Exchange DAG backup and design best practices

Size: px
Start display at page:

Download "Exchange DAG backup and design best practices"

Transcription

1 Exchange DAG backup and design best practices Brien M. Posey Modern Data Protection Built for Virtualization

2 Database Availability Groups (DAGs) are the primary fault-tolerant mechanism used for protecting mailbox databases in Exchange Server 2010 and DAGs allow administrators to create up to sixteen separate copies of mailbox databases. DAGs allow for so much redundancy, in fact, that some people (both inside and outside of Microsoft) have expressed the idea that DAGs render Exchange Server backups obsolete. This article examines how backups work in a DAG environment, and whether or not you should be backing up your DAG members. The Exchange Server backup process Before I delve into a discussion of data protection within a DAG, I need to take a moment and discuss the way that backups normally work in an Exchange Server environment independent of DAGs. When a backup application performs a backup of an Exchange Server, the backup application acts as something that Microsoft refers to as a Volume Shadow Copy Service (VSS) requester. The VSS requester s job is to coordinate the backup process with a series of VSS writers. Typically there will be several different VSS writers present on an Exchange Server and each writer is responsible for making sure that a specific type of data is backed up properly. You can see a list of all of the VSS writers that are present on your Exchange Server by entering the VSSAdmin List Writers command. For the purpose of this discussion, I will focus on the Exchange VSS writer. With that said, the backup software initiates a backup job by having the VSS requester contact the Exchange Server and ask for a list of the VSS writers that are present on the server. The Exchange Server returns a list of VSS writers in response. At this point, the VSS requester contacts each VSS writer individually. In the case of the Exchange VSS writer, the requester asks for the writer s status and for information about the Exchange Server resources that are present on the server and where those resources reside. Specifically the Exchange VSS writer reports on the names and locations of databases and their corresponding transaction logs, as well as some other related metadata. The next thing that has to happen is that the Exchange VSS writer freezes the Exchange databases and the corresponding transaction logs. For all practical purposes, this freezing process can be thought of as temporarily flagging the databases and the transaction log folders as read only. 2

3 Even though the Exchange databases and the corresponding transaction logs are frozen the Exchange Server is able to continue to function throughout the backup process. The reason for this is that even though Exchange is not able to write to a frozen database or its transaction logs, it is able to store transactions in memory. Normally the backup process only requires a database to be frozen for about sixty seconds (or less). During this time the VSS writer creates a VSS snapshot. The snapshot operation s anatomy can vary depending on how the server is set up. In most cases the server creates a copy-on-write snapshot, although in some special circumstances a clone snapshot may be created instead. Windows designates a portion of each disk as shadow storage. The VSS writer stores the snapshot in the shadow storage area. Generally speaking, each disk contains its own shadow storage, so the database volume will contain the database and the database snapshot. It is extremely important to understand that the VSS snapshot is not the same thing as a backup. For one thing, the snapshot exists on the same volume as the resource that it is protecting, so if you lose the volume, you lose the protected resource (such as an Exchange mailbox database) and the corresponding snapshot. The other reason why a snapshot is not the same thing as a backup is that a copy-on-write snapshot is not a full copy of your Exchange database. Mailbox database snapshots are designed to be created in one minute or less. In many cases, making a second copy of a multi-terabyte database on the same volume where it resides now would take much longer (especially on lower-end hardware). Never mind the impact that storing multiple database copies would have on your storage consumption. The point is that a snapshot is not a full database copy. Instead, a snapshot is designed to store copies of individual blocks of data. After the snapshot is created, the database is thawed, which means that it (and its transaction logs) once again become read/write. The problem is that at this point the database has not been backed up yet. If the backup software were to simply make a copy of the database in its current state, the database would most likely be modified before the backup could be completed, thereby resulting in a corrupt database copy. This is where the snapshot comes into play. Any time that a write operation needs to be performed against the database, Windows makes a copy of the block before it is modified. This copy resides in shadow storage. That way, the database can be modified, but there is still a copy of any modified blocks as they existed prior to the modification. 3

4 Transaction log processing It s impossible to talk about Exchange Server backups without discussing transaction logs. The transaction log discussion will become even more important later on when I begin discussing DAGs. Exchange does not write transactions directly to a mailbox database. Instead, the data is written to a transaction log. As such, the mailbox database almost never contains data that is completely up-to-date. The reason why Exchange Server writes data to log files instead of writing the data directly to a mailbox database has to do with recoverability. To show you why this is the case, imagine for a moment that transaction logs do not exist and that all mailbox transactions are written directly to a mailbox database. Now suppose that you back up the mailbox database and your Exchange Server crashes two hours later. If you had to restore your most recent backup, you would lose all of the data that had accumulated since the time that the backup was created. Losing two hours worth of data might not initially seem like a major problem, but in most organizations is one of the most mission critical applications, and data loss of any kind is problematic. Simply put, transaction logs are designed to protect the data that has accumulated since your last backup. However, they can only protect you if they are stored on a separate disk (not just a separate volume) from the mailbox database. If the volume containing the database were to fail, you could restore your backup which would bring the database back to the state at which it existed at the time that the backup was created. The transaction logs are then used to retrieve any data that has accumulated between the time of the backup and the time of the crash. Obviously, the transactional data does not reside in the transaction logs forever. It has to be written to the mailbox database at some point. This is actually done as a part of the backup process. The log file contents are committed to thedatabase. There is also a checkpoint file that keeps track of which log files have and have not been committed. When the backup process completes, there is some cleanup work that occurs, which takes the database out of a backup state. This means purging any snapshot data that is no longer needed and truncating transaction logs that have been committed to the database. 4

5 What about Database Availability Groups? The backup process that has been described so far is used both in standalone Exchange deployments and in DAGs. However, DAGs complicate things a little bit because multiple mailbox servers and multiple database copies are involved in the process. A DAG is a special type of failover cluster that provides fault tolerance for Exchange mailbox databases. DAGs are able to make mailbox databases fault tolerant by creating and maintaining multiple mailbox database copies. In a DAG environment, the primary copy of a mailbox database is said to be theactive copy, while any secondary copies are considered to be passive copies. When it comes to DAG architecture, it is important to remember that there is not necessarily a one-to-one ratio of DAG members to mailbox database copies. For example, if you have a DAG that is made up of five mailbox servers (a five-member DAG), it does not mean that you must have five copies of each mailbox database. Most organizations that use DAGs try to strike a balance between redundancy and storage and other hardware costs. Hence, an organization with five DAG members might create three copies of one database, two copies of a second database, and five copies of a third database. You are free to mix and match levels of database redundancy within your DAG. Do you need backups for Database Availability Groups? There is a notion within some segments of the IT community that if you can create a DAG that provides a sufficient number of database copies, there is no need to back up Exchange Server. After all, a backup is really nothing more than a copy of your data. As such, some believe that an online database copy within your DAG will work just as well as a backup. While there is no denying the fact that there are enterprise-class organizations that choose not to perform traditional backups of DAG members, I personally believe that this approach (which is known as zero backups) is shortsighted. One of the reasons for this is that restoring a backup allows you to revert an Exchange database to an earlier point in time, while DAGs are primarily oriented toward providing redundancy for databases in their current state. 5

6 At first, the idea of providing redundancy rather than having the ability to revert a database to an earlier point in time seems completely logical. If Exchange Server truly is a mission-critical application and data loss is unacceptable, rolling back a database to an earlier state would not fit into the organization s goals because it would result in data loss. The problem with this philosophy is that redundancy alone only protects against some types of problems, but not others. For instance, having redundant database copies would protect you against a node failure or against a server volume failure. However, this approach does not offer protection against malware. Suppose that a primary database copy became infested with a virus. The malware infestation would be replicated to the other database copies, thereby infecting all of your database copies. In all fairness, Microsoft does give you a way to protect yourself against the replication of unwanted data. The mechanism that allows a DAG to be rolled back to an earlier point in time is called a lagged database copy. In order to understand how a lagged database copy works, you have to understand how normal DAG replication works. Rather than trying to keep mailbox databases in perfect synchronization, DAG replication works by using log shipping. When a transaction log file is closed out, the log is immediately replicated to the other database copies. Normally the passive database copies play back the log files and commit their contents to the passive database copies. A lagged copy does not immediately replay transaction logs as they are received. Instead, Exchange waits for a predetermined period of time to play back the transaction logs for lagged copies. This means that a lagged database copy is essentially a copy of a database as it existed at an earlier point in time. As you can see, lagged database copies can provide your DAG with rollback capabilities. However, activating a lagged database copy is not a process to be taken lightly. It can be extremely difficult to determine which transaction logs should and should not be preserved. Furthermore, the technique used to activate a lagged database copy is very tedious. 6

7 With proper planning it is theoretically possible to provide real-time and lagged protection to mailbox database copies using only native tools. However, there are a number of things that must be considered prior to using this approach. Some of the more important considerations are: If a database rollback is required then you must discover the problem, make the decision to roll back the database, and complete the rollback process within the time allowed by your lagged database copy. Unless you have multiple lagged copies of a single mailbox database, you usually only have one chance to get the rollback right. Going without a traditional backup greatly reduces the number of recovery options that are available to you. Do you really want to have to explain to your boss that you can t return Exchange to the desired state because you have abandoned the process of backing up your Exchange Server? Traditional backups give you the option of storing offline copies of your data in a secure location. Conversely, DAG replication stores passive database copies on spinning disks. Best practices for Database Availability Group backups As mentioned at the beginning of this whitepaper, DAGs are the primary mechanism for protecting Exchange 2010 and Exchange 2013 mailbox databases. As such, I highly recommend using DAGs to protect your data, but do not recommend using DAGs as a substitute for regular Exchange Server backups. With that in mind, there are several recommended best practices for DAGs that you should adhere to. Windows Server Backup First, don t use Windows Server Backup to back up DAG members. Windows Server Backup is perfectly capable of backing up DAG environments, but has some major limitations. The most significant of these limitations is the fact that Windows Server Backup can only back up active database copies. Most of the third-party backup solutions can back up passive database copies. The reason it is better to back up passive database copies is because the backup process creates disk I/O. You really don t want to generate additional disk I/O on a volume containing an active database copy if you can avoid doing so. 7

8 DAG architecture Another recommendation is to be careful about creating a spanned DAG. It is possible to build a DAG that spans multiple datacenters so that there is always a database copy kept safely off site. However, if you are going to create a spanned DAG then you must also span the Active Directory domain across datacenters, because Microsoft requires all DAG members to exist within a common domain. While I am on the subject of spanned DAGs, I also want to mention that spanned DAGs are very sensitive to latency. The WAN connection must support a round-trip latency of 500 milliseconds or less. You must also construct a spanned DAG in a way that will prevent a WAN link failure from losing quorum, which would cause the DAG to fail. Doing so means constructing the DAG in a way that guarantees that the majority of the nodes (at least half + 1) are accessible at any given time. The most reliable way of doing this is to place half of the DAG members at each of two datacenters and then place a tie breaker DAG member of witness server at an independent third location. Database types As a best practice, I recommend that any organization that has public folder data upgrade to Exchange Server DAGs only support mailbox databases, not public folder databases. Exchange Server 2013 allows public folder data to be moved into a mailbox database, thereby giving administrators the ability to offer DAG level protection for public folder data. This is simply not possible in Exchange Server

9 Log truncation One last best practice is to base your log truncation method on your mailbox server deployment type. As previously explained, under normal circumstances log files are committed to the database as a part of the backup process. Once everything has been backed up, Exchange truncates (purges) the log files that are no longer needed. One of the big questions that often comes up during the DAG creation process is how log truncation should be handled since the log files must be replicated to other DAG members. Microsoft recommends that if you have non-replicated mailbox databases use the log file truncation method that was previously discussed ( microsoft.com/en-us/library/ee aspx). Microsoft also recommends that these servers be provisioned for three days of log generation capacity. In the case of replicated databases, however, Microsoft recommends using a log truncation method called circular logging. Circular logging uses and reuses a finite number of log files as opposed to creating (and later truncating) a continuous stream of log files. Lagged copies should be provisioned to accommodate log files extending for three days beyond the lag period. Conclusion Although there is a notion among some IT professionals that DAGs make traditional backups obsolete, backups generally provide a greater degree of flexibility than DAGs can provide on their own. Even so, the only way to truly protect your data is to make sure to adhere to the various recommended best practices for DAGs when designing the DAG architecture and when planning your backup solution. 9

10 About the Author Brien Posey is a freelance technical writer who has received Microsoft's MVP award nine times for his work with Exchange Server, Windows Server, IIS, and File Systems Storage. Brien has written or contributed to about three dozen books, and has written well over 4,000 technical articles and white papers for a variety of printed publications and Web sites. In addition to his writing, Brien routinely speaks at IT conferences and is involved in a wide variety of other technology related projects. About Veeam Software Veeam is Modern Data Protection. We believe today s IT requirements have changed and that 3C legacy backup problems high costs, increased complexity and missing capabilities are no longer acceptable for any organization. Veeam provides powerful, easy-to-use and affordable solutions that are Built for Virtualization and the cloud a perfect fit for the modern datacenter. Veeam Backup & Replication is VMware backup, Hyper-V backup, recovery and replication. This #1 VM Backup solution helps organizations meet RPOs and RTOs, save time, eliminate risks and dramatically reduce capital and operational costs. Veeam Backup Management Suite combines Veeam Backup & Replication and Veeam ONE in a single integrated solution to protect virtualization investments, increase administrator productivity and help mitigate daily management risks. Veeam Management Pack (MP) extends enterprise monitoring to VMware through Microsoft System Center. Veeam also provides free tools for the virtualization community. Learn more by visiting 10

11 Modern Data Protection Built for Virtualization Powerful Easy-to-Use Veeam Backup & Replication #1 VM Backup for VMware and Hyper-V Virtualization changes everything especially backup. If you ve virtualized on VMware or Hyper-V, now is the time to move up to the data protection solution Built for Virtualization: Veeam Backup & Replication. Unlike traditional backup that suffers from the 3C problem (missing capabilities, complexity and cost), Veeam is: Powerful: Dramatically improve your RPOs and RTOs Easy-to-Use: Save time and eliminate risk Affordable: Reduce TCO and increase ROI Join the 73,000 organizations who have already modernized their data protection with Veeam. Download Veeam Backup & Replication today! GOLD AWARD NEW TECHNOLOGY To learn more, visit 11

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey

Exchange Data Protection: To the DAG and Beyond. Whitepaper by Brien Posey Exchange Data Protection: To the DAG and Beyond Whitepaper by Brien Posey Exchange is Mission Critical Ask a network administrator to name their most mission critical applications and Exchange Server is

More information

Handling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2

Handling Hyper-V. In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper Handling Hyper-V In this series of articles, learn how to manage Hyper-V, from ensuring high availability to upgrading to Windows Server 2012 R2 White Paper How to Make Hyper-V Virtual Machines

More information

Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning. Brien M. Posey

Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning. Brien M. Posey Backup and Recovery for Microsoft Hyper-V Using Best Practices Planning Brien M. Posey Introduction There usually isn t anything overly complicated about backing up a physical datacenter. While it s true

More information

A review of BackupAssist within a Hyper-V Environment. By Brien Posey

A review of BackupAssist within a Hyper-V Environment. By Brien Posey A review of BackupAssist within a Hyper-V Environment By Brien Posey 2 Contents Introduction... 3 An Introduction to BackupAssist... 4 Testing Methodologies... 5 Test 1: Restore a Virtual Machine s Configuration...

More information

A review of BackupAssist within a Hyper-V Environment

A review of BackupAssist within a Hyper-V Environment A review of BackupAssist within a Hyper-V Environment By Brien Posey Contents Introduction... 2 An Introduction to BackupAssist... 3 Testing Methodologies... 4 Test 1: Restore a Virtual Machine s Configuration...

More information

Capacity planning with Microsoft System Center

Capacity planning with Microsoft System Center Capacity planning with Microsoft System Center Mike Resseler Veeam Product Strategy Specialist, MVP, Microsoft Certified IT Professional, MCSA, MCTS, MCP Modern Data Protection Built for Virtualization

More information

Top 5 reasons to virtualize Exchange

Top 5 reasons to virtualize Exchange Top 5 reasons to virtualize Exchange Siegfried Jagott Modern Data Protection Built for Virtualization Introduction This white paper presents the top five reasons to virtualize Microsoft Exchange Server

More information

Pervasive PSQL Meets Critical Business Requirements

Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL Meets Critical Business Requirements Pervasive PSQL White Paper May 2012 Table of Contents Introduction... 3 Data Backup... 3 Pervasive Backup Agent... 3 Pervasive PSQL VSS Writer... 5 Pervasive

More information

Exchange Server 2010 backup and recovery tips and tricks

Exchange Server 2010 backup and recovery tips and tricks Exchange Server backup and recovery tips and tricks Exchange Server backup and recovery Exchange Server A big part of your job as an Exchange Server administrator involves preparing for and recovering

More information

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems

How to Manage Critical Data Stored in Microsoft Exchange Server 2010. By Hitachi Data Systems W H I T E P A P E R How to Manage Critical Data Stored in Microsoft Exchange Server 2010 By Hitachi Data Systems April 2012 2 Table of Contents Executive Summary and Introduction 3 Mission-critical Microsoft

More information

Symantec Backup Exec 11d for Windows Servers Sets the Standard for Exchange 2007 Server Data Protection

Symantec Backup Exec 11d for Windows Servers Sets the Standard for Exchange 2007 Server Data Protection Symantec Backup Exec 11d for Windows Servers Sets the Standard for Exchange 2007 Server Data Protection Agent for Microsoft Exchange Server TechPDF Peter Imming, Backup Exec Product Management April 16,

More information

VMware and Microsoft VSS: What You Need to Know

VMware and Microsoft VSS: What You Need to Know Commissioned by VMware and Microsoft VSS: What You Need to Know A Concentrated Technology SolutionSpace Analysis Greg Shields white paper / page 1 Introduction When it comes to Microsoft VSS, there s more

More information

Deploying Exchange Server 2007 SP1 on Windows Server 2008

Deploying Exchange Server 2007 SP1 on Windows Server 2008 Deploying Exchange Server 2007 SP1 on Windows Server 2008 Product Group - Enterprise Dell White Paper By Ananda Sankaran Andrew Bachler April 2008 Contents Introduction... 3 Deployment Considerations...

More information

HP + Veeam: Fast VMware Recovery from SAN Snapshots

HP + Veeam: Fast VMware Recovery from SAN Snapshots HP + Veeam: Fast VMware Recovery from SAN Snapshots Luca Dell Oca This tech brief was compiled from a series of articles written by virtualization consultant and architect Luca Dell Oca, a specialist in

More information

Granular recovery from SAN Snapshots

Granular recovery from SAN Snapshots Granular recovery from SAN Snapshots with Veeam Backup & Replication 6.5 Luca Dell'Oca This white paper was compiled from an article series written by virtualization consultant and architect Luca Dell

More information

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server

WHITE PAPER PPAPER. Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions. for Microsoft Exchange Server 2003 & Microsoft SQL Server WHITE PAPER PPAPER Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions Symantec Backup Exec Quick Recovery & Off-Host Backup Solutions for Microsoft Exchange Server 2003 & Microsoft SQL Server

More information

Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments

Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Solution Brief Unitrends Integrated Backup and Recovery of Microsoft SQL Server Environments Summary Your business infrastructure relies on your Microsoft SQL Servers. Your business no matter the size

More information

Expert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V

Expert. Briefing. \\\\ Best Practices for Managing Storage with Hyper-V \\\\ Best Practices for Managing Storage with Hyper-V Learn how storage functionality changes with the newest Hyper-V release and how it differs from VMware. Get details on specific Hyper-V features including

More information

Protecting Windows Microsoft Exchange Server Data Protection

Protecting Windows Microsoft Exchange Server Data Protection Solution Brief Protecting Microsoft Exchange Server Growth in data for Microsoft Exchange is expanding at a rapid growth rate. Mailbox sizes are increasing due to multimedia file, documentation collaboration

More information

Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments

Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments NOVASTOR WHITE PAPER Wishful Thinking vs. Reality in Regards to Virtual Backup and Restore Environments Best practices for backing up virtual environments Published by NovaStor Table of Contents Why choose

More information

Neverfail for Windows Applications June 2010

Neverfail for Windows Applications June 2010 Neverfail for Windows Applications June 2010 Neverfail, from Neverfail Ltd. (www.neverfailgroup.com), ensures continuity of user services provided by Microsoft Windows applications via data replication

More information

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments

The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments #1 Management and Security for Windows Server and Hyper-V The Challenges of Securing Hosting Hyper-V Multi-Tenant Environments by Brien M. Posey In the not too distant past, VMware was the hypervisor of

More information

Snapshot Technology: Improving Data Availability and Redundancy

Snapshot Technology: Improving Data Availability and Redundancy Snapshot Technology: Improving Data Availability and Redundancy. All rights reserved. Table of Contents Introduction...3 Snapshot Overview...3 Functional Description...6 Creating Snapshots...7 Other Snapshot

More information

Tape and cloud strategies for VM backups

Tape and cloud strategies for VM backups Tape and cloud strategies for VM backups Scott Lowe Founder and Managing Consultant of the 1610 Group Modern Data Protection Built for Virtualization Abstract: Tape and cloud storage targets have their

More information

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication

Asigra Cloud Backup V13.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Asigra Cloud Backup V.0 Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as the

More information

ABSTRACT. February, 2014 EMC WHITE PAPER

ABSTRACT. February, 2014 EMC WHITE PAPER EMC APPSYNC SOLUTION FOR MANAGING PROTECTION OF MICROSOFT SQL SERVER SLA-DRIVEN, SELF-SERVICE CAPABILITIES FOR MAXIMIZING AND SIMPLIFYING DATA PROTECTION AND RECOVERABILITY ABSTRACT With Microsoft SQL

More information

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange

CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange CA RECOVERY MANAGEMENT R12.5 BEST PRACTICES CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering

More information

Windows Geo-Clustering: SQL Server

Windows Geo-Clustering: SQL Server Windows Geo-Clustering: SQL Server Edwin Sarmiento, Microsoft SQL Server MVP, Microsoft Certified Master Contents Introduction... 3 The Business Need for Geo-Clustering... 3 Single-location Clustering

More information

Acronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data

Acronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. Acronis and Acronis Secure Zone are registered

More information

Availability for your modern datacenter

Availability for your modern datacenter Availability for your modern datacenter - Agentless backup and replication for VMware and Hyper-V - Scalable, powerful, easy-to-use, affordable Veeam Availability protection for the Always-On Business

More information

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions

WHITE PAPER: ENTERPRISE SECURITY. Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions WHITE PAPER: ENTERPRISE SECURITY Symantec Backup Exec Quick Recovery and Off-Host Backup Solutions for Microsoft Exchange Server 2003 and Microsoft SQL Server White Paper: Enterprise Security Symantec

More information

Release Notes. LiveVault. Contents. Version 7.65. Revision 0

Release Notes. LiveVault. Contents. Version 7.65. Revision 0 R E L E A S E N O T E S LiveVault Version 7.65 Release Notes Revision 0 This document describes new features and resolved issues for LiveVault 7.65. You can retrieve the latest available product documentation

More information

IBM Tivoli Storage Manager for Mail Version 7.1.4. Data Protection for Microsoft Exchange Server Installation and User's Guide IBM

IBM Tivoli Storage Manager for Mail Version 7.1.4. Data Protection for Microsoft Exchange Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Mail Version 7.1.4 Data Protection for Microsoft Exchange Server Installation and User's Guide IBM IBM Tivoli Storage Manager for Mail Version 7.1.4 Data Protection for

More information

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology

Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage. Applied Technology Windows Server 2008 Hyper-V Backup and Replication on EMC CLARiiON Storage Applied Technology Abstract This white paper provides an overview of the technologies that are used to perform backup and replication

More information

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach

High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach High Availability and Disaster Recovery for Exchange Servers Through a Mailbox Replication Approach Introduction Email is becoming ubiquitous and has become the standard tool for communication in many

More information

VMware System, Application and Data Availability With CA ARCserve High Availability

VMware System, Application and Data Availability With CA ARCserve High Availability Solution Brief: CA ARCserve R16.5 Complexity ate my budget VMware System, Application and Data Availability With CA ARCserve High Availability Adding value to your VMware environment Overview Today, performing

More information

Symantec NetBackup Blueprints

Symantec NetBackup Blueprints Symantec NetBackup Blueprints Blueprint for Microsoft Exchange Symantec Backup and Recovery Technical Services Symantec NetBackup Blueprints 1 Symantec NetBackup Blueprints Preface/disclaimer Notice This

More information

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010

Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Microsoft SQL Server 2008 R2 Enterprise Edition and Microsoft SharePoint Server 2010 Better Together Writer: Bill Baer, Technical Product Manager, SharePoint Product Group Technical Reviewers: Steve Peschka,

More information

Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication

Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Datasheet Our Cloud Backup Solution Provides Comprehensive Virtual Machine Data Protection Including Replication Virtual Machines (VMs) have become a staple of the modern enterprise data center, but as

More information

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers

EMC VPLEX FAMILY. Continuous Availability and data Mobility Within and Across Data Centers EMC VPLEX FAMILY Continuous Availability and data Mobility Within and Across Data Centers DELIVERING CONTINUOUS AVAILABILITY AND DATA MOBILITY FOR MISSION CRITICAL APPLICATIONS Storage infrastructure is

More information

Redefining Microsoft SQL Server Data Management

Redefining Microsoft SQL Server Data Management Redefining Microsoft SQL Server Data Management Contact Actifio Support As an Actifio customer, you can get support for all Actifio products through the Support Portal at http://support.actifio.com/. Copyright,

More information

Real-time Protection for Hyper-V

Real-time Protection for Hyper-V 1-888-674-9495 www.doubletake.com Real-time Protection for Hyper-V Real-Time Protection for Hyper-V Computer virtualization has come a long way in a very short time, triggered primarily by the rapid rate

More information

Business Continuity: Choosing the Right Technology Solution

Business Continuity: Choosing the Right Technology Solution Business Continuity: Choosing the Right Technology Solution Table of Contents Introduction 3 What are the Options? 3 How to Assess Solutions 6 What to Look for in a Solution 8 Final Thoughts 9 About Neverfail

More information

MICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP

MICROSOFT EXCHANGE 2003. best practices BEST PRACTICES - DATA STORAGE SETUP MICROSOFT EXCHANGE 2003 best practices BEST PRACTICES - DATA STORAGE SETUP TABLE OF CONTENTS E-mail has become a business critical communication tool 3 Build a disaster recovery solution with VSS and Data

More information

White Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip

White Paper. Mimosa NearPoint for Microsoft Exchange Server. Next Generation Email Archiving for Exchange Server 2007. By Bob Spurzem and Martin Tuip White Paper By Bob Spurzem and Martin Tuip Mimosa Systems, Inc. January 2008 Mimosa NearPoint for Microsoft Exchange Server Next Generation Email Archiving for Exchange Server 2007 CONTENTS Email has become

More information

Native Data Protection with SimpliVity. Solution Brief

Native Data Protection with SimpliVity. Solution Brief Native Data Protection with SimpliVity Solution Brief SimpliVity is the market-leading hyperconverged infrastructure that delivers native data protection. A fundamental requirement of hyperconvergence,

More information

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009

Availability Guide for Deploying SQL Server on VMware vsphere. August 2009 Availability Guide for Deploying SQL Server on VMware vsphere August 2009 Contents Introduction...1 SQL Server 2008 with vsphere and VMware HA/DRS...2 Log Shipping Availability Option...4 Database Mirroring...

More information

Should You Outsource Your Email?

Should You Outsource Your Email? Should You Outsource Your Email? By: Brien M. Posey According to a recent study by Symantec and Gartner (http://www.itworld.com /Webcasts /bytopic/3/index.html), most companies consider email to be a mission

More information

VMware vsphere Data Protection 6.0

VMware vsphere Data Protection 6.0 VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application

More information

Sharepoint, SQL, And Exchange Backup In Virtual And Physical Environments

Sharepoint, SQL, And Exchange Backup In Virtual And Physical Environments Whitepaper Sharepoint, SQL, And Exchange Backup In Virtual And Physical Environments CTO Series: Dr. Mark Campbell, Chief Strategy/Technology Officer, Unitrends 2 Introduction Enterprise Windows demands

More information

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware

Solution Brief Availability and Recovery Options: Microsoft Exchange Solutions on VMware Introduction By leveraging the inherent benefits of a virtualization based platform, a Microsoft Exchange Server 2007 deployment on VMware Infrastructure 3 offers a variety of availability and recovery

More information

Aligning your business needs with Veeam Backup & Replication

Aligning your business needs with Veeam Backup & Replication Aligning your business needs with Veeam Backup & Replication Barry Coombs & Chris Snell Modern Data Protection Built for Virtualization Introduction Backups and disaster recovery are far more important

More information

Complete Storage and Data Protection Architecture for VMware vsphere

Complete Storage and Data Protection Architecture for VMware vsphere Complete Storage and Data Protection Architecture for VMware vsphere Executive Summary The cost savings and agility benefits of server virtualization are well proven, accounting for its rapid adoption.

More information

Overview of System Center 2012 Data Protection Manager

Overview of System Center 2012 Data Protection Manager Overview of System Center 2012 Data Protection Manager J IM R AT SCH S R. PFE II J R AT SCH@MICROSOFT.COM DMVMUG User Conference 2013 Reston, VA Agenda What is System Center Data Protection Manager 2012?

More information

Redefining Microsoft SQL Server Data Management. PAS Specification

Redefining Microsoft SQL Server Data Management. PAS Specification Redefining Microsoft SQL Server Data Management APRIL Actifio 11, 2013 PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft SQL Server Data Management.... 4 Virtualizing

More information

Redefining Microsoft Exchange Data Management

Redefining Microsoft Exchange Data Management Redefining Microsoft Exchange Data Management FEBBRUARY, 2013 Actifio PAS Specification Table of Contents Introduction.... 3 Background.... 3 Virtualizing Microsoft Exchange Data Management.... 3 Virtualizing

More information

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models

TABLE OF CONTENTS THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY FOR SHAREPOINT DATA. Introduction. Examining Third-Party Replication Models 1 THE SHAREPOINT MVP GUIDE TO ACHIEVING HIGH AVAILABILITY TABLE OF CONTENTS 3 Introduction 14 Examining Third-Party Replication Models 4 Understanding Sharepoint High Availability Challenges With Sharepoint

More information

Acronis Backup Advanced for Exchange. Version 11.5 Update 3. Backing Up Microsoft Exchange Server Data

Acronis Backup Advanced for Exchange. Version 11.5 Update 3. Backing Up Microsoft Exchange Server Data Acronis Backup Advanced for Exchange Version 11.5 Update 3 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2014. All rights reserved. Acronis and

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone

More information

VMware and VSS: Application Backup and Recovery

VMware and VSS: Application Backup and Recovery Best Tools : VMware ESX Virtualization Management VMware and VSS: Application Backup and Recovery Written by: Anton Gostev Product Manager Veeam Software CONTENTS EXECUTIVE SUMMARY... 3 VSS AWARE BACKUP

More information

Acronis Backup Advanced Version 11.5 Update 6

Acronis Backup Advanced Version 11.5 Update 6 Acronis Backup Advanced Version 11.5 Update 6 APPLIES TO THE FOLLOWING PRODUCTS Advanced for Exchange BACKING UP MICROSOFT EXCHANGE SERVER DATA Copyright Statement Copyright Acronis International GmbH,

More information

Protecting Miscrosoft Hyper-V Environments

Protecting Miscrosoft Hyper-V Environments Protecting Miscrosoft Hyper-V Environments Who should read this paper Technical White Papers are designed to introduce Veritas partners and end users to key technologies and technical concepts that are

More information

Virtualization Backup/Replication Solution Comparison:

Virtualization Backup/Replication Solution Comparison: Virtualization Backup/Replication Solution Comparison: PHD Virtual Backup & Replication vs Veeam Backup & Replication Queries the following Comparison is trying to Answer: PHD Virtual Backup & Replication

More information

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions

CA XOsoft Replication and CA XOsoft High Availability CA Partner Frequently Asked Questions Q1. What do the terms Replication and High Availability mean? A. In the context of these two products, replication refers to the process of copying all application data from one server to another over

More information

Backup Exec 15: Protecting Microsoft Hyper-V

Backup Exec 15: Protecting Microsoft Hyper-V TECHNICAL BRIEF: BACKUP EXEC 15: PROTECTING MICROSOFT HYPER-V........................................ Backup Exec 15: Protecting Microsoft Hyper-V Who should read this paper Technical White Papers are

More information

vsphere Virtualization and Data Protection without Compromise

vsphere Virtualization and Data Protection without Compromise TECHNICAL BRIEF vsphere Virtualization and Data Protection without Compromise Scott D. Lowe Rick Vanover Tom Gillispie Brien Posey 2014 ExaGrid Systems, Inc. All rights reserved. Table of Contents Introduction...

More information

SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS

SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS SHAREPOINT, SQL, AND EXCHANGE BACKUP IN VIRTUAL AND PHYSICAL ENVIRONMENTS CTO Series: Dr. Mark Campbell, Chief Strategy/Technology Officer, Unitrends INTRODUCTION Enterprise Windows demands enterprise-class

More information

Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields

Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields Preparing for Server 2012 Hyper-V: Seven Questions to Ask Now Greg Shields Microsoft MVP and VMware vexpert September, 2012 may be the release date for Windows Server 2012, but odds are good that your

More information

Backup and Restore of CONFIGURATION Object on Windows 2008

Backup and Restore of CONFIGURATION Object on Windows 2008 Backup and Restore of CONFIGURATION Object on Windows 2008 Technical Whitepaper Contents Introduction... 3 CONFIGURATION Backup... 3 Windows configuration objects... 3 Active Directory... 4 DFS... 4 DHCP

More information

HP Integration with Veeam Backup and Replication. Mark Hambelton Veeam EMEA Alliances SE

HP Integration with Veeam Backup and Replication. Mark Hambelton Veeam EMEA Alliances SE HP Integration with Veeam Backup and Replication Mark Hambelton Veeam EMEA Alliances SE Agenda Overview of Veeam Backup and Replication v8 Veeam Explorer for Storage Snapshots Veeam Backup off Storage

More information

Mosaic Technology s IT Director s Series: Exchange Data Management: Why Tape, Disk, and Archiving Fall Short

Mosaic Technology s IT Director s Series: Exchange Data Management: Why Tape, Disk, and Archiving Fall Short Mosaic Technology s IT Director s Series: : Why Tape, Disk, and Archiving Fall Short Mosaic Technology Corporation * Salem, NH (603) 898-5966 * Bellevue, WA (425)462-5004 : Why Tape, Disk, and Archiving

More information

Best Practices in Business Recovery: Colocation or DRaaS? By Brien M. Posey

Best Practices in Business Recovery: Colocation or DRaaS? By Brien M. Posey Best Practices in Business Recovery: Colocation or DRaaS? By Brien M. Posey axcient.com 1 Introduction In the not-too-distant past, protecting an organization s data meant shipping backup tapes offsite

More information

Microsoft Exchange 2013 on VMware Availability and Recovery Options

Microsoft Exchange 2013 on VMware Availability and Recovery Options This product is protected by U.S. and international copyright and intellectual property laws. This product is covered by one or more patents listed at http://www.vmware.com/download/patents.html. VMware

More information

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011

Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Enterprise Storage Solution for Hyper-V Private Cloud and VDI Deployments using Sanbolic s Melio Cloud Software Suite April 2011 Executive Summary Large enterprise Hyper-V deployments with a large number

More information

Creating A Highly Available Database Solution

Creating A Highly Available Database Solution WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements

More information

Exchange 2010 Best Practices and Strategies for Backing Up and Restoring Exchange 2010 Environment

Exchange 2010 Best Practices and Strategies for Backing Up and Restoring Exchange 2010 Environment Best Practices and Strategies for Backing Up and Restoring Exchange 2010 Environment 1 Exchange 2010 Can Only Be Backed Up Using VSS Writers Microsoft: Windows Server Backup System Center Data Protection

More information

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform

Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Fault Tolerant Servers: The Choice for Continuous Availability on Microsoft Windows Server Platform Why clustering and redundancy might not be enough This paper discusses today s options for achieving

More information

NEW White Paper Expert Guide on Backing up Windows Server in Hyper-V

NEW White Paper Expert Guide on Backing up Windows Server in Hyper-V NEW White Paper Expert Guide on Backing up Windows Server in Hyper-V by John Savill, Microsoft MVP John Savill Microsoft MVP John Savill is a Windows technical specialist, an 11-time MVP, an MCITP: Enterprise

More information

Learn how to Backup Your Exchange Infrastructure

Learn how to Backup Your Exchange Infrastructure Learn how to Backup Your Exchange Infrastructure Niels Engelen Systems Engineer for Veeam Software (vexpert, VCP, CCNA) Johan Huttenga Solutions Architect for Veeam Software (MCSA, MCITP) Contents Executive

More information

Five Secrets to SQL Server Availability

Five Secrets to SQL Server Availability Five Secrets to SQL Server Availability EXECUTIVE SUMMARY Microsoft SQL Server has become the data management tool of choice for a wide range of business critical systems, from electronic commerce to online

More information

The Microsoft Large Mailbox Vision

The Microsoft Large Mailbox Vision WHITE PAPER The Microsoft Large Mailbox Vision Giving users large mailboxes without breaking your budget Introduction Giving your users the ability to store more e mail has many advantages. Large mailboxes

More information

The Data Center of the Future

The Data Center of the Future 2010, Enterprise Strategy Group, Inc. All Rights Reserved White Paper The Data Center of the Future By Mark Bowker and Lauren Whitehouse March, 2010 This ESG White Paper was commissioned by Veeam and is

More information

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity

Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity Maximizing Data Center Uptime with Business Continuity Planning Next to ensuring the safety of your employees, the most important business continuity task is resuming business critical operations. Having

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint

SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint SharePoint Virtualization and the Benefits of Modern Data Protection with Veeam Explorer for Microsoft SharePoint Chris Henley Microsoft Certified Professional, MCSE, MCSA and Veeam Product Strategy Specialist

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

The VMware Administrator s Guide to Hyper-V in Windows Server 2012. Brien Posey Microsoft MVMP @Veeam

The VMware Administrator s Guide to Hyper-V in Windows Server 2012. Brien Posey Microsoft MVMP @Veeam The VMware Administrator s Guide to Hyper-V in Windows Server 2012 Brien Posey Microsoft MVMP @Veeam About today s webinar Thought leadership content from an industry expert This webinar is recorded and

More information

A First Look at Windows Server 2012 R2 and Hyper-V

A First Look at Windows Server 2012 R2 and Hyper-V A First Look at Windows Server 2012 R2 and Hyper-V Brien M. Posey Modern Data Protection Built for Virtualization Although Windows Server has long been a solid server platform, it has lagged far behind

More information

STORAGE HOST-BASED REPLICATION. Buying Guide: inside

STORAGE HOST-BASED REPLICATION. Buying Guide: inside Managing the information that drives the enterprise STORAGE Buying Guide: inside 2 What you need to know about host-based replication 8 Special factors to consider Replication is now a key part of most

More information

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications

Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications Comparing Microsoft SQL Server 2005 Replication and DataXtend Remote Edition for Mobile and Distributed Applications White Paper Table of Contents Overview...3 Replication Types Supported...3 Set-up &

More information

High Availability Solutions for the MariaDB and MySQL Database

High Availability Solutions for the MariaDB and MySQL Database High Availability Solutions for the MariaDB and MySQL Database 1 Introduction This paper introduces recommendations and some of the solutions used to create an availability or high availability environment

More information

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0 Backing Up the CTERA Portal Using Veeam Backup & Replication CTERA Portal Datacenter Edition May 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may

More information

Nimble Storage Best Practices for Microsoft Exchange

Nimble Storage Best Practices for Microsoft Exchange BEST PRACTICES GUIDE: Nimble Storage Best Practices for Microsoft Exchange Table of Contents NIMBLE STORAGE OVERVIEW... 3 EXCHANGE STORAGE REFERENCE ARCHITECTURE... 3 Store Database and Transaction Log

More information

NSI Solutions with Microsoft VSS

NSI Solutions with Microsoft VSS Published: March 2004 Abstract With the introduction of Volume Shadow Copy Service (VSS) in Microsoft Windows Server 2003 and Windows Storage Server 2003 and the strength of NSI Software Double-Take you

More information

Nutanix Tech Note. Data Protection and Disaster Recovery

Nutanix Tech Note. Data Protection and Disaster Recovery Nutanix Tech Note Data Protection and Disaster Recovery Nutanix Virtual Computing Platform is engineered from the ground-up to provide enterprise-grade availability for critical virtual machines and data.

More information

EMC NetWorker Module for Microsoft for Exchange Server VSS

EMC NetWorker Module for Microsoft for Exchange Server VSS EMC NetWorker Module for Microsoft for Exchange Server VSS Version 8.2 Service Pack 1 User Guide 302-001-233 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published

More information

Windows Server Failover Clustering April 2010

Windows Server Failover Clustering April 2010 Windows Server Failover Clustering April 00 Windows Server Failover Clustering (WSFC) is the successor to Microsoft Cluster Service (MSCS). WSFC and its predecessor, MSCS, offer high availability for critical

More information

Access to easy-to-use tools that reduce management time with Arcserve Backup

Access to easy-to-use tools that reduce management time with Arcserve Backup Access to easy-to-use tools that reduce management time with Arcserve Backup In business, evolution is constant. Staff grows. New offices spring up. New applications are being implemented, and typically,

More information

Symantec Backup Exec 2014 Agents and Options

Symantec Backup Exec 2014 Agents and Options Symantec Backup Exec 2014 Agents and Options Data Sheet: Data Protection Overview enhance and extend Backup Exec features, capabilities, and platform support. Whether you need to protect VMware vsphere,

More information

Hyper-V: Microsoft s

Hyper-V: Microsoft s TechTarget Windows Media SearchWinIT.com SearchExchange.com SearchSQLServer.com SearchEnterpriseDesktop.com SearchWindowsServer.com SearchDomino.com LabMice.net Hyper-V: Microsoft s Approach to Server

More information