. Select a type, and specify a name, user name, password, confirm password, and an
E-mail address (Notification accounts are used for group email addresses or for distro lists).
3. Specify whether the user is to receive system alerts by clicking the Receive System Alerts
button .
4. Select a notification type: Details or Summary.
5. Select a role. For example: Administrator.
6. Optionally, select a site by clicking the the Sites field to display a list of available choices.
7. Requires approval rule let you create users that need permission to run task jobs
Note: Accounts created in the BackBox User section enable access to the web GUI.
Editing a User
To edit a user, in the BackBox Users screen, click the username to display the Edit User dialog box for
that user and edit the fields. Click Save .
User Roles
The User Roles screen enables you to create a user role and configure permissions for the role.
Permissions can be configured for every part of the BackBox system. For example, you can configure a
role so that someone with that role can only initiate a backup, but not stop one or edit device
information.
Editing a Role
To edit a role, on the User Roles screen, select the role you want to edit and click the Edit button
to display the Edit Role dialog box. Edit the relevant fields and click Save.
Deleting a Role
To delete a role, on the User Roles screen, select the role and click the Delete button
Connected Users
The connected user's screen allows the user to see who is connected to BackBox GUI.
Field Description
Type What is the type of the user: Local, RADIUS, TACACS+ etc.
To open the Notifications screen, on the Sidebar, click Notifications. The Notification Alerts
screen is displayed:
The screen will display a list of unacknowledged alerts, and includes the following:
Field Description
Acknowledge By clicking the Acknowledge button , you indicate that you are
aware of the alert. You can also click the Acknowledge All button
at the top of the screen to indicate that you have seen all the
alerts listed. This will clear the acknowledged alerts from the screen.
Adding a Notification
To add a notification:
1. On the Jobs Notifications screen, click the Add button . The New Notification
Configuration dialog box appears:
2. Complete the fields and click Save. Deselecting the Success button will result in the
Notification only being sent for failed/suspect states.
Field Description
Email - Available Recipients The people available to receive notifications (of the
backup). Choose the recipients by selecting their names
Available HTTP alerts Select from the list of available http alerts configured in
settings-> Alerts
Editing a Notification
To edit a notification method in the list, select the method and click the Edit button to display
the dialog box. Edit the settings and click Save.
Deleting a Notification
To delete a notification method, select the notification you want to delete and click the Delete
Button .
Testing a Notification
Clicking the Test button in a notification’s dialog box enables you to send a test notification to the
specified recipients.
The Schedules screen displays the name given to the schedule, the description, the assigned
site, the date the schedule was created, when it was last modified, the type, and whether it
is in use or not .
2. Fill in the fields and specify the interval and time for the new schedule and click Save.
Deleting a Schedule
To delete one or more schedules:
Field Function
Schedule Displays the schedule that has been configured for the backup. To
create a Schedule, see the chapter on Schedules.
Next Execution Displays the date and time of the next scheduled backup, providing
the job is enabled.
Enables you to delete a backup job listed in the Backup Jobs screen.
To delete a backup job, select the job you want to delete and click
the Delete button .
1. On the Backup Jobs screen, click the Add button . The New Backup Job
Configuration dialog box appears:
Field Description
Description Type a brief description of the backup – this field is optional but
recommended.
Site Select the name of the site to which the device is assigned. If the site is
locked to an agent, you cannot run a backup from Global. Sites can be
locked to an agent in the Agent screen, which is located under Settings in
the Sidebar.
Schedule Select a schedule for the backup. You can create a new schedule by
clicking the Add Schedule button next to the Schedule list or
select a schedule from the list. For further details, see the
Run task job when In case you want to run a task job in the end of a backup job, you can turn
finished on the switch and select which task job you want to run
Attached comparison In the notification of a backup job select this to get PDF reports of changes
results file to email in the text-based configuration
Note: Due to the significance of terminating a backup job, you must double-click the
Terminate All button as opposed to a single click for most other functions.
Also, you can view the status of the backup replication if this device is configured on the agent and
replicate the files to the agent.
Devices Screen
Fields Description
IP Address The IP address assigned to the device. IPv6 addresses are supported.
External ID/Tag If the user customizes an external ID or tag it will appear in this column.
The Devices screen also displays buttons that enable you to perform the following tasks:
Buttons Description
Delete a device.
Clone an existing device so that the clone has the same backup
parameters.
3. Complete the Vendor, Product, Version, and Backup Type fields, and click Next .
The third dialog box appears:
3. Click the Import button to import the spreadsheet back into BackBox. Ignore
any errors about devices that already exist. We are only concerned about the new devices
being imported.
Depending on the device, some, or all the fields in the following table appear:
Field/Button Description
Clear SSH This button clears the SSH key for authorization.
Specify how many days backups and other files are retained.
See below for details.
Retention Button
Click the Retention button to specify how many days backups and other files are retained.
Clicking Retention displays two options:
• Backups
• Retention Policy
Backups enables you to type the number of backups you want to retain.
Edit the number of backups for a given field and click Save. The default values allow 23 backups to
provide coverage for roughly 12 months.
To download the log, click the Download button at the upper right corner
The Device History screen is also where you initiate a Restore, or perform other actions as detailed
in the following table:
Compares backup files, either same files from different backup or files in the
same backup
IntelliChecks Tab
The IntelliChecks tab displays the health checks and compliance tests for the device:
If a device has multiple IntelliChecks groups that run against it, the output is separated with headers,
providing summary information for the group. Whether the device can have IntelliChecks run against it
is controlled by the button at the stop of the screen. The button
determines whether the information can be used by the Trends widget on the dashboard.
Performance Tab
The performance tab will show all collected information that BackBox is gathering from running
Health IntelliChecks on the device. There are two types of data, the deviation table that’s shows the
current measurement, the average, and the deviation. The table is divided into days of the week and
hours of the day. The second data is a graph showing the measurements over time (24 hours/7
days/30 days/365 days)
Notes Tab
The notes tab allows the user to add his own notes to the device.
3. Click Yes.
4. You will see a deletion process message, and then a message informing you of successful deletion:
Comparing Backups
BackBox enables you to compare backup files, line by line. This enables you to identify where backups have
added or deleted lines, etc.
To compare backups:
1. In the Devices screen, click the Compare button at the top of the screen.The
Compare Backups dialog box appears:
All the devices with backup files in the BackBox system appear in both the left and right
columns.
2. In the left column, click a device and its subfolder. In the subfolder, click the backup file that
you want to compare. The selected backup file will be highlighted in blue and a message
above the Compare button appears, indicating that the file will be compared.
3. Follow the same procedure for the right column. The selected backup file will be
highlighted in blue, and a message below the Compare button appears,
indicating that the file will be compared.
For example, in the left column you may want to select a txt file that was generated at a
certain date and time. In the right column, you might select the same file that was generated
for the same device at a later date and time.
4. Click the Compare button . The Compare screen appears, listing each line of both
backups, like this:
If the backup files are identical, an additional message is displayed informing you of this.
If the backup files are not identical, you can scroll through the lines of the backup files and note the
differences. Additions, deletions, and changes are highlighted by color as indicated by the colored
buttons at the top of the screen.
Figure 87: Compare Screen Showing Excluded Line in Grey and Export Options
2. Specify a name for the new group, and, optionally, a short description. In the Site field,
select the site to which you want to assign the group.
3. In the list, select the devices according to name, IP address, or vendor that you want to add
to the group and click Save .
The group is created with the specified devices.
Adding a Segment
To add a segment to the BackBox system, in the IP Address Management screen, click the Add
Segment button . The New Segment dialog box appears:
Specify a name, description, IP address, subnet mask, and site for the segment and click Save.
Note: IPv6 is supported.
Network Map
The Network Map screen displays the devices as a network topographical map, complete with
routing paths and function-based icons.
Network Database
The network database tab shows collected information from network database tasks phase 1, 2,3
and 4 running on devices.
Jobs Tab
The job tab will let you add new jobs of discovery. Each job can be scheduled differently, applied
to different rules, have different IP ranges, and work on different subnets.
Add Add button will let you add new discovery jobs
Edit When selecting an existing job, the help button will let you edit it.
Range/IP MASK The user can configure the IP range for the scan
Timeout How much time to wait for SNMP answer from the scanned IP range
Hide BackBox devices Hide in the result table devices already configured in BackBox
Add scan results to IPAM Any device discovered in the scan will be added automatically to
the IPAM list in BackBox
Auto add devices by rule Select rules that the user defined to match criteria and add them
automatically to BackBox
Add to BackBox and Add Buttons that let you add the results manually to the matching lists
to IPAM
The credentials tab lets the user add a new set of credentials to the SNMP scan.
Criteria content Select the criteria content matching the selected criteria
Device name as Add the device to BackBox with the device name set as the
scan result hostname or a given prefix and the result IP
How It Works
The Task Configuration screen displays a list of previously configured tasks and enables you to configure
new tasks. A task can include any sequence of commands (a script) that the device normally responds
to when using the command line. By writing a script, you are actually writing a series of commands that
will be executed as if you were at the command line. The Task Configuration screen helps you to write
the script by enabling you to select commands from a simple dialog box as explained below.
After saving the task, you can then use the Task Jobs screen to assign the task to various devices and
determine when the task is executed (see Understanding the Dynamic Fields Sections).
2. Type a Name for the Task and click Save. The task now appears in the list of tasks in the Task
Configuration screen, where you can edit it and write a script as shown in the next section,
3. Select a tag from the pre defined tags or create a new one
4. Creating a Task Script.
Figure 100: Edit Task Configuration Dialog Box displaying Add Access
Figure 101: Edit Task Configuration Dialog Box Displaying Task Commands
The dialog box enables you to change the order of command execution by dragging the
command’s Reorder button up or down. You can also specify indicators for the command’s
execution by clicking the Results Options button in the command’s Results field or the
Status button in the Status field. For an explanation of Timeout and other fields, see the
chapter Understanding the Dynamic Fields Sections.
5. To add a new command to the script, click the Add button . The Conditions
dialog box appears:
Quick Tasks
The quick tasks screen lets you run on-demand tasks without scheduling a job
1. Select a task to run
2. Select a notification if needed
3. Choose the devices to run the task on
4. Enter dynamic field if existing in the task
5. Press on run now to run the task
The Task Jobs screen displays a list of tasks, the number of devices to which the task has been
assigned and other information. The following fields and buttons are displayed:
Field/Button Description
Next Execution The date and time of the next execution of the task.
Status Enabled/Disabled
Displays the Task Job Configuration screen for selected task jobs.
8. As an administrator, you can approve or deny the request to run the job .
9. If you are a user creating a task that needs approval from the administrator, you can select
the admin recipient to receive the request.
10. You can add additional tasks or remove tasks by clicking the Add Task to Job button or
Remove Task from Job button that are displayed underneath the Task list. For each task,
a Dependency list appears that enables you to specify the task that will trigger the next.
11. To add devices to the task, click the Add Devices button underneath Tasks. The Add
Devices dialog box appears. Select the Devices you want to add and click Add .
12. To remove a device from the Device list, select the device you want to remove and click the
Remove button .
13. You can also use the Filter button to display the filter boxes by which to filter the Device
list.
14. Click Save and run .
Mode
In the mode tab, you can select how to run multiple tasks related to each other.
For each device to which the task is assigned, the screen displays the device name, device IP, date,
duration (how long the device has been running the task), and status of the job (for example, Running).
To terminate a task job for a specific device, click the button in the Terminate column for that device.
To terminate all task jobs in the queue, double-click the Terminate All button .
You can download a log of the history by clicking the View Log button in the Log column for the
device.
1. Select a file and click the Edit button The Edit Tasks File dialog box appears with the name
of the tasks file in the Title Bar, for example:
2. File permission options let you control the file permissions on the saved file in the file repository
3. Edit the Description and Agents fields as desired and click Save .
Editing a Report
You can change report parameters using the Edit button .
To edit a report:
1. In the list of reports, select a report and click the Edit button . The New Report
Configuration dialog box appears with the details for the selected report.
2. Edit the appropriate fields.
3. Click Save.
Deleting a Report
To delete a report:
1. In the Report Types list, select the report to delete and click the Delete button
A prompt appears requesting confirmation.
2. Click Yes.
Enable IntelliChecks
Figure 117: IntelliChecks Signature Screen Displaying Signatures, Types, Tags, and Site
1. In the IntelliChecks Signature screen, click the Add button . The New IntelliChecks
Signature dialog box appears
2. In the dialog box, you can add values for new signatures or edit values for cloned existing
signatures.
2. Type a name and description for the job in the appropriate fields. Select the group on
which you want to run the job, using the dropdown menu.
3. The switch Alert only if deviation of performance increased let you control getting
notification only on positive deviation
4. The switch Notify only on signature status change let you control getting notification only if
status has changed from the last time the IntelliChecks was running
5. Suppression let you control after how many times the signatures were running at the same
status to stop getting notifications
6. If you want the job to run the remediation commands for the signature, click the
toggle for it: .
The IntelliChecks Queue screen displays the device name, signature name, IP, date and
duration of the IntelliChecks job, and its current status (running, pending, or enqueued). It also
enables you to view the job’s log in real time. In addition, you can terminate selected
IntelliChecks jobs, or terminate all IntelliChecks jobs:
• To terminate a single job, click the Terminate button at the right side of row for
that job.
• To terminate all the IntelliChecks jobs for all devices in the queue, click the
Terminate All button at the top of the screen.
You can see the Signature Name, Device Name, IP, and Date. In the Status column, the screen also
shows whether the device successfully ran the job or failed. If the device failed to run the job, the
reason for failure is stated.
You can also click on a job’s Log button to display and download a detailed log of the jobs and their
status. The final column will show the Site the device is associated with.
Technical Survey
The technical survey tab allows the user to view predefined fields for the technical survey
IntelliChecks. The user can also add new fields and create new IntelliChecks to save information to the
relevant variables.
This information will be presented in the device technical survey tab and the technical survey report.
1. Add button will let you add new fields .
2. With the delete button, you can remove existing fields .
3. Edit product selection will allow you to choose which products are relevant to which technical
survey field .
Once connected to a device, you can run commands ad hoc, or you can use toolboxes of preconfigured
commands. BackBox has several toolboxes already configured, but users can easily create their own as
well.
1. Select devices to which you want to connect by clicking in the column to the left of the
device.
2. Select the method of connection: SSH, Telnet, RDP, or Web.
3. Edit the Port if desired by clicking the port number and using the
Increment/Decrement button that appears to specify another port and click the
Submit button .
4. Click the Connect button ; a name is displayed at the top of the screen for each device
that you selected. Clicking the device name displays the terminal for that device. You can run
scripts on more than one device by clicking from device to device:
2. Click a toolbox to display its commands. Some toolboxes have Categories; click the
Category to display its commands:
3. To run a command, on the device’s terminal, click the command and right-click to
display the following menu:
2. If you select Subsection for the Type, you will enter the name for the subsection. If
you select Command as the Type, then you enter a name for the command as well as
the code of the command in the field at the bottom.
3. Click Save.
Deleting a Toolbox
To delete a toolbox:
1. Right-click the toolbox you want to delete and click Delete. A Delete prompt appears.
2. Click Yes.
Editing Commands
You cannot edit BackBox created commands, but you can Clone them and then edit the
clones. You can always edit commands that you have created, without the need to clone. To
edit a command:
1. Right-click the command you want to edit and click Edit.
2. Edit the command’s name, or the command’s code and click Save.
Deleting a Command
To delete a command:
1. Right-click the command you want to delete and click Delete. A Delete prompt
appears.
2. Click Yes.
Besides enabling you to write scripts, the Customize screen also allows you to customize lists
that appear in other BackBox screens.
BackBox issued interface scripts cannot be edited; however, they can be cloned and the clones can
be edited.
After selecting Vendor, Product, Version, and Option, click the Edit icon . The Customize editing
interface appears:
To display the Option Configuration screen, on the Sidebar, click Customize. The Customize screen
appears. Select the vendor, product, and version, and in the Option box, select the option you want to
edit or click the Add Option button to create a new option. In either
case, the Option Configuration screen appears:
• The command sequence on the Connect tab can be called by a Connect command from
the Backup, Restore, IntelliChecks, and Cleanup tabs.
• The command sequence on the Inventory tab can be called by an Inventory
command from the Backup, Restore, IntelliChecks, and Cleanup tabs.
• Dynamic Fields section in the upper part of the tab. Here you determine whether a
field is Mandatory, Encrypted, or Hidden.
• Inventory section in the lower part of the tab (you may need to scroll the tab to
display this part). Here you assign the fields to be shown in the Inventory report for
the device.
Mandatory The field becomes required. You cannot save the settings on the
Device Details tab without supplying a value for this field.
Hide Command The field will not appear in the Backup log.
Free Text Displays the text that will appear as the name of the field on
thescreen.
Default Value A default value will appear in the field when the screen is
displayed. This is optional.
Authentication
Determines whether this device will be enabled to use with authentication templates. The
default action is that they will, and that the authentication will be mandatory. If an
authentication template is chosen, the Username / Password / etc. fields that are irrelevant will
be hidden.
Authentication Templates
When Use Templates is selected in the Authentication list, it displays a list of authentication
templates to select from.
Server IP
Displays a list of IP addresses of the BackBox server. These IP addresses will be used by BackBox to
determine the IP address to which to send the file.
Variable: %%SERVER_IP%%
Username
Displays a field for the Username login to the remote device.
Variable: %%USER%%
Password
Displays a field for the Password login to the remote device.
Variable: %%PASSWORD%%
Username 2
Sometimes a device will need a dual login. This field is for the second username to log-in to the remote
device.
Variable: %%COMMAND_USER%%
Password 2
Sometime a device will need a dual login. This will display a field for the second user password to the
remote device.
Variable: %%COMMAND_PASSWORD%%
SNMP Version
Displays a field for the SNMP version login to the remote device.
Variable: %%SNMP_VERSION%%
Port
Displays a field for the communication port to the remote device.
Variable: %%PORT%%
Note: In this field, the free text value will be configured as the default value, and the label is hard-
coded to the port.
Cluster Node IP
Some devices may be part of a cluster. This field displays a field for the cluster node IP.
The Inventory section of the Dynamic Fields tab is in the lower part of the tab (scroll down) and looks
like this
5. On the Name and Location pane, in the Name field, specify "BackBox" or any other name,
and click Next.
7. In the Virtual Machine Version pane, select Virtual Machine Version 8, and click Next.
9. On the CPU pane, make sure that the Total number of cores is at least 4, and click Next.
For more specific details, consult the Sizing document.
11. On the Network pane, select the E1000 network adapter and click Next.
13. On the Select a Disk pane, select Create a new virtual disk and click Next.
15. On the Advanced Options pane, in the Virtual Device Node list choose SCSI (0:0) and click Next.