EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

Size: px
Start display at page:

Download "EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault"

Transcription

1 EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault

2 Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing EVault Linux Agent on Linux Server... 4 Exercise 2 Configure Linux Agent for Protection on EDPM Appliance... 6 Exercise 3 Performing an Ad Hoc Backup Exercise 4 Recovering Data with EVault Exercise 5 For this Lab Only Check that the Data has been Recovered Conclusion EVault for Data Protection Manager i365, A Seagate Company

3 Objectives In this lab, you ll learn how to protect a Linux machine using EDPM. This portion is going to being using the EVault Agent as opposed to the Microsoft DPM Agent. The same installation process is used to install the VMWare ESX Agent. Scenario Estimated Time to Complete This Lab The first thing we ll do is install the Agent. From there, we ll use the EVault Console on the EDPM appliance to configure it. Next we ll run a backup and then restore the data to an alternate location. 60 Minutes Requirements for This Lab Linux Server is on the same subnet as the EDPM appliance. The Linux Server must have inbound TCP ports open on 8086 and 8087 For backups to occur data is transmitted from the Agent to the EDPM appliance on TCP port Computers Used in This Lab EDPM DC01 BAV1 LINUX01 3 EVault for Data Protection Manager i365, A Seagate Company

4 Exercise 1 Installing EVault Linux Agent on Linux Server In the next steps, we ll be installing the Linux Agent onto our Linux server. This will involve mounting a folder that s currently shared on our EDPM server, copying the installer, unpacking it, and installing the Agent. Tasks 1. Initial Login LINUX01 2. Mounting the Linux Share 3. Copy Linux Agent Locally and Unpack It Detailed Steps a. Once the environments states Available within Surgient, click the drop-down next to Linux_Server and choose VNC. b. If the browser prompts you to download any ActiveX controls, please go ahead and do so. c. You ll see a prompt for a VNC Password type evault. d. You should now see the desktop. If you just see a black screen, move your mouse around some. e. In this example, we do have a graphical desktop (GNOME). However, I ll have you conduct the exercises via command-line as not all Linux environments are configured with a graphical desktop. f. To open a new command-line terminal, right-click anywhere on the Desktop and choose Open Terminal. a. In the next steps, you will need to know the IP address of your EDPM server and the local Administrator credentials. Our EDPM server is on It has local login credentials of administrator/password. b. To mount our share, it will be in the following syntax. Note the Linux/UNIX is case sensitive: mount o username=<local_administrator>,password=<administrator_password> //<EDPMs_IP_Address>/<Sharename> <Local_Mount_Directory> c. Notice that there is no space between, and password. d. The command will type is the following: mount o username=administrator,password=password // /EVaultAgents /mnt e. This should complete without any errors. If there are errors, you ve typed in something incorrectly. a. Navigate to the directory that we ve mounted. cd /mnt b. Verify that you ve correctly mounted the directory. ls la c. This will display the contents of the directory, and several subdirectories. For instance, Unix, Novell, etc. d. We ll navigate to the to the Linux Agent directory. cd Unix/Linux e. Now, we ll copy the Linux Agent installer locally to our Linux server. cp Agent-Linux.tar.gz /root f. Navigate to the directory that we ve copied the installer cd /root g. The installer file is a compressed file. It s been tarballed and gzipped. The file must be unpacked. tar xfz Agent-Linux.tar.gz h. Verify that the installer has been unpacked. 4 EVault for Data Protection Manager i365, A Seagate Company

5 4. Install Linux Agent ls la You should see that a new directory has been created called Agent- WCC-Linux i. Navigate to the newly created directory. cd Agent-WCC-Linux a. In the next steps, we ll go ahead and install and register our Linux Agent to the EDPM appliance. b. In the directory that was created Agent-WCC-Linux , there is an install script and this is what we ll run../install.sh c. The Agent will install by default into /usr/local/buagent. Click Enter. d. The installer will indicate that the directory doesn t exist. Click Enter to create it. e. The default language is English (US). Click Enter to accept this. f. The installer will prompt Do you wish to register to a Web-based Agent Console Server? Click Enter. g. When prompted What is the Web-based Agent Console address?, we ll need to enter the address of our EDPM appliance h. When prompted What is the Web-based Agent Console connection port?, it defaults to Port Just click Enter to accept the defaults. For access to the Web-based Agent Console, both TCP ports 8086 and 8087 must be available. If there are firewalls in place in between the Agent and the EDPM appliance, these ports need to be opened for inbound connections to the Agent machine. In other words, the Linux Agent listens on these ports. i. When prompted What is your Web-based Agent Console username?, the EDPM appliance comes with a default user. Type user and click Enter. j. When prompted for What is your Web-based Agent Console password?, we need to enter the same password we configured when initially configuring the EVault Console (See Course 101: Initial Setup: The Onboarding Wizard). Type I365password and click Enter. k. The Agent should now be installed and ready to configure on the EDPM appliance. 5 EVault for Data Protection Manager i365, A Seagate Company

6 Exercise 2 Configure Linux Agent for Protection on EDPM Appliance In the next steps, we ll be configuring our Agent for backup and also schedule it. This is completed on the EDPM appliance through the EVault Console. Tasks 1. Switch Machines EDPM 2. Open EVault Console 3. Configure Agent Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect to the EDPM server. b. If it prompts you for a login, please make sure to use the following: Username: TrainingLab\Administrator Password: I365password a. Open Internet Explorer from either the Start Menu or Quick Launch bar. b. In the Address Bar, type the following c. This should launch the EVault Console landing page. a. Within the EVault Conosle site, we should see our Linux01 server highlighted in the middle pane. EDPM has detected that it has not yet been configured yet. b. Click Configure This Agent. c. On the Configure Agent screen, you ll see Description. This field is optional and it allows you to describe your Agent, IE Backup of Boss Computer. We ll leave this field empty in this example. d. Click Advanced Agent Settings. On the Retention Types tab, we see the default retentions that can be used. Retentions dictate how far back in time you can restore your data. We ll leave the default for now, but please reference the course titled Understanding EVault Retentions for more information about retention customization. Default Retentions allow you protect and restore from the following if scheduled: Daily Restore from the last 7 days Weekly Restore from the last 5 Saturdays Monthly Restore from the last 12 first of the months going back 1 year. Retentions are customizable to meet your compliance / business On the Open File tab, you will have no options for the Linux Agent as there is no need for an open file handler. On the Notification tab, we will setup notifications. In this lab, we ll use some fictitious information, but on your production machines, you ll want to make sure that you fill this out correctly. i. Click Send on failure 6 EVault for Data Protection Manager i365, A Seagate Company

7 ii. Click Send on error. Errors can be triggered if the Agent has problems processing a file. iii. For the From address, enter i365@acme.com iv. For the Outgoing mail server, enter mail.acme.com. v. For the Specify address(es) of recipients, enter BackupAdmins@acme.com. vi. If your server required an authenticated account, you will fill that out in the SMTP Credentials if required. In this lab, we ll leave it Blank. On the Performance tab, you have options to change the following. However, we ll use the defaults: i. Execution Priority Allows you to change the CPU priority of your backup jobs. ii. Bandwidth Allows you to potentially throttle bandwidth of backups during production hours. At the bottom of the Agent Settings window, click OK to accept the changes we ve made. e. Back on the Configure Agent window and the Agent Configuration section, click Next >. f. On the Source Selection section: For the Protection Set Name, type Data. For the Description, leave this blank. For the Source Type, we ll use Local System. The EVault Agent supports backups via NFS mounts if you had this type of environment Click Next >. g. On the Selection section: You re now browsing the file system of our Linux01 server, you see files and folders under Volume and what you selected for protection under Recovery Set. With Linux, you can choose to backup everything under /. However, if you restored / to different hardware, it will be unlikely that the new Linux system will boot cleanly. Linux is not very graceful at detecting new hardware. In this scenario, most Linux administrator would restore individual files and directories. It s a Best Practice to exclude the EVault Agent directory if the backup selection included a parent directory to the Agent. The Agent resides in /usr/local/buagent. Make sure to exclude this if you re including a parent directory. In this example, we ll backup something small. (/etc) Expand / and click the box next to etc. Select Include i. Recursively Backups all subdirectories and files. Leave this 7 EVault for Data Protection Manager i365, A Seagate Company

8 Checked. ii. Only folders matching this filter Allows for folder or file wildcard selections. iii. Only files matching this filter Allows for filtering of files based on extension. iv. Click OK. Click Next >. h. On the Options section: This is where you can choose to protect your data by password protecting it. If you ve set a password, upon recovery, you will be prompted for this password. Any encryption change after the initial backup will result in a reseed of data. This means you will be storing double the amount of data than you should be on the EDPM appliance. Encryption changes include: Changing encryption types Changing encryption passwords Changing encryption types Change from no encryption to use encryption or vice versa Please make sure to keep your encryption password in a safe place. If you lose your encryption password, i365 will not be able to recover it for you. This means you will not be able to restore your data without the correct password. In this example, for the Encryption type, please select AES 128 bit. For the password, we ll set the Password and Confirm Password to test. For the password, we ll type something that reminds us of test. Type quiz. Click Next >. i. On the Schedule section: This is where we can define a schedule such that our backups will run on automatic basis. Please refer to the course titled Scheduling Backups with EVault for more detailed information. In this example, we ll schedule the following: i. Daily M F 8PM ii. Weekly Sat 8PM iii. Monthly 1 st 8PM Per Best Practices, we ll schedule the Longest retention first so that it is at the Top. Longest retention in this case being Monthly. You can always reorder them in this list if you had done it wrong. For the Monthly, click Add 8 EVault for Data Protection Manager i365, A Seagate Company

9 i. For the Schedule View drop-down, choose Days of Month. ii. In the calendar, choose 1 which indicates the first of the month. iii. In the At field, type 8:00. iv. In the Retention Scheme drop-down, choose Monthly. v. Advanced Schedule Options allows us to change the compression level and backup time window. We ll use the defaults here though. vi. Click OK. For the Weekly, click Add i. Select Sat. ii. For the At field, type 8:00. iii. In the Retention Scheme drop-down, choose Weekly. iv. Click OK. For the Daily, click Add i. Select each Mon, Tue, Wed, Thu, Fri. ii. For the At field, type 8:00 iii. In the Retention Scheme drop-down, leave the default with Daily. iv. Click OK. You ve now completed creating the schedule. Click Next >. j. A new pop window, Register Agent, will appear. This will attempt to register the Agent to the EDPM Appliance. Click OK. k. On the Destination section, you should see an entry for Appliance and your EDPM appliance s network address. Click Finish. Note: There is something wrong with the Surgient lab configuration. The previous step will time out after about 5 minutes. Click Cancel and Repeat Steps A-K. This is not normal. You would not normally have to repeat these steps, and this is unique to the Surgient platform. l. Your Linux Agent is now configured for backup and will run automatically based on its schedule that you had defined. 9 EVault for Data Protection Manager i365, A Seagate Company

10 Exercise 3 Performing an Ad Hoc Backup In this section, you ll learn how to run a manual (ad hoc) backup. Normally you d wait for your schedule backup to run. Running an Ad Hoc backup in the middle of the day can impact network and system performance of a production Agent machine. Tasks 1. Continued work on same machine Detailed Steps a. For this exercise, we ll continue work on the EDPM appliance. b. You should still have the EVault Console open. If not, you call always access it via a browser on that machine. Address is EDPM 2. Backup Job via Protect Now a. In the EVault Console, your Linux01 Agent should be highlighted in the middle of the screen. b. Down at the bottom pane, we see the Protection Set Data that we created earlier. Make sure to highlight this Protection Set. c. To run an Ad Hoc backup, click Protect Now. d. On the Protect Now screen a. Our Destination is Appliance. b. Our Retention Scheme is Daily. c. Advanced Protection Options allows you to change the backup window for your Ad Hoc backup. d. Click Start. e. Your backup should initiate. f. A new window, Process Details, should appear. Wait until the backup s Status says Completed and click Close. In production, you don t have to leave the Process Details window open. You can click Close at any time, and the backup will continue in the background. There is a Monitoring tab that you can always check for any active backups. g. Note that when the backup completes, you will see a message that states that the Recovery pointed created with errors. If we were to look at the logs, you would see that the Agent is having problems connecting to the base Vault (the Cloud). With version 1 of EDPM, your EDPM appliance will not replicate to the Cloud, and this is an expected error. 10 EVault for Data Protection Manager i365, A Seagate Company

11 Exercise 4 Recovering Data with EVault In the next steps, we ll use the EVault to recover the sample data that we had previously protected. In this example, we ll restore the data to a new directory. Tasks 1. Continued work on same machine Detailed Steps a. For this exercise, we ll continue work on the EDPM appliance. b. You should still have the EVault Console open. If not, you call always access it via a browser on that machine. Address is EDPM 2. Recover Data via Recover Now a. In the EVault Console, your Linux01 Agent should be highlighted in the middle of the screen. b. Down at the bottom pane, we see the Protection Set Data that we created earlier. Make sure to highlight this Protection Set. c. To run recover data from this protection set, click Recover Now. d. On the Recovery screen a. For Select a recovery point, we ll leave the default. The Agent will automatically select the most resent recovery point. Otherwise, you could pick and choose the specific date/time you wished to recover from. b. For Select a recovery device section i. Recover from this device, choose Vault (Appliance). ii. Encryption password and Confirm password, type test. This is what we had configured the job with. c. Click Next >. e. On the Data Selection screen a. Under Volume, we re looking at the Recovery Point and the data that was backed up. b. Expand the Recovery Point and expand /. c. Check off the etc folder and select Include d. On the Include Options screen, leave the defaults and choose OK. e. Choose Next > f. On the Options screen a. For Destination, choose Recover to an alternate location and type /restore. /restore does not exist and the Agent will automatically create it. You could restore to the original location, but for this lab we re restoring to an alternate path. b. Preserve folder structure Will nest the original path under whatever path you ve chosen to restore to. Otherwise, any files selected will get recovered to the root of the directory you had chosen. c. File Overwrite Leave the defaults. You can change these options if there are files in the destination directory already, and this option allows you how recovery will rename or overwrite files. g. Click Recover Now. 11 EVault for Data Protection Manager i365, A Seagate Company

12 h. This will spawn a new window, Process Details. Wait for the Status to say Restore Completed and click Close. Exercise 5 For this Lab Only Check that the Data has been Recovered We ll switch back to the Linux01 server and check that the data has indeed been restored. Tasks 1. Switch Machines LINUX01 Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose Linux_Server to connect back to the Linux01 server. b. You ll see a prompt for a VNC Password type evault. c. The Terminal window should still be open. Type cd /restore d. To see the contents of that directory, type ls la e. You should see the etc subdirectory. f. Type cd etc and then ls la. g. You should now see the contents of the directory that we ve restored. Conclusion Hopefully you have a better understanding of how to protect Linux and UNIX using EVault. Please feel free to do further testing in your training lab. For further information regarding EVault, you can always access the EVault Knowledge Base and various user guides at For further information about DPM, you can always access their Technet site at If this link is broken, goto navigate to Library, System Center, and choose System Center Data Protection Manager You can always send comments and suggestions for this training module to training@i365.com or for support related issues you can contact us at support@i365.com. 12 EVault for Data Protection Manager i365, A Seagate Company

EVault Software. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in

More information

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

EVault Software. Course 301 Server Protection with EVault File and System State

EVault Software. Course 301 Server Protection with EVault File and System State EVault Software Course 301 Server Protection with EVault File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In EVault Software Course 321 Protecting Exchange Server with EVault Exchange Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

How To Backup An Entire Database With A Microsoft Sql Server On A Pcode (Windows) 2.5.2.2 (Windows Xp) 2 (Windows 2000) 2-Year Old (Windows 2) 2Nd Generation (Windows 1

How To Backup An Entire Database With A Microsoft Sql Server On A Pcode (Windows) 2.5.2.2 (Windows Xp) 2 (Windows 2000) 2-Year Old (Windows 2) 2Nd Generation (Windows 1 EVault Software Course 311 Protecting SQL Server with EVault SQL Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

SmartFiler Backup Appliance User Guide 2.0

SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Exchange Mailbox Protection

Exchange Mailbox Protection User Guide This guide applies to Windows Server 2008 and later. For Windows Server 2003, refer to the Exchange Server Protection whitepaper. BackupAssist User Guides explain how to create and modify backup

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server StarWind iscsi SAN Software: Using StarWind with VMware ESX Server www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this

More information

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor Quick Start Guide GMS If you re not using Hyper-V 2012, your screens may vary. Microsoft Hyper-V Hypervisor 2013 Silver Peak Systems, Inc. Before You Begin Comply with the GMS Host System Requirements

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.6 (v11.6) Document Date: August 2015 www.goliathtechnologies.com

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

Upgrade ProTracker Advantage Access database to a SQL database

Upgrade ProTracker Advantage Access database to a SQL database Many of our customers run the process themselves with great success. We are available to run the process for you or we can be available on standby from 9:00-5:00(Eastern) to provide assistance if needed.

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

EVault for Data Protection Manager. Course 411 Understanding EVault Retentions

EVault for Data Protection Manager. Course 411 Understanding EVault Retentions EVault for Data Protection Manager Course 411 Understanding EVault Retentions Table of Contents Objectives... 3 Scenario... 3 Introduction... 4 Daily Retentions The Basics... 4 Expiring Safesets... 6 Retention

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

Support Document: Microsoft SQL Server - LiveVault 7.6X

Support Document: Microsoft SQL Server - LiveVault 7.6X Contents Preparing to create a Microsoft SQL backup policy... 2 Adjusting the SQL max worker threads option... 2 Preparing for Log truncation... 3 Best Practices... 3 Microsoft SQL Server 2005, 2008, or

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

Configuration Guide. Remote Backups How-To Guide. Overview

Configuration Guide. Remote Backups How-To Guide. Overview Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Backing Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2

Backing Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2 Backing Up and Restoring Microsoft Exchange Server 2010 Cloud Attached Storage August 2012 Version 3.2 1 Introduction This document explains how to backup your Microsoft Exchange Server 2010 database and

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 2201 Thurston Circle Bellevue, NE 68005 www.tigerpawsoftware.com Contents Tigerpaw Exchange Integrator Setup Guide v3.6.0... 1 Contents...

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange User Mailbox Backup and Restore feature

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

Installation and User Guide for Partners and Businesses

Installation and User Guide for Partners and Businesses Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

System Protection for Hyper-V User Guide

System Protection for Hyper-V User Guide User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

File Protection Using Rsync User Guide

File Protection Using Rsync User Guide File Protection Using Rsync User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

Backup and Restore FAQ

Backup and Restore FAQ Backup and Restore FAQ Topic 50210 Backup and Restore Web, Data, and Email Security Solutions 11-Mar-2014 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

uh6 efolder BDR Guide for Veeam Page 1 of 36

uh6 efolder BDR Guide for Veeam Page 1 of 36 efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

Desktop Deployment Guide ARGUS Enterprise 10.6. 5/29/2015 ARGUS Software An Altus Group Company

Desktop Deployment Guide ARGUS Enterprise 10.6. 5/29/2015 ARGUS Software An Altus Group Company ARGUS Enterprise 10.6 5/29/2015 ARGUS Software An Altus Group Company for ARGUS Enterprise Version 10.6 5/29/2015 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite 900 Houston, Texas 77056

More information

SmartFiler Backup Appliance User Guide 2.1

SmartFiler Backup Appliance User Guide 2.1 SmartFiler Backup Appliance User Guide 2.1 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 4 Solution Overview... 4 Solution 1: Two Virtual Backup Appliances... 5 Solution 2: Two

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

Veeam Backup Enterprise Manager. Version 7.0

Veeam Backup Enterprise Manager. Version 7.0 Veeam Backup Enterprise Manager Version 7.0 User Guide August, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may

More information

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0 AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

USING OUTLOOK WITH ENTERGROUP. Microsoft Outlook

USING OUTLOOK WITH ENTERGROUP. Microsoft Outlook USING OUTLOOK WITH ENTERGROUP In this tutorial you will learn how to use Outlook with your EnterGroup account. You will learn how to setup an IMAP or POP account, and also how to move your emails and contacts

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE WELCOME TO THE VIRTUAL SERVER (SHARED) USER GUIDE AUSTRALIAN ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact your

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

How to Test Out Backup & Replication 6.5 for Hyper-V

How to Test Out Backup & Replication 6.5 for Hyper-V How to Test Out Backup & Replication 6.5 for Hyper-V Mike Resseler May, 2013 2013 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

Unitrends Virtual Backup Installation Guide Version 8.0

Unitrends Virtual Backup Installation Guide Version 8.0 Unitrends Virtual Backup Installation Guide Version 8.0 Release June 2014 7 Technology Circle, Suite 100 Columbia, SC 29203 Phone: 803.454.0300 Contents Chapter 1 Getting Started... 1 Version 8 Architecture...

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2010 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2010 Installation Guide, product version 6.4. This guide is item number DOC-110, revision 1.045, May 2010 Copyright 1995-2010 Lenel Systems International, Inc. Information

More information

IBM/Softlayer Object Storage for Offsite Backup

IBM/Softlayer Object Storage for Offsite Backup IBM/Softlayer Object Storage for Offsite Backup How to use IBM/Softlayer Object Storage for Offsite Backup How to use IBM/Softlayer Object Storage for Offsite Backup IBM/Softlayer Object Storage is a redundant

More information

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.

Pro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc. Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking

More information

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Solution domain Cloud PC Backup Startingkit for users Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Table of contents Table of contents... 2 1. What is Cloud PC Backup?...

More information

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.

More information

Setting up your new Live Server Account

Setting up your new Live Server Account Setting up your new Live Server Account Welcome to Remote Data Backups LiveVault Service. This document will help you set up the agent service on your server as well as giving you some guidance on accessing

More information

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual

Setting up Citrix XenServer for 2X VirtualDesktopServer Manual Setting up Citrix XenServer for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

VMTurbo Operations Manager 4.5 Installing and Updating Operations Manager

VMTurbo Operations Manager 4.5 Installing and Updating Operations Manager VMTurbo Operations Manager 4.5 Installing and Updating Operations Manager VMTurbo, Inc. One Burlington Woods Drive Burlington, MA 01803 USA Phone: (781) 373---3540 www.vmturbo.com Table of Contents Introduction

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

How to Copy A SQL Database SQL Server Express (Making a History Company)

How to Copy A SQL Database SQL Server Express (Making a History Company) How to Copy A SQL Database SQL Server Express (Making a History Company) These instructions are written for use with SQL Server Express. Check with your Network Administrator if you are not sure if you

More information

Scan to E-mail Quick Setup Guide

Scan to E-mail Quick Setup Guide Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

efolder BDR for Veeam Cloud Connection Guide

efolder BDR for Veeam Cloud Connection Guide efolder BDR for Veeam Cloud Connection Guide Setup Connect Preload Data uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder Cloud for Veeam. Using the efolder Cloud

More information

HOW TO SETUP SITE-TO-SITE REPLICATION

HOW TO SETUP SITE-TO-SITE REPLICATION HOW TO SETUP SITE-TO-SITE REPLICATION Last Updated December 2012 Solution Overview In many cases, an end-user or partner wants to store valuable data offsite, but needs to do so such that the data is stored

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information