LiveVault. Agent Guide

Size: px
Start display at page:

Download "LiveVault. Agent Guide"

Transcription

1 LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about configuring backups and restores, backing up SQL and Exchange and best practices. Further information can be provided through Support, other guides and web-based help. Document Release Date: Jan 2017 Software Release Date: Jan 2017

2 Contents Chapter 1: Introduction... Terminology... The LiveVault Backup Service... System Requirements... Maximum Backup Policy Size Guidelines... Chapter 2: Agent Installation and Configuration Consult the LiveVault Environment Configuration Guide... Add a LiveVault Windows Agent... Download the LiveVault Windows Agent Software Install the LiveVault Windows Agent Software... Provision the Agent Computer... Configure the Computer for Backup... Add a Linux Agent... Download the LiveVault Linux Agent Software... Install the LiveVault Linux Agent Software... Provision the Agent Computer... Remove Agent Software from a Computer Windows Linux Chapter 3: Create Backup Policies... Create Standard Backup Policies... Create Exchange Backup Policies... Create SQL Server Backup Policies... Create DPM Backup Policies... LiveVault (7.82) Page 2

3 Use Server Templates... Server Template Feature Support... Chapter 4: Create Restore Policies... Create a Restore Policy... Create a Restore Policy for Files and Directories... Create an Exchange Restore Policy... Create a SQL Restore Policy... Chapter 5: Best Practices for Agents... Overview of Best Practices Plan for Disaster Recovery... Gather As-Built Configuration Information... Monitor the Server Status Reports... Generate a Server Status Report for All Servers... Generate an Advanced Server Status Report... Generate a Server Status Report for a Single Computer Configure ed Server Status Reports... Verify the Server Status Report Settings... Install LiveVault Software Updates... Configure Volume Shadow Copy Service (VSS) Configure VSS to Use Space Efficiently Volume Free Space Considerations Install VSS Update Rollups on Windows 2003 Servers Run the Agent on Servers with Multiple VSS Providers Network Bandwidth Considerations Antivirus Configuration Considerations... Antivirus and other software interaction... Backup Policy Setup Guidelines... Virtual Machine Cloning and LiveVault Software... LiveVault (7.82) Page 3

4 Send Documentation Feedback... 7 LiveVault (7.82) Page 4

5 Chapter 1: Introduction This chapter provides an overview of the LiveVault backup service. If this is your first time setting up LiveVault, see the LiveVault Environment Configuration Guide to help you set up your network environment to use the LiveVault service. Terminology The following terms are used in this guide: l TurboRestore Appliance (TRA). A TurboRestore Appliance is a data storage vault on the customer s premises, enabling local network speed backups and restores of data to the protected computers. l Media Restore Server (MRS). A Media Restore Server is a temporary data storage vault, filled with the customers backup versions and shipped to their premises, enabling local network speed restores of data to their protected computers. l Provision/provisioning. You provision a LiveVault agent to connect it to the LiveVault service and obtain the necessary certificates and keys. Provisioning occurs during the installation and configuration of the agent software. LiveVault (7.82) Page 5

6 Agent Chapter 1: Introduction The LiveVault Backup Service The LiveVault Service is a managed service solution that provides online backup, recovery, and electronic vaulting for your servers. You specify what you want to back up and when, and LiveVault backs up your data to an offsite data center, and to a TurboRestore Appliance at your own site for quicker recovery time. For more information on using TurboRestore appliances in your environment, see the LiveVault Appliance Setup and User Guide or the LiveVault Web Management Portal help system. LiveVault Backup Service LiveVault (7.82) Page 6

7 Agent Chapter 1: Introduction System Requirements The documented platforms are the recommended and most fullytested platforms for LiveVault. Other platforms may be supported and LiveVault can provide support for other platforms on request. For information about supported platforms, see the System Requirements in the LiveVault Release Notes or the LiveVault Web Management Portal Help. Maximum Backup Policy Size Guidelines The following table displays the recommended maximum amount of data and the maximum policy size on an agent that you can protect with a standard backup policy. Operating System/Application Windows Server TB maximum policy 7 TB maximum data protected Windows Server 2012 R2 Windows Server 2012 Windows Server 2008 R2 1 TB maximum policy 7 TB maximum data protected 1 TB maximum policy 7 TB maximum data protected LiveVault (7.82) Page 7

8 Agent Windows Server bit 1 TB maximum policy 2 TB maximum data protected Windows Server bit 1 TB maximum policy 5 TB maximum data protected Windows Server bit 1 TB maximum policy 2 TB maximum data protected Windows Server bit 1 TB maximum policy 5 TB maximum data protected LiveVault (7.82) Page 8

9 Chapter 2: Agent Installation and Configuration This chapter contains detailed instructions for installing and provisioning your LiveVault agents. Consult the LiveVault Environment Configuration Guide If this is a completely new installation of LiveVault, see the LiveVault Environment Configuration Guide to help you set up your network environment to use the service. The Environment Configuration Guide contains critical information about how to configure your ports, firewalls, security settings, virus control, and other settings. If you configure these settings incorrectly, the service might not function correctly or as intended. Add a LiveVault Windows Agent Install the LiveVault agent software on a Windows computer. Download the LiveVault Windows Agent Software Download the Windows agent software kit to your Windows server. LiveVault (7.82) Page 9

10 Chapter 2: Agent Installation and Configuration To download the Windows agent kit 1. After being ed your login credentials. log in to the LiveVault Web Management Portal Select Downloads at the top right of the screen 3. Identify whether you need a 32-bit or 64-bit Windows agent kit. Note: The 32-bit agent will not run on a 64-bit server, and vice-versa. Select the type of kit you need: LiveVault Agent for Windows Server LiveVault Agent for Windows Server x64 4. Click Download. You can download and save the software to any location. The Windows agent kit file names conform to the following convention, which is dependent on platform: LVBackupSUAgent_<release>_<build>.exe - 32-bit agent LVBackupX64Agent <release>_<build>.exe - 64 bit agent Install the LiveVault Windows Agent Software Install the Windows agent software onto the selected server. LiveVault (7.82) Page 10

11 Chapter 2: Agent Installation and Configuration To install the agent software 1. Log in to your server as a Local Administrator with Full system control. 2. Run the agent kit. 3. Accept the license agreement, and click Next. 4. Choose the installation location for the software. Click Change to change the destination for the software and for the backup database files. By default the LiveVault data directory is installed to the volume that has the largest amount of free disk space, as follows: <x:\>\livevaultdata where x: is the volume with most free space. Note: We recommend you to select a location other than your root drive for the backup database files. The backup database files can grow to consume an amount of space, depending on the number of backup policies you create and the amount of data you are backing up. The volume for the LiveVault data directory should optimally have at least 5 GB free disk space. 5. Click Next. 6. To install the software, click Install. The software installs and the Configuration page opens. 7. Click Configure. The Configuration Wizard opens. LiveVault (7.82) Page 11

12 Chapter 2: Agent Installation and Configuration Chapter 2: Agent Installation and Configuration Provision the Agent Computer You use the Configuration Wizard to generate an encryption key and to provision the agent into the LiveVault service. To provision the agent computer 1. In the Username box, type the user name. 2. In the Password box, type the password for the user account. 3. Optionally, click the Configuration button to test the connection to the LiveVault service, and to configure any proxy settings. 4. Click Next. The Select Installation Action page opens. 5. Select New server being added to the backup service. 6. Click Next. The agent generates an encryption key. This process may take up to several minutes due to the nature of cryptographic key generation. The Configuration page opens. This page allows users to configure the agent for standard backup or as a CIFS-only agent. 7. Select Create a standard backup agent. 8. Click Next. 9. Enter an encryption key password for this computer. LiveVault (7.82) Page 12

13 Chapter 2: Agent Installation and Configuration Tip: Creating a strong password will make your data more secure. Your data is only as secure as this password. To make a password strong, you should use some combination of both letters and numbers, uppercase and lowercase, and it should contain at least 8 characters. For even greater security, use a random string containing numbers, letters, uppercase, and lowercase, as opposed to an actual word. You can achieve even greater security with a pass phrase, which is at least as strong and usually stronger than a password. A phrase will tend to be longer than a password, and contain at least some characters from each of the groups mentioned above: uppercase and lowercase, but also spaces and punctuation characters. 10. Confirm your encryption key password. 11. Select the Send Encrypted Password option if you want to store a copy of your password with the service. This ensures that you can restore your data in the event that you lose your key. Note: We strongly recommends saving the encryption key. Without this key you cannot perform a disaster recovery or restore your data. 12. Click Finish. The LiveVault service provisions the server and provides a certification to your server. 13. Restart your computer. LiveVault (7.82) Page 13

14 Chapter 2: Agent Installation and Configuration Chapter 2: Agent Installation and Configuration Configure the Computer for Backup After your computer has restarted, you configure the computer to the LiveVault service. To configure the new computer for backup 1. Log in to the Web Management Portal. 2. In the left pane, select the new computer. The New Computer page opens. 3. Select a subscription for this computer from the Subscription list. If only one plan is available for this computer, based on the commercial agreement between you and your service provider, you see it here but you cannot modify it. 4. Select a retention plan for this computer from the Retentions list. If only one plan is available for this computer, based on the commercial agreement between you and your service provider, you see it here but you cannot modify it. 5. To back up to a local appliance in addition to offsite, select an appliance from the Use Backup Appliance list. 6. Click Configure Backup. 7. The Computer Summary tab opens. LiveVault (7.82) Page 14

15 Chapter 2: Agent Installation and Configuration Add a Linux Agent Install the LiveVault agent software on a Linux computer. Download the LiveVault Linux Agent Software To download the Linux agent software kit 1. Log in to the Web Management Portal. 2. Select Downloads from the top menu. 3. Select the type of kit you need: LiveVault Agent for Linux LiveVault Agent for Linux x64 4. Click Download. You can download and save the software to any location. Install the LiveVault Linux Agent Software After the download, move the kit from the download location to a temporary location on the Linux computer to be installed. LiveVault (7.82) Page 15

16 Chapter 2: Agent Installation and Configuration To install the kit on Linux servers 1. Open a terminal window and navigate to the temporary directory location. 2. Extract the kit files. tar xzv-f <BuildVersion>.tar.gz For example: tar xzv-f 7.65Build11219.tar.gz 3. Run the installation script../install.sh Note: If you do not have access to the computer as root, use sudo to elevate the terminal session to root. Do not use sudo to run the./install.sh script directly. Note: If you receive an error while running the installation script, it may be an issue with the environmental variable for the language. To work around this issue, use the command: LANG=en_US You must use this command again, after any reboot. 4. Press Y to accept the license agreement. 5. Type a location for the binaries, or select the default location and press ENTER. The default location is /usr/livevault/bin. The installation creates the /bin subdirectory by default. LiveVault (7.82) Page 16

17 Chapter 2: Agent Installation and Configuration 6. Type a location for the LiveVault data directory, or select the default location and press ENTER. The default location is /usr/livevault. Note: The backup database files can grow to consume an amount of space, depending on the number of backup policies you create and the amount of data you are backing up. The volume for the LiveVault data directory should optimally have the larger of 1 percent of the data under protection or 20 GB free disk space. The system installs the software and displays the message: Installation complete Provision the Agent Computer After the software installs, you generate an encryption key and provision the agent into the LiveVault service. To provision the Linux Agent 1. Type the following command to begin provisioning to the LiveVault service: cd /usr/livevault/bin./lvregister.sh -s 2. Press 1 to provision a system. 3. Select one of the following choices for provisioning the system: LiveVault (7.82) Page 17

18 Chapter 2: Agent Installation and Configuration a. For a new computer, select 1 Add a new server. b. For an upgrade, select 2 Reprovision a previously registered server. Select the system name. The software generates an encryption key. 4. Enter the user name to validate your account and press ENTER. 5. Enter the password to validate your account and press ENTER. 6. Enter an encryption key password for this computer and press ENTER. 7. Enter the encryption key password again to confirm, and press ENTER. 8. The system prompts you to decide if you want to store your encryption key password for emergency recovery, in the event you forget your encryption key password. Select V for Yes, or N for No. Note: It is critical that you remember this password. You need this password to redirect your data to a different location during restores. HP strongly recommends saving the encryption key. Without this key you cannot restore your data. 9. The system finishes configuring your software and displays the message Provisioning is complete. 10. Continue configuration steps as in "Configure the Computer for Backup". LiveVault (7.82) Page 18

19 Chapter 2: Agent Installation and Configuration Remove Agent S oftware from a Computer To avoid further billing and to eliminate server status s from being sent you, you must uninstall the agent software and remove your computers from LiveVault. Windows To remove agent software from a Windows computer 1. Go to the Windows Start menu, and select Control Panel. 2. Select Add or Remove Programs. 3. Select the LiveVault Backup program and click Remove. 4. Select Yes when asked to remove all registration and configuration information from the computer. LiveVault (7.82) Page 19

20 Chapter 2: Agent Installation and Configuration 5. After removing the program, delete the Backup Engine directory, which you specified when adding the computer. 6. Delete the \Program Files\Autonomy if it exists. Linux To remove agent software from a Linux computer 1. Log in as root on the computer. 2. Run the script to uninstall the service software: cd <install_dir> sh uninstall.sh The uninstall script deletes all LiveVault agent software. 3. The system prompts you if you want to remove all registration and configuration information (located in <data_dir>) in addition to the software. 4. When LiveVault has been uninstalled, the following message is displayed: UnInstallation complete LiveVault (7.82) Page 20

21 Chapter 3: Create Backup Policies This chapter contains detailed instructions for creating backup policies. You create a backup policy to define the files and directories to back up, set a backup schedule and backup destination, and a data retention schedule. You can create multiple backup policies if you have sets of files to which to apply separate rules or schedules. Create Standard Backup Policies In the LiveVault Web Management Portal, create one or more backup policies to protect file and directory data, the system volume, and to protect Windows system state. To create a backup policy 1. Log into the LiveVault Web Management Portal. 2. In the Navigation Pane, select the computer you want to back up. The Computer Summary page opens. 3. Click the Backup tab. The Backup Summary page opens. 4. Click add new Standard Policy. The Backup Configuration page opens. 5. Type a name for the new backup policy in the New Backup Policy box. LiveVault (7.82) Page 21

22 Chapter 3: Create Backup Policies 6. Specify the files that you want this policy to back up. You can use either of the following methods to specify the files: Browse and select the files from a tree view of your computer's file structure. Click the Advanced button to manually define the file selection rules. 7. To enable disaster recovery on a Windows agent, select the Back up system state check box. It is not selected by default. Note: If you do not back up the system volume and system state, you cannot perform a disaster recovery. System state backup is available for Windows agents only. LiveVault (7.82) Page 22

23 Chapter 3: Create Backup Policies 8. To optionally back up Windows Server 2012 & 2016 volumes optimized for data deduplication, select Create optimized backup for the selected deduplicated volume contents. It is not selected by default. For more information on Windows volumes optimized for data deduplication, see your Windows Server documentation and to the LiveVault Web Management Help system. Note: The option to create an optimized backup of Windows volumes optimized for deduplication applies to Windows 2012 & 2016 agents only. 9. Select the Schedule tab. The Backup Schedule page opens. 10. Select a backup schedule from those displayed, or create a custom schedule, if you have the rights to do so. Backup schedule options are determined by the level of service to which you subscribed. When you schedule your initial backup, verify that the Run Beyond scheduled backup times until complete is selected. HP recommends keeping this selected, to enable disaster recovery. 11. Select the Options tab. The Backup Options page opens. 12. Select the retention period for the policy from the Retention list. You also can use this tab to perform the following tasks: LiveVault (7.82) Page 23

24 Chapter 3: Create Backup Policies Chapter 3: Create Backup Policies. Enter the name of any script that you want to run before or after the backup occurs.. Temporarily disable this policy.. Limit the number of system state backups that will occur per day. 13. Click Next. The Backup Confirmation page opens. 14. Review the configuration for the policy and click Done. The backup policy is created and begins backing up according to the backup schedule. Create Exchange Backup Policies Create an Exchange backup policy to protect storage groups and databases on Microsoft Exchange Server 2003 and later in a transactionally safe manner. For more information on supported versions of Exchange and information on Exchange backup policies, see the LiveVault Web Management Portal Help and the LiveVault Release Notes. To create an Exchange backup policy 1. In the Navigation Pane, select the computer you want to back up. 2. Select the Backup tab. 3. On the Backup tab, click add new Exchange Server Policy. LiveVault (7.82) Page 24

25 Chapter 3: Create Backup Policies The Backup Configuration page opens. 4. Type a name for the Exchange backup policy. 5. Select the Exchange object(s) you want this policy to back up. To select all stores on the Exchange server, select the Exchange server object at the top of the tree. To select an individual store or database, expand the tree objects on the left and select the store object on the right. For Exchange 2013, dismounted databases are shown in the tree. However, dismounted databases selected during backup policy creation will be excluded from backup because they cannot be backed up. 6. Select the Schedule tab. The Backup Schedule page opens. 7. Select a backup schedule from those displayed, or create a custom schedule, if you have the rights to do so. Backup schedule options are determined by the level of service to which you subscribed. 8. Select the Options tab. The Backup Options page opens. 9. Select the retention period for the policy. You also can use this tab to perform the following tasks: a. Enter the name of any script that you want to run before or after the backup occurs. LiveVault (7.82) Page 25

26 Chapter 3: Create Backup Policies Chapter 3: Create Backup Policies b. Temporarily disable this policy. 10. Click Next. The Backup Confirmation page opens. 11. Review the configuration for the policy and click Done. The backup policy is created and begins backing up according to the schedule. Create SQL Server Backup Policies Create SQL backup policies to protect SQL databases and SQL Server s master database in a transactionally safe manner. For more information on supported versions of SQL Server and information on SQL backup policies, see the LiveVault Web Management Portal Help and the LiveVault Release Notes.. To create a SQL backup policy 1. In the Navigation Pane, select the computer you want to back up. 2. Select the Backup tab. 3. On the Backup tab, click add new SQL Server Policy. The Backup Configuration page opens. 4. Type a name for the new backup policy in the Backup Policy Name box. 5. Select the SQL server database(s) you want this policy to back up. LiveVault (7.82) Page 26

27 Chapter 3: Create Backup Policies To select all databases on the SQL Server, select the SQL server object at the top of the tree. To select an individual database, expand the tree objects on the left pane and select the database from the right pane. 6. Select the Schedule tab. The Backup Schedule page opens. 7. Select a backup schedule from those displayed, or create a custom schedule, if you have the rights to do so. Backup schedule options are determined by the level of service to which you subscribed. 8. Select the Options tab. The Backup Options page opens. 9. Select the retention period for the policy. You also can use this tab to perform the following tasks: a. Enter the name of any script that you want to run before or after the backup occurs. b. Temporarily disable this policy. c. Select Truncate transaction logs at the end of a successful backup if you want to truncate the transaction logs. 10. Click Next. The Backup Confirmation page opens. 11. Review the configuration for the policy and click Done. The backup policies are created and begin backing up according to the schedule. LiveVault (7.82) Page 27

28 Chapter 3: Create Backup Policies Use Server Templates Server templates let you configure and manage common agent settings and backup policies and apply them to multiple servers in your organization. You use server templates during the initial LiveVault agent software distribution, installation and provisioning of multiple computers in your organization. Chapter 3: Create Backup Policies All computers associated with a selected server template are protected in exactly the same way, with the same backup rule sets of included or excluded directories and files. Changes to the server template common properties or backup policy rules apply to all computers associated with it. Server Template Feature Support The server template feature supports standard volume, directory and file backup and system state policy types. The following features are not supported: Server templates do not support the following agent and backup types at this time: Agents Clustered Windows agents Application aware backup policy types Exchange backup policies SQL backup policies Microsoft Data Protection Manager (DPM) backup policies CIFS backup policies Virtual machine backup policies LiveVault (7.82) Page 28

29 Chapter 3: Create Backup Policies Backup of Windows volumes optimized for data deduplication in Optimized mode. If you create a server template to protect Windows 2012 and later volumes optimized for data deduplication, the backups will be non-optimized. For more information, see the LiveVault Web Management Portal help. For more detailed information and best practices for using server templates, see the LiveVault Web Management Portal help topic Server Templates: An Overview. For more information about distributing the agent with a software distribution tool, see the LiveVault Agent Distribution Guide. LiveVault (7.82) Page 29

30 Chapter 3: Create Backup Policies Chapter 4: Create Restore Policies This chapter contains detailed instructions for creating restore policies. Create a Restore Policy To ensure the highest chance of success for restores and disaster recoveries, perform the following steps. l Test restore. Perform a test restore, so you can benchmark performance and be more familiar with the process. l Media Restore Device. Investigate the steps and cost of ordering a Media Restore Device, which you might need when you do not have adequate bandwidth to restore your data. l Disaster Recovery. Perform a test disaster recovery of a non-critical system so you can benchmark performance and be more familiar with the process. See the Disaster Recovery Guide in advance. Create a Restore Policy for Files and Directories The Restore Wizard guides you through creating a restore request. You can restore files over the Internet or have a Media Restore Device sent to you. After you determine the restore method, you select files and options on the Restore Request page. LiveVault (7.82) Page 30

31 Chapter 4: Create Restore Policies To request a restore policy 1. In the left pane of the Web Management Portal, select the computer that you want to restore. 2. In the right pane, select the Restore tab. 3. Click New Restore. The Restore Wizard page opens. 4. Select one of the following options: Restore data over the Internet. The Restore Request page opens. To continue with this process, see step 5. Have a media restore device shipped to you. The Restore Wizard Decision page opens for you to select the date and time to restore from, and the shipping method. When you click Next, the Restore Wizard Shipping Information page opens, requesting the address for shipment of the device. When the restore device arrives, you attach it to your network. You can then restore the backed-up files from the restore device and ship it back to HP. 5. After selecting a Restore method, click Next. The Selection page opens. 6. Select the directories and files that you want to restore, or click Advanced to use rules as filters for directory and file selection. 7. Optionally, select the Options tab to select file overwrite options, restore to a LiveVault (7.82) Page 31

32 Chapter 4: Create Restore Policies different computer than the files were backed up from, and specify system state restore, and schedule the restore. 8. Click Next. The Restore Wizard Confirmation page opens. 9. Review the restore information and click Done. The restore job is created and runs according to the restore schedule. Create an Exchange Restore Policy You can restore Microsoft Exchange 2003 and later Server Storage groups and databases in the event that a database becomes corrupted or lost. Creating an Exchange restore policy enables the transactionally-safe restore of the Exchange data and assumes that you have backed up the Exchange data with an Exchange backup policy. Note: There are many scenarios, restore options, and considerations for restoring Exchange databases. see the LiveVault Management Web Portal help system for additional detailed procedures. To restore an Exchange policy 1. In the Web Management Portal, select the Exchange server that originally had the data that you are restoring. 2. Select the Restore tab. 3. Click New Restore. LiveVault (7.82) Page 32

33 Chapter 4: Create Restore Policies The Restore Wizard page opens. 4. Select one of the following options: Restore data over the Internet. Have a media restore device shipped to you. 5. After selecting a Restore method, click Next. The Selection page opens. 6. Select Exchange Server and click Next. The Restore Request page opens. 7. In the Name to use for this restore request box, type a name for the restore job. 8. From the Policy filter list, select Exchange. 9. From the Version list, select the backup version from which you want to restore the Mailbox and Public Folder stores. The most recent version is selected by default. 10. Browse and select the Exchange objects to restore. 11. Select the Options tab. The Restore Options page opens. 12. Select Exchange restore and any other restore options. 13. Click Next. The Restore Confirmation page opens. LiveVault (7.82) Page 33

34 Chapter 4: Create Restore Policies 14. Select Disable Exchange Backup Policies to disable backup. 15. Click Done. The restore job is created and begins restoring according to the schedule. 16. Verify that the databases were restored as expected. Create a SQL Restore Policy You can restore Microsoft SQL Server 2005 and later databases in the event that a database becomes corrupted or lost. Creating a SQL restore policy enables the transactionally-safe restore of the SQL data and assumes that you have backed up the SQL data with a SQL backup policy. Note: There are many scenarios, restore options, and considerations for restoring SQL databases. see the LiveVault Management Web Portal help system for additional detailed procedures. To restore a SQL policy 1. In the Web Management Portal, select the SQL server that originally had the data that you are restoring. 2. Select the Restore tab. 3. Click New Restore. The Restore Wizard page opens. 4. Select one of the following options: LiveVault (7.82) Page 34

35 Chapter 4: Create Restore Policies Restore data over the Internet. Have a media restore device shipped to you. 5. After selecting a Restore method, click Next. The Selection page opens. 6. Select SQL Server and click Next. The Restore Request page opens. 7. In the Name to use for this restore request box, type a name for the restore job. 8. From the Policy filter list, select SQL Server. 9. From the Version list, select the backup version from which you want to restore the databases. The most recent version is selected by default. 10. Browse and select the SQL objects from the object view of your SQL Server's backed up file structure. 11. Select the Options tab. 12. Select SQL restore and any other restore options. a. Restore database files to their original location. Select this option to restore the databases to their original location. If the databases no longer exist, this restores them. If they do exist, this will overwrite them. b. Restore a database copy with a new name.to use this option, you only can select one database per policy. If you select multiple databases, you cannot use this option. If you select this option, type a directory path to the new location where you want to restore the database. LiveVault (7.82) Page 35

36 Chapter 4: Create Restore Policies Type a new name for the database. c. File Restore. Select this option to restore the SQL database as files. Select any file handling and restore redirection options. 13. Click Next. The Restore Confirmation page opens. 14. Select Disable SQL Backup Policies to disable backup. 15. Click Done. The restore request is submitted and begins at the scheduled time. Chapter 4: Create Restore Policies 9. Click Next. 10. Type a name for the request. 11. Select a policy from the Policy Filter list. 12. Select a policy version from the Version list. 13. In the selection pane on the right, select and clear the checkboxes preceding data sources to specify what to restore. 14. Select the Options tab. 15. Select the Protected Server from the Protected Server list. 16. Type a path to the location on the Protected Server in the Protected Server Location box. 17. Type a path to the staging area on the DPM server where you want to restore the data, in the DPM Staging Location box. 18. Select duplicate filename options and any other restore options. LiveVault (7.82) Page 36

37 19. Click Next. The Restore Confirmation page opens. 20. Click Done. The restore request is submitted and begins at the scheduled time. Chapter 5: Best Practices for Agents Follow the best practices below to ensure the best LiveVault behavior. Overview of Best Practices HP recommends some basic best practices for using and managing LiveVault agents. Plan for Disaster Recovery Monitor the Server Status Reports Install LiveVault Software Updates Configure Volume Shadow Copy Service (VSS) Network Bandwidth Considerations Antivirus Configuration Considerations Backup Policy Setup Guidelines Plan for Disaster Recovery In preparing and planning for a disaster recovery, you need to gather and record the following information for each original computer into an as-built profile. It is good practice to keep complete as-built information for your computers as possible. Chapter 5: Best Practices for Agents LiveVault (7.82) Page 37

38 Gather As-Built Configuration Information In preparing and planning for a disaster, you must gather and record the following information for each original computer into an as-built profile. It is good practice to keep complete as-built information for your computers as possible. Keep the as-built profiles in a separate location for easy retrieval in the event of a disaster or failure. For more detailed information on preparing for and performing a disaster recovery, see the LiveVault Disaster Recovery Guide. Operating system version. For example, Windows Server Operating system edition. For example Windows Server 2012 Enterprise Edition. Windows installation directory. For example, C:\Windows. Windows Service Pack version. For example Windows 2008 Enterprise Server with SP 1. Hardware configuration Whether dual NICs are configured Computer Name and domain membership. Video Card and Video Bus Note: You cannot recover a computer with an AGP card to a computer with a PCI-based card, and vice-versa. Disk subsystem. Gather disk and volume information. LiveVault (7.82) Page 38

39 Chapter 5: Best Practices for Agents Volumes and drive letters, for example, C:, D: and E:. Size of each volume. Volume File System Information. For example, NTFS or Resilient File System (ReFS) on Windows Server 2012 and later. Volume Data Deduplication information. For Windows Server 2012 and later computers, gather the following information: Determine whether the Data Deduplication Role exists. Determine which volume(s) are optimized for data deduplication. Record the drive letters of volumes optimized for data deduplication for future reference during the rebuild of the deduplicated volumes. Primary or Backup Domain Controller. Determine whether the computer is a Primary or Backup Domain Controller. Determine whether Active Directory is installed Record the Active Directory structure, including portion/subtree names. Applications. Gather information about the applications on the computer. All installed applications. Verification that all database and application functions work. Internet Information Services (IIS) components. LiveVault (7.82) Page 39

40 Chapter 5: Best Practices for Agents Chapter 5: Best Practices for Agents n For Windows 2003 computers, determine whether IIS components are installed. n For Windows 2008 and later computers, determine whether the Web Server Role is added. l Roles and Features. For Windows 2008 and later computers, determine which Roles and Features are installed. l Local Administrator s password l Domain Administrator s password l Original Installation media information. n For example, if a computer was installed with HP disks, a disaster recovery to a Dell computer can fail. l Location of systemroot when the system state backup was taken. By default this is C:\Windows. See your Microsoft documentation for more information on recovering a computer with a nonstandard location for systemroot. l Location of the LiveVault agent software installation. Record the installation location of the LiveVault agent software. l LiveVault encryption key password. You must record the LiveVault encryption key password from the original computer in order to plan for a disaster recovery. If you do not remember the encryption key password, you will not be able to provision the recovery computer while performing the disaster recovery. l Determine if virtual machine still exists in vcenter. For virtual machines protected by virtual machine backup policies, determine if the original virtual machine you wish to recover still exists in the vcenter. If the virtual machine still exists in thevcenter, the recovery will fail unless you select specific options to overwrite the LiveVault (7.82) Page 40

41 Chapter 5: Best Practices for Agents virtual machine. Monitor the Server Status Reports You can monitor the current status of your servers and backup policies by viewing a server status report. The server status report provides a summary of the backup and error status of all servers, as well as LiveVault agent software versions and upgrade availability. Monitoring the server status report on a regular basis is the most important best practice as it shows the most recent backups to your TurboRestore appliance and to the offsite data storage vaults. You generate server status reports by one of three methods: l Generate a server status report for all servers. l Generate a server status report for a single server l Configure ed server status reports to be sent to you Generate a Server Status Report for All Servers Monitor the current status of your servers and backup policies by generating a server status report. LiveVault (7.82) Page 41

42 Chapter 5: Best Practices for Agents Chapter 5: Best Practices for Agents To monitor server status of your servers with a server status report 1. Log in to the Web Management Portal. 2. Select Account from the top menu. The Customer Summary page opens. 3. Select the Reports tab. The Customer Account Reports page opens. 4. Select Server from the Choose Report list. 5. Select the options you want to include on the report: Backup Failures: Select to include computers that are experiencing backup failures. Disconnect Errors: Select to include computers that are experiencing disconnect errors. Updateable Servers: Select to include computers that are eligible for a software upgrade. No Errors: Select this option to include the status of all computers that are not experiencing errors. Use this option in conjunction with the other options to get a complete report for all computers. 6. Select the format to view or save the report in from Generate the Report in the Following Format list. 7. Click Generate Report. LiveVault (7.82) Page 42

43 Chapter 5: Best Practices for Agents The system generates the server status report. Depending on the options you selected, the report includes: Server Name: The name of the computer. Server Version: The version of software currently running on the computer. Disconnected: Indicates whether the computer was disconnected when the report was generated. Upgrade Available: Indicates whether a newer version of software is available for this computer. Policy Name: The backup policies on this computer, with the following additional information: Backup Failures: The number of backup failures since the last successful backup. If there have been no failures since the last successful backup, this column is blank. Last Backup to Appliance: The date and time of the last backup to an onsite appliance. If no backups have been made to an appliance, this column is blank. Last Backup to Vault: The date and time of the last backup to an offsite vault. If no backups have been made to an offsite vault, this column is blank. Policy Files: The number of files in the backup policy. If the policy has no files, this column is blank. LiveVault (7.82) Page 43

44 Chapter 5: Best Practices for Agents Chapter 5: Best Practices for Agents Policy Size: The size of the backup data, in GB, MB or KB. If the policy is empty, this column is blank. Generate an Advanced Server Status Report Generate an advanced server status report for all servers in your account. The advanced server status report includes more detailed information regarding backup policies, rule sets, appliance and offsite vault status. To generate an Advanced Server Status report 1. Log in to the Web Management Portal. 2. Select Account from the top menu. The Customer Summary page opens. 3. Select the Reports tab. 4. Select the Advanced Server Report type. 5. Select the options you want to include on the report: Backup Failures: Select to include computers that are experiencing backup failures. Disconnect Errors: Select to include computers that are experiencing disconnect errors. Updateable Servers: Select to include computers that are eligible for a software upgrade. No Errors: Select this option to include the status of all computers that are not LiveVault (7.82) Page 44

45 Chapter 5: Best Practices for Agents experiencing errors. Use this option in conjunction with the other options to get a complete report for all computers. 6. Select the format to view or save the report in from Generate the Report in the Following Format list. 7. Click Generate Report. 8. The system displays the report. Depending on the options you selected, the report includes: Customer Name. The name of the customer Customer ID. The ID of the customer. Group. The name of the group to which the computer belongs. Server Name: The name of the computer. Server ID. The ID of the computer. Agent Version. The version of software currently running on the computer. Upgrade Available. Indicates if a newer version of software is available for this computer. Scheduled Upgrade. Indicates that a software upgrade is scheduler for a specific day and time. Server Status. Indicates status of the computer. Possible statuses include: Restore Only server and computer scheduled for deletion. Disconnected for: The length of time that the computer has been disconnected from the service. LiveVault (7.82) Page 45

46 Chapter 5: Best Practices for Agents n Server Suspended. Indicates that backup has been suspended for the computer. n Policy. The backup policies on this computer, with the following additional information. n Policy ID. The ID of the selected backup policy. n Policy Category. Indicates the backup policy category of the selected backup policy. Possible backup policy categories include: Standard, Exchange, SQL, DPM, CIFS, and VMware. n Retention. The retention policy associated with the selected backup policy. n Directory. Indicates the volume or directory selected on the backup policy. n Selection. Indicates whether the selection is included or excluded from backup. n Rule Type. Indicates how the rule treats the expression in the File Pattern field. n File Pattern. The expression which the rule type acts upon. o Begins with. Include or exclude files whose name begins with the expression. o Ends with. Include or exclude files whose name ends with the expression. o Contains. Include or exclude files whose name starts with, ends with, or contains the expression. o Matches wildcards. Include or exclude files whose name includes the expression. o Exact match. Include or exclude files whose name matches the expression o All. Include or exclude all the files in the directory path. LiveVault (7.82) Page 46

47 Chapter 5: Best Practices for Agents n Subdirectories. Indicates whether subdirectories are included or excluded from backup. n Sequence Number. Indicates the order of the selected rule type within the backup policy's rule set. n Last Backup to Appliance.The date and time of the last backup to an onsite appliance. If no backups have been made to an appliance, it will be blank. n Last Backup to Vault. The date and time of the last backup to an off-site vault. n Source Vault. The name of the source offsite vault containing the computer's data. n Latest Source. The date and time of the latest backup on the source offsite vault. n Target Vault. The name of the target off-site vault containing the computer's data. n Latest Target. The date and time of the latest backup on the target offsite vault. n Days Behind. The number of days difference between Latest Source date and Latest Target date. n Schedule Name. The name of the backup schedule associated with the selected backup policy. n Policy Size (bytes). The size of the backup data in bytes. If the policy is empty, this will be blank. n Policy Size (GB). The size of the backup data in GB. If the policy is empty, this will be blank. n Policy Size on Vault (bytes). The compressed size of the backup data on the LiveVault (7.82) Page 47

48 Chapter 5: Best Practices for Agents offsite vault, in bytes. If the policy is empty, this will be blank. Policy Size on Vault (GB).The compressed size of the backup data on the offsite vault, in GB. If the policy is empty, this will be blank. Policy Files. The number of files in the backup policy. If the policy has no files, it will be blank. Files Added in last 24 hrs. The number of files added to the backup policy within the last 24 hours. Files Changed in last 24 hours. The number of files changed in the backup policy within the last 24 hours. Files Deleted in last 24 hours. The number of files deleted from the backup policy within the last 24 hours. Current Backup Failures:.The number of backup failures since the last successful backup. This area is blank if there have been no failures since the last successful backup. Has Policy Info. Indicates that the agent has communicated with the service for its policies. Policy Disabled. Indicates whether the backup policy is enabled or disabled. Policy Deleted. Indicates whether the backup policy is active, or has been scheduled for deletion. Route Disabled. Indicates whether the route implementation for the selected backup policy is enabled or disabled. Has Route Info. Indicates that the agent has communicated with the service for its route implementation information. LiveVault (7.82) Page 48 1

49 Chapter 5: Best Practices for Agents Policy Data Deletion. For a backup policy scheduled for deletion, indicates the date on which the backup policy's data will be deleted. Generate a Server Status Report for a Single Computer Monitor the current status of a single server and its backup policies by generating a server status report. To monitor the status of a single computer 1. Login to the Web Management Portal. 2. Select the computer for which you want to generate a server status report. 3. Select the Reports tab. The Reports page opens. 4. Select Server from the Choose Report list. 5. Select the format to view or save the report in from Generate the Report in the Following Format list. 6. Click Generate Report. The system generates the server status report. Configure ed Server Status Reports Monitor the current status of your servers and backup policies by configuring e- mailed server status reports. LiveVault (7.82) Page 49

50 Chapter 5: Best Practices for Agents To configure ed server status reports 1. Log in to the Web Management Portal. 2. Select Account from the top menu. 3. The Customer Summary page opens. 4. Verify the settings for Server Status s. If the setting is set to Send weekly or Send daily, the technical contacts for computers are already receiving ed server status reports. o Select Standard or Advanced from the Select type of status s list box. Standard status reports include a summary status report. Advanced status reports include a more detailed status report. If the setting is set to Do not send server s, complete the following steps: a. Click Edit Properties. The Customer Properties page opens. b. Select the Setting tab. The Customer Settings page opens. c. Select Weekly or Daily to send periodic server status report s to the technical contacts for computers. If you select the Daily option, select a time and time zone from the lists. d. Select Standard or Advanced from the Select type of status s list box to send either a standard summary or advanced, detailed status report. e. Click Save. LiveVault (7.82) Page 50

51 Chapter 5: Best Practices for Agents Periodic server status s are configured and will be sent from the LiveVault service. V e r i f y t h e S e r v e r S t a t u s R e p o r t E - m a i l S e t t i n g s Verify the settings for server status report s on individual technical contacts. To verify the technical contact settings 1. Log in to the Web Management Portal. 2. Select a user for which to confirm server status report settings. The User Summary page opens. 3. Verify the Status setting. This setting indicates whether the user will receive a weekly status for each computer separately or a combined weekly status report for all computers. Install LiveVault Software Updates Install new LiveVault agent software updates as soon as they become available. The server status report indicates when a newer version of software is available for this computer. LiveVault (7.82) Page 51

Release Notes. LiveVault. Contents. Version Revision 0

Release Notes. LiveVault. Contents. Version Revision 0 Version 7.60 Release Notes Revision 0 This document describes new features for LiveVault 7.60. You can retrieve the latest available product documentation from Autonomy s Knowledge Base on the Customer

More information

Cloud Compute. Backup Portal User Guide

Cloud Compute. Backup Portal User Guide Cloud Compute Backup Portal User Guide Contents Service Overview... 4 Gaining Access... 5 Operational Guide... 6 Landing Page... 6 Profile View... 6 Detailed View... 8 Overview... 8 Cloud Backup... 8

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 36 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW NEW FEATURES SYSTEM REQUIREMENTS SUPPORTED FEATURES GETTING STARTED - DATA PROTECTION MANAGER DEPLOYMENT GETTING STARTED

More information

Client Installation and User's Guide

Client Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation

More information

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015

VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015 VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014

VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 VMware vsphere Data Protection 5.8 TECHNICAL OVERVIEW REVISED AUGUST 2014 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Additional Features and Benefits of

More information

Administration GUIDE. IntelliSnap Virtual Server idataagent for VMware. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277

Administration GUIDE. IntelliSnap Virtual Server idataagent for VMware. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277 Administration GUIDE IntelliSnap Virtual Server idataagent for VMware Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 277 IntelliSnap User Guide - Virtual Server idataagent for VMware Table of Contents

More information

TECHNICAL NOTE. Technical Note P/N REV A01

TECHNICAL NOTE. Technical Note P/N REV A01 TECHNICAL NOTE Performing SharePoint Granular Recovery with EMC Avamar for SharePoint VSS and Ontrack PowerControls Technical Notes EMC Avamar v6.0 Technical Note P/N 300-013-036 REV A01 December 7, 2011

More information

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225

Administration GUIDE. Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 Administration GUIDE Virtual Server idataagent (VMware) Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 225 User Guide - Virtual Server idataagent (VMware) Table of Contents System Requirements

More information

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault

Introduction. How Does it Work with Autodesk Vault? What is Microsoft Data Protection Manager (DPM)? autodesk vault Introduction What is Microsoft Data Protection Manager (DPM)? The Microsoft Data Protection Manager is a member of the Microsoft System Center family of management products. DPM provides continuous data

More information

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Version 11. NOVASTOR CORPORATION NovaBACKUP

Version 11. NOVASTOR CORPORATION NovaBACKUP NOVASTOR CORPORATION NovaBACKUP Version 11 2009 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

BrightStor ARCserve Backup for Windows

BrightStor ARCserve Backup for Windows BrightStor ARCserve Backup for Windows Volume Shadow Copy Service Guide r11.5 D01191-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

File Protection Whitepaper

File Protection Whitepaper File Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of File Protection over traditional file copy methods... 3

More information

File Protection. Whitepaper

File Protection. Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of... 3 2. Backup considerations... 4 Exchange VM support... 4 Restore

More information

CityVault Client Manual

CityVault Client Manual CityVault Client Manual Contents Preface: Preface...4 Chapter 1: Overview...5 Chapter 2: Installing CityVault...6 Downloading the CityVault Client...6 Installing the CityVault Client...6 Configuring CityVault...8

More information

Restoring data from a backup

Restoring data from a backup Restoring data from a backup The following topics explain how to find a backup to restore and then perform a restore: Finding a backup to restore on page 98 Restoring to the original location on page 101

More information

Administration Guide - NetApp File Archiver

Administration Guide - NetApp File Archiver Page 1 of 100 Administration Guide - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method

More information

File Protection Whitepaper

File Protection Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Modes of operation... 2 Single-instance store... 3 Advantages of over traditional file copy methods... 3 2. Backup considerations...

More information

Chapter 11. SnapProtect Technology

Chapter 11. SnapProtect Technology Chapter 11 SnapProtect Technology Hardware based snapshot technology provides the ability to use optimized hardware and disk appliances to snap data on disk arrays providing quick recovery by reverting

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Update 2 Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation

More information

K2 ServerSave Installation and User Guide

K2 ServerSave Installation and User Guide K2 ServerSave Installation and User Guide Chapter 1: Introduction 1.1 What is K2 ServerSave? Welcome to the K2 ServerSave Server Edition User Guide. This guide briefly describes the K2 ServerSave Application

More information

File Protection using rsync. User guide

File Protection using rsync. User guide File Protection using rsync User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Rsync considerations... 3 3. Creating a File Protection backup using rsync... 4 4.

More information

Arcserve Backup for Windows. Release Summary r16

Arcserve Backup for Windows. Release Summary r16 Arcserve Backup for Windows Release Summary r16 Legal Notice This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

IBM Security SiteProtector System SecureSync Guide

IBM Security SiteProtector System SecureSync Guide IBM Security IBM Security SiteProtector System SecureSync Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 45. This edition applies

More information

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2

1. Overview... 2 Documentation... 2 Licensing... 2 File Archiving requirements... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager

Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager White Paper Using Computer Associates BrightStor ARCserve Backup with Microsoft Data Protection Manager Author(s): Computer Associates International and Microsoft Corporation Published September 2005 Abstract

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

Installation Manual RG-SAM+ENTERPRISE_4.00_Build

Installation Manual RG-SAM+ENTERPRISE_4.00_Build Installation Manual RG-SAM+ENTERPRISE_4.00_Build20150829 Copyright Statement Ruijie Networks 2016 Ruijie Networks reserves all copyrights of this document. Any reproduction, excerption, backup, modification,

More information

Enterprise Server Edition

Enterprise Server Edition Enterprise Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows,

More information

Online Backup Client User Manual

Online Backup Client User Manual Software version 3.21 For Mac OS X September 2010 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved.

Lasso Continuous Data Protection Lasso CDP Client Guide August 2005, Version Lasso CDP Client Guide Page 1 of All Rights Reserved. Lasso CDP Client Guide August 2005, Version 1.6.8 Lasso CDP Client Guide Page 1 of 32 Copyright Copyright 2005 Lasso Logic, LLC. All Rights Reserved. No part of this publication may be reproduced, stored

More information

TABLE OF CONTENTS. Page 1 of 59

TABLE OF CONTENTS. Page 1 of 59 Page 1 of 59 TABLE OF CONTENTS Introduction... 3 Features... 4 General Features... 4 IBackup Professional lets you view the log files of backup, restore, scheduled backup and the details of files and folders

More information

CA ARCserve Replication and High Availability for Windows

CA ARCserve Replication and High Availability for Windows CA ARCserve Replication and High Availability for Windows Virtualized Server Environments Operation Guide r15 This documentation and any related computer software help programs (hereinafter referred to

More information

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9.

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9. 7 Configuration Note AudioCodes One Voice for Microsoft Skype for Business CloudBond 365 Backup and Restore Functionality Version 9.5 Update 4 Configuration Note Contents Table of Contents 1 Introduction...

More information

ZettaMirror Install Guide

ZettaMirror Install Guide ZettaMirror Install Guide March 2014 Table of Contents Planning Your ZettaMirror Deployment...3 Where to install ZettaMirror?...3 Do I need extra retention policies?...3 How to Download & Install ZettaMirror...4

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Backup App V7. Quick Start Guide for Windows

Backup App V7. Quick Start Guide for Windows Backup App V7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restoring Data; Combined Technical

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

BounceBack 18. User Manual

BounceBack 18. User Manual BounceBack 18 User Manual 2016 CMS Products, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice. The information

More information

Symantec Backup Exec Quick Installation Guide

Symantec Backup Exec Quick Installation Guide Symantec Backup Exec 2010 Quick Installation Guide 20047221 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup Exec service account

More information

Vendor: Symantec. Exam Code: Exam Name: Administration of Symantec Backup Exec Version: Demo

Vendor: Symantec. Exam Code: Exam Name: Administration of Symantec Backup Exec Version: Demo Vendor: Symantec Exam Code: 250-316 Exam Name: Administration of Symantec Backup Exec 2012 Version: Demo QUESTION 1 Which Symantec Backup Exec 2012 troubleshooting tool should an end user use before contacting

More information

Reconfiguring VMware vsphere Update Manager. Update 1 VMware vsphere 6.5 vsphere Update Manager 6.5

Reconfiguring VMware vsphere Update Manager. Update 1 VMware vsphere 6.5 vsphere Update Manager 6.5 Reconfiguring VMware vsphere Update Manager Update 1 VMware vsphere 6.5 vsphere Update Manager 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

8 MANAGING SHARED FOLDERS & DATA

8 MANAGING SHARED FOLDERS & DATA MANAGING SHARED FOLDERS & DATA STORAGE.1 Introduction to Windows XP File Structure.1.1 File.1.2 Folder.1.3 Drives.2 Windows XP files and folders Sharing.2.1 Simple File Sharing.2.2 Levels of access to

More information

Administrator s Guide

Administrator s Guide Administrator s Guide 1995 2011 Open Systems Holdings Corp. All rights reserved. No part of this manual may be reproduced by any means without the written permission of Open Systems, Inc. OPEN SYSTEMS

More information

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems

Server Edition. V8 Peregrine User Manual. for Linux and Unix operating systems Server Edition V8 Peregrine User Manual for Linux and Unix operating systems Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Red Hat is a registered trademark

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 SP1 User Guide P/N 302-000-098 REV 02 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the

More information

Veeam Backup & Replication for VMware vsphere

Veeam Backup & Replication for VMware vsphere Veeam Backup & Replication for VMware vsphere Version 9.5 Evaluator's Guide December, 2017 2017 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part

More information

F-Secure Client Security. Quick Installation Guide

F-Secure Client Security. Quick Installation Guide F-Secure Client Security Quick Installation Guide F-Secure Client Security TOC 3 Contents Chapter 1: Introduction...5 Chapter 2: Installing Client Security...7 System requirements...8 Stand-alone installation...9

More information

User Guide. Version 2.1

User Guide. Version 2.1 Kaseya Backup and Disaster Recovery User Guide Version 2.1 August 11, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT

More information

Desktop & Laptop Edition

Desktop & Laptop Edition Desktop & Laptop Edition USER MANUAL For Mac OS X Copyright Notice & Proprietary Information Redstor Limited, 2016. All rights reserved. Trademarks - Mac, Leopard, Snow Leopard, Lion and Mountain Lion

More information

Quick Start Guide. Version R94. English

Quick Start Guide. Version R94. English Backup Quick Start Guide Version R94 English December 12, 2016 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Chapter 2 CommVault Data Management Concepts

Chapter 2 CommVault Data Management Concepts Chapter 2 CommVault Data Management Concepts 10 - CommVault Data Management Concepts The Simpana product suite offers a wide range of features and options to provide great flexibility in configuring and

More information

Cisco Unified CM Disaster Recovery System

Cisco Unified CM Disaster Recovery System Cisco Unified CM Disaster Recovery System Disaster Recovery System, page 1 Quick-reference tables for backup and restore procedures, page 3 Supported features and components, page 5 System requirements,

More information

Backup App v7. Quick Start Guide for Windows

Backup App v7. Quick Start Guide for Windows Backup App v7 Quick Start Guide for Windows Revision History Date Descriptions Type of modification 30 Jun 2016 First Draft New 25 Nov 2016 Added Restore Options to Ch 8 Restore Data; Combined Technical

More information

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue:

Zen Internet. Online Data Backup. Zen Vault Express for Mac. Issue: Zen Internet Online Data Backup Zen Vault Express for Mac Issue: 2.0.08 Tel: 01706 90200 Fax: 01706 902005 E-mail: info@zen.co.uk Web: www.zen.co.uk Zen Internet 2015 Contents 1 Introduction... 3 1.1 System

More information

Veritas System Recovery 16 Management Solution Readme

Veritas System Recovery 16 Management Solution Readme Veritas System Recovery 16 Management Solution Readme About this readme System requirements for software delivery policies of Veritas System Recovery 16 System requirements for Veritas System Recovery

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

File Archiving Whitepaper

File Archiving Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 requirements... 2 2. product overview... 3 features... 3 Advantages of BackupAssist... 4 limitations... 4 3. Backup considerations...

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

Pension System/Windows. Installation Guide

Pension System/Windows. Installation Guide Pension System/Windows Installation Guide Updated for Microsoft SQL Server 2008 R2 & MS SQL Express DATAIR Employee Benefit Systems, Inc. 735 N. Cass Ave. Westmont, IL 60559-1100 V: (630) 325-2600 F: (630)

More information

Virtual Recovery Assistant user s guide

Virtual Recovery Assistant user s guide Virtual Recovery Assistant user s guide Part number: T2558-96323 Second edition: March 2009 Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind

More information

VMware View Upgrade Guide

VMware View Upgrade Guide View 4.0 View Manager 4.0 View Composer 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for

More information

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide

Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Veritas NetBackup for Microsoft Exchange Server Administrator s Guide for Windows Release 8.1.1 Veritas NetBackup for Microsoft Exchange Server Administrator s Guide Last updated: 2018-02-16 Document version:netbackup

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Dell Storage Integration Tools for VMware

Dell Storage Integration Tools for VMware Dell Storage Integration Tools for VMware Version 4.1 Administrator s Guide Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION:

More information

Pension System/Windows. Installation Guide

Pension System/Windows. Installation Guide Pension System/Windows Installation Guide Updated for Microsoft SQL Server 2014 & MS SQL Express 2014 DATAIR Employee Benefit Systems, Inc. 735 N. Cass Ave. Westmont, IL 60559-1100 V: (630) 325-2600 F:

More information

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM

IBM Spectrum Protect HSM for Windows Version Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM IBM Spectrum Protect HSM for Windows Version 8.1.0 Administration Guide IBM Note: Before you use this information and the product

More information

Backup and Recovery FAQs

Backup and Recovery FAQs Backup and Recovery FAQs Introduction The Backup and Recovery application is an easy to use, easy to manage data backup and disaster recovery solution for your DeltaV Distributed Control System (DCS),

More information

File Archiving. Whitepaper

File Archiving. Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 requirements... 2 2. product overview... 3 features... 3 Advantages of BackupAssist... 4 limitations... 4 3. Backup considerations...

More information

EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version

EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version EMC NetWorker Module for SnapImage Release 2.0 Microsoft Windows Version Installation and Administration Guide P/N 300-007-130 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000

More information

VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2

VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2 VMware vcenter AppSpeed Installation and Upgrade Guide AppSpeed 1.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Veritas System Recovery 16 Management Solution Administrator's Guide

Veritas System Recovery 16 Management Solution Administrator's Guide Veritas System Recovery 16 Management Solution Administrator's Guide Documentation version: 2017 Legal Notice Copyright 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

Server Edition. V8 Peregrine User Manual. for Microsoft Windows

Server Edition. V8 Peregrine User Manual. for Microsoft Windows Server Edition V8 Peregrine User Manual for Microsoft Windows Copyright Notice and Proprietary Information All rights reserved. Attix5, 2015 Trademarks - Microsoft, Windows, Microsoft Windows, Microsoft

More information

Perceptive TransForm E-Forms Manager

Perceptive TransForm E-Forms Manager Perceptive TransForm E-Forms Manager Installation and Setup Guide Version: 8.x Date: February 2017 2016-2017 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International Inc., registered

More information

Backing Up and Restoring Cisco Unity Connection Components

Backing Up and Restoring Cisco Unity Connection Components Backing Up and Restoring Cisco Unity Connection Components About Cobras You must take the backup of Cisco Unity Connection components to avoid loosing any data or messages. The following are the tools

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.0 Embedded vcenter Server 4.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Exchange Protection Whitepaper

Exchange Protection Whitepaper Whitepaper Contents 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. Introduction... 2 Documentation... 2 Licensing... 2 Exchange Server Protection overview... 3 Supported platforms... 3 Requirements by platform... 3 Remote

More information

Quick Start - NetApp File Archiver

Quick Start - NetApp File Archiver Page 1 of 19 Quick Start - NetApp File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine Supported VMware Versions, page 1 Support for VMware vmotion, page 1 Support for Open Virtualization Format, page 2 Virtual Machine Requirements, page 3 Virtual Machine Resource and Performance Checks,

More information

Arcserve Backup for Windows

Arcserve Backup for Windows Arcserve Backup for Windows Arcserve Replication Integration Guide r16.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

Veritas NetBackup for SQLite Administrator's Guide

Veritas NetBackup for SQLite Administrator's Guide Veritas NetBackup for SQLite Administrator's Guide Windows and Linux Release 8.1.1 Documentation version: 8.1.1 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the

More information

Archiware Pure User Manual

Archiware Pure User Manual Archiware Pure User Manual Content 1 Preface... 3 1.1 About This Manual... 3 1.2 Who Should Read This Document?...3 1.3 Software Description... 3 1.4 Software Licensing... 3 1.5 Registration... 3 1.6 Technical

More information

Veeam Endpoint Backup

Veeam Endpoint Backup Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

EMC RecoverPoint. EMC RecoverPoint Support

EMC RecoverPoint. EMC RecoverPoint Support Support, page 1 Adding an Account, page 2 RecoverPoint Appliance Clusters, page 3 Replication Through Consistency Groups, page 4 Group Sets, page 22 System Tasks, page 24 Support protects storage array

More information

Quick Start - BlueArc File Archiver

Quick Start - BlueArc File Archiver Page 1 of 20 Quick Start - BlueArc File Archiver TABLE OF CONTENTS OVERVIEW Introduction Key Features Terminology SYSTEM REQUIREMENTS DEPLOYMENT Installation Method 1: Interactive Install Method 2: Install

More information

Administration GUIDE. Sybase idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 176

Administration GUIDE. Sybase idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 176 Administration GUIDE Sybase idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 176 User Guide - Sybase idataagent Table of Contents Overview Introduction Key Features Terminology System

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information