Zenith ARCA Administration Guide

Size: px
Start display at page:

Download "Zenith ARCA Administration Guide"

Transcription

1 Zenith Infotech, Ltd Zenith ARCA Administration Guide Administration & Troubleshooting the Zenith ARCA Date: 7/15/2009

2 Table of Contents 1 ABOUT THIS GUIDE WHO SHOULD USE IT TYPOGRAPHICAL CONVENTIONS SYSTEM OVERVIEW PURPOSE SCOPE CHANGE LOG DESCRIBING THE SYSTEM KEY FEATURES INVENTORY ENVIRONMENT SYSTEM OPERATIONS INSTALLATION LOGGING IN FOR THE FIRST TIME ARCA COMPUTER MANAGEMENT AND INSTALLED APPLICATIONS ARCA UTILITIES SERVER BACKUP AGENT BACKUP JOB CONFIGURATION & MODIFICATION - ARCA VERIFYING BACKUPS ARCA BACKUPS EXPLAINED ON-DEMAND BACKUP JOBS EDITING BACKUP JOBS CONFIGURE BACKUP ALERTING RESTORING FILES AND FOLDERS MOUNTING A BACKUP IMAGE, MOUNT POINT, READ-ONLY MOUNTING BACKUP IMAGES USING THE CONTEXT MENU RESTORING FILES AND FOLDERS RESTORING BACKUP IMAGE FILES DISMOUNTING BACKUP IMAGE FILES ARCA ADMINISTRATION...59 Copyright 2009 Page 2 of 227

3 8.1 EXCHANGE RECOVERY TOOL BACKUP MANAGEMENT CONSOLE ARCA HEALTH CHECK CHAIN VERIFICATION EMERGENCY CLEAN UP FILE VERIFICATION BACKUP CHAIN CONTINUITY CHECK VIRTUAL MACHINE STANDBY SERVER MANAGING VIRTUAL SERVERS SUPPORT ARCA SUPPORT PORTAL REPORTING DASHBOARD BACKUP ANALYSIS BACKUP HISTORY SERVER FAILOVER PROCESSES ONSITE SERVER FAILURE SITE LEVEL FAILURE BARE METAL RESTORE BARE METAL RESTORE EXPLAINED TROUBLESHOOTING TABLES APPENDIX A REFERENCE DOCUMENTS APPENDIX B GLOSSARY OF TERMS Copyright 2009 Page 3 of 227

4 1 About this guide This document is divided into the following chapters: Chapter 1, System Overview. Chapter 2,, reviews common administrative tasks. Chapter 3, ARCA Troubleshooting gives common errors and resolutions. Chapter 4, Best Practices, explain best practice deployments. Appendix A Reference Documents Appendix B Glossary of Terms 1.1 Who Should Use It This guide is intended for administrators with advanced knowledge and experience with system infrastructure and backup systems: Administrators: The administrator will learn how to administer and troubleshoot the ARCA. This guide assumes that you have knowledge of Windows and backup concepts. Copyright 2009 Page 4 of 227

5 1.2 Typographical Conventions This document uses the following typographical conventions: Command and option names appear in bold type in definitions and examples. The names of directories, files, machines, partitions, and volumes also appear in bold. Variable information appears in italic type. This includes user-supplied information on command lines. Screen output and code samples appear in monospace type. In addition, the following symbols appear in command syntax definitions. Square brackets [ ] surround optional items. Angle brackets < > surround user-supplied values. Percentage sign % represents the regular command shell prompt. Pipe symbol separates mutually exclusive values for an argument. Copyright 2009 Page 5 of 227

6 2 System Overview 2.1 Purpose This chapter includes the following topics: About the Zenith ARCA Describing the System Administration Troubleshooting Best Practices Appendix 2.2 Scope We will learn about maintenance and administration of the Zenith ARCA. Copyright 2009 Page 6 of 227

7 2.3 Change Log Date Changes Document created Added advanced editing of backup jobs and Ontrack, added event log tables Added Virtualization Troubleshooting section Added Failover Scenarios Copyright 2009 Page 7 of 227

8 3 Describing the System The Zenith ARCA is an all-in-one business continuity appliance which includes all the software and hardware necessary to protect your Windows Server infrastructure. 3.1 Key Features The Zenith ARCA is intended for use in Windows Server environments (Windows 2000 Server and above). The features include: Standby Server - Allows the user to perform server virtualization directly from backup files in the event of a disaster. The sandbox modes allow for testing against your servers and validating images. Backup & Recovery Allows for partition level snapshots as often as every 15 minutes for multiple recovery points. We utilize a customized version of Storagecraft s Shadowprotect to perform block level backups and recover using drag & drop functionality. Mailbox & Message Level Recovery Using Ontrack PowerControls, restore Exchange databases and objects by only backing up the partition where your databases reside. No message level backup required. Restore to a.pst or live Exchange Server via the easy to use GUI interface. Centralized Management Console Configure backup and disk alerting, view reports, and perform administrative tasks from one central dashboard. Bare Metal Restore Utilizing our included Bare Metal Restoration CD, boot to a restore environment to run disk checks and restore your backups to identical or dissimilar hardware, even virtual environments. Replication Copy and synchronize your backups to a local or network destination. Our included replication software allows replication to and from another ARCA or vault. 3.2 Inventory The following components must be pre-installed on the ARCA: ARCA Software Suite Breakthrough Copy System Breakthrough Vault Sun xvm VirtualBox Zenith Business Continuity System Copyright 2009 Page 8 of 227

9 KeyFile Maker Ontrack Power Controls 4.2 The following components must be installed on the Vault server. If you have a Vault from Zenith, this software will be preinstalled: Breakthrough Copy System Breakthrough Vault ARCA Software Suite Sun xvm VirtualBox KeyFile Maker Ontrack Power Controls 4.2 On the target backup server the following must be installed after running the Backup Agent Install: ARCA Backup Agent Zenith Business Continuity System On the target backup server the following services must be started after running the Backup Agent Install: ARCAScheduler ClStateBackAsst (Clean State Backup Assistant) ShadowProtect Service StorageCraft Shadow Copy Provider You must have an administrative account to install and authenticate to the target backup servers. The server must have access to the D$ share on the ARCA for writing backup files. Please contact support if any components are missing or not installed. 3.3 Environment Before continuing, check to verify that you have: Local or Remote Access to the ARCA Internet Connection Copyright 2009 Page 9 of 227

10 LAN Connectivity to the destination servers WAN Connectivity for replication to ARCA or Vault 3.4 System Operations General Operational Guidelines To backup your servers from the ARCA, a backup agent must be installed. For installation instructions see the Zenith ARCA Implementation Guide. Warning: The ARCA cannot backup itself or other ARCA appliances. To protect your ARCA, backup the configuration settings via Restore Configuration. If the ARCA backup agent software is installed on the appliance, settings will be overwritten and you must contact support..application logs are created in C:\Program Files\ZenithARCA\ApplicationLog. You must have network connectivity on the LAN when backing up servers. We do not recommend backing servers up over the WAN. For replication, you will need to open ports in your firewall. The default client port is (BTP Breakthrough Transfer Protocol). Default vault ports are (TCP and UDP) and (BTP). The ARCA is setup in a workgroup configuration (recommended), but it can be joined to a domain. The default admin user accounts and passwords are: administrator and restore, password arca. We recommend changing the default passwords for security. You can use any administrative account to login, but a dedicated virtualization account is recommended. The ARCA software runs under the Local System account on the ARCA. Any administrative account can be used to create the backup and authenticate to the backup agents. We recommend using the same account for ease of administration. Copyright 2009 Page 10 of 227

11 After the backup agent is installed on destination servers, the backup agent runs under the Local System account. For alerting, you will need an SMTP server to relay messages. The ARCA does not include an SMTP server. Documentation is available from our website Support is available through our portal Copyright 2009 Page 11 of 227

12 4 Installation 4.1 Logging in for the First Time The ARCA will boot to the Windows login screen. You can login with one of the default accounts, administrator or restore, password arca. You will be prompted to change the password. Do not forget the password if you decide to change it. Once you login you will presented with the Windows user interface. Warning: A dedicated account is recommended when performing server virtualization tasks. See the Standby Server section for details. Configure your Network Settings by assigning static IP addresses to the LAN Connections Verify all pre-installed applications. Please see the Zenith ARCA Getting Started Guide for initial setup information. 4.2 ARCA Computer Management and Installed Applications We will review the system services and event viewer settings. ZenithARCA Event Log A custom event log which reports all triggered ARCA events. Installed Applications ARCA Breakthrough Copy System KeyFile Maker Ontrack PowerControls 4.2 Sun xvm VirtualBox Zenith Business Continuity System Copyright 2009 Page 12 of 227

13 Installed Services These services should be in a Started state for proper operation: ARCAScheduler Breakthrough Scheduler Storagecraft Image Manager Event Viewer Double-click each event to view its properties. Copyright 2009 Page 13 of 227

14 5 ARCA Utilities Server Backup Agent These utilities are installed on servers with the ARCA Backup agent. For installation instructions please see the ARCA Implementation Guide ARCA Backup Agent Doctor Run ARCA Backup Agent Doctor to verify list of backup agent components and services. To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > ARCA Backup Agent Doctor > ARCA Backup Agent Doctor Copyright 2009 Page 14 of 227

15 Agent Doctor launches Click Start to verify agent components. Blue status = success or service running Red = fail or service stopped Click Finish to close health check, following prompt appears. Copyright 2009 Page 15 of 227

16 Click Yes to close exit prompt. If errors are found: Attempt to restart any stopped services. Reregister failed componenets using regsvr32 in the command line. Example: Register zrvbox.dll Note: If errors cannot be resolved contact support Standby Server Helper Run Standby Server Helper according to the virtualization mode. The Standby Server Helper ensures your IP and MAC address settings match the original server. Run the utility when machines are in virtual mode. To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Standby Server Helper Copyright 2009 Page 16 of 227

17 Select Live Mode. This can be run in Sandbox Mode but it is not required. Is server running in virtual mode? prompt appears, click Yes. Operation completed successfully. If No or Cancel is selected, no operation is performed Agent Connectivity Check Verify IP connectivity from the server backup agent to ARCA via Agent Connectivity Check. To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Agent Connectivity Check Copyright 2009 Page 17 of 227

18 The Connectivity Check window opens. Verify the ARCA Name. If the name is incorrect, type the correct name and click Test Connection. You can also check by IP address. Copyright 2009 Page 18 of 227

19 Note: If you are receiving backup or communication errors, after the connection is successful click Update Setting to update ARCA configuration settings. Note: If you receive a Connected successfully prompt, retry your backup job. You may have an authentication failure from the ARCA. Login to the ARCA and verify connectivity through the Backup Management Console and re-authenticate to the server. Copyright 2009 Page 19 of 227

20 If it fails with ERROR in connection, retry the steps above. Note: If you still cannot connect, archive your current backups, reinstall the backup agent and retry the backup job. If the issue is not resolved after retrying these steps contact support Backup Job Creator Verify backup job was created during backup agent setup To run: Go to Start > All Programs > Accessories > System Tools > ARCA Backup Agent > Backup Job Creator Backup Job Creator launches. Copyright 2009 Page 20 of 227

21 Click Next to start job creator. Verify the Backup job is already present prompt appears (the job was configured during agent install) Click OK to close. Copyright 2009 Page 21 of 227

22 5.1.5 Clean State Backup Assistance Clean state backup (CBSA) must be configured on the server side. CBSA is Zenith s version of VSS (Volume Shadow Copy Service). If an application is not VSS-aware, run CSBA to force applications to flush in-memory transactions to disk. It is disabled by default. Launch Clean State Backup Assistance from Start Menu > All Programs > Accessories > System Tools > ARCA Backup Agent > Clean State backup Assistance This launches Clean State backup Assistance (CBSA). CBSA is disabled by default. Copyright 2009 Page 22 of 227

23 If there are no applications that require CSBA, click Close. To verify if an application is VSS aware check with your application vendor. Common applications that are VSS aware include the Windows System State, most system services, and Microsoft Back Office 2003 and above (this includes Exchange and SQL). Version of Back Office 2000 applications and earlier are not VSS aware. If any applications require CSBA click Proceed. This opens Clean State Backup Configuration. Copyright 2009 Page 23 of 227

24 Define Schedule: Daily or Weekly If Weekly is selected, Schedule Day option appears. Choose a day of the week to run. View Essential Services or View All Services, essential services are highlighted yellow. Copyright 2009 Page 24 of 227

25 Clicking the help? button explains Essential vs. All Services. After CSBA stops the services, they will auto start within seven minutes. Copyright 2009 Page 25 of 227

26 Check the service or services to enable CSBA (IIS Admin Service in the below example) Click Save, the CSBA Backup Configuration window stating the following services have been selected appears: Confirm you choice and click Save & Close. Saving enables CSBA for the selected services. Copyright 2009 Page 26 of 227

27 To return to scheduler click Cancel. When CSBA is reopened the state is enabled with the services selected. Click Proceed to view status Verify ARCAScheduler service is started. The service runs under the Local System account. If CSBA is enabled, ensure the ClStateBackAsst service is running. Copyright 2009 Page 27 of 227

28 Copyright 2009 Page 28 of 227

29 6 Backup Job Configuration & Modification - ARCA After server configuration is complete, you must make a connection to the server, verify the backup job schedule, and enable the backup job. The backups are disabled by default. Login to the ARCA Launch the Backup Management Console from Start > All Programs > ARCA > Backup Management Console or through the ARCA Dashboard, section. Copyright 2009 Page 29 of 227

30 This launches Backup Management Console. Connect to servers and manage backup jobs from this interface. If not servers are added to the console the above prompt appears. Copyright 2009 Page 30 of 227

31 You can also open the Backup Management Console via the system tray shield icon The shield is blue when connected to a server, red when disconnected To connect to the installed server, it must be added under Network View. This adds a default node called New node %number% in a disconnected state. Copyright 2009 Page 31 of 227

32 Enter the following information to connect to the server under Server Properties : Server Name NetBIOS Name Server Address NetBIOS Server Name or IP (can be same as server address) Domain Name leave blank if the server is connected to a workgroup User Name admin user account name Password admin user account password Copyright 2009 Page 32 of 227

33 After server information is entered click Connect, this changes the Status from Disconnected to Connected and the server connects to the management console (see below screenshot). Copyright 2009 Page 33 of 227

34 After the server is connected, navigate to the Backup Jobs tab. You will see the backup job created in a disabled state. The next step is to enable the backup job. To enable, right click the job and select Enable. Copyright 2009 Page 34 of 227

35 Job status changes from disabled to enabled. Backups will start running based on the specified schedule defined during agent setup. You can view and edit the job schedule by right-clicking Edit Schedule. The job status changes to disabled. If Use VSS is checked under Additional Incremental Backups every backup will be VSS. Please refer to the Zenith ARCA Administrator s Guide for additional job configuration options. 6.1 Verifying Backups After backups are enabled you must verify that they are running according to schedule. If alerting was configured, you will receive backup alerts depending on the template configuration. Backup Jobs have the following statuses: Disabled job disabled, on hold Initializing job initialing (changing state) Queued job queued, job is in this state between scheduled job runs Running job running Aborting job cancelled Successful job completed successfully Failed job failed Copyright 2009 Page 35 of 227

36 Job Schedule Job Status Copyright 2009 Page 36 of 227

37 To view backup history: Click Backup History tab Click Details for additional job information. For troubleshooting failed backups, please see the Zenith ARCA Troubleshooting Guide Backup logs are written to the server under: \\%servername%\c$\program Files\Zenith\Zenith Infotech\Logs The Backup Management Console is just a console to view those logs. For archive purposes, logs can be copied and parsed separately. The capacity to view the last backup is available through the ARCA Reporting Dashboard and ed via template configuration. 6.2 ARCA Backups Explained The ARCA utilizes ShadowProtect for backup snapshots. All backups reside on the ARCA under D:\Backup. Folders are named with a UID (unique identifier) followed by server name. Files within each folder are named with the partition name followed by a UID based on run. Copyright 2009 Page 37 of 227

38 Examples: Server Names: pmg-win2k3 and zenexch Folder contents zenexch The first backup of a server is the base or full backup or *.spf file, Subsequent backup files are incremental files based upon the full backup. If you selected backup encryption, an *.spk (keyfile) will be in each directory Any files with the word Migration in them were used for Standby Server Virtualization ARCA Backup Retention Policy: Base Full backup (*.spf) All Monthly Incremental backups (*.cm.spi) Five weekly incremental backups (*.cw.spi) Copyright 2009 Page 38 of 227

39 Fourteen daily incremental backups (*.cd.spi) Two days of intra-daily incremental backups (*.cd) The following chart explains each file type: Copyright 2009 Page 39 of 227

40 The following chart explains each compression level: Backup Encryption When you create a backup image file, either manually or through a scheduled job, you can choose to protect the file using password protection and encryption of the backup image file. This is useful if the backup image files will be stored on a network or removed off-site and you need to protect against unauthorized access and use. If you select to protect the backup image file, you must specify the correct password in order to mount or restore the backup image. When you enter a password for the backup image file, you may use alpha and numerical characters. You must confirm the password by typing it again. Note: Passwords are case sensitive. When you mount or restore a password encrypted backup image file, you will be prompted for the password. Note: If you do not enter the correct password, or you forget the password, you will not be able to access the backup image file. Make sure the password is stored in a secure location. Zenith has no method for gaining access to encrypted backup image files. You can select from three methods when encrypting a backup image file. RC bit (Fast) this encryption option is faster than AES 128 bit, but the resultant image is less secure. AES 128 bit (More Secure) this encryption option is more secure than RC bit, but will require longer to encrypt the image. AES 256 bit (Most Secure) this encryption option is the most secure but will also require the most time to encrypt the image file. In addition to bit strength, the password used can affect the security. The following guidelines apply to ensure greatest security with password encrypted backup image files. Use at least eight characters. Use a random mixture of characters, upper and lower case and numbers. Don t use a word found in the dictionary. Change your password regularly or if you suspect your password has been compromised. Copyright 2009 Page 40 of 227

41 6.6 On-Demand Backup Jobs If a backup has failed, or you want to run a backup on-demand. Connect to the Backup Management Console and connect to the server in question. Select the Backup Jobs tab Right click the server and select Execute (Incremental) The only time Execute (Full) should be selected is if the first full backup failed or you want to start a new backup chain. Warning: If another full backup is run all subsequent incremental backups will run off of this new full backup. Your current backup chain will stop. Files can still be restored from the older chain but the disk space on the ARCA will fill quicker than anticipated. 6.7 Editing Backup Jobs After a backup job is configured you can edit the schedule or edit the job properties. Connect to the Backup Management Console. Copyright 2009 Page 41 of 227

42 6.7.1 Edit Schedule Console and connect to the server in question. Select the Backup Jobs tab Right click the backup job and select Edit Schedule Job gets disabled automatically at this point. Edit Job Schedule window appears. The job schedule is based on agent install settings. After job schedule changes are made click OK to apply settings. Backup job is automatically re-enabled Edit Job Options: VSS Incremental Backups Copyright 2009 Page 42 of 227

43 Additional Incremental Backups Start taking backups at this time Stop taking backups at this time Minutes between backups interval between job execution Recommend setting: same schedule for VSS and Additional Incremental Backups. Note: Notice the Schedule options are greyed out, this is by design. The ARCA does one full backup and scheduled point in time incremental backups appended to the full backup (see ARCA Backups Explained) Edit Backup Job Properties After a backup job is configured you can edit the schedule or edit the job properties. The backup job settings are defined during agent setup. Connect to the Backup Management Console. The job will be automatically disabled and re-enabled during the editing process. Select the Backup Jobs tab Select the backup job and press Edit Copyright 2009 Page 43 of 227

44 Backup Job Editor launches. Press Next. This will bring up the volumes to backup screen. You can select/deselect volumes to backup. Press Next to continue. Now you can select a backup image destination. Click Browse to manually edit or use the drop down to select pre-defined destinations. Press Next to continue. Copyright 2009 Page 44 of 227

45 Warning: For alerting and replication you must match the backup destination to the following settings: \\%ARCAName%\%Volume%\%Backup%\%Servername% Specify the backup schedule screen appears. You can select the backup schedule (see Edit Schedule section for details). Press Next. Copyright 2009 Page 45 of 227

46 Backup options screen is displayed. Options are compression, password, and advanced. These values are predefined during agent setup and are grayed out by design. Press Next after options are defined. Advanced Options default options are recommended Backup throttle system resources (performance throttling) Image caching, self-healing Commands Warning: Editing Advanced options is not recommended. Copyright 2009 Page 46 of 227

47 This brings up the Wizard Summary. Review the backup job summary and click Finish to complete your edits. You are returned to the backup job. Warning: Do not select Execute Now. If this option is selected you will start a new full backup and your existing chain will be stopped Editing Destination To edit a backup job destination, select the Destinations tab from the center panel of the main screen. Console and connect to the server in question. Select the Destination tab Highlight the Network Share and click Edit. The Destination window appears. Click Browse to edit the backup destination. Select Connect radio buttons to change authentication credentials. Copyright 2009 Page 47 of 227

48 6.8 Configure Backup Alerting If you require an alert sent after every job success and/or failure you may configure it through the Backup Management Console directly. There are no additional filters with this option. The ARCA does not include an SMTP server. You must have access to a valid SMTP server to relay alerts. Depending on your SMTP server configuration, the ARCA IP address may need added to the allow relay list. To setup alerts: 1. Backup Failures are sent from the ARCA Configuration Panel. You must assign an alert template to each job to enable this functionality. 2. Enable Agent Options through the Backup Management Console a. Open the Backup Management Console from the ARCA Dashboard >. b. Connect to your server under Network View c. Go to the "Options" menu and select "Agent Options" d. Fill out the required information 1. SMTP Server 2. From Address (This can be any address) 3. To Address Copyright 2009 Page 48 of 227

49 4. User Name (optional) 5. Password (optional) 6. Non-default SMTP Port (optional) 7. Send on Success (On/Off) 8. Send on Failure (On/Off) e. Click "OK". This sends a test to the defined address. You will receive an for every success/failure of the job by server partition depending on the options selected above. Depending on how often your backups run, you will receive multiple s a day. Example subject of success: ShadowProtect backup success on PMG-WIN2K3 Body: start time: 3/29/2009 4:51:22 AM finish time: 3/29/2009 4:52:29 AM source path: (C:\) NTFS destination path: \\ZNAS-PMGTRAININ\D$\Backup\97F1DE95C8D2422D-pmg-win2k3\C_VOL-b001-i015.spi Example subject of failure: ShadowProtect backup failure on PMG-WIN2K3 Body: 29-Mar :53:43 service 100 service (build 42) started job manually as incremental 29-Mar :53:43 service C F0-716F-A575-A3CD 29-Mar :53:43 service 100 backup volume C:\ (NTFS) 29-Mar :53:43 service 509 Cannot get access to destination object Copyright 2009 Page 49 of 227

50 7 Restoring Files and Folders You can restore individual files and folders using two methods. You can restore files and folders by using the Explore Backup Wizard while running in Windows, or you can restore files and folders from the Recovery Environment. The Explore Backup wizard allows you to restore files and folders from an existing backup image. This wizard can be run from Windows or from the Recovery Environment. If the operating system is unable to boot, you must boot to the recovery environment to mount and restore files and folders. Table 11 below shows the restore method options and when a particular option should be used based on the state of the computer. Note: To mount and restore data from an incremental backup image, you must have all previous incremental backup image files and the initial full backup image. If any backup images are missing from the set, mounting and restoring will be impossible. Note: Backup Management will automatically associate the files required to browse and restore a specific point-in-time backup image. You are only required to select the point-in-time you want to explore. 7.1 Mounting a Backup Image, Mount Point, Read-Only The mount utility can mount a backup image file as a drive letter on your computer. When a backup image is mounted as a drive letter, the backup image will appear and behave as a drive letter on the computer with all the properties of the original volume. The mount utility can mount a backup image file as a mount point, which is a directory on an NTFS file system. Mount points overcome the limitation on the number of available drive letters and allow more logical organization of files and folders. The mount utility mounts the backup image as read-only. By mounting a backup image as read-only you can be assured that the backup image can not be changed while providing access to the image file to end users for file or folder recovery. Mount a backup image as read-only when: You want to recover files from an existing backup You want to view the contents of a backup You want to run other applications on an existing backup image such as a storage resource manager Mounting a Backup Image as Writeable You can also mount backup image files as writeable. By mounting a backup image as writeable, you have the ability to remove files from the backup image, such as viruses or other malware. You can also add files to the backup image file. Mount a backup Image as Writeable when: You want to update the security on the image file; Copyright 2009 Page 50 of 227

51 You want to update an existing image file, such as removing a virus. You have access issues when restoring data. 7.2 Mounting Backup Images Using the Context Menu When exploring files using Windows Explorer, the Mount and Quick Mount options are available when right clicking on any backup image file, for a previously mounted image file, you can right click and choose Dismount or Quick Dismount Quick Mount When you right click on a backup image and select Quick Mount, the backup image will be mounted as read-only using the next available drive letter. You can select multiple image files to quick mount, each image file will be assigned the next available drive letter Mount When you right click on a backup image and select Mount, the Browse or Restore Files Wizard will initiate. Using the Wizard to mount the backup image, you will be provided with the options of mounting as a mount point or drive letter and the read-only options. If your backup file is encrypted a prompt appears to enter the password before the file is mounted. Note: You can simultaneously mount multiple backup image files, however, you must go through the Mount Wizard for each backup image you wish to mount, or alternatively, you can select to quick mount multiple backup images at once. Copyright 2009 Page 51 of 227

52 7.3 Restoring Files and Folders 1. To explore a backup image, select Explore Backup under Tasks in the left panel of the main screen or select Explore Backup from the center panel of the main screen. The third method to start the wizard is to select Tasks > Explore Backup from the Menu Bar. This will start the Explore Backup Wizard. Press Next to Continue. 2. This will bring up the Backup Image File Name dialog screen. Select the image file you want to browse. You can either provide a path name to the file or click the Browse button to locate a file. Copyright 2009 Page 52 of 227

53 If your backup file is encrypted a prompt appears to enter the password before the file is mounted. Enter the encryption password and click OK. To view the image properties. Note: Once you have selected a backup image file to browse, the properties for that backup image will be displayed. You can view information about the image file, originating partition, disk information and originating machine information. Note: If you have selected a backup image file to which you have already saved changes, you will see a list of the dependencies of that image file, along with further information about the image and the originating machine from which the backup came. You can also view the original disk layout from the image file you selected. 3. This brings up the Backup Image Dependencies dialog screen. This dialog presents all the points-in-time in the backup image set you selected. You can verify your selection or select another point-in-time from the image set. You can view information about the image file, originating partition, disk information and originating machine information. After selecting the point-in-time, press the Next button to continue. Copyright 2009 Page 53 of 227

54 4. This will bring up the Specify Options for Exploring an Existing Backup Image dialog screen. Select the radio button corresponding to the method you wish to use to mount the image. We recommend mounting the file as the next drive letter for ease of use. Select your explore options and press Next. Copyright 2009 Page 54 of 227

55 Note: To mount the backup image as a writeable volume, simply uncheck the box beside Mount Backup as Read-Only. 5. This brings up the Wizard Summary (see Figure 34). Review the summary and press Finish to mount the backup image. After the backup image has been mounted, the image will automatically be brought up in Windows Explorer as a mounted volume. 6. With the backup image mounted, you may browse the contents of the volume as you would a regular volume, selecting files and folders you wish to copy and restore to a previous point-in-time. 7.4 Restoring Backup Image Files To restore volumes boot to the Recovery Environment to perform the restore. This option must be used when restoring the system volume where the operating system resides. You can start the Restore Wizard by clicking the Restore button in the left panel of the main screen or clicking on the Restore Wizard from the center panel of the main screen. This can be done from the Recovery Environment CD. 1. To start the Restore Wizard, select Restore under Tasks in the left panel of the user interface or select Restore Wizard from the center panel of the main screen. This will start the Restore Wizard. Click Next to Continue. 2. This will bring up the Backup Image to Restore dialog screen. You will need to locate the image file you wish to restore from a destination location. These destination locations can be a local directory or network share. Note: If the image file you wish to restore is located in a previously defined destination location, then select the destination and locate the backup image set from the list. The next dialog screen will let you select the specific point-in-time associated with the backup image set. Copyright 2009 Page 55 of 227

56 Note: If the image file you wish to restore is not located in a previously defined destination location, you will need to browse to the location of the image file you want to restore. 7.5 Dismounting Backup Image Files Once a backup image file has been mounted using the mount utility, it will remain mounted until it is dismounted. You can dismount a mounted backup image using the Backup Image Dismount Wizard, which is available through the management console or through a context menu option that is available on mounted backup image files. This wizard guides you through dismounting a backup image you have previously mounted and assigned a drive letter or mount point location. The wizard will also help you save changes made to backup images that were mounted as a writeable image file Dismounting Backup Images Using the Context Menu You can dismount a mounted backup image file by right clicking on the mounted drive or mount point from Windows Explorer and selecting one of two dismount options from the context menu. The options are Dismount or Quick Dismount which are described below Dismount When you select Dismount from the context menu of a mounted backup image file, the Backup Image Dismount Wizard will start and walk you through the steps of dismounting the image file and giving you the option to save changes made to the mounted backup image file if it was mounted as a writeable image Quick Dismount When you select Quick Dismount from the context menu of a mounted backup image file, the dismount utility will dismount the mounted backup image file without any further action or dialog. The image will be dismounted without saving any changes made to the mounted image file. Copyright 2009 Page 56 of 227

57 Note: Quick Dismount will dismount a backup image file without saving any changes made while the backup image file was mounted. If you wish to save changes, you must mount the backup image file as writeable and then dismount using the Backup Image Dismount Wizard and save changes Dismounting a Backup Image File Using the Backup Image Dismount Wizard 1. To start the wizard click Dismount Backup Image from the left pane of the main screen or select Tasks > Dismount Backup Image from the menu bar. This will bring up the Backup Image Dismount Wizard welcome screen. 1. Press Next to continue. This will bring up the Mounted Backup Images dialog screen. 2. Select the backup image volume you want to dismount by placing a check in the box next to the volume. You can also view the properties of the mounted image file in the lower window. Press Next to continue. Copyright 2009 Page 57 of 227

58 3. This will bring up the Backup Image dismount Options dialog screen. If you have selected a volume that was writeable, you will have the option to save the changes you have made to that volume while it was mounted. You can save the changes to an incremental file upon dismount. 4. Select whether you want to save the changes made to the mounted volume by placing a check mark in the Save changes to incremental file box. You can rename the file by double clicking on it under the Incremental Name section of the screen. Press Next to continue. 5. This will bring up the Backup Image Dismount Summary dialog screen. View the summary to ensure everything is correct and press Finish to dismount the volume. Note: Backup images that have been mounted will be dismounted after a reboot or by using the Backup Image Dismount Wizard from the main screen. Copyright 2009 Page 58 of 227

59 8 utilities are accessed via the ARCA Dashboard. This section contains includes the Backup Management Console, Exchange Recovery Tool, Verification Tools, and Emergency Clean Up Exchange Recovery Tool - Ontrack Power Controls, view and restore exchange objects Backup Management Console view and edit backups, restore backup files ARCA Health Check verifies all system services and processes are running for proper operation Chain Verification - verifies the backup chain of a selected file. This runs a chain dependency verification of all files in the backup chain up to the selected file for consistency. Emergency Clean Up deletes files that are no longer needed per server File Verification verifies the consistency of a selected backup file. Backup Chain Continuity Check - matches all the GUID entries of a selected backup file up to the base to ensure the chain is valid. Copyright 2009 Page 59 of 227

60 8.1 Exchange Recovery Tool View and restore exchange objects using the Exchange Recovery Tool. The ARCA utilizes Ontrack Power Controls. For the utility to access backups, a point in time backup file must be mounted, see section 12.2 Backup Management Console Explore Backup for instructions. We will go over the options and how to browse and restore objects and databases. To launch the exchange recovery tool navigate to the Start Menu > All Programs > ARCA > > Exchange Recovery Tool. The Exchange Recovery Tool can also be launched through the ARCA Dashboard. From the dashboard: Click Launch Exchange Recovery Tool Copyright 2009 Page 60 of 227

61 Copyright 2009 Page 61 of 227

62 This launches Ontrack Power Controls. Close the Data Wizard if it launches on start-up. Icon View Source Icons (left to right) Open Source open source backup file Open Target PST open target pst file Open Target Exchange Server connect to target Exchange Server Open Target CAS open target content analysis file Copy copy selected exchange objects Paste paste selected exchange objects Export export selected exchange objects in msg or txt format Find search exchange objects by specified criteria Message authors or readers Subject Date Keyword(s) Attachment(s) Preview Pane enable/disable message preview pane View Help launches PowerControls help Kroll Company on the Web launches (makers of Ontrack) Message Table View shows all folders that reference a single message Attachment Table View shows all messages that reference a single attachment Conversation View allows the administrator to see a histogram of all replies or forwards associated with a given message to analyze the conversation thread Note: Source PST and CAS files are not supported in the ARCA version of Ontrack PowerControls Copyright 2009 Page 62 of 227

63 8.1.1 Exchange Recovery - Source Options In the following sections we will review how to restore messages or mailboxes. After you have successfully mounted a backup file that contains your Exchange database file and log files you can restore data. After a source is opened, you can restore data, search the message store, view store properties and create reports. Launch Ontrack PowerControls Ontrack PowerControls opens. To begin open the source file. Click Open Source button, or File > Open Source Select Source Files window opens. Copyright 2009 Page 63 of 227

64 Browse to the source (*.edb) and log file path (*.log). You can also open an existing pst file. Note: Multiple source files can be open at one time The log file path should be automatically filled in if the matching logs are where the database expects them to be and that location is mounted. If the Temporary File Path is empty recreate it when prompted. Exchange default installation path on source server: C:\Program Files\Exchsrvr\MDBDATA The default mount path will be the drive letter selected when mounting, in our example: F:\Program Files\Exchsrvr\MDBDATA Default Exchange database files (you may have additional databases depending on your environment): Copyright 2009 Page 64 of 227

65 priv1.edb default private store contains user mailboxes pub.edb default public store contains public folders tmp.edb temporary workspace for processing transactions, contains temporary information that is deleted when all stores in the storage group are dismounted or the Exchange Information Store service is stopped Warning: DO NOT SELECT TMP.EDB FOR RESTORE (you will receive an error) The Exchange database will load in the Source window. Additional icons are now available. Expand the source database to browse to an individual mailbox, message or other object. Copyright 2009 Page 65 of 227

66 Double-click an object to open it. View the message details including any attachments. Click the paperclip icon to save attachments Message Options Right click a message, options are: Integrity Check checks object integrity Open open object Copy copy object Select All select all objects Copyright 2009 Page 66 of 227

67 Export export object to.msg or.txt file Message Views change views (see views explanation in above section) Message Table View Attachment Table View Conversion View Export any Exchange object up to the database (example below) to a selected location by typing the path or browsing to the export destination. Choose to export in.msg or.txt format and click Export Export Progress window appears. When the export is finished, you can Print or Save the report. Click Close to return to PowerControls Copyright 2009 Page 67 of 227

68 Note: If you are exporting more than once the files WILL be overwritten if the path is not changed. These options are also available from the menus and icons above and apply to all Exchange objects (including stores) Additional Store options: o Stores (source database) Properties and Create Reports Parent Objects (Calendar, Contacts, Inbox, etc.) Properties Copyright 2009 Page 68 of 227

69 To close the source store right click and select Close Store or go to the root Sources and click Close All Stores. You can also close stores via the File menu Exchange Recovery - Target Options After a target destination is opened, you can restore data from opened source files to a.pst, content analysis file (.cas), or target Exchange Server. Icon View Target Expand the source database to browse to an individual mailbox, message or other object. Double-click an object to open it. View the message details including any attachments. Click the paperclip icon to save attachments. Copyright 2009 Page 69 of 227

70 Message Options Right click a message, options are: Open open object Delete open object confirm prompt appears on delete Paste paste object Paste Special paste object maintain the directory structure of restored items Select all select all objects at the current level Delete Prompt Copyright 2009 Page 70 of 227

71 Additional Store options Rename & New Folder To restore to a target ensure the source file is open. Then open the destination target. Multiple destinations can be open at one time. You can connect to only one live Exchange Server at a time. If you attempt to connect to an additional live Exchange Server while a server is already open, the current server connection closes Target Types: a. PST To open a target.pst click the Open Target PST icon or through the file menu Browse to the.pst file and click Open b. CAS To open a target.cas click the Open Target CAS icon or through the file menu. Browse to the.cas file and click Open Copyright 2009 Page 71 of 227

72 c. Exchange Server Click Open Target Exchange Server button, or File > Open Target Exchange Server The Connect to Exchange Server window opens Type the mailbox and server name to connect to and click OK. Click Cancel to close. The Connect To Public Folders option is selected by default. This feature allows you to open public folders as a target for restoring public folders or messages. If you do not want to restore to public folders, deselect this check box. Copyright 2009 Page 72 of 227

73 If this is the first time authenticating to the Exchange Server, the following connection prompt appears while processing the target file. Enter administrative credentials for the Exchange Server mailbox and click OK. The prompt may appear again, which requires you to reenter this information. Copyright 2009 Page 73 of 227

74 After the target file is processed, the Exchange Server opens in the target window. This is the live Exchange Server and any changes made here will affect the live server. To restore from the source to the destination, export or copy and paste the Exchange Object(s). Hold down the Ctrl button to select multiple objects at one time. Copyright 2009 Page 74 of 227

75 Copy Progress window appears. When the export is finished, you can Print or Save the report. Click Close to return to Powercontrols Copyright 2009 Page 75 of 227

76 To close target store right click and select Close Store. If multiple target stores are open, they must be closed individually. You can also close stores via the File menu. 8.2 Backup Management Console See the Backup Job Configuration & Modification section 8.3 ARCA Health Check Run ARCA Health Check to verify the list of installed ARCA components and that all required processes are running and system services are started. To launch ARCA Health Check navigate to the Start Menu > All Programs > ARCA > > ARCA Doctor. You can also access the health check under the of the ARCA Dashboard. Copyright 2009 Page 76 of 227

77 ARCA Health Check launches. Copyright 2009 Page 77 of 227

78 Click Start to run health check. o Blue status = success or service running o Red = fail or service stopped Copyright 2009 Page 78 of 227

79 Copyright 2009 Page 79 of 227

80 Click Finish to close health check, following prompt appears. Click Yes to close exit prompt. Copyright 2009 Page 80 of 227

81 If errors are found: Attempt to restart any stopped services. Reregister failed componenets using regsvr32 in the command line. Example: Register zrvbox.dll Note: If errors cannot be resolved contact support. 8.4 Chain Verification Chain Verification verifies the backup chain of a selected file. This runs a chain dependency verification of all files in the backup chain up to the selected file for consistency. Chain verification runs once per week and is setup via the ARCA Configuration Panel. Launch the ARCA Dashboard Click Copyright 2009 Page 81 of 227

82 Click the Chain Verification icon. This launches Chain Verification. Click Browse to select a point-in-time backup file in the backup chain. The path defaults to the backup directory. Copyright 2009 Page 82 of 227

83 Drill down to the full (.spf) or incremental (.spi) backup file to verify. Double-click or click Open selected file to propagate the Image File field. If the backup image is not encrypted, a password file is not required. Click Verify to start chain verification. Copyright 2009 Page 83 of 227

84 If the backup image is encrypted, browse to the backup key file. This file is located in the same directory as the backup file selected. Each partition has its own key file (.spk). File verification can only be run on one file at a time. This can be a time consuming process. Double-click or click Open selected file to propagate the Password File field. Copyright 2009 Page 84 of 227

85 Click Verify to launch chain verification command line utility or click Close to cancel. When chain verification is complete, view the status. In the example above verification was successful. Press any key to continue to close the command prompt. Copyright 2009 Page 85 of 227

Backup and Disaster Recovery Restoration Guide

Backup and Disaster Recovery Restoration Guide Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

Backup Exec Private Cloud Services. Planning and Deployment Guide

Backup Exec Private Cloud Services. Planning and Deployment Guide Backup Exec Private Cloud Services Planning and Deployment Guide Chapter 1 Introducing Backup Exec Private Cloud Services This chapter includes the following topics: About Backup Exec Private Cloud Services

More information

SmartFiler Backup Appliance User Guide 2.0

SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7

More information

BDR for ShadowProtect Solution Guide and Best Practices

BDR for ShadowProtect Solution Guide and Best Practices BDR for ShadowProtect Solution Guide and Best Practices Updated September 2015 - i - Table of Contents Process Overview... 3 1. Assess backup requirements... 4 2. Provision accounts... 4 3. Install ShadowProtect...

More information

Sophos for Microsoft SharePoint startup guide

Sophos for Microsoft SharePoint startup guide Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning

More information

Installation and User Guide for Partners and Businesses

Installation and User Guide for Partners and Businesses Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Altaro Hyper-V Backup V4 - User Guide

Altaro Hyper-V Backup V4 - User Guide Altaro Hyper-V Backup V4 - User Guide 1 / 161 Table of contents Introducing Altaro Hyper-V Backup... 5 Roles... 6 Sample Scenario... 7 Different Editions... 9 Getting Started... 11 System requirements...

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

Zen Internet. Online Data Backup. Zen Vault Professional Plug-ins. Issue: 2.0.08

Zen Internet. Online Data Backup. Zen Vault Professional Plug-ins. Issue: 2.0.08 Zen Internet Online Data Backup Zen Vault Professional Plug-ins Issue: 2.0.08 Contents 1 Plug-in Installer... 3 1.1 Installation and Configuration... 3 2 Plug-ins... 5 2.1 Email Notification... 5 2.1.1

More information

Altaro Hyper-V Backup V4 - User Manual

Altaro Hyper-V Backup V4 - User Manual Altaro Hyper-V Backup V4 - User Manual 2009 2013 Altaro, Ltd. All Rights Reserved Table of contents Introducing Altaro Hyper-V Backup... 5 Add-Ons... 6 Sample Scenario... 7 Different Editions... 9 Getting

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

Exchange Granular Restore User Guide

Exchange Granular Restore User Guide User Guide Contents 1. overview... 2 2. Backup considerations... 3 Exchange VM Detection... 3 VSS Application backups... 3 Restore vs. Recovery... 3 Backup user identity... 3 3. Creating an Exchange backup...

More information

Gladinet Cloud Backup V3.0 User Guide

Gladinet Cloud Backup V3.0 User Guide Gladinet Cloud Backup V3.0 User Guide Foreword The Gladinet User Guide gives step-by-step instructions for end users. Revision History Gladinet User Guide Date Description Version 8/20/2010 Draft Gladinet

More information

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X

Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks

More information

SQL Server Protection Whitepaper

SQL Server Protection Whitepaper SQL Server Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 The benefits of using the SQL Server Add-on... 2 Requirements... 2 2. SQL Protection overview... 3 User databases...

More information

NETWORK PRINT MONITOR User Guide

NETWORK PRINT MONITOR User Guide NETWORK PRINT MONITOR User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

NovaBACKUP Network User s Guide

NovaBACKUP Network User s Guide NovaBACKUP Network User s Guide NovaStor / January 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change

More information

SQL Server Protection

SQL Server Protection User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

System 800xA Tools. System Version 5.1. Power and productivity for a better world TM

System 800xA Tools. System Version 5.1. Power and productivity for a better world TM System 800xA Tools System Version 5.1 Power and productivity for a better world TM System 800xA Tools System Version 5.1 NOTICE This document contains information about one or more ABB products and may

More information

EVault Software. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in

More information

Symantec Backup ExecTM11d

Symantec Backup ExecTM11d Symantec Backup ExecTM11d RM Administration Guide For Community Connect 3 and RM Smart-Tools 3 networks Symantec Backup Exec 11d RM Administration Guide PN 1B0-364 Copyright RM 2007 All rights reserved.

More information

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015

Metalogix SharePoint Backup. Advanced Installation Guide. Publication Date: August 24, 2015 Metalogix SharePoint Backup Publication Date: August 24, 2015 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this

More information

Support Document: Microsoft SQL Server - LiveVault 7.6X

Support Document: Microsoft SQL Server - LiveVault 7.6X Contents Preparing to create a Microsoft SQL backup policy... 2 Adjusting the SQL max worker threads option... 2 Preparing for Log truncation... 3 Best Practices... 3 Microsoft SQL Server 2005, 2008, or

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Windows XP/2003/Vista/2008/7 Browser: Firefox 2+, IE 6+ Version 2.3.1 Chapter 1 Chapter 2 Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment 2.3 Connect

More information

Spector 360 Deployment Guide. Version 7

Spector 360 Deployment Guide. Version 7 Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...

More information

UNICORN 6.4. Administration and Technical Manual

UNICORN 6.4. Administration and Technical Manual UNICORN 6.4 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

Exchange Granular Restore. User Guide

Exchange Granular Restore. User Guide User Guide Contents 1. overview... 2 2. Backup considerations... 3 Backup user identity... 3 Exchange VM Detection... 3 Restore vs. Recovery... 3 3. Creating an Exchange backup... 4 4.... 7 Step 1 - Locate

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.2 User Manual for Mac OS X Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved. Attix5, 2013 Trademarks

More information

safend a w a v e s y s t e m s c o m p a n y

safend a w a v e s y s t e m s c o m p a n y safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:

More information

GUARD1 PLUS SE Administrator's Manual

GUARD1 PLUS SE Administrator's Manual GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

STIDistrict Server Replacement

STIDistrict Server Replacement STIDistrict Server Replacement Major Steps Defined This document addresses how to migrate data and applications from an existing STIDistrict (SQL) Server to a new machine. There will be 8 major steps:

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

Yosemite Server Backup User s Guide

Yosemite Server Backup User s Guide Yosemite Server Backup User s Guide Part number: First edition: October 2010 Legal and notice information Copyright 2004, 2012 Barracuda Networks, Inc. Under copyright laws, the contents of this document

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall

More information

Spector 360 Deployment Guide. Version 7.3 January 3, 2012

Spector 360 Deployment Guide. Version 7.3 January 3, 2012 Spector 360 Deployment Guide Version 7.3 January 3, 2012 Table of Contents Deploy to All Computers... 48 Step 1: Deploy the Servers... 5 Recorder Requirements... 52 Requirements... 5 Control Center Server

More information

Desktop Surveillance Help

Desktop Surveillance Help Desktop Surveillance Help Table of Contents About... 9 What s New... 10 System Requirements... 11 Updating from Desktop Surveillance 2.6 to Desktop Surveillance 3.2... 13 Program Structure... 14 Getting

More information

VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider

VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider System Configuration Guide November 2009 Fujitsu Limited Table of Contents 1. Executive Summary...

More information

NovaBACKUP. Storage Server. NovaStor / May 2011

NovaBACKUP. Storage Server. NovaStor / May 2011 NovaBACKUP Storage Server NovaStor / May 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.

More information

Attix5 Pro Server Edition

Attix5 Pro Server Edition Attix5 Pro Server Edition V7.0.3 User Manual for Linux and Unix operating systems Your guide to protecting data with Attix5 Pro Server Edition. Copyright notice and proprietary information All rights reserved.

More information

StorageCraft Recovery Environment User Guide

StorageCraft Recovery Environment User Guide StorageCraft Recovery Environment User Guide Author: STC Admin Date: Nov 30, 2011 6:20 AM URL: http://doc.storagecraft.com/wiki/display/enreguide/storagecraft+recovery+environment+user+guide 1 of 61 Table

More information

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org (

How To Use Gfi Mailarchiver On A Pc Or Macbook With Gfi Email From A Windows 7.5 (Windows 7) On A Microsoft Mail Server On A Gfi Server On An Ipod Or Gfi.Org ( GFI MailArchiver for Exchange 4 Manual By GFI Software http://www.gfi.com Email: info@gfi.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012

Sophos Enterprise Console Help. Product version: 5.1 Document date: June 2012 Sophos Enterprise Console Help Product version: 5.1 Document date: June 2012 Contents 1 About Enterprise Console...3 2 Guide to the Enterprise Console interface...4 3 Getting started with Sophos Enterprise

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

NetVanta Unified Communications Server Backup and Restore Procedures

NetVanta Unified Communications Server Backup and Restore Procedures NetVanta Unified Communications Technical Note NetVanta Unified Communications Server Backup and Restore Procedures 1 Introduction 1.1 Overview This document provides backup and restore procedures to protect

More information

FalconStor Recovery Agents User Guide

FalconStor Recovery Agents User Guide FalconStor Recovery Agents User Guide FalconStor Software, Inc. 2 Huntington Quadrangle Melville, NY 11747 Phone: 631-777-5188 Fax: 631-501-7633 Web site: www.falconstor.com Copyright 2007-2009 FalconStor

More information

Diamond II v2.3 Service Pack 4 Installation Manual

Diamond II v2.3 Service Pack 4 Installation Manual Diamond II v2.3 Service Pack 4 Installation Manual P/N 460987001B ISS 26APR11 Copyright Disclaimer Trademarks and patents Intended use Software license agreement FCC compliance Certification and compliance

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.

Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc. Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from

More information

Installing Active Directory

Installing Active Directory Installing Active Directory 119 Installing Active Directory Installing Active Directory is an easy and straightforward process as long as you planned adequately and made the necessary decisions beforehand.

More information

MozyPro User Guide Version 1.8.14

MozyPro User Guide Version 1.8.14 MozyPro User Guide Version 1.8.14 Contents Preface: Preface...v Chapter 1: Overview...7 Chapter 2: Installing MozyPro...9 Downloading the MozyPro Client...9 Installing the MozyPro Client...9 Configuring

More information

Exchange Granular Restore Instructional User Guide

Exchange Granular Restore Instructional User Guide Exchange Granular Restore Instructional User Guide www.backup-assist.ca Contents 1. Exchange Granular Restore overview... 2 2. Creating an Exchange backup... 3 3. Exchange Granular Restore... 6 Step 1

More information

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)

How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows) Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

System 800xA Tools. System Version 6.0. Power and productivity for a better world TM

System 800xA Tools. System Version 6.0. Power and productivity for a better world TM System 800xA Tools System Version 6.0 Power and productivity for a better world TM System 800xA Tools System Version 6.0 NOTICE This document contains information about one or more ABB products and may

More information

Microsoft Exchange 2003 Disaster Recovery Operations Guide

Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Exchange 2003 Disaster Recovery Operations Guide Microsoft Corporation Published: December 12, 2006 Author: Exchange Server Documentation Team Abstract This guide provides installation and deployment

More information

CA XOsoft Replication for Windows

CA XOsoft Replication for Windows CA XOsoft Replication for Windows Microsoft SQL Server Operation Guide r12.5 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

HP MediaSmart Server Software Upgrade from v.2 to v.3

HP MediaSmart Server Software Upgrade from v.2 to v.3 HP MediaSmart Server Software Upgrade from v.2 to v.3 Table of Contents Table of Contents Upgrade Your Server Software to HP MediaSmart Server v.3 2 Before You Begin 3 What's New 3 Features That Will

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

Kaseya Server Instal ation User Guide June 6, 2008

Kaseya Server Instal ation User Guide June 6, 2008 Kaseya Server Installation User Guide June 6, 2008 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

Backing Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2

Backing Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2 Backing Up and Restoring Microsoft Exchange Server 2010 Cloud Attached Storage August 2012 Version 3.2 1 Introduction This document explains how to backup your Microsoft Exchange Server 2010 database and

More information

SQL Server Protection. User guide

SQL Server Protection. User guide User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Requirements... 2 2. SQL Protection overview... 3 Backup destinations... 3 Transaction logs... 3 Hyper-V backups... 4 SQL database

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

UNICORN 7.0. Administration and Technical Manual

UNICORN 7.0. Administration and Technical Manual UNICORN 7.0 Administration and Technical Manual Page intentionally left blank Table of Contents Table of Contents 1 Introduction... 1.1 Administrator functions overview... 1.2 Network terms and concepts...

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Version 9.0 User Guide 302-001-755 REV 01 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published

More information

Allworx OfficeSafe Operations Guide Release 6.0

Allworx OfficeSafe Operations Guide Release 6.0 Allworx OfficeSafe Operations Guide Release 6.0 No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopy,

More information

SQL Server Setup for Assistant/Pro applications Compliance Information Systems

SQL Server Setup for Assistant/Pro applications Compliance Information Systems SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form

More information

NETWRIX FILE SERVER CHANGE REPORTER

NETWRIX FILE SERVER CHANGE REPORTER NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

SOLUTION GUIDE AND BEST PRACTICES

SOLUTION GUIDE AND BEST PRACTICES SOLUTION GUIDE AND BEST PRACTICES Last Updated December 2012 Solution Overview Combine the best in bare-metal backup with the best in remote backup to offer your customers a complete disaster recovery

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 8.2 User Guide P/N 302-000-658 REV 01 Copyright 2007-2014 EMC Corporation. All rights reserved. Published in the USA.

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Features - Microsoft Data Protection Manager

Features - Microsoft Data Protection Manager Page 1 of 63 Features - Microsoft Data Protection Manager TABLE OF CONTENTS OVERVIEW SYSTEM REQUIREMENTS - MICROSOFT DATA PROTECTION MANAGER INSTALLATION Install the Microsoft Data Protection Manager BACKUP

More information

How To Install And Configure Windows Server 2003 On A Student Computer

How To Install And Configure Windows Server 2003 On A Student Computer Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft

More information

Telecom DaySave. User Guide. Client Version 2.2.0.3

Telecom DaySave. User Guide. Client Version 2.2.0.3 Telecom DaySave User Guide Client Version 2.2.0.3 Table of Contents Chapter 1: DaySave Overview... 4 Chapter 2: Installing DaySave... 5 Downloading the DaySave Client... 5 Installing the DaySave Client...

More information

Attix5 Pro Plug-ins. V6.2 User Manual. Cover. for Microsoft Windows. Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10

Attix5 Pro Plug-ins. V6.2 User Manual. Cover. for Microsoft Windows. Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10 Attix5 Pro Plug-ins V6.2 User Manual Cover for Microsoft Windows Your guide to installing and using Attix5 Pro plug-ins. Last updated: 2011/10 SERVER EDITION V6.0 for MICROSOFT WINDOWS Copyright Notice

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

NovaBACKUP. User Manual. NovaStor / November 2011

NovaBACKUP. User Manual. NovaStor / November 2011 NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without

More information

Telelogic DASHBOARD Installation Guide Release 3.6

Telelogic DASHBOARD Installation Guide Release 3.6 Telelogic DASHBOARD Installation Guide Release 3.6 1 This edition applies to 3.6.0, Telelogic Dashboard and to all subsequent releases and modifications until otherwise indicated in new editions. Copyright

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information