Exchange DAG backup and design best practices
|
|
- Hollie Osborne
- 8 years ago
- Views:
Transcription
1 Exchange DAG backup and design best practices Brien M. Posey Modern Data Protection Built for Virtualization
2 Database Availability Groups (DAGs) are the primary fault-tolerant mechanism used for protecting mailbox databases in Exchange Server 2010 and DAGs allow administrators to create up to sixteen separate copies of mailbox databases. DAGs allow for so much redundancy, in fact, that some people (both inside and outside of Microsoft) have expressed the idea that DAGs render Exchange Server backups obsolete. This article examines how backups work in a DAG environment, and whether or not you should be backing up your DAG members. The Exchange Server backup process Before I delve into a discussion of data protection within a DAG, I need to take a moment and discuss the way that backups normally work in an Exchange Server environment independent of DAGs. When a backup application performs a backup of an Exchange Server, the backup application acts as something that Microsoft refers to as a Volume Shadow Copy Service (VSS) requester. The VSS requester s job is to coordinate the backup process with a series of VSS writers. Typically there will be several different VSS writers present on an Exchange Server and each writer is responsible for making sure that a specific type of data is backed up properly. You can see a list of all of the VSS writers that are present on your Exchange Server by entering the VSSAdmin List Writers command. For the purpose of this discussion, I will focus on the Exchange VSS writer. With that said, the backup software initiates a backup job by having the VSS requester contact the Exchange Server and ask for a list of the VSS writers that are present on the server. The Exchange Server returns a list of VSS writers in response. At this point, the VSS requester contacts each VSS writer individually. In the case of the Exchange VSS writer, the requester asks for the writer s status and for information about the Exchange Server resources that are present on the server and where those resources reside. Specifically the Exchange VSS writer reports on the names and locations of databases and their corresponding transaction logs, as well as some other related metadata. The next thing that has to happen is that the Exchange VSS writer freezes the Exchange databases and the corresponding transaction logs. For all practical purposes, this freezing process can be thought of as temporarily flagging the databases and the transaction log folders as read only. 2
3 Even though the Exchange databases and the corresponding transaction logs are frozen the Exchange Server is able to continue to function throughout the backup process. The reason for this is that even though Exchange is not able to write to a frozen database or its transaction logs, it is able to store transactions in memory. Normally the backup process only requires a database to be frozen for about sixty seconds (or less). During this time the VSS writer creates a VSS snapshot. The snapshot operation s anatomy can vary depending on how the server is set up. In most cases the server creates a copy-on-write snapshot, although in some special circumstances a clone snapshot may be created instead. Windows designates a portion of each disk as shadow storage. The VSS writer stores the snapshot in the shadow storage area. Generally speaking, each disk contains its own shadow storage, so the database volume will contain the database and the database snapshot. It is extremely important to understand that the VSS snapshot is not the same thing as a backup. For one thing, the snapshot exists on the same volume as the resource that it is protecting, so if you lose the volume, you lose the protected resource (such as an Exchange mailbox database) and the corresponding snapshot. The other reason why a snapshot is not the same thing as a backup is that a copy-on-write snapshot is not a full copy of your Exchange database. Mailbox database snapshots are designed to be created in one minute or less. In many cases, making a second copy of a multi-terabyte database on the same volume where it resides now would take much longer (especially on lower-end hardware). Never mind the impact that storing multiple database copies would have on your storage consumption. The point is that a snapshot is not a full database copy. Instead, a snapshot is designed to store copies of individual blocks of data. After the snapshot is created, the database is thawed, which means that it (and its transaction logs) once again become read/write. The problem is that at this point the database has not been backed up yet. If the backup software were to simply make a copy of the database in its current state, the database would most likely be modified before the backup could be completed, thereby resulting in a corrupt database copy. This is where the snapshot comes into play. Any time that a write operation needs to be performed against the database, Windows makes a copy of the block before it is modified. This copy resides in shadow storage. That way, the database can be modified, but there is still a copy of any modified blocks as they existed prior to the modification. 3
4 Transaction log processing It s impossible to talk about Exchange Server backups without discussing transaction logs. The transaction log discussion will become even more important later on when I begin discussing DAGs. Exchange does not write transactions directly to a mailbox database. Instead, the data is written to a transaction log. As such, the mailbox database almost never contains data that is completely up-to-date. The reason why Exchange Server writes data to log files instead of writing the data directly to a mailbox database has to do with recoverability. To show you why this is the case, imagine for a moment that transaction logs do not exist and that all mailbox transactions are written directly to a mailbox database. Now suppose that you back up the mailbox database and your Exchange Server crashes two hours later. If you had to restore your most recent backup, you would lose all of the data that had accumulated since the time that the backup was created. Losing two hours worth of data might not initially seem like a major problem, but in most organizations is one of the most mission critical applications, and data loss of any kind is problematic. Simply put, transaction logs are designed to protect the data that has accumulated since your last backup. However, they can only protect you if they are stored on a separate disk (not just a separate volume) from the mailbox database. If the volume containing the database were to fail, you could restore your backup which would bring the database back to the state at which it existed at the time that the backup was created. The transaction logs are then used to retrieve any data that has accumulated between the time of the backup and the time of the crash. Obviously, the transactional data does not reside in the transaction logs forever. It has to be written to the mailbox database at some point. This is actually done as a part of the backup process. The log file contents are committed to thedatabase. There is also a checkpoint file that keeps track of which log files have and have not been committed. When the backup process completes, there is some cleanup work that occurs, which takes the database out of a backup state. This means purging any snapshot data that is no longer needed and truncating transaction logs that have been committed to the database. 4
5 What about Database Availability Groups? The backup process that has been described so far is used both in standalone Exchange deployments and in DAGs. However, DAGs complicate things a little bit because multiple mailbox servers and multiple database copies are involved in the process. A DAG is a special type of failover cluster that provides fault tolerance for Exchange mailbox databases. DAGs are able to make mailbox databases fault tolerant by creating and maintaining multiple mailbox database copies. In a DAG environment, the primary copy of a mailbox database is said to be theactive copy, while any secondary copies are considered to be passive copies. When it comes to DAG architecture, it is important to remember that there is not necessarily a one-to-one ratio of DAG members to mailbox database copies. For example, if you have a DAG that is made up of five mailbox servers (a five-member DAG), it does not mean that you must have five copies of each mailbox database. Most organizations that use DAGs try to strike a balance between redundancy and storage and other hardware costs. Hence, an organization with five DAG members might create three copies of one database, two copies of a second database, and five copies of a third database. You are free to mix and match levels of database redundancy within your DAG. Do you need backups for Database Availability Groups? There is a notion within some segments of the IT community that if you can create a DAG that provides a sufficient number of database copies, there is no need to back up Exchange Server. After all, a backup is really nothing more than a copy of your data. As such, some believe that an online database copy within your DAG will work just as well as a backup. While there is no denying the fact that there are enterprise-class organizations that choose not to perform traditional backups of DAG members, I personally believe that this approach (which is known as zero backups) is shortsighted. One of the reasons for this is that restoring a backup allows you to revert an Exchange database to an earlier point in time, while DAGs are primarily oriented toward providing redundancy for databases in their current state. 5
6 At first, the idea of providing redundancy rather than having the ability to revert a database to an earlier point in time seems completely logical. If Exchange Server truly is a mission-critical application and data loss is unacceptable, rolling back a database to an earlier state would not fit into the organization s goals because it would result in data loss. The problem with this philosophy is that redundancy alone only protects against some types of problems, but not others. For instance, having redundant database copies would protect you against a node failure or against a server volume failure. However, this approach does not offer protection against malware. Suppose that a primary database copy became infested with a virus. The malware infestation would be replicated to the other database copies, thereby infecting all of your database copies. In all fairness, Microsoft does give you a way to protect yourself against the replication of unwanted data. The mechanism that allows a DAG to be rolled back to an earlier point in time is called a lagged database copy. In order to understand how a lagged database copy works, you have to understand how normal DAG replication works. Rather than trying to keep mailbox databases in perfect synchronization, DAG replication works by using log shipping. When a transaction log file is closed out, the log is immediately replicated to the other database copies. Normally the passive database copies play back the log files and commit their contents to the passive database copies. A lagged copy does not immediately replay transaction logs as they are received. Instead, Exchange waits for a predetermined period of time to play back the transaction logs for lagged copies. This means that a lagged database copy is essentially a copy of a database as it existed at an earlier point in time. As you can see, lagged database copies can provide your DAG with rollback capabilities. However, activating a lagged database copy is not a process to be taken lightly. It can be extremely difficult to determine which transaction logs should and should not be preserved. Furthermore, the technique used to activate a lagged database copy is very tedious. 6
7 With proper planning it is theoretically possible to provide real-time and lagged protection to mailbox database copies using only native tools. However, there are a number of things that must be considered prior to using this approach. Some of the more important considerations are: If a database rollback is required then you must discover the problem, make the decision to roll back the database, and complete the rollback process within the time allowed by your lagged database copy. Unless you have multiple lagged copies of a single mailbox database, you usually only have one chance to get the rollback right. Going without a traditional backup greatly reduces the number of recovery options that are available to you. Do you really want to have to explain to your boss that you can t return Exchange to the desired state because you have abandoned the process of backing up your Exchange Server? Traditional backups give you the option of storing offline copies of your data in a secure location. Conversely, DAG replication stores passive database copies on spinning disks. Best practices for Database Availability Group backups As mentioned at the beginning of this whitepaper, DAGs are the primary mechanism for protecting Exchange 2010 and Exchange 2013 mailbox databases. As such, I highly recommend using DAGs to protect your data, but do not recommend using DAGs as a substitute for regular Exchange Server backups. With that in mind, there are several recommended best practices for DAGs that you should adhere to. Windows Server Backup First, don t use Windows Server Backup to back up DAG members. Windows Server Backup is perfectly capable of backing up DAG environments, but has some major limitations. The most significant of these limitations is the fact that Windows Server Backup can only back up active database copies. Most of the third-party backup solutions can back up passive database copies. The reason it is better to back up passive database copies is because the backup process creates disk I/O. You really don t want to generate additional disk I/O on a volume containing an active database copy if you can avoid doing so. 7
8 DAG architecture Another recommendation is to be careful about creating a spanned DAG. It is possible to build a DAG that spans multiple datacenters so that there is always a database copy kept safely off site. However, if you are going to create a spanned DAG then you must also span the Active Directory domain across datacenters, because Microsoft requires all DAG members to exist within a common domain. While I am on the subject of spanned DAGs, I also want to mention that spanned DAGs are very sensitive to latency. The WAN connection must support a round-trip latency of 500 milliseconds or less. You must also construct a spanned DAG in a way that will prevent a WAN link failure from losing quorum, which would cause the DAG to fail. Doing so means constructing the DAG in a way that guarantees that the majority of the nodes (at least half + 1) are accessible at any given time. The most reliable way of doing this is to place half of the DAG members at each of two datacenters and then place a tie breaker DAG member of witness server at an independent third location. Database types As a best practice, I recommend that any organization that has public folder data upgrade to Exchange Server DAGs only support mailbox databases, not public folder databases. Exchange Server 2013 allows public folder data to be moved into a mailbox database, thereby giving administrators the ability to offer DAG level protection for public folder data. This is simply not possible in Exchange Server
9 Log truncation One last best practice is to base your log truncation method on your mailbox server deployment type. As previously explained, under normal circumstances log files are committed to the database as a part of the backup process. Once everything has been backed up, Exchange truncates (purges) the log files that are no longer needed. One of the big questions that often comes up during the DAG creation process is how log truncation should be handled since the log files must be replicated to other DAG members. Microsoft recommends that if you have non-replicated mailbox databases use the log file truncation method that was previously discussed ( microsoft.com/en-us/library/ee aspx). Microsoft also recommends that these servers be provisioned for three days of log generation capacity. In the case of replicated databases, however, Microsoft recommends using a log truncation method called circular logging. Circular logging uses and reuses a finite number of log files as opposed to creating (and later truncating) a continuous stream of log files. Lagged copies should be provisioned to accommodate log files extending for three days beyond the lag period. Conclusion Although there is a notion among some IT professionals that DAGs make traditional backups obsolete, backups generally provide a greater degree of flexibility than DAGs can provide on their own. Even so, the only way to truly protect your data is to make sure to adhere to the various recommended best practices for DAGs when designing the DAG architecture and when planning your backup solution. 9
10 About the Author Brien Posey is a freelance technical writer who has received Microsoft's MVP award nine times for his work with Exchange Server, Windows Server, IIS, and File Systems Storage. Brien has written or contributed to about three dozen books, and has written well over 4,000 technical articles and white papers for a variety of printed publications and Web sites. In addition to his writing, Brien routinely speaks at IT conferences and is involved in a wide variety of other technology related projects. About Veeam Software Veeam is Modern Data Protection. We believe today s IT requirements have changed and that 3C legacy backup problems high costs, increased complexity and missing capabilities are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable solutions that are Built for Virtualization and the cloud a perfect fit for the modern datacenter. Veeam Backup & Replication is VMware backup, Hyper-V backup, recovery and replication. This #1 VM Backup solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Veeam Backup Management Suite combines Veeam Backup & Replication and Veeam ONE in a single integrated solution to protect virtualization investments, increase administrator productivity and help mitigate daily management risks. Veeam Management Pack (MP) extends enterprise monitoring to VMware through Microsoft System Center. Veeam also provides free tools for the virtualization community. Learn more by visiting 10
11 Modern Data Protection Built for Virtualization Powerful Easy-to-Use Veeam Backup & Replication #1 VM Backup for VMware and Hyper-V Virtualization changes everything especially backup. If you ve virtualized on VMware or Hyper-V, now is the time to move up to the data protection solution Built for Virtualization: Veeam Backup & Replication. Unlike traditional backup that suffers from the 3C problem (missing capabilities, complexity and cost), Veeam is: Powerful: Dramatically improve your RPOs and RTOs Easy-to-Use: Save time and eliminate risk Affordable: Reduce TCO and increase ROI Join the 73,000 organizations who have already modernized their data protection with Veeam. Download Veeam Backup & Replication today! GOLD AWARD NEW TECHNOLOGY To learn more, visit 11
Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey
Exchange Data Protection: To the DAG and Beyond Whitepaper by Brien Posey Exchange is Mission Critical Ask a network administrator to name their most mission critical applications and Exchange Server is
More informationHandling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2
White Paper Handling Hyper-V In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper How to Make Hyper-V Virtual Machines
More informationBackup and Recovery for Microsoft Hyper-V Using Best Practices Planning. Brien M. Posey
Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning Brien M. Posey Introduction There usually isn t anything overly complicated about backing up a physical datacenter. While it s true
More informationA review of BackupAssist within a Hyper-V Environment. By Brien Posey
A review of BackupAssist within a Hyper-V Environment By Brien Posey 2 Contents Introduction... 3 An Introduction to BackupAssist... 4 Testing Methodologies... 5 Test 1: Restore a Virtual Machine s Configuration...
More informationA review of BackupAssist within a Hyper-V Environment
A review of BackupAssist within a Hyper-V Environment By Brien Posey Contents Introduction... 2 An Introduction to BackupAssist... 3 Testing Methodologies... 4 Test 1: Restore a Virtual Machine s Configuration...
More informationCapacity planning with Microsoft System Center
Capacity planning with Microsoft System Center Mike Resseler Veeam Product Strategy Specialist, MVP, Microsoft Certified IT Professional, MCSA, MCTS, MCP Modern Data Protection Built for Virtualization
More informationTop 5 reasons to virtualize Exchange
Top 5 reasons to virtualize Exchange Siegfried Jagott Modern Data Protection Built for Virtualization Introduction This white paper presents the top five reasons to virtualize Microsoft Exchange Server
More informationPervasive PSQL Meets Critical Business Requirements
Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive
More informationExchange Server 2010 backup and recovery tips and tricks
Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering
More informationHow to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems
W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft
More informationSymantec Backup Exec 11d for Windows Servers Sets the Standard for Exchange 2007 Server Data Protection
Symantec Backup Exec 11d for Windows Servers Sets the Standard for Exchange 2007 Server Data Protection Agent for Microsoft Exchange Server TechPDF Peter Imming, Backup Exec Product Management April 16,
More informationVMware and Microsoft VSS: What You Need to Know
Commissioned by VMware and Microsoft VSS: What You Need to Know A Concentrated Technology SolutionSpace Analysis Greg Shields white paper / page 1 Introduction When it comes to Microsoft VSS, there s more
More informationDeploying Exchange Server 2007 SP1 on Windows Server 2008
Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...
More informationHP + Veeam: Fast VMware Recovery from SAN Snapshots
HP + Veeam: Fast VMware Recovery from SAN Snapshots Luca Dell Oca This tech brief was compiled from a series of articles written by virtualization consultant and architect Luca Dell Oca, a specialist in
More informationGranular recovery from SAN Snapshots
Granular recovery from SAN Snapshots with Veeam Backup & Replication 6.5 Luca Dell'Oca This white paper was compiled from an article series written by virtualization consultant and architect Luca Dell
More informationWHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server
WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server
More informationUnitrends Integrated Backup and Recovery of Microsoft SQL Server Environments
Solution Brief Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Summary Your business infrastructure relies on your Microsoft SQL Servers. Your business no matter the size
More informationExpert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V
\\\\ Best Practices for Managing Storage with Hyper-V Learn how storage functionality changes with the newest Hyper-V release and how it differs from VMware. Get details on specific Hyper-V features including
More informationProtecting Windows Microsoft Exchange Server Data Protection
Solution Brief Protecting Microsoft Exchange Server Growth in data for Microsoft Exchange is expanding at a rapid growth rate. Mailbox sizes are increasing due to multimedia file, documentation collaboration
More informationWishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments
NOVASTOR WHITE PAPER Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Published by NovaStor Table of Contents Why choose
More informationNeverfail for Windows Applications June 2010
Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication
More informationThe Challenges of Securing Hosting Hyper-V Multi-Tenant Environments
#1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of
More informationSnapshot Technology: Improving Data Availability and Redundancy
Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot
More informationTape and cloud strategies for VM backups
Tape and cloud strategies for VM backups Scott Lowe Founder and Managing Consultant of the 1610 Group Modern Data Protection Built for Virtualization Abstract: Tape and cloud storage targets have their
More informationAsigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication
Datasheet Asigra Cloud Backup V.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the
More informationABSTRACT. February, 2014 EMC WHITE PAPER
EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICES CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More informationWindows Geo-Clustering: SQL Server
Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering
More informationAcronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data
Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. Acronis and Acronis Secure Zone are registered
More informationAvailability for your modern datacenter
Availability for your modern datacenter - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable Veeam Availability protection for the Always-On Business
More informationWHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions
WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec
More informationRelease Notes. LiveVault. Contents. Version 7.65. Revision 0
R E L E A S E N O T E S LiveVault Version 7.65 Release Notes Revision 0 This document describes new features and resolved issues for LiveVault 7.65. You can retrieve the latest available product documentation
More informationIBM Tivoli Storage Manager for Mail Version 7.1.4. Data Protection for Microsoft Exchange Server Installation and User's Guide IBM
IBM Tivoli Storage Manager for Mail Version 7.1.4 Data Protection for Microsoft Exchange Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Mail Version 7.1.4 Data Protection for
More informationWindows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology
Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication
More informationHigh Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach
High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many
More informationVMware System, Application and Data Availability With CA ARCserve High Availability
Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing
More informationSymantec NetBackup Blueprints
Symantec NetBackup Blueprints Blueprint for Microsoft Exchange Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This
More informationMicrosoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010
Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,
More informationOur Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication
Datasheet Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as
More informationEMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers
EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is
More informationRedefining Microsoft SQL Server Data Management
Redefining Microsoft SQL Server Data Management Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/. Copyright,
More informationReal-time Protection for Hyper-V
1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate
More informationBusiness Continuity: Choosing the Right Technology Solution
Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail
More informationMICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP
MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data
More informationWhite Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip
White Paper By Bob Spurzem and Martin Tuip Mimosa Systems, Inc. January 2008 Mimosa NearPoint for Microsoft Exchange Server Next Generation Email Archiving for Exchange Server 2007 CONTENTS Email has become
More informationNative Data Protection with SimpliVity. Solution Brief
Native Data Protection with SimpliVity Solution Brief SimpliVity is the market-leading hyperconverged infrastructure that delivers native data protection. A fundamental requirement of hyperconvergence,
More informationAvailability Guide for Deploying SQL Server on VMware vsphere. August 2009
Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...
More informationShould You Outsource Your Email?
Should You Outsource Your Email? By: Brien M. Posey According to a recent study by Symantec and Gartner (http://www.itworld.com /Webcasts /bytopic/3/index.html), most companies consider email to be a mission
More informationVMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
More informationSharepoint, SQL, And Exchange Backup In Virtual And Physical Environments
Whitepaper Sharepoint, SQL, And Exchange Backup In Virtual And Physical Environments CTO Series: Dr. Mark Campbell, Chief Strategy/Technology Officer, Unitrends 2 Introduction Enterprise Windows demands
More informationSolution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware
Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery
More informationAligning your business needs with Veeam Backup & Replication
Aligning your business needs with Veeam Backup & Replication Barry Coombs & Chris Snell Modern Data Protection Built for Virtualization Introduction Backups and disaster recovery are far more important
More informationComplete Storage and Data Protection Architecture for VMware vsphere
Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.
More informationOverview of System Center 2012 Data Protection Manager
Overview of System Center 2012 Data Protection Manager J IM R AT SCH S R. PFE II J R AT SCH@MICROSOFT.COM DMVMUG User Conference 2013 Reston, VA Agenda What is System Center Data Protection Manager 2012?
More informationRedefining Microsoft SQL Server Data Management. PAS Specification
Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing
More informationRedefining Microsoft Exchange Data Management
Redefining Microsoft Exchange Data Management FEBBRUARY, 2013 Actifio PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft Exchange Data Management.... 3 Virtualizing
More informationTABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models
1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint
More informationAcronis Backup Advanced for Exchange. Version 11.5 Update 3. Backing Up Microsoft Exchange Server Data
Acronis Backup Advanced for Exchange Version 11.5 Update 3 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2014. All rights reserved. Acronis and
More informationAcronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone
More informationVMware and VSS: Application Backup and Recovery
Best Tools : VMware ESX Virtualization Management VMware and VSS: Application Backup and Recovery Written by: Anton Gostev Product Manager Veeam Software CONTENTS EXECUTIVE SUMMARY... 3 VSS AWARE BACKUP
More informationAcronis Backup Advanced Version 11.5 Update 6
Acronis Backup Advanced Version 11.5 Update 6 APPLIES TO THE FOLLOWING PRODUCTS Advanced for Exchange BACKING UP MICROSOFT EXCHANGE SERVER DATA Copyright Statement Copyright Acronis International GmbH,
More informationProtecting Miscrosoft Hyper-V Environments
Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are
More informationVirtualization Backup/Replication Solution Comparison:
Virtualization Backup/Replication Solution Comparison: PHD Virtual Backup & Replication vs Veeam Backup & Replication Queries the following Comparison is trying to Answer: PHD Virtual Backup & Replication
More informationCA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions
Q1. What do the terms Replication and High Availability mean? A. In the context of these two products, replication refers to the process of copying all application data from one server to another over
More informationBackup Exec 15: Protecting Microsoft Hyper-V
TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are
More informationvsphere Virtualization and Data Protection without Compromise
TECHNICAL BRIEF vsphere Virtualization and Data Protection without Compromise Scott D. Lowe Rick Vanover Tom Gillispie Brien Posey 2014 ExaGrid Systems, Inc. All rights reserved. Table of Contents Introduction...
More informationSHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS
SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS CTO Series: Dr. Mark Campbell, Chief Strategy/Technology Officer, Unitrends INTRODUCTION Enterprise Windows demands enterprise-class
More informationPreparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields
Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields Microsoft MVP and VMware vexpert September, 2012 may be the release date for Windows Server 2012, but odds are good that your
More informationBackup and Restore of CONFIGURATION Object on Windows 2008
Backup and Restore of CONFIGURATION Object on Windows 2008 Technical Whitepaper Contents Introduction... 3 CONFIGURATION Backup... 3 Windows configuration objects... 3 Active Directory... 4 DFS... 4 DHCP
More informationHP Integration with Veeam Backup and Replication. Mark Hambelton Veeam EMEA Alliances SE
HP Integration with Veeam Backup and Replication Mark Hambelton Veeam EMEA Alliances SE Agenda Overview of Veeam Backup and Replication v8 Veeam Explorer for Storage Snapshots Veeam Backup off Storage
More informationMosaic Technology s IT Director s Series: Exchange Data Management: Why Tape, Disk, and Archiving Fall Short
Mosaic Technology s IT Director s Series: : Why Tape, Disk, and Archiving Fall Short Mosaic Technology Corporation * Salem, NH (603) 898-5966 * Bellevue, WA (425)462-5004 : Why Tape, Disk, and Archiving
More informationBest Practices in Business Recovery: Colocation or DRaaS? By Brien M. Posey
Best Practices in Business Recovery: Colocation or DRaaS? By Brien M. Posey axcient.com 1 Introduction In the not-too-distant past, protecting an organization s data meant shipping backup tapes offsite
More informationMicrosoft Exchange 2013 on VMware Availability and Recovery Options
This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware
More informationEnterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011
Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number
More informationCreating A Highly Available Database Solution
WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements
More informationExchange 2010 Best Practices and Strategies for Backing Up and Restoring Exchange 2010 Environment
Best Practices and Strategies for Backing Up and Restoring Exchange 2010 Environment 1 Exchange 2010 Can Only Be Backed Up Using VSS Writers Microsoft: Windows Server Backup System Center Data Protection
More informationFault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform
Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving
More informationNEW White Paper Expert Guide on Backing up Windows Server in Hyper-V
NEW White Paper Expert Guide on Backing up Windows Server in Hyper-V by John Savill, Microsoft MVP John Savill Microsoft MVP John Savill is a Windows technical specialist, an 11-time MVP, an MCITP: Enterprise
More informationLearn how to Backup Your Exchange Infrastructure
Learn how to Backup Your Exchange Infrastructure Niels Engelen Systems Engineer for Veeam Software (vexpert, VCP, CCNA) Johan Huttenga Solutions Architect for Veeam Software (MCSA, MCITP) Contents Executive
More informationFive Secrets to SQL Server Availability
Five Secrets to SQL Server Availability EXECUTIVE SUMMARY Microsoft SQL Server has become the data management tool of choice for a wide range of business critical systems, from electronic commerce to online
More informationThe Microsoft Large Mailbox Vision
WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes
More informationThe Data Center of the Future
2010, Enterprise Strategy Group, Inc. All Rights Reserved White Paper The Data Center of the Future By Mark Bowker and Lauren Whitehouse March, 2010 This ESG White Paper was commissioned by Veeam and is
More informationMaximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity
Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having
More informationAdministration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233
Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features
More informationSharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint
SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint Chris Henley Microsoft Certified Professional, MCSE, MCSA and Veeam Product Strategy Specialist
More informationHA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
More informationThe VMware Administrator s Guide to Hyper-V in Windows Server 2012. Brien Posey Microsoft MVMP @Veeam
The VMware Administrator s Guide to Hyper-V in Windows Server 2012 Brien Posey Microsoft MVMP @Veeam About today s webinar Thought leadership content from an industry expert This webinar is recorded and
More informationA First Look at Windows Server 2012 R2 and Hyper-V
A First Look at Windows Server 2012 R2 and Hyper-V Brien M. Posey Modern Data Protection Built for Virtualization Although Windows Server has long been a solid server platform, it has lagged far behind
More informationSTORAGE HOST-BASED REPLICATION. Buying Guide: inside
Managing the information that drives the enterprise STORAGE Buying Guide: inside 2 What you need to know about host-based replication 8 Special factors to consider Replication is now a key part of most
More informationComparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications
Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &
More informationHigh Availability Solutions for the MariaDB and MySQL Database
High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment
More informationBacking Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0
Backing Up the CTERA Portal Using Veeam Backup & Replication CTERA Portal Datacenter Edition May 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may
More informationNimble Storage Best Practices for Microsoft Exchange
BEST PRACTICES GUIDE: Nimble Storage Best Practices for Microsoft Exchange Table of Contents NIMBLE STORAGE OVERVIEW... 3 EXCHANGE STORAGE REFERENCE ARCHITECTURE... 3 Store Database and Transaction Log
More informationNSI Solutions with Microsoft VSS
Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you
More informationNutanix Tech Note. Data Protection and Disaster Recovery
Nutanix Tech Note Data Protection and Disaster Recovery Nutanix Virtual Computing Platform is engineered from the ground-up to provide enterprise-grade availability for critical virtual machines and data.
More informationEMC NetWorker Module for Microsoft for Exchange Server VSS
EMC NetWorker Module for Microsoft for Exchange Server VSS Version 8.2 Service Pack 1 User Guide 302-001-233 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published
More informationWindows Server Failover Clustering April 2010
Windows Server Failover Clustering April 00 Windows Server Failover Clustering (WSFC) is the successor to Microsoft Cluster Service (MSCS). WSFC and its predecessor, MSCS, offer high availability for critical
More informationAccess to easy-to-use tools that reduce management time with Arcserve Backup
Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,
More informationSymantec Backup Exec 2014 Agents and Options
Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,
More informationHyper-V: Microsoft s
TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net Hyper-V: Microsoft s Approach to Server
More information