EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault"

Transcription

1 EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault

2 Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing EVault Linux Agent on Linux Server... 4 Exercise 2 Configure Linux Agent for Protection on EDPM Appliance... 6 Exercise 3 Performing an Ad Hoc Backup Exercise 4 Recovering Data with EVault Exercise 5 For this Lab Only Check that the Data has been Recovered Conclusion EVault for Data Protection Manager i365, A Seagate Company

3 Objectives In this lab, you ll learn how to protect a Linux machine using EDPM. This portion is going to being using the EVault Agent as opposed to the Microsoft DPM Agent. The same installation process is used to install the VMWare ESX Agent. Scenario Estimated Time to Complete This Lab The first thing we ll do is install the Agent. From there, we ll use the EVault Console on the EDPM appliance to configure it. Next we ll run a backup and then restore the data to an alternate location. 60 Minutes Requirements for This Lab Linux Server is on the same subnet as the EDPM appliance. The Linux Server must have inbound TCP ports open on 8086 and 8087 For backups to occur data is transmitted from the Agent to the EDPM appliance on TCP port Computers Used in This Lab EDPM DC01 BAV1 LINUX01 3 EVault for Data Protection Manager i365, A Seagate Company

4 Exercise 1 Installing EVault Linux Agent on Linux Server In the next steps, we ll be installing the Linux Agent onto our Linux server. This will involve mounting a folder that s currently shared on our EDPM server, copying the installer, unpacking it, and installing the Agent. Tasks 1. Initial Login LINUX01 2. Mounting the Linux Share 3. Copy Linux Agent Locally and Unpack It Detailed Steps a. Once the environments states Available within Surgient, click the drop-down next to Linux_Server and choose VNC. b. If the browser prompts you to download any ActiveX controls, please go ahead and do so. c. You ll see a prompt for a VNC Password type evault. d. You should now see the desktop. If you just see a black screen, move your mouse around some. e. In this example, we do have a graphical desktop (GNOME). However, I ll have you conduct the exercises via command-line as not all Linux environments are configured with a graphical desktop. f. To open a new command-line terminal, right-click anywhere on the Desktop and choose Open Terminal. a. In the next steps, you will need to know the IP address of your EDPM server and the local Administrator credentials. Our EDPM server is on It has local login credentials of administrator/password. b. To mount our share, it will be in the following syntax. Note the Linux/UNIX is case sensitive: mount o username=<local_administrator>,password=<administrator_password> //<EDPMs_IP_Address>/<Sharename> <Local_Mount_Directory> c. Notice that there is no space between, and password. d. The command will type is the following: mount o username=administrator,password=password // /EVaultAgents /mnt e. This should complete without any errors. If there are errors, you ve typed in something incorrectly. a. Navigate to the directory that we ve mounted. cd /mnt b. Verify that you ve correctly mounted the directory. ls la c. This will display the contents of the directory, and several subdirectories. For instance, Unix, Novell, etc. d. We ll navigate to the to the Linux Agent directory. cd Unix/Linux e. Now, we ll copy the Linux Agent installer locally to our Linux server. cp Agent-Linux.tar.gz /root f. Navigate to the directory that we ve copied the installer cd /root g. The installer file is a compressed file. It s been tarballed and gzipped. The file must be unpacked. tar xfz Agent-Linux.tar.gz h. Verify that the installer has been unpacked. 4 EVault for Data Protection Manager i365, A Seagate Company

5 4. Install Linux Agent ls la You should see that a new directory has been created called Agent- WCC-Linux i. Navigate to the newly created directory. cd Agent-WCC-Linux a. In the next steps, we ll go ahead and install and register our Linux Agent to the EDPM appliance. b. In the directory that was created Agent-WCC-Linux , there is an install script and this is what we ll run../install.sh c. The Agent will install by default into /usr/local/buagent. Click Enter. d. The installer will indicate that the directory doesn t exist. Click Enter to create it. e. The default language is English (US). Click Enter to accept this. f. The installer will prompt Do you wish to register to a Web-based Agent Console Server? Click Enter. g. When prompted What is the Web-based Agent Console address?, we ll need to enter the address of our EDPM appliance h. When prompted What is the Web-based Agent Console connection port?, it defaults to Port Just click Enter to accept the defaults. For access to the Web-based Agent Console, both TCP ports 8086 and 8087 must be available. If there are firewalls in place in between the Agent and the EDPM appliance, these ports need to be opened for inbound connections to the Agent machine. In other words, the Linux Agent listens on these ports. i. When prompted What is your Web-based Agent Console username?, the EDPM appliance comes with a default user. Type user and click Enter. j. When prompted for What is your Web-based Agent Console password?, we need to enter the same password we configured when initially configuring the EVault Console (See Course 101: Initial Setup: The Onboarding Wizard). Type I365password and click Enter. k. The Agent should now be installed and ready to configure on the EDPM appliance. 5 EVault for Data Protection Manager i365, A Seagate Company

6 Exercise 2 Configure Linux Agent for Protection on EDPM Appliance In the next steps, we ll be configuring our Agent for backup and also schedule it. This is completed on the EDPM appliance through the EVault Console. Tasks 1. Switch Machines EDPM 2. Open EVault Console 3. Configure Agent Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect to the EDPM server. b. If it prompts you for a login, please make sure to use the following: Username: TrainingLab\Administrator Password: I365password a. Open Internet Explorer from either the Start Menu or Quick Launch bar. b. In the Address Bar, type the following c. This should launch the EVault Console landing page. a. Within the EVault Conosle site, we should see our Linux01 server highlighted in the middle pane. EDPM has detected that it has not yet been configured yet. b. Click Configure This Agent. c. On the Configure Agent screen, you ll see Description. This field is optional and it allows you to describe your Agent, IE Backup of Boss Computer. We ll leave this field empty in this example. d. Click Advanced Agent Settings. On the Retention Types tab, we see the default retentions that can be used. Retentions dictate how far back in time you can restore your data. We ll leave the default for now, but please reference the course titled Understanding EVault Retentions for more information about retention customization. Default Retentions allow you protect and restore from the following if scheduled: Daily Restore from the last 7 days Weekly Restore from the last 5 Saturdays Monthly Restore from the last 12 first of the months going back 1 year. Retentions are customizable to meet your compliance / business On the Open File tab, you will have no options for the Linux Agent as there is no need for an open file handler. On the Notification tab, we will setup notifications. In this lab, we ll use some fictitious information, but on your production machines, you ll want to make sure that you fill this out correctly. i. Click Send on failure 6 EVault for Data Protection Manager i365, A Seagate Company

7 ii. Click Send on error. Errors can be triggered if the Agent has problems processing a file. iii. For the From address, enter iv. For the Outgoing mail server, enter mail.acme.com. v. For the Specify address(es) of recipients, enter vi. If your server required an authenticated account, you will fill that out in the SMTP Credentials if required. In this lab, we ll leave it Blank. On the Performance tab, you have options to change the following. However, we ll use the defaults: i. Execution Priority Allows you to change the CPU priority of your backup jobs. ii. Bandwidth Allows you to potentially throttle bandwidth of backups during production hours. At the bottom of the Agent Settings window, click OK to accept the changes we ve made. e. Back on the Configure Agent window and the Agent Configuration section, click Next >. f. On the Source Selection section: For the Protection Set Name, type Data. For the Description, leave this blank. For the Source Type, we ll use Local System. The EVault Agent supports backups via NFS mounts if you had this type of environment Click Next >. g. On the Selection section: You re now browsing the file system of our Linux01 server, you see files and folders under Volume and what you selected for protection under Recovery Set. With Linux, you can choose to backup everything under /. However, if you restored / to different hardware, it will be unlikely that the new Linux system will boot cleanly. Linux is not very graceful at detecting new hardware. In this scenario, most Linux administrator would restore individual files and directories. It s a Best Practice to exclude the EVault Agent directory if the backup selection included a parent directory to the Agent. The Agent resides in /usr/local/buagent. Make sure to exclude this if you re including a parent directory. In this example, we ll backup something small. (/etc) Expand / and click the box next to etc. Select Include i. Recursively Backups all subdirectories and files. Leave this 7 EVault for Data Protection Manager i365, A Seagate Company

8 Checked. ii. Only folders matching this filter Allows for folder or file wildcard selections. iii. Only files matching this filter Allows for filtering of files based on extension. iv. Click OK. Click Next >. h. On the Options section: This is where you can choose to protect your data by password protecting it. If you ve set a password, upon recovery, you will be prompted for this password. Any encryption change after the initial backup will result in a reseed of data. This means you will be storing double the amount of data than you should be on the EDPM appliance. Encryption changes include: Changing encryption types Changing encryption passwords Changing encryption types Change from no encryption to use encryption or vice versa Please make sure to keep your encryption password in a safe place. If you lose your encryption password, i365 will not be able to recover it for you. This means you will not be able to restore your data without the correct password. In this example, for the Encryption type, please select AES 128 bit. For the password, we ll set the Password and Confirm Password to test. For the password, we ll type something that reminds us of test. Type quiz. Click Next >. i. On the Schedule section: This is where we can define a schedule such that our backups will run on automatic basis. Please refer to the course titled Scheduling Backups with EVault for more detailed information. In this example, we ll schedule the following: i. Daily M F 8PM ii. Weekly Sat 8PM iii. Monthly 1 st 8PM Per Best Practices, we ll schedule the Longest retention first so that it is at the Top. Longest retention in this case being Monthly. You can always reorder them in this list if you had done it wrong. For the Monthly, click Add 8 EVault for Data Protection Manager i365, A Seagate Company

9 i. For the Schedule View drop-down, choose Days of Month. ii. In the calendar, choose 1 which indicates the first of the month. iii. In the At field, type 8:00. iv. In the Retention Scheme drop-down, choose Monthly. v. Advanced Schedule Options allows us to change the compression level and backup time window. We ll use the defaults here though. vi. Click OK. For the Weekly, click Add i. Select Sat. ii. For the At field, type 8:00. iii. In the Retention Scheme drop-down, choose Weekly. iv. Click OK. For the Daily, click Add i. Select each Mon, Tue, Wed, Thu, Fri. ii. For the At field, type 8:00 iii. In the Retention Scheme drop-down, leave the default with Daily. iv. Click OK. You ve now completed creating the schedule. Click Next >. j. A new pop window, Register Agent, will appear. This will attempt to register the Agent to the EDPM Appliance. Click OK. k. On the Destination section, you should see an entry for Appliance and your EDPM appliance s network address. Click Finish. Note: There is something wrong with the Surgient lab configuration. The previous step will time out after about 5 minutes. Click Cancel and Repeat Steps A-K. This is not normal. You would not normally have to repeat these steps, and this is unique to the Surgient platform. l. Your Linux Agent is now configured for backup and will run automatically based on its schedule that you had defined. 9 EVault for Data Protection Manager i365, A Seagate Company

10 Exercise 3 Performing an Ad Hoc Backup In this section, you ll learn how to run a manual (ad hoc) backup. Normally you d wait for your schedule backup to run. Running an Ad Hoc backup in the middle of the day can impact network and system performance of a production Agent machine. Tasks 1. Continued work on same machine Detailed Steps a. For this exercise, we ll continue work on the EDPM appliance. b. You should still have the EVault Console open. If not, you call always access it via a browser on that machine. Address is EDPM 2. Backup Job via Protect Now a. In the EVault Console, your Linux01 Agent should be highlighted in the middle of the screen. b. Down at the bottom pane, we see the Protection Set Data that we created earlier. Make sure to highlight this Protection Set. c. To run an Ad Hoc backup, click Protect Now. d. On the Protect Now screen a. Our Destination is Appliance. b. Our Retention Scheme is Daily. c. Advanced Protection Options allows you to change the backup window for your Ad Hoc backup. d. Click Start. e. Your backup should initiate. f. A new window, Process Details, should appear. Wait until the backup s Status says Completed and click Close. In production, you don t have to leave the Process Details window open. You can click Close at any time, and the backup will continue in the background. There is a Monitoring tab that you can always check for any active backups. g. Note that when the backup completes, you will see a message that states that the Recovery pointed created with errors. If we were to look at the logs, you would see that the Agent is having problems connecting to the base Vault (the Cloud). With version 1 of EDPM, your EDPM appliance will not replicate to the Cloud, and this is an expected error. 10 EVault for Data Protection Manager i365, A Seagate Company

11 Exercise 4 Recovering Data with EVault In the next steps, we ll use the EVault to recover the sample data that we had previously protected. In this example, we ll restore the data to a new directory. Tasks 1. Continued work on same machine Detailed Steps a. For this exercise, we ll continue work on the EDPM appliance. b. You should still have the EVault Console open. If not, you call always access it via a browser on that machine. Address is EDPM 2. Recover Data via Recover Now a. In the EVault Console, your Linux01 Agent should be highlighted in the middle of the screen. b. Down at the bottom pane, we see the Protection Set Data that we created earlier. Make sure to highlight this Protection Set. c. To run recover data from this protection set, click Recover Now. d. On the Recovery screen a. For Select a recovery point, we ll leave the default. The Agent will automatically select the most resent recovery point. Otherwise, you could pick and choose the specific date/time you wished to recover from. b. For Select a recovery device section i. Recover from this device, choose Vault (Appliance). ii. Encryption password and Confirm password, type test. This is what we had configured the job with. c. Click Next >. e. On the Data Selection screen a. Under Volume, we re looking at the Recovery Point and the data that was backed up. b. Expand the Recovery Point and expand /. c. Check off the etc folder and select Include d. On the Include Options screen, leave the defaults and choose OK. e. Choose Next > f. On the Options screen a. For Destination, choose Recover to an alternate location and type /restore. /restore does not exist and the Agent will automatically create it. You could restore to the original location, but for this lab we re restoring to an alternate path. b. Preserve folder structure Will nest the original path under whatever path you ve chosen to restore to. Otherwise, any files selected will get recovered to the root of the directory you had chosen. c. File Overwrite Leave the defaults. You can change these options if there are files in the destination directory already, and this option allows you how recovery will rename or overwrite files. g. Click Recover Now. 11 EVault for Data Protection Manager i365, A Seagate Company

12 h. This will spawn a new window, Process Details. Wait for the Status to say Restore Completed and click Close. Exercise 5 For this Lab Only Check that the Data has been Recovered We ll switch back to the Linux01 server and check that the data has indeed been restored. Tasks 1. Switch Machines LINUX01 Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose Linux_Server to connect back to the Linux01 server. b. You ll see a prompt for a VNC Password type evault. c. The Terminal window should still be open. Type cd /restore d. To see the contents of that directory, type ls la e. You should see the etc subdirectory. f. Type cd etc and then ls la. g. You should now see the contents of the directory that we ve restored. Conclusion Hopefully you have a better understanding of how to protect Linux and UNIX using EVault. Please feel free to do further testing in your training lab. For further information regarding EVault, you can always access the EVault Knowledge Base and various user guides at For further information about DPM, you can always access their Technet site at If this link is broken, goto navigate to Library, System Center, and choose System Center Data Protection Manager You can always send comments and suggestions for this training module to or for support related issues you can contact us at 12 EVault for Data Protection Manager i365, A Seagate Company

EVault Software. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in

More information

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM

EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

EVault Software. Course 301 Server Protection with EVault File and System State

EVault Software. Course 301 Server Protection with EVault File and System State EVault Software Course 301 Server Protection with EVault File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In EVault Software Course 321 Protecting Exchange Server with EVault Exchange Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

EVault Software. Course 311 Protecting SQL Server with EVault SQL Plug-In

EVault Software. Course 311 Protecting SQL Server with EVault SQL Plug-In EVault Software Course 311 Protecting SQL Server with EVault SQL Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics

EVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365

More information

ShadowControl ShadowStream

ShadowControl ShadowStream ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...

More information

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.

RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816. RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

SmartFiler Backup Appliance User Guide 2.0

SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7

More information

Exchange Mailbox Protection

Exchange Mailbox Protection User Guide This guide applies to Windows Server 2008 and later. For Windows Server 2003, refer to the Exchange Server Protection whitepaper. BackupAssist User Guides explain how to create and modify backup

More information

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.

Vess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved. Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor

GMS. 1 Create the virtual machine 2 Configure the virtual machine 3 Configure the virtual GMS server. Quick Start Guide. Microsoft Hyper-V Hypervisor Quick Start Guide GMS If you re not using Hyper-V 2012, your screens may vary. Microsoft Hyper-V Hypervisor 2013 Silver Peak Systems, Inc. Before You Begin Comply with the GMS Host System Requirements

More information

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server

StarWind iscsi SAN Software: Using StarWind with VMware ESX Server StarWind iscsi SAN Software: Using StarWind with VMware ESX Server www.starwindsoftware.com Copyright 2008-2010. All rights reserved. COPYRIGHT Copyright 2008-2010. All rights reserved. No part of this

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

1. Product Information

1. Product Information ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such

More information

Online Backup Client User Manual Linux

Online Backup Client User Manual Linux Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based

More information

Server Installation Manual 4.4.1

Server Installation Manual 4.4.1 Server Installation Manual 4.4.1 1. Product Information Product: BackupAgent Server Version: 4.4.1 2. Introduction BackupAgent Server has several features. The application is a web application and offers:

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Backing Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2

Backing Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2 Backing Up and Restoring Microsoft Exchange Server 2010 Cloud Attached Storage August 2012 Version 3.2 1 Introduction This document explains how to backup your Microsoft Exchange Server 2010 database and

More information

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange User Mailbox Backup and Restore feature

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Laptop Backup - Administrator Guide (Windows)

Laptop Backup - Administrator Guide (Windows) Laptop Backup - Administrator Guide (Windows) Page 1 of 86 Page 2 of 86 Laptop Backup - Administrator Guide (Windows) TABLE OF CONTENTS OVERVIEW PREPARE COMMCELL SETUP FIREWALL USING PROXY SETUP FIREWALL

More information

Basic Exchange Setup Guide

Basic Exchange Setup Guide Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided

More information

Novell ZENworks Asset Management 7.5

Novell ZENworks Asset Management 7.5 Novell ZENworks Asset Management 7.5 w w w. n o v e l l. c o m October 2006 USING THE WEB CONSOLE Table Of Contents Getting Started with ZENworks Asset Management Web Console... 1 How to Get Started...

More information

1. Open the preferences screen by opening the Mail menu and selecting Preferences...

1. Open the preferences screen by opening the Mail menu and selecting Preferences... Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window

More information

Upgrade ProTracker Advantage Access database to a SQL database

Upgrade ProTracker Advantage Access database to a SQL database Many of our customers run the process themselves with great success. We are available to run the process for you or we can be available on standby from 9:00-5:00(Eastern) to provide assistance if needed.

More information

RecoveryVault Express Client User Manual

RecoveryVault Express Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015

TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 TIGERPAW EXCHANGE INTEGRATOR SETUP GUIDE V3.6.0 August 26, 2015 2201 Thurston Circle Bellevue, NE 68005 www.tigerpawsoftware.com Contents Tigerpaw Exchange Integrator Setup Guide v3.6.0... 1 Contents...

More information

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11.

Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures. Goliath Performance Monitor Installation Guide v11. Consolidated Monitoring, Analysis and Automated Remediation For Hybrid IT Infrastructures Goliath Performance Monitor Installation Guide v11.6 (v11.6) Document Date: August 2015 www.goliathtechnologies.com

More information

Cloud Backup Express

Cloud Backup Express Cloud Backup Express Table of Contents Installation and Configuration Workflow for RFCBx... 3 Cloud Management Console Installation Guide for Windows... 4 1: Run the Installer... 4 2: Choose Your Language...

More information

Support Document: Microsoft SQL Server - LiveVault 7.6X

Support Document: Microsoft SQL Server - LiveVault 7.6X Contents Preparing to create a Microsoft SQL backup policy... 2 Adjusting the SQL max worker threads option... 2 Preparing for Log truncation... 3 Best Practices... 3 Microsoft SQL Server 2005, 2008, or

More information

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000

ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 ArcMail Technology Defender Mail Server Configuration Guide for Microsoft Exchange Server 2003 / 2000 Version 3.2 ArcMail Technology 401 Edwards Street, Suite 1601 Shreveport, LA 71101 Support: (888) 790-9252

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

Configuration Guide. Remote Backups How-To Guide. Overview

Configuration Guide. Remote Backups How-To Guide. Overview Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter

More information

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide

Direct Storage Access Using NetApp SnapDrive. Installation & Administration Guide Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...

More information

Online Backup Linux Client User Manual

Online Backup Linux Client User Manual Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Online Backup Client User Manual

Online Backup Client User Manual For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by

More information

System Protection for Hyper-V User Guide

System Protection for Hyper-V User Guide User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Installation Instructions for Backup Manager and Cloud Management Console

Installation Instructions for Backup Manager and Cloud Management Console Installation Instructions for Backup Manager and Cloud Management Console Installing the software components for Sterling Data Storage (SDS) is quite simple. There are two components that must be installed:

More information

Desktop Deployment Guide ARGUS Enterprise 10.6. 5/29/2015 ARGUS Software An Altus Group Company

Desktop Deployment Guide ARGUS Enterprise 10.6. 5/29/2015 ARGUS Software An Altus Group Company ARGUS Enterprise 10.6 5/29/2015 ARGUS Software An Altus Group Company for ARGUS Enterprise Version 10.6 5/29/2015 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite 900 Houston, Texas 77056

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

EVault for Data Protection Manager. Course 411 Understanding EVault Retentions

EVault for Data Protection Manager. Course 411 Understanding EVault Retentions EVault for Data Protection Manager Course 411 Understanding EVault Retentions Table of Contents Objectives... 3 Scenario... 3 Introduction... 4 Daily Retentions The Basics... 4 Expiring Safesets... 6 Retention

More information

Backup & Disaster Recovery Appliance User Guide

Backup & Disaster Recovery Appliance User Guide Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the

More information

IBM/Softlayer Object Storage for Offsite Backup

IBM/Softlayer Object Storage for Offsite Backup IBM/Softlayer Object Storage for Offsite Backup How to use IBM/Softlayer Object Storage for Offsite Backup How to use IBM/Softlayer Object Storage for Offsite Backup IBM/Softlayer Object Storage is a redundant

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

Installation and User Guide for Partners and Businesses

Installation and User Guide for Partners and Businesses Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting

More information

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents

Quadro Configuration Console User's Guide. Table of Contents. Table of Contents Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...

More information

FAQ. How does the new Big Bend Backup (powered by Keepit) work?

FAQ. How does the new Big Bend Backup (powered by Keepit) work? FAQ How does the new Big Bend Backup (powered by Keepit) work? Once you establish which of the folders on your hard drive you ll be backing up, you ll log into myaccount.bigbend.net and from your control

More information

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0

AXIGEN Mail Server. Quick Installation and Configuration Guide. Product version: 6.1 Document version: 1.0 AXIGEN Mail Server Quick Installation and Configuration Guide Product version: 6.1 Document version: 1.0 Last Updated on: May 28, 2008 Chapter 1: Introduction... 3 Welcome... 3 Purpose of this document...

More information

You may have been given a download link on your trial software email. Use this link to download the software.

You may have been given a download link on your trial software email. Use this link to download the software. BackupVault / Attix5 Server Quickstart Guide This document takes about 5 minutes to read and will show you how to: Download the software Install the Attix5 Professional Backup software Backup your files

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Ad Hoc Setup Windows XP 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited. 1

More information

Virtual Data Centre. User Guide

Virtual Data Centre. User Guide Virtual Data Centre User Guide 2 P age Table of Contents Getting Started with vcloud Director... 8 1. Understanding vcloud Director... 8 2. Log In to the Web Console... 9 3. Using vcloud Director... 10

More information

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL

DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.

More information

Volume SYNAMETRICS TECHNOLOGIES. A Division of IndusSoft Technologies, Inc. DeltaCopy User s Guide

Volume SYNAMETRICS TECHNOLOGIES. A Division of IndusSoft Technologies, Inc. DeltaCopy User s Guide Volume 1 SYNAMETRICS TECHNOLOGIES A Division of IndusSoft Technologies, Inc DeltaCopy User s Guide SYNAMETRICS TECHNOLOGIES DeltaCopy User s Guide Synametrics Technologies 27 Sand Hill Ct., Jamesburg,

More information

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation

Table of Contents. OpenDrive Drive 2. Installation 4 Standard Installation Unattended Installation User Guide for OpenDrive Application v1.6.0.4 for MS Windows Platform 20150430 April 2015 Table of Contents Installation 4 Standard Installation Unattended Installation Installation (cont.) 5 Unattended

More information

File Protection Using Rsync User Guide

File Protection Using Rsync User Guide File Protection Using Rsync User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s

More information

ilaw Installation Procedure

ilaw Installation Procedure ilaw Installation Procedure This guide will provide a reference for a full installation of ilaw Case Management Software. Contents ilaw Overview How ilaw works Installing ilaw Server on a PC Installing

More information

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder

Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Online Backup Client User Manual Mac OS

Online Backup Client User Manual Mac OS Online Backup Client User Manual Mac OS 1. Product Information Product: Online Backup Client for Mac OS X Version: 4.1.7 1.1 System Requirements Operating System Mac OS X Leopard (10.5.0 and higher) (PPC

More information

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20

Introweb Remote Backup Client for Mac OS X User Manual. Version 3.20 Introweb Remote Backup Client for Mac OS X User Manual Version 3.20 1. Contents 1. Contents...2 2. Product Information...4 3. Benefits...4 4. Features...5 5. System Requirements...6 6. Setup...7 6.1. Setup

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

VMTurbo Operations Manager 4.5 Installing and Updating Operations Manager

VMTurbo Operations Manager 4.5 Installing and Updating Operations Manager VMTurbo Operations Manager 4.5 Installing and Updating Operations Manager VMTurbo, Inc. One Burlington Woods Drive Burlington, MA 01803 USA Phone: (781) 373---3540 www.vmturbo.com Table of Contents Introduction

More information

Acronis Backup & Recovery 11.5 Quick Start Guide

Acronis Backup & Recovery 11.5 Quick Start Guide Acronis Backup & Recovery 11.5 Quick Start Guide Applies to the following editions: Advanced Server for Windows Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server

More information

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer

Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail

Solution domain. Cloud PC Backup Startingkit for users. Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Solution domain Cloud PC Backup Startingkit for users Date 26/05/2015 Sensitivity Unrestricted Our reference V1.0 Contact E-mail Table of contents Table of contents... 2 1. What is Cloud PC Backup?...

More information

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:

TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/

More information

How to Copy A SQL Database SQL Server Express (Making a History Company)

How to Copy A SQL Database SQL Server Express (Making a History Company) How to Copy A SQL Database SQL Server Express (Making a History Company) These instructions are written for use with SQL Server Express. Check with your Network Administrator if you are not sure if you

More information

QUANTIFY INSTALLATION GUIDE

QUANTIFY INSTALLATION GUIDE QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the

More information

uh6 efolder BDR Guide for Veeam Page 1 of 36

uh6 efolder BDR Guide for Veeam Page 1 of 36 efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder

More information

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

1 of 10 1/31/2014 4:08 PM

1 of 10 1/31/2014 4:08 PM 1 of 10 1/31/2014 4:08 PM copyright 2014 How to backup Microsoft SQL Server with Nordic Backup Pro Before creating a SQL backup set within Nordic Backup Pro it is first necessary to verify that the settings

More information

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide

Symantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup

More information

Getting Started Guide

Getting Started Guide Getting Started Guide Microsoft Corporation Published: December 2005 Table of Contents Getting Started Guide...1 Table of Contents...2 Get Started with Windows Server 2003 R2...4 Windows Storage Server

More information

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide

Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Dell SupportAssist Version 2.0 for Dell OpenManage Essentials Quick Start Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer.

More information

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE WELCOME TO THE VIRTUAL SERVER (SHARED) USER GUIDE AUSTRALIAN ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact your

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

Scan to E-mail Quick Setup Guide

Scan to E-mail Quick Setup Guide Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:

More information

Pharos Control User Guide

Pharos Control User Guide Outdoor Wireless Solution Pharos Control User Guide REV1.0.0 1910011083 Contents Contents... I Chapter 1 Quick Start Guide... 1 1.1 Introduction... 1 1.2 Installation... 1 1.3 Before Login... 8 Chapter

More information

USING OUTLOOK WITH ENTERGROUP. Microsoft Outlook

USING OUTLOOK WITH ENTERGROUP. Microsoft Outlook USING OUTLOOK WITH ENTERGROUP In this tutorial you will learn how to use Outlook with your EnterGroup account. You will learn how to setup an IMAP or POP account, and also how to move your emails and contacts

More information

Online Backup and Recovery Manager Setup for Microsoft Windows.

Online Backup and Recovery Manager Setup for Microsoft Windows. Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the

More information

Installation and Setup: Setup Wizard Account Information

Installation and Setup: Setup Wizard Account Information Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account

More information

How to Use JCWHosting Reseller Cloud Storage Solution

How to Use JCWHosting Reseller Cloud Storage Solution How to Use JCWHosting Reseller Cloud Storage Solution Go to https://www.internetspace.co.za and log in with your Cloud Reseller account username and password. How to Use create a cloud account for your

More information