EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In
|
|
- Caren Boyd
- 8 years ago
- Views:
Transcription
1 EVault Software Course 321 Protecting Exchange Server with EVault Exchange Plug-In
2 Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing EVault Agent on Exchange Server... 4 Exercise 2 Personalize the Environment For Lab Example Only... 9 Exercise 3 Add Agent to CentralControl Exercise 4 Register Agent to Vault Exercise 5 Creating a Data Backup Job Exercise 6 Creating an Exchange DR Backup Job Exercise 6 Scheduling Exercise 7 Run an Ad Hoc (Manual) Backup of Each Job Exercise 8 Modify Mailbox on Exchange Server For Lab Example Only Exercise 9 Dismount Exchange Database prior to Restore Exercise 10 Restoring an Exchange Database Exercise 11 Verify Database Has Been Restored For Lab Example Only Exercise 12 DR Exercise Shutdown EXCH Exercise 13 DR Exercise Install Agent on FS Exercise 14 DR Exercise - Add Agent to CentralControl Exercise 15 DR Exercise Re-Register Agent to Vault Exercise 16 DR Exercise Restore System Exercise 17 DR Exercise Check Your Work on Recovered Machine Exercise 18 DR Exercise Recovering Databases Conclusion Appendix A EVault Software i365, A Seagate Company
3 Objectives In this course, you will learn how to protect an Exchange 2010 server. We will learn to backup and recover an individual Exchange database as well as recover an entire system. EVault offers protection via a DR (Database protection) job and a MAPI (individual mailbox and message) job. MAPI is not yet available for EVault s Exchange 2010 Plug-in but is available for Exchange This training includes only a single Exchange server. For protection of clustered Exchange systems or Exchange DAGs, please review the Exchange Plug-in guide. Scenario Estimated Time to Complete This Lab The course is composed of a Windows 2008 x64/exchange 2010 server that we ll protect. Protection of Windows Server 2003 and Server 2008 utilize Volume Shadow Copy to handle open files. Earlier versions of Windows did not utilize Volume Shadow copy and would require using an add-on product called Open File Manager to protect mission critical open files. 120 Minutes Requirements for This Lab Exchange 2010 Windows 2008 Domain Controller On your productions machines, we recommend that all Windows Updates have been applied Computers Used in This Lab HQ-Vault DR-Vault DC01 EXCH01 FS03 3 EVault Software i365, A Seagate Company
4 Exercise 1 Installing EVault Agent on Exchange Server In this step, we will install the EVault Agent to the Exchange server that we wish to protect. This will allow us to further configure the protection of our File server through CentralControl. Tasks 1. Initial Logon Detailed Steps a. Once the lab starts, within Surgient, click on the EXCH01_Server and choose RDP. EXCH01 2. Connect to Download Share a. For the Agent installer, I ve downloaded them to a share found at \\ \c$\Temp\. Normally you would download the Agent from our Customer Service Portal at b. On EXCH01, click the Start Menu and click Run... c. In the Run dialogue, type \\ \c$\Temp\ and click OK. d. Double-click Agent-Windows-x64-6-xxx.exe to launch the Agent Installer 4 EVault Software i365, A Seagate Company
5 3. Agent Installation Wizard a. On the Open File Security Warning dialogue, click Run. b. On the Choose Setup Language screen, select English and click OK. c. On the Welcome to the InstallShield Wizard for EVault Software Agent screen, click Next >. d. On the Support Information and Release Notes screen, click Next >. 5 EVault Software i365, A Seagate Company
6 e. On the License Agreement screen, click I accept the terms in the license agreement and click Next >. f. On the Setup Type screen, we recommend you click on Custom and then Next > to see what options you have available. g. On the Logon Credentials for Agent Services screen, select Use Local System Account and click Next >. This specifies how EVault s backup service will start. If you need to support UNC backups from this machine, you d want to select Create account automatically. 6 EVault Software i365, A Seagate Company
7 h. On the Destination Folder screen, click Next > to accept the default. Normally, we recommend that you install the Agent on a volume with at least 1 GB free. In the lab, we have plenty of space on our C: i. On the Custom Setup screen, select Exchange 2010 Plug-in and click Next >. For Exchange 2007, you would select the Exchange 2007 Plug-in. j. On the Register Agent with Web CentralControl screen, select Skip Registration and then Next >. In this lab, we ll manage our Agent using the Windows CentralControl. Check the lab titled Web CentralControl to learn how to manage you Agents through that interface. 7 EVault Software i365, A Seagate Company
8 k. On the Ready to Install the Program screen, click Install. l. You ve now completed the Agent installation, click Finish. Next, you ll need to Add Agent to CentralControl. 8 EVault Software i365, A Seagate Company
9 Exercise 2 Personalize the Environment For Lab Example Only In the next steps, we ll personalize our environment by creating a sample mailbox and sample . In later exercises, we ll be doing a couple of restore examples and restore this mail. You would not normally do this step in your production environment. Tasks 1. EXCH01 2. Create a sample mailbox in Exchange Detailed Steps a. You should still be logged into the EXCH01 server. If you got logged off any point and need to enter login credentials, they are: Username TrainingLab\Administrator Password I365password. a. Click Start / Exchange Management Console. b. In Exchange Management Console, select Microsoft Exchange On- Premises. c. Under Exchange 2010 Organizational Health, click Manage databases. 9 EVault Software i365, A Seagate Company
10 d. On the left-hand pane, click Recipient Configuration. e. On the right-hand pane, click New Mailbox f. In the New Mailbox wizard, select User Mailbox and click Next >. 10 EVault Software i365, A Seagate Company
11 g. On the User Type screen, select New user and click Next >. h. On the User Information screen, type in the following information and click Next >: First name: John User logon name (User Principal Name): John Password/Confirm Password: I365password 11 EVault Software i365, A Seagate Company
12 i. On the Mailbox Settings screen, type John for the Alias and click Next >. j. On the Archive Settings screen, click Next >. 12 EVault Software i365, A Seagate Company
13 k. On the New Mailbox screen, click New. l. On the Completion screen, click Finish. m. You ve now completed creating the mailbox. Now, we ll populate the mailbox with some sample EVault Software i365, A Seagate Company
14 3. Create sample s a. Click Start / Internet Explorer (64-bit). b. In Internet Explorer, click Outlook Web App on the Favorites Bar. c. In Internet Explorer, click Continue to this website (not recommended). This is because this Exchange server is set to use SSL and no certificate has been applied. Normally, you wouldn t need to do this. 14 EVault Software i365, A Seagate Company
15 d. On the Outlook Web App page: Domain\user name: TrainingLab\John Password: I365password Click Sign in e. On the Outlook Web App page, click OK. 15 EVault Software i365, A Seagate Company
16 f. Click New to create a new message. We ll be creating 3 s written to ourselves. g. In Internet Explorer, click Continue to this website (not recommended). h. On the Untitled Message screen: In the To field, type John. Type whatever Subject you want. You can type a body of the message too if you wish. Click Send. 16 EVault Software i365, A Seagate Company
17 i. Repeat steps f-h until you have 3 unique s written to your user. j. We now have some sample s in our mailbox. 17 EVault Software i365, A Seagate Company
18 Exercise 3 Add Agent to CentralControl In the next steps, we ll add the Agent we just installed to our Windows CentralControl. CentralControl is EVault s Agent Management interface or GUI. We ve already got it installed on HQ-Vault. We ll need to switch to that box. Tasks 1. Switch Machines HQ-Vault Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect to the HQ-Vault. c. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. On the desktop, double-click EVault Software CentralControl. This is the localized Windows CentralControl. 2. Add Agent to CentralControl a. CentralControl is a place where you can centrally manage your various Agent machines on your network. You can be managing as little as one Agent in CentralControl or you can manage hundreds. b. Right-click the Workspace and choose New Agent... c. For the Description, the best way to describe an Agent machine is by its host name. Type EXCH01. d. For the Network Address, this can be one of two things. Either the IP address or the Fully Qualified Domain Name (FQDN). It s preferable to use the FQDN in case of potential IP changes. Type EXCH01. e. For the Port, we use 2548 or 808 (depending on the Agent version) for connections between CentralControl and the Agent. The Agent listens on this TCP Port. If there are firewalls between the Agent and CentralControl, they should be opened in that direction. f. For the User name, type Administrator. The user specified here needs to be an existing member of either the Administrators group or Backup Operators. The user can not be a normal Domain User. They need to have backup privileges. g. For the Password, type I365password. This is the password for our Administrator user. h. Click Save password so you won t have to re-enter the Password in the future. 18 EVault Software i365, A Seagate Company
19 i. For the Domain, type TrainingLab. If this were just a Workgroup computer, you would leave this field blank. j. Whenever adding Agent to CentralControl, it s always a good idea to click Get Status. This tests our connection to the given Agent. We would receive an error message if it had problems. Click OK. k. On the Agent Properties screen, click OK to finish adding the Agent to CentralControl. 19 EVault Software i365, A Seagate Company
20 l. Now, click File and then Save Workspace. This saves the Agent that we just added so we don t have to type in its information again. m. Next, we need to Register Agent to the Vault. 20 EVault Software i365, A Seagate Company
21 Exercise 4 Register Agent to Vault In this section, you ll learn how to register your Agent to the Vault. For this step, you ll need to know the Vault account credentials. If you own your own Vault, you would ve created an Account within the Director Console. Otherwise, if you don t own your own Vault and backup to a Vault hosted by i365 or an i365 partner, they would ve created the account for you on their Vault. Tasks 1. Detailed Steps a. At this point, you ve installed the Agent and added it to CentralControl. You should now see the Agent in CentralControl. HQ-Vault b. Right-click FS01, and choose Agent Configuration. 21 EVault Software i365, A Seagate Company
22 d. On the Vaults tab, click New. This is where you make your Vault connections. In this lab, we ll just register to one Vault, but if you were Dual Vaulting, you would need to register to both your local and remote Vaults. For Replication, you only need to register to your primary Vault. 2. Vault Configuration Wizard a. On the Vault Configuration Wizard Welcome screen, click Next >. b. On the Vault Registration screen, select Register as a new computer and click Next >. You ll always want to select Register as a new computer except under a disaster recovery scenario where a system has failed. After replacing a failed system and loading an Agent, you d want to Re-register previously registered computer to pull down previously created job information. 22 EVault Software i365, A Seagate Company
23 c. On the Profile Name screen, type HQ-Vault for the Profile name for the new Vault and click Next >. We recommend you use the machine name or location for the Vault here. It s simply a description but is referenced later when creating a backup job. d. On the Vault Network Address[es] screen, type HQ-Vault for the New address and then Add. The address can either be the FQDN or IP Address. FQDN is preferable here due to potential IP changes in the future. e. Click Next >. 23 EVault Software i365, A Seagate Company
24 f. On the Ports screen, click Next >. The Agent communicates on TCP Port 2546 to the Vault. The Vault listens on this port. On your network, please ensure that TCP Port 2546 is open in an outbound direction from the perspective of the Agent. Port 807 is a legacy port that is no longer required for Agent version 4 or higher. g. On the Connection Settings screen, click Next >. 24 EVault Software i365, A Seagate Company
25 Reconnection settings If the Agent were to lose network connection in the middle of a backup, the Agent by default will try to reconnect to the Vault every 3 minutes for a window of 3 hours. If the Agent is able to reconnect in this timeframe, it will continue where it left off. If the window is exhausted, that night s backup will fail. You can change the Reconnection settings here, but the defaults are the recommended settings. Over The Wire Encryption Settings This setting encrypts the network tunnel between the Agent and the Vault. This is very similar in technology to SSL security. When backing up over a public internet connection, it is recommended that you Enable this. If you re backing up over a private network connection, you might choose to Disable this as with any type of encryption with add some overhead for the Agent. Honestly, the overhead is very minimal though. h. On the Authentication screen, we ll enter the EVault account credentials that we would ve created on the Vault or that i365/i365 partner would ve provided for us. Account: Acme User name: evault Password: 1234 i. Click Next >. 25 EVault Software i365, A Seagate Company
26 j. On the Vault Configuration Wizard Finish, click Finish. k. On the Agent Configuration screen, you should now have your HQ-Vault listed. l. Please refer to Appendix A in the back of this guide for information on the other tabs listed in Agent configuration. This covers important topics like setting up Notifications and Customizing Retentions. m. Click OK. 26 EVault Software i365, A Seagate Company
27 Exercise 5 Creating a Data Backup Job In this Lab, we ll assume that you want to protect your system from a disaster. This includes protecting not only your Exchange databases but also your data files on the C: along with System State. So, on an Exchange Server, you ll typically have at least 2 Jobs: a Data Job and an Exchange DR Job. In the course titled EVault - Course 301 Windows File Protection with EVault, you learned how to create a basic Data Job. We ll be doing pretty much the same thing here except making the exclusions for our database files. When going through the Wizard, you might have questions about a certain menu item. You can always click the in the upper left hand corner of the screen and then click the item you are curious about. This will give you a description of that item. Tasks 1. Detailed Steps a. When creating the backup job, we ll continue using CentralControl on the HQ- Vault. b. Right click the Agent EXCH01, and select New Job HQ-Vault 2. New Job Wizard a. On the New Job Wizard Welcome screen, click Next >. 27 EVault Software i365, A Seagate Company
28 b. On the New Job Wizard Backup Source Type screen, select Local Drive Only and click Next >. Encoding Here you can choose what types of filenames you wish to support. ANSI All English characters are stored in the ANSI character set. This is sufficient for most, but we typically recommend choosing Unicode just in case. Unicode Along with backing up files using standard English characters, Unicode allows for protection of files with Eastern European characters, Asian Characters, and Macintosh files. This is the default and recommended option. Backups might be slightly larger, but the amount is probably not even noticeable. c. On the New Job Wizard Vault screen, choose Next >. The Destination displays HQ-Vault. This is the Vault Profile we created in the previous step. 28 EVault Software i365, A Seagate Company
29 RSM database Typically not backed up. This is a Microsoft database. It stands for Removable Storage Manager. RSM catalogs Server Protection with EVault d. On the New Job Wizard New Job Name screen, type Data for the Name and click Next >. Here, we ve named our job Data. This will signify backing up the C:. For Exchange related jobs, we would call my job either DR or MAPI and similarly for SQL backups. You can use whatever naming scheme makes sense for you. e. On the New Job Wizard Source screen, you can select what you want to backup. To protect your system from a disaster, using our standard agent (not using Bare Metal Restore), you ll want to select System State along with any other system drives on your system. From there, you can make exclusions for EVault Agent directory and any other directories that are non mission critical. Data Files You can select from the various drives and folders on the Agent machine. Bare Metal Restore This is an add-on product to the Agent and you do need to be licensed for this on the Vault. In times of disaster, our standard Agent requires you to install an Operating System prior to installing the EVault Agent. Building out an Operating System typically takes up to an hour. In some environments, an extra hour of down time is unacceptable. Bare Metal Restore is a product that backs up all of the files on the system including the Operating System files. It allows for recovery to dissimilar hardware. In times of disaster, you would download our EVault System Restore cd from our website. This cd is self bootable and has many of the popular drivers for controllers, NICs, etc included on it. You would load this onto a new machine. It loads an Agent and allows you to connect to the Vault. You would then restore your Bare Metal Restore job from the Vault, reboot your system, and your system should be operational. System State This allows for protection of things like the Registry, System Files, etc. On a Domain Controller, it includes Active 29 Directory. Note: To fully protect EVault a Software system, - System 2011 State i365, ALONG A Seagate Company WITH any relevent drive data should be backed up (ie the c:\).
30 System State This allows for protection of things like the Registry, System Files, etc. On a Domain Controller, it includes Active Directory. Note: To fully protect a system, System State ALONG WITH any relevent drive data should be backed up (ie the c:\). RSM database Typically not backed up. This is a Microsoft database. It stands for Removable Storage Manager. RSM catalogs any tapes that might have been used on the system. Event logs Not required for backup. If you feel you need to capture the Windows Event logs in backup, they are reletively small. f. On the New Job Wizard Source screen, select Data Files and click Add g. On the Include / Exclude screen, highlight C and click Include. This is where you make your file selections. We re going to back up the entire C:, but here you could select individual drives, folders, or files. 30 EVault Software i365, A Seagate Company
31 h. On the Confirm Include screen, click Yes. Recursive means to backup the selected drive/folder and all of its subfolders. This is also where you can setup filters to only backup certain files/folders or extensions. i. On the Include / Exclude screen, highlight C and click Exclude. j. On the Confirm Exclude screen, check Exclude only files matching this filter, type *.edb; *.stm; *.log. This will exclude all Exchange related files from the Data backup. These files will be captured in the Exchange DR job. You could be more specific in your exclusion and navigate down to the actual Exchange database directories. 31 EVault Software i365, A Seagate Company
32 k. On the Include / Exclude screen, expand C, expand Program Files, select EVault Software, and click Exclude. Whenever backing up folder that would include the EVault Agent directory, it s a best practice to exclude the EVault Agent directory. There are indexes that created and removed within this directory that take up space. We don t want to backup/store unnecessary data on the Vault. l. Click Yes. We want to Recursively exclude this entire directory. m. Click OK. 32 EVault Software i365, A Seagate Company
33 n. On the New Job Wizard Source screen, select System State and click Next >. o. On the New Job Wizard screen click Next >. Here you can change things like the default backup window. For these items, select the if you have questions. Other than the default backup window, we recommend leaving the other options defaulted. 33 EVault Software i365, A Seagate Company
34 p. On the New Job Wizard Encryption screen: This is where you can choose to protect your data by password protecting it. If you ve set a password, upon recovery, you will be prompted for this password. Any encryption change after the initial backup will result in a reseed of data. This means you will be storing double the amount of data than you should be on the EDPM appliance. Encryption changes include: Changing encryption types Changing encryption passwords Changing encryption types Change from no encryption to use encryption or vice versa Please make sure to keep your encryption password in a safe place. If you lose your encryption password, i365 will not be able to recover it for you. This means you will not be able to restore your data without the correct password. In this example, for the Encryption type, please select AES 128 bit. 34 EVault Software i365, A Seagate Company
35 For the password, we ll set the Password and Confirm Password to test and click Next >. q. On the New Job Wizard Log, click Next >. By default Log detail level is set to Summary. This will report any Errors or Warnings encountered. Otherwise, you can increase the verbosity by increasing the detail to either File or Director to report every file or directory backed up. Increasing this setting will create larger log files and should not be changed unless absolutely necessary. 35 EVault Software i365, A Seagate Company
36 r. On the New Job Wizard Finished screen, click Finish to Just exit from this wizard. s. You ve now completed creating your Job. This next step is to create the Exchange DR job. 36 EVault Software i365, A Seagate Company
37 Exercise 6 Creating an Exchange DR Backup Job Your Data Job that you created earlier will protect your C: and System State. You now need to create your Exchange DR Job to protect your Exchange databases. Our Exchange Plug-in uses Microsoft APIs to talk directly to your Exchange databases. This allows you to backup your databases hot (while they re in use). Exchange Plug-in backups will not interfere with your users interacting with their mail. Tasks 1. Detailed Steps a. When creating the backup job, we ll continue using CentralControl on the HQ-Vault. b. Right click the Agent EXCH01, and select New Job HQ-Vault 2. New Job Wizard a. On the New Job Wizard Welcome screen, click Next >. 37 EVault Software i365, A Seagate Company
38 b. On the New Job Wizard Backup Source Type screen, select Exchange 2010 DR and click Next >. c. On the New Job Wizard Vault screen, choose Next >. The Destination displays HQ-Vault. This is the Vault Profile we created in the previous step. d. On the New Job Wizard New Job Name screen, type DR for the Name and click Next >. 38 EVault Software i365, A Seagate Company
39 e. On the New Job Wizard Source screen, click Add. f. On the Include / Exclude screen, click Include. Optionally, you create several DR backup jobs to backup individual Exchange databases. g. On the Confirm Include screen, click Yes. 39 EVault Software i365, A Seagate Company
40 h. On the Include / Exclude screen, click OK. i. On the New Job Wizard Source screen, click Next >. j. On the New Job Wizard screen check Disable deferring and click Next >. Because this is a database backup, we want to have the backup run until completion. 40 EVault Software i365, A Seagate Company
41 k. On the New Job Wizard Encryption screen: In this example, for the Encryption type, please select AES 128 bit. For the password, we ll set the Password and Confirm Password to test and click Next >. l. On the New Job Wizard Log, click Next >. 41 EVault Software i365, A Seagate Company
42 m. On the New Job Wizard Finished screen, click Finish to Just exit from this wizard. n. You ve now completed creating your Exchange DR job. This next step is to schedule our jobs. 42 EVault Software i365, A Seagate Company
43 Exercise 6 Scheduling In this section, we ll schedule the Job that you created earlier. Please refer to EVault - Course 412 Scheduling Backups with EVault for general guidelines for scheduling your backups. We ll also assume that you ve completed EVault Course 301 Windows File Protection with EVault. Exchange Backup Schedules differ and we ll discuss the differences further down in the training. Tasks 1. Detailed Steps a. In CentralControl, right-click EXCH01 and select Schedule Entries HQ-Vault 2. Schedule Data Job a. On the Schedule List screen: This is where we can define a schedule such that our backups will run on automatic basis. In this example, we ll schedule the following for the Data Job: i. Daily M F 8PM ii. Weekly Sat 8PM iii. Monthly 1 st 8PM Per Best Practices, we ll schedule the Longest retention first so that it is at the Top. Longest retention in this case being Monthly. You can always reorder them in this list if you had done it wrong. We ll need to schedule each retention separately. We ll start with the Monthly. b. This exact schedule was created in EVault Course 301 Windows File Protection with EVault. If you forgot how to do this or need instructions, please review the instructions in that lab. 43 EVault Software i365, A Seagate Company
44 c. When you re done, your schedule should look like the following: 3. Schedule Exchange DRJob a. On the Schedule List screen: In this example, we ll schedule the SQL Job 1 hour after our Data Job: i. Daily M F 9PM ii. Weekly Sat 9PM iii. Monthly 1 st 9PM Per Best Practices, we ll schedule the Longest retention first so that it is at the Top. Longest retention in this case being Monthly. You can always reorder them in this list if you had done it wrong. We ll need to schedule each retention separately. We ll start with the Monthly. We ll go through one example, the Monthly, and then let you do the rest on your own to compare to ours. b. On the Schedule List screen, click New c. On the Schedule Wizard Welcome screen, click Next >. d. On the Schedule Wizard Command screen, click Next > to schedule a Backup. 44 EVault Software i365, A Seagate Company
45 e. On the Schedule Wizard Job List screen, select the DR Job and click Next >. f. On the Schedule Wizard Retention screen, select Monthly for the Retention Scheme and click Next >. g. On the Schedule Wizard Options screen, click Next >. This is where the schedule is different. You ll see you have options to do Full or Incremental backups with either SQL or Exchange related database jobs. For our Lab, we ll schedule Fulls for each our Monthly, Weekly, and Daily backups. We ll also Validate Exchange database to verify it s integrity. 45 EVault Software i365, A Seagate Company
46 Full and Incremental Database Backups Do not confuse this terminology with traditional backup terminology. This is database specific. People think that running a Full is backing up a Seed, and an Incremental would be backing up a Delta. IT IS NOT. Full Database level backup that backs up the entire database but deltizes on the previous backup. If you schedule Fulls every day, you are not reseeding every day. In terms of recovery, you select the day you want to recover, and the Vault will send back the entire database (edb) back to the system. Incremental Transaction log only backup. Somewhat smaller than a Full backup but more complicated in terms of restore. When restoring, the Vault/Agent still do everything for you, but when restoring an Incremental backup, the Vault will restore the last good Full backup. Then the Vault will restore the Transaction logs up to the point of your restore. The Agent will then trigger a replay of logs to get you up to your restore time. If running Incremental backups, you need to run periodic Fulls. Typically done either on a Weekly or a Daily basis. Otherwise, replaying more than a week s worth of Transaction logs can take a very long time depending on the system. h. On the Schedule Wizard Command Cycle screen, select Monthly and click Next >. 46 EVault Software i365, A Seagate Company
47 i. On the Schedule Wizard Monthly screen, type 9:00 for the start time and click Next >. j. On the Schedule Wizard Finish screen, click Finish. k. Now, on your own, please complete scheduling the Weekly and Daily schedules for the DR Job. When you re done, your schedule should look like this: l. On the Schedule List screen, click OK. 47 EVault Software i365, A Seagate Company
48 Exercise 7 Run an Ad Hoc (Manual) Backup of Each Job Normally, you would allow the backup to run per its schedule, but for this lab, we ll run an ad hoc backup of each Job so that we can restore immediately. Tasks 1. Detailed Steps a. In CentralControl, right-click DR under EXCH01 and select Backup HQ-Vault b. On the DR: Backup Wizard Welcome screen, click Next >. c. On the DR: Backup Wizard Destination screen, click Backup Now. The default backup destination is to your Vault, but you have options to backup to Directory on Disk (USB) for seeding purposes. Just note that USB backups are intended to be imported into the Vault. d. On the Process Information screen, wait for the Status to say Backup Completed and click Close. e. You ve now completed the seed for the DR Job. Next, we ll backup the Data Job 48 EVault Software i365, A Seagate Company
49 2. Run Backup of Data Job a. In CentralControl, right-click Data under EXCH01 and select Backup b. On the Data: Backup Wizard Welcome screen, click Next >. c. On the Data: Backup Wizard Destination screen, click Backup Now. d. On the Process Information screen, wait for the Status to say Backup Completed and click Close. This backup will take several minutes to complete. e. You ve now completed seeding both of your Jobs. 49 EVault Software i365, A Seagate Company
50 Exercise 8 Modify Mailbox on Exchange Server For Lab Example Only For this exercise, we ll delete a message and add a new message. In one of the following exercises, we ll restore back our original messages. Tasks 1. Switch Machines EXCH01 2. Delete a Message and Add a Message Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the FS01 server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. a. In Internet Explorer, click Outlook Web App link on Favorites Bar. b. In Outlook Web App : Domain\user name: TrainingLab\John Password: I365password Click Sign In 50 EVault Software i365, A Seagate Company
51 c. Right-click any message and select Delete. d. In the Outlook Web App, click New to create a new message. e. In Internet Explorer, click Continue to this website (not recommended). Again, this is because SSL has not been configured in this lab environment. 51 EVault Software i365, A Seagate Company
52 f. On the Untitled Message screen: In the To field, type John. Type whatever Subject you want. You can type a body of the message too if you wish. Click Send. g. You should still have 2 or your original s along with 1 different EVault Software i365, A Seagate Company
53 Exercise 9 Dismount Exchange Database prior to Restore Prior to restoring over an Exchange database, we need to dismount it. This will affect your users as they ll not be able to access any for this database, but in disaster situation where the database has become corrupted, users wouldn t be able to access their mailbox data anyways. In this example with Exchange 2010, we ll also need to remove any files in the database directory as our Exchange plug-in will automatically apply any outstanding transaction logs. If we were to leave the database / transaction log files in place and run the restore, the Exchange server would look identical as we just left it. This is because our Agent would restore the original 3 s and roll in the deletion and addition of messages. For this example, we want to get back the original 3 messages. Note, we do support the use of Exchange Recover Storage Groups, but we won t cover that topic in this training. Recovery Storage Groups allow you to restore data to an offline database and potentially merge missing messages into your live database. Tasks 1. Detailed Steps a. At this point, you should still be on your EXCH01 server. EXCH01 2. Dismount Mailbox Store a. Click Start / Exchange Management Console b. In Exchange Management Console, click Microsoft Exchange On- Premises. 53 EVault Software i365, A Seagate Company
54 c. Under Organization Health, click Manage databases. d. In Exchange Management Console, right-click Mailbox Database xxx and select Dismount Database. e. On the Microsoft Exchange window, click Yes. f. Right-click Mailbox Database xxx and select Properties. This is a VERY important step that is easy to forget. We need to make sure that the database can be overwritten by our restore. 54 EVault Software i365, A Seagate Company
55 g. In the Mailbox Database xxx Properties window, click the Maintenance tab. h. On the Maintenance tab, check This database can be overwritten by a restore and click OK. i. Normally, the next step would be to restore the database using EVault. However, this will roll in any outstanding transaction logs. For this example, we want to restore our database back to the way it was with our original 3 messages. To do this, we need to remove the existing transaction logs on our system. 3. Remove files from within the Exchange database directory (For this lab only) a. Still on our EXCH01 server, right-click Start and select Open Windows Explorer. 55 EVault Software i365, A Seagate Company
56 b. Using Windows Explorer, navigate to C:\Program Files\Microsoft\Exchange Server\V14\Mailbox\Mailbox Database xxx. c. In the Mailbox Database xxx folder, press Ctrl-A (to select all), right-click your selection, and select Delete. d. On the Delete Multiple Items window, click Yes. e. Now we re ready to run our restore. 56 EVault Software i365, A Seagate Company
57 Exercise 10 Restoring an Exchange Database In the following steps, you ll learn to restore the Mailbox database we had backed up earlier. Remember when restoring a database, the database needs to be dismounted, and you need to select the option to allow it to be overwritten by a restore. Tasks 1. Switch Machines HQ-Vault 2. Restore Wizard Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect back to the HQ-Vault server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. a. In the CentralControl, right click the DR Job under EXCH01 and choose Restore b. On the Restore Wizard Welcome screen, click Next >. 57 EVault Software i365, A Seagate Company
58 c. On the Restore Wizard (safeset ) Select a Source screen, click Next >. This is where you can choose from which safeset you d like to restore from. d. On the Restore Wizard (safeset ) Encryption Options screen, type test for both the Password and Verify password textboxes and click Next >. e. On the Restore Wizard (safeset ) Select Restore Objects screen, click Add 58 EVault Software i365, A Seagate Company
59 f. On the Include / Exclude screen, expand / EXCH01, select Mailbox Database xxx, and click Include. In this example, we re just restoring the Mailbox Database. Alternatively, you can restore all databases or a different database. g. On the Include / Exclude screen, click OK. h. On the Restore Wizard (safeset ) Select Restore Objects screen, click Next >. 59 EVault Software i365, A Seagate Company
60 i. On the Restore Wizard (safeset ) Destination Options screen, select Restore files to their original locations and click Next >. Alternatively, you can restore to a different database or to a flat file to have your Exchange administrator import. j. On the Restore Wizard (safeset ) Advanced Restore Options screen, click Next >. k. On the Restore Wizard (safeset ) Finish screen, click Finish. 60 EVault Software i365, A Seagate Company
61 l. On the Process Information screen, wait for the Status to say Restore completed and click Close. m. You ve just learned how to restore mailbox database using EVault. In the next step, we ll simply check our work to make sure that the database is back to the way it was on EXCH EVault Software i365, A Seagate Company
62 Exercise 11 Verify Database Has Been Restored For Lab Example Only For this exercise, we ll switch back to EXCH01 and verify that the Mailbox database is back to the way it was. Tasks 1. Switch Machines EXCH01 2. Mount Database in Exchange Management Console Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. a. You should still have Exchange Management Console open. If you don t, open it from the Start menu. b. In Exchange Management Console, right-click Mailbox Database xxx and select Mount Database. 3. Verify is Back a. Using Internet Explorer, we ll verify that our is back to the way it was with our original 3 messages. b. Click Start / Internet Explorer (64-bit). 62 EVault Software i365, A Seagate Company
63 c. In Internet Explorer, click the Outlook Web App item from the Favorites Bar. d. In Internet Explorer, click Continue to this website (not recommended) e. In the Outlook Web App : Domain\user name: TrainingLab\John Password: I365password Click Sign in 63 EVault Software i365, A Seagate Company
64 f. In the Outlook Web App, you should see your original 3 messages. g. You ve now learned how to restore an individual database within Exchange. For recovery of individual messages, you d want to use the MAPI Plug-in for Exchange 2007 (not yet available for 2010) or use Recovery Storage Groups within Exchange. Exercise 12 DR Exercise Shutdown EXCH01 For this exercise, we ll simulate EXCH01 has completely failed, and in the subsequent steps, we ll recover all of EXCH01 s data to another system, FS03. Tasks 1. EXCH01 2. Shutdown EXCH01 Detailed Steps a. You should still be on the EXCH01_Server within Surgient. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. a. Click Start \ Shutdown 64 EVault Software i365, A Seagate Company
65 b. On the Windows screen, click Yes to continue shutting down. 65 EVault Software i365, A Seagate Company
66 Exercise 13 DR Exercise Install Agent on FS03 In the event of a disaster, you need to rebuild a system matching the original system s Operating System and Service Packs. We have a system loaded called FS03 that matches these criteria. Note that the Hostname of this machine is FS03 and the IP address is Our original machine s Hostname was EXCH01 and had an IP address of When doing a System State restore, the target machine will acquire these settings from the backup. One other thing to notice in this setup is that FS03 is not currently joined to the Domain. It is currently a Workgroup computer. Tasks 1. Switch Machines FS03 2. Install Agent on FS03 Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose FS03_Server to connect to the FS03 server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username Administrator Password I365password. a. To install the Agent on FS03, please repeat Exercise 1 steps 2 and 3 from earlier in the workbook. Make sure you select to install the Exchange 2010 Plug-in. 66 EVault Software i365, A Seagate Company
67 Exercise 14 DR Exercise - Add Agent to CentralControl Similar to Exercise 3 from earlier in the training, after you install an Agent, you need to add it to CentralControl Tasks 1. Switch Machines HQ-Vault Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect to the HQ-Vault. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If CentralControl is not open still, on the desktop, double-click EVault Software CentralControl. 2. Add Agent to CentralControl a. Right-click the Workspace and choose New Agent... b. For the Description, type FS03. c. For the Network Address, type FS03. d. For the Port, leave the default. e. For the User name, type Administrator. f. For the Password, type I365password. g. Click Save password so you won t have to re-enter the Password in the future. h. For the Domain, leave this blank as FS03 is just a Workgroup computer 67 EVault Software i365, A Seagate Company
68 i. Click Get Status to test our connection to the Agent and click OK. j. On the Agent Properties screen, click OK to finish adding the Agent to CentralControl. k. Now, click File and then Save Workspace. This saves the Agent that we just added so we don t have to type in its information again. 68 EVault Software i365, A Seagate Company
69 Exercise 15 DR Exercise Re-Register Agent to Vault As we learned in on e of the previous exercises, after Adding an Agent to CentralControl, you typically Register the Agent to the Vault. However, when performing a DR restore, you ll want to choose to Re- Register to pull down your previously created Job information. Tasks 1. Detailed Steps a. In EVault Software CentralControl, right-click FS03 and choose Agent Configuration... HQ-Vault b. On the Agent Configuration screen, click New to create a new Vault connection. 69 EVault Software i365, A Seagate Company
70 2. Re-Register Agent to Vault a. On the Vault Configuration Wizard Welcome screen, click Next >. b. On the Vault Registration screen, select Re-register previously registered computer and click Next >. c. In the next steps, we ll fill out all of our EVault account credentials. d. On the Vault Network Address[es] screen, type HQ-Vault for the New address, click Add, and click Next >. e. On the Ports screen, click Next >. f. On the Connection Settings screen, click Next >. g. On the Authentication screen, type the following and click Next >: Account: Acme User name: evault Password: EVault Software i365, A Seagate Company
71 h. On the Registered Computers screen, select EXCH01 and click Next > i. On the Vault Configuration Wizard Finish screen, click Finish. j. On the CentralControl screen, click Yes to replace configuration data. k. You should now notice that the FS03 Agent has a Data Job and a DR Job. These will now allow us to Restore SQL01 s information from the Vault. 71 EVault Software i365, A Seagate Company
72 Exercise 16 DR Exercise Restore System In this exercise, we ll restore the Data Job of EXCH01 to our new system, FS03. Tasks 1. Detailed Steps a. In EVault Software CentralControl, right-click Data under FS03 and choose Restore. HQ-Vault 2. Restore Data Job a. On the Restore Wizard Welcome screen, click Next >. b. On the Restore Wizard (safeset ) Select a Source screen, click Next > to accept the defaults. c. On the Restore Wizard (safeset ) Encryption Options screen, type test for both the Password and Verify Password and click Next >. 72 EVault Software i365, A Seagate Company
73 d. On the Restore Wizard (safeset ) Select Restore Objects screen, click Data Files and click Add e. On the Include/ Exclude screen, expand , highlight C:, and click Include. f. On the Confirm Include screen, click Yes to accept the Recursive selection g. On the Include /Exclude screen, click OK. 73 EVault Software i365, A Seagate Company
74 h. On the Restore Wizard (safeset ) Select Restore Objects screen, select System State and click Next >. i. On the Restore Wizard (safeset ) Destination Options screen, select, Next >. Notice that all of your options are greyed out on this screen. It s because we ve chosen System State for recovery. You can t redirect System State to a different file path or folder location. j. On the Restore Wizard (safeset ) Advanced Restore Options screen, select Yes, overwrite locked files and click Next >. This is because we ll be overwriting files in the Windows and Program Files directories. Whenever performing full DR restores, you want to choose this option. It will require a reboot of the Agent system once completed. k. On the Restore Wizard (safeset ) Finish screen, click Finish. 74 EVault Software i365, A Seagate Company
75 3. Monitor Restore a. On the Process Information screen, wait for the Status to Disconnected. b. On the Operator Request screen, click Reboot Now. c. On the Operator Request screen, click Yes to confirm the reboot. d. The Restore is now completed and you ve triggered a reboot of the FS03 server. e. CentralControl will show some failures to connect to FS03. This is expected. Just click OK to the various messages you see. This is because we re rebooting the machine, and also, we ve just turned FS03 into EXCH EVault Software i365, A Seagate Company
76 Exercise 17 DR Exercise Check Your Work on Recovered Machine In the previous exercise, we recovered all of EXCH01 s Data Job to FS03 and rebooted the system. We won t be able to connect to that machine via Surgient s drop-down connection at the top. This is because the IP address of the machine is now that of EXCH01 s. We ll need to connect via Remote Desktop on our HQ-Vault machine. Remember that the Data Job did not include the databases. We will need to restore those in a following exercise. Tasks 1. Detailed Steps a. Click Start / Run HQ-Vault b. In the Run screen, type mstsc and click OK. c. On the Remote Desktop Connection screen, type for the Computer and click Connect. If the connection fails, it probably means that the system hasn t finished rebooting. Wait a minute and try again. 76 EVault Software i365, A Seagate Company
77 d. On the Windows Security screen: User name: TrainingLab\Administrator Password: I365password Click OK 2. Check Your Work a. You might a screen that prompts you to retype your Windows product key. Click Ask me later. Normally, you would retype your Windows license key. b. Check that the Hostname and IP address are that of EXCH01. c. Click Start \ Command Prompt 77 EVault Software i365, A Seagate Company
78 d. At the command prompt, type ipconfig /all and hit enter. You should see that all of the various attributes are that of EXCH EVault Software i365, A Seagate Company
79 Exercise 18 DR Exercise Recovering Databases When using the Exchange Plug-in and restoring from a disaster, there are several steps that need to be made. These steps are very similar to the steps we followed earlier when restoring the single Mailbox database. This time, we ll restore both the Mailbox and Public Folders databases. In this case, the databases will already be dismounted, but we need to remember to make sure that they can be overwritten by a restore. We also need to clear out any files in the database directories. When you reboot the system from a restore, Exchange will automatically insert some files in the database directories. These need to be removed prior to our restore. Tasks 1. Detailed Steps a. At this point you should still have a Remote Desktop Connection open to EXCH01 and looking at its desktop. EXCH01 (Remote Desktop Connection from HQ-Vault) 2. Allow Databases to be Overwritten by a Restore a. Click Start / Exchange Management Console. 79 EVault Software i365, A Seagate Company
80 b. In Exchange Management Console, click Microsoft Exchange On- Premises. c. Under Organizational Health, click Manage Databases. d. Under Database Management, right-click Mailbox Database xxx and select Properties. 80 EVault Software i365, A Seagate Company
81 e. In the Mailbox Database xxx Properties screen, click the Maintenance tab. f. On the Maintenance tab, check This database can be overwritten by a restore and click OK. g. In the Exchange Management Console, right-click Public Folder Database xxx and select Properties. 81 EVault Software i365, A Seagate Company
82 h. On the Public Folder Database xxx Properties screen, check This database can be overwritten by a restore and click OK. i. Both databases can now be overwritten by our Restore. The next step is to delete any existing data in the database directories. 3. Delete Files in Database Directories a. Right-click the Start menu and select Open Windows Explorer. b. In Windows Explorer, navigate to C:\Program Files\Microsoft\Exchange Server\V14\Mailbox\Mailbox Database xxx. 82 EVault Software i365, A Seagate Company
83 c. In Windows Explorer, press CTRL-A (to do a select all), right-click your selection and select Delete. d. On the Delete Multiple Items screen, click Yes. e. In Windows Explorer, navigate to C:\Program Files\Microsoft\Exchange Server\V14\Mailbox\Public Folder Database xxx. 83 EVault Software i365, A Seagate Company
84 f. In Windows Explorer, press CTRL-A, right-click your selection and select Delete. g. On the Delete Multiple Items screen, click Yes. h. We re now ready to Restore our databases. 4. Restore Master Database a. Click Minimize to minimize your connection to EXCH01. You should then be back on the desktop of HQ-Vault. HQ-Vault b. In CentralControl, expand EXCH01, right-click DR, and select Restore The machine that was once FS03 is now EXCH01 because of the restore. c. On the Restore Wizard Welcome screen, click Next >. 84 EVault Software i365, A Seagate Company
85 d. On the Restore Wizard (safeset Select a Source screen, click Next >. e. On the Restore Wizard (safeset ) Encryption Options screen, type test for both the Password and Verify Password and click Next >. f. On the Restore Wizard (safeset ) Select Restore Objects screen, click Add 85 EVault Software i365, A Seagate Company
86 g. On the Include / Exclude screen, highlight safeset and click Include. h. On the CentralControl screen, click Yes to include all files and directories. i. On the Include / Exclude screen, click OK. 86 EVault Software i365, A Seagate Company
87 j. On the Restore Wizard (safeset ) Select Restore Objects screen, click Next >. k. On the Restore Wizard (safeset ) Destination Options screen, select Restore files to their original locations and click Next >. l. On the Restore Wizard (safeset ) Advanced Restore Options screen, click Next >. m. On the Restore Wizard (safeset ) Finish screen, click Finish. n. On the Process Information screen, wait for the Status to say Restore completed and click Close. 87 EVault Software i365, A Seagate Company
88 5. Mount Databases a. On the taskbar, click Remote Desktop to reopen our Remote Desktop Connection to EXCH01. EXCH01 (Remote Desktop Connection from HQ-Vault) b. In the Exchange Management Console, right-click Mailbox Database xxx and select Mount Database. c. In the Exchange Management Console, right-click Public Folder Database xxx and select Mount Database. 88 EVault Software i365, A Seagate Company
89 6. Verify is Restored by Checking Outlook Web Access a. Click Start / Internet Explorer (64-bit). EXCH01 b. Click the Outlook Web App link on the Favorites Bar. c. In Internet Explorer, click Continue to this website (not recommended. 89 EVault Software i365, A Seagate Company
90 d. In Outlook Web Access : Domain\user name: TrainingLab\John Password: I365password Click Sign in e. In Outlook Web Access, you should see your original 3 messages. 90 EVault Software i365, A Seagate Company
91 Conclusion In this lab, you learned how to protect an Exchange 2010 server. We practiced backing up and restoring a single database as well as recovering the entire system. Hopefully you feel fairly confident at configuring this on your own now. Protection of Exchange 2007 is almost identical. Remember to check the Exchange Plug-in guide for instructions to setup MAPI protection (not yet available for Exchange 2010). Please feel free to do further testing in your training lab. For further information about EVault, you can always check our knowledge base and library of user guides available at You can always send comments and suggestions for this training module to training@i365.com or for support related issues you can contact us at support@i365.com. 91 EVault Software i365, A Seagate Company
92 Appendix A In this section, we ll discuss some of the settings found within Agent Configuration in CentralControl. Items like notifications and retentions should be reviewed on every implementation. In this example, we ll assume you ve completed all of the above exercises. Tasks 1. Switch Machines HQ-Vault Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose HQ- Vault-Server to connect to the HQ-Vault. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. On the desktop, double-click EVault Software CentralControl. This is the localized Windows CentralControl. 2. Open Agent Configuration a. Right-click EXCH01 and choose Agent Configuration. We re able to choose EXCH01 because we ve overwritten FS03 with the restore of EXCH01 s data. 3. Vaults Tab a. On the Vaults tab, you can modify existing Vault profiles are add additional Vault Connections. If you were to choose to Dual Vault, you would need t a second Vault profile created here. 92 EVault Software i365, A Seagate Company
93 4. Retentions Tab a. On the Retentions tab, you can modify existing retentions or create new retentions to meet your business and compliance needs. Please review the course titled EVault - Course 411 (Understanding EVault Retentions) for more information. 5. Open File Tab a. On the Open File tab, you can manage either Open File Manager or Open Transaction Manager. These products are used for pre-volume Shadow Copy systems and are add-on products that allow you to protect open files on those systems.. 93 EVault Software i365, A Seagate Company
94 6. Notification Tab a. On the Notifications tab, you should always have s sent when there s a failure. It s up to you if you want s sent on error or success as well. You will need to fill out the settings according to your environment. EVault sends its notifications similar to an anonymous (sendmail). If you need to provide an authenticated an account, you can do so at the bottom. I ve filled out some fictitious information below. 7. Advanced Tab a. On the Advanced tab, you can change: 94 EVault Software i365, A Seagate Company
95 Execution priority (CPU priority) Recommend leaving at the default but you have options to change the settings here. Bandwidth This is where you can set bandwidth throttling. Bandwidth throttling is on a per Agent basis and does not take into account other Agents sharing a network connection. If you need to have throttling on a site basis, you should use Quality of Service on your Firewall and throttle TCP port 2546 as a bulk item. This is the port that backup traffic traverses across. 8. Plug-In Tab a. On the Plug-in tab, there is a place to entire a license key. These are really for versions of version 5 Vaults and prior. Starting with version 5.2 and above Vaults, all Plug-in licenses are managed on the Vault itself. For the Exchange 2007 Plug-In, this is where you would enter your MAPI user credentials. 8. Power Management a. The Power Management tab is only available if you ve installed the Agent Assistant at time of Agent install. This was one of options you had when 95 EVault Software i365, A Seagate Company
96 Tab installing the Agent. It provides additional features to do things like prevent shutdown when a backup is running. Really these settings were taken from our Desktop Agent. Most server Agents should be operational all the time and not shut down. 96 EVault Software i365, A Seagate Company
EVault Software. Course 301 Server Protection with EVault File and System State
EVault Software Course 301 Server Protection with EVault File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers
More informationHow To Backup An Entire Database With A Microsoft Sql Server On A Pcode (Windows) 2.5.2.2 (Windows Xp) 2 (Windows 2000) 2-Year Old (Windows 2) 2Nd Generation (Windows 1
EVault Software Course 311 Protecting SQL Server with EVault SQL Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers
More informationEVault Software. Course 361 Protecting Linux and UNIX with EVault
EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in
More informationEVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM
EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers
More informationEVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault
EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...
More informationEVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State
EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for
More informationBackupAssist v6 quickstart guide
Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...
More informationInstallation & Configuration Guide
EVault InfoStage 4.6 MS SQL Server Plug-In Installation & Configuration Guide March 2004 This manual describes how to install, backup and restore using MS SQL Server Plug-In, Version 4.6 Contents 1 Introduction
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationExchange Mailbox Protection Whitepaper
Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange
More informationAdministration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233
Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features
More informationBackupAssist v6 quickstart guide
New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet
More informationVSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider
VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider System Configuration Guide November 2009 Fujitsu Limited Table of Contents 1. Executive Summary...
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationSupport Document: Microsoft SQL Server - LiveVault 7.6X
Contents Preparing to create a Microsoft SQL backup policy... 2 Adjusting the SQL max worker threads option... 2 Preparing for Log truncation... 3 Best Practices... 3 Microsoft SQL Server 2005, 2008, or
More informationExchange Granular Restore User Guide
User Guide Contents 1. overview... 2 2. Backup considerations... 3 Exchange VM Detection... 3 VSS Application backups... 3 Restore vs. Recovery... 3 Backup user identity... 3 3. Creating an Exchange backup...
More informationSonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore
SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in
More informationBackup and Disaster Recovery Restoration Guide
Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting
More informationContents. Getting Started...1. Managing Your Drives...14. Backing Up & Restoring Folders...28. Synchronizing Folders...48. Managing Security...
Contents Getting Started.....................................................1 Using the Formatting Tool........................................1 Preparing the Software Manually..................................4
More informationExchange Server Backup and Restore
WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...
More informationSystem Protection for Hyper-V Whitepaper
Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationHow To Install The Exchange Idataagent On A Windows 7.5.1 (Windows 7) (Windows 8) (Powerpoint) (For Windows 7) And Windows 7 (Windows) (Netware) (Operations) (X
Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS
More informationNovaBACKUP. User Manual. NovaStor / May 2014
NovaBACKUP User Manual NovaStor / May 2014 2014 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without notice.
More informationSymantec Backup Exec 12.5 for Windows Servers. Quick Installation Guide
Symantec Backup Exec 12.5 for Windows Servers Quick Installation Guide 13897290 Installing Backup Exec This document includes the following topics: System requirements Before you install About the Backup
More informationEVault Software Microsoft SQL Server Plug-in 7.1 User Guide
EVault Software Microsoft SQL Server Plug-in 7.1 User Guide Copyright Revision: This manual has been updated for Version 7.1 (November 2012). Software Version: 7.10 1997-2012 EVault Inc. EVault, A Seagate
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationInstallation & Configuration Guide
EVault InfoStage MS SQL Server Plug-In 4.20 Installation & Configuration Guide June 2003 This manual describes how to install, backup and restore using EVault InfoStage MS SQL Server Plug-In, Version 4.20
More informationLenovo Online Data Backup User Guide Version 1.8.14
Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data
More informationExchange Mailbox Protection
User Guide This guide applies to Windows Server 2008 and later. For Windows Server 2003, refer to the Exchange Server Protection whitepaper. BackupAssist User Guides explain how to create and modify backup
More informationNovaBACKUP. User Manual. NovaStor / November 2011
NovaBACKUP User Manual NovaStor / November 2011 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change without
More informationHosting Users Guide 2011
Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationMBS Microsoft SQL Server Plug-In 6.82 User Guide. Issue Date 07 December 10
MBS Microsoft SQL Server Plug-In 6.82 User Guide Issue Date 07 December 10 10 Introduction to the SQL Plug-In Introduction to the SQL Plug-In This chapter provides an overview. It also describes new features,
More informationCTERA Agent for Windows
User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written
More informationBacking Up and Restoring Microsoft Exchange Server 2010. Cloud Attached Storage. August 2012 Version 3.2
Backing Up and Restoring Microsoft Exchange Server 2010 Cloud Attached Storage August 2012 Version 3.2 1 Introduction This document explains how to backup your Microsoft Exchange Server 2010 database and
More informationUser Guide. CTERA Agent. August 2011 Version 3.0
User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission
More informationSQL Server Protection
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
More informationOnline Backup Client 3.9 Manual
HelpAndManual_unregistered_evaluation_copy by BackupAgent BV Index Online Backup Client 3.9 1 1. Benefits 2 2. Features 3 3. System Requirements 4 4. Setup 5 5. Client 8 5.1 Registration Wizard... 9 5.2
More informationRingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
More informationGUARD1 PLUS SE Administrator's Manual
GUARD1 PLUS SE Administrator's Manual Version 4.4 30700 Bainbridge Road Solon, Ohio 44139 Phone 216-595-0890 Fax 216-595-0991 info@guard1.com www.guard1.com i 2010 TimeKeeping Systems, Inc. GUARD1 PLUS
More informationTable of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15
Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required
More informationExchange Granular Restore. User Guide
User Guide Contents 1. overview... 2 2. Backup considerations... 3 Backup user identity... 3 Exchange VM Detection... 3 Restore vs. Recovery... 3 3. Creating an Exchange backup... 4 4.... 7 Step 1 - Locate
More informationEVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22
EVault Software Microsoft SharePoint 2010/2013 Backup and Restore Guide 7.22 Copyright SharePoint Backup and Restore Guide 7.22 Revision: This manual has been created for Version 7.22 (June 2013). Software
More informationEnterprise Manager. Version 6.2. Installation Guide
Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1
More informationUser Guide - Exchange Public Folder idataagent
Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT
More informationSQL Server Protection. User guide
User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Requirements... 2 2. SQL Protection overview... 3 Backup destinations... 3 Transaction logs... 3 Hyper-V backups... 4 SQL database
More informationZen Internet. Online Data Backup. Zen Vault Professional Plug-ins. Issue: 2.0.08
Zen Internet Online Data Backup Zen Vault Professional Plug-ins Issue: 2.0.08 Contents 1 Plug-in Installer... 3 1.1 Installation and Configuration... 3 2 Plug-ins... 5 2.1 Email Notification... 5 2.1.1
More informationFalconStor Recovery Agents User Guide
FalconStor Recovery Agents User Guide FalconStor Software, Inc. 2 Huntington Quadrangle Melville, NY 11747 Phone: 631-777-5188 Fax: 631-501-7633 Web site: www.falconstor.com Copyright 2007-2009 FalconStor
More informationwith the ArchiveSync Add-On Evaluator s Guide 2015 Software Pursuits, Inc.
with the ArchiveSync Add-On Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 Required Add-Ons for ArchiveSync in Real-Time... 3 Communications
More informationCA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange
CA RECOVERY MANAGEMENT R12.5 BEST PRACTICES CA ARCserve and CA XOsoft r12.5 Best Practices for protecting Microsoft Exchange Overview Benefits The CA Advantage The CA ARCserve Backup Support and Engineering
More informationSetting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010
Setting Up a Unisphere Management Station for the VNX Series P/N 300-011-796 Revision A01 January 5, 2010 This document describes the different types of Unisphere management stations and tells how to install
More informationAcronis Backup & Recovery 11.5
Acronis Backup & Recovery 11.5 Update 2 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone
More informationNETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationTeam Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
More informationGREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007
GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email
More informationMoving the TRITON Reporting Databases
Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,
More information1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationNexio Connectus with Nexio G-Scribe
Nexio Connectus with Nexio G-Scribe 2.1.2 3/20/2014 Edition: A 2.1.2 Publication Information 2014 Imagine Communications. Proprietary and Confidential. Imagine Communications considers this document and
More information3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
More informationSophos Enterprise Console server to server migration guide. Product version: 5.2
Sophos Enterprise Console server to server migration guide Product : 5.2 Document date: December 2014 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the
More informationExchange Granular Restore Instructional User Guide
Exchange Granular Restore Instructional User Guide www.backup-assist.ca Contents 1. Exchange Granular Restore overview... 2 2. Creating an Exchange backup... 3 3. Exchange Granular Restore... 6 Step 1
More informationSpector 360 Deployment Guide. Version 7
Spector 360 Deployment Guide Version 7 December 11, 2009 Table of Contents Deployment Guide...1 Spector 360 DeploymentGuide... 1 Installing Spector 360... 3 Installing Spector 360 Servers (Details)...
More informationAcronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide
Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License
More informationHyper-V Protection. User guide
Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom
More informationPro Bundle Evaluator s Guide. 2015 Software Pursuits, Inc.
Pro Bundle Evaluator s Guide 2015 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 3 About the Communications Agent Add-On... 3 Other SureSync Add-Ons... 4 File Locking
More information1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2
User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers
More informationQuadro Configuration Console User's Guide. Table of Contents. Table of Contents
Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...
More informationSophos Enterprise Console server to server migration guide. Product version: 5.1 Document date: June 2012
Sophos Enterprise Console server to server migration guide Product : 5.1 Document date: June 2012 Contents 1 About this guide...3 2 Terminology...4 3 Assumptions...5 4 Prerequisite...6 5 What are the key
More informationPortions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.
Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information
More informationAcronis Backup & Recovery 11.5. Backing Up Microsoft Exchange Server Data
Acronis Backup & Recovery 11.5 Backing Up Microsoft Exchange Server Data Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. Acronis and Acronis Secure Zone are registered
More informationsafend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
More informationHow To Manage Your Email On A Microsoft Powerbook 2.5 (For Microsoft) On A Macbook 2 (For A Mac) On An Iphone Or Ipad (For An Ipad) On Your Pc Or Macbook
Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -
More informationEVault Software Microsoft SQL Server Plug-in 7.3 User Guide
EVault Software Microsoft SQL Server Plug-in 7.3 User Guide Revision: This manual has been updated for Version 7.33 (August 2014). Software Version: 7.33 2014 EVault Inc. EVault, A Seagate Company, makes
More informationShadowProtect Granular Recovery for Exchange Migration Scenarios
ShadowProtect Granular Recovery for Exchange Migration Scenarios StorageCraft Technology Corporation 2010 StorageCraft Technology Corporation. All Rights Reserved. This brochure is for informational purposes
More informationDirect Storage Access Using NetApp SnapDrive. Installation & Administration Guide
Direct Storage Access Using NetApp SnapDrive Installation & Administration Guide SnapDrive overview... 3 What SnapDrive does... 3 What SnapDrive does not do... 3 Recommendations for using SnapDrive...
More informationEVault Software Microsoft Exchange Plug-in 7.2 User Guide
EVault Software Microsoft Exchange Plug-in 7.2 User Guide Revision: This manual has been updated for Version 7.2 (February 2012). Software Version: 7.20 2013, EVault Inc. EVault, A Seagate Company, makes
More informationGO!NotifyLink. Database Maintenance. GO!NotifyLink Database Maintenance 1
GO!NotifyLink Database Maintenance GO!NotifyLink Database Maintenance 1 Table of Contents Database Maintenance 3 Database Cleanup... 3 Database Backups... 3 Database Configuration... 4 The Procedure via
More informationVess A2000 Series. NVR Storage Appliance. Windows Recovery Instructions. Version 1.0. 2014 PROMISE Technology, Inc. All Rights Reserved.
Vess A2000 Series NVR Storage Appliance Windows Recovery Instructions Version 1.0 2014 PROMISE Technology, Inc. All Rights Reserved. Contents Introduction 1 Different ways to backup the system disk 2 Before
More informationOnline Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
More informationEVault Software Microsoft SQL Server Plug-in 6.82 User s Guide
EVault Software Microsoft SQL Server Plug-in 6.82 User s Guide Published: February 25, 2011 Revision: This manual has been updated for Version 6.8.2 Software Version: 6.82 (February 2011) 1997-2011 i365
More informationBosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.
Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information
More informationSynchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
More informationSQL Server Protection Whitepaper
SQL Server Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 The benefits of using the SQL Server Add-on... 2 Requirements... 2 2. SQL Protection overview... 3 User databases...
More informationInstallation and User Guide for Partners and Businesses
Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting
More informationSmartFiler Backup Appliance User Guide 2.0
SmartFiler Backup Appliance User Guide 2.0 SmartFiler Backup Appliance User Guide 1 Table of Contents Overview... 5 Solution Overview... 5 SmartFiler Backup Appliance Overview... 5 Getting Started... 7
More informationEnterprise Remote Control 5.6 Manual
Enterprise Remote Control 5.6 Manual Solutions for Network Administrators Copyright 2015, IntelliAdmin, LLC Revision 3/26/2015 http://www.intelliadmin.com Page 1 Table of Contents What is Enterprise Remote
More informationTANDBERG MANAGEMENT SUITE 10.0
TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS
More informationTM Online Storage: StorageSync
TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please
More informationCox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
More informationEVault Software Agent 7.1 for Microsoft Windows User Guide
EVault Software Agent 7.1 for Microsoft Windows User Guide Revision: This manual has been updated for Version 7.1 (December 2012). Software Version: 7.10 1997-2012 EVault Inc. EVault, A Seagate Company,
More informationServer Installation: ServerTools
Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the
More informationUsing iscsi with BackupAssist. User Guide
User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...
More informationBACKUP & RESTORE (FILE SYSTEM)
Table of Contents Table of Contents... 1 Perform a Backup (File System)... 1 What Gets Backed Up... 2 What Does Not Get Backed Up... 3 Perform a Restore... 4 Perform a Backup (File System) The following
More informationStep-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3)
Step-by-step installation guide for monitoring untrusted servers using Operations Manager ( Part 3 of 3) Manual installation of agents and importing the SCOM certificate to the servers to be monitored:
More informationBackup & Disaster Recovery Appliance User Guide
Built on the Intel Hybrid Cloud Platform Backup & Disaster Recovery Appliance User Guide Order Number: G68664-001 Rev 1.0 June 22, 2012 Contents Registering the BDR Appliance... 4 Step 1: Register the
More informationEVault for Data Protection Manager. Course 401 EDPM Troubleshooting Basics
EVault for Data Protection Manager Course 401 EDPM Troubleshooting Basics Table of Contents Objectives... 3 Scenario... 3 Level 1 Support Expectations Rules of Engagement... 4 Online Resources... 5 i365
More informationInstallation Instruction STATISTICA Enterprise Server
Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of
More information