Availability of features by operating system

Most IBM Spectrum® Protect features are available on all operating systems that are supported for the server.

In the following table, a check mark indicates that a feature is available.
Table 1. Availability of IBM Spectrum Protect features by operating system
Feature IBM® AIX® Linux® x86_64 Linux on System z® Linux on Power Systems (little endian) Microsoft Windows
IBM Aspera® Fast Adaptive Secure Protocol (FASP®) technology:
Optimize data transfer to a remote server.
  Yes.1      
Cloud storage by using Amazon Simple Storage Service (Amazon S3) technology.
Yes. Yes.   Yes. Yes.
Cloud storage by using IBM Cloud Object Storage technology.
Yes. Yes.   Yes. Yes.
Cloud storage by using IBM Cloud technology.
Yes. Yes.   Yes. Yes.
Cloud storage by using Microsoft Azure technology.
Yes. Yes.   Yes. Yes.
Cloud storage by using Google Cloud Storage technology.
Yes. Yes.   Yes. Yes.
Data deduplication with container storage pools:
Optimize server performance by using inline data deduplication to eliminate duplicate data while the data is written to a directory-container storage pool or cloud-container storage pool. By using inline data deduplication, you reduce the need for offline reorganization, reduce the cost of storage hardware, and take advantage of the most current, compatible server features.
Yes. Yes. Yes. Yes. Yes.
Data deduplication with non-container storage pools:
Although data deduplication is available for sequential-access (FILE) storage pools, the use of directory-container and cloud-container storage pools is preferred because those storage pool types offer newer technologies for data storage. Data that is stored in cloud-container or directory-container storage pools uses either inline data deduplication or client-side data deduplication.
Tip: The CONVERT STGPOOL command can be used to store data from a sequential-access storage pool into a container pool.
Yes. Yes. Yes. Yes. Yes.
Data copy operations from IBM Spectrum Protect Plus:
Copy data to IBM Spectrum Protect for longer term protection.
Yes. Yes.   Yes. Yes.
Data retention:
Define rules to streamline the collection and retention of data to comply with long-term data retention requirements. Copy retention sets to cloud object storage and maintain a copy of retention sets on standard cloud storage or archive cloud storage. By copying retention sets to standard cloud storage, an extra layer of protection is added for the data. By copying retention sets to archive cloud storage, you provide long-term protection of data that is infrequently accessed.
Yes. Yes. Yes. Yes. Yes.
Disaster recovery manager (DRM):
Prepare a plan for recovering your server and client data if a disaster occurs.
Yes. Yes. Yes. Yes. Yes.
Inline data compression:
Compress data as it is written to a cloud-container or directory-container storage pool to reduce the amount of space that the data occupies.
Yes. Yes. Yes. Yes. Yes.
Lightweight Directory Access Protocol (LDAP) authentication:
Authenticate users to an Active Directory database on an LDAP server.
Yes. Yes. Yes. Yes. Yes.
Operations Center:
Monitor and manage the storage environment by using the Operations Center, a web-based user interface.
Yes. Yes. Yes. Yes. Yes.
Protection of directory-container storage pools:
Protect data in directory-container storage pools by using the PROTECT STGPOOL command. You can store a copy of the data in another directory-container storage pool on a target replication server, or store a copy on tape in a container-copy storage pool on the same server.
Yes. Yes. Yes. Yes. Yes.
Replication storage rules:
Define replication storage rules and subrules to incrementally copy data from a source replication server to one or more target replication servers. These replication operations consolidate the functional characteristics of the PROTECT STGPOOL and REPLICATE NODE commands by unifying processing into a single replication storage rule process.
Yes. Yes. Yes. Yes. Yes.
Replication to a single target:
Incrementally copy data from a source replication server to a single target replication server by using replication storage rules or the REPLICATE NODE command.
Tip: By setting up replication storage rules, the most current server features can be optimized.
Yes. Yes. Yes. Yes. Yes.
Replication to multiple targets:
Incrementally create replica copies of node data from a source replication server to multiple target servers at remote locations by using replication storage rules.
Yes. Yes. Yes. Yes. Yes.
Servermon
Collect data automatically to facilitate troubleshooting.
Yes. Yes. Yes. Yes. Yes.
Storage pool encryption:
Encrypt data in cloud-container storage pools.
Yes. Yes.   Yes. Yes.
Storage pool encryption:
Encrypt data in directory-container storage pools.
Yes. Yes. Yes. Yes. Yes.
Tape storage:
Store data on tape, which provides a flexible and affordable option for long-term data retention.
Yes. Yes. Yes. Yes. Yes.
Transport Layer Security (TLS) protocol:
Secure communications by using TLS version 1.3.
Yes. Yes. Yes. Yes. Yes.
1 IBM Aspera FASP technology is not supported on the Ubuntu Server LTS operating system.