Task |
Purpose |
Comments |
Check the reboot schedule
and, if required, reboot the system. |
Rebooting the system
at least once every 90 days refreshes the operating system resources
and keeps applications running reliably. |
For instruction about how to check the reboot schedule and
reboot the system, see:
|
Check the Linux
system clock. |
The system
clock was probably set during the installation of your system,
but you should check it monthly and whenever a daylight savings
time change occurs. This also compensates for the 3 second/month
time loss. |
See Checking
and setting the system clock for more information about
how to set the system clock. |
Add, delete, or edit local
subscribers, as necessary. |
This maintains subscriber
profiles to reflect current needs and staffing. |
For instructions about how to manage local subscribers,
see:
For more advanced subscriber management, use the Mailbox
Manager application. See the Mailbox Manager documentation that accompanies
the application for more information. |
Administer remote subscribers. |
Running a remote update can use one of your networking
ports for quite some time. If you want to administer a remote
subscriber immediately but do not want to run a remote update,
you might want to administer that subscriber manually. |
See Administering remote
subscribers manually for more information. |
Reassign local subscriber
default password. |
This reassigns a subscriber's
default password if the subscriber forgets it. |
For more information, see:
|
Unlock a subscriber's mailbox.
|
The system monitors the
number of unsuccessful consecutive login attempts to a specific
mailbox across multiple calls to the system. If this number
exceeds the number defined on the System-Parameters Features
screen, the system locks out that subscriber's login ID, thus
preventing further system access. The subscriber cannot access
the system until you unlock the subscriber's login. |
For more information, see:
|
Run traffic reports.
|
This displays traffic information
to help you troubleshoot and find ways to improve system efficiency.
|
— |
Administer and check the
Activity log. |
This allows you to investigate
subscriber activity to resolve reported problems. |
See the Activity
log for instructions about how to administer and check the
Activity log. |
Check the Alarm log. |
This displays active or
resolved MSS alarms so you can check that alarms are cleared
after service procedures are performed and troubleshoot intermittent
problems that resolve themselves and then recur. |
See the Alarm
log for instructions about how to check the Alarm log. |
Check the Administration
log. |
This allows you to display
and investigate administrative entries that you can solve. |
See the Administration
history log for instructions about how to check the log. |
Run audits. |
This synchronizes the system
software and the disk after you have made administrative changes.
Also, run audits to allow the system to readjust itself after
an alarm. |
— |
Verify that the unattended backup successfully
occurred. |
The unattended backup contains all of the information
necessary to bring the system back to an operational state after
a service-affecting event. However, the unattended backup alone
might not completely restore the system to its previous state,
it might only restore the system to an operational state. Unattended
backups occur every morning at 3:05 a.m. |
See Verifying
that an unattended backup successfully occurred for more
information. |
Perform an attended backup. |
In addition to the unattended
backup, it is recommended that you perform an attended backup
at all of the following times:
- After making major system changes
- After entering new subscribers
- When experiencing system problems to avoid losing information
entered since the last unattended backup
- When a partial unattended backup occurs to avoid losing
the data types that were not backed up
|
For more information see:
|
Restore data, if necessary. |
If a system problem or failure occurs, backups
are used to return the system to an operational state. The information
stored on DVD-RAM backup media is used to restore the system
to an operational state. |
See Performing
a restore for instructions about how to restore data. |
Alternate the backup media. |
To ensure that acceptable backup data
is available when needed, do not use only one backup medium
for the automatic unattended backups. It is recommended that
you alternate between at least two media. Additional media can
be used to implement a longer cycle. For example, you could
alternate among seven backup media, each labeled with a day
of the week. |
See Managing the backup
media for more information. |