Security, high availability, and performance have always been the three never-ending topics for all large-scale software platforms since the beginning of modern computing history; Control-M is not an exception. A normal Control-M technical person would know how to install, configure, and maintain Control-M components. But as we saw in the earlier chapters, those were not rocket science. By taking some time to learn how to secure the environment, identify problems, and perform fine tuning, we will standout from the crowd and get into the game of experts.
The second last chapter of the book is dedicated to topics that will allow us to have the potential to become Control-M SMEs. We will first introduce some handy command-line utilities, followed by a look at the security-related features in Control-M, and selectively use them to secure our environment. Then we will look at topics around high availability in detail by implementing Control-M mirroring...