The model of the storage software that is used can be verified from the storage cluster information.
-
Required role: Security, Storage, RemoteCopy, Monitor, Service, Audit, or Resource
The model of the storage software that is used can be verified from the storage cluster information.
Required role: Security, Storage, RemoteCopy, Monitor, Service, Audit, or Resource