Deployment Guide For Microsoft Exchange With Cohesity DataProtect
|
|
- Hugh Hill
- 6 years ago
- Views:
Transcription
1 Deployment Guide For Microsoft Exchange With Cohesity DataProtect
2 This white paper outlines the Cohesity DataProtect deployment guide for Microsoft Exchange Server Data Protection. Table of Contents About This Guide...2 Intended Audience...2 Terminology...3 Cohesity...3 Microsoft Exchange Server Roles...4 Cohesity Architecture...6 Supported Configurations...6 Configuration Overview...7 Cohesity Windows Agent...7 Windows User Accounts...7 Permissions...7 Installing Cohesity Windows Agent...8 Configure Protection Policy...8 Configure Protection Job...9 Microsoft Exchange Server Backup...10 Microsoft Exchange Server and Mailbox DB Restore...11 Summary...13 TroubleShooting Tips...13 About the Author...14 Version History
3 About This Guide This paper details the steps to deploy Cohesity DataProtect for Microsoft Exchange Servers. In this guide, IT administrators are defined as individuals who have the role of managing storage and data protection of applications (virtual or physical) in a data center. Microsoft Exchange Server administrators are individuals who have the purpose of managing and maintaining Microsoft Exchange Server services. Intended Audience This paper is written for IT administrators and Microsoft Exchange administrators familiar with managing data protection of Microsoft Exchange Servers. Cohesity recommends having familiarity with the following: Cohesity DataPlatform Cohesity DataProtect Microsoft Exchange DAG Maintenance Cohesity Granular Recoveries for Microsoft Exchange 2.
4 Terminology Cohesity Cohesity DataPlatform Cohesity DataPlatform is the industry s only hyperconverged solution designed to simplify secondary storage by consolidating all secondary data on a single, web-scale platform. Cohesity DataProtect Cohesity DataProtect is an end-to-end data protection solution that is fully converged on Cohesity DataPlatform. DataProtect simplifies your data protection environment with a single unified solution for backup, recovery, replication, disaster recovery, target storage, and multi-cloud integration. Cohesity Storage Domain Cohesity Storage Domain (View Box) represent storage efficiency domains within the Cohesity cluster and can optionally associate a Storage Domain with a specific cloud tier. The administrator assigns deduplication, compression and encryption attributes when Storage Domains are created. Cohesity View Cohesity Views represent mount points into a specific Storage Domain (View Box). To find out more about Cohesity components and terminology, click on Help or? at the top right hand corner of the Cohesity UI Dashboard as shown in figure 1. Figure 1 Cohesity Dashboard UI 3.
5 Microsoft Exchange Server Roles According to Gartner s cloud report, Microsoft Office 365 service is still one of Microsoft s offerings that dominates cloud . Microsoft is popular with large organizations, with revenues greater than $10 billion. In 2017, Microsoft was still a recognized leader in Gartner s 2017 Magic Quadrant 2, and one of Microsoft s software offerings is Microsoft Exchange. Microsoft Exchange Servers consists of multiple roles. The Microsoft Exchange Server roles are: Hub Transport Server - This Microsoft Exchange Server role routes all mail flow messaging. The primary reason for routing messages through the hub transport server is usually for compliance. A hub transport server can also be configured to handle anti-spam and anti-virus functions. Client Access Server - A Client Access Server (CAS) role allows all available protocols access to Microsoft Exchange mailboxes via Outlook Anywhere, Outlook Web App, ActiveSync, Internet protocols POP3 and IMAP4, and MAPI. A Client Access Server should be deployed on the internal network. Unified Messaging Server - A Unified Messaging Server role provides integration for voic s, mailbox databases, and messages with Exchange. It is recommended, by Microsoft, that the Mailbox Server role is installed close to the Unified Messaging Server role. Edge Transport Server - This Microsoft Exchange Server role is intended to provide security in DMZ networks and secure inbound/outbound mail flow for organizations. This service was previously known as Active Directory Application Mode (ADAM). Mailbox Server - The Microsoft Exchange Mailbox Server holds the Mailbox Databases and Public Folder Databases. A Microsoft Exchange Mailbox Server is the center of an Exchange Server environment. It is a Microsoft best practice to store Mailbox databases and the Mailbox database logs on dedicated disks. Figure 2 shows a high level view of all Microsoft Exchange Server Roles. Figure 2 Microsoft Exchange Server Roles
6 Microsoft Exchange Server roles can be installed on a single server but separating these roles onto multiple servers provide the following benefits: Deployment and administration is simplified Dedicated servers ensure each Microsoft Exchange Server role can be managed independently and is secure. For example, a data security breach on a server, should it occur, does not impact other Microsoft Exchange Server roles. Improved scalability Dedicated servers for each Microsoft Exchange Server role can result in higher performance servers. Additionally, scheduled server maintenance of a single server, will not take down the entire Microsoft Exchange services in a data center. Improved security Security can be hardened with a dedicated server using Security Configuration Wizard (SCW). Each particular server with a single role allows all other functions and ports to be disabled (if not required) to provide a more secure Microsoft Exchange service. Important: Microsoft Exchange Server supports circular logging for space saving purposes but Cohesity recommends disabling circular logging for Volume Shadow Copy Service. Review the Microsoft Exchange Server circular logging KB for additional information. 5.
7 Cohesity Architecture Cohesity delivers a hyperconverged, web-scale solution that consolidates all secondary storage and data services onto a single, efficient solution. Cohesity simplifies data protection, consolidates file and object storage, provides instant access to test/dev copies, and performs in-place searches and analytics, all on a software-defined platform that spans from the edge to the cloud. Designed on Google-like principles, Cohesity s scale-out distributed file system was built from the ground up to ensure complete scalability to enable organizations to grow their environment by adding nodes to a cluster. With this scalability, organizations eliminate the costs of data migrations and forklift upgrades, while benefiting from the simplicity of a homogenous solution. Cohesity dramatically simplifies data protection across the enterprise. Cohesity s integrated backup, archive, replication, disaster recovery, and public/private cloud support, combined with its inherent context awareness, and eliminates the need for cataloging software, separate backup software, and other ancillary backup infrastructure. Cohesity DataProtect provides IT organizations with a complete high-availability (HA) and disaster recovery (DR) solution built for modern web-scale data centers. Supported Configurations The following diagrams show the simplicity integrating Cohesity DataProtect to Microsoft Exchange Servers. Cohesity DataProtect supports the following Microsoft Exchange Server setups: Virtualized Microsoft Exchange Server (see figure 3) Figure 3 Virtualized Microsoft Exchange Server Physical Microsoft Exchange Server (see figure 4) Figure 4 Physical Microsoft Exchange Server 6.
8 Configuration Overview The configuration of Cohesity DataProtect for Microsoft Exchange Server is divided into the following tasks: Install Cohesity Windows Agent on the Microsoft Exchange Server. Create A Protection Policy for Microsoft Exchange Server Create A Microsoft Exchange Server backup job Important: Cohesity DataProtect for virtual Microsoft Exchange Server also supports ephemeral Cohesity Windows agents. For example, in a VMware environment, Cohesity DataProtect will install the Cohesity Windows agent during the backup run time and uninstall the agent after a successful backup. Cohesity Windows Agent The Cohesity Windows Agent, on the Microsoft Exchange Server, has the following requirements: Windows User Accounts A Windows Active Directory user account with the following privilege is required for Microsoft Exchange Server backup with Cohesity Windows Agent: Windows User Rights Assignment The Windows user should have Log on as a service privilege. For example, if the Windows user is ADDOM\tmebackup, it should be added to Windows Log on as a service (see figure 5). Figure 5 Windows Local Security Policy Permissions The Windows user must be a member of the Windows local administrators group For example, the Windows user ADDOM\tmebackup should be added to the Windows Administrators group on the Microsoft Exchange Server (see figure 6). Figure 6 Windows Administrators 7.
9 Installing Cohesity Windows Agent From the Cohesity UI, navigate to the Protection > Sources and select Download Physical Agents (see figure 7). Figure 7 Download Physical Agents Install the Cohesity Agent on the Microsoft Exchange Server. For example, in figure 8, the Active Directory domain user account, ADDOM\tmebackup is a member of the local administrator group on the Microsoft Exchange Server with login rights to install the Cohesity Windows Agent. Figure 8 Setup Cohesity Agent Important: Review and follow the Microsoft Exchange DAG Maintenance. A Microsoft Exchange Server with multiple roles must adhere to the Microsoft Exchange Server maintenance requirements if a server reboot is required. Cohesity recommends performing changes and updates to any Microsoft Exchange server only during a scheduled maintenance window. Configure Protection Policy A Protection Policy for Microsoft Exchange Server is simple for both physical and virtual setups. Figure 9 illustrates an example of a simple Protection Policy. Figure 9 Example of a Cohesity Data Protection Policy 8.
10 In the above example, the Cohesity Protection Policy protects a Microsoft Exchange Server using a daily backup with an on-prem retention period of 60 days and Archive only fully successful Runs to an AWS S3 bucket. For DR purposes, it is also recommended to utilize Cohesity replication to protect business-critical data across multiple data centers. Using the Cohesity policy wizard, complete the Cohesity Data Protection Policy creation and save the changes. Configure Protection Job From the Cohesity UI, create a new Protection Job. Select the Protection Policy created for the Microsoft Exchange Server. For a virtualized Microsoft Exchange Server, select Virtual Server option. If the Microsoft Exchange Server is a physical server, select the Physical Server option (see figure 10). Figure 10 Cohesity DataProtection Protection Job Complete the Protection Job configuration, Cohesity recommends using QoS Policy: Backup SSD in the Specify Job Settings. Select Source in the next step. For virtualized Microsoft Exchange Server, select the Microsoft Exchange Server VM in the Select Objects step. Important: Enable App-Consistent backups for application awareness in step 2 (Specify Job Settings) with virtual Microsoft Exchange Servers. In the next step, Select Edit Server Options icon on the far right of the Selected Objects and Entities in the Create Virtual Server Protection Job (see figure 11). Figure 11 Create Virtual Server Protection Job Enable the Exchange Log Truncation option for the virtual Microsoft Exchange Server (see figure 12). Figure 12 Exchange Log Truncation Using the Cohesity Protection Job wizard, continue and complete the setup for Microsoft Exchange Server data protection. 9.
11 Microsoft Exchange Server Backup A successful backup of a Microsoft Exchange Server using Cohesity DataProtect will result in a Microsoft Exchange Server log truncate event. However, there are certain use cases where the Microsoft Exchange Server log truncates does not occur during the backup. The event happens because of one of the following reasons: The Microsoft Exchange Server Mailbox Database log cannot be truncated. It is recommended to review the Windows Event logs for confirmation. Figure 13 is an example Microsoft Exchange Mailbox Database log cannot be truncated. Figure 13 Microsoft Exchange Server Mailbox DB log cannot truncated The Microsoft Exchange Server Mailbox Database log will be truncated after the next log generation is created. For example, Windows event 2046 could be generated and reported in the Microsoft Server Windows Event Logs. Cohesity DataProtect for Microsoft Exchange Server backup, with Exchange Log Truncation, will request Microsoft Exchange Server to truncate each mailbox database logs. Microsoft Exchange Server will truncate the mailbox database logs when possible. Figure 14 is an example of a successful Microsoft Exchange Server Backup. Figure 14 Successful Microsoft Exchange Server Backup Important: A Cohesity Protection Job for physical Microsoft Exchange Server does not have the Exchange Log Truncation option. Physical Microsoft Exchange Server will automatically attempt to truncate mailbox database logs from a successful Microsoft Exchange Server Mailbox database backup. 10.
12 Microsoft Exchange Server and Mailbox DB Restore Cohesity DataProtect supports Microsoft Exchange Server and mailbox recovery using Kroll Ontrack. An independent Windows Server with Kroll Ontrack PowerControls must be configured and registered with Cohesity DataProtect for or mailbox restore. The Kroll Ontrack PowerControls Server requires Microsoft Exchange Server MAPI. Cohesity recommends installing a supported version of Microsoft Outlook with Kroll Ontrack PowerControls for restore purposes. Cohesity also recommends reviewing the Cohesity Kroll Ontrack white paper for additional details. Figure 15 shows a high-level configuration of Cohesity DataProtect with Kroll Ontrack PowerControls, and Microsoft Exchange Server for or mailbox restore. Important: The Kroll Ontrack PowerControls target server must be able to reach the Cohesity Cluster and the Microsoft Exchange Server over the network for restore operations. Figure 15 Microsoft Exchange Server Mailbox DB Restore Requirements For Microsoft Exchange or mailbox restore, IT administrators and Microsoft Exchange Server administrators can leverage Cohesity Instant Volume Mount. Figure 16 demonstrates how to leverage Instant Volume Mount with a Kroll Ontrack PowerControl Server for a virtual Microsoft Exchange Server backup. Figure 16 Microsoft Exchange Server VM Mailbox DB Restore 11.
13 In the example, Cohesity Instant Volume Mount will mount the selected Source Server volumes on the Kroll Ontrack target server. Important: On the Kroll Ontrack PowerControl Server, the Windows user must have mailbox permissions to perform a granular restore. The following is the syntax for adding mailbox permission to perform Kroll Ontrack mailbox level restore on the Microsoft Exchange Server: Get-Mailbox -ResultSize unlimited -Filter {(RecipientTypeDetails -eq UserMailbox ) -and (Alias -ne Admin )} Add-MailboxPermission -User admin@contoso.com -AccessRights fullaccess -InheritanceType all Although granting AccessRights:fullaccess to all mailbox is simple to configure. It is recommended to limit AccessRights:fullaccess use. It is not necessary to grant AccessRights:fullaccess to all mailboxes for obvious security reasons. Cohesity recommends reviewing the Microsoft Add-MailboxPermission KB for additional details for access rights on a per user basis. From the Kroll Ontrack PowerControls UI, leverage the Data Wizard to configure your Microsoft Exchange Server Source and Exchange Server Target for or mailbox restore (see figure 17). Figure 17 Kroll Ontrack PowerControls For Microsoft Exchange Server Important: Common failures to connect to a Microsoft Exchange Server can occur because of one of the following reasons: Failure to connect the Kroll Ontrack PowerControls Server to the Domain Controller Incorrect Microsoft Exchange Server Name Microsoft Exchange Server MAPI is not installed on the Kroll Ontrack PowerControls server When or mailbox restore is completed, run Tear Down from the Cohesity UI to unmount volumes from the Kroll Ontrack PowerControls Server. Important: Close out the Kroll Ontrack Powercontrols for Microsoft Exchange before initiating the tear down from the Cohesity UI. 12.
14 Summary Cohesity DataPlatform provides a comprehensive solution to your data center storage requirements. A Cohesity DataPlatform is not just for backups, but a solution that consolidates data protection, consolidate files, object services, and provides instant access to test/dev copies, on a single platform. Data centers with Cohesity DataPlatform can also perform in-place searches and analytics. IT administrators, application and database administrators can rely on Cohesity DataPlatform with DataProtect to store and safeguard business applications, and corporate data without compromises. TroubleShooting Tips Issue: On the Microsoft Exchange Server Windows event log, you receive event Resolution: Check the proxy server for enabled URL access - Microsoft Windows Event 3018 Issue: Kroll Ontrack PowerControls - System Error (see figure 18) Figure 18 PowerControls - System Error Resolution: Run Windows update to ensure the Kroll Ontrack PowerControls Server is up-to-date. Review, download and install the following Windows update if necessary - Windows Update. 13.
15 About the Author Dominic Cheah is an IT veteran, currently working for Cohesity as a Technical Marketing Engineer. In this role, Dominic architects, builds, tests, and validates business-critical applications, databases, and virtualization solutions with Cohesity s DataPlatform for on-prem and cloud deployments. Version History Version Date Document Version History Version 1.0 February 2018 Original Document 14.
16 Authors: Dominic Cheah - Technical Marketing Engineer About Cohesity Cohesity delivers the industry s first solution for secondary storage consolidation. Cohesity enables companies of all sizes to bring order to their data chaos by converging storage workloads, including file services, data protection, Test/Dev, and in-place analytics, onto an infinitely scalable, intelligent data platform. With Cohesity, customers can manage and protect data seamlessly, use it efficiently, and learn from it instantly. Cohesity is headquartered in the heart of Silicon Valley, California with a global presence across the Americas, EMEA, and APAC Cohesity, Inc. Address 300 Park Ave., Suite 300, San Jose, CA contact@cohesity.com 2018 Cohesity. All Rights Reserved
Dell EMC Isilon with Cohesity DataProtect
Dell EMC Isilon with Cohesity DataProtect Abstract This guide outlines the Cohesity DataProtect deployment guide for Dell EMC Isilon Data Protection. Table of Contents About This Guide...2 Intended Audience...2
More informationMicrosoft SQL Server
Microsoft SQL Server Abstract This white paper outlines the best practices for Microsoft SQL Server Failover Cluster Instance data protection with Cohesity DataPlatform. December 2017 Table of Contents
More informationUsing Cohesity with Amazon Web Services (AWS)
Using Cohesity with Amazon Web Services (AWS) Achieve your long-term retention and archival objectives for secondary data Cohesity DataPlatform is a hyperconverged secondary data and application solution
More informationBest Practices Guide for Protecting Microsoft SharePoint Server with Cohesity and Ontrack PowerControls for SharePoint
Best Practices Guide for Protecting Microsoft SharePoint Server with Cohesity and Ontrack PowerControls for SharePoint Abstract This white paper outlines the best practices for using Cohesity to provide
More informationCohesity DataPlatform Protecting Individual MS SQL Databases Solution Guide
Cohesity DataPlatform Protecting Individual MS SQL Databases Solution Guide Abstract This solution guide outlines the workflow for creating backups with Microsoft SQL Server databases and Cohesity Data
More informationCohesity Flash Protect for Pure FlashBlade: Simple, Scalable Data Protection
Cohesity Flash Protect for Pure FlashBlade: Simple, Scalable Data Protection Executive overview Pure Storage FlashBlade is the industry s first all-flash, scale-out file storage purpose-built for high-performance
More informationCohesity Microsoft Azure Data Box Integration
Cohesity Microsoft Azure Data Box Integration Table of Contents Introduction...2 Audience...2 Requirements...2 Assumptions...2 Order Microsoft Azure Data Box...3 Requesting...3 Order Details...4 Shipping
More informationSimple Data Protection for the Cloud Era
Simple Data Protection for the Era Enterprise Data Protection, Simplified Struggling with data protection? You re not alone. Many storage admins are faced with the challenge of protecting an increasing
More informationVeeam with Cohesity Data Platform
Veeam with Cohesity Data Platform Table of Contents About This Guide: 2 Data Protection for VMware Environments: 2 Benefits of using the Cohesity Data Platform with Veeam Backup & Replication: 4 Appendix
More informationCommvault with Cohesity Data Platform
Commvault with Cohesity Data Platform Table of Contents About This Guide:...1 Data Protection for VMware Environments:...1 Cohesity Data Platform Overview:...1 Commvault Overview:... 2 Benefits of using
More informationConfiguring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2
Course 10135B: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2 Course Outline Module 1: Deploying Microsoft Exchange Server 2010 This module describes how to prepare
More informationConfiguring, Managing and Troubleshooting Microsoft Exchange Server 2010
Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Course 10135B 5 Days Instructor-led, Hands-on Course Description This course will provide you with the knowledge and skills to configure
More informationBest Practices Guide for using IBM Spectrum Protect with Cohesity
Best Practices Guide for using IBM Spectrum Protect with Cohesity Abstract This white paper outlines the best practices for using Cohesity as target storage by IBM Spectrum Protect. December 2017 Table
More information5 Days Course on Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010
PROFESSIONAL TRAINING COURSE 5 Days Course on Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 About the Course This Microsoft Exchange 2010 training class will provide you with
More informationConfiguring Managing and Troubleshooting Microsoft Exchange Server 2010
Course Code: M10135 Vendor: Microsoft Course Overview Duration: 5 RRP: POA Configuring Managing and Troubleshooting Microsoft Exchange Server 2010 Overview This course will provide you with the knowledge
More informationNutanix Tech Note. Virtualizing Microsoft Applications on Web-Scale Infrastructure
Nutanix Tech Note Virtualizing Microsoft Applications on Web-Scale Infrastructure The increase in virtualization of critical applications has brought significant attention to compute and storage infrastructure.
More informationBackup and Recovery Best Practices With Tintri VMstore
Backup and Recovery Best Practices With Tintri VMstore Backup and Recovery Best Practices with Tintri VMstore TECHNICAL BEST PRACTICES PAPER, Revision 1.0, April 10, 2014 Contents Contents Introduction
More information10135: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Service Pack 2
Let s Reach For Excellence! TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC Address: 103 Pasteur, Dist.1, HCMC Tel: 08 38245819; 38239761 Email: traincert@tdt-tanduc.com Website: www.tdt-tanduc.com; www.tanducits.com
More informationMCSE: Microsoft Exchange Server 2013
MCSE: Microsoft Exchange Server 2013 This course is developed for IT professionals who are experienced messaging administrators, messaging architects, or consultants. This course is designed for professionals
More information"Charting the Course B Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Course Summary
Course Summary Description This course will provide you with the knowledge and skills to configure and manage a Microsoft Exchange Server 2010 messaging environment. This course does not require previous
More informationMobile MOUSe EXCHANGE SERVER 2010 CONFIGURATION ONLINE COURSE OUTLINE
Mobile MOUSe EXCHANGE SERVER 2010 CONFIGURATION ONLINE COURSE OUTLINE COURSE TITLE EXCHANGE SERVER 2010 CONFIGURATION COURSE DURATION 16 Hour(s) of Interactive Training COURSE OVERVIEW Prepare for Microsoft's
More informationUpdating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010
Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 10165; 5 Days, Instructor-led Course Description There are two main reasons for the course. Firstly,
More informationConfiguring, Managing and Troubleshooting Microsoft Exchange Server 2010
10135 - Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Duration: 5 Days Course Price: $2,975 Software Assurance Eligible Course Description 10135 Configuring, Managing and Troubleshooting
More informationOverview. Course Objectives. : Veritas Backup Exec 16: Administration. Course Outline :: Veritas Backup Exec 16: Administration::
Module Title Duration : Veritas Backup Exec 16: Administration : 5 days Overview The Veritas Backup Exec 16: Administration course is designed for the data protection professional tasked with architecting,
More informationIntegrated and Hyper-converged Data Protection
Integrated and Hyper-converged Data Protection Simplicity & Agility GLOBAL SPONSORS Data Protection Portfolio Protection and recovery to cloud PROTECTION STORAGE PROTECTION SOFTWARE PROTECTION APPLIANCE
More informationVMWARE PROTECTION WITH DELL EMC NETWORKER 9
VMWARE PROTECTION WITH DELL EMC NETWORKER 9 Solution Overview ABSTRACT This white paper describes the integration of Dell EMC NetWorker with VMware vcenter. It also includes details on the NetWorker architecture
More informationConfiguring, Managing and Troubleshooting Microsoft Exchange Server 2010
Course 10135: Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Page 1 of 9 Configuring, Managing and Troubleshooting Microsoft Exchange Server 2010 Course 10135: 4 days; Instructor-Led
More informationStorageCraft OneXafe and Veeam 9.5
TECHNICAL DEPLOYMENT GUIDE NOV 2018 StorageCraft OneXafe and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneXafe, compliments Veeam to create a differentiated
More informationSharePoint 2016 Administrator's Survival Camp
SharePoint 2016 Administrator's Survival Camp Installing and Managing SharePoint 2016 in an On -premises Environment Course Code Audience Format Length Course Description Student Prerequisites SSC2016
More informationUser Guide - Exchange Database idataagent
Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS
More informationHedvig as backup target for Veeam
Hedvig as backup target for Veeam Solution Whitepaper Version 1.0 April 2018 Table of contents Executive overview... 3 Introduction... 3 Solution components... 4 Hedvig... 4 Hedvig Virtual Disk (vdisk)...
More informationMicrosoft E xchange 2010 on VMware
: Microsoft E xchange 2010 on VMware Availability and R ecovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more
More informationVeritas Backup Exec. Powerful, flexible and reliable data protection designed for cloud-ready organizations. Key Features and Benefits OVERVIEW
Veritas Backup Exec Powerful, flexible and reliable data protection designed for cloud-ready organizations. OVERVIEW Veritas Backup Exec is the backup solution without barriers, delivered your way. You
More informationStorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide
TECHNICAL DEPLOYMENT GUIDE StorageCraft OneBlox and Veeam 9.5 Expert Deployment Guide Overview StorageCraft, with its scale-out storage solution OneBlox, compliments Veeam to create a differentiated diskbased
More informationComputer Visions Course Outline
www.compvisions.com 16 Corporate Woods Blvd. Albany, NY 12211 Computer Visions Course Outline Get What You Want We offer highly customizable group training courses: desktop applications, web development,
More informationMicrosoft Exchange Server 2013
Microsoft Exchange Server 2013 Course 20341B & 20342B 5 Days Instructor-led, Hands on Course Information This course is a combination of two Exchange courses, Core Solutions of Microsoft Exchange Server
More informationSolution Brief: Commvault HyperScale Software
Solution Brief: Commvault HyperScale Software ENTERPRISE IT SHIFTS Enterprise IT is being transformed with the maturing of public cloud providers that offer compute, storage and application services with
More informationSnapCenter Software 4.0 Concepts Guide
SnapCenter Software 4.0 Concepts Guide May 2018 215-12925_D0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to use the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter architecture...
More informationVembu NetworkBackup. File Backup, Microsoft Exchange, SQL Server, SharePoint, System State, Outlook and MySQL Backup VEMBU TECHNOLOGIES PARTNERS
Vembu NetworkBackup File Backup, Microsoft Exchange, SQL Server, SharePoint, System State, Outlook and MySQL Backup VEMBU TECHNOLOGIES PARTNERS About Vembu Technologies Founded in 2002 HQ in Chennai, India
More informationCohesity Data Protection White Paper
Cohesity Data Protection White Paper Table of Contents Executive Summary... Page 2 Challenges in data protection fueling the next wave of innovation.... Page 2 Introducing Cohesity next generation Hyperconverged
More informationIntegrated and Hyper-converged Data Protection
Integrated and Hyper-converged Data Protection Ahmed Fouad Advisory Systems Engineer GLOBAL SPONSORS Agenda Dell EMC Data Protection portfolio Business and technology landscape Customer challenges in data
More informationKerio Cloud. Adam Bielawski. Cloud Hosted Enterprise-Class , Calendars, Contacts, Tasks, and Instant Messaging. Twitter LinkedIn Facebook
Kerio Cloud Cloud Hosted Enterprise-Class Email, Calendars, Contacts, Tasks, and Instant Messaging Twitter LinkedIn Facebook Presented by Adam Bielawski June 15, 2016 Why Kerio? Kerio provides safe, simple,
More informationExchange Control Panel EMC. Remote PowerShell
Portal Exchange Control Panel EMC Remote PowerShell What can you do? Provision mailboxes Manage common user properties Create and manage service requests Domain management Password resets Billing and subscription
More informationCohesity SpanFS and SnapTree. White Paper
Cohesity SpanFS and SnapTree White Paper Cohesity SpanFS TM and SnapTree TM Web-Scale File System, Designed for Secondary Storage in the Cloud Era Why Do Enterprises Need a New File System? The Enterprise
More informationAgenda Secondary Storage Problem Cohesity Hyperconverged Secondary Storage Demo: Cohesity and Vmware vilogics Use Case
STO3331BES Cohesity Hyperconverged Secondary Storage: Simple Data Protection for VMware vsphere and vsan Gaetan Castelein, Head of Product Marketing, Cohesity Paul Khosla, Infrastructure Architect, Colliers
More informationMicrosoft Exam
Microsoft Exam 70-662 TS: Microsoft Exchange Server 2010, Configuring Skills Being Measured This exam measures your ability to accomplish the technical tasks listed below. The percentages indicate the
More informationRemove complexity in protecting your virtual infrastructure with. IBM Spectrum Protect Plus. Data availability made easy. Overview
Overview Challenge In your organization, backup management is too complex and consumes too much time and too many IT resources. Solution IBM Spectrum Protect Plus dramatically simplifies data protection
More informationBarracuda Threat Scanner for Exchange
The is a free Windows application that allows you to scan onpremises Microsoft Exchange Servers for threats in existing user mailboxes. This tool provides insight into what threats have already entered
More informationUpdating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1
Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1 Course 10165 5 Days Instructor-led, Hands-on Course Description There are two main reasons for
More informationRUBRIK CLOUD DATA MANAGEMENT Technology Overview & How It Works
RUBRIK CLOUD DATA MANAGEMENT Technology Overview & How It Works CONTENTS Introduction to Cloud Data Management 3 Data Management for the Cloud Generation Lifecycle Data Management The Problem with the
More informationIBM Spectrum Protect Plus
IBM Spectrum Protect Plus Simplify data recovery and data reuse for VMs, files, databases and applications Highlights Achieve rapid VM, file, database, and application recovery Protect industry-leading
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 3.0 This document supports the version of each product listed and supports
More informationArchitecture and Deployment
Architecture and Deployment Modules About Vembu Technologies Introduction Product Overview Vembu BDR Suite - Architecture System Requirements Deployment Scenarios License Pricing 2 About Vembu Technologies
More informationCommvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY
Commvault Backup to Cloudian Hyperstore CONFIGURATION GUIDE TO USE HYPERSTORE AS A STORAGE LIBRARY CONTENTS EXECUTIVE SUMMARY... 2 SOLUTION OVERVIEW... 3 USE CASES... 4 SOLUTION COMPONENTS... 5 Commvault
More informationEMC Data Protection for Microsoft
EMC Data Protection for Microsoft Featuring Industry Perspectives from IDC 7 November 2013 Ashish Nadkarni, IDC Research Director, Storage Systems @Ashish_Nadkarni Phil George, EMC Backup Recovery Systems
More informationConstruct a High Efficiency VM Disaster Recovery Solution. Best choice for protecting virtual environments
Construct a High Efficiency VM Disaster Recovery Solution Best choice for protecting virtual environments About NAKIVO Established in the USA since 2012 Provides data protection solutions for VMware, Hyper-V
More informationProtecting Microsoft SharePoint
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT SHAREPOINT Backup Exec TM 2014 Technical White Paper Protecting Microsoft SharePoint Technical White Papers are designed to introduce Symantec
More informationMicrosoft SQL Server HA and DR with DVX
Microsoft SQL Server HA and DR with DVX 385 Moffett Park Dr. Sunnyvale, CA 94089 844-478-8349 www.datrium.com Technical Report Introduction A Datrium DVX solution allows you to start small and scale out.
More informationWhite Paper Simplified Backup and Reliable Recovery
Simplified Backup and Reliable Recovery NEC Corporation of America necam.com Overview Amanda Enterprise from Zmanda - A Carbonite company, is a backup and recovery solution that offers fast installation,
More informationZadara Enterprise Storage in
Zadara Enterprise Storage in Google Cloud Platform (GCP) Deployment Guide March 2017 Revision A 2011 2017 ZADARA Storage, Inc. All rights reserved. Zadara Storage / GCP - Deployment Guide Page 1 Contents
More informationCloud Compute. Backup Portal User Guide
Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8
More informationServer After completing. this course, the. Internet Prerequisites. systems. PTE LTD
Configuring, Managing and Troubleshooting Microsoft Exchange Server 20100 Course Code: 10135A: Five days; Instructor Led About this Course This five day, instructor led course will provide you with the
More informationCore Solutions of Microsoft Exchange Server 2013
Core Solutions of Microsoft Exchange Server 2013 OD20341B; On-Demand, Video-based Course Description This course will provide you with the knowledge and skills to plan, deploy, manage, secure, and support
More informationVMware Mirage Getting Started Guide
Mirage 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationProtecting Microsoft Exchange
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING MICROSOFT EXCHANGE Backup Exec TM 2014 Technical White Paper Protecting Microsoft Exchange Technical White Papers are designed to introduce Symantec
More informationData Protection Modernization: Meeting the Challenges of a Changing IT Landscape
Data Protection Modernization: Meeting the Challenges of a Changing IT Landscape Tom Clark IBM Distinguished Engineer, Chief Architect Software 1 Data growth is continuing to explode Sensors & Devices
More informationConfiguration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System
Configuration Guide for Veeam Backup & Replication with the HPE Hyper Converged 250 System 1 + 1 = 3 HPE + Veeam Better Together Contents Intended audience...3 Veeam Backup & Replication overview...3 Adding
More informationKunal Mahajan Microsoft Corporation
Kunal Mahajan Microsoft Corporation 65+ Million Customer hosted Mailboxes 30+ Million Partner hosted Mailboxes 1,800 Partners Strategic Business Challenges Our Sales teams need to connect with the right
More informationQuick Start Guide - Exchange Database idataagent
Page 1 of 90 Quick Start Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design 4.0 VMware Validated Design for Software-Defined Data Center 4.0 You can find the most up-to-date technical
More informationEMC Integrated Infrastructure for VMware. Business Continuity
EMC Integrated Infrastructure for VMware Business Continuity Enabled by EMC Celerra and VMware vcenter Site Recovery Manager Reference Architecture Copyright 2009 EMC Corporation. All rights reserved.
More informationIntroducing VMware Validated Designs for Software-Defined Data Center
Introducing VMware Validated Designs for Software-Defined Data Center VMware Validated Design for Software-Defined Data Center 4.0 This document supports the version of each product listed and supports
More informationCore Solutions of Microsoft Exchange Server 2013
Core Solutions of Microsoft Exchange Server 2013 Course: 20341 Course Details Audience(s): IT Professional(s) Technology: Duration: Exchange Server 40 hours ABOUT THIS COURSE This course will provide you
More informationComplete Data Protection & Disaster Recovery Solution
Complete Data Protection & Disaster Recovery Solution Quadric Software 2015 We were looking at other solutions. Alike was the best with XenServer, and none of them had Alike s compression abilities. After
More informationCourse Outline. ProTech Professional Technical Services, Inc. Veritas Backup Exec 20.1: Administration. Course Summary.
Course Summary Description The course is designed for the data protection professional tasked with architecting, implementing, backing up, and restoring critical data. This class covers how to back up
More informationData safety for digital business. Veritas Backup Exec WHITE PAPER. One solution for hybrid, physical, and virtual environments.
WHITE PAPER Data safety for digital business. One solution for hybrid, physical, and virtual environments. It s common knowledge that the cloud plays a critical role in helping organizations accomplish
More informationCA ARCserve Backup. Benefits. Overview. The CA Advantage
PRODUCT BRIEF: CA ARCSERVE BACKUP R12.5 CA ARCserve Backup CA ARCSERVE BACKUP, A HIGH-PERFORMANCE, INDUSTRY-LEADING DATA PROTECTION PRODUCT, UNITES INNOVATIVE DATA DEDUPLICATION TECHNOLOGY, POWERFUL STORAGE
More informationAvailability for the modern datacentre Veeam Availability Suite v9.5
Availability for the modern datacentre Veeam Availability Suite v9.5 Jan van Leuken System Engineer Benelux, Veeam Software jan.vanleuken@veeam.com +31 (0)615 83 50 64 Robin van der Steenhoven Territory
More informationData Protection for Virtualized Environments
Technology Insight Paper Data Protection for Virtualized Environments IBM Spectrum Protect Plus Delivers a Modern Approach By Steve Scully, Sr. Analyst February 2018 Modern Data Protection for Virtualized
More informationVMware Backup and Replication using Vembu VMBackup
VMware Backup and Replication using Vembu VEMBU TECHNOLOGIES PARTNERS Vembu Technologies Founded in 2002 10+ Years of Experience Headquartered in Chennai 100+ Countries 4000+ Partners 2 60000+ Businesses
More informationPUT DATA PROTECTION WHERE YOU NEED IT
from Carbonite PUT DATA PROTECTION WHERE YOU NEED IT Flexibility is your best friend when it comes to choosing a backup plan. For a backup solution to be considered flexible, it needs to satisfy several
More informationCopyright 2012 EMC Corporation. All rights reserved.
1 TRANSFORMING MICROSOFT APPLICATIONS TO THE CLOUD Louaye Rachidi Technology Consultant 2 22x Partner Of Year 19+ Gold And Silver Microsoft Competencies 2,700+ Consultants Worldwide Cooperative Support
More informationSimplifying Data Protection for VMware Virtual SAN with Cohesity DataPlatform
Simplifying Data Protection for VMware Virtual SAN with Cohesity DataPlatform Table of Contents Executive Summary...2 Primary Storage Has Improved Dramatically But Secondary Storage Remains a Complicated,
More informationVembu BDR Suite. Free vs Paid Edition. Backup & Disaster Recovery. VEMBU TECHNOLOGIES TRUSTED BY OVER 60,000 BUSINESSES
Vembu BDR Suite Free vs Paid Edition VEMBU TECHNOLOGIES www.vembu.com Free vs Paid Edition The Free Edition of Vembu BDR suite products comprises of mandate features which ensure data protection for both
More informationUNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE
UNITRENDS & NUTANIX ARCHITECTURE & IMPLEMENTATION GUIDE ALL-IN-ONE BACKUP AND DISASTER RECOVERY FOR LEADING HYPERCONVERGED INFRASTRUCTURE 1 INTRODUCTION Nutanix and Unitrends have jointly integrated their
More informationVMware Backup and Replication Enterprise Edition
VMware Backup and Replication Enterprise Edition TECHNOLOGY PARTNERS Vembu Technologies 10+ Years of Experience 100+ Countries 2 Headquartered in Chennai Vembu BDR Suite Vembu BDR suite is an one stop
More information1 Quantum Corporation 1
1 Tactics and Tips for Protecting Virtual Servers Mark Eastman Director, Solutions Marketing April 2008 VMware Changing the Way Data Protection is Done No longer 1 server, 1 backup paradigm App Virtual
More informationVembu Technologies. Experience. Headquartered in Chennai Countries
Vembu extends Vembu v4.0 Vembu BDRsupport Suite - to Standard edition Vembu Technologies Experience 100+ Countries 2 Headquartered in Chennai Vembu BDR Suite Vembu BDR Suite is a portfolio of products
More informationModernize Your Backup and DR Using Actifio in AWS
FOR AWS Modernize Your Backup and DR Using Actifio in AWS 150105H FOR AWS Modernize Your Backup and DR Using Actifio in AWS What is Actifio? Actifio virtualizes the data that s the lifeblood of business.
More informationHPE Synergy HPE SimpliVity 380
HPE Synergy HPE SimpliVity 0 Pascal.Moens@hpe.com, Solutions Architect Technical Partner Lead February 0 HPE Synergy Composable infrastructure at HPE CPU Memory Local Storage LAN I/O SAN I/O Power Cooling
More informationProtecting Hyper-V Environments
TECHNICAL WHITE PAPER: BACKUP EXEC TM 2014 PROTECTING HYPER-V ENVIRONMENTS Backup Exec TM 2014 Technical White Paper Protecting Hyper-V Environments Technical White Papers are designed to introduce Symantec
More informationCourse Description. Course Audience. Course Outline. Course Page - Page 1 of 6
Course Page - Page 1 of 6 Core Solutions of Microsoft Exchange Server 2013 M-20341 Length: 5 days Price: $2,895.00 Course Description In this course, students will learn to configure and manage a Microsoft
More informationSnapCenter Software 4.1 Concepts Guide
SnapCenter Software 4.1 Concepts Guide August 2018 215-13392_A0 doccomments@netapp.com Table of Contents 3 Contents Deciding whether to read the Concepts Guide... 7 SnapCenter overview... 8 SnapCenter
More informationNEXT BIG THING. Edgemo Summit Martin Plesner-Jacobsen Team Lead Nordic
NEXT BIG THING Edgemo Summit 2016 Martin Plesner-Jacobsen Team Lead Nordic HQ Baar, Switzerland Founded in 2006, Veeam currently has 205,000 customers 41,000 ProPartners 2,200 employees worldwide 205,000+
More informationCourse Outline. Core Solutions of Microsoft Exchange Server 2013 Course 20341A: 5 days Instructor Led
Core Solutions of Microsoft Exchange Server 2013 Course 20341A: 5 days Instructor Led About this Course In this course, students will learn to configure and manage a Microsoft Exchange Server 2013 messaging
More informationVMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014
VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of
More informationDell EMC NetWorker Module for Microsoft for Exchange Server VSS
Dell EMC NetWorker Module for Microsoft for Exchange Server VSS Version 18.1 User Guide 302-004-268 REV 02 Copyright 2007-2018 Dell Inc. or its subsidiaries. All rights reserved. Published August, 2018
More informationParagon Protect & Restore
Paragon Protect & Restore ver. 3 Centralized Backup and Disaster Recovery for virtual and physical environments Tight Integration with hypervisors for agentless backups, VM replication and seamless restores
More informationUser Guide - Exchange Mailbox Archiver Agent
Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT
More informationHow To Guide: Long Term Archive for Rubrik. Using SwiftStack Storage as a Long Term Archive for Rubrik
Using SwiftStack Storage as a Long Term Archive for Rubrik Introduction 3 Solution Architecture 5 Example Design 5 Multi Region Cluster 6 Network Design 6 Minimum Supported Versions and Solution Limits
More information