EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "EVault for Data Protection Manager. Course 321 Protecting Exchange 2010 with DPM"

Transcription

1 EVault for Data Protection Manager Course 321 Protecting Exchange 2010 with DPM

2 Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing Windows Server Backup on Exchange Server... 4 Exercise 2 Installing DPM Agent on Exchange Server... 4 Exercise 3 For this Lab Only Create sample data... 6 Exercise 4 Creating an Exchange Protection Group... 8 Exercise 5 For this Lab Only Modify Mailbox Data Exercise 6 Creating a Recovery Database (Exchange 2010) Exercise 7 Recovering a Mailbox to a Recovery Database with DPM Exercise 8 Recovering a Mailbox using a Recovery Database Exercise 9 Recovering an Exchange Database with DPM Prep Exchange Exercise 10 Recovering an Exchange Database with DPM Performing Restore in DPM Conclusion EVault for Data Protection Manager i365, A Seagate Company

3 Objectives The purpose of this lab is to provide instructions on how to protect and restore Exchange 2010 mail data. All Protection Groups that are created in this lab only focus on Exchange application data (Databases). Normally you would need to protect all file data and system state data to protect this system from disaster. This is covered in Lab 201 Protecting File Data, System State, and Bare-Metal Recovery. Scenario Estimated Time to Complete This Lab We ll go through the process of installing Windows Server Backup feature, pushing the Agent out to the Exchange server, create a sample mailbox and , create a Protection Group, delete some , and then restore the Minutes Requirements for This Lab IMPORTANT Windows Server Backup Feature must be installed on the Exchange server in order to allow for the required vss backups. This is a requirement for any Server 2008 machine. Exchange Server is joined to our domain Exchange Server is running on Server 2008 x64 On your productions machines, we recommend that all Windows Updates have been applied Computers Used in This Lab EDPM DC01 BAV1 EXCH01 3 EVault for Data Protection Manager i365, A Seagate Company

4 Exercise 1 Installing Windows Server Backup on Exchange Server In this lab, we ll install the Windows Server Backup feature onto our Exchange server. This is a requirement to enable backups on Server Windows Server Backup is the replacement of its predecessor, ntbackup. 1. Initial Logon EXCH01 2. Adding Windows Server Backup Feature a. Once the lab starts, within Surgient, click on the EXCH01_Server and choose RDP. b. Click the Start menu, right-click Computer, and choose Manage. c. In the Server Manager window, on the left-hand pane, click Features. d. On the right-hand pane, click Add Features. a. On the Add Features Wizard screen, check Windows Server Backup Features and expands its tree. b. Also check Command-line Tools. Now all of Windows Server Backup Features should have tick boxes next to them. c. Click Next >. d. On the Confirmation screen, click Install. e. Installation will take a minute or so. After which the Results screen should state that Installation succeeded. Click Close. Exercise 2 Installing DPM Agent on Exchange Server In this step, we will push the DPM Agent to an Exchange 2010 server that we wish to protect. This will allow us to further configure the protection of our Exchange server through DPM. 1. Switch Machines EDPM 2. DPM 2010 Administrator Console 3. Agent Installation Wizard a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. On the Desktop, open Microsoft System Center Data Protection Manager b. Within the DPM 2010 Administrator Console, click the Management tab. c. On this tab, click the Agents tab. d. Under Selected Items, click Install a. On the Select Agent Deployment Method, we ll choose Install agents. Choose Install Agent option if the server you intend to protect is part of the domain and not behind a firewall. Otherwise you would choose to manually install the Agent and then Attach agents. Attach agents is a method that can always be used to troubleshoot agent installation issues. 4 EVault for Data Protection Manager i365, A Seagate Company

5 b. Click Next. c. Select EXCH01, and click Add >. d. Click Next >. e. We need to specify a user with Administrator privileges. This is because the user the backup uses this user to perform backups. User name: Administrator Password: I365password Domain: TrainingLab.com f. Click Next >. g. On the Choose Restart Method screen, we ll choose No. I will restart the selected computer later. This way, you can restart the server during off hours. h. Click Next >. i. On the Summary screen, click Install. j. DPM will now push the DPM Agent to the Exchange Server. Once it completes. Click Close. 5 EVault for Data Protection Manager i365, A Seagate Company

6 Exercise 3 For this Lab Only Create sample data In the next steps, we ll create some sample data to protect. In your production environment you would not normally follow these steps as you ll already have some Exchange data with your own proprietary data. 1. Switch Machines EXCH01 2. Exchange Management Console 3. Creating a Sample Mailbox 4. Populate Mailbox with Sample s through OWA b. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the Exchange server. b. In the Start menu, open Exchange Management Console. This is the management interface for Exchange where you can create and manage mailboxes. a. On the left-hand pane, click Microsoft Exchange On-Premises (exch01.traininglab.com). b. In the middle pane, you ll see the status say unavailable but then it will update with the number of databases and such. Click Manage databases. c. On the left-hand pane, expand Recipient Configuration. d. On the left-hand pane, highlight Mailbox, and on the right-hand pane choose New Mailbox a. On the Introduction section, choose User Mailbox and click Next >. b. On the User Type section, choose New user and select Next >. c. On the User Information section (any fields I don t specify, don t change) First name: Bob Last name: Jones User logon name (User Principal Name): Bob Password and Confirm Password: I365password Click Next > d. On the Mailbox Settings section, for the Alias, type Bob and click Next >. e. On the Archive Settings section, click Next >. f. On the New Mailbox section, click New. g. On the Completion section, click Finish. a. In the Start menu, open Internet Explorer (64-bit). b. In Internet Explorer s address bar, type Otherwise, I ve made a favorite in the Favorite Bar. c. Because Outlook Web App (OWA) is intended to be protected via SSL (https), you will receive a message: There is a problem with this website s security certificate because I did apply a certificate to the installation. d. Click Continue to this website (not recommended). e. In Outlook Web App Domain\user name: TrainingLab\Bob Password: I365password Click Sign in You ll be prompted for Language and Time zone, click OK. f. For the sample s, you ll be composing three new s to yourself In OWA, click New. You ll get another message regarding There is a 6 EVault for Data Protection Manager i365, A Seagate Company

7 problem with this website s security certificate. Click Continue to this website (not recommended). i. In the To field, type Bob. ii. Type whatever you want for the Subject and Body of the message. iii. Click Send. iv. Repeat so that you have a total of 3 s in your Inbox. You might need to refresh your Inbox to see these. 7 EVault for Data Protection Manager i365, A Seagate Company

8 Exercise 4 Creating an Exchange Protection Group In this section, you ll learn how to protect your newly created Exchange data by creating a Protection Group within DPM. Exchange data can be backed up and recoverable within as little as 15 minute intervals. In this example, we ll just protect the Exchange databases. We typically recommend protecting the file data with a different protection group policy. This is because file data doesn t typically need to be protected on a 15 minute interval. Most users are more concerned about they re highly active data such as databases. 1. Switch Machines EDPM 2. DPM 2010 Administrator Console 3. Protection group wizard a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect back to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. Within the DPM 2010 Administrator Console, click the Protection tab. b. This is where we ll be creating a Protection Group. A Protection Group is a set of rules that can be applied to one or many servers. It s within this group that we can define schedules, retention, synchronization frequency, and various backup policies. Users might put several similar servers in a protection group so that they have similar policies. c. Under Selected Items, click Create Protection Group a. On the Welcome to the New Protection Group Wizard choose Next >. b. On the Select Protection Group Type screen, select Servers and choose Next >. 8 EVault for Data Protection Manager i365, A Seagate Company

9 Server Agents Includes server class operating systems such as Windows 2003 and 2008 along with application specific integration. File Data Allows for protection of file level data such as entire volumes on a system, individual files and folders, shares presented or even system state backups. Server 2008 also allows for possible additional recoverability by providing options to do Bare Metal Recovery. Application Data Allows for protection of application data such as SQL, Exchange, SharePoint, and Hyper-V data. Integration allows for seamless hot backups of these applications. Client Agents Allows for protection of workstation operating systems such as Windows XP, Vista, and Windows 7 c. On the Select Group Members screen, expand EXCH01. This will take a minute for DPM to collect EXCH01 s information. d. Check Exchange 2010 Databases. You ll notice that if you expand this field, you ll see both the Mailbox databases and Public Folder databases can be backed up, and these have been included in our Protection Set. e. Click Next >. f. On the Select Data Protection Method screen, we need to name our Protection Group. In this case name it, Exchange Servers. For short-term protection, we ll use Disk. Notice that long-term protection options is greyed out. This is because we do not have a tape library attached for long-term protection. Click Next >. g. On the Specify Exchange Protection Options screen, you have options to use ESEUTIL to check the integrity of your data. Click Next >. 9 EVault for Data Protection Manager i365, A Seagate Company

10 Enabling ESEUTIL Before you continue, you should know that ESEUTIL and the supporting DLL file are not automatically installed on the DPM 2010 server. Using ESEUTIL on the DPM server is recommended, but this will require you to install Exchange Management Tools on your DPM 2010 server. Note: The version of ESEUTIL that you deploy must match the highest version of Exchange Server that's deployed on your network. Keep in mind that ESEUTIL is updated with each service pack. Therefore, if the highest version of Exchange running on your network is Exchange Server 2003 SP2, you'll need to install the SP2 version of the Exchange Server 2003 management tools. This is also true with Exchange Server 2007, which is a 64-bit application. You must use the version that corresponds to the highest version of Exchange installed on your network. It's also important to remember that Exchange Management Tools must be kept current. If you install a new service pack for Exchange Server at a later date, you have to update the management tools on DPM After you've installed the Exchange Server Management Tools, copy the ESE.dll and ESEUTIL.exe files from c:\program Files\Microsoft\Exchange Server\Bin to c:\program Files\Microsoft DPM\DPM\bin\ h. On the Specify Exchange DAG protection screen, we will want to leave the defaults (Full Backups) because our Exchange environment is not setup in a Database Availability Group. Click Next >. i. We re now on the Specify Short-Term Goals screen. This is where we setup retentions and backup frequency. 10 EVault for Data Protection Manager i365, A Seagate Company

11 Retention Range This defines how many days back you can restore your data. Synchronization Frequency With application data such as SQL and Exchange, a synchronization with send over just transaction logs for SQL or Exchange to the DPM server. For application data, Synchronizations will create Recovery Points after each completion. This can happen in intervals as little as every 15 minutes. When scheduling a short frequency, you need to consider how much change is occurring on the application server and the bandwidth between the Agent and DPM server. If synchronizes are not completing in the 15 minute window, you can modify the synchronization rate to a longer window like every hour or every 2 hours. Initial Replica With application data, this will send over the entire database to the DPM server. With SQL, it will send over the mdf and ldf files. For Exchange, it will send over the.edb,.stm, and.logs. Express Full Backup With application data on the first Express Full Backup, it will send over the changed blocks since the last Initial Replica. On subsequent Express Full Backups, the Agent will send over the changed blocks since the last Express Full Backup. Each Express Full also generates a Recovery Point. As opposed to just sending over transaction logs, Express Fulls send over changes in the database itself. Recovery Point A point in time you can restore from. For the Retention range, we ll set it to 30 days. This allows us to restore from the last 30 days. The maximum value is 64 days. The more days of retentions, the more storage you ll need. For the Synchronization frequency, we ll leave the default to Synchronize every 15 minutes. This will allow us to restore our application data within intervals of every 15 minutes. For the Express Full Backup setting, we ll leave the default to backup 8:00 PM Everyday. However, you could Modify this. The schedule should be defined when people are generally not using the system. Typically during off hours. Click Next >. j. We re now on the Review Disk Allocation screen. In the Disk apace allocation of new members section, you ll notice 11 EVault for Data Protection Manager i365, A Seagate Company

12 4. Protection Status that the Total data size and Disk space allocated in DPM values might seem large. DPM performs some calculations and factors in the most possible change that can occur on your system. You can change these values so that DPM will not dedicate so much space. We ll click on Modify later, but first I want to explain the following: i. Automatically grow the volumes DPM will automatically grow your volumes if they are nearing capacity. It will grow them by 25% or 10 GBs whichever is bigger. By choosing this, you can size your volumes smaller and let DPM grow the volumes on its own. DPM can only auto grow a volume once per every 15 minute window. Click Modify so that we can resize the volume allocation. i. Replica Volume is where DPM stores the current state of the server. The smallest size is 1 GB. If your server was 10 GBs, you can set this to 10 GB. Another example is when you re protecting a folder on the C: that s 5 GBs but you re actually using 100 GBs on the C: amongst all of its folders, DPM will display the Replica Volume as 100 GBs because DPM considers that you might want to protect other data on that volume. ii. Recovery Point Volume Is where DPM stores the incremental changes between backups. The Recovery Points are played back against the Replica Volume. The more recovery points made, the larger the Recovery Point Volume. The smallest value for this is 1.56 GB. iii. Set the each of the Replica Volumes to 1 GB. iv. Set the each of the Recovery Point Volumes to 1.56 GB. v. Click OK. Click Next >. k. On the Choose Replication Creation Method screen, we ll leave the Defaults which means we ll send the Replica Now. However, normally, we recommend waiting to send the Initial Replica until after hours. During time of the Initial Replica all files selected are sent to DPM server. This will take time depending on the size of the data. We want to avoid congesting the network at peak hours. Click Next >. l. On the Consistency check options screen, we ll choose to Run a consistency check if a replica becomes inconsistent. You can schedule this, but consistency checks can take time as they do a block for block comparison of the Replica that exists on the DPM server to the production data on the Agent machine. Click Next >. m. On the Summary screen, click Create Group. n. On the Status screen, wait for all the results to state Success and click Close. a. Back in the DPM 2010 Administrator Console, notice that the Protection Group Protection Status changes from Replica creation in progress to OK. b. Once all of the databases selected in the Protection Group have an OK Protection Status, your databases have been successfully backed up. 12 EVault for Data Protection Manager i365, A Seagate Company

13 c. If you wanted to check on their progress, you can always switch to the Monitoring tab. Here you can switch to the Jobs tab to get a more detailed status. The Alerts tab will show you any problems that might have occurred. 13 EVault for Data Protection Manager i365, A Seagate Company

14 Exercise 5 For this Lab Only Modify Mailbox Data In the next steps, we ll simply delete some and add some new Switch Machines EXCH01 2. Delete a message and create a message in OWA a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. In Outlook Web App, right-click a message (it doesn t matter which one) and choose Delete. b. In OWA, click New. You ll get another message regarding There is a problem with this website s security certificate. Click Continue to this website (not recommended). In the To field, type Bob. Type whatever you want for the Subject and Body of the message. Click Send. Exercise 6 Creating a Recovery Database (Exchange 2010) In the next steps, create a Recovery Database. DPM requires this to restore the database to temporarily. From the Recovery Database, we can merge recovered mail data back into the production mailbox. 1. Switch Machines EXCH01 2. Create a Recovery Database a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. You cannot create a recovery database using the console. You need to use Exchange Management Shell. b. In the Start menu, open Exchange Management Shell. c. The syntax to create a Recovery Database is the following: New-MailboxDatabase Recovery Name RDB Server servername EdbFilePath Path LogFolderPath path d. For our lab we ll use the following: New-MailboxDatabase Recovery Name RDB Server EXCH01 EdbFilePath C:\temp\RDB.edb LogFolderPath C:\temp\ Click Enter and you should see that the RDB database has been created. 14 EVault for Data Protection Manager i365, A Seagate Company

15 Exercise 7 Recovering a Mailbox to a Recovery Database with DPM For this exercise, we ll restore our sample mailbox to the Recovery Database. The purpose of this is that we ll be able to use Exchange tools to merge data back into our live Mailbox Database. 1. Switch Machines EDPM 2. Recovering a Database within DPM 3. Recovery Wizard a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect back to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. Within the DPM 2010 Administrator Console, click the Recovery tab. b. Expand Recoverable data\traininglab.com\exch01\all Protected Exchange Data\Mailbox Database. Here you ll see the various mailboxes that we can recover from. c. In the middle pane, we see a calendar of dates that we can choose from. Any calendar date that is in bold means that at least one Recovery Point exists on that day. d. For the Recovery Time field, use the drop-down and choose the most recent time. Choosing Latest might cause the Recovery to fail due to problems replaying Transaction Logs. e. Highlight Bob mailboxes at the bottom under Recoverable Item. f. On the right hand pane under Selected Items, choose Recover. This will spawn the Recovery Wizard. a. On the Review Recovery Selection screen, click Next >. b. On the Select recovery type screen, select Recover mailbox to an Exchange server database c. On the Specify destination screen, click Browse a. Select the EXCH01 server. b. Click OK. d. For the Database name, type RDB. This is the Recovery Database we had created earlier. e. On the Specify recovery options screen, click Next >. f. On the Summary screen, click Recover. g. On the Recovery Status screen, wait for the Recovery Status to read Successful. h. Click Close. 15 EVault for Data Protection Manager i365, A Seagate Company

16 Exercise 8 Recovering a Mailbox using a Recovery Database From the restore that we just completed, we ll switch back to our Exchange server and restore data from our Recovery Database back into our live Mailbox Database. This requires the use of the Exchange Management Shell as Microsoft has removed GUI based Exchange tools to do this operation. 1. Switch Machines EXCH01 2. Restore Data from Recovery Database to Live Database 3. Check OWA to Validate a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. You cannot recover data in the console. You need to use Exchange Management Shell. b. In the Start menu, open Exchange Management Shell. c. The syntax to see the contents of a database is the following: Get-MailboxStatistics Database <RecoveryDatabaseName> d. For our lab we ll use the following: Get-MailboxStatistics Database RDB Click Enter and you should see Bob Jones listed. e. To restore a mailbox, the syntax is: Restor box Identity <Username> -RecoveryDatabase <RecoveryDatabaseName> f. For our lab we ll use the following: Restor box Identity Bob -RecoveryDatabase RDB Click Enter and you will be prompted to Confirm. Click Enter again. a. Internet Explorer should still be open, but if it s not please open it. b. Our login to Outlook Web App might have timed out. If it has: a. Domain\user name: TrainingLab\Bob b. Password: I365password c. Click Sign in c. You should see that you have the original messages along (including the message you had deleted) along with the new message that was added. d. If you do not see any difference, remember that DPM backs up every 15 minutes. DPM might ve backed up your addition and deletion of a message, and that might be what you re seeing. If this is the case, you ll have to repeat the steps earlier in the lab and select an earlier time of recovery. Exercise 9 Recovering an Exchange Database with DPM Prep Exchange For this exercise, we ll restore our entire Mailbox Database back to the original Exchange server. Before we initiate the restore, we need to make sure that the database can be overwritten by a restores.in the previous exercise, we only restored one mailbox. In this procedure, we re recovering the entire database. This rolls the entire database back to a point in time. You would use this method if you had a corrupted database or were recovering from a disaster. 16 EVault for Data Protection Manager i365, A Seagate Company

17 1. Switch Machines EXCH01 2. Access Properties of our Mailbox Database 3. Allow Database to be Overwritten by a Restore a. Using the Server drop-down at the top of the Surgient window, choose EXCH01_Server to connect back to the EXCH01 server. b. Internet Explorer should still be open, but if it s not please open it. c. Our login to Outlook Web App might have timed out. If it has: Domain\user name: TrainingLab\Bob Password: I365password Click Sign in a. In the Start menu, open Exchange Management Console. b. It will take a minute for it to connect to our Exchange server. c. Expand Microsoft Exchange On-Premises (exch01.traininglab.com). d. Expand Organization Configuration. e. Highlight Mailbox. f. On the Database Management tab, right-click Mailbox Database and choose Properties. a. Click the Maintenance tab. b. Check This database can be overwritten by a restore. c. Click OK. Exercise 10 Recovering an Exchange Database with DPM Performing Restore in DPM For this exercise, we ll restore our entire Mailbox Database back to the original Exchange server. In the previous restore exercise, we only restored one mailbox. In this procedure, we re recovering the entire database. This rolls the entire database back to a point in time. You would use this method if you had a corrupted database or were recovering from a disaster. 1. Switch Machines EDPM 2. Recovering a Database within DPM a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect back to the EDPM server. b. The system should automatically log you in, but if you are prompted for login, below are the credentials. Username TrainingLab\Administrator Password I365password. c. If Server Manager opens, close it. a. Within the DPM 2010 Administrator Console, click the Recovery tab. b. Expand Recoverable data\traininglab.com\exch01\all Protected Exchange Data. Here you ll see the various databases that we can recover from. c. In the middle pane, we see a calendar of dates that we can choose from. Any calendar date that is in bold means that at least one Recovery Point exists on that day. d. For the Recovery Time field, use the drop-down and choose the most recent time. Choosing Latest might cause the Recovery to fail due to problems replaying Transaction Logs. 17 EVault for Data Protection Manager i365, A Seagate Company

18 3. Recovery Wizard e. Highlight the Mailbox Database at the bottom under Recoverable Item. f. On the right hand pane under Selected Items, choose Recover. This will spawn the Recovery Wizard. a. On the Review Recovery Selection screen, click Next >. b. On the Select recovery type screen, select Recover to original Exchange Server location and click Next >. c. On the Specify recovery options screen, we ll leave the defaults to Mount the databases after they are recovered. Click Next >. d. On the Summary screen, click Recover. e. On the Recovery Status screen, wait for the Recovery Status to read Successful. f. Click Close. Conclusion In this lab you ve learned how to not only protect Exchange but also how to restore individual mailbox data and entire Exchange databases. Please feel free to do further testing in your training lab. For further information about DPM, you can always access their Technet site at If this link is broken, goto navigate to Library, System Center, and choose System Center Data Protection Manager You can always send comments and suggestions for this training module to or for support related issues you can contact us at 18 EVault for Data Protection Manager i365, A Seagate Company

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State

EVault for Data Protection Manager. Course 301 Server Protection with DPM File and System State EVault for Data Protection Manager Course 301 Server Protection with DPM File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for

More information

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault

EVault for Data Protection Manager. Course 361 Protecting Linux and UNIX with EVault EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In

EVault Software. Course 321 Protecting Exchange Server with EVault Exchange Plug-In EVault Software Course 321 Protecting Exchange Server with EVault Exchange Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab...

More information

MS Exchange Server backup with eazybackup

MS Exchange Server backup with eazybackup Best Practice Whitepaper Version 1.4 1. Contents 1. Contents...2 2. Introduction...3 3. Backup Exchange 2003/2007 database...4 3.1. Mailstore level backup...4 3.2. Folder level backup...5 4. Restoring

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide Using the new features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 2 Backing up VSS applications... 2 Restoring VSS applications... 3 System State backup and restore...

More information

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange InfoStore Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange InfoStore Backup and Restore feature in

More information

Protecting Exchange 2010

Protecting Exchange 2010 Protecting Exchange 2010 Introduction With the introduction of Exchange 2010, many new Exchange features have been added or refined in the areas of mailbox recovery, mail archiving, and system robustness.

More information

EVault Software. Course 361 Protecting Linux and UNIX with EVault

EVault Software. Course 361 Protecting Linux and UNIX with EVault EVault Software Course 361 Protecting Linux and UNIX with EVault Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in

More information

BackupAssist v6 quickstart guide

BackupAssist v6 quickstart guide New features in BackupAssist v6... 2 VSS application backup (Exchange, SQL, SharePoint)... 3 System State backup... 3 Restore files, applications, System State and mailboxes... 4 Fully cloud ready Internet

More information

Exchange Server Backup and Restore

Exchange Server Backup and Restore WHITEPAPER BackupAssist Version 6 www.backupassist.com Cortex I.T. 2001-2007 2 Contents 1. Introduction... 3 1.1 Overview... 3 1.2 Requirements... 3 1.3 Requirements for remote backup of Exchange 2007...

More information

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore

SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore SonicWALL CDP 5.0 Microsoft Exchange User Mailbox Backup and Restore Document Scope This solutions document describes how to configure and use the Microsoft Exchange User Mailbox Backup and Restore feature

More information

MS Exchange Server backup with BackupAgent

MS Exchange Server backup with BackupAgent Best practice whitepaper Version 1.5 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights

More information

MS Exchange Server backup with BackupAgent

MS Exchange Server backup with BackupAgent Best practice whitepaper Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by other means. No rights can be derived

More information

EVault Software. Course 301 Server Protection with EVault File and System State

EVault Software. Course 301 Server Protection with EVault File and System State EVault Software Course 301 Server Protection with EVault File and System State Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

EVault Software. Course 311 Protecting SQL Server with EVault SQL Plug-In

EVault Software. Course 311 Protecting SQL Server with EVault SQL Plug-In EVault Software Course 311 Protecting SQL Server with EVault SQL Plug-In Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers

More information

Integrating Data Protection Manager with StorTrends itx

Integrating Data Protection Manager with StorTrends itx Integrating Data Protection Manager with StorTrends itx INTEGRATING DATA PROTECTION MANAGER WITH STORTRENDS ITX 2 1. Introduction 2 2. Test Environment 2 Requirements 2 3. Setting up the Application Servers

More information

Microsoft Office 365 online archive features and FAQs

Microsoft Office 365 online archive features and FAQs Microsoft Office 365 online archive features and FAQs 1 Contents Contents... 2 Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 3 Office 365 Archive... 4 Office 365 Archive

More information

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233

Administration GUIDE. Exchange Database idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 Administration GUIDE Exchange Database idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 233 User Guide - Exchange Database idataagent Table of Contents Overview Introduction Key Features

More information

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2

1. Overview... 2 Documentation... 2 Licensing... 2 Operating system considerations... 2 User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Hosting Users Guide 2011

Hosting Users Guide 2011 Hosting Users Guide 2011 eofficemgr technology support for small business Celebrating a decade of providing innovative cloud computing services to small business. Table of Contents Overview... 3 Configure

More information

User Guide - Exchange Database idataagent

User Guide - Exchange Database idataagent Page 1 of 208 User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS

More information

Moving the TRITON Reporting Databases

Moving the TRITON Reporting Databases Moving the TRITON Reporting Databases Topic 50530 Web, Data, and Email Security Versions 7.7.x, 7.8.x Updated 06-Nov-2013 If you need to move your Microsoft SQL Server database to a new location (directory,

More information

Hyper-V Cloud Practice Builder. Disaster Recovery Using DPM 2010

Hyper-V Cloud Practice Builder. Disaster Recovery Using DPM 2010 Hyper-V Cloud Practice Builder Disaster Recovery Using DPM 2010 The Hyper-V Cloud Practice Builder from Microsoft Enterprise Services can help Microsoft partners by: Accelerating practice development by

More information

Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012

Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012 coursemonster.com/me Microsoft System Center: MS-50023 Data Protection 2007 Center Protection Manager Implementing 2012 View training dates» Overview Elements of this syllabus may be subject to change

More information

User Guide - Exchange Public Folder idataagent

User Guide - Exchange Public Folder idataagent Page 1 of 191 User Guide - Exchange Public Folder idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE PUBLIC FOLDER IDATAAGENT DEPLOYMENT

More information

Installation and User Guide for Partners and Businesses

Installation and User Guide for Partners and Businesses Installation and User Guide for Partners and Businesses Copyright 2013 SOS Online Backup Table of Contents Page Getting Ready 3 Choosing Components 4 Installing and Configuring ShadowProtect 5 Setting

More information

SQL Server Protection

SQL Server Protection User Guide BackupAssist User Guides explain how to create and modify backup jobs, create backups and perform restores. These steps are explained in more detail in a guide s respective whitepaper. Whitepapers

More information

Exchange Mailbox Protection Whitepaper

Exchange Mailbox Protection Whitepaper Exchange Mailbox Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Exchange add-on comparison... 2 Advantages and disadvantages of the different PST formats... 3 2. How Exchange

More information

SQL Server Protection. User guide

SQL Server Protection. User guide User guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Requirements... 2 2. SQL Protection overview... 3 Backup destinations... 3 Transaction logs... 3 Hyper-V backups... 4 SQL database

More information

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15

Table of Contents. CHAPTER 1 About This Guide... 9. CHAPTER 2 Introduction... 11. CHAPTER 3 Database Backup and Restoration... 15 Table of Contents CHAPTER 1 About This Guide......................... 9 The Installation Guides....................................... 10 CHAPTER 2 Introduction............................ 11 Required

More information

Support Document: Microsoft SQL Server - LiveVault 7.6X

Support Document: Microsoft SQL Server - LiveVault 7.6X Contents Preparing to create a Microsoft SQL backup policy... 2 Adjusting the SQL max worker threads option... 2 Preparing for Log truncation... 3 Best Practices... 3 Microsoft SQL Server 2005, 2008, or

More information

Moving the Web Security Log Database

Moving the Web Security Log Database Moving the Web Security Log Database Topic 50530 Web Security Solutions Version 7.7.x, 7.8.x Updated 22-Oct-2013 Version 7.8 introduces support for the Web Security Log Database on Microsoft SQL Server

More information

System Protection for Hyper-V Whitepaper

System Protection for Hyper-V Whitepaper Whitepaper Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Definitions... 3 Considerations... 3 2. About the BackupAssist Hyper-V solution... 4 Advantages... 4

More information

Technical Note P/N 300-011-099 REV A02 May 07, 2010

Technical Note P/N 300-011-099 REV A02 May 07, 2010 EMC NetWorker Microsoft Exchange 2010 Backup and Recovery Support with EMC NetWorker Technical Note P/N 300-011-099 REV A02 May 07, 2010 This technical note describes the backup and recovery procedure

More information

User Guide - Exchange Mailbox idataagent

User Guide - Exchange Mailbox idataagent Page 1 of 285 User Guide - Exchange Mailbox idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX IDATAAGENT DEPLOYMENT -

More information

Exchange Granular Restore User Guide

Exchange Granular Restore User Guide User Guide Contents 1. overview... 2 2. Backup considerations... 3 Exchange VM Detection... 3 VSS Application backups... 3 Restore vs. Recovery... 3 Backup user identity... 3 3. Creating an Exchange backup...

More information

COOK COUNTY OFFICE 365 MIGRATION USER GUIDE

COOK COUNTY OFFICE 365 MIGRATION USER GUIDE COOK COUNTY OFFICE 365 MIGRATION USER GUIDE Dear Cook County Office 365 User: Your mailbox is schedule to be migrated to Microsoft s Office 365 platform. Page 1 TABLE OF CONTENTS 01. PRE-MIGRATION RECOMMENDATIONS

More information

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201

Administration GUIDE. SharePoint Server idataagent. Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Administration GUIDE SharePoint Server idataagent Published On: 11/19/2013 V10 Service Pack 4A Page 1 of 201 Getting Started - SharePoint Server idataagent Overview Deployment Configuration Decision Table

More information

SQL Server Protection Whitepaper

SQL Server Protection Whitepaper SQL Server Protection Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 The benefits of using the SQL Server Add-on... 2 Requirements... 2 2. SQL Protection overview... 3 User databases...

More information

Technical Notes TECHNICAL NOTES. Release number 8.2 Service Pack 1 302-001-239 REV 01. January, 2015

Technical Notes TECHNICAL NOTES. Release number 8.2 Service Pack 1 302-001-239 REV 01. January, 2015 EMC NetWorker Module for Microsoft: Exchange Server Granular Level Recovery (GLR) using EMC NetWorker Module for Microsoft with Ontrack PowerControls Release number 8.2 Service Pack 1 TECHNICAL NOTES 302-001-239

More information

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V)

Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) Page 1 of 19 Quick Start - Virtual Server idataagent (Microsoft/Hyper-V) TABLE OF CONTENTS OVERVIEW Introduction Key Features Complete Virtual Machine Protection Granular Recovery of Virtual Machine Data

More information

Lenovo Online Data Backup User Guide Version 1.8.14

Lenovo Online Data Backup User Guide Version 1.8.14 Lenovo Online Data Backup User Guide Version 1.8.14 Contents Chapter 1: Installing Lenovo Online Data Backup...5 Downloading the Lenovo Online Data Backup Client...5 Installing the Lenovo Online Data

More information

ArCycle vmbackup. for VMware/Hyper-V. User Guide

ArCycle vmbackup. for VMware/Hyper-V. User Guide ArCycle vmbackup for VMware/Hyper-V User Guide 2 Copyright Copyright ArCycle Software, Ltd., 2011-2014. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system,

More information

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL

SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,

More information

Exchange 2013 mailbox setup guide

Exchange 2013 mailbox setup guide Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox

More information

3 Setting up Databases on a Microsoft SQL 7.0 Server

3 Setting up Databases on a Microsoft SQL 7.0 Server 3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007

GREEN HOUSE DATA. E-Mail Services Guide. Built right. Just for you. greenhousedata.com. Green House Data 340 Progress Circle Cheyenne, WY 82007 GREEN HOUSE DATA Built right. Just for you. E-Mail Services Guide greenhousedata.com 1 Green House Data 340 Progress Circle Cheyenne, WY 82007 Table of Contents Getting Started on Business Class Email

More information

Backup and Disaster Recovery Restoration Guide

Backup and Disaster Recovery Restoration Guide Backup and Disaster Recovery Restoration Guide Page 1 Table of Contents Table of Contents...2 Terms of Use...3 BDR...4 Creating Point-in-Time Restoration Volumes...4 Mounting a Restoration Volume...4 Dismounting

More information

BSDI Advanced Fitness & Wellness Software

BSDI Advanced Fitness & Wellness Software BSDI Advanced Fitness & Wellness Software 6 Kellie Ct. Califon, NJ 07830 http://www.bsdi.cc SOFTWARE BACKUP/RESTORE INSTRUCTION SHEET This document will outline the steps necessary to take configure the

More information

4cast Client Specification and Installation

4cast Client Specification and Installation 4cast Client Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements The client requires Administrative rights

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 Windows Server 2012 Hyper-V support... 3 2. Hyper-V protection features... 3

More information

Colligo Email Manager 6.0. Connected Mode - User Guide

Colligo Email Manager 6.0. Connected Mode - User Guide 6.0 Connected Mode - User Guide Contents Colligo Email Manager 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License

More information

User Guide - Exchange Mailbox Archiver Agent

User Guide - Exchange Mailbox Archiver Agent Page 1 of 245 User Guide - Exchange Mailbox Archiver Agent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Terminology SYSTEM REQUIREMENTS - EXCHANGE MAILBOX ARCHIVER AGENT DEPLOYMENT

More information

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide

Acronis Backup & Recovery 10 Advanced Server Virtual Edition. Quick Start Guide Acronis Backup & Recovery 10 Advanced Server Virtual Edition Quick Start Guide Table of contents 1 Main components...3 2 License server...3 3 Supported operating systems...3 3.1 Agents... 3 3.2 License

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange

More information

Amicus Link Guide: Outlook/Exchange E-mail

Amicus Link Guide: Outlook/Exchange E-mail Amicus Link Guide: Outlook/Exchange E-mail Applies to: Amicus Premium 2015 Synchronize your Amicus and Outlook e-mail. Choose a client-side link with your local Microsoft Outlook or a Server-side link

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp

Live@edu User Guide. Please visit the Helpdesk website for more information: http://www.smu.edu.sg/iits/helpdesk_support/index.asp IITS Main Office SINGAPORE MANAGEMENT UNIVERSITY Administration Building, Level 11 81, Victoria Street Singapore 188065 Phone: 65-6828 1930 Email: iits@smu.edu.sg Please visit the Helpdesk website for

More information

Restoring Exchange Server 2003 with NTBackup Version 1.00

Restoring Exchange Server 2003 with NTBackup Version 1.00 Restoring Exchange Server 2003 with NTBackup Version 1.00 Need to Know TM Exchange server holds all the email messages for network users. NTBackup software can backup the Exchange data for recovery. There

More information

Acronis Backup & Recovery 11

Acronis Backup & Recovery 11 Acronis Backup & Recovery 11 Quick Start Guide Applies to the following editions: Advanced Server Virtual Edition Advanced Server SBS Edition Advanced Workstation Server for Linux Server for Windows Workstation

More information

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE

CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE CLOUD INFRASTRUCTURE VIRTUAL SERVER (SHARED) USER GUIDE WELCOME TO THE VIRTUAL SERVER (SHARED) USER GUIDE AUSTRALIAN ACCOUNT HOLDERS For sales, account set-up enquiries and technical support, contact your

More information

Archiving Email - Outlook 2003

Archiving Email - Outlook 2003 Archiving Email - Outlook 2003 Archiving data automatically Configuring the Automatic Archiving of Items Archiving data manually Restoring Data Archiving data automatically Over time you will likely want

More information

Technical Note P/N 300-011-099 REV A05 September 20, 2010

Technical Note P/N 300-011-099 REV A05 September 20, 2010 EMC NetWorker Microsoft Exchange 2010 Backup and Recovery Support with EMC NetWorker Technical Note P/N 300-011-099 REV A05 September 20, 2010 This technical note describes the backup and recovery procedure

More information

WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Backup Exec Continuous Protection Server Continuous Protection for Microsoft SQL Server Databases

WHITE PAPER: ENTERPRISE SOLUTIONS. Symantec Backup Exec Continuous Protection Server Continuous Protection for Microsoft SQL Server Databases WHITE PAPER: ENTERPRISE SOLUTIONS Symantec Backup Exec Continuous Protection Server Continuous Protection for Microsoft SQL Server Databases White Paper: Enterprise Solutions Symantec Backup Exec Continuous

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

Restore Tab. User Guide

Restore Tab. User Guide Restore Tab User Guide Contents 1. Introduction... 2 Documentation... 2 Licensing... 2 Overview... 2 2. Tools menu... 3 3. Home page... 4 Selection screen... 4 Selection results screen... 5 Available backups...

More information

Colligo Email Manager 5.1. User Guide

Colligo Email Manager 5.1. User Guide 5.1 User Guide Contents Enterprise Email Management for SharePoint 2010 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Managing SharePoint Sites 5 Adding

More information

Colligo Email Manager 6.0. Offline Mode - User Guide

Colligo Email Manager 6.0. Offline Mode - User Guide 6.0 Offline Mode - User Guide Contents Colligo Email Manager 1 Key Features 1 Benefits 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 3 Updating Your License Key 3 Managing SharePoint

More information

How to protect, restore and recover Exchange 2003 and Exchange 2007 databases

How to protect, restore and recover Exchange 2003 and Exchange 2007 databases How to protect, restore and recover Exchange 2003 and Exchange 2007 databases Introduction This document covers protection, restoration and recovery of Exchange Storage Groups. After data is protected

More information

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0

Cox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0 Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE

More information

Exchange Mailbox Protection

Exchange Mailbox Protection User Guide This guide applies to Windows Server 2008 and later. For Windows Server 2003, refer to the Exchange Server Protection whitepaper. BackupAssist User Guides explain how to create and modify backup

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.

Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see Deploy Inbox Rules below. Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them

More information

EMC NetWorker Module for Microsoft for Exchange Server VSS

EMC NetWorker Module for Microsoft for Exchange Server VSS EMC NetWorker Module for Microsoft for Exchange Server VSS Version 9.0 User Guide 302-001-753 REV 02 Copyright 2007-2015 EMC Corporation. All rights reserved. Published in USA. Published October, 2015

More information

Microsoft Outlook Setup With Exchange Server. Outlook 2007 2010 2013

Microsoft Outlook Setup With Exchange Server. Outlook 2007 2010 2013 Microsoft Outlook Setup With Exchange Server Outlook 2007 2010 2013 Revised 12/1/2014 CONTENTS SUMMARY... 3 I. OUTLOOK SETUP... 4 II. PERSONAL FOLDERS SETUP... 7 III. RULES SETUP... 9 Rule #1: Move Inbox

More information

Exchange Granular Restore. User Guide

Exchange Granular Restore. User Guide User Guide Contents 1. overview... 2 2. Backup considerations... 3 Backup user identity... 3 Exchange VM Detection... 3 Restore vs. Recovery... 3 3. Creating an Exchange backup... 4 4.... 7 Step 1 - Locate

More information

Using Virtual Drive for Exchange mailbox restore

Using Virtual Drive for Exchange mailbox restore Using Virtual Drive for Exchange mailbox restore General information about Exchange databases and Exchange backups IASO Backup uses Microsoft VSS (Volume Shadow Copy) technology for backing up Exchange

More information

VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider

VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider VSS Backup Solution for Exchange Server 2007 and Symantec Backup Exec 12.5 using ETERNUS VSS Hardware Provider System Configuration Guide November 2009 Fujitsu Limited Table of Contents 1. Executive Summary...

More information

MozyPro User Guide Version 1.8.14

MozyPro User Guide Version 1.8.14 MozyPro User Guide Version 1.8.14 Contents Preface: Preface...v Chapter 1: Overview...7 Chapter 2: Installing MozyPro...9 Downloading the MozyPro Client...9 Installing the MozyPro Client...9 Configuring

More information

Outlook E-Mail. Step 1: Open and Configure Outlook

Outlook E-Mail. Step 1: Open and Configure Outlook Outlook E-Mail Step 1: Open and Configure Outlook 1. Click the Microsoft Button in the lower left task bar 2. Select All Programs 3. Select Microsoft Office 4. Select Microsoft Outlook 5. Follow the Start

More information

Paragon Exchange Granular Recovery 2010

Paragon Exchange Granular Recovery 2010 PARAGON Technologie GmbH, Systemprogrammierung Heinrich-von-Stephan-Str. 5c 79100 Freiburg, Germany Tel. +49 (0) 761 59018201 Fax +49 (0) 761 59018130 Internet www.paragon-software.com Email sales@paragon-software.com

More information

Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling

Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling Erado Archiving & Setup Instruction Microsoft Exchange 2010 Push Journaling Contents: Step 1: Create Mail Contact Step 2: Create a Local Journal Mailbox Step 3: Create an SMTP send connector Step 4: Create

More information

Exchange Granular Restore Instructional User Guide

Exchange Granular Restore Instructional User Guide Exchange Granular Restore Instructional User Guide www.backup-assist.ca Contents 1. Exchange Granular Restore overview... 2 2. Creating an Exchange backup... 3 3. Exchange Granular Restore... 6 Step 1

More information

BackupAssist Restore Console

BackupAssist Restore Console BackupAssist Restore Console WHITEPAPER BackupAssist Version 6 www.backupassist.com Contents 1. Introduction... 2 1.1 Restoring data without the Restore Console... 2 1.2 Backup catalogues in BackupAssist...

More information

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012.

Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Bosch ReadykeyPRO Unlimited Installation Guide, product version 6.5. This guide is item number DOC-110-2-029, revision 2.029, May 2012. Copyright 1995-2012 Lenel Systems International, Inc. Information

More information

Server Installation: ServerTools

Server Installation: ServerTools Server Installation: ServerTools ServerTools Page 1 Table of Contents To Install ServerTools...3 Backup and Restore...6 Purpose...6 Background...6 Requirements...6 Creating a Backup Schedule using the

More information

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution

EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution EMC NetWorker Module for Microsoft for Windows Bare Metal Recovery Solution Release 3.0 User Guide P/N 300-999-671 REV 02 Copyright 2007-2013 EMC Corporation. All rights reserved. Published in the USA.

More information

Hyper-V Protection. User guide

Hyper-V Protection. User guide Hyper-V Protection User guide Contents 1. Hyper-V overview... 2 Documentation... 2 Licensing... 2 Hyper-V requirements... 2 2. Hyper-V protection features... 3 Windows 2012 R1/R2 Hyper-V support... 3 Custom

More information

GO!NotifyLink. Database Maintenance. GO!NotifyLink Database Maintenance 1

GO!NotifyLink. Database Maintenance. GO!NotifyLink Database Maintenance 1 GO!NotifyLink Database Maintenance GO!NotifyLink Database Maintenance 1 Table of Contents Database Maintenance 3 Database Cleanup... 3 Database Backups... 3 Database Configuration... 4 The Procedure via

More information

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc.

Protecting SQL Server Databases. 1997-2008 Software Pursuits, Inc. Protecting SQL Server Databases 1997-2008 Table of Contents Introduction... 2 Overview of the Backup Process... 2 Configuring SQL Server to Perform Scheduled Backups... 3 Configuring SureSync Relation

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Online Backup Client 3.9 Manual

Online Backup Client 3.9 Manual HelpAndManual_unregistered_evaluation_copy by BackupAgent BV Index Online Backup Client 3.9 1 1. Benefits 2 2. Features 3 3. System Requirements 4 4. Setup 5 5. Client 8 5.1 Registration Wizard... 9 5.2

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Trial environment setup. Exchange Server Archiver - 3.0

Trial environment setup. Exchange Server Archiver - 3.0 Trial environment setup Exchange Server Archiver - 3.0 Introduction This document describes how you can set up a trial environment for using Exchange Server Archiver with Exchange Server 2007. You do not

More information

User Guide - Exchange Database idataagent

User Guide - Exchange Database idataagent User Guide - Exchange Database idataagent TABLE OF CONTENTS OVERVIEW Introduction Key Features Add-On Components Customized Features for Your Exchange Version Terminology SYSTEM REQUIREMENTS - EXCHANGE

More information

Cisco TelePresence Management Suite Extension for Microsoft Exchange

Cisco TelePresence Management Suite Extension for Microsoft Exchange Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide Software version 2.3 D14846.03 August 2013 Contents Introduction 4 End user guidance 4 Server requirements 5 Exchange

More information

educ Office 365 email: Remove & create new Outlook profile

educ Office 365 email: Remove & create new Outlook profile Published: 29/01/2015 If you have previously used Outlook the with the SCC/SWO service then once you have been moved into Office 365 your Outlook will need to contact the SCC/SWO servers one last time

More information

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE

CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE CITY OF BURLINGTON PUBLIC SCHOOLS MICROSOFT EXCHANGE 2010 OUTLOOK WEB APP USERS GUIDE INTRODUCTION You can access your email account from any workstation at your school using Outlook Web Access (OWA),

More information

Online Backup Client User Manual Windows

Online Backup Client User Manual Windows Online Backup Client User Manual Windows 1. Product Information Product: Online Backup Client Version: 4.3.5 1.1 System Requirements Operating System Windows XP Windows Vista, Windows 7, Windows 8 Windows

More information