You are on page 1of 158

EMC NetWorker

Module for Microsoft Applications


Release 2.4

Administration Guide
P/N 300-012-874
REV 03

Copyright 2007 - 2012 EMC Corporation. All rights reserved. Published in the USA.
Published September 28, 2012
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without
notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with respect
to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a particular
purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable software license.
EMC2, EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other countries.
All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (http://support.emc.com).

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CONTENTS

Preface
Revision History
Chapter 1

Overview
About the NetWorker Module for Microsoft Applications software................
Support provided by NMM 2.4 ....................................................................
Supported NetWorker features ..............................................................
Supported Windows versions and related features................................
Support for IPv4 and IPv6 ......................................................................
Support for data deduplication .............................................................
Support for VSS backup and recovery....................................................
Support for dynamic volumes that use the Microsoft Software
Shadow Copy provider ..........................................................................
Support for SQL VDI Servers recovery models ........................................
Full backup and recovery.............................................................................
Granular-level recovery for Exchange, Hyper-V and SharePoint
applications.................................................................................................
GLR Process Overview ...........................................................................
GLR-compatible backup availability ......................................................
NWFS Logs and Attributes .....................................................................
Normal and directed recovery......................................................................
The VSS snapshot creation process .............................................................
Components in the VSS snapshot creation process ...............................
The VSS backup process .......................................................................
About snapshots and types of snapshot backups........................................
Copy-on-write snapshot versus split-mirror snapshot
technology ............................................................................................
Roll over a snapshot..............................................................................
Types of NMM client snapshot backups ................................................
Types of NMM client recoveries .............................................................
The NMM client graphical user interface......................................................
NetWorker User for NMM program overview...........................................
NetWorker User for SQL Server program overview ..................................
Basic tasks in NetWorker User for NMM client user interface........................
Opening the software and connecting to a NetWorker server .................
Selecting an item for recovery ...............................................................
Searching for an item ............................................................................
Specifying a recovery browse time.........................................................
Marking items .......................................................................................
Selecting a backup version for recovery.................................................
Viewing the volumes required for a recovery..........................................
Performing a snapshot rollover..............................................................
Deleting a snapshot ..............................................................................
Access privileges for backup and recovery...................................................
Microsoft Windows groups and NetWorker administrative privileges............
Name resolution to identify and back-translate computer names.................

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

18
18
19
19
20
20
20
22
22
23
24
24
25
25
25
27
27
29
30
30
31
31
33
34
34
37
40
41
41
42
43
43
43
44
44
45
46
47
48

Contents

Cloning and recovering from original or cloned NMM backups


that are no longer browsable or present in the media database.................... 49

Chapter 2

NetWorker Client Management


Specifying a remote client for directed recovery...........................................
Requirements........................................................................................
Specifying a remote client volume for recovery locally ...........................
Recovering a remote client volume ........................................................
Connecting to a NetWorker server................................................................
Specifying a recovery browse time ..............................................................
Specifying ranges for service and connection ports .....................................
Reducing the range of available ports....................................................
Specifying a password ................................................................................
Changing the PW1 password .................................................................

Chapter 3

Multihomed setup for backup and recovery


Overview.....................................................................................................
Basic requirements for setting up a multihomed environment .....................
Sample network topology of multihomed environment for backup ........
Requirements for multihomed NMM client's network configuration .............
Requirements for multihomed NetWorker server's network
configuration ...............................................................................................
Requirements for network configuration on NetWorker storage node ...........
Configuring NMM client resources in a multihomed environment.................
Configuring NMM client resources in a multihomed environment ..........
Performing a configuration check for multihomed NetWorker
backup..................................................................................................

Chapter 4

61
61
61
62
62

64
65
79
79
80
82
84

Data Deduplication with Avamar


The benefits of using data deduplication.....................................................
Deduplication differentiators.................................................................
Comparison of deduplication and non-deduplication backups ..............
Utilizing the Avamar data deduplication capabilities ...................................
Supported and unsupported applications, features, and
configurations .............................................................................................
Supported operating systems................................................................
Supported Microsoft applications .........................................................
Supported configurations......................................................................
Supported applications for single and multi streams when using
Avamar .................................................................................................
Related documentation on Avamar and NetWorker ......................................
Avamar integration in NMM.........................................................................

57
57
59
59

Scheduled Backup
Backup configuration roadmap ...................................................................
Configuration tasks .....................................................................................
Backing up a clustered NMM client .............................................................
Moving a NMM client to another NetWorker server ......................................
Performing a directed recovery with NMM....................................................
Setting AES data encryption ........................................................................
Best practices and recommendations for backing up application
data.............................................................................................................

Chapter 5

52
52
52
52
53
54
54
54
55
55

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

86
86
86
87
87
88
88
89
89
90
91

Contents

Avamar and NetWorker server configuration ................................................


Configure the Avamar and the NetWorker server ...................................
Set the DNS resolution for NetWorker deduplication node and
NMM ....................................................................................................
Deduplication backup requirements for NetWorker server ...........................
Backup levels and schedules for deduplication clients..........................
Initial full backup followed by daily incremental backups......................
Initial full backup followed by daily full backups ...................................
Retention policies .................................................................................
Backup configuration notes ..................................................................
Configuring a client resource for deduplication backup ...............................
Querying deduplication save sets by using mminfo .....................................
Recovering deduplicated data ....................................................................
Deleting deduplication save sets ................................................................

Chapter 6

92
92
93
93
94
94
94
95
98
98
99

Data Deduplication with Data Domain


Software requirements..............................................................................
Utilizing the Data Domain Boost data deduplication capabilities ...............
Support for client-side deduplication backup and recovery .................
Supported operating systems, applications, and streams types ................
Supported operating systems..............................................................
Supported Microsoft applications .......................................................
Supported applications for single and multi streams when using
Data Domain .......................................................................................
Configuration considerations for NMM ......................................................
Configuring a client resource for client-side Data Domain Boost
deduplication backups ..............................................................................
Recovering deduplicated data ..................................................................
Related documentation about Data Domain and NetWorker server ............

Chapter 7

91
91

102
102
102
104
104
104
105
106
106
109
109

Microsoft Windows System Backup and Recovery


Supported Windows systems ....................................................................
Configuring system scheduled backups.....................................................
Performing a recovery ...............................................................................
Recovery considerations .....................................................................
System recovery in Windows Server 2008 ...........................................
System Recovery Options summary.....................................................
Recovery options ......................................................................................
General recovery options.....................................................................
NetWorker recovery options ................................................................
Cluster recovery options......................................................................
ADAM recovery options .......................................................................
DFS recovery options...........................................................................
FRS recovery options ...........................................................................
NTDS recovery options ........................................................................
Security recovery options ....................................................................
Recovering file system snapshots that have not been rolled over...............
Booting the NMM host in Directory Service Restore mode..........................
Authoritative recovery of NTDS or FRS data ................................................
Recovering the Windows system configuration to an earlier state ..............
Restoring BOOT/BCD data in Windows 2008 R2 ........................................
Windows print queues backup and recovery..............................................
Windows DFS-R granular backup and recovery...........................................

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

112
112
115
115
116
117
118
118
119
120
123
124
126
128
129
130
131
132
134
135
135
135

Contents

DFS-R replicated and shared directories ..............................................


Pre and post command support ................................................................
precmd.bat script................................................................................
postcmd.bat script ..............................................................................
nsrsnapvsssavepnpc file.....................................................................
Recovering client file index and the media database .................................
Restoring a save set entry to the client file index only ..........................
Restoring a save set entry to the client file index and
media database ..................................................................................

Chapter 8

138

Microsoft Windows Cluster Backup and Recovery


Overview...................................................................................................
Cluster support in NMM client .............................................................
Components used by NMM for Windows Cluster backup and
recovery ..............................................................................................
Configuring a virtual client to back up to a local storage node .............
Windows Cluster application information variable settings..................
Performing Windows Server Cluster backups .............................................
Cluster failover and backups ...............................................................
Performing Windows Server Cluster recovery .............................................

Glossary
Index

135
136
136
136
137
137
137

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

140
140
140
141
142
143
143
144

FIGURES
Title
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24

Page

VSS backup process.................................................................................................... 30


NMM client main page ................................................................................................ 35
Monitor view ............................................................................................................... 36
Backup view................................................................................................................ 37
Restore Operation view ............................................................................................... 38
Change Server view ..................................................................................................... 38
Select SQL Instance view............................................................................................. 38
Marking a fake object.................................................................................................. 39
Selected and partially selected items .......................................................................... 42
Snapshots and snapshot save sets ............................................................................. 45
Configurations Options ............................................................................................... 53
Sample network topology of NetWorker multihomed backup....................................... 59
NIC settings................................................................................................................. 60
Local client on the taskbar next to client...................................................................... 80
Configuration Options dialog box ................................................................................ 81
Select Viewable Clients dialog box .............................................................................. 81
NMM client menu list .................................................................................................. 81
Encyrption directive for SQL VSS client resource configuration .................................... 83
General tab in NMC ..................................................................................................... 96
Apps & Modules tab with Deduplication attribute ....................................................... 97
Globals (1 of 2) tab ..................................................................................................... 98
Client direct file access deduplication environment................................................... 103
General tab in NMC ................................................................................................... 107
Apps & Modules tab with Deduplication attribute ..................................................... 108

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Figures

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

TABLES
Title
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32

Page

EMC publications for additional information................................................................ 12


Supported data deduplication..................................................................................... 20
VSS backup and recovery support for Microsoft applications and Windows
components ................................................................................................................ 21
Support for disaster backup and recovery ................................................................... 24
NWFS Logs and Attributes ........................................................................................... 25
Pull and push support ................................................................................................. 26
Currently supported writers ......................................................................................... 28
Main conventions used in the NMM GUI ...................................................................... 36
SQL Server storage hierarchy display conventions....................................................... 39
Access privileges needed for backup and recovery ...................................................... 46
Backup tasks .............................................................................................................. 64
List of tasks required for VSS based and VDI based backups....................................... 65
Configuring a backup pool .......................................................................................... 66
Preconfigured snapshot policies ................................................................................. 69
Valid values for Backup Snapshots attribute ............................................................... 70
Conventional backup settings ..................................................................................... 71
Hardware instant snapshot policy ............................................................................... 71
Hardware instant snapshot with rollover policy ........................................................... 71
Considerations for NMM client backup schedules ....................................................... 72
Special characters and their URL-encoded values........................................................ 75
General configuration requirements for a proxy client.................................................. 78
Additional considerations for backing up a clustered NMM client................................ 79
Best practices and considerations for application backups ......................................... 84
Backup and recovery schedule comparison................................................................. 87
Single and multi streams support to and from Avamar................................................. 89
Single and multi streams support to and from Data Domain ...................................... 105
Configuration details for Data Domain and NetWorker ............................................... 106
Tasks for scheduling a backup for VSS writers........................................................... 112
Save set for Windows backup.................................................................................... 113
Components for recovery of Cluster Writer ................................................................ 140
Windows Cluster application information variable settings........................................ 142
Steps and considerations for backing up a clustered client resource ......................... 143

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Tableses

10

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

PREFACE

As part of an effort to improve and enhance the performance and capabilities of its
product lines, EMC periodically releases revisions of its hardware and software. Therefore,
some functions described in this document might not be supported by all versions of the
software or hardware currently in use. For the most up-to-date information on product
features, refer to your product release notes.
If a product does not function properly or does not function as described in this
document, please contact your EMC representative.
Note: This document was accurate at publication time. Go to EMC Online Support
(http://support.emc.com) to ensure that you are using the latest version of this document.

Purpose
This guide contains information common to all the Microsoft applications that can be
backed up and recovered by using EMC NetWorker Module for Microsoft Applications.


Ensure to download a copy of the NetWorker Module for Microsoft Applications Release
2.4 Application Guide from the EMC Online Support to use along with this guide. The
NetWorker Module for Microsoft Applications Release 2.4 Application Guide contains
information specific to an application, and must be referred to when backing up and
recovering an application.

Audience
This guide is part of the EMC NetWorker Module for Microsoft Applications documentation
set, and is intended for use by system administrators during the setup and maintenance
of the product.
Readers should be familiar with the following technologies used in backup and recovery:

EMC NetWorker software

EMC NetWorker snapshot management

Microsoft Volume Shadow Copy Service (VSS) technology

Storage subsystems, such as EMC CLARiiON or Symmetrix, if used

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

11

Preface

Related documentation
Table 1 on page 12 lists the EMC publications that provide additional information.
Table 1 EMC publications for additional information
Guide names

Description

NetWorker Module for Microsoft Applications Release


2.4 Installation Guide

Contains preinstallation, installation, silent installation, and post


installation information about NMM 2.4.

NetWorker Module for Microsoft Applications Release


2.4 Applications Guide

Contains information needed to back up and recover the supported


Microsoft applications.

NetWorker Module for Microsoft Applications Release


2.4 Release Notes

Contain information about new features and changes, problems fixed


from previous releases, known limitations, and late breaking information
that was not updated in the remaining documentation set.

NetWorker Module for Microsoft Applications and EMC


CLARiiON Implementing Proxy Node Backups 2.4
Technical Note

Contains supplemental information about using EMC NetWorker Module


for Microsoft Applications release 2.4 with EMC CLARiiON.

NetWorker Module for Microsoft Applications and EMC


Symmetrix Implementing Proxy Node Backups 2.4
Technical Note

Contains supplemental information about using EMC NetWorker Module


for Microsoft Applications Release 2.4 with EMC Symmetrix.

NetWorker Cloning Integration Guide

Contains planning, practices, and configuration information for using the


NetWorker, NMM, and NMDA cloning feature.

Simplified Windows Bare Metal Recovery Solution for


Microsoft Applications by using EMC NetWorker Module
for Microsoft Applications Release 2.4 Technical Notes

Contain supplemental information about performing Windows Bare Metal


Recovery by using NMM.

SharePoint Granular Recovery by using EMC NetWorker


Module for Microsoft Applications and Kroll Ontrack
PowerControls Release 2.4 Technical Notes

Contain information about how to perform granular recovery of Microsoft


SharePoint with NMM release 2.4 and third-party software Kroll Ontrack
PowerControls.

Protecting Virtual Machine Manager Environments


Using EMC NetWorker Module for Microsoft
Applications

Provide a data protection strategy for Microsoft System Center


Virtual Machine Manager (VMM) using EMC NetWorker Module for
Microsoft Applications release 2.4 (NMM) and the EMC NetWorker
Windows Disaster Recovery feature.

NetWorker Procedure Generator (NPG)

The NPG is an executable download that can be used to generate precise,


user-driven steps for high demand tasks carried out by customers,
support, and the field.

NetWorker Licensing Guide

Provides information about licensing NetWorker and its modules.

NetWorker Software Compatibility Guide

Includes a list of supported client, server, and storage node operating


systems for the following software products: NetWorker and NetWorker
application modules and options (including deduplication and
virtualization support), AlphaStor, Data Protection Advisor, and
HomeBase.

NetWorker Data Domain Deduplication Devices


Integration Guide

Provides planning and configuration information on the use of Data


Domain devices for data deduplication backup and storage in a
NetWorker environment.

NetWorker Avamar Integration Guide

Provides planning and configuration information on the use of Avamar in


a NetWorker environment.

NetWorker documentation set

Provides the documentation that is available with NetWorker.

12

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Preface

Conventions used in this document


EMC uses the following conventions for special notices:
Note: A note presents information that is important, but not hazard-related.


An important notice contains information essential to software or hardware operation.

Typographical conventions
EMC uses the following type style conventions in this document:
Normal

Used in running (nonprocedural) text for:


Names of interface elements, such as names of windows, dialog boxes,
buttons, fields, and menus
Names of resources, attributes, pools, Boolean expressions, buttons,
DQL statements, keywords, clauses, environment variables, functions,
and utilities
URLs, pathnames, filenames, directory names, computer names, links,
groups, service keys, file systems, and notifications

Bold

Used in running (nonprocedural) text for names of commands, daemons,


options, programs, processes, services, applications, utilities, kernels,
notifications, system calls, and man pages
Used in procedures for:
Names of interface elements, such as names of windows, dialog boxes,
buttons, fields, and menus
What the user specifically selects, clicks, presses, or types

Italic

Used in all text (including procedures) for:


Full titles of publications referenced in text
Emphasis, for example, a new term
Variables

Courier

Used for:
System output, such as an error message or script
URLs, complete paths, filenames, prompts, and syntax when shown
outside of running text

Courier bold

Used for specific user input, such as commands

Courier italic

Used in procedures for:


Variables on the command line
User input variables

<>

Angle brackets enclose parameter or variable values supplied by the user

[]

Square brackets enclose optional values

Vertical bar indicates alternate selections the bar means or

{}

Braces enclose content that the user must specify, such as x or y or z

...

Ellipses indicate nonessential information omitted from the example

EMC support, product, and licensing information can be obtained as follows:


Product information For documentation, release notes, software updates, or
information about EMC products, go to EMC Online Support at:
http://support.emc.com

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

13

Preface

Technical support Go to EMC Online Support and click Service Center. You will see
several options for contacting EMC Technical Support. Note that to open a service request,
you must have a valid support agreement. Contact your EMC sales representative for
details about obtaining a valid support agreement or with questions about your account.

Your comments
Your suggestions will help us continue to improve the accuracy, organization, and overall
quality of the user publications. Send your opinions of this document to:
BSGdocumentation@emc.com

14

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

REVISION HISTORY

Email your clarifications or suggestions for this document to:


BSGdocumentation@emc.com

The following table lists the revision history of this document.


Revision

Date

Description of added or changed sections

03

September 28, 2012

Third release of this document for General Availability (GA) release of the EMC
NetWorker Module for Microsoft Applications Release 2.4. Updated to include
Exchange in list of supported applications for granular level recovery.

02

August 08, 2012

Second release of this document for General Availability (GA) release of the EMC
NetWorker Module for Microsoft Applications Release 2.4. The updates made in this
release are:
Updated Granular-level recovery for Exchange, Hyper-V and SharePoint
applications on page 24.
Incorporated technical feedback received from the EMC Support team.
Updated the new website location for documentation and software downloads
(http://support.emc.com).

A01

June 27, 2012

First release of this document for Restricted Availability (RA) release of EMC NetWorker
Module for Microsoft Applications Release 2.4.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

15

Revision History

16

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 1
Overview
This chapter includes the following topics:

About the NetWorker Module for Microsoft Applications software............................


Support provided by NMM 2.4 ................................................................................
Full backup and recovery.........................................................................................
Granular-level recovery for Exchange, Hyper-V and SharePoint applications.............
Normal and directed recovery..................................................................................
The VSS snapshot creation process .........................................................................
About snapshots and types of snapshot backups....................................................
The NMM client graphical user interface..................................................................
Basic tasks in NetWorker User for NMM client user interface....................................
Access privileges for backup and recovery...............................................................
Microsoft Windows groups and NetWorker administrative privileges........................
Name resolution to identify and back-translate computer names.............................
Cloning and recovering from original or cloned NMM backups that are no longer
browsable or present in the media database ...........................................................

Overview

18
18
23
24
25
27
30
34
40
46
47
48
49

17

Overview

About the NetWorker Module for Microsoft Applications software


In the basic EMC NetWorker Module for Microsoft Applications (NMM) backup and
recovery process:
1. The NMM client is installed on the computer that will be backed up.
2. That NMM client is configured to work with a specific NetWorker server on another
computer.
3. Backups are configured on and performed by the NetWorker server.
4. Recovery is performed through the NMM client UI on the NMM client computer, and
recovered to the same NMM client computer.
The NMM software supports backup and recovery by using:

Microsoft Volume Shadow Copy Service (VSS) technologyWhere NMM works with
Microsoft Volume Shadow Copy Service (VSS) technology to provide snapshot backup
and recovery services for file systems, Microsoft applications, and Windows system
data. The NMM client allows the creation of point-in-time snapshot data. A snapshot
can be retained on storage volumes for quick access.
You can also perform a rollover of a snapshot to a traditional backup medium, such as
tape, file type device, advanced file type device, EMC Avamar device, and EMC Data
Domain device.
Data can be recovered from either of the following: snapshot or backup media.
Microsoft applications and Windows components on page 21 provides the list of
Microsoft applications and Windows components for which backup and recovery of
data by using the VSS technology is available.

Microsoft Virtual Device Interface (VDI) technologyWhere NMM uses the Virtual
Device Interface (VDI) technology to communicate with the SQL Server.
In NMM, backup and recovery of data by using the VDI technology is available for SQL
Server.

Note: The NMM client clock must be kept in sync with that of the NetWorker server. If the
clock times are not in sync and differ more than five minutes, problems occur when
recovering full and incremental backups. The clock times for the client, server, and data
mover must match for backups to work without any issues.

Support provided by NMM 2.4


This section provides the following information:

18

Supported NetWorker features on page 19

Supported Windows versions and related features on page 19

Support for IPv4 and IPv6 on page 20

Support for data deduplication on page 20

Support for VSS backup and recovery on page 20

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Support for dynamic volumes that use the Microsoft Software Shadow Copy provider
on page 22

Support for SQL VDI Servers recovery models on page 22

Supported NetWorker features


NMM 2.4 supports the following NetWorker features:

Avamar and Data Domain support for data deduplication

Dedicated storage node for LAN-free backups

Internationalization (I18N)

Mulithomed environment backup and recovery

NetWorker cloning and staging to create and manage additional copies of save sets.
This NMM support requires NetWorker 7.6 SP2 or later.

Manual (adhoc) backups for SQL VDI

Offline disaster recovery, which means that the Windows operating system is not
active


Localization (L10N) is not supported in NMM 2.4.

Supported Windows versions and related features


NMM client supports the following versions of Microsoft Windows and Microsoft
Windows-related features:

Supported Windows operating system and features


Windows Server 2008 R2 (x64), including Server Core installation options
Windows Server 2008 R2 SP1 (x64), including Server Core installation options
Windows Server 2008 SP2 (x86, x64), including Server Core installation options

System state recovery, file servers, and operating system roles including the following:
Active Directory
DHCP
Terminal Services

GUID Partition Table disks:


No disk size limit on Windows environments with CLARiiON storage (EMC
SnapView clone, and SnapView snap technologies only)
Disk size limit of less than 2 TB on Windows environments with Symmetrix storage

Support provided by NMM 2.4

19

Overview


NMM does not support the following operating system and features:
Windows IA64 editions
BitLocker encryption
VSS Hardware Provider based proxy backup of Windows dynamic disks
Single Instance Storage (SIS)

Support for IPv4 and IPv6


NMM 2.4 supports the use of IPv4 and IPv6. Ensure that if the host on which NMM is
installed uses IPv4 or IPv6, then the NetWorker server, NetWorker storage node, or
NetWorker client node must be within the IPv4 or IPv6 network infrastructure.
Note: The NMM GUI takes more than five minutes to start in an IPv6 environment. Update
the hosts file at C:\Windows\System32\drivers\etc\ with the IPv6 client and FQDN names.
This helps in resolving the IPv6 enabled clients quickly and starts the NMM GUI faster.

Support for data deduplication


Table 2 on page 20 provides details about the supported configurations, data
deduplication, backups, and restores in NMM 2.4.
Table 2 Supported data deduplication
Support

Details

Data deduplication support


with Avamar

NetWorker Server 7.6 SP2 and later is required


Avamar Axiom 4.0 SP2 or later is required
Chapter 5, Data Deduplication with Avamar, provides the list of Microsoft applications for which
data deduplication is supported

Data deduplication support


with Data Domain

NetWorker Server 7.6 SP2 and later is required


For the Data Domain deduplication, the following are required:
Data Domain Appliance with Data Domain operating system version supported by NetWorker
client installed on NMM 2.4 client
Data Domain operating system 4.8 or later for Data Domain-Boost functionality
NetWorker 7.6 SP2 or later for Data Domain-Boost functionality
Chapter 6, Data Deduplication with Data Domain, provides the list of Microsoft applications for
which data deduplication is supported

Support for VSS backup and recovery


This section provides the following information:

20

Microsoft applications and Windows components on page 21

System providers on page 21

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Microsoft applications and Windows components


Table 3 on page 21 lists the Microsoft applications and Windows components for which
NMM provides VSS backup and recovery support.
Table 3 VSS backup and recovery support for Microsoft applications and Windows components
Support

Details

Backup and recovery


support for Microsoft
applications

Active Directory Application Mode (ADAM)


Active Directory
Exchange Server 2010 and Exchange Server 2007
SharePoint Server 2010 and SharePoint Server 2007
SQL Server 2012, SQL Server 2008 R2, SQL Server 2008, and SQL Server 2005
System Center Data Protection Manager 2007

Backup and recovery


support for Microsoft
Windows components

Windows cluster support


Windows filesystem and system components
Windows Server 2008 and Windows Server 2008 R2 with Hyper-V
Windows Server 2008 Service Pack 2 and its updates
Windows Server 2008, Server Core Installation with Hyper-V

Note: Application support often requires a minimum specific service-pack level. The
service-pack levels frequently change. The NetWorker Software Compatibility Guide
provides the most up-to-date information about service packs that are required for each
application.

System providers
Microsoft System Provider are available for use with disks that are directly attached to the
host or are part of a hardware array:

This includes directly connected disks such as SATA or SCSI and storage arrays. For
example, where a hardware provider does not exist or has not been installed.

The Microsoft System Provider will not take advantage of any features that a storage
array can provide including any built-in snapshot capabilities.


The Microsoft System Provider is part of the operating system. The sizes and locations are
managed in the Disk Management applet.
The EMC VSS providers available are:

EMC Symmetrix V-MAX arrays

EMC Symmetrix DMXarrays

EMC CLARiiON arrays

EMC VNX arrays


When EMC VSS hardware providers are used with VMware ESX 3.5 or ESX 4.0 and
Windows guest operating system in NMM clients, set the environment variable
VICLIENT_DISABLE_CACHE=1 to disable Virtual Infrastructure Client (VI Client) cache in the
NMM clients.

Support provided by NMM 2.4

21

Overview

Support for dynamic volumes that use the Microsoft Software Shadow Copy provider
In Windows Server 2008 R2, Windows Server 2008 R2 SP1, and Windows Server 2008 SP2:

NMM supports snapshots of dynamic volumes that use the Microsoft Software
Shadow Copy provider.

NMM provides software-based support for the following:


Dynamic volume on a single disk.
Dynamic volume spanning multiple disks.

NMM does not support:


Dynamic volumes in striping.
NMM does not support NSR Data Mover parameter for dynamic volume
configuration.
For example, hardware-based transportable snapshots are not supported when
the dynamic volumes are on CLARiiON storage. NMM attempts to perform the
hardware-based snapshot, but the operation fails during import of the
hardware-based snapshot on the proxy backup host.


Any attempt to take a hardware-based replica of a dynamic volume fails, and causes
instability in the system.
Although Windows Server 2008 introduces support for local, hardware-based snapshots
of dynamic volumes, NMM does not support the following snapshots of dynamic volumes
on Windows Server 2008:

Local

Non-transportable

Hardware-based

For environments where dynamic volumes are provisioned by using a storage array, do not
install the storage array vendors VSS provider on the production host. For example, if a
dynamic volume was created on a CLARiiON LUN, do not install the EMC VSS Hardware
Provider on the production host.

Support for SQL VDI Servers recovery models


Microsoft SQL VDI Servers support three recovery models: full, bulk_logged, and simple.
The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides
detailed information.

Full recovery model


The full recovery model imposes the fewest constraints on the backup and restore
process, but it requires the most log space of all recovery models. NMM enforces the
following constraints based on the version of SQL Server:

22

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

All levels of file, filegroup, and database backup are supported.

All backup data is restorable up to the most recent transaction log.

Point-in-time and named log mark restores are supported.

Bulk_Logged recovery model


The bulk_logged recovery model also imposes a few backup constraints and supports
reduced log space requirements for bulk operations. NMM enforces the following
constraints differently, depending on which version of SQL Servers is managing the
storage hierarchy:

All levels of file, filegroup, and database backups are supported.

Backup data is restorable up to the most recent transaction log.

A point-in-time restore is not supported for SQL Servers if the following conditions
apply:
If a bulk log change has occurred for the transaction log backup that corresponds
to the current browse time.
If bulk changes in the transaction log that contains the time or day marker.
The NetWorker Module rolls forward all transactions to the end of the transaction log
and leaves the database in an operational state.

Simple recovery model


The simple recovery model provides the fastest performance by minimally logging
operations, thereby reducing log space. However, the simple recovery model does not
support transaction log backups. The simple recovery model implements the most
constraints on the backup and restore process. It provides significant control over how
storage management operations impact system resources. NMM enforces the following
constraints depending on the version of SQL Server:

Only level full and differential database backup types are supported.

Backup data is restorable up to the last level full or differential database backup.

Point-in-time and named log mark restores are not supported.

Full backup and recovery


NMM provides full backup and recovery for all supported Microsoft applications, where:

The entire volume or database for that application is backed up.

The entire volume or database is recovered as a whole.


VSS based backups for Microsoft applications are always full.

Full backup and recovery

23

Overview

Table 4 Support for disaster backup and recovery


By using VDI
technology

By using VSS technology


Types of
Active
backup
and
Directory
recovery *

SQL
Server Exchange
*
2007

ShareExchange Point
Server
Server
2010
2007

SharePoint
Server
2010

DPM
*

Hyper- File
V*
system
*

SQL Server*

Full
backup

Full
recovery

*All supported versions.


For disaster recovery, only full backup and recovery are used.

Granular-level recovery for Exchange, Hyper-V and SharePoint


applications
You can perform granular-level recovery (GLR) for backups created with NMM 2.4 with
Exchange, Hyper-V and SharePoint applications. GLR lets you recover specific itemssuch
as files and foldersfrom a single full backup without having to recover the full backup.
This reduces the recovery time and the space requirements on local system storage.
To perform GLR, use the GLR option built into the NMM GUI. The application GLR plug-in
uses NetWorker Virtual File System (NWFS), which exposes files from a list of save sets
within a single full backup as a virtual file system on an NMM 2.4 client.
The virtual file system appears to applications as a normal file system, but the application
reads the save set directories and files directly from the backup device. Using NWFS, the
GLR plug-in can create, rename, move, or delete directories and files. NWFS copies blocks
of data from save set files that are requested by an application. NWFS stores changes to
these files locally without making any changes to files within the save set.

GLR Process Overview


During NMM installation, if the GLR option is selected, NMM installs NWFS and the Eldos
CBFS filer driver, which requires a system reboot.
Initialization of the NWFS virtual file system is managed by the GLR plug-in or plug-in
service, which creates the NWFS COM server. Only one NWFS virtual file system can be
active at any given time. If you mount another backup to restore, NWFS releases the
current save set, and you lose access to its contents until you remount it.
Backup can be to any NetWorker device type. However, recovery is only possible with an
adv_file (AFTD) or Data Domain (DD) device on a NetWorker server or storage node. If the
device type is ineligible for GLR restores, the backup will have to be cloned to an AFTD or
DD device before a GLR restore can be performed.

24

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Once a GLR session is complete, the plug-in shuts down the NWFS virtual file system. The
client closes NWFS, removes the virtual file system from the system, and deletes the
temporary locally stored data.

GLR-compatible backup availability


Only full backups are GLR-compatible. No additional configuration is required for GLR
compatible backups.
You can disable GLR-compatible backups by using NSR_ENABLE_GLR = no. When this
parameter is used in the Application Information attribute when configuring the client
resource, NMM does not create the GLR offset map during the backup. All other backup
configurations remain the same.
To check to see that the backup performed is GLR compatible, run the mminfo command
with the -r attrs attribute.
For example,
mminfo -v -ot -q group=nmmspglr -r
ssid/ssflags/level/savetime/totalsize/name/client/attrs

Where -r attrs displays the GLR compatible backups.


Note: An Exchange or Hyper-V granular-level recovery session is complete when the NMM
GUI is closed or when a new restore is requested. A SharePoint GLR session completes
when NMM mounts the save set and the actual GLR can be performed by using a
third-party software, like Kroll OnTrack. The NetWorker Module for Microsoft Applications
Release 2.4 Application Guide provides details on performing GLR with Exchange, Hyper-V,
and SharePoint.

NWFS Logs and Attributes


NWFS logs information, warning, and error messages to a new log file: nwfs.raw and stores
this log file in C:\Program Files\Legato\nsr\applogs. Table 5 on page 25 lists the media
database attributes that identify GLR-compatible save sets:.
Table 5 NWFS Logs and Attributes
Attribute Name

Type

GLR_OFFSET_MAP Boolean
GLR_Hint

Value
Yes

Value string A set of least common paths for the backup

Normal and directed recovery


The recovery process involves three roles: Source, Control, and Destination.
The NMM 2.4 software supports both normal recovery and directed recovery:

Normal recovery All of these roles are on the same computer:


The source client is the computer where the backup data came from.

Normal and directed recovery

25

Overview

The control client is the computer running the NMM UI to initiate the recover
process.
The destination client is the computer that the data is restored to.

Directed recoveryThe source, control, and destination roles are not all on the same
computer.
There are two types of directed recovery:
In pull directed recovery, the control role and destination role are performed on the
same computer. The control role running on the destination computer pulls the
recovery data to itself. Backup data from the source client is restored to the
destination client.
In push directed recovery, the control role can be run on the source client or a
different client. Backup data from the source client is restored to the destination
client. The control client computer pushes it out to another computer, the
destination client. The destination client is not the same computer as the source
client or control client.

Table 6 on page 26 lists the pull and push directed recovery support provided by NMM.
Table 6 Pull and push support
Application

Pull directed recovery

Push directed recovery

DPM

Exchange Server 2007

Exchange Server 2010

Only for DAG based


recovery

Hyper-V

SharePoint Server 2007

SharePoint Server 2010

SQL Server VSS

SQL Server VDI

Filesystem

For pull directed recovery for the supported applications listed in Table 6 on page 26, you
can:

Run the NMM software recovery (the control role) on the same computer that the data
is being restored to (the destination client).
Note: Additional or different steps may be required. The NetWorker Module for
Microsoft Applications Release 2.4 Application Guide provides details for each
application.

26

Specify the alternate server to recover to in the normal recovery steps for the
application. Recovering the Windows system configuration to an earlier state on
page 134 provides more information.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Note: The NMM software does not support directed recovery of SYSTEM COMPONENTS.

The VSS snapshot creation process


This section provides the information needed to understand the VSS snapshot creation
process:

Components in the VSS snapshot creation process on page 27

The VSS backup process on page 29

Components in the VSS snapshot creation process


Microsoft Volume Shadow Copy Service (VSS) acts as a coordinator among the following
three components that create, modify, back up, and recover data:

RequestorsIn VSS, NMM is a requestor, that is an application that performs the


backup and recovery of applications or services.

ProvidersA provider is used to capture snapshots. One of the following types of


providers are available:
Microsoft Software Shadow Copy providerThe Microsoft Software Shadow Copy
provider is a host-based provider that works with any type of storage hardware.
EMC VSS Hardware ProviderThe EMC VSS Hardware Provider works with a
CLARiiON or a Symmetrix disk array. Serverless backup (NMM proxy based
backups) is available only with hardware providers, such as the EMC VSS Hardware
Provider.


Rollback recovery is not supported in NMM.
EMC Celerra VSS Hardware ProviderThe EMC Celerra VSS Hardware Provider
supports Celerra arrays.
More information about using NMM with an EMC VSS Hardware Provider, including
hardware array installation and configuration is provided in:
The NetWorker Module for Microsoft Applications and EMC CLARiiON:

Implementing Proxy Node Backups Release 2.4 Technical Note


The NetWorker Module for Microsoft Applications and EMC Symmetrix:

Implementing Proxy Node Backups Release 2.4 Technical Note


Conventional restore and snapshot restore are supported for backups performed
by Dell EqualLogic or Celerra hardware.

WritersWriters provide information about what data to back up, and specific
methods for handling components and applications during backup and recovery.
They also identify the type of application or service that is being backed up. If a

The VSS snapshot creation process

27

Overview

service or application is present on a system but is not active, information from its
writer will not be available. Consequently, a writer can appear or disappear from
backup to backup.
Table 7 on page 28 lists the writers that are supported for the NMM client.
Table 7 Currently supported writers
Writer type

Writers that NMM supports

Volumes

A file system path such as D:\data


Note: NMM only supports NTFS volumes. It does not support FAT16 and FAT32
volumes. Also, NMM does not support backup of raw volumes.

Microsoft applications

Active Directory Lightweight Directory Services (AD LDS)


ADAM
Exchange Server 2007 and Exchange Server 2010
SharePoint Server 2007 and SharePoint Server 2010
SQL Server 2012, SQL Server 2008, SQL Server 2008 R2, and SQL Server 2005
System Center Data Protection Manager 2007

Windows versions

Windows Server 2008 R2


Windows Server 2008 (Full Installation) with Hyper-V
Windows Server 2008 (Server Core Installation) with Hyper-V

Windows SYSTEM
COMPONENTS

For Windows Server 2008 and Windows Server 2008 R2:


Background Intelligent Transfer Service (BITS)
COM+ Registration Database (REGDB)
Certificate Authority
Cluster Writer (Windows Server 2008 and Windows Server 2008 R2)
DFS Replication Service Writer (Windows Server 2008 R2)
Dynamic Host Configuration Protocol (DHCP) Jet
Event log
File Storage Resource Manager (FSRM)
IIS Configuration Writer (Windows Server 2008 and Windows Server 2008 R2)
IIS Metabase
MSSearch Service Writer (Windows Server 2008 and Windows Server 2008 R2)
Network Policy and Access Service (NPS) VSS Writer (Windows Server 2008 and
Windows Server 2008 R2)
NTDS (Active Directory Schema)
Registry
Removable Storage Manager (RSM)
Remote Storage Manager
Shadow Copy Optimization Writer (Windows Server 2008 and Windows Server
2008 R2)
SQL Embedded (SQL 2005 Express, or SQL 2008 Express, and SQL 2008 R2
Express)
Terminal Services Licensing
Windows Internet Name Service (WINS)
Windows Management Instrumentation (WMI)
VSS Performance Counters Writer (Windows Server 2008 R2)
VSS Task Scheduler Writer (Windows Server 2008 R2)
VSS Express Metadata Store Writer (Windows Server 2008 R2)
Note: Terminal Services Gateway writer is not supported in NMM.

28

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview


Some of the VSS writers appear under Bootable System State in SYSTEM COMPONENTS:\
save set. These writers are listed when the vssadmin list writers command is used at the
command prompt.
Files located in an FTP directory are not included in a SYSTEM COMPONENTS snapshot.
Typically, FTP files are stored by Internet Information Services (IIS) in C:\inetpub. IIS
metabase files are configuration files, which are backed up as part of SYSTEM
COMPONENTS. The FTP files are content files, and must be backed up separately.

The VSS backup process


When a requestor performs a backup or recovery, the following occurs:
1. The requestor asks for information about the available writers and their metadata from
VSS.
2. VSS reviews the request for validity.
3. VSS sends writer data from multiple application and system writers to the requestor.
4. The requestor tells VSS which writers and volumes to include in the snapshot.
Each application and service that supports VSS has its own writer, which understands how
the application or service works.
After the writer signals that it has prepared the data, the following occurs:
1. The VSS software does the following:
a. Directs the writer to freeze input/output (I/O) to the selected volumes.
b. Queues transactions for later processing.
c. Calls a provider to capture or take a shadow copy of the requested data.
2. The provider does the following:
a. Captures the prepared data.
b. Creates a snapshot that exists side-by-side with the live volume.
3. After the snapshot is created:
a. The provider signals VSS and this signal tells the writer to resume activity.
b. I/O is released to the selected volumes and any queued writes that arrived during
the provider's work are processed.

The VSS snapshot creation process

29

Overview

Figure 1 on page 30 illustrates the VSS backup process.

Requestor
4. Requestor
asks VSS
to create
snapshot.

Writer

1. NetWorker software (the requestor)


asks VSS to enumerate writers and
gather their metadata.
2. Writers provide an XML description
of backup components and define
the recover method.

Writer

Writer

Writer

5. VSS tells the writers to


freeze activity.
Writer

7. VSS tells the writers to


resume activity.

3. VSS asks which providers can


support a snapshot for each of
the required volumes.
Microsoft VSS
Software Provider

Disk 1

Disk 2

6. VSS tells the providers to


create the snapshot of the
current state on disk.
EMC VSS Provider
(CLARiiON or Symmetrix)

Disk 3

Disk 3
GEN-000188

Figure 1 VSS backup process

About snapshots and types of snapshot backups


This section provides the following information:

Copy-on-write snapshot versus split-mirror snapshot technology on page 30

Roll over a snapshot on page 31

Types of NMM client snapshot backups on page 31

Types of NMM client recoveries on page 33

Copy-on-write snapshot versus split-mirror snapshot technology


Some hardware providers, such as the EMC VSS Hardware Provider, support split-mirror
snapshot technology and copy-on-write technology. Although copy-on-write technology
requires less hardware resources, split-mirror technology provides better performance.
Large or fast-changing databases should not be saved with copy-on-write snapshot
technology. The input/output requirements of these databases can cause the
copy-on-write cache to overflow and invalidate the snapshot. Additionally, copy-on-write
technology cannot match the performance of split-mirror technology.
For large or fast-changing databases, use the EMC VSS Hardware Provider along with EMC
hardware to provide a split-mirror storage solution such as the following:

30

EMC CLARiiON SnapView Clone

EMC Symmetrix TimeFinder Clone

EMC Symmetrix TimeFinder Mirror

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Roll over a snapshot


A rollover is the process of creating a conventional backup from a snapshot. Rollover
policies are automatically controlled through snapshot policy settings on the NetWorker
server.
If necessary, perform a rollover manually by using the NMM GUI. Before recovering data
that currently exists only as a persistent snapshot:

Roll over the snapshot to tape to protect the data if the snapshot becomes corrupted
during the recovery process.

Create a convention backup copy of the snapshot data. This conventional copy will
reside on the device even if the retention deletes the snapshot.

Types of NMM client snapshot backups


The NMM client supports three types of snapshot backups:

Conventional backup on page 31

Serverless backup on page 31

Nonpersistent rollover backup on page 32

Instant backup with or without rollover on page 32

Conventional backup
Conventional backup includes snapshot rollover backup to tape, file type, or advanced file
type devices.

Serverless backup
Serverless backup is a method of offloading backup procedures from an application
server so that the time ordinarily devoted to backup functions can be used to carry out
other server tasks. Serverless backup uses an NMM proxy client to move the data from the
proxy client to the backup media for a snapshot created on application server host.


Serverless backup is available only with EMC VSS Hardware Providers. The EMC VSS
Provider for CLARiiON and Symmetrix provides the capability to perform serverless backup
operations for these storage platforms.
In this kind of backup:
1. The snapshot is created on the application server and immediately mounted to the
proxy client.
2. After the snapshot is created, the application server is not involved in the backup
operation.
3. During the rollover, that is backup of the snapshot, the application server is free and
all of its resources are available for use.

About snapshots and types of snapshot backups

31

Overview

Examples of scenarios when serverless backups are used:

When Exchange Server is backed up by using serverless backup, Outlook users can
continue to use the application server.

Performing serverless backups are also useful when there is additional processing
involved in a snapshot backup and is CPU intensive.
For example, to help determine whether a snapshot of a Exchange database is
consistent, the Exchange utility eseutil is run against the snapshot.
Running eseutil can be disk and processor intensive.
Using serverless backup helps free resources on the Exchange Server because the
backup operation workload from the Exchange Server is offloaded to a proxy client.

To enable serverless or proxy backup:

Ensure that the following is the same on both the application server host and the
proxy host:
Operating system version
Service pack
Update level
For example, do not use a Windows Server 2008 R2 system as the proxy mount host
for Windows Server 2008 SP2 production host, otherwise backup fails.
If a production server is a virtual machine, then the proxy host should be a physical
machine.
Specify the following in the Application Information field of the client resource:
NSR_DATA_MOVER=<Proxy host>

Nonpersistent rollover backup


Nonpersistent rollover backup means that snapshots are not retained once the backup is
rolled over to a conventional backup medium such as tape, file, or advanced file type file
type device, or Data Domain device. The snapshot is automatically deleted from the NMM
client. The snapshot created is also called a temporary snapshot.
For nonpersistent backup, select zero in the Retention Policy field during the client
resource configuration process on the NetWorker server.

Instant backup with or without rollover


An instant backup creates a snapshot on a locally mounted storage volume. During the
period the snapshot resides on a mounted storage disk volume, it is referred to as a
persistent snapshot.
Retention of persistent snapshots on a mounted storage disk volume enables the user to
perform an instant recovery. The number of persistent snapshots that can be retained
locally depends on the snapshot policy and the available disk storage.
Depending on how the backups are configured, a snapshot that is created during an
instant backup may be configured to rollover to a backup media.

32

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

For persistent backup with or without rollover, the Retain Snapshots is set to any non-zero
value in the Snapshot Policy during the client resource configuration process.

Types of NMM client recoveries


The NMM 2.4 software supports the following types of recoveries:

Conventional recovery on page 33

Instant recovery on page 33

By default, recoveries are performed from a conventional backup. If a conventional backup


is not available for the selected browse time, an instant recovery is performed. The default
recovery method can be specified in the NetWorker recovery options dialog box. Instant
recoveries are performed with persistent snapshots.
NetWorker recovery options on page 119 provides more information about these
recovery methods.

Conventional recovery
A conventional recovery consists of recovering data that has already been rolled over to a
backup media. Conventional recoveries support the same level of item selection as
instant recoveries.

Instant recovery
Instant recoveries are performed with persistent snapshots. An instant recovery can take
less time to complete than a conventional recovery because the snapshot is available on a
mounted disk storage volume rather than on a conventional backup medium.
Instant recoveries support the selection of individual files in a file system snapshot.
Additionally, instant recoveries support the selection of individual components at
whatever level of granularity is supported by the application writer.
If the persistent snapshot is created by using a proxy client, the snapshot file system on
the proxy client is read to restore the files. In this way, performance is improved even
further because the job of processing the snapshot for recovery is off-loaded from the
NMM client production host to the proxy client.
The procedure to perform an instant recovery of file system data differs if only a persistent
snapshot is available. provides more information about performing recoveries.
Note: When performing an instant recovery, the snapshot may become invalidated. This
can occur if the snapshot is based on copy-on-write technology. If a large amount of data
is recovered to the original volume, the cache may overflow. This is true for the Microsoft
Software Shadow Copy provider and for hardware providers that use copy-on-write
technology, such as CLARiiON snapview snapshot and Symmetrix virtual devices.

About snapshots and types of snapshot backups

33

Overview

The NMM client graphical user interface


Two client interfaces are now available for the NMM 2.4 software:

NetWorker User for NMM program overview on page 34 This GUI can be used to
recover the following Microsoft applications (all supported versions) by using the VSS
technology:
SQL Server
Data Protection Manager Server
Exchange Server
Hyper-V Server
SharePoint Server
Active Directory
Go to Start > Program > NetWorker Modules > NetWorker User for NMM on the host
where the NMM 2.4 software is installed to start this GUI.

NetWorker User for SQL Server program overview on page 37This GUI can be used
to back up and recover the supported versions of SQL Server by using the VDI
technology.
Go to Start > Program > NetWorker Modules > NetWorker User for SQL on the host where
the NMM 2.4 software is installed to start this GUI.

NetWorker User for NMM program overview


After installing the NMM 2.4 software, go to Start > Programs > NetWorker Modules >
NetWorker User for NMM program, to start the NMM client graphical use interface.
This section contains the following sections:

User interface views on page 34

Display conventions on page 36

User interface views


The NetWorker User for NMM program user interface has three views:

34

Recover view on page 35

Snapshot Management view on page 35

Monitor view on page 36

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Recover view
All recoveries are performed from the Recover view by selecting the Recover icon
the left.

on

Figure 2 on page 35 shows the Recover view.


Navigation tree

client selection
(clustered client only)

Main toolbar

Available views

Summary of selected
items

View specific toolbar

Figure 2 NMM client main page

The summary of selected items can also display exclusions, which shows only those items
that are not selected for recovery. This view can be helpful when many items are selected
for recovery.

Snapshot Management view


In most cases, snapshot rollover and delete operations are performed automatically
based on snapshot policies, which are set up on the NetWorker server. Select the by the
Snapshot Management icon
on the left, to see the Snapshot Management view in the
NMM GUI, to manually delete or rollover a snapshot.
By using the Snapshot Management view, the following operations can be performed on
snapshots:

Delete snapshot

Mount a snapshot

Rollover snapshot

Scheduled Backup on page 63 provides more information about snapshot policies.

The NMM client graphical user interface

35

Overview

Monitor view
Recovery and snapshot management operations can be monitored in the Monitor view by
selecting the Monitor icon
on the left, shown in Figure 3 on page 36.

Figure 3 Monitor view

Most messages displayed in the Monitor view are also written to log files.

Display conventions
The NetWorker User for NMM Server program uses specific icons to identify various tasks
and operations. Table 9 on page 39 outlines the main conventions used in the NMM GUI.
Table 8 Main conventions used in the NMM GUI

36

Data item

Description

Pane

NetWorker server

Select the NetWorker server that is installed.

Top

Recover

Denotes the Recover function.

Left

Snapshot Management Use the Snapshot Management view in the


NMM GUI, to manually delete or rollover a
snapshot.

Left

Exchange Recover
Session

Available when the Recover icon is selected.


Use to continue with recovery.

Left

Monitor

View recovery and snapshot management Left


operations.

Log files

Log files generated with backup and recovery


details.

Right

Database

Available databases for selection.

Right

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Icon

Overview

NetWorker User for SQL Server program overview


After installing the NMM 2.4 software, go to Start > Programs > NetWorker Modules >
NetWorker User for SQL program, to start the NMM client graphical use interface for SQL
VDI backup and recovery.
This section contains the following sections:

User interface views on page 37

Fake objects on page 38

Display conventions to differentiate SQL data types on page 39

Marking semantics and restrictions on page 40

User interface views


The NetWorker User for SQL program user interface has four views:

Backup view All backups are performed from the Backup window. Select the
icon to view the Backup window.
Figure 4 on page 37 shows the Backup view.

Figure 4 Backup view

Select the database that needs to be backed up, and either right-click or select
Options > Backup Options to view the Backup Options dialog box.

The NMM client graphical user interface

37

Overview

Restore Operation view Normal, Copy, or Piecemeal restores are performed from the
Restore Operation view. Select the
icon to view the Restore Operation window as
shown in Figure 5 on page 38.

Figure 5 Restore Operation view

Change Server view Select the


shown in Figure 6 on page 38.

icon to view the Change Server window, as

Figure 6 Change Server view

Select SQL Instance view Select the


icon to view the Select SQL Instance
window, as shown in Figure 6 on page 38.

Figure 7 Select SQL Instance view

Fake objects
The NMM software enables the browsing of filegroups and files contained in a database.
However, the software can display data items that are not available for backup or restore
operations. These are referred to as fake objects.

38

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

When a file or filegroup exists in the SQL Server storage hierarchy, but cannot be backed
up because of SQL Server settings on the database, the item is displayed in the Backup
window by using the fake filegroup or fake file convention. In addition, if you try to mark a
fake object, an error dialog box is displayed as in Figure 8 on page 39

Figure 8 Marking a fake object

The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides
more information about the constraints SQL Servers enforce that determine whether an
item is available for backup or restore.

Display conventions to differentiate SQL data types


The NetWorker User for SQL Server program uses specific data item names, text
characteristics, and icons to distinguish the variable qualities of SQL Server data. Table 9
on page 39 outlines these conventions.
Table 9 SQL Server storage hierarchy display conventions (page 1 of 2)
Data item

Description

Pane

SQL Server

Root of the storage hierarchy


Signifies all SQL Server databases on the
host

Left only

Database

Descendant of root
Signifies a database
May contain filegroups

Left and right

Filegroup

Descendant of a database
Signifies a database filegroup or filestream
data
May contain files

Left or right

Icon

The NMM client graphical user interface

39

Overview

Table 9 SQL Server storage hierarchy display conventions (page 2 of 2)


Data item

Description

Pane

Fake filegroup

Signifies that the filegroup cannot be


selected for backup

Left or right

File

Descendant of a filegroup
Signifies a database file

Right only

Fake file

Signifies that the file cannot be selected


for backup

Right only

Icon

Marking semantics and restrictions


To support the browsing capabilities, the NMM program imposes certain semantics and
restrictions regarding how items can be marked. Whether an item can be marked is based
on the mark status of that items predecessors and descendants. Depending upon what is
marked, message dialog boxes may appear to provide additional information on the
current marks and the type of operation.
The NetWorker User for SQL Server program enables the following:

Mark a single file, filegroup, or database.

Mark multiple, heterogeneous items.

Mark an item when any of that items surrounding items are already marked.

Mark or unmark all SQL Server data by right-clicking the root item and selecting Mark
All Databases or Unmark All Databases from the shortcut menu.

Unmark all databases from the SQL Server root.

The NetWorker User for SQL Server program imposes the following restrictions:

You cannot mark an item if any of the predecessors of descendants are already
marked except in the SQL Server root.

When a database is marked, all of the items descendants are not automatically
marked.

When a filegroup is marked, all of the files are not automatically marked.

Basic tasks in NetWorker User for NMM client user interface


This section describes how to perform the basic tasks in the NMM client interface:

40

Opening the software and connecting to a NetWorker server on page 41

Selecting an item for recovery on page 41

Searching for an item on page 42

Specifying a recovery browse time on page 43

Marking items on page 43

Selecting a backup version for recovery on page 43

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Viewing the volumes required for a recovery on page 44

Performing a snapshot rollover on page 44

Deleting a snapshot on page 45

Opening the software and connecting to a NetWorker server


You must first connect to the NetWorker server on which the backup was configured to
recover data.
To connect to a NetWorker server:
1. From the Start menu, open the NMM client GUI:
If you have opened the NMM client before, proceed to step 2 .
If this is the first time you have opened the NMM client, the Change NetWorker
Server dialog box displays, and you can proceed to step 3 .
2. From the Main toolbar, click NetWorker Server. The Change NetWorker Server dialog
box displays.
3. Click Update Server List to browse for NetWorker servers. The discovery process may
take a few minutes.
4. When the list is updated:
Select a server. The selection displays in the Server field.
or
Type a name in the Server field.
5. Click OK.
Note: You can also select Configure Options from the Options menu to connect to a
NetWorker server.

Selecting an item for recovery


To select items for recovery, select the checkbox beside a node in the navigation tree. A
checkmark indicates that the node is selected. By default, all items contained in the node,
such as folders and files, will also be selected for recovery.
To clear an item contained in a selected node:
1. Expand the node.
2. Clear the checkbox beside the item. The checkmark disappears.

Basic tasks in NetWorker User for NMM client user interface

41

Overview

Figure 9 on page 42 depicts one selected item and several partially selected nodes in the
navigation tree.

Selecting an item
for recovery

Solid box indicates that


some items, not all, below
this node are selected

Figure 9 Selected and partially selected items

Searching for an item


To search for a recovery item:
1. Click Search above the navigation tree.
2. In the Path field, type a directory path.
3. Optionally, in the Name field, type the name of the search item. You can refine your
search as follows:
Literal match (case-insensitive)Type abc to return abc, ABC, or AbC but not abcd
or ABCD.
Literal match (case-sensitive)Type "abc" to return abc but not ABc or abcd.
Name contains (case-insensitive)Type %abc% to return abc, abcd, ABCD, or

xyzABCde.
Name starts with (case-insensitive)Type abc% to return abcd or ABCde but not

xyzABCde.
Name ends with (case-insensitive)Type %abc to return xyzAbc but not ABCde.
Single-character match search by using the ? wildcard:
Type ? to return single character entries and drive volumes, such as C or D.
Type WMI?Writer to return WMI Writer.
Multiple-character match search by using the * wildcard:
Type *.txt to return all entries with a .txt extension.
Type * to return all items within the selected container.
Type *writer* to return all writers.
Search by using both the * and ? wildcardType *???*writer* to return WMI Writer.
4. Click Search. The Details pane displays the results of the search.

42

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Specifying a recovery browse time


To browse for items that were backed up on or before a particular time:
1. From the application toolbar, click Browse.
2. Select the arrows to select the date and time, and then click OK.
The navigation tree displays backup items from the specified date and earlier.

Marking items
The NMM software provides marking indicators that help determine the state of each item
in the browse tree:

UnmarkedAn unmarked item is one that is not selected for backup or restore. An
empty checkbox appears to the left of each unselected item to indicate it is unmarked.

MarkedA marked item is one that is selected for backup or restore. A checkmark
appears in the checkbox to the left of each marked item.

Partially markedA partially marked item is one that has marked descendants, but
the item itself is not explicitly marked. A partially marked item is not backed up or
restored. A checkmark appears in a gray checkbox to the left of each partially marked
item.

Selecting a backup version for recovery


To view the versions of an item that were backed up before the current browse time:
1. In the navigation tree, select a recover item.
Note: Selecting an item for recovery on page 41 provides more information about
selecting an item.
2. Right-click the selected item and select Versions from the pop-up menu.
3. Select the backup version to recover.
4. Select the following attribute to change the browse time to the same date as the
selected backup version:
Use selected item backup time as new browse time

5. Click OK. The recover items displayed in the navigation tree are from the selected
browse time.

Basic tasks in NetWorker User for NMM client user interface

43

Overview

Viewing the volumes required for a recovery


There are no NetWorker volumes associated with a snapshot backup until the snapshot
has been rolled over to backup media. If you select to view the required volumes for a
system component or application data snapshot that has not been rolled over, no
volumes will be displayed.
To view the volumes that are required for a recovery operation:
1. In the navigation tree, select a recover item.
Note: Selecting an item for recovery on page 41 provides more information about
selecting an item.
2. Right-click the selected item.
3. Select Required Volumes from the pop-up menu.
The Required NetWorker Volumes dialog box displays with a list of the volumes that
must be mounted:
If a volume is already mounted, the device name and device path display after the
volume name.
If a required volume is not mounted, only the device name displays.
4. Click OK.

Limit the number of snapshots for a volume with the EMC VSS Provider
You can create a maximum of eight shadow copies for a single LUN on an EMC CLARiiON or
EMC Symmetrix machine.
The VSS framework also limits the number of shadow copies per volume, for example 64.
This limit also applies to all VSS providers, including the VSS software provider.

Performing a snapshot rollover


To rollover a snapshot:
1. Open the NMM client GUI.
2. Select the NetWorker server on which the NetWorker client was configured for backup.
3. In the left pane, select Snapshot Management.
4. In the navigation tree, select the snapshot.
5. Expand the snapshot to review the save sets.
6. From the Snapshot Management toolbar, click Snapshot to begin the rollover
operation.
7. In the left pane, select Monitor to view the progress of the rollover operation.

44

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Figure 10 on page 45 displays the snapshots and snapshot save sets available for
rollover.

Figure 10 Snapshots and snapshot save sets

Note: When performing a rollover of a snapshot of a drive that contains the NMM binaries,
at least one drive letter must be available for use as the temporary location for the
mounted snapshot.

Deleting a snapshot
Snapshot deletion policies are typically controlled automatically through snapshot policy
settings on the NetWorker server. However, you can delete a snapshot manually. For
instance, if space must be made available immediately on the storage system, you can
manually rollover and then delete snapshots.
Note: To prevent the loss of data from a snapshot that is to be deleted, perform a rollover
of the snapshot before the deletion operation. Roll over a snapshot on page 31 provides
more information about rolling over a snapshot.


If a snapshot is deleted without the use of the NMM client user interface, the snapshot
may still appear to be recoverable in the NMM client user interface.
If such a snapshot is selected for recovery, the recover operation will fail. A snapshot could
also be deleted by VSS or the storage subsystem if resources are exhausted due to high
input/output rates on the volumes.

Basic tasks in NetWorker User for NMM client user interface

45

Overview

To delete a snapshot:
1. Open the NMM client GUI.
2. Select the NetWorker server on which the NetWorker client was configured for backup.
Opening the software and connecting to a NetWorker server on page 41 provides
more information about opening NMM and connecting to a NetWorker server.
3. In the left pane, select Snapshot Management.
4. In the navigation tree, select the snapshot to be deleted.
5. Right-click the selected snapshot.
6. Select Delete Snapshot.
In the left pane, select Monitor to view the progress of the delete operation.

Access privileges for backup and recovery


When running or configuring NMM backups and recoveries, ensure that you have the
appropriate level of privileges for all resources that must be accessed.
Table 10 on page 46 describes the required privilege levels.
Table 10 Access privileges needed for backup and recovery (page 1 of 2)
Resource

Required privileges

NetWorker server

NetWorker Administrator
or
NetWorker Backup Operator

NMM client machine

Windows Administrator
or
Windows Backup Operator

All applications protected by NMM for VSS


based backups, such as:
Microsoft Data Protection Manager
Microsoft Exchange Server
Microsoft Hyper-V Server
Microsoft SharePoint Server
Microsoft SQL Server

Windows Administrator

Note: The Hyper-V Writer is not included in


save set All.

46

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Table 10 Access privileges needed for backup and recovery (page 2 of 2)


Resource

Required privileges

Microsoft SQL VDI Server

Grant the Windows logon account that the


NMM backup process uses to connect to
SQL Server, the SQL Server system
administrator (sysadmin) role to issue the
T-SQL BACKUP query.
Grant the Windows logon account under
which the NMM backup process is running
must be granted the SQL Server sysadmin
role to open a shared memory handle
when initializing the Microsoft Virtual
Device Interface (VDI).
The NMM administrator must be a member
of the local backup operators group.
The NMM administrator must be a member
of the local administrators group.
Note: Windows Server 2008 introduced User
Access Control, which causes processes to
run as a standard user even if part of the
administrators group. The NMM software
processes account for this change.

Network domain

Windows Domain Administrator

Storage node servers

Windows Administrator

Exchange Server

The user used with the Replication Manager


Interface for Exchange service must be a
member of the Organization Management
Exchange security group.

Microsoft Windows groups and NetWorker administrative


privileges
The NetWorker server recognizes domain names and Microsoft Windows groups, both
local and global.
For example:

Administrators group

Domain Admins group

If you are logged into a domain, only the global group is recognized. You can find out the
name of your group by running the Windows utility findgrp.exe, which is available with the
Windows Resource Kit.
If you are logged into an individual Windows computer, only the local group is recognized,
because there is no global group.
In cases where a user belongs to a domain that cannot be contacted by the server and
therefore the username cannot be verified, you can use a more specific user description to
guarantee that the appropriate user will have administrative rights to the server. The
syntax for this user description is as follows:

Microsoft Windows groups and NetWorker administrative privileges

47

Overview

Single user:
user=user_name, domain=domain_name

For example:
user=joe,domain=NT-ENG

Group:
group=group_name, domainsid=domain_id

For example:
group=Administrators,domainsid=S-1-5-32-323121-123

Name resolution to identify and back-translate computer names


NetWorker server and the NMM client machines need proper name resolution to identify
and back-translate computer names, such as from:

name-to-IP address

or

IP address-to-name

Also, the NMM client uses the host machine NETBIOS or short name when connecting to
the NetWorker server to browse backups. If the NETBIOS name is not found, NMM will not
be able to display backups.
To ensure clear communication of computer names:
1. Add the NetWorker server name to either of the following:
The local hosts file, which is located in the following location:
%SystemRoot%\system32\drivers\etc

The Domain Name System that contains the names of all servers on your network.
2. When configuring a client resource for solutions like Exchange, SharePoint, and so on,
specify the NETBIOS name for the client in the Aliases attribute.

48

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Overview

Cloning and recovering from original or cloned NMM backups that


are no longer browsable or present in the media database
The NMM software uses NetWorker snapshot management technology to perform the
backup, which creates multiple save sets regardless of the filesystems or clients involved.
This is different from traditional NetWorker filesystem backups, which creates one save set
for each filesystem.
Because the NMM software creates multiple save sets during a run of a NetWorker backup
group, ensure that all save sets that were created during an NMM backup are included in
the cloning process. Failure to clone all of these save sets can result in an inability to
perform a restore operation from the clone copy.
Review the following information sources, to clone NMM save sets, and to recover from
original or cloned NMM backups that are no longer browsable or present in the media
database:

The NetWorker Procedure Generator (NPG) provides application-specific procedures


for NMM cloning configuration and NMM recoveries.

The Cloning and Recovery of Expired Save Sets for NetWorker Module for Microsoft
Applications Technical Note provides additional details on the cloning and recovery
procedures.

Cloning and recovering from original or cloned NMM backups that are no longer browsable or present in the media database

49

Overview

50

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 2
NetWorker Client Management
This chapter includes the following topics:

Specifying a remote client for directed recovery.......................................................


Connecting to a NetWorker server............................................................................
Specifying a recovery browse time ..........................................................................
Specifying ranges for service and connection ports .................................................
Specifying a password ............................................................................................

NetWorker Client Management

52
53
54
54
55

51

NetWorker Client Management

Specifying a remote client for directed recovery


The filesystem of a remote client can be recovered locally. The default client for recovery is
the local client. The NetWorker Module for Microsoft Applications (NMM) software can also
recover backups created on remote client attached to the same NetWorker server as the
local client.

Requirements
To recover a remote client requires the following:

NetWorker server 7.6 SP2 or later.

The NetWorker server must have at least two NMM clients configured.

NMM 2.4 installed on the local client.

A volume backup created on the remote client. The backup must be a conventional
backup, not a snapshot.

Specifying a remote client volume for recovery locally


To specify a remote client volume for recovery locally:
1. In the NMM client GUI, connect to the NetWorker server that hosts the remote client.
2. From the Options menu, select Configure Options.
3. Click Refresh Clients.
The Select Viewable Clients dialog box displays.
4. In the Available clients on list:
a. Click a client whose data needs to be recovered on this host.
b. Click Add.
The remote client displays in the Clients to list on the menu bar.
5. For each remote client that you want available for directed recovery from this local
computer, repeat step 1 to step 4 .
6. Click OK to close the Select Viewable Clients dialog box.
7. Close the Configure Options dialog box. In the main toolbar, the client name now
provides a list box.

Recovering a remote client volume


To recover a remote client volume:
1. From the Client list in the menu bar, select the remote client.
Note: If the active panel is Snapshot Management or Monitor, a message displays to
confirm that you want to cancel the current operation and browse to the System
Recover Session panel.
2. Click Yes to change clients.
52

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

NetWorker Client Management

3. Browse to the System Recover Session panel.


The System Recover Session Options dialog box displays.
4. In the Relocate Recovered Data box, specify the destination for the data recovered
from the remote client.

Connecting to a NetWorker server


If the NMM client was configured for backup on a different NetWorker server, you can
connect to that server to recover backup items for this client.
To connect to a NetWorker server:
1. From the Options menu, select Configure Options.
The Configure Options dialog box displays, as shown in Figure 11 on page 53.

Figure 11 Configurations Options

2. To refresh the list of available NetWorker servers, click (


server name menu.

) next to the Backup

The Change NetWorker Server dialog box displays.


3. Click the Update Server List to get the list of all available NetWorker servers, and then
select the desired NetWorker server.
4. Click OK.
The server name displays in the Backup Server Name field.


You can also connect to a NetWorker server by clicking the NetWorker Server icon on
the Application toolbar.

Connecting to a NetWorker server

53

NetWorker Client Management

Specifying a recovery browse time


To search for only those items that were backed up on or before a particular time, specify a
recovery browse time.
To specify a browse recovery time:
1. From the Options menu, select Configure Options.
The Configure Options dialog box displays.
2. In the Browse Time field, do one of the following:
Click the arrow to select a calendar date.
Type a date and time.

Specifying ranges for service and connection ports


A service port is a listener port that provides services to NMM client hosts. The default
range for service ports is 7937 to 9936.
A connection port is used to contact a service, whether it is on a NetWorker server, storage
node, or client. The default range for connection ports is 00.
To implement an enhanced security environment, it may be necessary to reduce the range
of available ports. The NetWorker Administration Guide provides more information about
determining the size of the port range.

Reducing the range of available ports


To reduce the range of available ports:
1. From the Options menu, select Configure Options.
The Configure Options dialog box displays.
2. In the Service Ports attribute, type the range of available ports.
3. In the Connection Ports attribute, type the range of available ports.
4. Click OK.
Note: If a firewall exists between the NetWorker client and any NetWorker servers, ensure
that the firewall is configured to accept the port ranges typed in the Configure Options
dialog box.

Configuring TCP Networks and Network Firewalls for EMC NetWorker Technical Note
available on EMC Online Support provides more information on how to identify and
configure the required ports for NetWorker hosts that need to communicate across a
packet filtering or stateful inspection firewall.

54

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

NetWorker Client Management

Specifying a password
The password is used to protect items that will be backed up with either PW1
password-protection, or PW2 encryption and password-protection. PW1 and PW2
protection is enabled on the NetWorker server with a local or global directive.
The NetWorker Administration Guide provides more information about PW1 and PW2
protection.


Changing the password does not change the password for files that have already been
backed up.
To recover PW1 or PW2 password-protected files, you must provide the password that was
in effect at the time of the backup.

Changing the PW1 password


To change the PW1 password:
1. From the Options menu, select Configure Options. The Configure Options dialog box
displays.
2. In the Old password attribute, type the password that is currently in effect.
3. In the New password attribute, type the new password.
4. In the Confirm password attribute, retype the password.
5. Click OK.
The new password will be applied to future scheduled backups for the NMM client where
password-protection has been enabled with a global or local directive.

Specifying a password

55

NetWorker Client Management

56

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 3
Multihomed setup for backup and recovery
This chapter includes the following topics:

Overview.................................................................................................................
Basic requirements for setting up a multihomed environment .................................
Requirements for multihomed NMM client's network configuration .........................
Requirements for multihomed NetWorker server's network configuration ................
Requirements for network configuration on NetWorker storage node .......................
Configuring NMM client resources in a multihomed environment.............................

57
57
59
61
61
61

Overview
In a multihomed environment, NetWorker Module for Microsoft Applications (NMM) backs
up data by using Microsoft VSS technology and writes to a backup device like Avamar or
Data Domain by using a dedicated backup LAN instead of using a production LAN. Backing
up NMM production data in a multihomed environment helps avoid contention between
the data application traffic and data backup traffic.
Note: For cluster virtual clients, the connection from NetWorker server is initiated on the
backup media production network. But the backup payload flows through the backup
network.
In a multihomed environment, NMM 2.4 supports backup and recovery for the following
Microsoft applications:

DPM Server

Exchange Server

Hyper-V Server

SharePoint Server

SQL Server

Basic requirements for setting up a multihomed environment


Ensure that the following requirements are taken care of when setting up a multihomed
environment:

A computer has multiple NICs

Each NIC is configured with only one IP address

The IP belonging to any specific NIC resides in a separate subnet or VLAN (The IP
subnet or VLAN through which the backup traffic is meant to pass is called the backup
subnet. )

The IP should resolve to one unique hostname per NIC

Multihomed setup for backup and recovery

57

Multihomed setup for backup and recovery

All the hosts, such as the following that are participating in the backup must have at
least one NIC (called the backup NIC) configured with an IP address (called backup IP)
on the backup subnet:
NetWorker server
NetWorker storage node
NetWorker client

The backup IP on any host must always resolve to its FQDN on a backup LAN. This IP
address to hostname mapping can be implemented in various ways:
By creating an entry for the backup IP on a backup domain. The backup domain is a
domain that offers a mechanism to identify backup IPs by names.
Examples of where and how to configure a backup domain are as follows:
Backup domain can be a separate domain hosted on an exclusive DNS server
on the backup subnet.
A zone configured on existing DNS server accessible from NMM client.
This might require customized configurations in the DNS server depending on the
status of the DNS server, if the DNS server is separate or if the preexisting DNS
server being used for multi-NIC configuration.
By updating etc\hosts file with the IP to FQDN mapping.

58

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Multihomed setup for backup and recovery

Sample network topology of multihomed environment for backup


There can be several ways of setting up your multihomed environment. Figure 12 on
page 59 is an example of how a NetWorker multihomed environment can be set up for
backup. In this example, the NetWorker server authenticates the client through the
production network, but uses the backup LAN for the data transfer.

Storage Node

Backup Lan
NetWorker Server

Production
Management Lan

NetWorker Client

GEN-001729

Figure 12 Sample network topology of NetWorker multihomed backup

Requirements for multihomed NMM client's network


configuration
Review the following requirements before configuring the NetWorker clients network in a
multihomed environment:

The bind order of network interfaces must be as follows:


Production NIC
Private NIC, if any, in case of Windows cluster
Backup NIC

Requirements for multihomed NMM client's network configuration

59

Multihomed setup for backup and recovery

Modify the bind order, if required. To modify the bind order:


a. Click Start > Settings > Control Panel > Network Connections.
b. In the NetWork Connections dialog box, select Advanced > Advanced Settings.
c. Reset the order of the connections.

For each NIC, set the following:


DNS server address as the only corresponding DNS server IP address.
There should always be one entry per NIC and that is the DNS server IP of the
domain where this backup IP has an entry. For example, if the DNS server of
backup-domain.com is hosted on 192.168.8.5, the backup NIC on NMM client
should have only one entry, that is 192.168.8.5.
DNS suffix for this connection as the corresponding suffix.
Figure 13 on page 60 displays the NIC settings.


Do not use the Append these DNS suffixes (in order) attribute.

Figure 13 NIC settings

To configure these settings:


1. Click Start > Settings > Control Panel > Network Connections.
2. Open the Network Connections.

60

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Multihomed setup for backup and recovery

Requirements for multihomed NetWorker server's network


configuration
Review the following requirements before configuring NetWorker servers network in a
multihomed environment:

The minimum requirement is that the NetWorker server must have a backup IP, which
is essentially an IP address for a NIC on backup subnet. This backup IP should also
resolve to a unique FQDN on backup domain.
The backup NIC configuration on NetWorker server should follow the guidelines in
Requirements for multihomed NMM client's network configuration on page 59.

If a NMM client is a cluster virtual server and is identified by an FQDN in production


domain:
The NetWorker server must have access to the production subnet through another
NIC.
The NetWorker server should be able to resolve the production FQDN of cluster
virtual server. In such cases, the NetWorker server needs at least two NICs, one on
backup subnet and the other on production subnet.

Requirements for network configuration on NetWorker storage


node
The only requirement for a NetWorker storage node is a backup IP, which is essentially an
IP address for a NIC on backup subnet. This backup IP should also resolve to a unique
FQDN on backup domain.
The backup NIC configuration on NetWorker storage Node should follow the guidelines in
Requirements for multihomed NMM client's network configuration on page 59.

Configuring NMM client resources in a multihomed environment


This section describes how to configure NMM client resources in a multihomed
environment and perform a configuration check for multihomed NetWorker backup:

Configuring NMM client resources in a multihomed environment on page 62

Performing a configuration check for multihomed NetWorker backup on page 62

Requirements for multihomed NetWorker server's network configuration

61

Multihomed setup for backup and recovery

Configuring NMM client resources in a multihomed environment


Perform the following steps when configuring NMM client resources in a multihomed
environment:
1. Create non-clustered clients with backup domain FQDN. For example:
nmmclient.backupdomain.com
2. Update each client resource for the following with corresponding hostname entry in
the Alias attribute of the Globals (1 of 2) tab:
NetWorker server
NetWorker storage node
NMM client
Note: The production domain FQDN should be present in the aliases list
3. Ensure that all clients have the following attribute set as the backup domain FQDN of
NetWorker server in the Globals (1 of 2) tab:
Server network interface

4. Create an NMM client for the cluster virtual server with either of the following:
NetBIOS name
or
Production domain FQDN
5. If you are using the NetBIOS name, ensure that the following attribute is enabled for
the production NIC on the NetWorker server:
NetBIOS over TCP/IP

6. Ensure that all clients have the following attribute set to backup domain FQDN of the
storage nodes in the Globals (2 of 2) tab:
Storage nodes

Performing a configuration check for multihomed NetWorker backup


To perform a configuration check for multihomed NetWorker backup:
1. To resolve and reach the correct IP address from one host to another, ping for the
hostnames of the following:
NetWorker server
NetWorker storage node
NetWorker client
The FQDNs corresponding to NICs participating in backup
2. Check the DNS servers records.
For each multi-NIC FQDN, there is mapping for FQDN to IP address in the DNS server's
record.

62

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 4
Scheduled Backup
This chapter includes the following topics:

Backup configuration roadmap ...............................................................................


Configuration tasks .................................................................................................
Backing up a clustered NMM client .........................................................................
Moving a NMM client to another NetWorker server ..................................................
Performing a directed recovery with NMM................................................................
Setting AES data encryption ....................................................................................
Best practices and recommendations for backing up application data.....................

Scheduled Backup

64
65
79
79
80
82
84

63

Scheduled Backup

Backup configuration roadmap


To configure most types of NetWorker Module for Microsoft Applications (NMM) backups,
you must perform the tasks described in Configuration tasks on page 65. However,
Table 11 on page 64 lists the specific tasks that are required to configure a backup in your
setup.
Table 11 Backup tasks
Type of backup

Required action

Windows volumes:
Volume data such as a drive letter, for example: D:\
A file system path, for example D:\data

Complete all seven tasks, as described in


Configuration tasks on page 65.

Windows system components:


The Registry database
Windows Cluster
Other Window system components

Complete all seven tasks, as described in


Configuration tasks on page 65.

Note: Certain Windows system components, for example


Registry and COM+ REGDB, do not have individual save sets.
The Windows system components are all backed up under the
following save set:
SYSTEM COMPONENTS:\
For Windows Server 2008 and Windows Server 2008 R2,
during SYSTEM COMPONENTS:\ backups:
All registry keys that are created under HKCU are not backed
up.
All user settings and logs related to PerfMon are not backed
up.
Microsoft application data:
Exchange Server
Hyper-V
SharePoint Server
SQL Server
System Center Data Protection Manager (DPM)
Windows Server Cluster

Complete tasks 1 through 4, as described in


Configuration tasks on page 65.
Configure a client resource by following the
specific instructions for the application provided
in the respective chapter in the NetWorker for

For all other applications and systems supported by NMM

Complete all seven tasks, as described in


Configuration tasks on page 65.

An NMM client that is part of a cluster

Complete all seven tasks, as described in


Configuration tasks on page 65.
Review the considerations listed in Backing up a
clustered NMM client on page 79 before
performing a scheduled backup.

An Active Directory Server and ADAM

Complete the tasks described in Chapter Microsoft


Active Directory Backup and Recovery in the

Microsoft Applications Release 2.4 Application


Guide.

NetWorker Module for Microsoft Applications


Release 2.4 Application Guide.

64

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

Configuration tasks
Table 12 on page 65 lists the tasks that you must follow when configuring backups for the
Microsoft application that you are using. The respective chapter for each application in the

NetWorker Microsoft Module for Microsoft Applications Release 2.4 Application Guide
provides the list of tasks that are required for a particular application.
Table 12 List of tasks required for VSS based and VDI based backups
VSS based backup

VDI based backup


SQL Server

Tasks

SQL Server, Data


Protection Manager
Server, Exchange
Server, Hyper-V
Server, SharePoint
Server, and Active
Directory

Task 1: Configure a backup pool on page 66

Task 2: Configure snapshot policies on page 68

Task 3: Configure a backup schedule on page 72

Task 4: Configure a backup group on page 72

Task 5: Configure a client resource on page 74

Task 6: Configure NetWorker administrator


privileges on page 77

Task 7: Configure a proxy client on page 78


All the procedures described in this section must be performed on a NetWorker server.
Use the NetWorker Management Console program (NMC) to access the NetWorker
Administration page to perform all the procedures. Click the question mark icon
at the
bottom left of each page of the NMC for details about each field in the page. Review the
NetWorker Administration Guide for details about the NetWorker Management Console
program.

Configuration tasks

65

Scheduled Backup

Task 1: Configure a backup pool


Configuring a backup pool is a four-part process. Table 13 on page 66 provides details.
Table 13 Configuring a backup pool
Task

Description

Configuring a device on page 66

Configure a media device for snapshot metadata.


Configure a tape, file, or advanced file type device.
For best performance, configure a file or advanced file
type device so that a snapshot can be recovered without
the potential delay associated with retrieving a tape.

Configuring a label template on


page 67

Labels identify the kind of data that is stored on the


volumes in a backup pool. Label templates define a
naming convention for labels. Create a label template for
volumes that are used to contain snapshot metadata.

Configuring a backup pool on


page 67

Backup data is sorted onto backup media volumes by


using media pools and volume labels. A media pool is a
specific collection of volumes to which the NetWorker
server writes data. The server uses media pools to sort
and store data. A volume is identified with a unique label
based on configurable label templates.
Media pools act as filters that tell the server which
backup volumes should receive specific data. The
NetWorker server uses media pools in conjunction with
label templates (if the Match Bar Code Labels attribute is
not used for the library resource) to keep track of what
data is on which specific volume. Using label templates
provides more information on label templates.

Labeling the device on page 68

Before a device can be used for snapshot backups, it


must be labeled by using the snapshot pool that you
created in the previous step.

Configuring a device
Note: You can use the New Device Wizard in the NetWorker Management Console to
configure a device.
To configure a device:
1. In the NetWorker Administration page of the NetWorker Management Console, select
Devices on the taskbar.
2. In the expanded left pane, select Devices.
3. From the File menu, select New, and complete the following attributes:
a. In the Name attribute, replace the default name with the path and name of the
device:
If the device is configured on the NetWorker servers storage node, the name is
the simple device path.
For example, C:\tmp\d0 for a file type device. A tape device would have a
format similar to \\.\Tape0.
Note: Do not use the 'temp' directory for NetWorker DiskBackup devices
because the data will be overwritten.

66

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

If the device is configured on a remote storage node, the name must indicate
that the storage node is remote, by including rd= and the name of the remote
storage node in the device path.
For example, if the remote storage node is neptune, then the device path might
be rd=neptune:c:\tmp\d0.
b. In the Comment field, specify a comment for the device.
c. From the Media Type attribute, select the appropriate media type.
d. Select the Auto Media Management attribute.
4. Click Configuration, and in the Target Sessions attribute:
a. Type or select a value.
b. Set this attribute to a value that will speed up the backup, for example, 32.
5. Click OK.

Configuring a label template


To configure a label template:
1. In the Administration page of the NetWorker Management Console, click Media.
2. In the expanded left pane, select Label Templates.
3. From the File menu, select New, and complete the following attributes:
a. In the Name attribute, type a name that identifies the series of labels as belonging
to volumes for snapshot metadata.
b. In the Comment attribute, specify a comment for the label.
c. In the Fields attribute:
a. Specify a text name such as Snapshot_Metadata.
b. On a separate line, specify a numeric range such as 001999 or a text range
such as aazz.
Note: These attributes are used to incrementally identify each label.
4. Click OK.

Configuring a backup pool


To configure a backup pool to store snapshot metadata:
1. In the Administration page of the NetWorker Management Console, click Media.
2. In the expanded left pane, select Media Pools.
3. From the File menu, select New, and complete the following attributes:
a. For the Name attribute, type a name that matches the label template.
b. In the Comment attribute, specify a comment for the pool.
c. Select the Enabled attribute.
d. For the Pool type attribute, select the backup pool type.
Configuration tasks

67

Scheduled Backup

e. For the Label template attribute, select the matching label template.
f. Perform either of the following steps, but not both:
Click the Selection Criteria tab, specify a NMM client for the Clients attribute.
or
For the Groups attribute, select the applicable backup groups.
g. In the Devices attribute:
a. Select the device that you created in the previous step.
b. Ensure that this device can accept snapshot rollovers for this pool. Labeling
the device on page 68 provides details.
4. Click OK.

Labeling the device


To label a device:
1. In the Administration page of the NetWorker Management Console, click Devices.
2. In the right pane:
a. Right-click on the name of the device.
b. Select Label:
a. In the Pool attribute, select the snapshot pool that was created in the previous
step.
b. Select the Mount after Labeling attribute.
3. Click OK.

Task 2: Configure snapshot policies


A snapshot policy determines the following:

When and how often snapshots are created

Number of snapshots, and if any are retained as persistent snapshots

Which snapshots, if any, are rolled over to conventional storage

When snapshots expire and become eligible for deletion

Note: Snapshots can also be manually rolled over or deleted. Roll over a snapshot on
page 31 describes these procedures in more detail.
You can specify:

A preconfigured policy, as described in Using preconfigured snapshot policies on


page 69
Or

68

Create a custom snapshot policy, as described in Creating a snapshot policy on


page 69.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

Using preconfigured snapshot policies


Table 14 on page 69 lists the types of preconfigured snapshot policy in NMM 2.4.
Table 14 Preconfigured snapshot policies
Types

Description

Serverless

A single snapshot is taken per day. The data is then rolled over to
conventional storage and the snapshot is deleted. This is a simple snapshot
policy that can be considered as a default snapshot policy in NMM.
The serverless snapshot policy in NMC can be used in true serverless backup
operations, as described in Serverless backup on page 31, and can also
be used in normal non-serverless operations.

Daily

The daily snapshot policy in NMC has Retain Snapshots set to eight. This
indicates that NMM should keep eight snapshots per day. When the ninth
backup starts at the beginning of the next day, the oldest snapshot is
deleted, and so on. Each snapshot has 24-hour expiration policy. If you
select the daily snapshot policy, persistent snapshots are created.

Creating a snapshot policy


To create a custom snapshot policy:
1. In the Administration page of the NetWorker Management Console, click
Configuration.
2. In the expanded left pane, select Snapshot Policies.
3. From the File menu, select New, and complete the following attributes:
a. In the Name attribute, type a name for the snapshot policy.
b. In the Comment attribute, type a comment for the snapshot policy.
c. In the Number of Snapshots attribute, type the number of snapshots to be created
per day:
The Number of Snapshots attribute works in conjunction with the Group
Resource Interval and Start Time attributes.
The value for the Start Time and Interval attributes must allow the specified
number of snapshots to be created in a 24-hour period.
For example, to take four snapshots per day and the first snapshot must occur at
4:00 AM (Start Time attribute), the Interval attribute must be set to 5 hours or less:
Number of Snapshots <= (24:00 - Start Time) / Interval

Configure a backup group on page 72 provides additional information about


snapshots and policies.
d. In the Retain Snapshots attribute, type the maximum number of snapshots that
can be retained for a specified period of time before being expired. Use a minimum
Retain Snapshot value of 2. This will ensure that the most recent snapshot is
retained while the new snapshot is created. A Retain Snapshot value of 1 will
delete the only snapshot copy while creating the new snapshot.
Note: A snapshot value greater than 0 requires a full-level backup schedule.

Configuration tasks

69

Scheduled Backup

e. In the Snapshots Expiration Policy attribute, select a preconfigured expiration


policy to determine how long snapshots can be retained before being deleted.
f. In the Backup Snapshots attribute, specify which snapshots will be rolled over to a
conventional storage medium.
Table 15 on page 70 lists the valid values that can be used in this attribute.
Table 15 Valid values for Backup Snapshots attribute
Valid values

Description

All

The All attribute is used to roll over the replica for every backup to the
conventional backup medium. The data can be recovered from the
conventional backup medium, even if persistent snapshots (valid or
invalid) are not available:
To back up SYSTEM COMPONENTS, the snapshot policy must specify
All in the Backup Snapshot field. NMM enforces this policy to
ensure that a permanent backup of the snapshot exists. If you attempt
to restore SYSTEM COMPONENTS from a persistent snapshot, the
snapshot can become invalid and leave the system in an
unrecoverable state.
For Data Protection Manager backups, the Backup Snapshot attribute
must be set to All. Backup will fail if any other value is used.

Every n

Where n denotes the exact snapshot that should be rolled over.

First

The first snapshot will be rolled over.

Last

The last snapshot will be rolled over.

None

Rollover the snapshot manually.

4. Click OK.

Examples of snapshot policies


This section describes the following snapshot policies:

Conventional backup settings on page 70

Hardware instant snapshot without rollover settings on page 71

Hardware instant snapshot with rollover settings on page 71

Conventional backup settings


The conventional backup settings include:

70

Four snapshots per day are taken.

All snapshots are rolled over to a conventional storage medium.

Each snapshot is deleted after it is rolled over.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

Table 16 on page 71 lists the settings for a conventional backup.


Table 16 Conventional backup settings
Name

Conventional backup

Comment

Rollover and then delete

Number of snapshots per day

Retain snapshots

Snapshot expiration policy

Day

Backup snapshots

All

Hardware instant snapshot without rollover settings


The hardware instant snapshot setting includes:

Four snapshots per day are taken.

Up to eight snapshots are retained for a maximum period of 1 week.

No snapshots are rolled over.

Table 17 on page 71 lists the settings for an instant backup for hardware snapshots.
Table 17 Hardware instant snapshot policy
Name

Instant backup

Comment

Persistent snapshots with no rollovers

Number of snapshots per day

Retain snapshots

Snapshot expiration policy

Week

Backup snapshots

None

Hardware instant snapshot with rollover settings


The hardware instant snapshot with rollover setting includes:

Four snapshots per day are taken.

Up to eight snapshots are retained for a maximum period of 1 week.

Every first and third snapshots are rolled over.

Table 18 on page 71 depicts settings for an instant backup hardware snapshots with
rollover to a conventional medium.
Table 18 Hardware instant snapshot with rollover policy (page 1 of 2)
Name

Instant and conventional backup

Comment

Persistent snapshots with rollover to


tape

Number of snapshots per day

Configuration tasks

71

Scheduled Backup

Table 18 Hardware instant snapshot with rollover policy (page 2 of 2)


Retain snapshots

Snapshot expiration policy

Week

Backup snapshots

Every 1
Every 3

Task 3: Configure a backup schedule


Backup schedules determine the days on which full or incremental backups are run. Full
backups include all of the data specified in an NMM client resource save set, while
incremental backups include only the data that has changed since the last backup.
Snapshots are always taken at full level for SQL Server and where retention is greater than
0.
Table 19 on page 72 contains the considerations that apply for configuring a backup
schedule for rollover backup operations.
The procedure for creating backup schedules for an NMM client is the same as for creating
a backup schedule for a normal NetWorker client.
Table 19 Considerations for NMM client backup schedules
Backup levels

Consideration

Full level

Full level backups are supported for all types of data.


Snapshot backups must be set to full level where retention is greater
than 0.

Incremental backups

Incremental level backups are supported only for the following:


Backup of volume directories or paths such as E:\ or
E:\business_files\.
Backup of Microsoft SQL VDI Server
Backup of Microsoft Exchange Server 2007
Backup of Microsoft Exchange Server 2010
Granular backup of Active Directory
Incremental level backups are only permitted for serverless snapshot
backups or where the retention policy is 0.

Level 1 to 9 backups

Level 1 to 9 backups are supported only for backup of volume


directories or paths such as E:\ or E:\business_files\.
Level 1 to 9 backups are not permitted for snapshot backups.

Task 4: Configure a backup group


Backup groups enable you to balance backup loads to reduce the impact on your storage
and network resources. To associate a backup group with a pool resource created in
Task 1: Configure a backup pool on page 66, go back to the pool resource, right-click
and select Properties. Now select the newly created group listed under Basic > Data Source
> Groups. Use a backup group to assign the following attributes to a set of client resources:

72

Backup start times

Backup pools

Schedules

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

Snapshot policy

Review the following information when creating a group resource:

A client resource or backup group cannot specify volumes that use both CLARiiON and
Symmetrix storage systems. Each backup group and its client resources can specify
volumes from only one type of storage system. For hosts that have both CLARiiON and
Symmetrix volumes, create separate backup groups and client resources.

Do not create multiple instances of the same client in one backup group when
configuring a backup. Two backups on one client in parallel cannot be performed.

When creating a backup group, it is important to keep in mind the NMM and group
resources impact on browse and retention policies. For example, if client resource A
has save set X, and client A belongs to two groups: group_1 for full backup and
group_2 for incremental backup, the full backup of save set X expires before the
incremental backup of save set X. This is because the client resource client A and save
set belong two different groups. You are recommended to create only one group
resource for one client resource even when both full and incremental level backups
are performed.

To configure a backup group:


1. In the Administration page of the NetWorker Management Console, click
Configuration.
2. In the expanded left pane, select Groups.
3. From the File menu, select New, and complete the following attributes:
a. In the Name attribute, type a name for the backup group.
b. In the Comment attribute, type a description.
c. For the Start Time attribute, type the time when the first snapshot is to be created.
The value for the Start Time attributes must allow the specified number of
snapshots to be created in a 24-hour period.
For example, if you want to take four snapshots per day (Number of Snapshots
attribute) and the first snapshot must occur at 4:00 AM (Start Time attribute), then
the Interval attribute must be set to 5 hours or less:
Number of Snapshots < (24:00 - Start Time) / Interval

Note: For SQL VDI based backups, in the Start Time attribute type the time when
you want the first VDI backup to begin.
d. For the Autostart attribute, select Enabled.
e. For VSS based (snapshot) backups, select the Snapshot attribute.
Note: For SQL Server VDI based backups, leave the Snapshot attribute clear.
f. For the Snapshot Policy attribute, select a snapshot policy:
The Number of Snapshots attribute works in conjunction with the Group
Resource Interval and Start Time attributes.

Configuration tasks

73

Scheduled Backup

The value for the Start Time and Interval attributes must allow the specified
number of snapshots to be created in a 24-hour period.
Note: Skip this step for SQL Server VDI based backups.
g. For the Snapshot Pool attribute, select a pool that was created for the snapshot.
Note: Skip this step for SQL Server VDI based backups.
4. Click the Advanced tab:
a. For the Interval attribute, specify how often a snapshot will be created. The Interval
attribute works in conjunction with the following:
The backup group Start Time attribute
The snapshot policy Number of Snapshots attribute.
b. Ensure that Restart Window attribute value is set to 00:01.
c. Set the Client Retries attribute to 0 (zero). This value specifies the number of times
the NetWorker software attempts to back up a failed client.
5. Click OK to create the backup group.


After you have started a snapshot of a save group, do not interrupt or halt the snapshot
process. For example, in an Exchange Server backup, the nsrsnap_vss_save.exe process
on the production server and the eseutil process on the proxy may continue to run after
the snapshot is halted.
Any attempt to stop a group in NetWorker Management Console will take a long time to
complete.

Task 5: Configure a client resource


A NetWorker Client is a resource configured on the NetWorker server. This resource defines
the following information:

Client data to back up

Backup schedule for the client

Browse policy for the backup data

Retention policy for the backup data

For each client resource, the NetWorker server does the following:

74

Maintains the client resource information, including entries in the online client file
index and media database.

Contacts the clients listed in a backup group configured on the server.

Performs the scheduled backups when a client request is received.

Restores the data upon request from the client.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

You can create multiple client resources for the same NMM client host. In this way, you can
apply different backup attributes to different types of information on the same host.
For example, if the NMM client host is an Exchange Server:

Create one client resource to back up the Exchange databases.

Create another client resource to back up Windows system component data.

This way, you can back up Exchange databases many times a day, and back up Windows
system component data once a day.

Viewing valid application data save sets


When configuring a client resource, you must type the save sets in the Save Set attribute
of the client resource.
To display a list of the application data save sets that are available for backup:
1. Open a command prompt on the application server.
2. Type the nsrsnap_vss_save -v -? command. The respective chapters for each application
in the NetWorker Module for Microsoft Applications Release 2.4 Application Guide
lists the available save sets.
Note: The nsrsnap_vss_save -v -? command is used for VSS based backups of SQL
Server, Exchange, SharePoint, DPM, and Hyper-V.
3. Press Enter.
Each line of output corresponds to a save set entry that you can add to the Save Set
attribute of a client resource. Each entry that you add to the Save Set attribute must be
typed on a separate line.

URL encoding for save sets


When specifying save set names in the Save Set attribute of the client resource, there are
cases where special characters, such as the backward slash (\), must be specified by their
URL-encoded values. These characters are often used in Asian languages.
Table 20 on page 75 lists the most commonly used special characters and their URL
values.
Table 20 Special characters and their URL-encoded values (page 1 of 2)
Special
character

URL-encoded value

Special
character

URL-encoded value

%5C

%3F

%2F

%5D

"

%22

%5B

%25

%7D

%23

%7B

Configuration tasks

75

Scheduled Backup

Table 20 Special characters and their URL-encoded values (page 2 of 2)


Special
character

URL-encoded value

Special
character

URL-encoded value

&

%26

%5E

<

%3C

%60

>

%3E

%7C

Using the NetWorker Management Console to create a client resource


Although the general process for configuring a client resource is the same for all
applications or systems and is done by using the NetWorker Management Console, there
may be some differences in the settings and requirements specific to some applications.
These settings and requirements are described in the backup sections for each
application in the NetWorker Module for Microsoft Applications Release 2.4 Application
Guide.
The client resource is configured from the NetWorker Management Console by:

Entering the details manually in the Client Properties pageFor file system,
SharePoint Server, Exchange Server, DPM Server, Hyper-V Server, SQL Server (both
VSS and VDI), and Active Directory, you can manually enter the details in the Client
Properties page.
To manually create a client resource:
a. In the Administration page of the NetWorker Management Console, click
Configuration.
b. In the expanded left pane, select Clients.
c. From the File menu, select New.
The Client Properties page displays. Enter the details in the Client Properties page.
The settings and requirements are described in the scheduled backup sections for
each application in the NetWorker Module for Microsoft Applications Release 2.4
Application Guide.

Using the Client Configuration Wizard You can use the Client Configuration Wizard to
create client resources for VDI based backups of SQL Server, and VSS based backups
of SharePoint Server and Exchange Server. The Client Configuration Wizard is not
available for creating client resources for VSS based backups of file system, SQL
Server, Hyper-V, DPM, and Active Directory.
The Client Configuration Wizard configures the client resources by fetching the details
from the configuration setup and displays the details in a summary page. To use the
Client Configuration Wizard option from the NetWorker Management Console, you
must installed:
NetWorker server 8.0
NetWorker Management Console server 8.0
NetWorker client 7.6 SP2 or later

76

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

To create a client resource by using the Client Configuration Wizard:


a. In the Administration page of the NetWorker Management Console, click
Configuration.
b. In the expanded left pane, select Clients.
c. From the File menu, select New, and then the Client Backup Configuration option.
The details are described in the scheduled backup sections for SQL VDI Server,
SharePoint Server, and the Exchange Server chapters in the NetWorker Module for
Microsoft Applications Release 2.4 Application Guide.

Task 6: Configure NetWorker administrator privileges


The NMM client must be granted NetWorker administrator privileges to perform media
database operations during snapshot deletion.
If you set up a proxy client for the NMM client, grant the proxy client NetWorker
Administrator privileges. If you are setting up a NMM client in a cluster, grant NetWorker
administrator privileges to each cluster node and virtual server.
To configure privileges:
1. In the Administration page of the NetWorker Management Console, click
Configuration.
2. In the expanded left pane, click User Groups.
3. Right-click the Administrators group, and then select Properties.
The Client Properties dialog box displays.
4. In the Users attribute, add the following values for the NMM client host:
user=administrator,host=NMM_client_host
user=system,host=NMM_client_host

where NMM_client_host is the DNS hostname of the NMM client.


Place each value on a separate line.
5. If a proxy client is set up for the NMM client:
Where a single user is granted administrator rights to perform all NetWorker
functionality for a host, add the following values:
user=administrator,host=NMM_clientproxy_host
user=system,host=NMM_clientproxy_host

Where multiple users are configured and added to an administrator group and that
group is added on NetWorker privilege list. All the users under this group have
administrator rights.
To perform all the NetWorker functionality for a host, add the following values:
group=administrator,host=NMM_clientproxy_host
group=system,host=NMM_clientproxy_host

Configuration tasks

77

Scheduled Backup

6. If the NMM client is installed in a cluster, grant NetWorker administrator privileges to


each:
Cluster node (both active and passive nodes)
Virtual server
7. Click OK. All NMM users must have administrator level privileges.

Task 7: Configure a proxy client


A proxy client is a separate host that acts as a data mover for a NMM client. By default, the
NMM client acts as its own data mover. However, a proxy client is required for serverless
backups. Serverless backups free the NMM client from much of the processing involved in
a snapshot backup. In a serverless backup, a snapshot is created on the NMM client and
then immediately moved to the proxy client for further processing.
A proxy client can also be set up on a NetWorker storage node. In this way, the network
traffic that is generated when a snapshot is rolled over to a conventional backup medium
is avoided.
Table 21 on page 78 lists the requirements for setting up a proxy client.
Table 21 General configuration requirements for a proxy client
Requirement

Description

Software and hardware


versions

The proxy client must have the same version of the NMM client software, and operating
system version and patch level, as the host for which it is acting as the proxy client.

Configuration

Create a NMM client resource for the proxy client host.


For the NMM client resource that will use the services of the proxy client, type the proxy
client hostname for the following attributes:
Application Information
Remote Access

78

Connectivity

The proxy client must have connectivity between the following:


NMM client
NetWorker server
Storage subsystem on which snapshots reside.

Serverless backups

A proxy client is required for serverless backups.


Additionally, serverless backups are supported only with VSS hardware providers and
depend on the capabilities of the storage subsystem.
For the EMC VSS Provider, serverless backups are supported for both CLARiiON and
Symmetrix storage systems.

For proxy clients that are


using CLARiiON storage
and the EMC VSS
Provider

At least one CLARiiON LUN must be permanently assigned to the proxy host.

Third-party hardware
providers

Hardware providers may have additional configuration requirements for proxy clients.
The vendors product documentation provides details on these requirements.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

Backing up a clustered NMM client


To configure a virtual NMM client for backup, complete all the tasks required to back up a
normal NMM client, as described in Configuration tasks on page 65.
However, there are some additional considerations that you must be aware of when
configuring a client resource for a clustered NMM client. Table 22 on page 79 outlines
these considerations.
Table 22 Additional considerations for backing up a clustered NMM client
Backup task

Details

Configure a client resource

For each virtual server that is being backed up.


For each physical node in the cluster on which the
virtual server can run.
For each client resource, type the names of the physical
nodes of the cluster in the Remote Access attribute.

Set up NetWorker administrator


privileges

For each physical node in the cluster.


For each proxy client in the cluster.

Configure a proxy client

If a hardware provider such as the EMC VSS Provider is


being used, a proxy client must be configured for a
clustered NMM client.


Do not use the pathownerignore functionality because this restriction is not enforced by
NMM. Ensure that ansr\bin\pathownerignore file is not used or set. In some
circumstances, during backup, the path owner may be ignored by NMM and the data from
a clustered disk is backed up under the indexes of the physical node. However, the
recovery of the data fails.
Clustered disks must be backed up under a virtual cluster client.

Cluster failover and backups


If a node within a cluster fails during backup, the backup fails. The next scheduled backup
operation will be the next valid backup.
If you are using a hardware provider such as the EMC VSS Provider, use the disk
management utilities provided with the associated hardware to delete any resources that
may be left in an indeterminate state as a result of the failed backup. For example, a
CLARiiON storage solution may have an InActive snapshot as the result of a failed backup.
In this case, use the EMC Navisphere user interface or the NaviCLI command line
interface to search and delete the inactive snapshot.

Moving a NMM client to another NetWorker server


An NMM client should be protected by only one NetWorker server. Do not set up
scheduled backups for a NMM client on multiple NetWorker servers. In case the NMM
client is installed on a NetWorker server other that the one that is set up for scheduled
backups, you can move the move the NMM client.

Backing up a clustered NMM client

79

Scheduled Backup

To move a NMM client to a different NetWorker server:


1. On the NMM client:
a. Open the NMM client software.
b. Manually delete any snapshots for the client. Deleting a snapshot on page 45
provides more information about deleting snapshots manually.
Before you delete the snapshots, you can manually roll them over to a
conventional backup. In this way, the data in the snapshot can be recovered.
2. On the NetWorker server that you are moving from, disable or delete the client
resources that are set up for the NMM client. You can disable a client resource for
scheduled backup by clearing the Scheduled backup attribute in the client resource.
3. On the NetWorker server that you are moving to, set up scheduled backups for the
NMM client.

Performing a directed recovery with NMM


Normal and directed recovery on page 25 provides details about directed recovery and
the types of directed recovery.
To perform a directed recovery with NMM:
1. Using the NMM software to create a volume backup.
The backup can be one of the following:
Snapshot
Conventional
This volume backup is the source for a directed recovery.
2. Run the NMM software on the node that will receive the backed up data.
3. Connect to the NetWorker server that hosts the source NMM client.
4. Add the NMM client that created the volume backup as a locally browsable client.
Figure 14 on page 80 shows the default of only one NMM client available, the local
client.

Figure 14 Local client on the taskbar next to client

5. On the Options menu, click Configure Options.


Figure 15 on page 81 shows the Configuration Options dialog box.

80

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

Figure 15 Configuration Options dialog box

6. Click Refresh (

).

Figure 16 on page 81 shows the Select Viewable Clients dialog box. The clients
available on the NetWorker server that you are attached to are listed under Available
clients on.

Figure 16 Select Viewable Clients dialog box

7. Click the client to add in the Available clients on list box:


a. Click Add to add clients as needed.
b. Click Remove to remove clients as needed.
c. Click OK.
Figure 17 on page 81 shows the NMM window with the client box.

Figure 17 NMM client menu list


Performing a directed recovery with NMM

81

Scheduled Backup

8. Click the Client list, and select the client that created the volume backup as the
browsable client.
9. If the Snapshot Management or Monitor is the active navigation bar item, and you are
prompted with the Navigate Away dialog box, click Yes.
10. On the System Recover Sessions bar, select Recover Options. The NetWorker System
Recover Session Options dialog box displays.
11. On the NetWorker tab:
a. Specify the destination for the recovery in the Relocate Recovered Data box.
b. Click OK.
12. Recover remote client's backup to local destination.
Note: Although SharePoint Server 2007 save sets are browsable in Snapshot Management
view on a host with SharePoint Server 2010, do not perform any operation for snapshots
from remote machine.

Setting AES data encryption


To start using data encryption, you must first set the Datazone pass phrase for the
NetWorker server. This is done from the NetWorker Management Console (NMC). After the
pass phrase is assigned, you can then configure directives within NetWorker to use
Advanced Encryption Standard (AES) encryption.
The NetWorker Administration Guide provides details about AES encryption.
To implement AES encryption in NMM:

82

For filesystem and VSS backups Select the Encyrption directive from the Directive
menu in the general tab when configuring the client resource. This must be done for
all applications for which AES encryption must be implemented.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Scheduled Backup

For example, in Figure 18 on page 83, the Encryption directive is selected in the
Directive field when configuring the client resource for SQL VSS backup.

Figure 18 Encyrption directive for SQL VSS client resource configuration

For VDI backups The NetWorker Module for Microsoft Applications Release 2.4
Application Guide provides details on AES encryption for SQL VDI client resource.

Setting AES data encryption

83

Scheduled Backup

Best practices and recommendations for backing up application


data
Table 23 on page 84 lists the recommendations to follow when backing up application
data.
Table 23 Best practices and considerations for application backups
Consideration

Best practice

Define different schedules for protecting the


following:
The operating system and the file system
The application that is to be backed up

For application servers, such as SQL Servers or Exchange Server, back up the server
application data under a schedule different than the host operating system data and
volumes.
Typically, application data is backed up several times a day while operating system
data and volumes are backed up less frequently.
To accomplish this task:
1. Create a separate backup group, snapshot policy, and client resource for the
following:
Server application data
Volumes and operating system data
2. Assign the appropriate snapshot policy and client resource to each backup group.

Installation path for application server


program

Do not install application server program files on the same volume as the
applications database files and the log files.

Copy-on-write snapshot technology versus


split-mirror snapshot technology, when
using CLARiiON or Symmetrix.

This applies to the following hardware-based snapshots:


Large databases and databases that are updated frequently, should not be saved
with copy-on-write snapshot technology. Instead, use a split-mirror snapshot
technology such as, a CLARiiON clone or a Symmetrix BCV.
Although copy-on-write technology requires less hardware resources, split-mirror
technology can better handle the requirements of large or fast-changing
database.
Split-mirror technology is supported only with a VSS hardware provider, such as the
EMC VSS Provider. It is not provided by the built-in Microsoft System Provider.

Enable the recovery of SQL Server data

If SQL Server Writer service is disabled, you can enable the recovery of all SQL data
by performing the following:
1. Re-enabling the SQL Server writer service.
2. Backing up the SQL Server, this will enable you to recover all SQL data.

Perform a full backup for Exchange Server


2007 and Exchange Server 2010

When the following occurs:


If a Exchange recover operation has been performed.
If a Exchange Service Pack has been installed.

When database names contain French and


Spanish characters, successful backups of
database are possible when the database
name in the save set is entered manually.

French and Spanish characters are not printed in the command prompt on Windows.
This is a Windows operating system issue.

84

Backup fails when the output generated using the nsrsnap_vss_save.exe -?


command, is used for French or Spanish character database name. This is because
the output is not a valid component.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 5
Data Deduplication with Avamar
This chapter includes the following topics:

The benefits of using data deduplication.................................................................


Utilizing the Avamar data deduplication capabilities ...............................................
Supported and unsupported applications, features, and configurations ..................
Related documentation on Avamar and NetWorker ..................................................
Avamar integration in NMM .....................................................................................
Avamar and NetWorker server configuration ............................................................
Deduplication backup requirements for NetWorker server .......................................
Configuring a client resource for deduplication backup ...........................................
Querying deduplication save sets by using mminfo .................................................
Recovering deduplicated data .................................................................................
Deleting deduplication save sets.............................................................................

Data Deduplication with Avamar

86
87
87
90
91
91
92
95
98
98
99

85

Data Deduplication with Avamar

The benefits of using data deduplication


This section describes the benefits of using data deduplication.

Deduplication differentiators
The key deduplication differentiators are as follows:

Deduplicates backup data at the source, before data transfer across the network

Enables fast, daily full backups across existing networks and infrastructure

Reduces required daily network bandwidth dramatically by identifying redundant data


at source

Up to 10 times faster backups

Data encrypted in flight and at rest

Patented RAIN technology provides fault tolerance across nodes and eliminates single
points of failure

Scalable grid architecture

Global data deduplication reduces total backup storage by up to 50 times

Recoverability verified dailyno surprises

Centralized web-based management

Simple one-step recovery

Flexible deployment options, including EMC Avamar Data Store package

Data deduplication replaces multiple copies of the same data scattered across networks
with a reference to a single instance or source for the data. Edited files also have
tremendous redundancy with previous versions.

Comparison of deduplication and non-deduplication backups


Table 24 on page 87 provides a a rough comparison of deduplication and
non-deduplication backups:

86

All estimates are relative and approximate.

Recovery time estimates are for save set recovery operations.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Avamar

Table 24 Backup and recovery schedule comparison

Backup type

Full initial
backup

Subsequent
daily, full
backups

Subsequent daily,
incremental
backups (with a
weekly full)

Non-deduplication

x hours

x hours

1/10 x hours

1.6 to 2.0x, if the full


backup and all incremental
backups were restored.

Deduplication
(daily full)

x hours

1/5 x hours

Less than or equal to x


(only one backup need be
restored).

1/20 x hours

1.5 to 2.0x, if the full


backup and all incremental
backups were restored.

Deduplication
x hours
(daily incremental)

Data recovery time


after
1 week

Utilizing the Avamar data deduplication capabilities


NetWorker leverages the data deduplication capabilities of Avamar Data Stores, to solve
the challenges associated with traditional backup, enabling fast, reliable backup and
recovery for remote offices, and data center LANs.
Data deduplication is a key feature of the Avamar system. Data deduplication ensures that
each unique sub-file, variable length object is stored only once across sites and servers.
This feature greatly reduces network traffic and provides for enhanced storage efficiency
on the server.
During backups, the Avamar client software:
1. Examines the client file system and applies the data deduplication algorithm that
identifies redundant data sequences and breaks the client filesysytem into sub-file,
variable length data segments.
2. Assigns each data segment a unique ID.
3. The client software then determines whether or not this unique ID has already been
stored on the Avamar server.
4. If this object resides on the Avamar server, a link to the stored object is referenced in
this backup.
5. After an object has been stored on the server, it is never resent over the network, no
matter how many times it is encountered on any number of clients.

Supported and unsupported applications, features, and


configurations
This section provides information on the following:

Supported operating systems on page 88

Supported Microsoft applications on page 88

Utilizing the Avamar data deduplication capabilities

87

Data Deduplication with Avamar

Supported configurations on page 89

Supported applications for single and multi streams when using Avamar on page 89


The NetWorker Software Compatibility Guide contains additional and the most up-to-date
information about NMM compatibility.


Because the data deduplication process in NetWorker Module for Microsoft Applications
(NMM) requires Avamar and NetWorker installation and configuration, we recommend that
you review the listed documentation in Related documentation on Avamar and
NetWorker on page 90 for details about Avamar and NetWorker installation and
configuration for more information.

Supported operating systems


NMM supports deduplication with Avamar on the following operating systems:

Windows Server 2008 R2 (x86, x64)

Windows Server 2008 (x86, x64)

Supported Microsoft applications


NMM supports deduplication on the following Microsoft applications:

For VSS backups:


Active Directory
Exchange Server 2010 (x64)
Exchange Server 2007 (x64)
SharePoint Server 2010
SharePoint Server 2007 (x86, x64)
System Components and File System
Windows Server 2008 with Hyper-V
Windows Server 2008 Microsoft Server Core Installation with Hyper-V

For both VSS and VDI backups:


SQL Server 2012 (x64)
SQL Server 2008 R2 (x64, x86)
SQL Server 2008 SP1 (x64, x86)
SQL Server 2008 (x86, x64)
SQL Server 2005 (x86, x64)

88

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Avamar


Data deduplication with Avamar is not supported for Active Directory granular and System
Center Data Protection Manager 2007.

Supported configurations
NMM supports deduplication on the following configurations:

System Provider

Hardware Provider: Proxy Backup Configurations

Cluster configurations are supported for the following in the preceding lists:
Operating systems
Applications
Configurations


NMM does not support deduplication for the following features and configurations:
NetWorker features: AES Encryption, Cloning/Staging, and Compression
Windows configurations: EFS File Systems

Supported applications for single and multi streams when using Avamar
Related documentation on Avamar and NetWorker on page 90 lists the documentation
that provides details about single and multi streams when using Avamar.
Table 25 on page 89 lists the Microsoft applications for which single and multi stream
support is available when using Avamar .
Table 25 Single and multi streams support to and from Avamar (page 1 of 2)
To Avamar

From Avamar

Microsoft Applications

SIngle
stream

Multi
stream

SIngle
stream

Multi
stream

Exchange Server 2010 (x64)

SharePoint Server 2010

SharePoint Server 2007 SP2

SQL Server 2012 (x64) (VDI)

SQL Server 2008 R2 (x64, x86) (VDI)

SQL Server 2008 SP1 (x64, x86)


(VDI)

SQL Server 2008 (x64, x86) (VSS)

Exchange Server 2007 (x86, x64)

SQL Server 2005 (x86, x64) (VSS)

Supported and unsupported applications, features, and configurations

89

Data Deduplication with Avamar

Table 25 Single and multi streams support to and from Avamar (page 2 of 2)
To Avamar

From Avamar

Microsoft Applications

SIngle
stream

Multi
stream

SIngle
stream

Multi
stream

SQL Server 2012 (x64) (VSS)

SQL Server 2008 R2 (x64, x86) (VSS)

SQL Server 2008 SP1 (x64, x86)


(VSS)

SQL Server 2008 (x64, x86) (VSS)

SQL Server 2005 (x86, x64) (VSS)

Hyper-V
Active Directory

Note: If you are using both, Avamar data deduplication support and stripes support for
SQL Server VDI backup and recovery, ensure that the save streams value is less than or
equal to four.

Related documentation on Avamar and NetWorker


Extensive documentation for the Avamar server and NetWorker server setup and
configuration is available for download at http://support.emc.com:

The white paper: Efficient Backup and Recovery with EMC Avamar Deduplication
Software and Systems This white paper provides a technical overview of EMC
Avamar backup and recovery software and systems with integrated global, source
data deduplication technology. It includes an in-depth look at the Avamar
architecture, data deduplication technology, key applications, and deployment
options.

The Avamar System Administration Manual This document describes how to


administer an operational Avamar 6.0 system following successful installation, setup,
and configuration.

The NetWorker Administration Guide This document describes how to create the
following:
Deduplication storage node
Replication nodes
Additional deduplication operation information is available with the documentation
on the following NetWorker features:
Backup statistics basic reports
Events

90

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Avamar

Avamar integration in NMM


The integration of Avamar in NMM provides deduplication for Microsoft applications
through the familiar NetWorker features and GUI. This integration provides the ability to
perform the following:

Configure deduplication for a NMM client resource in NetWorker Management Console


(NMC) The deduplication backup settings are part of the client resource
configuration GUI. Select a checkbox to enable deduplication, and then select the
deduplication server.

Perform deduplication backup at snapshot rollover time When deduplication is


selected in the client resource, NMM automatically performs deduplication during the
backup. No separate or additional user input is required to perform deduplication.

Perform deduplication recover The process for recovering data from a deduplication
node is the same as that for recovering from a storage node.

File and data sizes vary between applications, so Avamar optimizes compression by
analyzing the data in the save set and by using the best chunking size for that data.

Avamar and NetWorker server configuration


Before a NMM backup client can be configured to use Avamar deduplication, the Avamar
server and NetWorker server must be installed to receive deduplication data and process
backups.
The following topics provide the required information:

Configure the Avamar and the NetWorker server on page 91

Set the DNS resolution for NetWorker deduplication node and NMM on page 92

Configure the Avamar and the NetWorker server


To configure Avamar and the NetWorker server to receive deduplication data and process
backups:
1. Set up and configure the Avamar server.
The Avamar hardware and software documentation provides information on Avamar
setup and configuration.
2. Create deduplication nodes on the Avamar server:
Perform this task through the Avamar user interface.
The Avamar documentation provides detailed information.
Ensure that:
The NetWorker client and NetWorker server are configured with the same
Avamar node before the backup is started.
The Avamar node is available to receive the backed up data.
The license for the Avamar node has not expired.

Avamar integration in NMM

91

Data Deduplication with Avamar

3. Configure deduplication node settings on the NetWorker server:


Configure the deduplication node through the NetWorker servers Administration
interface.
The NetWorker Administration Guide provides more information about configuring
the deduplication node.
4. Create a replication node for a deduplication node, if required by the NetWorker
deduplication node for automatic failover of data backup nodes.
The NetWorker Administration Guide provides details.

Set the DNS resolution for NetWorker deduplication node and NMM
The NetWorker deduplication node and the NMM hosts require a DNS resolution between
nodes.
The NMM hosts include one or more of the following:

NMM client

NMM proxy client

NMM proxy storage node

DNS resolution must work prior to starting deduplication backups:

On the NMM hosts, ensure the hosts have DNS name resolution for the NetWorker
deduplication node:
If the NMM hosts do not have DNS resolution for the NetWorker deduplication
node, then that needs to be repaired.
Check your operating system documentation for information on how to fix DNS
resolution problems.

On the NetWorker deduplication node, ensure it has DNS name resolution to the NMM
hosts:
If the NetWorker deduplication node does not have DNS resolution for the NMM
hosts, then that needs to be repaired.
Check your operating system documentation for information on how to fix DNS
resolution problems.

Deduplication backup requirements for NetWorker server


All typical client operations, such as adding, deleting, and drag-and-drop, work the same
for deduplication clients as they do for other types of clients.
A deduplication save set is treated as a regular NetWorker save set, although it actually
has two parts:

92

Metadata (hash info)

The backed-up client data

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Avamar

Only the metadata is stored on a NetWorker storage node. The backed-up client data is
stored on a deduplication node (Avamar server). The metadata can be cloned in the usual
manner, while a copy of the backed-up data can be replicated on another deduplication
node.
When configuring a NMM client resource for deduplication, there are several special
requirements or considerations:

Backup levels and schedules for deduplication clients on page 93

Initial full backup followed by daily incremental backups on page 93

Initial full backup followed by daily full backups on page 94

Retention policies on page 94

Backup configuration notes on page 94

Backup levels and schedules for deduplication clients


When a NMM deduplication client is backed up for the first time after deduplication has
been enabled, a full backup of the client data must be performed. Subsequent backups of
the client then take advantage of deduplication to back up only those data segments that
have changed since the previous backup. The exception to this is that full deduplication
backups always include a complete backup of the index.


If the deduplication node for an existing deduplication client is changed or if another type
of client is upgraded to a deduplication client, a new full backup of the client data must be
performed, regardless whether the most recent backup performed was a full backup.
The initial full backup of a deduplication client takes longer than a regular backup of the
same client data due to the initial overhead involved in deduplicating the data. All
subsequent deduplication backups benefit from the fact that now only the data segments
(not files) that have changed since the previous backup will be backed up. However, the
choice of subsequent backup levels, depends on what is more important to the user:
backup performance or recovery performance. Deduplication clients should use backup
schedules that support that priority.
Deduplication backups must be scheduled to avoid the deduplication node's read-only
periods. The Avamar server documentation provides more information regarding the
read-only periods and backup level strategies.

Initial full backup followed by daily incremental backups


For faster backups and longer recoveries:

This schedule benefits an environment in which the speed of the backup is most
important.

The daily incremental (Level 1) deduplication backups will take significantly less time
than daily regular incremental backups and even less time than daily full
deduplication backups.

Deduplication backup requirements for NetWorker server

93

Data Deduplication with Avamar

After 1 week of backups, this schedule results in slightly longer recovery times, due to
the latency involved in restoring seven backup images (the initial full backup,
followed by applying each incremental backup to the full backup).

Initial full backup followed by daily full backups


For longer backups and faster recoveries:

This schedule benefits an environment in which the speed of data recovery is most
important.

After the initial full backup, daily full deduplication backups take only slightly longer
than regular daily incremental backups.

After 1 week of backups, this schedule results in much shorter recovery times, since
only a single backup image must be recovered.

Retention policies
If a volume contains one or more deduplication save sets, the resource for the
deduplication node that was used to create the backup must exist when the save sets
pass their retention policy.
If the resource for the deduplication node has been deleted, the volume cannot be made
recyclable or relabeled. When deduplication save sets pass their retention time, the
NetWorker server will begin the process of deleting the deduplicated data from the
deduplication node. Therefore, deduplication data may not be recoverable by using the
scanner program after the deduplication save set has passed its retention time.
The NetWorker Administration Guide provides more information about retention policies,
and the save set recover and scanner programs.

Backup configuration notes


The following notes are described in more detail in the NetWorker Administration Guide:

Do not place both regular and deduplication clients in the same groups.

Ensure that all deduplication clients in the same group have the same deduplication
node setting.

Directives cannot be applied if deduplication is used for a client.

Media pools do not apply when deduplication is used.

The cloning of deduplication backups is handled differently from that of regular


backups. Only the metadata is stored on a NetWorker storage node, while the backed
up data is stored on a deduplication node.

An alternate method is available to handle tape backups of the deduplication client data:
1. Create a second instance of the client to be backed up.


Do not configure the second instance as a deduplication client.

94

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Avamar

2. If you are using multiple backup schedules, ensure that the backup level is set to full
for all groups.
This is required because the backup level and the last backup time are calculated by
using both the group name and save set name, and the groups would interfere with
each other.

Configuring a client resource for deduplication backup


Contact EMC Customer Support to configure the deduplication nodes on the Avamar
server side. Once that has been done, you can create access to them from the NetWorker
side. The NetWorker Avamar Integration Guide provides information on how to create a
NetWorker deduplication node.
After the Avamar server and NetWorker server have been configured for deduplication,
configure a client resource to use deduplication during backup, by using the NetWorker
Management Console program. When NMM is installed, it automatically includes support
for deduplication. You do not need to install anything extra on the NMM client or the
NetWorker server.
Configure a client resource with the application-specific settings for the Microsoft
application that you want to back up. Enable the deduplication attribute during the
configuration process. You can create a new client resource or edit an existing client
resource to configure deduplication for any scenario listed in Supported and
unsupported applications, features, and configurations on page 87. There are special
considerations for the following scenarios:

An Exchange client running on a passive node in a CCR environment.

An Exchange 2010 client running DAG.

The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides
details.
When configuring a client resource, review these considerations:

Ensure that the deduplication client has been assigned to a group that contains only
deduplication clients.

Do not mix regular and deduplication clients within a group. Configure a backup
group on page 72 provides information about creating backup groups.

A recommended backup schedule for deduplication clients depends on whether your


priority is faster backups or faster, less complicated recoveries:
Configure a backup schedule on page 72 provides general information about
setting backup schedules.
Backup levels and schedules for deduplication clients on page 93 provides
backup level and schedule information that is specific to deduplication clients.

To configure a deduplication scheduled backup for any client resource by using Avamar:
1. In the Administration page of the NetWorker Management Console, click
Configuration.
2. In the expanded left pane, select Clients to view all the clients that have been already
created.
Configuring a client resource for deduplication backup

95

Data Deduplication with Avamar

The Clients table with a list of clients appears.


3. You can create a new client resource or edit an exiting one:
To add a new client resource:
a. Right-click Clients in the navigation tree or right-click any client in the Clients
table.
b. Select New.
To edit an existing client resource:
a. Right-click the client in the Clients table.
b. Select Properties.
The Client Properties window appears, as shown in Figure 19 on page 96.

Figure 19 General tab in NMC

4. In the General tab, complete the attributes:


a. In the Name attribute, type the Fully Qualified Domain Name (FQDN) of the client:
The client must be a fully qualified host to be a NetWorker deduplication client
The host must run an operating system that supports deduplication.
b. In the Comment attribute, type a description.
c. For the Browse Policy attribute, select a browse policy from the list. The browse
policy determines the time period during which the rolled-over data is available for
quick access.

96

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Avamar

d. For the Retention Policy attribute, select a retention policy from the list. The
retention policy determines the time period during which the rolled-over data is
available, although not necessarily quickly.
e. Select the Scheduled Backups attribute.
f. In the Save Set attribute, specify the save set name for the specific application that
is being backed up.
5. Click the Apps & Modules tab, as shown in Figure 20 on page 97:

Figure 20 Apps & Modules tab with Deduplication attribute

a. In the Access area, leave the following fields empty:


Remote user
Password
b. In the Backup command attribute, type the backup command:
nsrsnap_vss_save.exe
c. In the Application Information field, specify the application variable settings for
the specific application that is being backed up.
d. In the Deduplication area:
Select the Avamar deduplication backup attribute to enable this client for
deduplication backups.
From the Avamar Deduplication node menu, select the name of the
deduplication node to which this clients backup data will be sent. This is the
deduplication node created in Configure the Avamar and the NetWorker
server on page 91. All clients in a group must have the same deduplication
node value.
Do not select the name of a replication node here. This step links this client
with its own deduplication node. Also, if the deduplication node for this clients
backup data changes, the next backup done must be a level 0 (full) backup.

Configuring a client resource for deduplication backup

97

Data Deduplication with Avamar

6. Click the Globals (1 of 2) tab, as shown in Figure 21 on page 98:

Figure 21 Globals (1 of 2) tab

a. By default, NMM uses client parallelism set to 4 for all deduplication clients.
Because deduplication backups require more CPU and memory resources on the
host where the backup is performed, it might be necessary to reduce the client
parallelism for configurations with either a large number of save sets, or a large
number of volumes.
b. Complete the remaining configuration information, for the specific application that
is being backed up.
7. Click OK.

Querying deduplication save sets by using mminfo


You can use the mminfo command to query information about save sets created when
using deduplication. To limit the output of mminfo command to only those save sets
created when using deduplication, use the -q dedupe option.
For example, to query deduplication save sets for the local host, use the following
command:
mminfo -S -q dedupe
The mminfo -S -q dedupe command does not list the following information:

Empty save sets

Save sets in which nothing was backed up as the result of a skip schedule

These save sets are treated as regular save sets, not as deduplicated save sets.

Recovering deduplicated data


The process of recovering data from a deduplication node is the same as that for
recovering from a storage node.
However, there is an underlying difference in where the information is kept. Only the
metadata, which is hash information, is stored (or cloned or staged) on a NetWorker
storage node. The backed up data from a deduplication client is stored on a deduplication
node that is an Avamar server. Both the deduplication node and the volume on the
recovered side must be online during the recovery of deduplicated data.

98

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Avamar


Under some conditions, if recovery from the primary deduplication node fails,
autorecovery uses a replication node. The NetWorker Administration Guide provides
detailed information about recovery from a replication node.

Deleting deduplication save sets


The process for deleting deduplication save sets is performed on the NetWorker and
Avamar servers, and is described in the NetWorker Administration Guide.

Deleting deduplication save sets

99

Data Deduplication with Avamar

100

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 6
Data Deduplication with Data Domain
This chapter includes the following topics:

Software requirements.......................................................................................... 102


Utilizing the Data Domain Boost data deduplication capabilities ........................... 102
Supported operating systems, applications, and streams types ............................ 104
Configuration considerations for NMM .................................................................. 106
Configuring a client resource for client-side Data Domain Boost deduplication backups
106
Recovering deduplicated data ............................................................................... 109
Related documentation about Data Domain and NetWorker server ........................ 109

Data Deduplication with Data Domain

101

Data Deduplication with Data Domain

Software requirements
For NMM to leverage the NetWorker Data Domain integration support, the following
software are required:

NetWorker Server 7.6 SP2 or later

NetWorker storage node 7.6 SP2 or later

NetWorker client 7.6 SP2 or later

Data Domain Appliance with Data Domain OS version supported by NetWorker client
installed on NMM 2.4 host

Data Domain OS 4.8 or later for DD Boost functionality

Utilizing the Data Domain Boost data deduplication capabilities


The benefits of using data deduplication on page 86 provides details about the benefits
of using data deduplication.
As the data deduplication process in NetWorker Module for Microsoft Applications (NMM)
requires Data Domain and NetWorker integration and configuration, you must review the
documentation listed in Related documentation about Data Domain and NetWorker
server on page 109 for details about Data Domain and NetWorker integration and
configuration.
The NetWorker integration with Data Domain Boost logical storage devices on Data
Domain systems enables backup data to be deduplicated on a NetWorker storage node
before it is sent for storage on a Data Domain system. This feature dramatically reduces
the amount of data that is sent and stored on the Data Domain system and reduces the
bandwidth used by the storage process.
The DD Boost software enables multiple concurrent storage and recovery operations,
unlike conventional virtual tape library (VTL), and CIFS or NFS AFTD interfaces on Data
Domain systems.
DD Boost software consists of the following two components:

The DD Boost library API enables the NetWorker software to communicate with the
Data Domain system.

The distributed segment processing (DSP) feature enables data deduplication to be


performed on a NetWorker storage node or other supported host before the data is
sent to the Data Domain system for storage.

Deduplicated data backups are stored on special NetWorker Data Domain (DD Boost)
storage devices on the Data Domain system that are accessed by the NetWorker storage
nodes and server.

Support for client-side deduplication backup and recovery


For some types of data, NetWorker Data Domain devices support direct file access (DFA),
which enables client-side deduplication backup and recovery.

102

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Data Domain

This DFA deduplication method has the following advantages:

The client will directly write to a Data Domain device, ruling out the need for a
dedicated storage node configuration.

Deduplication on the client host reduces the bandwidth for the data transfer.

DFA deduplication enables a NetWorker Data Domain device to be shared among multiple
hosts. Multiple sessions on a device improves performance without the need to create
multiple devices, which can impair performance.
NMM does not support multi-stream DFA-based backups for SQL Server VDI backup and
recovery. SQL Server VDI backup and recovery should be performed using the non-DFA
method, which uses the traditional storage node and supports both single and
multi-stream based backup.
Figure 22 on page 103 shows an example environment where DFA with DSP is used to
send deduplicated backup data directly to a NetWorker Data Domain device. The same
device can also be used by non-DFA clients that use the storage node for deduplication
backup.

Figure 22 Client direct file access deduplication environment

Backup support
The DFA feature enables supported NetWorker clients to deduplicate their backup data
locally and store it directly on a NetWorker Data Domain device, thereby bypassing the
NetWorker storage node and reducing network bandwidth usage. Because multiple clients
with DFA backup support can share a device by using multiple sessions, DFA can reduce
the number of devices used, thereby reducing the impact on the Data Domain system
performance and maintenance.

Recovery support
If a supported DFA client has access to its NetWorker Data Domain storage device, it will
recover data directly from the device, regardless of whether DFA was used for the backup.
Because DFA bypasses the storage node, performance is improved. If the DFA client

Utilizing the Data Domain Boost data deduplication capabilities

103

Data Deduplication with Data Domain

cannot access the data, then the recovery process reverts to the traditional method that
uses the storage node. The Data Domain system converts the stored data to its original
non-deduplicated state for the recovery.

Supported operating systems, applications, and streams types


This section contains the following information:

Supported operating systems on page 104

Supported Microsoft applications on page 104

Supported applications for single and multi streams when using Data Domain on
page 105


The NetWorker Software Compatibility Guide contains additional and the most up-to-date
information about NMM compatibility.

Supported operating systems


The supported operating systems are as follows:

Windows 2008 SP2 (x86, x64)

Windows 2008 R2 (x64)

Supported Microsoft applications


Client-side Domain Boost deduplication support is available for the following
applications:
For VSS backup and recovery:
Exchange Server 2010 (x64)
Exchange Server 2007 (x64) SP3 Rollup 1
Exchange 2007 SP3 Rollup 5
SharePoint Server 2010 SP1 (x64)
SharePoint Server 2007 RTM, SP1, SP2, SP3 (x64, x86)
Hyper-V
SQL Server 2012 (x64)
SQL Server 2008 R2 (x64, x86)
SQL Server 2008 SP1 (x64, x86)
SQL Server 2008 (x64, x86)
SQL Server 2005 (x64, x86)

For VDI backup and recovery:


SQL Server 2012 (x64)

104

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Data Domain

SQL Server 2008 R2 (x64, x86)


SQL Server 2008 SP1 (x64, x86)
SQL Server 2008 (x64, x86)
SQL Server 2005 (x64, x86)


Client-side Domain Boost deduplication support is not available for Active Directory and
DPM Server.

Supported applications for single and multi streams when using Data Domain
Related documentation about Data Domain and NetWorker server on page 109 lists the
documentation that provides details about single and multi streams when using Data
Domain.
Table 27 on page 106 lists the Microsoft applications for which single and multi stream
support is available when using Data Domain.
Table 26 Single and multi streams support to and from Data Domain
To Data Domain

From Data Domain

Microsoft Applications

SIngle
stream

Multi
stream

SIngle
stream

Multi
stream

Exchange Server 2010 (x64)

SharePoint Server 2010

SharePoint Server 2007 SP2

SQL Server 2012 (x64) (VDI)

SQL Server 2008 R2 (x64, x86) (VDI)

SQL Server 2008 SP1 (x64, x86)


(VDI)

SQL Server 2008 (x64, x86) (VDI)

SQL Server 2005 (x64, x86) (VDI)

SQL Server 2012 (x64) (VSS)

SQL Server 2008 R2 (x64, x86) (VSS)

SQL Server 2008 SP1 (x64, x86)


(VSS)

SQL Server 2008 (x64, x86) (VSS)

SQL Server 2005 (x64, x86) (VSS)

Hyper-V

* SQL Server VDI support for multi stream is only available when using Dedicated Storage Nodes (DSN).

Supported operating systems, applications, and streams types

105

Data Deduplication with Data Domain

Configuration considerations for NMM


Configuration, monitoring, and reporting of backup and restore operations on NetWorker
Data Domain devices is provided by the NetWorker Management Console (NMC) portal.
The NMC server is accessible from any supported remote Internet browser.
The Client Configuration Wizard simplifies the configuration of storage devices, backup
clients, storage (target) pools, volume labeling, and save set cloning.
Table 27 on page 106 provides the configuration details for Data Domain and NetWorker.
Table 27 Configuration details for Data Domain and NetWorker
Feature

Consideration

Optimized
cloning

No special procedures or considerations are required for Data Domain


optimized cloning by NMM 2.4.
The NetWorker Administration Guide and the NetWorker Data Domain
Deduplication Devices Integration Guide provide details.

Data Domain
storage node

No special procedures or considerations are required for Data Domain


storage node by NMM version 2.4.
The NetWorker Administration Guide and the NetWorker Data Domain
Deduplication Devices Integration Guide provide details.

Client-side IO
optimization
(Data Domain
Boost)

Configuring a client resource for client-side Data Domain Boost


deduplication backups on page 106 provides more information.

Configuring a client resource for client-side Data Domain Boost


deduplication backups
When NMM is installed, it automatically includes support for deduplication. You do not
need to install anything extra on the NMM client. For Data Domain Boost backup, ensure
that the device used is a Data Domain Boost device and that the appropriate enabler has
been applied.
After configuring a Data Domain-based storage node and device as described in the
NetWorker Data Domain Deduplication Devices Integration Guide, configure a NetWorker
deduplication client.
After the Data Domain server and NetWorker server have been configured for
deduplication, configure a client resource to use deduplication. A storage node,
configured with at least one Data Domain Boost device, must exist for client-side IO
optimization to be possible.
To configure a deduplication scheduled backup for any client resource by using Data
Domain:
1. In the Administration page of the NetWorker Management Console, click
Configuration.
2. In the expanded left pane, select Clients to view all the clients that have been already
created.
The Clients table with a list of clients displays.

106

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Data Domain

3. You can create a new client resource or edit an exiting one:


To add a new client resource:
a. Right-click Clients in the navigation tree or right-click any client in the Clients
table.
b. Select New.
To edit an existing client resource:
a. Right-click the client in the Clients table.
b. Select Properties.
The Client Properties window appears, as shown in Figure 23 on page 107.

Figure 23 General tab in NMC

4. In the General tab, complete the attributes:


a. In the Name attribute, type the Fully Qualified Domain Name (FQDN) of the client:
The client must be a fully qualified host to be a NetWorker deduplication client
The host must run an operating system that supports deduplication.
b. In the Comment attribute, type a description.
c. For the Browse Policy attribute, select a browse policy from the list. The browse
policy determines the time period during which the rolled-over data is available for
quick access.

Configuring a client resource for client-side Data Domain Boost deduplication backups

107

Data Deduplication with Data Domain

d. For the Retention Policy attribute, select a retention policy from the list. The
retention policy determines the time period during which the rolled-over data is
available, although not necessarily quickly.
e. Select the Scheduled Backups attribute. A recommended backup schedule for
deduplication clients depends on whether your priority is faster backups or faster,
less complicated recoveries. Configure a backup schedule on page 72 provides
general information about setting backup schedules. Backup levels and
schedules for deduplication clients on page 93 provides backup level and
schedule information that is specific to deduplication clients.
f. Select the Client direct option.
Note: The client direct functionality is only available when using a Data Domain
device, and is not available for other devices.
g. In the Save Set attribute, specify the save set name for the specific application that
is being backed up.
In the Group attribute, select the group for the client resource:
Ensure that the deduplication client has been assigned to a group that contains
only deduplication clients.
Do not mix regular and deduplication clients within a group.
Configure a backup group on page 72 provides information about creating
backup groups.
5. Click the Apps & Modules tab, as shown in Figure 24 on page 108:

Figure 24 Apps & Modules tab with Deduplication attribute

a. In the Access area, leave the Remote user and Password fields empty.
b. In the Backup command attribute, type the backup command:
nsrsnap_vss_save.exe

108

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Data Deduplication with Data Domain

c. In the Application Information field, add parameters required for the particular
application. The NetWorker Module for Microsoft Applications Release 2.4
Application Guide provides details for each application.
d. In the Deduplication area, select the Data Domain Backup option.
6. Click Globals (2 of 2) tab of the client configuration.
7. Provide the remote storage node name where the Data Domain device is configured.
This should be the first or only entry.
During backup, the NMM 2.4 client:
Contacts this storage node to obtain the DD device credentials.
Establishes connection by using these credentials.
Sends data directly to the DD system.
8. Complete the remaining configuration information as for any normal client.
9. To verify if a backup is successful, use the following command:
mminfo -avot -s server_name -c client_name

where:
server_name is the name of the NetWorker server
client_name is the name of NMM client

Recovering deduplicated data


The process for recovering data from a Data Domain deduplication system is basically the
same as that for recovering from a traditional storage node. The backed up data from a
client is stored in a deduplicated state on the Data Domain device. Both the storage node
and the Data Domain system must be online during the recovery of deduplicated data.
The above is also valid for data that has been backed up using the client side IO feature.

Related documentation about Data Domain and NetWorker server


The latest documentation for the Data Domain server and NetWorker server setup and
configuration is available for download at http://support.emc.com.

NetWorker Data Domain Deduplication Devices Integration Guide

NetWorker Administration Guide

Documentation related to the use of Data Domain systems can be found at the Data
Domain Support Portal (support account required), https://my.datadomain.com/,
including:

Data Domain Software Release Notes

Data Domain Administration Guide

Data Domain Command Reference

Data Domain CLI Guide

Recovering deduplicated data

109

Data Deduplication with Data Domain

110

Data Domain System Hardware Guide

Installation and Setup Guide for each Data Domain system

Data Domain Initial Configuration Guide

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 7
Microsoft Windows System Backup and Recovery
This chapter includes the following topics:

Supported Windows systems ................................................................................


Configuring system scheduled backups.................................................................
Performing a recovery ...........................................................................................
Recovery options ..................................................................................................
Recovering file system snapshots that have not been rolled over...........................
Booting the NMM host in Directory Service Restore mode......................................
Authoritative recovery of NTDS or FRS data ............................................................
Recovering the Windows system configuration to an earlier state ..........................
Restoring BOOT/BCD data in Windows 2008 R2 ....................................................
Windows print queues backup and recovery..........................................................
Windows DFS-R granular backup and recovery.......................................................
Pre and post command support ............................................................................
Recovering client file index and the media database .............................................

Microsoft Windows System Backup and Recovery

112
112
115
118
130
131
132
134
135
135
135
136
137

111

Microsoft Windows System Backup and Recovery

Supported Windows systems


NMM supports backup and recovery of the following:

Active Directory

Windows Clusters

Windows Server 2008

Windows Server 2008 R2


Enterprise Edition (x64)
Datacenter Edition (x64)
Standard Edition (x64)
Web Edition (x64)
Note: NMM 2.4 does not provide support for Windows Server 2008 R2 Foundation
Edition.

Configuring system scheduled backups


To perform a system scheduled backup, complete the tasks outlined in Table 28 on
page 112.
Table 28 Tasks for scheduling a backup for VSS writers
Backup task

Consideration

Task 1: Configure a backup pool on page 66

No additional configuration is required.

Task 2: Configure snapshot policies on page 68 To back up SYSTEM COMPONENTS:\ the snapshot policy must specify All.
NMM enforces this policy to ensure that a permanent backup of the
snapshot exists.
Attempting to restore system components from a persistent snapshot might
invalidate the snapshot and leave the system in an unrecoverable state.
Task 3: Configure a backup schedule on
page 72

No additional configuration is required.

Task 4: Configure a backup group on page 72

No additional configuration is required.

Task 5: Configure a system client resource on


page 112

This task is specific to configuring a client resource for Windows system


backup.

Task 5: Configure a system client resource


To configure a system client resource:
1. In the Administration page of the NetWorker Management Console, click
Configuration.
2. In the expanded left pane, select Clients.
3. From the File menu, select New.

112

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

4. In the General tab, complete the following attributes:


a. In the Name attribute, type the host name of the NetWorker client computer.
b. In the Comment attribute:
a. Type a description.
b. If you are creating multiple client resources for the same NetWorker client host
computer, use this attribute to differentiate the purpose of each resource.
c. From the Browse Policy attribute, select a browse policy from the list. The browse
policy determines how long rolled-over data is available for browsing.
d. From the Retention Policy attribute, select a retention policy from the list. The
retention policy determines how long rolled-over data is available though not
necessarily quickly.
e. Select the Scheduled Backups attribute.
f. In the Save Set attribute, specify the save sets listed in Table 29 on page 113.
Place multiple entries on separate lines.
Table 29 Save set for Windows backup
Save set

Details

Examples

All

To specify all volume data


and all available Windows
system components.

Application data such as Exchange, SQL, or


DPM data is not included in the save set All.
Backup of save set 'All' is not supported on
hosts that have hardware LUNs on them
because the backup includes both software
and hardware snapshots that are taken during
the same backup.

Volume

A volume save set can be a


drive letter, path, or mount
point.

To specify the volume E and all of its


subfolders and files.
E:\
Entries are not case-sensitive.
If you have a mount point named
CAD_Drawings on volume E:\ and you want
to back up all of the data on E:\ including the
data under the mount point, type the
following on separate lines:
E:\
E:\CAD_Drawings
The save set All will include mount point
data only if no other path to the remote data
is found during backup.

Note: When a volume that


contains writer files for an
application or the SYSTEM
STATE is backed up, the files
that belong to the writers are
skipped during the backup.

SYSTEM
COMPONENTS:\

The SYSTEM COMPONENTS:\


save set contains many
individual system writers.
The individual system
writers cannot be specified
in a backup save set and
they are all backed up in the
SYSTEM
COMPONENTS:\save set.
Table 7 on page 28 provides
the list of writers under
Windows SYSTEM
COMPONENTS.

Ensure that the backward slash (\) character is


entered with the save set name
SYSTEM COMPONENTS:\. Otherwise, the
backup fails and no concise error message is
provided.

Configuring system scheduled backups

113

Microsoft Windows System Backup and Recovery


To protect against a disaster, ensure that all volumes and Windows system
components are backed up. Backup of SYSTEM COMPONENTS or save set All are
required to have a snapshot policy of All. This ensures that SYSTEM COMPONENTS
data is rolled over.
The snapshot policy for volumes, while not required to be rolled over, should also
specify a value of 'First', 'Last', or 'All' in the Backup Snapshots field. Online
disaster Recovery can only be performed from a conventional backup. Do not
specify None in the Backup Snapshots field.
g. For the Group attribute, select the backup group to which this client resource will
be added.


If client resources for the same NMM client host are added to different backup
groups, ensure that the Start Time attribute for each backup group is set far
enough apart so that the backups for the hosts client resources do not overlap.
h. For the Schedule attribute, select a backup schedule.
5. Click the Apps & Modules tab:
a. In the Access area, leave the Remote user and Password fields empty.
b. In the Backup command attribute, type the following backup command for all
types of backup data except for Active Directory conventional backups:
nsrsnap_vss_save.exe

c. In the Application information attribute, type the following variable and value:
NSR_SNAP_TYPE=vss

If hardware LUNs are configured in the NMM client machine, while performing
system components backup, set the following:
NSR_VSS_FORCE_SYSTEM_PROVIDER=yes

Note: An NMM backup fails in standalone data mover setups, when both the
NSR_VSS_FORCE_SYSTEM_PROVIDER=yes and
NSR_DATA_MOVER=clientname.domain.com parameters are used in the
Application Information field of the client resource.
6. Click the Globals (2 of 2) tab:
a. If a storage node is configured for the backup of SYSTEM COMPONENTS, specify
the name of the following in the Storage nodes field:
Dedicated Storage Node (DSN)
or
Remote Storage Node (RSN)
7. Click OK.

114

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

Performing a recovery
This section provides information on the following:

Recovery considerations on page 115

System recovery in Windows Server 2008 on page 116

System Recovery Options summary on page 117

Recovery considerations
Review the following options and considerations before performing the procedures in
these sections:

Recovering file system snapshots that have not been rolled over on page 130
provides more information about recovering data from a persistent snapshot that has
not been rolled over to a conventional backup medium.


Attempting to restore system components from a persistent snapshot may invalidate the
snapshot and leave the system in an unrecoverable state. NMM does not prevent an
attempt to restore SYSTEM COMPONENTS from a point-in-time backup. Roll over a
snapshot on page 31 describes how to rollover a snapshot.

To recover backup data that was password-protected and encrypted with another VSS
client program, and not NetWorker VSS Client for Microsoft Windows 1.0 or NMM, use
the recover.exe command from the command line interface (CLI).
The NetWorker Command Reference Guide provides more information about the
recover.exe command.

Data that was backed up from a mount point is available for browsing at the root of the
navigation tree.
For example, if the drive H:\ has a mount point named H:\CAD_Drawings, then a
separate entry for the mount point H:\CAD_Drawings will be available at the root of the
navigation tree instead of as a subfolder under H:\.

To recover data to a mount point that has been deleted, manually re-create the mount
point before recovering the data. Otherwise, the data will be recovered to a local
directory whose name corresponds to the deleted mount point.

If the disk that is referenced by the mount point has been replaced, manually re-create
the mount point.

If a file was not backed up due to a skip directive, you may still be able to select the
file for a recovery operation. In this case, although you can select the file, it is not
recoverable.


If you are recovering FRS or Windows NT Directory Services (NTDS) data, boot the
NetWorker client in Directory Service Restore mode (DSRM) before completing the recovery
options in this section. Booting the NMM host in Directory Service Restore mode on
page 131 provides more information about these recovery options.

Performing a recovery

115

Microsoft Windows System Backup and Recovery

System recovery in Windows Server 2008


When recovering an older backup of the system in Windows Server 2008, any application
or NMM upgrades, service packs, or hot fixes that were installed since the backup may
need to be reinstalled after the recovery. Recovering system data on page 116 describes
using the System Recover Session commands and features for recovery.
Some applications have their own name for the System Recover Session. When you select
Recover from the NMM client GUI, it may display one or more of the following in addition to
System Recover Session, depending on which of the applications are installed on the
client:

Active Directory Recover Session

DPM Recover Session

Exchange Recover Session

Hyper-V Recover Session

SharePoint Recover Session

SQL Recover Session

Application-specific recovery steps are provided in separate chapters for the applications.
The NetWorker Module for Microsoft Applications Release 2.4 Application Guide provides
details.

Recovering system data


The System Recover Session window in the NMM Client GUI displays the backups that are
available for recovery, and provides browsing and searching to locate and select items for
recovery.
To recover system data:
1. Open the NMM client software and select the NetWorker server on which the NMM
client software was configured for backup.
2. If the NMM client is part of a cluster:
a. Select the virtual client to which you are recovering data.
b. Select the Client list attribute in the application toolbar.
3. From the left pane, select Recover > System Recover Session.
4. In the navigation tree, select the items to be recovered. By default, items displayed in
the navigation tree are from the most recent backup.
For the System Recover Session view, both snapshot and rollovers can be
displayed in the same view:
If the most recent backup for an item is a snapshot, the snapshot appears.
If the most recent backup for an item is a rollover, the rollover appears.
To recover file system items from a previous backup:
a. From the application toolbar, click the Browse calendar icon.

116

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

b. Select an earlier browse time.


To view versions of a backup item prior to the browse time:
a. Right-click an item in the navigation tree.
b. Select Versions from the pop-up menu.
5. To determine whether any volumes need to be mounted for a selected item:
a. Right-click the item.
b. Select Required Volumes from the pop-up menu.
6. To determine the version of the System Components:
a. Highlight the individual writer.
b. Right-click the writer contents in the navigation pane.
7. From the Options menu, select System Recover Session Options:
NetWorker recovery options on page 119
Cluster recovery options on page 120
ADAM recovery options on page 123
DFS recovery options on page 124
FRS recovery options on page 126
NTDS recovery options on page 128
Security recovery options on page 129
8. Type the application-specific recover options or settings.
The NetWorker Module for Microsoft Applications Release 2.4 Application Guide
provides detailed information.
9. From the System Recover Session toolbar:
a. Click the Recover tab.
b. Select the relevant data for restore from NMM GUI.
c. Click Start Recover.
10. From the left pane, select Monitor to view messages related to the progress of the
recovery operation.
If you recovered items from a snapshot (instant recovery), the snapshot volume will be
temporarily mounted during the recovery operation. The mounted volume is displayed in
the Windows Explorer program.
After the recovery is complete, you may have to refresh the Windows Explorer to update its
view. From the Start menu, select Programs > Accessories > Windows Explorer.

System Recovery Options summary


The System Recover Sessions Options window lists the System Recover and NetWorker
Recover Options. This allows you to review the settings before starting the recovery.
Performing a recovery on page 115 provides more information.
Performing a recovery

117

Microsoft Windows System Backup and Recovery

You can perform the following tasks:

To change the NetWorker and System Recover Options:


a. Open the NMM Client GUI.
b. Click Recover Options.

To access the settings from the System Recover Session view:


a. Select System Recover Session from the toolbar.
b. Click Recover Options.

To view the System Recover Sessions Options settings, see the following tabs:
General
NetWorker
Security

To validate the options:


a. Click Start Recover.
b. If all option settings are valid, the dialog box closes and recovery starts.

Recovery options
This section describes the following recovery options:

General recovery options on page 118

NetWorker recovery options on page 119

Cluster recovery options on page 120

ADAM recovery options on page 123

DFS recovery options on page 124

FRS recovery options on page 126

NTDS recovery options on page 128

Security recovery options on page 129

Note: The NetWorker Module for Microsoft Applications Release 2.4 Application Guide
includes information on the Microsoft Exchange recovery options.

General recovery options


The General tab specifies how much diagnostic information is output for a recovery
operation. For most recoveries, the diagnostic information is displayed in the Monitor
view.
To set the level of diagnostic information for a recovery:
1. In the System Recover Session Options dialog box, click the General tab.

118

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

2. From the Diagnostic Output Level attribute, select a level from normal to 9:
A value of 1 produces the least amount of diagnostic information.
A value of 9 produces the most diagnostic information.
The value Normal produces no diagnostic information.
3. Click OK.
Note: After each recovery, the Diagnostic Level attribute is automatically set to Normal.

NetWorker recovery options


The NetWorker tab is displayed in System Recover Session Options and Hyper-V Recover
Session Options.
Note: Some of the following features are not applicable to Hyper-V Recover Session
Options.
To specify recovery options for file system data:
1. From the Options menu, select System Recover Session Options.
2. Click the NetWorker tab.
3. In the Relocate recovered data field, type a location other than the location from which
the data was originally backed up:
This feature is only applicable to System Recover Session Options.
The location must be a local path.
UNC syntax such as the following is not supported:
\\servername\share
4. Use the Restore Type field to determine the default recovery method:
Select Conventional Restore to recover from a conventional backup medium.
If a conventional backup is not available for the selected browse time, an snapshot
restore is performed.
Select Snapshot Restore to recover from a snapshot.
If a snapshot is not available for the selected browse time, a conventional restore
is performed:
For snapshot restore, snapshot validation will occur prior to the restore.
If the snapshot is invalid, the restore will fail. The invalid snapshot will be
deleted automatically the next time the snapshot group runs.
You can also delete a snapshot manually. Deleting a snapshot on page 45
provides more information about manually deleting snapshots.

Recovery options

119

Microsoft Windows System Backup and Recovery

5. Select Use Microsoft best practices for selecting the system state to enforce Microsoft
recommendations that determine which system state items must be selected as a
group for recovery:
This feature is only applicable to System State Restore.
Clear this attribute to select system state items individually.


Do not clear the Use Microsoft best practices for selecting the system state box except
where specifically instructed to do otherwise in this document. For instance, there are
some procedures, such as recovering DFS data, where you can clear this attribute.
Microsoft does not support recovery of portions of the operating system. Attempted
recovery of portions of the operating system, with this box cleared, may render the system
unbootable. After each recovery operation, this option is automatically selected.
6. For Directory Services Restore Mode (DSRM), to recover the Bootable System State in a
domain controller setup, ensure that the following checkbox is unchecked:
Microsoft Best Practices

7. Select Terminate recover of item if errors are encountered if it is not already selected:
This option is selected by default.
If this option is selected, then when an error occurs only the recovery of the
specific item causing the error is halted.
For example, during the recovery of the items C:\test and
APPLICATIONS:\SqlServerWriter, an error occurs during recovery of a single file in the
C:\test folder:
If the option is selected, the rest of the recovery of C:\test is terminated, but NMM
still attempts to recover APPLICATIONS:\SqlServerWriter\.
If option is cleared and there is a recovery error with a file in C:\test, NMM still
attempts to recover the rest of C:\test and APPLICATIONS:\SqlServerWriter.
8. Clear this option if file system recovery fails, and you encounter the error message:
Files failed to be restored for File system marked objects.

When this error occurs, open the EMC PowerSnap client log file and note which files
caused the error.
9. Click OK.

Cluster recovery options


Use the Cluster Recovery tab to specify whether to perform an authoritative or
nonauthoritative restore of the Cluster Writer. Chapter 8, Microsoft Windows Cluster
Backup and Recovery, provides details.

Cluster Writer nonauthoritative restore (default)


Use this mode if the cluster is completely lost, in which case the cluster service does not
run on either node, and the cluster database is missing or corrupted.

120

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

Nonauthoritative restores will restore the cluster but will not restore a particular version of
the database, for example a file server, SQL, Exchange.
After the nonauthoritative restore is complete:
1. Perform an authoritative restore to recover a specific version of the database.
2. Select the following save set to restore the registry:
SYSTEM COMPONENTS:\BootableSystemState

This restores the Registry that contains entries for the following:
Cluster node
Cluster database
Quorum that exists only on active cluster node
Note: The NMM software performs an nonauthoritative restore by default.

Specify a nonauthoritative restore


To specify a nonauthoritative restore for the Windows Server 2008, and Windows Server
2008 R2 Cluster Writer:
1. From the Options menu, select System Recover Session Options.
2. Click the NetWorker tab.
3. Clear the Use Microsoft best practices for selecting system state option.
4. Click OK to close the System Recover Session Options dialog box.
5. In the navigation tree:
a. Expand the SYSTEM COMPONENTS folder.
b. Select Cluster Database.
6. Select the following save set to restore the registry that contains the entries for the
relevant cluster nodes and quorum:
SYSTEM COMPONENTS:\BootableSystemState

Note: The registry entry for the quorum exists only in active cluster node.
7. From the System Recover Session toolbar:
a. Click Recover.
b. Click Restore.
8. Restart the system when prompted.
9. On the other nodes if required, repeat step 1 to step 8 .

Cluster Writer authoritative restore


Use this mode when the cluster configuration is lost, but the cluster is running okay
otherwise. For example, when a cluster resource was accidentally deleted or you want to
revert to a previous cluster configuration. The cluster must be healthy in all nodes. For
example, the cluster services should be running in all the cluster nodes.
Recovery options

121

Microsoft Windows System Backup and Recovery

Note: Authoritative restores of the Cluster Writer are only supported for Windows Server
2008 and Windows Server 2008 R2.

Specify an authoritative restore


To specify an authoritative restore for the Windows Server 2008 and Windows Server 2008
R2 Cluster Writer:
1. Ensure that the cluster service is running on the local system.
2. Ensure that the cluster service is running on all remote nodes.
Microsoft Windows Server 2008 product documentation provides more information on
running the cluster service.
3. From the Options menu, select System Recover Session Options.
4. Click the NetWorker tab.
5. Clear the Use Microsoft best practices for selecting system state option.
6. Click the Cluster tab.
7. Select the Authoritative Restore options.
8. Click OK to close the System Recover Session Options dialog box.
9. In the navigation tree:
a. Expand the SYSTEM COMPONENTS folder.
b. Select Cluster Database.
10. From the System Recover Session toolbar, click Start Restore.

Perform an authoritative restore


Perform an authoritative restore of the Windows 2008 and Windows Server 2008 R2
Cluster Writer:
1. In the recover session, select only the following:
Windows 2008 Cluster Writer
Windows Server 2008 R2 Cluster Writer
2. Do not perform an authoritative restore of the following simultaneously as the restore
of any other NMM application:
Windows 2008 Cluster Writer
Windows Server 2008 R2 Cluster Writer
Note: Authoritative restores of the Windows 2008 and Windows Server 2008 R2 Cluster
Writer will restart the cluster service on all nodes in the cluster.

122

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

ADAM recovery options


Use the ADAM tab in the System Recover Session Options dialog box to specify whether to
perform an authoritative or nonauthoritative restore of ADAM data on this host.

ADAM nonauthoritative restore (default)


This type of restore is typically performed when the host is being recovered due to
catastrophic loss of data such as a disk failure.
The most recent ADAM data is restored from backups and then the recovered host is
updated with the most recent ADAM data from another ADAM Server in the domain. This
restore relies on at least one other ADAM Server in the domain to have accurate and
up-to-date ADAM data.

ADAM authoritative restore


Perform an authoritative restore only when corrupted or deleted ADAM data has been
propagated to other ADAM Server.
This type of recovery:
1. Restores the most recent ADAM data from backups.
2. Updates other ADAM Servers in the domain with the recovered data.

Specifying recovery options for ADAM data


To specify recovery options for ADAM data:
1. From the Options menu:
a. Select System Recover Session Options.
b. Click the ADAM tab.
2. Select one of the following options:
Non Authoritative Restore
Authoritative Restore
3. Click OK to close the System Recover Session Options dialog box.
4. In the navigation tree:
a. Expand the Applications folder.
b. Select ADAM instance_name Writer.
5. From the System Recover Session toolbar:
a. Click Recover.
b. Click Restore.
6. If an authoritative restore has been performed, restore for all selections has
completed, and NMM reports success, complete the following steps:
a. Exit the NMM client, and open a command window.
b. Run the dsdbutil.exe utility, and select Authoritative Restore option.
c. This marks the objects that are to be restored in authoritative mode.
Recovery options

123

Microsoft Windows System Backup and Recovery

d. When processing is complete:


Exit the dsdbutil.exe utility.
Start the ADAM instance service manually.
Note: If a nonauthoritative restore was performed, the ADAM instance has already
been started.

Recovering ADAM data


To recover ADAM data, ensure the that the following save set has been backed up:
APPLICATIONS:\ADAM instance_name Writer\

Chapter 4, Scheduled Backup, provides more information about specifying save sets
when configuring a backup.

DFS recovery options


You can specify whether to perform an authoritative or nonauthoritative recovery of DFS
data on the host in Windows Server 2008 and Windows Server 2008 R2 systems:

Authoritative restore is available.

The writer is recovered from:


SYSTEM COMPONENTS:\Bootable System State

DFS can have DFS shares, and also be part of Active Directory recovery.

DFS is part of Active Directory recovery if it was promoted to a Domain Controller with
the either of the following settings selected:
2008 Functional Level
2008 R2 Functional Level

To restore DFS as part of Active Directory, the system must be restarted into DSRM.
Booting the NMM host in Directory Service Restore mode on page 131 provides
more information.

The steps for performing a DFS recovery from the following Microsoft servers are described
in separate procedures:

Windows Server 2008

Windows Server 2008 R2

Nonauthoritative restore (default)


This type of recovery restores the most recent DFS data from backups and then updates
the recovered host with the most recent DFS data from another DFS Server in the domain:

124

A nonauthoritative recovery relies on at least one other DFS Server in the domain to
have accurate up-to-date DFS data.

Nonauthoritative recoveries are typically performed when the host is recovered due to
catastrophic loss of data such as a disk failure. This occurs when two or more domain
controllers are restored:

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

Select nonauthoritative restore on the second, third, and fourth domain


controllers. The domain controllers erase their local copy of SYSVOL and then
replicate SYSVOL from the authoritative domain controllers.
Authoritative restore should be performed on at least one domain controllers.

Authoritative restore
An authoritative recovery restores the most recent DFS data from backups, and then
updates other DFS Servers in the domain with the recovered data.
Perform an authoritative recovery only when corrupted or deleted DFS data has been
propagated to other DFS Servers.
To recover DFS data:
1. The APPLICATIONS:\DFS Replication service writer save set must have been backed
up.
2. The SYSTEM COMPONENTS:\ save set on the namespace server (usually the domain
controller) that is associated with the DFS configuration must have been backed up.
Chapter 4, Scheduled Backup, provides more information about specifying save
sets when configuring a backup.

Windows Server 2008 and Windows Server 2008 R2


To specify which type of DFS recovery to perform in Windows Server 2008 and Windows
Server 2008 R2:
1. From the Options menu:
a. Select System Recover Session Options.
b. Click the DFS tab.
2. Select one of the following options:
Non Authoritative Restore to perform a nonauthoritative recovery.
or
Authoritative Restore to perform an authoritative recovery.
3. Click OK to close the System Recover Session Options dialog box.
4. From the left pane, select Recover > System Recover Session.
5. From the navigation tree:
a. Expand the SYSTEM COMPONENTS folder.
b. Select BootableSystemState.
6. From the System Recover Session toolbar:
a. Click Recover.
b. Click Restore.
After the recovery has completed, the Use Microsoft best practices for selecting the
system state attribute is automatically selected.

Recovery options

125

Microsoft Windows System Backup and Recovery


Do not clear the Use Microsoft best practices for selecting the system state box except
where specifically instructed to do otherwise in this document. For instance, there are
some procedures, such as recovering DFS data, where you can clear this attribute.
Microsoft does not support recovery of portions of the operating system. Attempted
recovery of portions of the operating system, with this box cleared, may render the system
unbootable. After each recovery operation, this option is automatically selected.

FRS recovery options


You can specify whether to perform an authoritative or nonauthoritative recovery of FRS
data on this host.
The following topics describe these types of FRS restores:

FRS nonauthoritative restore (default) on page 126

FRS authoritative recovery on page 126


Boot the NetWorker client in Directory Service Recovery mode before completing the
recovery options in this section. Booting the NMM host in Directory Service Restore
mode on page 131 provides more information.

FRS nonauthoritative restore (default)


A nonauthoritative recovery restores the most recent FRS data from backups and then
updates the recovered host with the most recent FRS data from another FRS Server in the
domain.
A nonauthoritative recovery relies on at least one other FRS Server to have accurate,
up-to-date FRS data. In an environment that consists of two or more domain controllers:

One domain controller should have a healthy SYSVOL folder.

The other domain controllers must be reinitialized in direct replication partner order.
The Microsoft documentation provides details about reinitialization.

Nonauthoritative recoveries are typically performed when the host is recovered due to
catastrophic loss of data such as a disk failure.

FRS authoritative recovery


An authoritative recovery restores the most recent FRS data from backups, and then
updates the other FRS Servers in the domain with the recovered data.
Perform an authoritative recovery only when corrupted or deleted FRS data has been
propagated to other FRS Servers.
Authoritative restore is performed on the domain controller whose SYSVOL folder is to be
replicated to other domain controllers in the domain. All other domain controllers in the
domain must be reinitialized with a nonauthoritative restore.

126

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery


To recover FRS data, the SYSTEM COMPONENTS:\ save set must have been backed up.
Chapter 4, Scheduled Backup, provides more information about specifying save sets
when configuring a backup.
To specify whether to perform an authoritative or nonauthoritative recovery:
1. From the Options menu:
a. Select System Recover Session Options.
b. Click the FRS tab.
2. Select one of the following options:
Non Authoritative Restore to perform a nonauthoritative recovery.
or
Authoritative Restore to perform an authoritative recovery.
3. Click the NetWorker tab.
4. Clear the following attribute:
Use Microsoft best practices for selecting the system state

5. Click Yes when asked to confirm your selection.


Do not clear the Use Microsoft best practices for selecting the system state box except
where specifically instructed to do otherwise in this document. For instance, there are
some procedures, such as recovering DFS data, where you can clear this attribute.
Microsoft does not support recovery of portions of the operating system. Attempted
recovery of portions of the operating system, with this box cleared, may render the system
unbootable. After each recovery operation, this option is automatically selected.
6. Click OK to close the System Recover Session Options dialog box.
7. From the navigation tree:
a. Expand the SYSTEM COMPONENTS folder.
b. Click FRS.
8. From the System Recover Session toolbar:
a. Click Recover.
b. Click Restore.
If you are performing an authoritative recovery, complete the remaining steps in
Authoritative recovery of NTDS or FRS data on page 132.

Recovery options

127

Microsoft Windows System Backup and Recovery

NTDS recovery options


You can specify whether to perform an authoritative or nonauthoritative recovery of
Windows NTDS data on this host.
The following topics describe these types of NTDS restores:

NTDS nonauthoritative restore (default) on page 128

NTDS authoritative restore on page 128


Boot the NetWorker client in Directory Service Recovery mode before completing the
recovery options in this section. Booting the NMM host in Directory Service Restore
mode on page 131 provides more information about these recovery options.

NTDS nonauthoritative restore (default)


A nonauthoritative recovery restores the most recent NTDS data from backups and then
updates the recovered host with the most recent NTDS data from another NTDS Server in
the domain. A nonauthoritative recovery relies on at least one other NTDS Server to have
accurate, up-to-date NTDS data. I
In this mode:
1. The affected domain controller's data is restored from the backup.
2. This domain controller receives through replication all the directory changes made to
the other domain controllers in the network since the backup.
Nonauthoritative recoveries are typically performed when the host is being recovered due
to catastrophic loss of data such as a disk failure.

NTDS authoritative restore


An authoritative recovery restores the most recent NTDS data from backups, and then
updates other NTDS Servers in the domain with the recovered data.
Perform an authoritative recovery only when corrupted or deleted NTDS data has been
propagated to other NTDS Servers.
In a domain containing multiple domain controllers, authoritative restore of NTDS writer
replicates directory objects such as the following to all domain controllers in that domain:

Computers

Groups

Organizational units

Users

Note: To recover NTDS data, the SYSTEM COMPONENTS:\ save set must have been backed
up. Chapter 4, Scheduled Backup, provides more information about specifying save
sets when configuring a backup.

128

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

To specify whether to perform an authoritative or nonauthoritative recovery:


1. From the Options menu:
a. Select System Recover Session Options.
b. Click the NTDS tab.
2. Select one of the following options:
Non Authoritative restore to perform a nonauthoritative recovery.
or
Authoritative Restore to perform an authoritative recovery.
3. Click the NetWorker tab.
4. Clear the following attribute:
Use Microsoft best practices for selecting the system state

5. Click Yes when asked to confirm your selection.


Do not clear the "Use Microsoft best practices for selecting the system state" box except
where specifically instructed to do otherwise in this document. For instance, there are
some procedures, such as recovering DFS data, where you can clear this attribute.
Microsoft does not support recovery of portions of the operating system. Attempted
recovery of portions of the operating system, with this box cleared, may render the system
unbootable. After each recovery operation, this option is automatically selected.
6. For DSRM, to recover "Bootable System State" in a domain controller setup, ensure
that the Microsoft Best Practices checkbox is cleared.
7. Click OK to close the System Recover Session Options dialog box.
8. From the navigation tree:
a. Expand the SYSTEM COMPONENTS folder.
b. Click NTDS.
9. From the System Recover Session toolbar, click Start Restore.
If you are performing an authoritative recovery, complete the remaining steps in
Authoritative recovery of NTDS or FRS data on page 132.

Security recovery options


Backup and archive data on Windows hosts can be encrypted with an Advanced
Encryption Standard (AES) Application Specific Module (ASM) pass phrase.
If no pass phrase was specified when the backup data was encrypted, then the data is
encrypted with a default pass phrase. During data recovery, you must specify the pass
phrase used at the time of backup if it is not the default or current pass phrase.

Recovery options

129

Microsoft Windows System Backup and Recovery


Do not use AES encryption when backing up files that are encrypted by using Windows
Encrypting File System (EFS). When AES encryption is applied to a file that is also
encrypted by using the Microsoft EFS, the backup will be reported as successful. However,
recovery of the file will fail.
To specify pass phrases:
1. From the Options menu:
a. Select System Recover Session Options.
b. Click the Security tab.
2. Type the pass phrases.
3. Click OK.
The NetWorker Administration Guide provides more information about AES encryption,
and setting the pass phrase.

Recovering file system snapshots that have not been rolled over
Note: If a snapshot volume has been mounted by using a client utility such as the EMC
NaviCLI interface or the Windows Disk Management utility, remove the mount point before
performing the next backup or recovery operation. If the mount point is not removed, it will
be removed at the end of the next NetWorker backup or recovery operation.
To recover items in a file system backup that has not been rolled over:
1. Connect to the NetWorker server on which the NetWorker client was configured for
backup.
Connecting to a NetWorker server on page 53 provides more information about
connecting to the NetWorker server.
2. From the left pane, select Recover > System Recover Session.
3. In the navigation tree:
a. Right-click the snapshot.
b. Select Mount Snapshot.
The following occurs:
If another snapshot is currently mounted, a message indicates that the currently
mounted volume will be unmounted:
a. Click OK to unmount the volume.
b. When the taskbar animation stops and a green mark appears, click the
mounted snapshot.
The mounted snapshot item will expand in the navigation tree.

130

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

4. Under the expanded snapshot, select the items to be recovered.


Selecting an item for recovery on page 41 provides more information about
selecting items for recovery.
5. Select any additional file system options if applicable.
NetWorker recovery options on page 119 provides more information about these
options.
6. From the System Recover Session toolbar:
a. Click Recover.
b. Click Restore.
After the recovery starts, the snapshot is automatically unmounted.
7. From the left pane, select Monitor to view the progress of the recovery.

Booting the NMM host in Directory Service Restore mode


Before you can complete the following recovery operations, boot the NMM client in
Directory Service Restore mode:

DFS recovery

FRS recovery

NTDS recovery

Active Directory (AD) disaster recovery

To boot the NMM client in Directory Service Restore mode:


1. On the NetWorker client domain controller:
a. Close all programs.
b. Restart Windows.
When the computer restarts:
A list of startup choices appears.
The startup choices and the duration of the startup display are based on the
settings in the following sections of the boot.ini file:
Operating systems
Boot loader
2. Select the Windows boot option for the domain controller.
3. Press F8 to display a list of special boot options.
4. From the list of special boot options, select Directory Service Restore Mode (Windows
Domain Controllers only).
When you boot in this mode, AD is taken offline.

Booting the NMM host in Directory Service Restore mode

131

Microsoft Windows System Backup and Recovery

5. Log in as administrator:
Use the password that was specified when the domain controller was created.
Windows starts in safe mode.
6. Open the NMM client application.
7. From the left pane, select Recover > System Recover Session.
8. Continue with the recovery options. The following sections provide more specific
information:
DFS recovery options on page 124
FRS recovery options on page 126
NTDS recovery options on page 128
Security recovery options on page 129
Recovering the Windows system configuration to an earlier state on page 134
includes information about SYSTEM STATE or VSS SYSTEM BOOT save sets, and
save set recovery.
Granular Active Directory or ADAM backup optionThe NetWorker Module for
Microsoft Application Release 2.4 Application Guide includes information about
save sets on a domain controller.
Note: Active Directory schema objects cannot be recovered and therefore, should
never be deleted.

Authoritative recovery of NTDS or FRS data


Perform an authoritative recovery only when corrupted or deleted data has been
propagated to other Windows NTDS or FRS Servers. After the authoritative recovery, the
domain administrator can delete any unnecessary newer objects.
NTDS and FRS objects may have associated group policies, for example, organizational
units, domains, and site objects. Group policies are stored in the SYSVOL directory. A
recovery of the SYSVOL directory cannot be separated from an authoritative recovery of
NTDS or FRS.
To perform an authoritative recovery:
1. If you have not already done so, boot the NMM client in Directory Service Restore
mode.
Performing a recovery on page 115 provides more information about performing this
procedure.
2. If you have not already done so, complete the NTDS or FRS recovery options.
The following sections provide more specific information on the recovery options:
FRS recovery options on page 126
NTDS recovery options on page 128

132

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

3. From the command line, use the xcopy command to copy sysvol\domain to another
location.
4. This preserves the following information:
Group policy
File permissions
Directory permissions
5. Run the Windows ntdsutil utility.
6. At the ntdsutil prompt, type:
NTDSUTIL: authoritative restore

7. To perform an authoritative recovery of the following:


Entire database, type:
NTDSUTIL: restore database

Subtree or individual object, type:


NTDSUTIL: restore subtree distinguished_name

For example:
NTDSUTIL: restore subtree

OU=engineering,DC=Seattle,DC=jupiter,DC=com
NTDSUTIL: restore subtree

CN=mars,CN=users,DC=Seattle,DC=jupiter,DC=com
The Microsoft Windows Server Resource Kit provides more information and Active
Directory documentation.
8. Exit the ntdsutil utility by typing quit at each successive ntdsutil prompt until the
command prompt displays.
9. Copy the entire recovered SYSVOL\domain directory and all of its subdirectories to a
new location.
10. Restart the domain controller in normal mode.
11. Log in to the domain controller.
12. Wait for the SYSVOL share to be published.
Note: This can take several minutes while the recovered domain controller
synchronizes with its replication partners.
13. After the SYSVOL share has been published, perform one of the following:
For an authoritative recovery of the entire database:
a. Copy the entire SYSVOL\domain directory tree from the new location to the
existing SYSVOL\domain directory as described in step 9 .
b. When the copy operation prompts for confirmation, select Yes to All.

Authoritative recovery of NTDS or FRS data

133

Microsoft Windows System Backup and Recovery

For an authoritative recovery of only a part of AD that includes Policy objects, copy
the policy folders from the new location as described in step 9 to the existing
policy folders:
Policy objects can be identified by their global universal ID (GUID).
Policy folders are located in SYSVOL\domain\Policies.

Recovering the Windows system configuration to an earlier state


Hosts that were upgraded from a regular NetWorker client to a NMM client can have their
Windows operating system configuration recovered to a state prior to upgrading to the
NMM client.


If the Windows operating system was upgraded on the host, you cannot recover the
Windows system configuration to the state it was in before the operating system software
was upgraded.
To recover the Windows system state to a point-in-time that precedes the installation of
the NMM client:
1. If the NMM client is a Windows domain controller, boot the NMM client in Directory
Services Restore mode. Booting the NMM host in Directory Service Restore mode on
page 131 provides more information about booting in this mode.
If the NMM client is not a Windows domain controller, start with step 2 .
2. Recover the contents of the volume on which the Windows operating system was
installed.
3. Recover the Windows configuration save sets:
If VSS was licensed and enabled, recover:
VSS SYSTEM BOOT
VSS SYSTEM FILESET
VSS SYSTEM SERVICES
If VSS was not licensed or enabled, recover:
SYSTEM DB
SYSTEM FILES
SYSTEM STATE
4. Update the recovered registry with NMM client entries. Because the registry was
recovered to a client state prior to the NMM client installation, you must update the
registry with entries for the NMM client.
To update the registry:
a. Uninstall the NMM client software.
b. Reinstall the NMM client software.

134

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

Reinstall, as necessary, any other applications that were installed after the point-in-time to
which the Windows operating system configuration was recovered. The NetWorker Module
for Microsoft Applications Release 2.4 Installation Guide provides more information about
the uninstall and install steps.

Restoring BOOT/BCD data in Windows 2008 R2


This procedure is optional. In Microsoft Windows 2008 R2, the BOOT Configuration Data
(BCD) store contains the boot configuration parameters and controls the computers boot
environment.
BCDEdit is a command-line tool provided by Microsoft to add, delete, edit, and modify
data in a BCD store.
Note: Restoring the recovered file is optional. The BCDEdit reference document in the
Microsoft documentation provides more information about BCDEdit.
During recovery, the BCD file is recovered to the folder C:\boot_restored-{timestamp}
To restore the recovered file, import the file by using the following command:
bcdedit /import c:\boot_restored-{timestamp}\Boot

Windows print queues backup and recovery


The NMM 2.4 software supports backup and recovery operations for Windows print
queues as part of the file system. There is no writer support for Windows print queues.
Depending on the status of the print queue during a restore operation, you might be
prompted to restart the system.

Windows DFS-R granular backup and recovery


NMM 2.4 supports granular backup and recovery of Windows Distributed File System
Replication (DFS-R) folders only on Microsoft Windows Server 2008 SP2 (x64 and x86) and
Microsoft Windows Server 2008 SP1 R2 (x64).

DFS-R replicated and shared directories


DFS-R replicated and shared directories can be backed up like standard file directories by
allowing granular DFS-R folder and file backup and recoveries on Windows Server 2008
SP2 and Windows Server 2008 R2 operating systems.
You are not required to recover the entire SYSTEM COMPONENTS:\ save set to restore
DFS-R replicated or shared directories.

DFS-R granular support


DFS-R replicated folders and data is backed up as file system data and is not backed up as
a part of DFS-R writer in SYSTEM COMPONENTS:\ save set backup. DFS-R replicated folders
and data recovery is supported to both original or alternate locations. Directed recovery of
DFS-R replicated folders and data is also supported.

Restoring BOOT/BCD data in Windows 2008 R2

135

Microsoft Windows System Backup and Recovery

Because DFS-R replicated folders and data is backed up as file system data, all the
features supported by file system data backup and recovery are supported by DFS-R
granular support.

DFS-R writer support


DFS-R writer backs up only SYSVOL in a domain controller as a part of Bootable System
State.
Recovery of DFS-R writer is supported only to original location as this is a part of SYSTEM
COMPONENTS:\ save set. On non-domain controller, the DFS-R writer is not part of the
SYSTEM COMPONENTS:\ save set.

Pre and post command support


With NMM 2.4, the following pre and post commands are now supported. These
commands enable you to include customized backup actions before and after a client
backup operation:

precmd.bat script on page 136

postcmd.bat script on page 136

nsrsnapvsssavepnpc file on page 137

precmd.bat script
You can create a precmd.bat script file to enable actions to be performed before a backup
operation. When the NetWorker server starts the backup, the contents of the
nsrsnap_vss_savepnpc.exe file is run on the client to perform the required actions.
To create a precmd.bat script file:
1. Create a new file on the Windows client by using Notepad.
2. Specify a command to run before the backup. For example, add the following lines to
the file:
echo
time
date
<Add
echo
time
date

"Start pre backup action" >> Pre-postBackup.log


/t >> Pre-postBackup.log
/t >> Pre-postBackup.log
commands to run here>
"Complete Pre backup action" >> Pre-postBackup.log
/t >> Pre-postBackup.log
/t >> Pre-postBackup.log

3. Save this file as precmd.bat in a new directory that does not contain spaces. For
example: C:\Scripts.

postcmd.bat script
You can create a postcmd.bat script file to enable actions to be performed after a backup
operation.
To create a postcmd.bat script:
1. Create a new file on the Windows client by using Notepad.
2. Specify a command to run after the NetWorker software has backed up the data.

136

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows System Backup and Recovery

3. Save this file as postcmd.bat in a new directory that does not contain spaces. For
example: C:\Scripts.

nsrsnapvsssavepnpc file
To run the pre and post command scripts that were created in the previous steps, you
must create the nsrsnapvsssavepnpc file. This file lets the NetWorker software know that a
pre and post action is required.
To create a nsrsnapvsssavepnpc file to run the pre and post actions:
1. Create a new file on the Windows client by using Notepad.
2. Add the following lines to the file:
type: nsrsnapvsssavepnpc;
precmd: "C:\\Scripts\\precmd.bat";
pstcmd: "C:\\Scripts\\postcmd.bat";

3. Save and name the file as groupname.res in the following location:


C:\Program Files\Legato\nsr\res

where groupname is the name of the NetWorker backup group to which this client
belongs.

Recovering client file index and the media database


This section includes procedures for recovering the client file index and the media
database.

Restoring a save set entry to the client file index only


If a file is not browsable (which means that the save set's browse policy has expired), but
its save set is still tracked by the NetWorker server in the media database, you can make
the file browsable by recovering the save set's entry back into the client file index.
To recover the save set's entry back into the client file index:
1. Log in as root or Windows Administrator.
2. Type the mminfo command at the command prompt:
mminfo -a -v <volume_name>

where volume_name is the volume that contains the client file index.
3. From the mminfo output, find the ssid that contains the required file. Ensure it is not
the bootstrap ssid.
4. Type the nsrmm command with a new browse time:
nsrmm -S ssid -w <browse_time>

where browse_time is a time in the future.


5. Type the scanner command:
scanner -i -S ssid

Recovering client file index and the media database

137

Microsoft Windows System Backup and Recovery

The save set entry is restored to the client file index.

Restoring a save set entry to the client file index and media database
If a volume has a save set that does not appear in the media database and the save set's
files are not browsable, you can restore these entries in the media database and the client
file index so that the save set's files can be browsed.
To rebuild the save set's entry in the media database and the client file index:
1. Log in as root or Windows Administrator.
2. At the command prompt, run the scanner program on the volumes that contain the
appropriate file or files:
scanner <device_name>

3. Use the output from the scanner program to determine:


Whether the save set to be rebuilt is on this volume.
Whether to reintroduce the contents of this volume into the online indexes. Locate
all the volumes that contain this save set ID.
4. If the save set is found on multiple volumes and the order in which the volumes were
written is unknown, complete this step. Otherwise, skip to Step 5.
a. On each volume that will be reintroduced into the online indexes, run this
command:
scanner -m <device_name>

The media database is updated with information from each volume.


If the volume contains data from an earlier version of NetWorker, there may be no pool
information on the volume. In this case, the volume is considered to belong to the
Default pool. To assign the volume to another pool, use the -b pool_name option in
this step. If the volume already belongs to a pool, the -b option will have no effect.
b. Query the media database to determine the sequence in which the volumes were
written:
mminfo -a -v

In Step 5, the volumes must be reintroduced into the online indexes in the same order
in which they were written.
5. Starting with the first volume that was written, run the scanner program:
scanner -i <device_name>

The scanner program prompts for a new volume until you terminate it. Scan in the
remaining volumes in the order in which they were written.
6. Browse for the file to be recovered. Recovering by file selection provides information
about browsing for a file.

138

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

CHAPTER 8
Microsoft Windows Cluster Backup and Recovery
This chapter includes the following topics:

Overview............................................................................................................... 140
Performing Windows Server Cluster backups ......................................................... 143
Performing Windows Server Cluster recovery ......................................................... 144

Microsoft Windows Cluster Backup and Recovery

139

Microsoft Windows Cluster Backup and Recovery

Overview
This chapter supplements the overall NetWorker Module for Microsoft Applications (NMM)
backup procedures in the following sections:

Scheduled Backup on page 63

Microsoft Windows System Backup and Recovery on page 111

Backup and recover information is also included for the following clusters:

Windows Server 2008 Windows Server Failover Clustering (WSFC)

Windows Server 2008 R2 Windows Server Failover Clustering (WSFC)

This section contains information on:

Cluster support in NMM client on page 140

Components used by NMM for Windows Cluster backup and recovery on page 140

Configuring a virtual client to back up to a local storage node on page 141

Windows Cluster application information variable settings on page 142

Cluster support in NMM client


NMM client supports Windows Server Failover Clustering (WSFC) running on the following
versions of Microsoft Windows Server:

Windows Server 2008 SP2 (x86, x64) Enterprise Edition and Datacenter Edition

Windows Server 2008 R2 (x64) Enterprise Edition and Datacenter Edition

Components used by NMM for Windows Cluster backup and recovery


For backupNMM backs up Windows Cluster data as part of the SYSTEM COMPONENTS
save set. A Cluster Writer is used within SYSTEM COMPONENTS, but it cannot be specified
in a save set.
For recoveryTable 30 on page 140lists the component that needs to be selected for
recovery of the Cluster Writer:
Table 30 Components for recovery of Cluster Writer
Save set

Description

SYSTEM COMPONENTS:\

As part of recovery of this entire save set

SYSTEM COMPONENTS:\Cluster Writer

As an authoritative restore in Windows Server 2008


SP2 and Windows Server 2008 SP1 R2

As part of a nonauthoritative restore in Windows Server


SYSTEM COMPONENTS:\Cluster
2008 SP2 and Windows Server 2008 SP1 R2
Writer
SYSTEM
COMPONENTS:\BootableSystemState

140

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows Cluster Backup and Recovery

Configuring a virtual client to back up to a local storage node


Typically, the NetWorker server backs up the data on a virtual client within a cluster to the
first storage node listed in the virtual clients Storage Nodes attribute. You can configure a
virtual client within a cluster to direct its backups to the storage node on the physical host
on which it resides.
You can do this configuration for Exchange Server 2007 and SQL Server (for both VSS and
VDI), by typing the following in the Storage Nodes attribute of the virtual client:
curphyhost

For example, consider a two-node cluster where:

Nodes A and B are the two physical nodes in the cluster.

The virtual client is saturn, which can reside on Node A or fail over to Node B.

In a normal NetWorker backup of saturn without curphyhost listed in the virtual clients
Storage Nodes attribute the save data is directed to the remote device (rd=) on Node A.
When saturn fails over to Node B and a backup for saturn is initiated, the save data is still
directed to the remote device (rd=) on Node A.
Listing "curphyhost" first in saturns Storage Nodes attribute modifies the NetWorker
operation so that if saturn fails over to Node B and a backup of saturn is initiated, the save
data is directed to the remote device (rd=) on Node B. This action takes place because,
after the failover saturn resides on Node B, the current physical host.
Note: The curphyhost attribute is not supported for Exchange Server 2010.

Directing a virtual client backup to a local storage node


To direct a virtual client to back up to a local storage node:
1. Start the NetWorker Administration Console software.
2. From the Administration window, click Configuration.
3. In the left pane, select Clients.
4. From the File menu, select Properties and then select the Globals (2 of 2) tab.
5. For the Storage Nodes attribute, add the curphyhost keyword. Position the keyword in
the list based on the required priority. The top of the list is the highest priority.

Overview

141

Microsoft Windows Cluster Backup and Recovery

Windows Cluster application information variable settings


Table 31 on page 142 lists the variables that can be specified in NetWorker Management
Console, in the Application Information attribute of the client resource.
Table 31 Windows Cluster application information variable settings

142

Attribute Name

Description

Values

NSR_SNAP_TYPE=value

Specifies the snapshot service provider


name.

vss
This value is required.

NSR_DATA_MOVER=value

Specifies the hostname of the NMM


client that moves snapshots from the
local NMM client to primary and
secondary (conventional) storage. The
host can be either a local host or a proxy
client host.

The local host


The proxy client hostname
Consider the following:
If no value is entered, the local host is
used as the data mover.
If setting up a proxy client for a virtual
cluster server, ensure to type the
proxy client hostname in the Remote
Access attribute of the client resource.
For serverless backups, specify a
proxy client.
If setting up an Windows Cluster client
resource, it is recommended that you
use a proxy client. If a proxy client is
specified, Windows Cluster
consistency checks are performed on
the proxy client. Related messages are
written to the Replication Manager log
files (erm_clientxx.log) on the proxy
client.
If no proxy client is specified for an
Windows Cluster client resource,
consistency checks are performed on
the client resource host. Related
messages are logged on the client
resource host in both the Replication
Manager log files and the nmm.raw
file.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Microsoft Windows Cluster Backup and Recovery

Performing Windows Server Cluster backups


To perform clustered client resource backups, complete the tasks outlined in Table 32 on
page 143.
Table 32 Steps and considerations for backing up a clustered client resource
Backup task

Description

1. Task 1: Configure a backup pool on page 66

Tasks 1, 2, and 3 are performed for scheduling a backup, and are the same
for all VSS writers supported by NMM.

2. Task 2: Configure snapshot policies on page 68


3. Task 3: Configure a backup schedule on page 72
4. Task 4: Configure a backup group on page 72
5. Task 6: Configure NetWorker administrator
privileges on page 77

Tasks 4, 5, and 6 are additional considerations that are required for setting
up a virtual NMM client.

Note: Set up NetWorker administrator privileges for


each physical node and proxy client in the cluster.
6. Task 7: Configure a proxy client on page 78
Note: If a hardware provider such as the EMC VSS
Provider is being used, a proxy client must be
configured for a clustered NMM client.


There is an additional consideration for backing up a clustered client resource. The proxy
client is not allowed to be a member of the cluster. This is by Microsoft design and
Microsoft describes this restriction in a MSDN article at
http://msdn.microsoft.com/en-us/library/aa384600(VS.85).aspx, in the subsection
Auto-Import Hardware Shadow Copies Are Not Supported on Windows Cluster Service.

Cluster failover and backups


Considerations include the following:

If a node within a cluster undergoes failover during a backup operation, the operation
fails. The next scheduled backup operation will be the next valid backup.

If using a hardware provider, such as the EMC VSS Provider, use the disk management
utilities provided with the associated hardware to delete any resources that may be
left in an indeterminate state as a result of the failed backup.

For example, a CLARiiON storage solution may have an inactive snapshot as the result of a
failed backup. In this case, use the Navisphere/Unisphere user interface or the NaviCLI
command line interface to search for and delete the inactive snapshot.

Performing Windows Server Cluster backups

143

Microsoft Windows Cluster Backup and Recovery

Performing Windows Server Cluster recovery


Cluster recovery options on page 120 describes the Cluster tab in NMM Recovery
options. This tab provides options for authoritative or nonauthoritative restore.
Authoritative restores of the Cluster Writer are only supported for Windows Server 2008
and Windows Server 2008 R2.

144

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

GLOSSARY

This glossary contains terms related to disk storage subsystems. Many of these terms are
used in this manual.

A
ad hoc backup
administrator

administrators group

Application Specific
Module (ASM)

See manual backup.


The person normally responsible for installing, configuring, and maintaining
NetWorker software.
Microsoft Windows user group whose members have the rights and privileges of users in
other groups, plus the ability to create and manage the users and groups in the domain.
Program that is used in a directive to specify how a set of files or directories is to be
backed up or recovered. For example, compressasm is a NetWorker directive used to
compress files.

ASR writer

The VSS Writer, which is responsible for identifying critical data that is needed to perform
an offline restores.

archive

Backing up directories or files to an archive volume to free disk space. Archived data is not
recyclable.

archive volume

Volume used to store archive data. Archived data cannot be stored on a backup volume or
a clone volume.

auto media management

autochanger
autochanger sharing

Feature that enables the storage device to automatically label, mount, and overwrite an
unlabeled or recyclable volume.

See library.
See library sharing.

B
backup

Operation that saves data to a volume.

See also conventional backup and snapshot.


backup components

See metadata document.

backup group

See group.

backup level

See level.

backup volume

Volume used to store backup data. Backup data cannot be stored on an archive volume or
a clone volume. See also volume.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

145

Glossary

bootstrap

Boot Configuration Data


(BCD)
browse policy

Save set that is essential for NetWorker disaster recovery procedures. The bootstrap
consists of three components that reside on the NetWorker server. The media database,
the resource database, and the server index.
The ASR Writer component that identifies the location of the boot configuration database.
This is required to perform an offline restore.
NetWorker policy that specifies how long backed-up data will be readily available for
recovery. Backed-up data that has not exceeded its browse policy time can be recovered
more quickly than data that has exceeded its browse policy time but not its retention
policy time. See also retention policy.

C
carousel
client
client file index

client-initiated backup

See library.
Computer, workstation, or fileserver whose data can be backed up and recovered.
Database that tracks every database object, file, or file system that is backed up. The
NetWorker server maintains a single client index file for each client.

See manual backup.

client resource

NetWorker server resource that identifies the save sets to be backed up on a client. The
client resource also specifies information about the backup, such as the schedule, browse
policy, and retention policy for the save sets. See also client and resource.

clone

Reliable copy of backed up data. Unlike volumes created with a simple copy command,
clone volumes can be used in exactly the same way as the original backup volume. Single
save sets or entire volumes can be cloned.

clone volume

Exact duplicate of a backup volume. One of four types of volumes that NetWorker software
can track (backup, archive, backup clone, and archive clone). Save sets of these different
types may not be intermixed on one volume.

cluster

1. Two or more independent network servers that operate and appear to clients as if they
are a single unit. The cluster configuration enables work to be shifted from one server to
another, providing "high availability" that allows application services to continue despite
most hardware or software failures. Also known as an agent (Sun), logical server (HP
TruCluster), package (HP-UX), and virtual server (Microsoft).
2. Group of disk sectors. The operating system assigns a unique number to each cluster
and keeps track of files according to which clusters they use.

command line

component

Line on a display screen, also known as a command prompt or shell prompt, where you
type software commands.
1. Group of related data that must be treated as a single unit for backup and recovery.
2. In Microsoft VSS terminology, a component is a subordinate unit of a writer.

components metadata
document

146

See metadata document.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Glossary

consistent
console server

conventional backup
critical volume

State of a dataset that is fully and immediately available to an application view.


Software program that is used to manage NetWorker servers and clients. The Console
server also provides reporting and monitoring capabilities for all NetWorker processes.

See nonpersistent snapshot.


Any volume containing system state files or files for an installed service, including
volumes mounted as NTFS directories which contain such files. The volume where a
critical volume is mounted is also considered to be critical. This is required to perform an
offline restore, however maybe optional for this release depending upon the difficulties of
implementing this feature.

D
domain controller

Data Mover (DM)

data retention policy


datawheel
datazone
Dynamic Drive Sharing
(DDS)
device

Computer that stores directory data and manages user interactions within a domain,
including logon, authentication, directory searches, and access to shared resources.
Client system or application, such as NetWorker, that moves the data during a backup,
recovery, or snapshot operation. See also proxy client.

See retention policy.


See library.
Group of hosts administered by a NetWorker server.
Feature that allows NetWorker software to recognize shared drives.
1. Storage unit that reads from and writes to backup volumes. A storage unit can be a tape
device, optical drive, autochanger, or file connected to the server or storage node.
2. When dynamic drive sharing (DDS) is enabled, refers to the access path to the physical
drive.

Distributed File System


(DFS)
directed recovery

directive

disk subsystem

Microsoft Windows add-on that allows you to create a logical directory of shared
directories that span multiple machines across a network.
Method of recovery that recovers data that originated on one client computer and
re-creates it on another client computer.
Instruction that directs NetWorker software to take special actions on a given set of files
for a specified client during a backup or recovery operation. Directives are ignored in
manual (unscheduled) backups.
Integrated collection of storage controllers or HBAs, disks, and any required control
software that provides storage services to one or more hosts, such as CLARiiON arrays.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

147

Glossary

F
file index
file system

See client file index.


1. The software interface used to save, retrieve, and manage files on storage media by
providing directory structures, data transfer methods, and file association.
2. The entire set of all files.

full backup

See level.

G
group

Client or group of client computers that are configured to back up files at a designated
time of day.

granular recovery

Granular recovery provides the ability to recover specific files in seconds from a single
backup. This dramatically reduces the recovery time and the footprint of the backup on
storage resources.

H
high-available system

host ID

System of multiple computers configured as cluster nodes on a network that ensures that
the application services continue despite a hardware or software failure. Each cluster
node has its own IP address with private resources or disks that are available only to that
computer.
Serial number that uniquely identifies a host computer.

I
inactivity timeout
incremental backup

Number of minutes to wait before a client is considered to be unavailable for backup.


Backup level in which only files that have changed since the last backup are backed up.

See also level.


instant backup

Process of creating a point-in-time copy (snapshot) of data from a single client and saving
it on a primary storage volume, which can be immediately recovered as a backup copy.

instant restore

Process of copying data created during an instant backup to its original location, or to an
alternate location, during a recover operation.

J
jukebox
label

legacy method

148

See library.
Electronic header on a volume used for identification by NetWorker or other Data Mover
application.
Use of special-case Microsoft APIs to back up and recover operating system components,
services, and applications.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Glossary

level

Backup configuration option that specifies how much data is saved during a scheduled or
manual backup. A full (f) backup backs up all files, regardless of whether they have
changed. Levels one through nine [1-9] backup files that have changed since the last lower
numbered backup level. An incremental (incr) backup backs up only files that have
changed since the last backup.

library

Hardware device that contains one or more removable media drives, as well as slots for
pieces of media, media access ports, and a robotic mechanism for moving pieces of
media between these components. Libraries automate media loading and mounting
functions during backup and recovery. The term library is synonymous with autochanger,
autoloader, carousel, datawheel, jukebox, and near-line storage.

library sharing

Shared access of servers and storage nodes to the individual tape drives within a library.

local cluster client

locale settings

NetWorker client that is not bound to a physical machine, but is instead managed by a
cluster manager. It is also referred to as a logical or virtual client.
Settings that specify the input and output formats for date and time, based on local
language conventions.

LUN (logical unit)

Logical unit of storage on a CLARiiON system. This refers to a device or set of devices,
usually in a CLARiiON storage array.

LUN address

SCSI identifier of a logical unit number (LUN) within a device target. Each LUN address
identifies a device on a SCSI bus that can perform input/output (I/O) operations.

M
manual backup

media

media database

media index
metadata document

mount

mount point

Backup that a user performs from the client, also known as an unscheduled backup or an
ad hoc backup. The user specifies the files, file systems, and directories to back up.
Physical storage medium, such as magnetic tape, optical disk, or file system to which
backup data is written.
Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server. See also volume.

See media database.


VSS Information stored in an XML document that is passed from the writer to the
requestor. Metadata includes the Writer name, files, and components to back up, a list of
components to exclude from the backup, and the methods to use for recovery. See also
shadow copy set.
To make a database available for use or to place a removable tape or disk volume into a
drive for reading or writing.

See volume mount point.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

149

Glossary

N
Network Data
Management Protocol
(NDMP)
NetWorker administrator

NetWorker client

TCP/IP-based protocol that specifies how heterogeneous network components


communicate for the purposes of backup and recovery.
User who can add to or change the configuration of the NetWorker server, media devices,
and libraries. NetWorker administrators must have their usernames included in the
NetWorker server Administrator list.

See client.

NetWorker Console
server

See console server.

NetWorker Management
Console

See console server.

NetWorker server

NetWorker storage node


nonclone pool
noncritical volume

nonpersistent snapshot

Computer on a network running the NetWorker software, containing the online indexes,
and providing backup and recover services to the clients on the same network.

See storage node.


Pools that contain data that has not been cloned.
A volume containing files that are not part of the system state or an installed service. The
backup of non-critical volumes is not supported by either product for their initial releases.
Snapshot backup that is moved to secondary storage on the NetWorker server or storage
node and is no longer available for instant restore from a supported type of primary
storage.

O
online indexes

Databases located on the NetWorker server that contain all the information pertaining to
the client backups (client file index) and backup volumes (media database).

online restore

A restore operation performed using the normal recover UI, and the computer has been
booted from an installed operating system.

offline restore

A restore operation performed from the Windows PE environment.

operator

Person who monitors the server status, loads backup volumes into storage devices, and
executes day-to-day NetWorker tasks.

150

pathname

Set of instructions to the operating system for accessing a file. An absolute pathname
indicates how to find a file starting from the root directory. A relative pathname indicates
how to find the file starting from the current directory.

persistent snapshot

Snapshot that is retained on disk. A persistent snapshot may or may not be rolled over to
tape.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Glossary

point-in-time copy (PiT)

Fully usable copy of a defined collection of data, such as a consistent file system,
database, or volume, which contains an image of the data as it appeared at a single point
in time. A PiT copy is also called a shadow copy or a snapshot.

policy

Set of constraints that specify how long the save sets for a client are available for recovery.
Each client has a browse policy and a retention policy. When the retention policy expires,
the save sets associated with that policy are marked recyclable.

pool
PowerSnap

provider

proxy client

Feature to sort backup data to selected volumes.


EMC technology that provides point-in-time snapshots of data to be backed up.
Applications that are running on the host system continue to write data during the
snapshot operation, and data from open files is included in the snapshots.
Software component defined by Microsoft VSS, that plugs in to the VSS environment. A
provider, usually produced by a hardware vendor, enables a storage device to create and
manage snapshots.
Surrogate client that performs the NetWorker save operation for the client that requests
the backup. A proxy client is required to perform a serverless backup.

Q
quiescing

Process in which all writes to disk are stopped and the file system cache is flushed.
Quiescing the database prior to creating the snapshot provides a transactionally
consistent image that can be remounted without file system checks or database
consistency checks. Quiescing a database is the most common way of creating a database
snapshot.

R
recover
Registry

requestor

replica

To recover files from a backup volume to a client disk.


Microsoft Windows database that centralizes all Windows settings and provides security
and control over system, security, and user account settings.
Interface with the Microsoft VSS infrastructure to initiate the creation and destruction of
shadow copy. NetWorker software is a requestor.

See shadow copy.

resource

Component that describes the NetWorker server or its clients. Clients, devices, schedules,
groups, and policies are all NetWorker resources. Each resource has attributes that define
its properties.

restore

Process of retrieving individual datafiles from backup storage and copying the files to disk.

retention policy

NetWorker policy that specifies the minimum period of time that must elapse before
backed-up data is eligible to be overwritten on the backup media. Backed-up data that
has not exceeded its browse policy time can be recovered more quickly than data that has
exceeded its browse policy time but not its retention policy time. See also browse policy.

retrieve

To locate and recover archived files and directories.


EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

151

Glossary

rollover

root

Process of backing up a snapshot to a conventional backup medium such as tape.


Whether or not the snapshot is retained on disk depends on the snapshot policy.
Highest level of the system directory structure.

S
save set

save set ID (SSID)

Internal identification number assigned to a save set.

save set recover

To recover data by specifying save sets rather than by browsing and selecting files or
directories.

save set status

NetWorker attribute that indicates whether a save set is browsable, recoverable, or


recyclable. The save set status also indicates whether the save set was successfully
backed up.

save stream

The data and save set information being written to a storage volume during a backup.

server index

See client file index.

serverless backup

service port

Backup method that uses a proxy client to move the data from primary storage on the
application server host to secondary storage on another host. Serverless backups free up
resources on the application server by offloading the work of processing snapshots to a
secondary host.
Port used to listen for backup and recover requests from clients through a firewall.

shadow copy

Temporary, point-in-time copy of a volume created using VSS technology. See also Volume
Shadow Copy Service (VSS).

shadow copy set

Complete roadmap of what was backed up at a single instant in time. The shadow copy set
contains information about the Writers, their components, metadata, and the volumes. A
backup components metadata document containing that information is created and
returned to the requestor after the snapshot is complete. NetWorker uses this document
with the corresponding save set at recover time.

shadow copy technology

skip
snap clone

152

Group of files or a file system from a single client computer, which is backed up on storage
media.

Defined and standard coordination between business application, file system, and
backup application that allows a consistent copy of application and volume data to exist
for replication purposes.
Backup level in which designated files are not backed up.
Exact copy of a snap set data backup. The clone operation is an archive operation without
the deletion of the source data. A new snap ID is assigned to the cloned copy.

snap ID

Also known as a snapid, a unique 64-bit internal identification number for a snap set.

snap set

Group of files, volumes, or file systems from a single client, describing the collection of
data for which a point-in-time copy is created on an external disk subsystem, such as a
storage array.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

Glossary

snapshot

Point in time, read-only copy of data created during an instant backup.

snapshot expiration
policy

Policy that determines how long snapshots are retained before their storage space is
made available for the creation of a new snapshot.

snapshot policy

Set of rules that control the lifecycle of a snap set. The snapshot policy specifies the
frequency of snapshots, and how long snapshots are retained before recycling.

snapshot retention
policy
staging

stand-alone device

storage device

Policy that determines how many PIT copies are retained in the media database and thus
are recoverable.
Moving data from one storage medium to a less-costly medium, and later removing the
data from its original location.
Storage device that contains a single drive for backing up data. Stand-alone devices
cannot store or automatically load backup volumes.

See device.

storage node

Storage device physically attached to a computer other than the NetWorker server, whose
backup operations are administered from the controlling NetWorker server.

system state

All files that belong to VSS Writers with a usage type of BootableSystemState or
SystemService. This is required to perform an offline restore.

V
volume

1. A unit of physical storage medium, such as a magnetic tape, optical disk, or file system
to which backup data is written.
2. An identifiable unit of data storage that may reside on one or more host disks.

volume ID
volume mount point

volume name
volume pool
Volume Shadow Copy
Service (VSS)

VSS
VSS component

Internal identification that NetWorker software assigns to a backup volume.


Disk volume that is grafted into the namespace of a host disk volume. This allows multiple
disk volumes to be linked into a single directory tree, and a single disk or partition to be
linked to more than one directory tree.
Name assigned to a backup volume when it is labeled. See also label.

See pool.
Microsoft technology that creates a point-in-time shadow copyof a disk volume.
NetWorker software backs up data from the shadow copy. This allows applications to
continue to write data during the backup operation, and ensures that open files are not
omitted.

See Volume Shadow Copy Service (VSS).


Subordinate unit of a writer.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

153

Glossary

W
writer

154

Database, system service, or application code that provides metadata document


information about what to back up and how to handle VSS component and applications
during backup and recovery operations. A Writer provides information to requestors to
ensure that application data is consistent, application files are closed and ready for a
slight pause to make a Shadow Copy.

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

INDEX

A
Active Directory (AD)
disaster backup and recovery 24
granular backup and recovery 24
ADAM
authoritative restore 123
nonauthoritative restore 123
All save set
considerations for 113
application information attribute
Cluster Writer 142
Application Specific Module (ASM) pass phrase 129
authoritative restore
ADAM 123
Cluster Writer 144
DFS 125
FRS 127
NTDS 129
Avamar 109
configuration 91

B
backup client resource
configuring multiple 75
backup command attribute
applications 114
Exchange 97, 108
backup groups
configuring 72
backup levels,
deduplication 93
backup pool
creating for snapshots 66
backup save sets
specifying 113
backup schedule
configuring 72
backup time
selecting for recovery 43
backups
deduplication 93
browse policy 74
browse time
selecting for recovery 43
bulk_logged recovery model 23

cluster server
scheduling backups for 79, 112, 143
Cluster tab 144
Cluster Writer recovery
authoritative restore 144
for Windows Server 2008 122
nonauthoritative restore 144
common provider
See EMC VSS Provider 29
connection port range
specifying 54
connection to NetWorker server 41
conventional recovery
overview 33

D
deduplication
Avamar integration 109
backup configuration notes 94
backups 93
configuration 91
configuring client 95
prerequisites 109
querying deduplication save sets with mminfo 98
Deduplication Node
configuration 91
DFS recovery options 124
directory services restore mode
booting in for FRS recovery 131
booting in for NTDS recovery 131
disaster recovery
support in NMM 24
display conventions 39
DNS resolution, NetWorker Deduplication Node 92
DPM
disaster backup and recovery 24
granular backup and recovery 24

E
EMC VSS Provider
overview 29
encryption
recovering backup data 115
Exchange
disaster backup and recovery 24
granular backup and recovery 24

C
CLARiiON
provider overview 27
client resource
configuring for deduplication 95
configuring multiple 75
configuring when in a cluster 79, 112, 143

F
fake objects 39
file system
disaster backup and recovery 24
granular backup and recovery 24
recovery options 119, 122

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

155

Index

filestream data 39
FRS recovery
booting in directory services restore mode 131
consideration for 115
options 126
full backup level
consideration for 72
full recovery model 22

G
granular backup and recovery
support in NMM 24
groups
configuring for backup 72

H
hardware providers 27
HIDD_SELECT_VIEWABLE_CLIENTS 52
Hyper-V
disaster backup and recovery 24
granular backup and recovery 24

I
incremental backup level
consideration for 72
instant backup
overview 32
instant recovery
overview 33
instant snapshot policy example 71
interface
overview 35
items
searching for recovery 42

L
label
creating for pool 67
level 1 to 9 backups
consideration for 72
level for backup
considerations for 72

M
marking items
indicators 43
partially 43
semantics 40
marking items for recovery 41
Microsoft VSS software provider
overview 29
Microsoft Windows Server 2008 28, 121, 122, 140
Microsoft Windows Server 2008 support 122
mminfo, querying deduplication save sets using 98
monitoring a recovery 46, 115, 131
multihomed environment 57
multiple client resources for backup 75

156

N
NetWorker
client file index 74
media database 74
NetWorker Deduplication Node, DNS resolution 92
Networker recovery options 119, 122
NetWorker server
connecting to 41
NetWorker User for SQL Server
40
display conventions 39
fake objects 39
marking items partially 43
nonauthoritative restore
ADAM 123
Cluster Writer 144
DFS 125
FRS 127
NTDS 129
nonpersistent backup
overview 32
NTDS recovery
booting in directory services restore mode 131
consideration for 115
options 128

O
overview
conventional recovery 33
instant backup 32
instant recovery 33
interface 35
nonpersistent backup 32
persistent backup 32
provider 29
requestor 29
rollover backup 32
software provider 29
VSS writers 27

P
partially marking items 43
pass phrase
recovering AES encrypted data 129
password
changing 55
consideration for changing 55
specifying for backup 55
password-protected
recovering backup data 115
persistent backup
overview 32
policies for snapshots 68
pool
creating for snapshots 66
label for 67
ports
service and connection port ranges 54
prerequisites

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

IndexIndex

deduplication 109
provider
overview 29
proxy client
configuring 78
requirements for 78

R
recover.exe 115
recovery
ADAM options 123
browse time selection 43
Cluster options 120
default method, choosing 119
DFS options 124
encrypted backup data 115
FRS options 126
marking items 41
NTDS options 128
password-protected backup data 115
performing for system data 116
searching for items 42
selecting a version 43
viewing progress for 46, 115, 131
volumes required for 44
recovery model
bulk_logged 23
full 22
simple 23
recovery, deduplication 98, 109
requestor
overview 29
resource for backup
configuring multiple 75
retention policy 74
rollover backup
overview 32
performing 31

pool for 66
rollover operation 31
software provider
overview 29
SQL
disaster backup and recovery 24
Symmetrix
provider overview 27
system recovery
performing 116

T
time of backup
selecting for recovery 43
topology of NetWorker multihomed 59

U
unmarking items
indicators 43
URL encoding
save sets 75
user access control 47

V
version
selecting for recovery 43
virtual cluster server
scheduling backups for 79, 112, 143
Volume Shadow Copy Service (VSS)
writers 27
volumes required for recovery 44

W
Windows Server 2008 28, 121, 122
Windows Server 2008 Cluster Writer
nonauthoritative restore 121
Windows Server Failover Clustering (WSFC) 140

S
safe mode, booting in 131
save sets
specifying for backup 113
URL encoding 75
searching for a recovery item 42
selecting items for recovery 41
server
connecting to NetWorker 41
serverless backup 27
proxy client requirement 78
service port range
specifying 54
SharePoint 2007
disaster backup and recovery 24
granular backup and recovery 24
simple recovery model 23
snapshot policies
configuring 68
snapshots

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

157

Index

158

EMC NetWorker Module for Microsoft Applications Release 2.4 Administration Guide

You might also like