icon_CloudMgmt icon_DollarSign icon_Globe icon_ITAuto icon_ITOps icon_ITSMgmt icon_Mainframe icon_MyIT icon_Ribbon icon_Star icon_User icon_Users icon_VideoPlay icon_Workload icon_caution icon_close s-chevronLeft s-chevronRight s-chevronThinRight s-chevronThinRight s-chevronThinLeft s-chevronThinLeft s-trophy s-chevronDown

Control-M 21.x: Fundamentals Administering

This course provides instruction and hands-on practice in administration and customization options of the distributed systems Control-M solution. Control-M is a monitoring and management tool for the enterprise batch-scheduling environment. It allows users to manage job processing across all distributed systems platforms supported by instances of Control-M/Server

Major release:

Control-M 21.x

Good for:

Administrators, Consultant

Course Delivery:

Instructor-Led Training (ILT) | 32 hours

Course Modules

  • Architecture and Components
    • Describe the Control-M architecture
    • State the purpose of each component in the Control-M architecture
    • Explain the different Control-M/EM processes
    • List the different Control-M interfaces
    • Access the Control-M interfaces
  • Starting, Stopping and Checking Status
    • Start and stop the Control-M/EM, ControlM/Server, and Control-M/Agent components
    • Check the status of the:
      • Control-M/EM
      • Control-M/Servers
      • Control-M/Agents
      • Databases
    • Monitor the Control-M services
  • Control-M/Enterprise Manager Security
    • Explain Control-M/EM Security
    • Explain Control-M Users and Roles
    • Create Control-M Users and Roles
    • Configure External Authentication using IdP and LDAP
    • Configure Password Rules
    • Configure Emergency Users
    • Change the Control-M/EM DBO Password
  • High Availability
    • Implement Control-M software-managed high availability for the:
      • Control-M/Enterprise Manager
      • Control-M/Server
       
  • Control-M/Agent Security
    • Administer Control-M/Agent security in Windows:
      • Configure Windows Local Security Policies
      • Change the Control-M/Agent Windows Service account
      • Use the Logon As parameter
    • Administer Control-M/Agent security on Linux/UNIX:
      • Use non-root mode
      • Use root mode
      • Use sudo mode
    • Explain Agent connection modes
    • Define and configure Host Groups
    • Define Agent Restrictions
  • Remote Hosts and Application Plug-Ins
    • Describe the benefits of enabling remote host job execution
    • Implement remote host job execution
    • Describe the purpose of Control-M Application Plug-ins
    • Explain the relationship between the ControlM/Agent and Control-M
    • Application Plug-ins
    • Install and configure Control-M Application Plugins
    • Integrate Control-M with a CyberArk Vault
  • Database Backup and Management
    • Perform job version management
    • Perform database maintenance actions
    • Backup and restore the Control-M/EM and ControlM/Server databases
  • Troubleshooting Control-M
    • Troubleshoot the Control-M components
    • Access and use the BMC Knowledge Base to research issues and fixes
    • Access Control-M user communities
    • Use BMC Support to identify and correct issues
      • Download and use product documentation
      • Log support issues