Prior to downloading this Software, you must review the Software Transaction Agreement located here and confirm, by clicking the I agree check box below, that your organization accepts and is bound by the terms and conditions of the Software Transaction Agreement for this Software.
If you purchased the licenses for this Software by executing an order form with Quest or if you have an agreement with Quest that states that all purchases are governed by such agreement, then the terms and conditions of that agreement supersedes and takes precedence over the Software Transaction Agreement.
Reporting a Security Vulnerability A security vulnerability is a flaw or weakness in the design, implementation, operation or management or a product or service that could be exploited to violate the system's security policy. To protect businesses and organizations worldwide, it is critical that the broader community of IT and security professionals report potential vulnerabilities as soon as...
Adding databases to Backup Reporter using RMAN catalog. Backup Reporter tells that the database version is not provided, the only option in the version field is 9.2 and it is not possible type in any numbers
When refreshing data from the Recovery Catalog, Backup Reporter often crashes.Error message:=========Problem signature: Problem Event Name: CLR20r3 Problem Signature 01: Quest.BRT.exe Problem Signature 02: 2.0.1.50 Problem Signature 03: 554aa7b7 Problem Signature 04: mscorlib Problem Signature 05: 4.0.30319.34014 Problem Signature 06: 52e0b679 Problem Signature 07: ...
When Backup Reporter starts refreshing data, it puts a large load on the Recovery Catalog database since it starts all active sessions simultaneously.Is there an option for Backup Reporter to choose how many sessions that will be started simultaneously?
Backup Reporter not recognising different ASM diskgroups as different physical devices.Health check report incorrectly states that control files reside on the same physical device.
Reporting a Security Vulnerability A security vulnerability is a flaw or weakness in the design, implementation, operation or management or a product or service that could be exploited to violate the system's security policy. To protect businesses and organizations worldwide, it is critical that the broader community of IT and security professionals report potential vulnerabilities as soon as...