Professional Documents
Culture Documents
Administrators Guide
Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation makes no warranty of any kind with regard to this manual, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Symantec Corporation shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual. Symantec Legal Notice Copyright 2005 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED AS IS AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com Third-Party Copyrights
Douglas C. Schmidt and his research group at Washington University and University of California, Irvine
ACE (TM) is copyrighted by Douglas C. Schmidt and his research group at Washington University and University of California, Irvine, Copyright (c) 1993-2002, all rights reserved.
Administrators Guide
2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment: This product includes software developed by the Apache Software Foundation (http://www.apache.org/)."Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appears. 4. The names "Apache" and "Apache Software Foundation" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact apache@apache.org. 5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without prior written permission of the Apache Software Foundation. THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation. For more information on the Apache Software Foundation, please see <http://www.apache.org/>. Portions of this software are based upon public domain software originally written at the National Center for Supercomputing Applications, University of Illinois, Urbana-Champaign.
Crystal Decisions, Inc. (formerly Seagate Software Information Management Group, Holdings, Inc.
Crystal Reports 8.5 Use, duplication, reproduction, or transfer of this commercial software and accompanying documentation is restricted in accordance with FAR 12.212 and DFARS 227.7202 and by a license agreement. Contact: Crystal Decisions, Inc., Attn: Contracts Department, 895 Emerson Street, Palo Alto, CA 94301.
Boris Fornitchev
STLPort 3.2.1 Copyright 1999,2000 Boris Fomitchev This material is provided "as is", with absolutely no warranty expressed or implied. Any use is at your own risk. Permission to use or copy this software for any purpose is hereby granted without fee, provided the above notices are retained on all copies. Permission to modify the code and to distribute modified code is granted, provided the above notices are retained, and a notice that the code was modified is included with the above copyright notice. The Licensee may distribute binaries compiled with STLport (whether original or modified) without any royalties or restrictions. The Licensee may distribute original or modified STLport sources, provided that: (i) The conditions indicated in the above permission notice are met; (ii) The following copyright notices are retained when present, and conditions provided in accompanying permission notices are met: Copyright 1994 Hewlett-Packard Company Copyright 1996,97 Silicon Graphics Computer Systems, Inc. Copyright 1997 Moscow Center for SPARC Technology. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Hewlett- Packard Company makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Silicon Graphics makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Moscow Center for SPARC Technology makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
Derivative Work -Copyright 1996, 1998-2000 The Regents of the University of California All Rights Reserved Permission to use, copy, modify and distribute this software and its documentation for any purpose and without fee is hereby granted, provided that the above copyright notice appears in all copies and that both that copyright notice and this permission notice appear in supporting documentation, and that the name of CMU and The Regents of the University of California not be used in advertising or publicity pertaining to distribution of the software without specific written permission. CMU AND THE REGENTS OF THE UNIVERSITY OF CALIFORNIA DISCLAIM ALL WARRANTIES WITH REGARD TO THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL CMU OR THE REGENTS OF THE UNIVERSITY OF CALIFORNIA BE LIABLE FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM THE LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
Ronald L. Rivest
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the "RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as "derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm" in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided "as is" without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software.
Wei Dai
Compilation Copyright (c) 1995-2003 by Wei Dai. All rights reserved. This copyright applies only to this software distribution package as a compilation, and does not imply a copyright on any particular file in the package. The following files are copyrighted by their respective original authors, and their use is subject to additional licenses included in these files. mars.cpp - Copyright 1998 Brian Gladman. All other files in this compilation are placed in the public domain by Wei Dai and other contributors. I would like to thank the following authors for placing their works into the public domain: Joan Daemen - 3way.cpp Leonard Janke - cast.cpp, seal.cpp Steve Reid - cast.cpp Phil Karn - des.cpp Michael Paul Johnson - diamond.cpp Andrew M. Kuchling - md2.cpp, md4.cpp Colin Plumb - md5.cpp, md5mac.cpp Seal Woods - rc6.cpp Chris Morgan - rijndael.cpp Paulo Baretto - rijndael.cpp, skipjack.cpp, square.cpp Richard De Moliner - safer.cpp Matthew Skala - twofish.cpp Permission to use, copy, modify, and distribute this compilation for any purpose, including commercial applications, is hereby granted without fee, subject to the following restrictions: 1. Any copy or modification of this compilation in any form, except in object code form as part of an application software, must include the above copyright notice and this license. 2. Users of this software agree that any modification or extension they provide to Wei Dai will be considered public domain and not copyrighted unless it includes an explicit copyright notice.
Administrators Guide
3. Wei Dai makes no warranty or representation that the operation of the software in this compilation will be error-free, and Wei Dai is under no obligation to provide any services, by way of maintenance, update, or otherwise. THE SOFTWARE AND ANY DOCUMENTATION ARE PROVIDED "AS IS" WITHOUT EXPRESS OR IMPLIED WARRANTY INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. IN NO EVENT WILL WEI DAI OR ANY OTHER CONTRIBUTOR BE LIABLE FOR DIRECT, INCIDENTAL OR CONSEQUENTIAL DAMAGES, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. 4. Users will not use Wei Dai or any other contributor's name in any publicity or advertising, without prior written consent in each case. 5. Export of this software from the United States may require a specific license from the United States Government. It is the responsibility of any person or organization contemplating export to obtain such a license before exporting. 6. Certain parts of this software may be protected by patents. It is the users' responsibility to obtain the appropriate licenses before using those parts. If this compilation is used in object code form in an application software, acknowledgement of the author is not required but would be appreciated. The contribution of any useful modifications or extensions to Wei Dai is not required but would also be appreciated.
Maarten Hoeben
ReportCtrl.h 2.0.1
Stac Electronics
Copyright (C) Stac Electronics 1993, including one or more U.S. patents No. 4701745, 5016009, 5126739 and 5146221 and other pending patents.
Administrators Guide
Uninstalling Backup Exec Options from the Local Media Server . . . . . . . . . . . . . . 94 Installing the Backup Exec Remote Administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Creating a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 Installing Locally Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 Installing to a Remote System Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . 99 Using VERITAS Update . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Viewing Installed Updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102 Viewing License Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 103 Upgrading from Previous Versions of Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . 104 Upgrading Backup Exec Options on Remote Computers . . . . . . . . . . . . . . . . . . . . . . . 105 Chapter 3. Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107 Before Starting Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107 Starting Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 First Time Startup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108 Using the Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Using Backup Exec Dialog Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Using the Overview View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 Using the Backup Exec Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Backup Exec Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119 Changing Default Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 120 Changing General Job Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 122 Chapter 4. Managing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123 Viewing Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Viewing Media Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126 Configuring Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 Hot Swap for Storage Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 VERITAS device driver Installation Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 129
8 Administrators Guide
Pausing, Resuming, and Renaming Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130 Using Device Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132 Creating Device Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133 Adding Devices to a Device Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134 Setting Priorities for Devices in a Device Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135 Deleting Devices from a Device Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Deleting Device Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136 Retargeting Jobs from a Deleted Device Pool or Media Set . . . . . . . . . . . . . . . . . . 137 Renaming a Device Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137 Viewing Device Pool Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138 Using Cascaded Drive Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Requirements for Using Cascaded Drive Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Creating a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139 Adding Drives to a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141 Deleting Drives from a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Deleting a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142 Renaming a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Viewing Properties of a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143 Viewing Media Server Properties and Running Server Diagnostics . . . . . . . . . . . . . 144 Viewing Media Server General Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 145 Viewing Media Server System Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 147 Viewing Media Server Advanced Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148 Viewing Media Server License Information Properties . . . . . . . . . . . . . . . . . . . . . 150 Viewing and Using Device Properties and Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . 151 Viewing General Device Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152 Viewing Drive Configuration Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 Viewing Drive SCSI Information Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158 Viewing Drive Statistics Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 159 Viewing Drive Cleaning Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 161 Viewing and Specifying a Devices Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
Administrators Guide - Table of Contents 9
Using Robotic Libraries with Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 164 Configuring a Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 165 Viewing Properties of a Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 166 Creating Robotic Library Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172 Redefining Robotic Library Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174 Using Backup-to-Disk Folders and Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176 Adding a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177 Renaming a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Changing the Path of a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 180 Deleting a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 181 Recreating a Backup Folder and Its Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Pausing and Resuming a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 182 Viewing Backup Folder Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 Viewing Backup Folder General Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 184 Viewing Backup Folder Configuration Properties . . . . . . . . . . . . . . . . . . . . . . . . . . 185 Renaming a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Deleting a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 187 Recreating a Deleted Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 188 Using Microsofts Removable Storage Feature with Backup Exec . . . . . . . . . . . . . . . 189 Using Media in Drives Managed by Removable Storage . . . . . . . . . . . . . . . . . . . . 190 Creating Utility Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 Inventorying Media in Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193 Erasing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 195 Erasing Backup Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197 Retensioning a Tape . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 Formatting Media in a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199 Labeling Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201 Ejecting Media from a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203 Setting Up Cleaning Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204 Importing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
10 Administrators Guide
Exporting Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207 Locking the Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Unlocking the Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208 Exporting Expired Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209 Chapter 5. Managing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Media Overwrite Protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213 Default Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217 Creating Media Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218 Running the Media Set Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Deleting a Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221 Renaming a Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222 General Media Set Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223 Vault Rule Properties for Media Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225 Media Overwrite Protection Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226 Media Categories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227 Media Overwrite Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 228 Media Append Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Overwriting Allocated or Imported Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232 Removing Damaged Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233 Media Labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234 Imported Media Labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Bar Code Labeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235 Renaming Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 238 Setting Default Media Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239 Media Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243 Creating Media Vaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Finding Media in a Location or Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Renaming a Media Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244 Adding Media to the Offline Location or a Media Vault . . . . . . . . . . . . . . . . . . . . . 245
11
Update Media Vaults by Using a Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245 Moving Media by Dragging and Dropping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 247 Deleting a Media Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Media Rotation Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 248 Son Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Father/Son Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249 Grandfather Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 250 Media Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251 Deleting Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Moving Media to a Media Set or Media Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 252 Viewing General Media Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253 Viewing Statistics for Media Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255 Chapter 6. Backing Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .259 Creating a Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261 Using the Backup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 262 Creating a Manual Backup Job by Configuring Job Properties . . . . . . . . . . . . . . . 262 Selecting Data to Back Up . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284 About Selecting Distributed File System (Dfs) Links for Backup . . . . . . . . . . . . . 287 Including or Excluding Files for Backup Using Advanced File Selection . . . . . . 288 Changing the Order for Processing Backup Selections . . . . . . . . . . . . . . . . . . . . . 291 Changing and Testing Logon Accounts for Resources . . . . . . . . . . . . . . . . . . . . . . 292 Using Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Creating Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293 Using Selection Lists to Create a Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Holding Jobs That Back Up a Selection List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 Merging and Replacing Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 Deleting Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 Editing Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 About the Excludes Selection List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
12
Administrators Guide
Setting Priority and Availability Windows for Selection Lists . . . . . . . . . . . . . . . 301 Creating Multiple Selection Lists from a Single Selection List . . . . . . . . . . . . . . . 303 Searching Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Setting Up User-defined Selections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 304 Using Backup Execs Windows Explorer Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 Submitting a Backup Job from Windows Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . 306 Running a One-button Backup Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 Archiving Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 Archiving Data Using Disk Grooming . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310 Using Resource Discovery to Search for New Resources . . . . . . . . . . . . . . . . . . . . . . . 311 Excluding Computers from a Resource Search . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Duplicating Backed Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 315 Verifying a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Creating a Test Run Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 Setting Test Run Default Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Setting Default Backup Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Setting Default Pre/Post Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 Specifying Backup Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 Specifying Default Backup Network and Firewall Options . . . . . . . . . . . . . . . . . . 336 Changing the Backup Network for a Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Using Backup Exec with Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Browsing Systems Through a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Protecting Windows Server 2003 Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 About the Backup Exec Shadow Copy Components File System . . . . . . . . . . . . . . 344 Protecting Upgraded Windows Server 2003 Resources . . . . . . . . . . . . . . . . . . . . . 347 Backing Up Utility Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Backing Up EFI System Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 About Backup Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Choosing a Backup Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 351 Understanding Backup Methods and Their Advantages . . . . . . . . . . . . . . . . . . . . 354
Administrators Guide - Table of Contents 13
Understanding the Archive Bit and Backup Methods . . . . . . . . . . . . . . . . . . . . . . . 357 Understanding Modified Time and Backup Methods . . . . . . . . . . . . . . . . . . . . . . . 358 Chapter 7. Policies and Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .361 Creating a New Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 362 Editing a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 Deleting a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364 Using an Example Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 365 Using Templates in Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 366 Migrating Templates from Previous Versions of Backup Exec . . . . . . . . . . . . . . . 367 Adding a Backup Template to a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 367 Setting the Schedule for a Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 369 Adding an Export Media Template to a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 370 Importing a Template into a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Editing a Template in a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 Deleting a Template from a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Setting Template Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 Changing Template Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 Deleting Template Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 377 Creating Jobs Using Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Viewing the Policies that Protect Selection Lists . . . . . . . . . . . . . . . . . . . . . . . . . . . 379 Editing the Next Occurrence of a Policy-based Job . . . . . . . . . . . . . . . . . . . . . . . . . 379 Deleting a Job Created from a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 Renaming a Job Created from a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 380 About Duplicate Backup Set Templates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Adding a Duplicate Backup Template to a Policy . . . . . . . . . . . . . . . . . . . . . . . . . . 382 Chapter 8. Administrating Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .385 Configuring Logon Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Default Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Backup Exec System Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
14 Administrators Guide
Creating a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 388 Editing a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 Replacing a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 Deleting a Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 Changing Your Default Backup Exec Logon Account . . . . . . . . . . . . . . . . . . . . . . . 392 Creating a New Backup Exec System Logon Account . . . . . . . . . . . . . . . . . . . . . . . 392 Copying Jobs, Selection Lists, and Policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 394 Copy Configuration Settings and Logon Information . . . . . . . . . . . . . . . . . . . . . . . . . . 396 Scheduling Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 398 Editing the Job Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 401 Configuring Default Schedule Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403 Configuring Holiday Scheduling for Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 404 Monitoring Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Viewing and Filtering Jobs in the Job List View . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 Managing Custom Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 407 Viewing and Filtering Jobs in the Calendar View . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 Viewing and Changing Active Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 Viewing and Changing Scheduled Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420 Viewing and Changing Completed Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 427 Using Audit Logs to Review Activity Performed in Backup Exec . . . . . . . . . . . . . . . . 437 Configuring the Audit Log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Error-Handling Rules . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 439 Custom Error-handling Rule for Recovered Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . 443 Cluster Failover Error-Handling Rule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444 Setting Thresholds to Recover Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 445 Configuring Database Maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447 Chapter 9. Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 451 Restore Operations and the Catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452 Cataloging Media in a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 452
15
Setting Catalog Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 454 Catalog Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 456 Restoring Data to a Server or Workstation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Using the Restore Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 457 Creating a Manual Restore Job by Configuring Job Properties . . . . . . . . . . . . . . . 458 Restoring File Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 471 Restoring System State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 472 Restoring Windows Server 2003 Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 473 Restoring Utility Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474 Restoring EFI System Partition Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 475 Restoring Distributed File System (Dfs) Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476 Restoring Media Created With Other Backup Software . . . . . . . . . . . . . . . . . . . . . 476 Selecting Data to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 Using the Resource View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 Using the Media View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 Changing and Testing Resource Credentials for Restore Jobs . . . . . . . . . . . . . . . 481 Using Advanced File Selection to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482 Searching for Files to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483 Restore Operations and Media Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 Redirecting a Restore Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 487 Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 488 Setting Restore Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490 Specifying the Restore Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 Canceling a Restore Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 Catalog Icon Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 Chapter 10. Alerts and Notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .501 Viewing and Filtering Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 Viewing Alert Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 Responding to Active Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 507
16 Administrators Guide
Viewing the Job Log for Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 509 Clearing Informational Alerts from the Active Alerts Pane . . . . . . . . . . . . . . . . . . . . 510 Enabling or Disabling Alerts from the Active Alerts Pane . . . . . . . . . . . . . . . . . . . . . . 510 Configuring Alert Category Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 511 Deleting Alerts from the Alert History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 513 Configuring E-mail and Pager Notification Methods . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Configuring SMTP E-Mail for Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 514 Configuring MAPI E-Mail for Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 515 Configuring VIM E-Mail for Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 Configuring a Pager for Alert Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 517 Configuring Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518 Configuring SMTP Mail for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . 518 Configuring MAPI Mail for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 520 Configuring VIM Mail for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 522 Configuring a Pager for a Person Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 523 Configuring a Net Send Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526 Configuring a Printer Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 528 Configuring a Group Recipient . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 530 Scheduling Notification for Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 Editing Recipient Notification Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 531 Editing Recipient Notification Methods . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 532 Removing Recipients . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 533 Assigning Recipients to Alert Categories for Notification . . . . . . . . . . . . . . . . . . . . . . 533 Selecting Recipients for Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 534 Configuring SNMP Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536 Adding Windows Management Instrumentation Capability . . . . . . . . . . . . . . . . . . . . 540 Uninstalling WMI Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 541 Chapter 11. Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 543 Viewing Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 544
17
Running a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 545 Running and Viewing a New Report Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 548 Scheduling Report Jobs and Setting Notification Recipients . . . . . . . . . . . . . . . . 553 Viewing Report Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 553 Available Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 555 Active Alerts Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559 Active Alerts by Media Server Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 559 Alert History Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 561 Alert History by Media Server Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 562 Audit Log Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 563 Backup Job Success Rate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 564 Backup Resource Success Rate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 565 Backup Set Details by Resource Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 566 Backup Sets by Media Set Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 567 Backup Size By Resource Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 568 Configuration Settings Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 569 Current Job Status Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 570 Daily Network Device Utilization Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571 Device Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 571 Device Usage by Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 Error-Handling Rules Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 573 Event Logs Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 575 Event Recipients Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 Failed Backup Jobs Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 576 Job Distribution by Device Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577 Jobs Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 578 Machines Backed Up Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579 Managed Media Servers Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 579 Media Required for Recovery Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 581 Media Set Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 582
18 Administrators Guide
Media Vault Contents Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 583 Missed Availability Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 584 Move Media to Vault Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 585 Operations Overview Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 586 Overnight Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588 Policy Jobs by Resource Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 589 Policy Jobs Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 590 Policy Properties Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 591 Policy Protected Resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 592 Problem Files Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 593 Recently Written Media Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 594 Resource Backup Policy Performance Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 595 Resource Risk Assessment Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 596 Restore Set Details by Resource Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597 Retrieve Media from Vault Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 598 Robotic Library Inventory Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 599 Scheduled Server Workload . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 600 Scratch Media Availability Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 601 Test Run Results Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 602 Chapter 12. Disaster Preparation and Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 605 Key Elements of a Disaster Preparation Plan (DPP) . . . . . . . . . . . . . . . . . . . . . . . . . . . 606 Disaster Preparation of the Windows Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 607 Returning to the Last Known Good Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . 607 Creating a Hardware Profile Copy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 608 Creating an Emergency Repair Disk . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 609 Using Windows Automated System Recovery and System Restore to Recover a Windows XP or Windows Server 2003 System . . . . . . . . . . . . . . . . . . . 610 Manual Disaster Recovery of Windows Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 610
19
Manual Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative and authoritative restore of Active Directory for a domain controller) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 611 Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative and authoritative restore of Active Directory for a domain controller) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 615 Chapter 13. Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .619 Hardware-related Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 620 Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 623 Backup Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 624 Restore Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626 Improving Backup Exec Performance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 626 Contacting Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628 Before Calling Technical Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 628 Finding Version and Revision Information for Your Backup Exec Installation 629 Backup Exec Diagnostic Utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 629 Using Symantec DirectAssist for Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . 633 Chapter 14. Symantec Backup Exec - Workstation Agents . . . . . . . . . . . . . . . . . . . . . . . .635 The Backup Exec Windows 98 and Windows Me Agents . . . . . . . . . . . . . . . . . . . . . . . 636 Requirements for Running the Backup Exec Windows 98/Me Agent . . . . . . . . . 636 Installing the Backup Exec Windows 98/Me Agent on the Workstation . . . . . . 637 Configuring the Backup Exec Windows 98/Me Agent . . . . . . . . . . . . . . . . . . . . . . 637 Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 639 Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 641 The Backup Exec Macintosh Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 642 Requirements for Running the Backup Exec Macintosh Agent . . . . . . . . . . . . . . 643 Installing and Configuring the Macintosh Agent on a Mac OS X Computer . . . 643 Modifying the NetInfo Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 648 About the Backup Exec 8.x and 9.x Agent for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . . . 649
20 Administrators Guide
Requirements for Running the Backup Exec 8.x and 9.x Agent for Unix . . . . . . 649 Installing the Backup Exec 8.x and 9.x Agent for Unix on the Workstation . . . 650 Configuring the Backup Exec 8.x and 9.x Agent for Unix . . . . . . . . . . . . . . . . . . . . 653 Loading the Backup Exec 8.x and 9.x Agent for Unix . . . . . . . . . . . . . . . . . . . . . . . . . . 656 Troubleshooting Workstation Agents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 656 Chapter 15. Using Symantec Backup Exec with Server Clusters . . . . . . . . . . . . . . . . . . 657 How Backup Exec Works in a Microsoft Cluster Server . . . . . . . . . . . . . . . . . . . . . . . . 658 Requirements for Installing Backup Exec on a Microsoft Cluster Server . . . . . . . . . 659 Installing Backup Exec on a Microsoft Cluster Server . . . . . . . . . . . . . . . . . . . . . . . . . 660 Upgrading Backup Exec on a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . 661 Installing Additional Backup Exec Options on a Microsoft Cluster . . . . . . . . . . . 662 Uninstalling Backup Exec From a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . 663 Creating Device Pools for Microsoft Cluster Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . 664 Using Checkpoint Restart on Microsoft Cluster Server Failover . . . . . . . . . . . . . . . . 665 Enabling or Disabling Checkpoint Restart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 667 Specifying a Different Failover Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 668 Designating a New SAN SSO Primary Server and Central Administration Server in a Microsoft Cluster Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 669 Configurations for Backup Exec and Microsoft Cluster Servers . . . . . . . . . . . . . . . . . 670 Two-node Cluster with Locally Attached Storage Devices . . . . . . . . . . . . . . . . . . . 671 Two-node Cluster with Tape Devices on a Shared SCSI Bus . . . . . . . . . . . . . . . . . 672 Multi-node Clusters on a Fibre Channel SAN with the SAN SSO . . . . . . . . . . . . . 675 Using the Central Admin Server Option with Microsoft Clusters and SAN SSO . . . 678 Backing Up Microsoft Cluster Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 680 Backing Up Windows 2000 and Windows Server 2003 Features in a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 681 Backing Up Local Disks in a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 682 Backing Up Shared Disks in a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 682 Backing Up Database Files in a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . 683 Restoring Data to a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684
Administrators Guide - Table of Contents 21
Restoring Windows 2000 and Windows Server 2003 Features to a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 684 Restoring the Cluster Quorum for Windows 2000 and Windows Server 2003 Computers to a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . 685 Restoring the Cluster Quorum to a Windows 2000 or Windows Server 2003 Node Running Active Directory to a Microsoft Cluster . . . . . . . . . . 686 Specifying a New Drive Letter for the Cluster Quorum Disk . . . . . . . . . . . . . . . . . 688 Using Backup Exec with a VERITAS Cluster Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 689 Requirements for Installing Backup Exec on a VERITAS Cluster Server . . . . . . . . . 690 Installing Backup Exec on a VERITAS Cluster Server . . . . . . . . . . . . . . . . . . . . . . . . . 691 Backing Up VERITAS Cluster Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 692 Backing Up Windows 2000 and Windows Server 2003 Features in a VERITAS Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 693 Backing Up Local Disks in a VERITAS Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 694 Backing Up Shared Disks in a VERITAS Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . 694 Backing Up Database Files in a VERITAS Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . 695 Restoring Data to VERITAS Cluster Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696 Restoring Windows 2000 and Windows Server 2003 Features to a VERITAS Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 696 Using Backup Job Failover with VERITAS Cluster Servers . . . . . . . . . . . . . . . . . . . . . 696 Disaster Recovery of a Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 697 Using IDR to Prepare for Disaster Recovery of a Cluster . . . . . . . . . . . . . . . . . . . . 698 Recovering Nodes on the Cluster Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 698 Recovering Backup Exec on a Microsoft Cluster Using IDR . . . . . . . . . . . . . . . . . 700 Recovering the Entire Cluster Using a Manual Disaster Recovery Procedure . 700 Recovering the Microsoft Cluster Data Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 702 Recovering All Shared Disks in a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . 703 Recovering All Shared Disks in a VERITAS Cluster . . . . . . . . . . . . . . . . . . . . . . . . 704 Recovering Backup Exec in a Microsoft Cluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705 Troubleshooting Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 705
22
Administrators Guide
Chapter 16. Symantec Backup Exec - Web Administration Console . . . . . . . . . . . . . . . 709 Requirements for BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 709 Installing BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710 Setting Internet Explorer Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710 Starting BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 710 Differences Between BEWAC and Backup Exec for Windows Servers . . . . . . . . . . . . 711 Accessing Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712 Navigating in BEWAC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 712 Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 714 Viewing, Clearing, and Responding to Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 715 Chapter 17. Backup Exec Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 717 Starting the Backup Exec Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 718 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 719 Completing Tasks using the Backup Exec Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 720 Running Backup Exec Utility General Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722 Add a New Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 722 Create a New Media Server Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 723 Delete a Media Server from the All Media Servers Node . . . . . . . . . . . . . . . . . . . . 724 Delete a Media Server Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 725 Run Backup Exec Diagnostics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726 Enable Debug Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 726 View Media Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 729 Running Backup Exec Utility Services Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 733 Stop Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734 Start Services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 734 Change Service Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 736 Editing Media Server Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 737 Copy Media Server Configurations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 742 Apply Copied Media Server Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 743
23
Update Configuration for New Media Server Name . . . . . . . . . . . . . . . . . . . . . . . . 743 Running Backup Exec Utility CASO Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 745 Set Central Administration Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 746 Remove Central Administration Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 747 Enable CASO Job Delegation on a Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 748 Disable CASO Job Delegation on Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 748 Move Central Administration Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 749 Change Catalog Storage Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 750 Running Backup Exec Utility SAN SSO Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 751 Set the Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752 Remove the Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 752 Configure the SAN SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 753 Promote a Media Server to a Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . 754 Move the Primary SAN SSO Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 755 Running Database Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 756 Check the Database Consistency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757 Age the Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 757 Compact a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758 Dump a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 758 Rebuild Media Server Database Indices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759 Repair a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 759 Recover a Media Server Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 760 Change the SQL Server sa Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 761 Change Database Access . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 762 New Backup Exec Database Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 763 Copy Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 764 Running Media Server Group Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765 Add Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 765 Remove a Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 766 Set Central Administration Server for the Media Server Group . . . . . . . . . . . . . 766
24 Administrators Guide
Running Cluster Tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768 Edit Cluster Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 768 Chapter 18. Symantec Backup Exec - Tivoli Storage Manager . . . . . . . . . . . . . . . . . . . . 771 Requirements for the TSM Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 771 Backup Exec as a TSM Client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 772 TSM Backup Exec Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 773 Preparing the TSM Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775 Allocating Storage Space . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 775 Creating The bexpi.dsm Storage Volume . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 776 Running the BEX.MAC Macro . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778 Enabling TSM Support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 779 Changing the Defaults for Backup Exec for Windows Servers . . . . . . . . . . . . . . . . . . 779 BEX.MAC Macro Command Details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 783 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786 Viewing TSM-related Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 786 TSM Problem Resolutions for Backup Exec for Windows Servers . . . . . . . . . . . . 786 Appendix A. Symantec Backup Exec - Remote Agent for Windows Servers . . . . . . . . . 789 Requirements for the Remote Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 791 Backing Up Data in a Mixed Environment Using the Remote Agent . . . . . . . . . . . . . 792 Installing the Remote Agent to Remote Windows Computers . . . . . . . . . . . . . . . . . . 793 Installing the Remote Agent on a 64-bit Computer Using the Installation Program . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 793 Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line . . . . . . . . . . . . . . . . . . . . . . . . . . . . 794 Installing and Uninstalling the 64-bit Remote Agent and Advanced Open File Option Using a Command Script . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 795 Stopping and Starting the Remote Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797 The Remote Agent Monitor for Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 797 Setting Defaults for the Remote Agent Monitor . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799 Viewing Remote Agent Monitor Activity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 799
Administrators Guide - Table of Contents 25
Enable Advertising for the Remote Agent for Windows Servers . . . . . . . . . . . . . 800 Enable Debug Logging for Remote Windows Computers . . . . . . . . . . . . . . . . . . . . 802 Appendix B. Symantec Backup Exec - Remote Agent for Linux or Unix Servers . . . . . .803 Requirements for the Remote Agent for Linux or Unix . . . . . . . . . . . . . . . . . . . . . . . . 803 Installing the Remote Agent for Linux or Unix Servers . . . . . . . . . . . . . . . . . . . . . . . . 804 Creating the BEOPER Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 804 Installing RALUS Using the Installer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 805 The ralus.cfg File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 808 Using the Remote Agent for Linux or Unix Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . 810 Making Backup Selections with RALUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 810 Uninstalling the Remote Agent for Linux or Unix Servers . . . . . . . . . . . . . . . . . . . . . 813 Manual Install and Uninstall of RALUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814 Manually Installing RALUS from a TAR File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 814 Manually Uninstalling RALUS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815 Manually Starting the RALUS Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 815 Manually Stopping the RALUS Daemon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 816 RALUS and the Backup Exec 8.x and 9.x Agent for Unix . . . . . . . . . . . . . . . . . . . . . . . 816 Appendix C. Symantec Backup Exec - Central Admin Server Option . . . . . . . . . . . . . . . .819 About the Central Admin Server Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 819 The Central Admin Server Option Components . . . . . . . . . . . . . . . . . . . . . . . . . . . . 820 How the Central Admin Server Option Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 821 Features of the Central Admin Server Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 825 Requirements for Installing the Central Admin Server Option . . . . . . . . . . . . . . 828 Getting Started with the Central Admin Server Option . . . . . . . . . . . . . . . . . . . . . . . . 829 Installing the Central Admin Server Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 Installing Managed Media Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832 Installing Managed Media Servers Behind a Firewall . . . . . . . . . . . . . . . . . . . . . . . 835 Upgrading a Backup Exec Media Server to a Central Administration Server . . 836 Setting a Central Administration Server for Stand-alone Media Servers . . . . . 837
26 Administrators Guide
Migrating from Network Storage Executive v8.6 (NSE) . . . . . . . . . . . . . . . . . . . . . 838 Uninstalling Backup Exec from the Central Administration Server . . . . . . . . . . 839 Uninstalling Backup Exec from a Managed Media Server . . . . . . . . . . . . . . . . . . . 839 Configuring the Central Admin Server Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840 Configuring Device Pools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840 Configuring Managed Media Server Time Thresholds and Catalog Storage Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840 Setting Job Log and Job History Options for Managed Media Servers . . . . . . . . . 844 Configuring CASO Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845 Configuring CASO Notification . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847 Running Managed Media Server Operations from the Central Administration Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848 Pausing and Resuming a Managed Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 848 Disabling and Enabling Communications with the Central Administration Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849 Stopping and Starting Backup Exec Services on the Managed Media Server from the Central Administration Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850 Remotely Connecting to a Managed Media Server . . . . . . . . . . . . . . . . . . . . . . . . . . 851 Deleting a Managed Media Server from the Media Servers View . . . . . . . . . . . . . 852 Viewing Managed Media Server Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852 CASO Changes to Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853 The CASO Media Servers View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 853 Changes to the Job Monitor/Job History View with CASO . . . . . . . . . . . . . . . . . . . 856 CASO Icons . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 856 Backing Up with the Central Admin Server Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 857 Setting Media Server Property Options for CASO Backup Jobs . . . . . . . . . . . . . . 857 Setting the Default Network Interface for Delegated Jobs . . . . . . . . . . . . . . . . . . . 858 Device and Media Options for CASO Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 860 Restoring Data Using the Central Administration Server . . . . . . . . . . . . . . . . . . . . . . 860 CASO Restore Operations and Centralized Catalogs . . . . . . . . . . . . . . . . . . . . . . . . 861 Requirements for Restore When Using the Central Administration Server . . . 862
27
How Centralized Restore Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 862 How CASO Restores Data That Resides on Multiple Storage Devices . . . . . . . . . 863 Using the Device and Media Property with Centralized Restore Jobs . . . . . . . . . 865 Using Media Server Pools in CASO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 866 Creating a Media Server Pool and Adding Managed Media Servers . . . . . . . . . . 867 Adding Additional Managed Media Servers to a Media Server Pool . . . . . . . . . . 868 Renaming a Media Server Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869 Deleting a Media Server Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 869 Removing a Managed Media Server from a Media Server Pool . . . . . . . . . . . . . . 870 Configuring Device Pools for Use with CASO Media Server Pools . . . . . . . . . . . . 870 Special Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871 Recovering Failed Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 871 Pausing Storage Devices on Managed Media Servers from the Central Administration Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 873 Backup Duplicate Data and Synthetic Backup Templates Considerations . . . . . 873 Disaster Recovery Using Intelligent Disaster Recovery (IDR) with CASO . . . . . . . . 874 Appendix D. Symantec Backup Exec - Advanced Disk-based Backup Option . . . . . . . .875 Installing the Advanced Disk-based Backup Option . . . . . . . . . . . . . . . . . . . . . . . . . . . 875 About the Synthetic Backup Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 876 Requirements for Synthetic Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 878 Best Practices for Synthetic Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 879 Collecting Additional Information for Synthetic Backup . . . . . . . . . . . . . . . . . . . 879 Creating A Synthetic Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 880 Creating a Synthetic Backup By Using the Policy Wizard . . . . . . . . . . . . . . . . . . . 881 Creating a Synthetic Backup By Copying the Example Policy for Synthetic Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 881 Creating a Synthetic Backup By Adding Templates to a Policy . . . . . . . . . . . . . . 883 About the Offhost Backup Feature . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 888 Requirements for Offhost Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 889
28
Administrators Guide
Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 890 Best Practices for Using Offhost Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 891 Setting Offhost Backup Options for Backup Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . 892 Browsing Remote Computers for Installed Snapshot Providers . . . . . . . . . . . . . . 894 Restoring Offhost Backup Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 895 Troubleshooting the Offhost Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 896 Appendix E. Symantec Backup Exec - Intelligent Disaster Recovery Option . . . . . . . 901 Requirements for Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 902 Installing the IDR Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903 Using an Evaluation Version of the IDR Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 903 Preparing Computers for IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 904 Getting Started with IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906 Manually Setting Data Paths for the *.dr Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909 About Creating and Updating Recovery Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 912 Requirements for Running the IDR Preparation Wizard . . . . . . . . . . . . . . . . . . . . 913 Running the IDR Preparation Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 914 Creating Recovery Media After a Disaster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 915 Creating A Full Set of Diskettes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 917 Creating a Bootable CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 920 Creating a Bootable Tape Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 924 Creating the Intelligent Disaster Recovery Diskettes Only . . . . . . . . . . . . . . . . . . 927 Updating Bootable Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 929 Updating the Full Set of Disaster Recovery Diskettes . . . . . . . . . . . . . . . . . . . . . . . 931 Updating the Intelligent Disaster Recovery Diskettes Only . . . . . . . . . . . . . . . . . 934 Preparing IDR Media Via Other Media Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 937 Preparing to Recover from a Disaster Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 939 Changing Hardware in the Computer to be Recovered . . . . . . . . . . . . . . . . . . . . . . 940 Using IDR To Recover IBM Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 941 Using IDR To Recover Windows 2000 Computers . . . . . . . . . . . . . . . . . . . . . . . . . . 941
Administrators Guide - Table of Contents 29
Recovering a Computer Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 942 Using the Disaster Recovery Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 945 Altering Hard Drive Partition Sizes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 949 Recovering Computers Requiring OEM-Specific SCSI Drivers . . . . . . . . . . . . . . . 950 Performing a Manual Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 951 Performing Remote IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 952 Microsoft SQL Server Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 953 Microsoft Exchange Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954 SharePoint Portal Server Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954 Citrix Metaframe Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 954 Using IDR with the Central Admin Server Option . . . . . . . . . . . . . . . . . . . . . . . . . . 955 Using IDR with VERITAS Storage Foundation for Windows . . . . . . . . . . . . . . . . 955 About Recovering 64-bit Itanium Computers with IDR . . . . . . . . . . . . . . . . . . . . . 955 Best Practices for IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 956 Appendix F. Symantec Backup Exec - SAN Shared Storage Option . . . . . . . . . . . . . . . . .957 Requirements for the SAN Shared Storage Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . 959 Installing the SAN Shared Storage Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 960 About Devices in the Shared Storage Environment . . . . . . . . . . . . . . . . . . . . . . . . . . . 961 Monitoring Drives in the Shared Storage Environment . . . . . . . . . . . . . . . . . . . . 962 Viewing Media in the Shared Storage Environment . . . . . . . . . . . . . . . . . . . . . . . . 962 Using Drive Pools with the SAN Shared Storage Option . . . . . . . . . . . . . . . . . . . . 963 Using Device Operations with the SAN Shared Storage Option . . . . . . . . . . . . . . 964 Sharing Robotic Libraries Between Backup Exec for NetWare Servers and Backup Exec for Windows Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . 965 Scheduling and Viewing Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970 Sharing Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971 Cataloging Media in SAN SSO Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 971 Media Rotation in SAN SSO Environments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 972 Designating a New Database Server and Setting Up Servers . . . . . . . . . . . . . . . . . . . 973 Tips for Maintaining the Database Server
30 Administrators Guide
and the ADAMM Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 973 Creating a Standby Primary Database Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 974 Starting and Stopping Backup Exec Services on Multiple Servers . . . . . . . . . . . . 975 Troubleshooting and Recovering Failed Components . . . . . . . . . . . . . . . . . . . . . . . . . 976 Checklist for Troubleshooting Devices That Have Gone Offline . . . . . . . . . . . . . 976 Resetting the SAN . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 978 Bringing Devices Online After an Unsafe Device Removal Event . . . . . . . . . . . . 978 Best Practices for SAN SSO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 979 Appendix G. Symantec Backup Exec - ServerFree Option . . . . . . . . . . . . . . . . . . . . . . . . 981 Understanding ServerFree Backup Technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . 981 ServerFree Backup Configuration . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984 Installing the ServerFree option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 986 Running the ServerFree Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 987 Restoring A ServerFree Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 989 Appendix H. Symantec Backup Exec - Advanced Open File Option . . . . . . . . . . . . . . . . 991 Understanding the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 991 Supported Snapshot Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994 Requirements for Using the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . 995 Installing the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 996 Installing and Uninstalling the Advanced Open File Option to Remote Windows Computers Using the Command Line . . . . . . . . . . . . . . . . . . . . 997 Uninstalling the Advanced Open File Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 999 Setting Defaults for the Advanced Open File Option for Backup Jobs . . . . . . . . . . . . 999 Using Snap Start on a VERITAS Storage Foundation for Windows Volume . . 1005 Best Practices for Using the Symantec Volume Snapshot Provider . . . . . . . . . 1006 Symantec Volume Snapshot Provider Cache File Location . . . . . . . . . . . . . . . . . 1007 Changing the Default Settings for the Symantec Volume Snapshot Provider . . . 1008 Checking the Job Log When Using the AOFO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1012
31
Appendix I. Symantec Backup Exec - Agent for Microsoft SQL Server . . . . . . . . . . . 1013 Requirements for Using the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1014 Installing the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1015 Using Backup Exec Logon Accounts for SQL Resources . . . . . . . . . . . . . . . . . . . . . . 1015 Backup Strategies for SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1017 Consistency Checks for SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1021 Using Snapshot Technology With the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1022 Using AOFO With the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1023 Using the ADBO With the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024 Setting Backup Options for SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024 Automatic Exclusion of Files During Volume Level Backups . . . . . . . . . . . . . . . 1028 Backing Up SQL Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029 Backing Up SQL Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1031 Backing Up SQL Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1033 Restore Options for SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1035 About Restoring SQL Databases and Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1040 Restoring from SQL Database Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1041 Restoring from SQL Transaction Logs Up to a Point in Time . . . . . . . . . . . . . . . 1042 Restoring from SQL 2000 Transaction Logs Up to a Named Transaction . . . . 1043 Restoring from SQL Filegroup Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1044 Restoring the SQL Master Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1047 Redirecting Restores for SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1049 Setting Default Backup and Restore Options for SQL . . . . . . . . . . . . . . . . . . . . . . . . . 1052 Preparing for Disaster Recovery of SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1057 Disaster Recovery of SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1059 Manual Recovery of SQL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1060 Appendix J. Symantec Backup Exec - Agent for Microsoft Exchange Server . . . . . . 1065 Requirements for Using the Exchange Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1066 Installing the Exchange Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1067
32
Administrators Guide
Using Backup Exec Logon Accounts with Exchange Resources . . . . . . . . . . . . . . . . 1068 Backup Strategies for Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1068 Recommended Configurations for Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1072 Using Snapshot Technology With the Exchange Agent . . . . . . . . . . . . . . . . . . . . . . . 1074 Backup Options for Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1075 Backing Up Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1079 Automatic Exclusion of Files During Volume Level Backups . . . . . . . . . . . . . . . 1080 Reviewing Circular Logging . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1081 Backing Up Exchange Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . . . . . . 1082 Restore Options for Exchange . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1086 Restoring Exchange Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1089 Restoring Exchange 2003 Data Using the Recovery Storage Group . . . . . . . . . 1092 Restoring Exchange Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . . . . 1094 Redirecting Exchange Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1096 Redirecting Exchange 2000 and 2003 Storage Group and Database Restores . 1098 Redirecting Exchange 5.5 Database Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1098 Redirecting Exchange 2003 Restores Using the Recovery Storage Group . . . . 1099 Redirecting Mailbox Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1100 Setting Default Backup and Restore Options for Exchange . . . . . . . . . . . . . . . . . . . . 1102 Preparing for Disaster Recovery of Exchange Server . . . . . . . . . . . . . . . . . . . . . . . . . 1108 Disaster Recovery for Exchange 2000 and 2003 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1108 Disaster Recovery for Exchange Server 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1111 Appendix K. Symantec Backup Exec - Library Expansion Option . . . . . . . . . . . . . . . . . 1115 Setting Up Robotic Library Hardware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115 Configuring Multi-drive Robotic Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1116 Installing the Library Expansion Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1117 Starting Backup Exec After Installing the Library Expansion Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1117 Viewing Robotic Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1119
33
Appendix L. Backup Exec Desktop and Laptop Option . . . . . . . . . . . . . . . . . . . . . . . . . 1121 How the Desktop and Laptop Option Works . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121 System Requirements for the Administration Console . . . . . . . . . . . . . . . . . . . . . . . 1124 Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1125 Media Server Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1125 Server Loading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1125 Authentication Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1126 Using DLO with Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1126 Configuring DLO to Use a Specific Port for Database Access . . . . . . . . . . . . . . . 1126 Excluding Files that are Always Open . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1127 Using DLO with other Symantec Products . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1128 Using Hidden Shares as Storage Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1128 Installing the Backup Exec Desktop and Laptop Option . . . . . . . . . . . . . . . . . . . . . . 1130 Updating DLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1131 Deploying the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1133 Using the DLO Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1134 Setting a Recovery Password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1135 Data Integrity Scanner . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1135 Creating Administrator Accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137 Connecting to DLO on a Backup Exec Media Server . . . . . . . . . . . . . . . . . . . . . . . 1141 The DLO Overview View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1142 Setting Up DLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1145 Setting up a DLO Profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1146 Managing Backup Selections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1155 Creating DLO Storage Locations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1165 Setting up Automated User Assignments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1168 Configuring the Global Exclude List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1174 Managing Desktop Agent Users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1177 Managing Desktop Computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184 Restoring Files and Folders from the DLO Administration Console . . . . . . . . . . . . 1186
34 Administrators Guide
Searching for Desktop Files to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1189 Deleting a Desktop Computer from DLO . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1191 Monitoring DLO Job Histories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1192 Viewing the DLO Job History . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1192 Setting Job History View Filters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1194 Monitoring Alerts on the DLO Administration Console . . . . . . . . . . . . . . . . . . . . . . . 1200 Configuring Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1204 Managing Alerts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1205 DLO Reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1206 Viewing Report Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1208 Running a Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1209 Maintaining the DLO Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1210 Clustering the Desktop and Laptop Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1210 DLO Command Line Interface Management Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 1213 DLO Command Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1213 Commands in Detail . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1214 Using the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1229 Features and Benefits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1229 System Requirements for the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1230 Using the Desktop Agent Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1230 Installing the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1233 Connecting to the media server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1235 Using the Desktop Agent to Back Up Your Data . . . . . . . . . . . . . . . . . . . . . . . . . . . 1238 Modifying Desktop Agent Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1249 Synchronizing Desktop User Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1254 Viewing the Desktop Agent Status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1259 Restoring Files Using the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1264 Monitoring Job History in the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1269 Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1274 Troubleshooting the DLO Administration Console . . . . . . . . . . . . . . . . . . . . . . . . 1274
Administrators Guide - Table of Contents 35
Troubleshooting the Desktop Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1278 DLO Administration Console Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1281 Desktop Agent Error Codes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1284 DLO History Log Errors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1290 Glossary of Terms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1293 Appendix M. Symantec Backup Exec - Agent for Oracle Server . . . . . . . . . . . . . . . . . 1297 Requirements for Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1298 Backup Strategies for An Oracle Database Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1298 Types of Oracle Database Data You Can Protect . . . . . . . . . . . . . . . . . . . . . . . . . . 1299 Requirements for Configuring the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1300 Creating a New Oracle User Account for the Oracle Agent . . . . . . . . . . . . . . . . . 1301 Verifying ARCHIVELOG Mode and Automatic Archival Settings . . . . . . . . . . . 1302 Running Multiple Database Instances on a Single Server . . . . . . . . . . . . . . . . . . 1304 Using Fully Specified Paths for Oracle Data Files . . . . . . . . . . . . . . . . . . . . . . . . . 1305 Understanding the Oracle Agent Configuration Utility . . . . . . . . . . . . . . . . . . . . 1306 Installing the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1307 Configuring the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1308 Adding Media Servers to Use with the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . 1311 Backing Up Data Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1312 Backing Up an Entire Online Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1312 Backing Up Individual Online Tablespaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1314 Backing Up a Closed Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1315 Restoring the Oracle Database Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . 1316 Restoring an Online Oracle Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1317 Restoring a Closed Oracle Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1318 Restoring Individual Tablespaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1319 Restoring the Database Control File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1320 Disaster Recovery Using the Oracle Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321 Disaster Recovery Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1321
36
Administrators Guide
Recovering a Remote Oracle Database Server from a Disaster . . . . . . . . . . . . . . 1322 Recovering a Combination Oracle Database Server/Media Server . . . . . . . . . . . 1323 Oracle Agent Error Message Chart . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1324 Appendix N. Symantec Backup Exec - Agent for Lotus Domino . . . . . . . . . . . . . . . . 1327 Lotus Domino Agent Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1328 Installing the Lotus Domino Agent on the Media Server . . . . . . . . . . . . . . . . . . . . . . 1329 Viewing and Selecting Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1330 Configuring Default Lotus Domino Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1332 Backing Up Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1332 Supported Lotus Domino Database Configurations . . . . . . . . . . . . . . . . . . . . . . . . 1333 Lotus Domino Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1333 Backup Options for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1335 Restoring Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1337 Selecting Lotus Domino Databases for Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . 1338 Restore Options for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1340 Redirecting Restore Jobs for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . 1341 Preparing for Disaster Recovery on a Lotus Domino Server . . . . . . . . . . . . . . . . . . . 1343 Disaster Recovery of a Lotus Domino Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1343 Disaster Recovery of a Lotus Domino Server Using Archive Logging . . . . . . . . 1344 Disaster Recovery of a Lotus Domino Server Using Circular Logging . . . . . . . . 1345 Appendix O. Symantec Backup Exec - Agent for R/3 for Oracle Server . . . . . . . . . . . 1347 Backup Exec R/3 Agent Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1348 Backup Exec Alerts and the BACKINT Interface . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349 Requirements for Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1349 Installing the Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1350 Using the R/3 Agent to Back Up the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . 1350 Specifying Backup Exec Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1351 Backing Up the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1353 Restoring the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1354
Administrators Guide - Table of Contents 37
Disaster Recovery Using the Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . 1354 Disaster Recovery Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1355 Recovering a Remote R/3 Database Server from a Disaster . . . . . . . . . . . . . . . . 1355 Recovering a Combination R/3 Database Server/Media Server . . . . . . . . . . . . . 1356 Appendix P. Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1359 Requirements for the SharePoint Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1359 Installing the SharePoint Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1360 Using the SharePoint Agent with SharePoint Portal Server 2001 . . . . . . . . . . . . . . 1360 Backing Up SharePoint Portal Server 2001 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1362 Backing Up the SharePoint Portal Server Database . . . . . . . . . . . . . . . . . . . . . . . 1362 Backing Up Folders and Documents from a SharePoint Portal Workspace . . . 1362 About Restoring SharePoint Portal Servers and SharePoint Portal Workspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1364 Restoring a SharePoint Portal Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1364 Restoring a SharePoint Portal Workspace . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1365 Restoring Previous Versions of Documents from Workspace Backups . . . . . . 1365 Redirecting SharePoint Portal Server Restore Jobs . . . . . . . . . . . . . . . . . . . . . . . 1366 Redirecting Restored Workspace Data to Another Workspace . . . . . . . . . . . . . 1368 Redirecting Restored Workspace Data to a File Path . . . . . . . . . . . . . . . . . . . . . . 1369 Disaster Recovery of a SharePoint Portal Server . . . . . . . . . . . . . . . . . . . . . . . . . . 1370 Uninstalling and Reinstalling the SharePoint Portal Server Software . . . . . . . 1371 Best Practices for SharePoint Portal Server 2001 . . . . . . . . . . . . . . . . . . . . . . . . . 1371 Using the SharePoint Agent with SharePoint Portal Server 2003 . . . . . . . . . . . . . . 1372 Selecting SharePoint Portal Server 2003 Resources for Backup . . . . . . . . . . . . 1372 Adding a Server Farm to the Backup Selections List . . . . . . . . . . . . . . . . . . . . . . 1373 Disabling or Enabling Communication Between a Web Server and Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1374 Changing the Name of a Farm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1375 Deleting a SharePoint Portal Farm from the Microsoft SharePoint Server Farms Node . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1376
38 Administrators Guide
Backing Up SharePoint Portal Server 2003 Resources . . . . . . . . . . . . . . . . . . . . . 1376 Selecting SharePoint Portal Server 2003 Resources for Restore . . . . . . . . . . . . 1377 Restoring SharePoint Portal Sites, Services Sites, Document Library Stores, Configuration Databases, and Single Sign-on Databases . . . . . . . . . . . . . . . . . . . 1378 Restoring SharePoint Document Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1379 Restoring Previous Versions of Documents from Document Library Backups 1379 Redirecting a Restore Job for SharePoint Portal Server 2003 . . . . . . . . . . . . . . . 1381 Redirecting Restored Document Library Data to Another Document Library 1382 Redirecting Restored Document Library Data to a File Path . . . . . . . . . . . . . . . . 1383 Setting Default Options for SharePoint Portal Server 2003 . . . . . . . . . . . . . . . . 1384 Appendix Q. Symantec Backup Exec - Agent for Microsoft Data Protection Manager . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1385 Requirements for the Agent for Microsoft Data Protection Manager . . . . . . . . . . . 1386 Backup Job with DPM Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1386 Restore Job with DPM Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1389 Appendix R. Symantec Backup Exec - Remote Agent for NetWare Servers . . . . . . . 1391 Requirements for Installing the Remote Agent on a NetWare Server . . . . . . . . . . . 1392 Installing the Remote Agent on a NetWare Server . . . . . . . . . . . . . . . . . . . . . . . . . . . 1392 Adding NetWare Servers to the NetWare Agents List . . . . . . . . . . . . . . . . . . . . . . 1393 Adding BESTART to the AUTOEXEC.NCF File on the NetWare Server . . . . . . . 1393 Unloading the Remote Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1394 About Backing Up NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1394 Backing up the NetWare Directory Services (NDS) . . . . . . . . . . . . . . . . . . . . . . . . 1396 Backing Up NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1398 About Restoring NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1400 Restoring NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1400 Default Settings for the Remote Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1402 Saving Configuration Information for the NetWare Server . . . . . . . . . . . . . . . . . . . 1404 Disaster Recovery of NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1405
39
Appendix S. Accessibility and Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1407 Keyboard Navigation and Shortcuts in Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . 1408 General Keyboard Navigation Within the GUI . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1408 Keyboard Navigation Within Dialog Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1409 Keyboard Shortcuts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1410 Support for Accessibility Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1414
Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1415
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1429
40
Administrators Guide
Conventions
The following conventions are used in this manual:
Numbered steps are listed as 1., 2., etc. Text that you are required to type on the keyboard is preceded by the word "Type" and may be followed by any keys that you must press: For example: Type a:install and press <Enter>.
Text that you must replace is shown in an italic font. For example: JOB_PRIORITY=priority
Items that are on the Backup Exec interface are shown in a bold font. For example: On the Properties pane, under Settings, click Exchange
Keys
Keys appear in capital letters. For example: ENTER, ESC, DELETE, etc. When two or more keys need to be pressed simultaneously to perform a function, they appear with a plus sign. For example: SHIFT + F1
41
Conventions
42
Administrators Guide
Chapter
Backup Exec is a high-performance data management solution for Windows servers networks. With its client/server design, Backup Exec provides fast, reliable backup and restore capabilities for servers and workstations across the network. Backup Exec is available in configurations that can accommodate multi-platform networks of all sizes:
Installs on and protects any supported version of Microsoft Windows Server 2003, Windows 2000, and Windows XP Professional. Also includes Backup Exec agent software to protect unlimited remote workstations running on Windows XP Professional, Windows 2000 Professional, Windows Me, Windows 98, UNIX, and Macintosh platforms. This edition supports unlimited stand-alone drives. Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option. Support for protecting additional Windows Server 2003, Windows 2000, NetWare servers, databases, open files, and more can be purchased separately.
43
Installs on and protects Microsoft Small Business Server for Windows Server 2003 or Windows 2000, and Standard Edition operating systems. It includes the Backup Exec for Windows Servers Agent for Microsoft Exchange Server, Agent for Microsoft SQL Server, and Intelligent Disaster Recovery Option. You can purchase Small Business Server versions of the following options: Library Expansion Option, Advanced Open File Option, Desktop and Laptop Option, and the Remote Agent for Windows and NetWare Servers. With Small Business Server, the Remote Agent for Windows and NetWare Servers will only protect Windows servers; to protect NetWare servers or databases, you must upgrade to the Backup Exec for Windows Servers Edition. The Small Business Server Edition supports client workstations running Windows XP Professional, Windows 2000 Professional, Windows Me, and Windows 98. This edition supports unlimited stand-alone drives. Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option.
Installs on and protects any supported version of Microsoft Windows Server 2003 or Windows 2000. Also includes Backup Exec agent software for workstations running on Windows XP Professional, Windows 2000 Professional, Windows Me, Windows 98, UNIX, and Macintosh platforms. This edition supports unlimited stand-alone drives. Support for a single robotic library drive for use with Backup Exec is provided when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Library Expansion Option.
44
Administrators Guide
Custom filters
Vault rules
45
Whats New in Backup Exec Whats new in Backup Exec New Feature Backup Exec for Windows Server Environment Check Description This new utility runs before Backup Exec is installed and checks if the media server has the proper system environment (operating system version, service packs, etc.) and checks 3rd party application versions (Internet Explorer, ODBC, MDAC,etc.). Use audit logs to examine and review information about operations that have been performed in Backup Exec. The audit log displays the date and time of the activity, who performed it, the activity type, and a description of the activity. You can save audit logs as files, and groom audit logs as part of the Backup Exec database maintenance. In addition to applying a default error-handling rule to a group of similar errors, or an error category, you can now create a custom error-handling rule for one or more specific error codes in an error category. Errors that are reported in the job log each have a unique code, called a Unique Message Identifier (UMI). These codes contain hyperlinks that you can click to go to the Symantec Software Support Services web site and access technical notes and trouble-shooting steps that are related to a specific error. Unique Message Identifier (UMI) error code establishes unique error and message codes across all Symantec products.
Audit logs
46
Administrators Guide
Backup Exec Continuous The new Symantec Backup ExecTM Continuous Protection Server (CPS) Protection Server software uses disk-based data protection to ensure that business-critical data is always protected and available. CPS integrates with Backup Exec for traditional tape-based data protection, and delivers integrated management via Backup Exec SmartLink technology. CPS reduces administration costs by allowing end-users to restore their own files through an intuitive web-based interface. Agent for Microsoft Data The new Symantec Backup Exec - Agent for Microsoft Data Protection Protection Manager Manager (DPM Agent) enables network administrators to perform backup and restore operations between Microsoft Data Protection Manager (DPM) and Backup Exec. Centralized Admin Server Option The new Backup Exec for Windows Servers Central Admin Server Option (CASO) enables you to maximize your Backup Exec for Windows Servers investment by providing centralized administration and job processing and load balancing functionality for Backup Exec for Windows Servers media servers in your storage environment. The Central Admin Server Option transforms your stand-alone Backup Exec media server-based environment into a centrally managed data protection enterprise, built on the following concepts:
Use of a Backup Exec for Windows Servers media server as a centralized administration server. Use of the central administration server to store catalogs, device and media information, policies, jobs, and selection lists. Job log information generated by the various Backup Exec media servers can also be stored on this central server. Use of existing storage hardware using job delegation concepts, which enable you to distribute the processing of backup and restore jobs to various Backup Exec media servers on your network. Use of a scalable architecture to handle the future growth of data on your network.
47
Whats New in Backup Exec Agents and Options Whats new in Backup Exec agents and options Agent or Option Remote Agent for Linux/Unix Servers New Feature The new Symantec Backup Exec for Windows Servers Remote Agent for Linux/Unix Servers (RALUS) is installed as a separate, add-on component that enables Windows Server network administrators to perform backup and restore operations on major Linux and Unix hosts that are connected to the network. The following new features are available for IDR:
64-bit IDR. IDR is now available for remote, LAN-based computers that use Intel 64-bit Itanium processors. Alternate operating system media path. When you create bootable tape or CDs, you must provide the Windows operating system files. In previous releases of Backup Exec, IDR only accepted the Windows operating system installation CD. In this release, you can enter a path to the Windows operating system files on the network or to existing .iso image files. In addition, you can use MSDN-style CDs. Offline protection. If a computer crashes before you create disaster recovery media, IDR can still recover the computer if a full backup that includes information needed to restore the system was made prior to the crash. Support for VERITAS Storage Foundation for Windows. If you use VERITAS Storage Foundation for Windows on Windows 2003, IDR can restore the dynamic volumes. During backup, IDR gathers the components necessary to restore the dynamic volumes and adds them to the recovery media. Alternate location for storage of tape-based IDR image. You can now select the location where IDR stores the tape-based IDR image. Text file with partition information on IDR media. The bootable media now contains a text filed called <computer name>-diskconf.txt, which contains information about the computers hard disk layout.
Plug-and-play tape driver support is now available. The SharePoint Agent now enables you to back up and restore SharePoint Portal Server 2003 resources. The SharePoint Agent version supports SharePoint server farms.
48
Administrators Guide
Whats New in Backup Exec Agents and Options Whats new in Backup Exec agents and options Agent or Option Advanced Disk-based Backup Option New Feature The Advanced Disk-based Backup Option (ADBO) provides the following features: Synthetic backup - Uses a policy to enable a full backup to be assembled, or synthesized, from a baseline and subsequent incremental backups that are also contained in a policy. Offhost backup - Enables the backup operation to be processed on a Backup Exec media server instead of on the remote computer, or host computer. Moving the processing associated with backups from the remote computer to a media server enables better backup performance and frees up bandwidth on the remote computer as well. Advanced Open File Option The Advanced Open File Option (AOFO) now enables the backup of multiple volumes in one job, while creating a snapshot of only one logical volume at a time. (A logical volume can comprise multiple physical volumes. A single logical volume can encompass all of the volumes on which databases reside.) After the logical volume is snapped and backed up, the snapshot is deleted before the next logical volume is snapped. This option increases the ability to meet the minimum quiet time needed to complete a snapshot. The Remote Agent for Windows Servers and the Remote Agent for NetWare Servers are now available as one add-on option instead of two separate options.
Remote Agent for Use the Remote Agent for Windows Servers Monitor to check if a Windows Server Monitor backup or restore job is running on the computer. The Remote Agent Monitor is installed when the Remote Agent is installed on a remote Windows computer. You can set options for how often the Remote Agent Monitor checks for activity on the remote computer, to start the Remote Agent Monitor whenever you log on, to enable advertising from the Remote Agent to media servers, and to activate debug logging. SQL Agent The SQL Agent now supports the Microsoft Volume Shadow Copy Service (VSS) snapshot technology to create point-in-time, recovery consistent snapshots of SQL Server 2000 on Windows Server 2003. SQL Server 2000 snapshots can be created using the SQL Agent and the Advanced Open File Option (AOFO) for On-host local snapshots or the Advanced Disk-based Backup Option (ADBO) for Off-host transported snapshots. Using VSS snapshots in SQL reduces restore time.
49
Whats New in Backup Exec Agents and Options Whats new in Backup Exec agents and options Agent or Option Exchange Agent New Feature The Exchange Agent now supports the Microsoft Volume Shadow Copy Service (VSS) and the ExchangeVSS Writer snapshot technology to create point-in-time, recovery consistent snapshots of Exchange Server 2003 on Windows Server 2003. Exchange Server 2003 snapshots can be created using the Exchange Agent and the Advanced Open File Option (AOFO) for On-host local snapshots or the Advanced Disk-based Backup Option (ADBO) for Off-host transported snapshots. The Oracle Agent now supports some capabilities of Oracle Database Server version 10g. Users of Microsoft Operations Manager can proactively monitor and manage Backup Exec servers through the Microsoft Operations Manager Management Pack.
Oracle Agent
50
Administrators Guide
Symantec Backup Exec Library Expansion Option (LEO) enables support for multi-drive tape or optical robotic libraries and library storage systems. When utilizing the Advanced Device And Media Management (ADAMM) features, the Library Expansion Option provides extensive configuration and management capabilities which include unattended backup and restore operations, and bar code reader and portal support. Device partitioning allows you to assign specific robotic library slots for backup targets. For more information, see Symantec Backup Exec Library Expansion Option on page 1115. Symantec Backup Exec Advanced Open File Option ensures that all files on your network are protected even if they are being used. Whether used alone or in combination with specific database agents, this option handles open files at the volume level and is seamlessly integrated with Backup Exec. You do not need to know which files are open ahead of time; just set a scheduled backup to use this option. For more information, see on page 991. Symantec Backup Exec Intelligent Disaster Recovery Option (IDR) provides a recovery solution for both local and remote Windows systems. This option eliminates the need to manually re-install the entire operating system after a system crash. Using diskettes, CD-R/CD-RW, or bootable tape, IDR gets you back online fast by allowing you to restore from your last complete backup set - including full, incremental, differential and working set backups. For more information, see Symantec Backup Exec - Intelligent Disaster Recovery Option on page 901. Symantec Backup Exec Agent for Microsoft Exchange Server provides a fast and flexible way of protecting your online Exchange 5.5 and Exchange 2000 and 2003 Server data. This agent provides complete individual mailbox backup (also utilizing single instance restore), including protection for embedded messages, objects, attributes and all Outlook components. For more information, see Symantec Backup Exec - Agent for Microsoft Exchange Server on page 1065. Symantec Backup Exec Agent for Microsoft SQL Server fully protects active databases and verifies all of your SQL v7.0 and SQL 2000 data automatically. SQL 7.0 and SQL 2000 users can customize their data protection needs down to the filegroup level. For fast point-in-time backups, you can use this option to run transaction log backups with truncation. Redirected restores allow you to easily restore SQL data to other SQL servers on the network. For more information, see Symantec Backup Exec - Agent for Microsoft SQL Server on page 1013.
51
On Windows servers, the Remote Agent provides a Client Access License (CAL) to enable protection of remote Windows servers. With its exclusive Agent Accelerator technology, the Remote Agent uses source compression and distributed processing to optimize backup performance. For more information, see Symantec Backup Exec - Remote Agent for Windows Servers on page 789. On NetWare servers, the Remote Agent expands network-wide data protection by providing a Client Access License (CAL), fully protecting all NDS information across NetWare 4.2, 5.1, and 6.x environments. Data and special files on resources for a remote NetWare server can only be selected for backup with the Remote Agent is installed. In addition to backing up NetWare servers from your Windows media server, you get 100 percent SMS compatibility supporting the current versions of NetWare. You can set network defaults for all backup and restore operations performed on the NetWare servers by Backup Exec, including specifying a dynamic port range to be used by the Remote Agent. You can override these defaults each time you create a backup or restore job. For more information, see Symantec Backup Exec - Remote Agent for NetWare Servers on page 1391.
Symantec Backup Exec Agent for Oracle provides seamless online backup protection for Oracle Database Server versions 8.0.5, 8i-8.1.6, 9i, 10g, and Oracle Application Server 9i. Integrating Oracle backup with the advanced features of Backup Exec provides data protection of both individual table spaces as well as complete Oracle databases. You can also include archived redo files and control files without taking them offline. For more information, see Symantec Backup Exec Agent for Oracle Server on page 1297. Symantec Backup Exec Agent for R/3 for Oracle Server provides superior data protection by allowing backups of critical data while the application is still online and in use. The R/3 Agent, certified by SAP, is a reliable solution that allows Backup Exec to provide both local and remote protection of the latest versions of SAPR/3 databases utilizing the SAP (BC-BRI BACKINT) interface while enabling you to efficiently manage your data. For more information, see Symantec Backup Exec Agent for R/3 for Oracle Server on page 1347. Symantec Backup Exec Agent for Lotus Domino provides seamless online backup protection for versions 5 and 6. Using Lotus Domino APIs, the Agent for Lotus Domino now fully supports transactional logging, providing users with uncompromising data protection of the entire Lotus Domino server. For more information, see Symantec Backup Exec - Agent for Lotus Domino on page 1327. Symantec Backup Exec SAN Shared Storage Option (SAN SSO) allows Backup Exec to operate in a Storage Area Network (SAN), providing a high performance LAN-free backup solution. SAN SSO allows multiple distributed media servers to share common, centralized storage devices connected over a SAN. This configuration provides greater efficiency and fault tolerance. In addition to increasing
Administrators Guide
52
performance and backup speeds in the SAN environment, the Shared Storage Option load balances backup activity across multiple Backup Exec media servers and centralizes management tasks while lowering the total cost of hardware ownership. For more information, see Symantec Backup Exec - SAN Shared Storage Option on page 957.
Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server protects all of the files and attributes associated with an installation of SharePoint Portal Server 2001 or 2003. Backup Exec, which offered the first complete backup and recovery solution for SharePoint Portal Server, now allows backup and restore of individual workspaces and documents. Restores can be made to the original SPS information store or redirected to another SPS information store without affecting other workspaces. For more information, see Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server on page 1359. Symantec Backup Exec - ServerFree Option enables you to increase backup performance by making media server processor resources available and moving the backup processing operations to hardware solutions that may be installed in your storage area network. Use of this option requires Symantec Backup Exec Advanced Open File Option and Symantec Backup Exec SAN Shared Storage Option. For more information, see Symantec Backup Exec - ServerFree Option on page 981. Symantec Backup Exec - Desktop and Laptop Option enables you to protect all business data. It provides continuous backup protection whether users are in the office or on the road. Users can synchronize files between their desktop and laptop. For more information, see Backup Exec Desktop and Laptop Option on page 1121. Symantec Backup Exec - Central Admin Server Option enables you to maximize your Backup Exec for Windows Servers investment by providing centralized administration and load balanced job processing functionality for existing or newly configured Backup Exec for Windows Servers media servers. For more information, see Symantec Backup Exec - Central Admin Server Option on page 819. Symantec Backup Exec for Windows Servers - Advanced Disk-based Backup Option (ADBO) enables the following types of backup:
Synthetic backup - This feature enables a backup to be assembled, or synthesized, from one previous full or incremental backup and subsequent incremental backups. This feature eliminates the need to run full backups, and because the synthesis is performed on the Backup Exec media server without accessing the remote computer, the overall backup window and the network bandwidth requirements are reduced. Offhost backup - This feature allows the backup operation to be moved away from the remote computer to a Backup Exec media server in a fiber connected SAN environment. Moving the backup from the remote computer to a media server enables better backup performance and frees the remote computer as well.
53
For more information, see Symantec Backup Exec - Advanced Disk-based Backup Option on page 875.
Symantec Backup Exec for Windows Servers Remote Agent for Linux/Unix Servers (RALUS) enables Windows Server network administrators to perform backup and restore operations on Linux, Unix and Solaris workstations and servers that are connected to the network. This agent must be running on these computers before backup or restore operations can be performed. For more information, see Symantec Backup Exec - Remote Agent for Linux or Unix Servers on page 803. Symantec Backup Exec - Agent for Microsoft Data Protection Manager - enables network administrators to perform backup and restore operations between Microsoft Data Protection Manager (DPM) and Backup Exec. For more information, see Symantec Backup Exec - Agent for Microsoft Data Protection Manager on page 1385.
54
Administrators Guide
Through the Administration Console, you configure settings, called default options, that you want Backup Exec to use for most jobs. However, you can override these default options while setting up a specific jobs such as a weekly backup of selected workstations. You can create a once-only job, such as a restore of a particular file to a server, or you can schedule recurring jobs, such as daily backup jobs.
55
Wizards guide you through most Backup Exec operations, including the creation of a backup or restore job, setting up media rotation jobs, and setting media overwrite protection. You can monitor a jobs progress through the Job Monitor, or use Backup Execs Calendar to quickly view all jobs scheduled to run for the day, week, or month. The media server contains media and device databases designed to simplify the process of organizing and allocating storage devices attached to your media server and to aid in preventing media from being accidentally overwritten. Through Backup Execs device management functions, you can logically group storage devices together in device pools. Through the media management function, you can organize, track, and troubleshoot all of the media in your library. You can define:
Overwrite protection periods to ensure that media is not accidentally overwritten. Set up automatic media labeling. View media statistics such as the medias age, hours of use, number of mounts, bytes written and read, and errors encountered, which are automatically tracked by Backup Exec.
After a job has been processed, the jobs results are stored in a job history database. A record of the data that was backed up is kept in Backup Execs catalog. The job history is a report of what happened during the processing of the job (statistics, errors, and so on), and the catalog file is the record from which restore selections are made.
56
Administrators Guide
Chapter
Running the Backup Exec Environment Check on the computer on which you are installing Backup Exec. The Environment Check analyzes the computer to make sure that the installation process can complete. If configuration issues are found that can be fixed by Backup Exec during the installation, or that may prevent the installation, warnings are displayed. Installing the storage device hardware (controller, drives, robotic libraries) in the media server. Refer to the documentation included with your storage device hardware for installation instructions. Use the appropriate Windows hardware setup functions to configure your controller and storage devices. Refer to your Microsoft Windows documentation for more information. Installing Backup Exec software on the media server. Backup Exec program files are installed on the media server from the Backup Exec installation CD. During installation, files required for workstation agent installation are also copied to the media server. Rebooting the media server to initialize changes (when necessary).
Microsoft SQL Server 2000 Desktop Engine (MSDE) Components Installed with Backup Exec
The Backup Exec installation program installs Microsoft SQL Server 2000 Desktop Engine (MSDE 2000) Service Pack 3a components required to run Backup Exec. These include SQL Server 2000 core components, Microsoft Data Access Components (MDAC) 2.8, and Open Database Connectivity (ODBC) 3.0. With ODBC, the installation program installs and configures the base 32-bit ODBC administrator 3.0, including runtime dynamic link libraries (DLLs), and the ODBC driver for the Backup Exec catalogs.
57
Microsoft SQL Server 2000 Desktop Engine (MSDE) Components Installed with Backup Exec
If you are running applications that use earlier versions of these components, problems may occur due to the upgraded drivers. If problems occur, contact the vendor of the incompatible software to obtain a version compatible with the MDAC. Caution The MDAC version that Backup Exec installs as part of the MSDE 2000 installation is incompatible with a clustered version of Microsoft SQL Server 7.0. Do not install Backup Exec on a clustered version of SQL 7.0 server. If an existing SQL instance is detected, you will be prompted to do one of the following:
Install the required MSDE 2000 components with Backup Exec and create a default Backup Exec instance. Select a Microsoft SQL Server 2000 (with service pack 3a) instance that already exists on the network on which you want to run Backup Exec.
If you choose to install Backup Exec into an existing SQL 2000 instance, make sure that SQL 2000 Service Pack 3a or later is installed before you continue with the installation. When Backup Exec is installed into an existing instance, the automated master database restore feature is not available. To recover the Master database, you must replace it with the Master database copy that Backup Exec automatically creates and updates when the Master database is backed up. When Backup Exec is installed into an existing instance, the Cluster Configuration Wizard is not available. Note If you are installing a managed media server, it is recommended that you select a local Microsoft SQL Server 2000 (SP3a) instance on which to install the Backup Exec database for this managed media server. Do not select the same SQL Server instance that is used by the central administration server.
58
Administrators Guide
System Requirements
System Requirements
The following are the minimum system requirements for running this version of Backup Exec:
Minimum System Requirements Operating System Microsoft Windows 2000 Server family. Microsoft Windows Server 2003 family. Microsoft Windows XP Service Pack 1 or later. Microsoft Windows Storage Server 2003 Microsoft Small Business Server 2003 Standard and Premium Microsoft Small Business Server 2000 Internet Browser Processor Memory Internet Explorer 6.0 or later. Intel Pentium, Xeon, or compatible Required: 256 MB RAM Recommended: 512 MB RAM (or more for better performance). Note RAM requirements may vary depending on operations performed, the options installed, and the specific machine configuration. Virtual Memory Recommendations: 20 MB above Windows recommended size for total paging file size (total for all disk volumes). To view or set the paging file size:
On Windows 2000, click Start, point to Settings, and then click Control Panel. Double-click System, click the Advanced tab, and then click Performance Options. Click Change to reset the paging file size for all drives. On Windows Server 2003 and Windows XP, go to Control Panel, double-click System, click the Advanced tab, and then in Performance, click Settings. Click the Advanced tab, and then in Virtual memory, click Change to reset the paging file size for all drives.
Disk Space
Note Disk space requirements may vary depending on operations performed, the options installed, and the specific system configuration. Backup Exec database and catalogs will require additional space.
59
(Recommended if remote activity is to be performed) Network interface card or a virtual network adapter card. CD-ROM drive. (Recommended) A mouse. (Optional for pager notification) Modem supported by Microsoft Windows. (Optional for printer notification) Printer supported by Microsoft Windows.
Storage Hardware
Backup Exec requires at least one storage media drive and/or single-drive robotic library and the appropriate controller card. Removable storage devices and non-removable hard drives can also be targeted for backups. Refer to the Backup Exec hardware compatibility list (http://support.veritas.com/rd/bews-compatibility.htm) for a complete list of devices that are supported. Support for a single robotic library drive is available when you purchase Backup Exec. To enable support for additional robotic library drives, you must purchase the Backup Exec Library Expansion Option.
60
Administrators Guide
Servers in one domain. Servers and selected workstations in one domain. Servers in more than one domain. Servers and workstations in more than one domain.
The following procedures give the Backup Exec service account administrative rights in the appropriate domains and workstations. You must grant the Backup Exec service account administrative rights to give Backup Exec access to the administrative shares (for example, C$) and the ability to protect the Windows registry.
For Windows 2000, use the Active Directory Users and Computers tool and Domain and Trusts tool in the Active Directory administrative tools group.
When prompted for a user name in the Service Account window, add the name of an existing or new Service Account (for example, Administrator) as a member of the local Administrators group for the Domain. It is highly recommended that you also enter a password.
If you are backing up servers and selected workstations in one domain: 1. Add the name of an existing or new Service Account (for example, Administrator) as a member of the Global Domain Admins group. 2. Ensure that on each workstation in the domain you want to back up, the Global Domain Admins group is a member of the workstations local Administrators group. If you are backing up servers in more than one domain: 1. Establish a One Way Trust Relationship between the Host Domain (the domain in which the media server resides) and the Target Domains (the domains that are to be backed up): a. In the Host Domain, permit the Target Domains to trust the Host Domain.
61
2. In each Target Domain, add the Host Domains name of an existing or new Service Account (for example, Administrator) in the local Administrators group. If you are backing up servers and workstations in more than one domain: 1. Establish a One Way Trust Relationship between the Host and Target Domains: a. In the Host Domain, permit the Target Domains to trust the Host Domain.
b. In each Target Domain, trust the Host Domain. 2. In each Target Domain, add the Host Domains name of an existing or new Service Account (for example, Administrator) in the Local Administrators group. 3. On each workstation to back up, add the Host Domains name of an existing or new Service Account (for example, Administrator) in the Local Administrators group.
62
Administrators Guide
If the computer meets the minimum requirements for installation, such as the operating system, disk and memory space, sufficient logon account privileges, etc. If third-party software that uses Backup Exec ports is configured correctly. If required components are installed, and if they are versions that are compatible with Backup Exec. If previous versions of Backup Exec and Backup Exec options are installed. If storage device hardware and associated drivers are properly installed and recognized by the Windows operating system.
For each item, the Environment Check reports if it passed the check, if additional configuration during the Backup Exec installation will be necessary, or if changes will be required before the Backup Exec installation can be successful. It is recommended that you run the Backup Exec Environment Check on a computer before you install Backup Exec. You can also run it at any time after installation to check the computers configuration. To run the Backup Exec Environment Check: 1. Insert the Backup Exec installation CD into a drive on the computer that you want to review. 2. From the installation CD browser, under Installation, click Backup Exec Environment Check. The Welcome screen for the Backup Exec Environment Check appears. 3. Click Next to start the check. The results that are reported for each item are:
Passed. There are no incompatibilities that will prevent the Backup Exec installation. For hardware, this result indicates that the hardware configuration is recognized by Backup Exec. Warning. An incompatibility with Backup Exec exists, but can be resolved during the Backup Exec installation. Failed. An incompatibility with Backup Exec exists, and it will cause the installation to fail. Some action is required before you can successfully install Backup Exec.
63
A final summary in the results window on the Backup Exec Environment Check lists recommended and required actions. You can print the results by clicking Print on the Environment Checks screen. The results are also saved to: C:\temp\VERITAS\EnvironmentChecks.html. 4. Click Finish to exit the wizard.
64
Administrators Guide
System Rights
65
Installing Backup Exec Minimum system requirements (continued) The Backup Exec Service Account All Backup Exec services on the media server run in the context of a user account configured for the Backup Exec system services. This account can be created during the Backup Exec installation, or an existing user account can be used. To create a service account for Backup Exec during installation, enter the name and password of an Administrator account for the Backup Exec services to use. If this computer is in a domain, enter a Domain Administrators account, or an equivalent account that is part of the Domain Admins group. In the Domain list, select or enter the Domain name. If this computer is in a workgroup, enter an Administrators account, or an equivalent account that is part of the Administrators group on the computer. In the Domain list, select or enter the computer name. The account designated for Backup Exec services - whether it is a new account or an existing user account - will be assigned the following rights:
Authenticate as any user and gain access to resources under any user identity. Create a token object, which can then be used to access any local resources. Log on as a service. Administrative rights (provides complete and unrestricted rights to the computer). Backup operator rights (provides rights to restore files and directories). Manage auditing and security log.
Due to security implementations in Microsoft Small Business Server, the service account must be "Administrator." On a computer running Windows Server 2003 or Windows XP, you cannot install Backup Exec using a service account that has a blank password. If you attempt to do so, the following error message displays when Backup Exec services are created: "The given password is not correct for account [server]\[username]." You can configure Windows to allow for blank passwords. For more information, see your Windows documentation.
Related Topics: Installing Backup Exec Using the Installation Program on page 67 Installing Backup Exec Using the Command Line (Silent Mode) on page 81
66
Administrators Guide
To install to a local computer, select Local Install and Install Backup Exec software and options, and then continue with step 5. To install the Administration Console as a Remote Administrator, select Install Remote Administration Console only, and then go to step 4 in Installing the Backup Exec Remote Administrator on page 95 for further instructions. To install Backup Exec, Backup Exec options, and Backup Exec remote agents to remote computers, select Remote Install. If you are not also performing a local install, clear the check box for Local Install.
To install Backup Exec media servers and options to remote computers, go to Installing Backup Exec to Remote Computers on page 73 for further instructions. To install the Backup Exec Remote Agent for Windows Servers, the Advanced Open File Option, or the Desktop and Laptop Agent to remote computers, or to install the Backup Exec NetWare Agent to remote NetWare servers, go to Installing Backup Exec Agents to Remote Computers on page 77 for further instructions.
5. Click Next. The Symantec Backup Exec Serial Numbers dialog box appears.
67
If you are upgrading from a previous version of Backup Exec, see Upgrading from Previous Versions of Backup Exec on page 104. 6. You can type the serial numbers for Backup Exec and any options, or you can import an existing besernum.xml file to enter the serial numbers.
To manually enter the serial numbers for Backup Exec and any additional options, type the serial number into the field, and then click Add. When finished, click Next. To import the serial numbers from a file, click Import, and then browse for and select an existing besernum.xml file. When finished, click Next.
Note When you click Next, the serial numbers you entered are saved to the file besernum.xml, located in the Windows directory. If a previous installation of Backup Exec for Windows Servers is found on the computer, the serial number appears in the Existing Serial Numbers field. To remove an older serial number, select the number and click Remove. A serial number is not required for Backup Execs fully functional Evaluation version.
To install an Evaluation version, click Next without entering serial number information. Installing an Evaluation version enables many options that must be purchased separately and are not included as part of Backup Exec.
Note For information about clustering Backup Exec, see Installing Backup Exec on a Microsoft Cluster Server on page 660. 7. Review the local features to be installed. You can also select additional features that are available for install when you enter a Backup Exec for Windows Servers serial number. These additional features are:
Copy Server Configurations - Enables you to copy server configurations, logon account information, jobs, policies, and selection lists to remote media servers. You cannot select this feature if you entered a CASO serial number. Tivoli Storage Manager Option - This option enables the TSM servers storage resources to appear as a tape robotic library in a list of target devices on the Backup Exec server. Backup Exec administrators can then direct the output of any Backup Exec job to the TSM server by selecting the name of the TSM robotic library as the destination when submitting the job. For more information, see Symantec Backup Exec - Tivoli Storage Manager on page 771.
68
Administrators Guide
Create Clone CD - A clone CD image captures the Backup Exec installation program and your installation settings, such as account information, additional options, and destination directory. After the CD image has been created, it can be copied to a CD. You can then use that CD to install Backup Exec on additional servers using the same settings. For more information, see Installing Locally Using a Clone CD Image on page 99. Managed Media Server - Makes a standalone media server into a managed media server that is controlled by the central administration server. You cannot select this feature if you entered a CASO serial number.
These features are not selected for install by default, so if you want to use them, you must select them. All features that are not to be installed have a red "X" displayed in the feature icon. To enable any of these options, click the icon to clear the X, and then follow the prompts to install it. If the feature icon is gray, the option is not available for change. 8. To accept the local features for installation, and to accept the default Destination Folder for Backup Exec, click Next. To select another destination folder for Backup Exec, click Change, and follow the prompts. Note Selecting a mount point as the destination directory is not recommended because the mount point is deleted if Backup Exec is uninstalled. 9. Provide a user name and password that the Backup Exec system services can use (see The Backup Exec Service Account on page 66), and then click Next. The Symantec Backup Exec Database dialog box appears, and you are prompted to select a location on which to store the Backup Exec database. 10. Do one of the following:
Choose to create a local Backup Exec MSDE instance on which to store the Backup Exec database, and then click Next. For more information about creating a local Backup Exec MSDE instance, see Microsoft SQL Server 2000 Desktop Engine (MSDE) Components Installed with Backup Exec on page 57. Choose to use an existing SQL Server 2000 instance (with service pack 3a installed) that is on the network. You are prompted to select an instance from a list, or to type the instance name, and then click Next. Backup Exec will attempt to connect to the instance.
69
Note When Backup Exec is installed into an existing instance, the automated master database restore feature is not available. To recover the Master database, you must replace it with the Master database copy that Backup Exec automatically creates and updates when the Master database is backed up. When Backup Exec is installed into an existing instance, the Cluster Configuration Wizard is not available. 11. If prompted, select how the VERITAS Device Driver Installer should install device drivers for the tape storage devices that are connected to the server, and then click Next. It is recommended that you select Use VERITAS device drivers for all tape devices. 12. If you are prompted, enter information or choose settings for additional options being installed. Click Next after each selection. 13. Read the Backup Exec installation review, and then click Install. The MSDE 2000 (if selected), VERITAS Update, and Backup Exec program files are installed. 14. When the installation is complete, you can register Backup Exec online, view the readme, create a shortcut to Backup Exec on the desktop, and restart the computer. If Restart System appears, restart the computer in order for the configuration to take effect. An installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed. This file lists any errors that may have occurred during installation. The last line of the log indicates if the installation was successful and if restarting the computer is required. After installing Backup Exec on the media server, Backup Exec Workstation Agent software can be installed and configured on remote workstations on the network. Related Topics: Getting Started on page 107
70
Administrators Guide
71
6. To accept the local features for installation, and to accept the default Destination Folder for the option, click Next. To select another destination folder for the Backup Exec options, click Change, and follow the prompts. All options that are not to be installed have a red "X" displayed in the feature icon. To enable any of these options, click the icon to clear the X, and then follow the prompts to install it. If the feature icon is gray, the option is not available for change. 7. If you are prompted, enter information or choose settings for additional options being installed. Click Next after each selection. 8. Read the Backup Exec installation review, and then click Install. The Backup Exec services are stopped while the additional options are installed. If any active jobs are running, you are prompted to stop them, or to wait for the jobs to finish. When the installation is complete, the services are restarted. 9. Click Finish. Related Topics: Installing Backup Exec to Remote Computers on page 73 Installing Backup Exec Agents to Remote Computers on page 77
72
Administrators Guide
An Evaluation version of Backup Exec The Not For Resale (NFR) option
If you are installing Backup Exec through Terminal Services and the installation media is on a shared drive (CD-ROM or network share) you must install using a UNC path. Installation via mapped drives is not supported. Note You can also use Microsofts Add/Remove Programs utility to install Backup Exec to a remote computer. See your Microsoft documentation for more information. To install Backup Exec to a remote computer: 1. Do one of the following:
If you are installing Backup Exec for the first time from the installation CD browser, select the option to install Symantec Backup Exec, and then when prompted, click Next to proceed with the installation. Select I accept the terms of the license agreement, and then click Next. If Backup Exec is already installed on the local computer, on the Tools menu, click Serial Numbers and Installation. Click Next when the Welcome window appears.
2. To install Backup Exec media servers and options to remote computers, select Remote Install, and then click Next. 3. Right-click Backup Exec Servers and then do one of the following:
Click Add Remote Computer, and then browse the list to select all of the remote computers that you want to install an option to, and then click Next. Click Add Remote Computer Manually, and then type the Domain and Computer Name, and then click OK. Add as many remote computers as you want to install Backup Exec to.
4. Type the user name, password, and domain credentials of an account that has administrative rights on the remote computers, and then click OK. Note To avoid entering credentials separately for each remote computer that you have selected, click Use this user name and password when attempting to connect to additional computers during the installation.
Chapter 2, Installing Backup Exec 73
Description Select this option to enter serial numbers for the remote computers. During the install, you are prompted for the serial numbers for the remote computers. If you select this option to install Backup Exec for Windows Servers to a remote computer, then you are prompted to select a destination folder. You can accept the default destination folder on the remote computer, or make changes. After selecting this option, continue with step 6 on page 74.
Select this option to install remotely using all of the installation options installed on the local computer. When this option is used, you cannot change any settings on the remote computer. For example, if you have installed the Intelligent Disaster Recovery option locally, this option will also be installed remotely. After selecting this option, continue with step 14 on page 76.
Select this option to install remotely using the clone file settings that may be contained on a clone CD image or that could also be contained in a previously created parameter file (see Creating and Using Installation Parameter Files on page 89). When this option is selected, you can browse to a parameter file. After selecting this option, continue with step 14 on page 76.
6. On the Destination Folder dialog box, enter the folder to which the Backup Exec media server files on the remote computer will be installed, and then click OK. The default location is C:\Program Files\VERITAS\Backup Exec\NT. 7. Type the serial numbers for Backup Exec and any options that you want to install. Click Add after entering each serial number. When finished, click Next. To import the serial numbers from an existing besernum.xml file, click Import, and then browse for and select an existing besernum.xml file. When finished, click Next. The serial numbers you entered are saved to the file besernum.xml, located in the Windows directory. Note A unique serial number must be entered for each option for each remote computer that you are installing to.
74
Administrators Guide
If a previous installation of a Backup Exec for Windows Servers is found on the computer, the serial number appears in the Existing Serial Numbers field. To remove an older serial number, select the number and click Remove. A serial number is not required for a fully functional Evaluation version. 8. Provide a user name and password that the Backup Exec system services can use (see The Backup Exec Service Account on page 66), and then click Next. 9. You are prompted to select a location on which to store the Backup Exec database. Do one of the following:
Choose to create a local Backup Exec MSDE instance on which to store the Backup Exec database, and then click OK. For more information, see Microsoft SQL Server 2000 Desktop Engine (MSDE) Components Installed with Backup Exec on page 57. Choose to use an existing Microsoft SQL Server 2000 instance (with service pack 3a installed) that is on the network. You are prompted to select an instance from a list, or to type the instance name, and then click OK. Backup Exec will attempt to connect to the instance.
Note When Backup Exec is installed into an existing instance, the automated master database restore feature is not available. To recover the Master database, you must replace it with the Master database copy that Backup Exec automatically creates and updates when the Master database is backed up. When Backup Exec is installed into an existing instance, the Cluster Configuration Wizard is not available. 10. You are prompted to install device drivers for tape storage devices that are connected to the server. You can only click OK, and continue with the installation. After Backup Exec is installed, you can install device drivers for the tape storage devices. See step 20. The Remote Installation Status dialog box appears, and selected options are installed on the remote computer. If the remote computer needs to be restarted, the installation status column displays the message that a reboot is required. 11. If you are prompted, enter information or choose settings for additional options being installed. Click Next or OK after each selection. 12. Review the features to be installed, and then click Next.
Chapter 2, Installing Backup Exec 75
All options that are not to be installed have an "X" displayed in the feature icon. To enable any of these options, click the icon to clear the X, and then follow the prompts to install it. If the feature icon is gray, the option is not available for change. 13. Read the Backup Exec installation review, and then click Install. When Backup Exec is being installed to a remote computer, if the Microsoft Data Access Components (MDAC) version on the remote computer needs to be updated to the version that ships with Backup Exec (MDAC v2.8), you are prompted to restart the remote computer. Go to step 14. If the MDAC version does not need to be updated, continue with step 9. For more information on the MDAC version that is installed with Backup Exec, see Microsoft SQL Server 2000 Desktop Engine (MSDE) Components Installed with Backup Exec on page 57. 14. If the MDAC version on the remote computer must be updated, restart the remote computer. Right-click the computer name, and then click Reboot Computer. 15. After the computer has restarted, right-click the computer name and select the Retry Install option. Verify the credentials when prompted. 16. To restart the remote computer now, on the Remote Installation Status dialog box, right-click the server name, and then click Reboot Computer. You can also wait, and restart the remote computer after you exit the installation wizard. The installation status column displays the message that the computer is rebooting. 17. When the installation status indicates that the reboot is 100% complete, right-click the server name again, and click View Install Log or View Push Log. An installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed. This file lists any errors that may have occurred during installation. The last line of the log indicates if the installation was successful and if restarting the computer is required. 18. Exit the log, and then on the installation wizard, click Next, and then click Finish to exit the wizard. 19. If you did not restart the remote computer, you may need to do it now in order for the configuration to take effect. 20. (Optional) To install device drivers for the tape storage devices that are connected to the server, do the following:
76
Administrators Guide
a.
Using either the First Time Wizard, or the Device Configuration Wizard, on the Detected Hardware page, click Configure Devices.
b. On the Device and Resource Management for Windows 2000 screen, click the button to install VERITAS device drivers. c. On the VERITAS Device Driver Installation Welcome page, click Next.
d. Choose an option to install tape drivers. It is recommended that you select Use VERITAS device drivers for all tape devices. For more information, see Configuring Devices on page 128.
Backup Exec for Windows Servers (see Installing Backup Exec to Remote Computers on page 73) Remote Agent for Windows or NetWare Servers Advanced Open File Option (AOFO) Desktop and Laptop Option (DLO) Desktop Agent Backup Exec DPM Agent
These features are push-installed to remote computers from a media server. Push installations save time by eliminating the need for local access at the target computer for the installation to be successful. You can also push-install the Remote Agent for Windows Servers and the AOFO using the command line. See Push-Installing the Remote Agent for Windows Servers and the Advanced Open File Option Using the Command Line on page 87. Note Before installing the Advanced Open File Option to a remote computer, enable the remote registry. Make sure that the logon account that is used has permissions to modify remote servers registries. You cannot push-install the Backup Exec Remote Agent for Windows Servers to a remote Windows XP Professional computer when the operating system on the remote computer is in the ForceGuest configuration and the remote computer is not in a domain. ForceGuest is a configuration that limits incoming users to Guest-level access. Instead,
77
you must locally install the Remote Agent on the Windows XP computer by using the installation CD, or over the network by following the procedure in Installing Backup Exec Using the Command Line (Silent Mode) on page 81. You cannot push install the 64-bit version of the Remote Agent for Windows Servers. Note If you are installing Backup Exec agents and options through Terminal Services and the installation media is on a shared drive (CD-ROM or network share) you must install using a UNC path. Installation via mapped drives is not supported. To install a Backup Exec agent or option to a remote computer: 1. Do one of the following:
If Backup Exec is already installed on the local computer, on the Tools menu, click Install Remote Agents. Click Next when the Welcome window appears. Then proceed to step 2. If you are installing Backup Exec for the first time from the installation CD browser: Select the option to install Symantec Backup Exec, and then when prompted, click Next to proceed with the installation.
a.
b. Select I accept the terms of the license agreement, and then click Next. c. To install Backup Exec remote agents and options to remote computers, select Remote Install, and then click Next. If you do not need to install any Backup Exec options to the local computer, clear the Local Install selection.
2. Right-click Windows Remote Agents or NetWare Remote Agent to display a menu for selecting the remote computer or computers that you want to install to:
Windows Remote Agents. Enables you to install the Backup Exec Remote Agent for Windows Servers, the Advanced Open File Option, and the Desktop and Laptop Options Desktop Agent to a remote computer. NetWare Remote Agents. Enables you to install the Backup Exec Remote Agent for NetWare Servers to a remote NetWare server.
3.
Click Add Remote Computer, and then browse the list to select all of the remote computers that you want to install an option to, and then click Next. Click Add Remote Computer Manually, and then type the Domain and Computer Name, and then click OK.
78
Administrators Guide
Add as many remote computers as you want to install the option to. 4. Type the user name, password, and domain credentials of an account that has administrative rights on the remote computers, and then click OK. Note To avoid entering credentials separately for each remote computer that you have selected, click Use this user name and password when attempting to connect to additional computers during the installation. 5. In the Features pane, click the selection box next to the option that you want to install, and then select This feature will be installed on <server names> hard drive. All features that are not to be installed have an "X" displayed in the feature icon. To enable any of these options, click the icon to clear the X, and then follow the prompts to install it. If the feature icon is gray, the option is not available for change. If you are installing the Remote Agent for Windows or NetWare Servers, continue with step 6; otherwise, go to step 8. 6. When the Enable Network Backups (Optional) dialog box appears, select the appropriate options as follows:
Enable Network Backups (Optional) dialog box Item Enhance backups run over the network for <server name> Description Click this check box to direct primary backup traffic generated by Backup Exec to a specific local network. Then specify the media server that will use an alternate network in the Media server name or IP address field. For each media server that you enter, you can specify a local network for traffic generated by backup and restore jobs when operations are performed between the media server and the remote computer on which the Remote Agent is installed. For more information, see Specifying Default Backup Network and Firewall Options on page 336. Media server name or IP address Type the name or IP address of a media server that will use an alternate network to back up the computer on which the Remote Agent is installed. After entering a media server name or IP address, click Add to enter the media server on the displayed list. To change a media server name or IP address, select the media server in the displayed list, and then click Edit.
Add
Edit
79
Installing Backup Exec to Remote Computers Enable Network Backups (Optional) dialog box (continued) Item Remove Description To delete a media server name or IP address from the list of media servers to advertise to, select the media server in the displayed list, and then click Remove.
To bypass this dialog box and continue with the installation, click OK. If you skip this dialog box, you can add media server names or IP addresses later by using the Remote Agent Monitor on the remote computer. For more information, see Enable Advertising for the Remote Agent for Windows Servers on page 800. 7. Click Next. 8. Read the installation review, and then click Install. The Remote Installation Status dialog box appears, and selected options are installed on the remote computer. 9. When the installation status indicates that the reboot is complete, right-click the server name again, and click View Install Log or View Push Log. 10. When the installation is complete, click Next, and then click Finish. You may need to restart the computer in order for the configuration to take effect. An installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed. This file lists any errors that may have occurred during installation. The last line of the log indicates if the installation was successful and if restarting the computer is required. Note If there are problems installing the Backup Exec Remote Agent using this method, you can try to manually install the Remote Agent (see Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line on page 794.) 11. Exit the log, and then on the installation wizard, click Next, and then click Finish to exit the wizard. 12. If you did not restart the remote computer, you may need to do it now in order for the configuration to take effect.
80
Administrators Guide
Backup Exec installation CD. Administrator privileges on the computer where you want to install, configure, or uninstall Backup Exec.
To install Backup Exec using the command line: 1. Open a Windows command prompt. 2. Change to the drive containing the Backup Exec CD. 3. Change directories to \WINNT\INSTALL\BE. 4. Type setup /TS: and the appropriate switches. For example: setup /TS: /USER:<user> /DOM:domain /PASS:password /SNO:serial number -S For descriptions of the switches, see Command Line Switches for Backup Exec Silent Mode Installation on page 82. If you use the command line switches without the -S switch, the Backup Exec installation program launches with the command line parameters as defaults for the installation options. For example, if -S had been left in the above example, the Backup Exec installation program launches with the user name, domain, password, and serial number appearing on the installation dialog boxes. 5. Press ENTER. An installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed. This file lists any errors that may have occurred during installation, and is the only source of feedback when running setup.exe. The last line of the log indicates if the installation was successful and if restarting the computer is required.
81
Substitute values appropriate for your environment for values shown in italics; for example substitute your password for password. Enclose the value in quotation marks if it contains spaces, such as Operations Weekly Backup.
/DOCS:
82
Administrators Guide
Installing Backup Exec to Remote Computers Command Line Switches for Silent Mode Installation of Backup Exec (continued) Switch Additional Switches /NOINSTALL: Description Allows you to select all install options without actually installing the Backup Exec software. This option can be used in conjunction with the /CPF: or /XML: switches. Specifies one or more serial numbers to use for installing Backup Exec and additional options. Serial numbers are not required to install the Remote Administrator. You may specify up to 99 serial numbers. If none are specified, then an Evaluation copy of Backup Exec is installed. The following examples show how the /SNO switch can be used: /SNO:s1 /SNO:s1 s2 s3 s4 /SNO:s1 /SNO:s2 /SNO:s3 /SNO:s4 /TD:NEW or ALL /TD:NEW installs tape drivers only for drives that do not have drivers loaded. /TD:ALL installs tape drivers for all drives. /CPF:"file name" Creates a file containing all of the installation parameters provided. This file is encrypted. Creates an XML file containing all of the installation parameters provided. Note The XML file is not encrypted, which exposes parameters such as the password. /DBSERVER:<server\instance> Installs the Backup Exec database to the specified SQL server. /NOVUPDATE: Skips the installation of VERITAS Update.
/SNO:serial number
/XML:"file name"
83
Installing Backup Exec to Remote Computers Command Line Switches for Silent Mode Installation of Backup Exec (continued) Switch Additional Switches Description
Note The following switches are designed for use with Not For Resale, Open Option, and Evaluation versions of Backup Exec only. /LOADER: /IDR: Installs the Library Expansion Option. Installs the Intelligent Disaster Recovery Option. Installs the Backup Exec Agent for R/3 for Oracle Server. Installs the Advanced Open File Option. Installs the IBM ADSM/TSM Option. Installs the SAN Shared Storage Option with this server as the primary server. Installs the SAN Shared Storage Option with this server as the secondary and the <server name> as the primary. Installs the Agent for Microsoft SharePoint Portal Server. Installs the Agent for Microsoft Exchange Server. Installs the Agent for Lotus Domino. Installs the Agent for Oracle Server. Installs the Agent for Microsoft SQL Server. Installs the Remote Agent for Windows Servers. Installs the Remote Agent for NetWare Servers. Installs the ServerFree Option.
/R3:
/SSO:server name
/SHAREPT:
/EXCH:
/NTA:
/NWA:
/SVRFREE:
84
Administrators Guide
Installing Backup Exec to Remote Computers Command Line Switches for Silent Mode Installation of Backup Exec (continued) Switch Additional Switches /BEWSA: Description Installs the Backup Exec Web Administration Console. Installs the Backup Exec Desktop and Laptop Option. Installs the Advanced Disk-based Backup Option. Installs the Central Admin Server Option Creates a managed media server for use with the Central Admin Server Option.
/DLO:
/ADBO:
Related Topics: Push-Installing the Remote Agent for Windows Servers and the Advanced Open File Option Using the Command Line on page 87
Substitute values appropriate for your environment for values in italics; for example, substitute your password for password.
85
Enclose the value in quotation marks if it contains spaces, such as Program Files\VERITAS\Backup Exec\NT.
Command Line Switches for Remote Administrator Silent Mode Installation Switch /RA: Additional Switches Description Installs Remote Administrator using the options specified with the additional switches. /DEST:"path" Specifies the path where Remote Administrator will be installed. Otherwise, the default path Program Files\VERITAS\Backup Exec\NT is used. Installs online documentation. Allows you to select all install options without actually installing the Backup Exec software. This option can be used with the /CPF: or /XML: switches. Creates a file containing all of the installation parameters provided. This file is encrypted. Creates an XML file containing all of the installation parameters provided. Note The XML file is not encrypted, which exposes parameters such as the password.
/DOCS: /NOINSTALL:
/CPF:"file name"
/XML:"file name"
86
Administrators Guide
Push-Installing the Remote Agent for Windows Servers and the Advanced Open File Option Using the Command Line
You can use silent mode installation, also known as command line installation, to push-install the Backup Exec Remote Agent for Windows Servers and the Advanced Open File Option (AOFO) to one or more remote computers. You can also push-install the Remote Agent and the AOFO to more than one remote computer at a time by creating a command file that reads the remote computer names from a .txt file. To push-install the Remote Agent or AOFO using the command line: 1. Open a Windows command prompt. 2. Change to the drive containing the Backup Exec CD. 3. Change directories to \WINNT\INSTALL\BE. 4. To use a command file to read a list of remote computers to install to, go to step 6; otherwise, continue with step 5. 5. Type one of the following:
To install the Remote Agent, type: SETUP /PUSHRAWS: /USER:<user> /DOM:domain /PASS:password /SVR:<server name> -S
To install the Advanced Open File Option, type: SETUP /PUSHRAWS: /USER:<user> /DOM:domain /PASS:password /SVR:<server name> /AOFO: -boot -S
For the switch /SVR:, type the name of the remote computer that you want to install to. For descriptions of the other switches, see Command Line Switches for Backup Exec Silent Mode Installation on page 82. If you use the command line switches without the -S switch, the Backup Exec installation program launches with the command line parameters as defaults for the installation options. For example, if -S had been left in the above example, the Backup Exec installation program launches with the user name, domain, password, and serial number appearing on the installation dialog boxes. 6. (Optional) To install the Remote Agent or the AOFO using a command file that reads server names from a .txt file, use the following sample script, substituting the correct values for the variables:
87
for /f %%I in <ServerList.txt> do call :sub1 %%I goto :eof :sub1 Echo Pushing to %1 call ..\BE\setup.exe /PUSHRAWS: /DOM:DOMAIN /USER:administrator /PASS:password /SVR:%1 -S if "%errorlevel%" == "0" goto :good echo %1 failed with error %errorlevel% goto :eof :good echo %1 completed successful goto :eof 7. Press ENTER. An installation job log named bkupinst.log is created in the Windows root directory on the computer where Backup Exec is installed. This file lists any errors that may have occurred during installation, and is the only source of feedback when running setup.exe. The last line of the log indicates if the installation was successful and if restarting the computer is required.
/UNINSTALL: /REMOVEALL:
Administrators Guide
To remove the Backup Exec program files and the Backup Exec data, type: SETUP
88
5. If you want to overwrite a parameter, specify the new parameter. For example, to change the password, type: SETUP /PARAMS:"A:\file name" /PASS:new password -S Note To create an XML file containing all parameters, use the /XML: switch. The XML file is not encrypted, which exposes parameters such as the password. Related Topics: Installing Backup Exec Using the Command Line (Silent Mode) on page 81 Command Line Switches for Backup Exec Silent Mode Installation on page 82
90
Administrators Guide
91
Services credentials
92
Administrators Guide
93
94
Administrators Guide
Note If you are connecting to a remote administration console from a media server, from the Network menu, click Connect to Local Media Server to break the connection. Click Connect to Media Server to connect to another media server. 3. Select the appropriate options as follows:
Connect to Server dialog options Item Server Description Select the name of the media server or type the name of the server if you are running the Remote Administrator from a media server. The media server should appear in the list if the Backup Exec naming services are running on both machines. Note Each Windows 2000 server in the domain that has Backup Exec installed will automatically appear in the list box. Low speed connection (RAS) Select this option to minimize the amount of information initially retrieved from the media server to which you are connecting. When this option is selected, views such as the device and media views will not automatically be expanded when the Administration Console is loaded. This reduces the time required to connect to the remote media server. Information for each view is updated when the view is selected. This option is useful if you are connecting to the media server over a modem line. Logon Information User name Type an administrator user name for the server to which you are connecting. Note On Windows Server 2003 and Windows XP, you cannot log on to the remote administration console with a user name that has a blank password, unless you set Windows to allow blank passwords. The error message "Logon failure: user account restriction" displays. For more information, see your Windows documentation. Password Domain Type the password. From the drop-down list, select the domain to which the user belongs, or type the appropriate domain name if it does not appear in the list.
96
Administrators Guide
Installing the Backup Exec Remote Administrator Connect to Server dialog options (continued) Item Services Description Click this to access the Backup Exec Services Manager to stop and start services or to set the logon credentials used to run the services.
The status of the local services appear at the bottom of this dialog box. If you try to connect to a server and the connection fails, this dialog box displays the services status for the server you attempted to connect to. 4. Click OK. The Administration Console connects to the services running on the media server. You should now be able to operate the media server as though you were running the Administration Console from there. You may be prompted for a user name and password to browse some network shares even if you are logged into the Remote Administrator computer under an account that is valid for those shares. Provide a domain-qualified user name and password when prompted (for example, domain1\howard). For workgroup accounts, when logging in between different workgroups, you can provide only a user ID when prompted, and leave the workgroup line blank.
97
98
Administrators Guide
Note If autorun is not enabled on your system, run SETUP.CMD, which is in the root of the installation CD directory. Because the installation parameters, or options, have already been captured in the clone CD image, you will not be prompted for these options.
99
3. When the Select Push Method dialog box appears, select from one of the following options:
Remote install options Item Remote install with serialized options Description Select this option if you want to enter serial numbers for the remote systems. During the install, a dialog asking for the serial numbers for the remote system appears. Select this option if you want to install remotely using all of the installation options installed on the local system. When this option is used, you cannot change any settings on the remote system. For example, if you have installed the Intelligent Disaster Recovery option locally, this option will also be installed remotely. Select this option if you want to install remotely using the clone file settings that may be contained on a clone CD image or could also be contained in a previously created parameter file (see Creating and Using Installation Parameter Files on page 89). When this option is selected, you will be able to browse to a parameter file.
100
Administrators Guide
Download signed ActiveX Controls Run ActiveX Controls and plug-ins Script ActiveX Controls marked safe for scripting Active scripting
To configure VERITAS Update: 1. On the Tools menu, click VERITAS Update. 2. On the VERITAS Update Welcome screen, click Configure. 3. Click Notify when new updates are available. 4. Select the date and time for Backup Exec to start polling for updates. 5. Select the Frequency for polling to occur. Options are:
101
Daily. Backup Exec polls every day at the time you selected. Weekly. Backup Exec polls every week on the same day of the week and at the same time you selected. Monthly. Backup Exec polls every month on the same date and at the same time you selected.
102
Administrators Guide
On the Help menu, click About Symantec Backup Exec for Windows Servers, and then click the button License Information. The License Information dialog box provides the following information:
License Information dialog box options Item Option Licensed Description Name of the available Backup Exec options. Displays Yes if the option is licensed on the media server, and No if the option is not licensed. Displays Yes if the option is installed on the media server, and No if the option is not installed. If the option is installed, it may still require some additional configuration.
Installed
103
Delete job histories and catalogs that you no longer need in order to shorten the upgrade window. Run a database maintenance job
To upgrade from Backup Exec version 8.0 or later: 1. Perform steps 1 through 5 in the topic Installing Backup Exec Using the Installation Program on page 67. 2. Enter serial numbers for Backup Exec, and for each Backup Exec option that you want to install, and then click Next. Read the Installation Review. To add additional serial numbers, click Back until the Symantec Backup Exec Serial Numbers page is displayed. Enter the serial numbers, and then click Next to continue. The default location is C:\Program Files\VERITAS\Backup Exec\NT. 3. On the Back Up Existing Catalog and Data page, enter or browse to a directory to which all existing catalogs and data will be backed up. The default location is C:\Program Files\VERITAS\Backup Exec\NT\DataBackup. If you do not want to keep previous catalogs and data, click Do not back up previous data and catalogs. 4. Click Next to continue. An upgrade summary is displayed.
104
Administrators Guide
Backup Exec Remote Agent for Windows Servers. For more information, see Installing the Remote Agent to Remote Windows Computers on page 793. Backup Exec NetWare Agent. For more information, see Installing the Remote Agent on a NetWare Server on page 1392 and Installing Backup Exec Agents to Remote Computers on page 77. Backup Exec Advanced Open File Option. For more information, see Installing the Advanced Open File Option on page 996.
To reinstall these options, repeat the installation steps for each option.
105
106
Administrators Guide
Chapter
Getting Started
A checklist to help you prepare for the First Time Startup Wizard. Details on the Backup Exec Assistant, Information Desk, System Summary, and other parts of the Backup Exec Administration Console. Details of default options set when Backup Exec is installed. Descriptions of Backup Exec menus.
If youre backing up to a tape device, verify that the device is supported. You can install drivers for the devices during the First Time Startup Wizard. If youre backing up to a disk device using the Backup-to-Disk feature, decide where you can create a backup folder. You should create it on a disk that wont be included in the backup jobs and that has enough free space to contain the backup job. For more information, see Using Backup-to-Disk Folders and Files on page 176.
Understand how Backup Exec provides overwrite protection for your media. For more information, see Media Overwrite Protection on page 213.
107
Understand the default media set and its infinite overwrite protection period. For more information, see Media Overwrite Protection Levels on page 226. Learn about creating new media sets with weekly, monthly, or quarterly retention periods. For more information, see Default Media Set on page 217. Decide what Windows credential you want your Backup Exec logon account to use when browsing and making backup selections. You can use an existing account, or create a new one. Youll be prompted for a default Backup Exec logon account during the First Time Startup Wizard. For more information, see Configuring Logon Accounts on page 386.
To start the Backup Exec Administration Console, click Start, point to Programs, and then click Symantec Backup Exec for Windows Servers. If you selected the option to add an icon to your desktop when you installed Backup Exec, you can also double-click the icon to start Backup Exec.
Related Topics: Using the Administration Console on page 110 Using Backup Exec Dialog Boxes on page 113
Media Management with Media Sets. To learn more about managing media through media sets, read Media Overwrite Protection on page 213. Preferred Overwrite Media Type. Review the circumstances and order in which Backup Exec searches for overwritable media in Media Overwrite Options on page 228. Overwrite Protection Level. The media overwrite protection levels are global settings that designate groups of media as overwritable or write-protected. For more information, see Media Overwrite Protection Levels on page 226.
108
Administrators Guide
Detected Hardware. The Device Configuration wizard enables you to verify that all of the storage devices attached to your system appear, and that robotic libraries and storage devices are configured properly. If you do not see one or more of your attached storage devices in the Backup Devices window when using the Device Configuration Wizard, click the Configure Devices button. This will guide you through installing the appropriate drivers for the storage hardware connected to your system.
Detected Backup-to-Disk Folders. Click the Add Backup-to-Disk Folder button to set up folders on your hard drive to target for backup jobs. For more information, see Using Backup-to-Disk Folders and Files on page 176. The backup folders you add here will be included in the All Drives drive pool, which is Backup Execs default target for backup jobs. Backups submitted to the All Drives drive pool may be processed on an attached media device or to one of the backup folders on your hard disk.
Drive Configuration. Verify that Backup Exec has configured all of your drives correctly. If all of your drives do not display on the list, follow the instructions in the wizard to install the VERITAS device drivers.
Configure IDR Options. If you installed the Intelligent Disaster Recovery Option, youll be prompted to configure IDR. For more information, see Getting Started with IDR on page 906. Logon Accounts. Use the Logon Account Wizard to set up Backup Exec logon accounts, which enable users to access resources such as servers, shares, and databases. For more information, see Configuring Logon Accounts on page 386.
After you use the First Time Startup Wizard, you can access some of the wizards included in the First Time Wizard individually. To access the wizards individually, from the Tools menu, select Wizards, and then select the wizard you want to use.
109
Columns
Task pane
Menu bar. Backup Execs menu bar appears across the top of your screen. To display a menu, click the menu name or use the keyboard shortcut. You can launch Backup Exec operations by clicking options from a menu. Some options may be unavailable until you select an item from the console screen. For example, you cannot select Rename cannot from the Edit menu unless you have first selected an item to rename from either the Devices view or the Media view.
110
Administrators Guide
Navigation bar. The navigation bar appears under the menu bar and enables you to create a backup or restore job or to navigate to Backup Execs eight views. The views that can be accessed through the navigation bar include:
Overview. Use this view to access the Information Desk, view a summary of the system you are logged on to, or launch the Desktop and Laptop Option (DLO) if it has been installed. Media Server. This view displays only if you have installed the Central Admin Server Option (CASO). Use this view to monitor and manage media servers in a CASO-enabled Backup Exec environment. Job Setup. Use this view to perform tasks for new backup, restore, and media rotation jobs, as well as to launch some utility jobs. Job Monitor. Use this view to monitor jobs and job history. Through this view, you can also access the Outlook-like job calendar.
Note If you are using BEWAC, the Outlook-like job calendar is not available.
Alerts. Use this to view and respond to alerts, view alert history, apply alert filters, and set up notification recipients to receive e-mail or pager communications when alerts occur. Reports. Use this to view, print, save, and schedule reports about your media server, its operations, and its device and media usage. Devices. Use this view to create drive pools, cascaded drive pools, and backup-to-disk folders, and to perform device operations and access device properties pages. Media. Use this view to manage your media, create media sets, and create media locations.
Task pane. The task pane displays on the left side of the Administration Console by default, but can be hidden by selecting View, and then selecting Task Pane. Through the task pane, you can initiate actions such as creating a new backup job or responding to an alert. The contents of the task pane are dynamic, changing according to the view selected from the navigation bar. Some options may be unavailable until an item is selected from the console screen or a prerequisite task is performed. For example, you cannot select Rename from the Devices task pane unless you have first selected an item that can be renamed, such as a user-created drive pool. Selection pane. The Selection pane is where you select items to work with, such as files to back up or restore.
111
Results pane. The Results pane is the large pane on the right side of the screen that usually contains a list or tree view of items that correspond to items that are selected in the Selection pane. For example, if you select a Backup-to-Disk folder in the Selection pane, the Backup-to-Disk files that are contained in the folder display in the Results pane. This pane can be divided to display a preview pane. Preview pane. The preview pane displays on the bottom right of the Administration Console. It displays information about the item selected in the list or tree view. This pane can be hidden by selecting View, and then selecting Preview Pane.
Note If you are using BEWAC, the Preview pane is not available.
Status bar. The status bar appears on the bottom of the Administration Console and provides information about the media server, jobs running or scheduled to run on the server, alerts, and services running. Columns. You can change the location of columns by dragging and dropping them. In addition, you can change the order of the entries in a column by clicking the column heading. For example, names of reports display in alphabetical order by default. To display report names in reverse alphabetical order, click the Name column heading on the Reports view.
112
Administrators Guide
Dialog box
Nodes
Subnodes
Properties pane
Most of Backup Execs dialog boxes contain a Properties pane on the left side. Options that correspond to the selected subnode display on the right side of the dialog box.
113
To view the Information Desk: 1. On the navigation bar, click Overview. 2. Click the Information Desk tab.
Information Desk
The System Summary briefly details Backup Exec activity for the last 24, 48, or 72 hours, such as the number of jobs that were run, the number of jobs that failed, the amount of data backed up, and the number of media used. You can also see the number and type of active alerts, the number of scratch media available in the storage devices, a list of upcoming jobs, and the number of jobs that are currently running. To view the System Summary: 1. On the navigation bar, click Overview. 2. Click the System Summary tab.
114 Administrators Guide
System Summary
115
To display the Backup Exec Assistant in a resizable window: 1. On the navigation bar, click Overview. 2. Click the Backup Exec Assistant tab. 3. In the task pane, click Open Assistant in new window.
116
Administrators Guide
If you are new to Backup Exec, you can use the Backup Wizard, which guides you through the setup of a backup job. If you are an experienced Backup Exec user, do one of the following:
On the navigation bar, click Backup to configure the options for a backup job. On the navigation bar, click Job Setup to create a policy to use for multiple backup jobs.
To quickly create a backup job to back up the media server, click Back up this media server now with One-button Backup on the Information desk. Use Windows Explorer to create a backup job.
For more information about the various ways to create a backup job, see Creating a Backup Job on page 261. Where can I find the wizards? You can find wizards in the following locations:
From the Tools menu, click Backup Exec Assistant or click Wizards.
Where can I find the Readme file? The Readme file is available in the following locations:
Under Documentation, click View Symantec Backup Exec Administrators Guide. From the Help menu, click Topics to see the online help or click View Symantec Backup Exec Administrators Guide to view an online version of the System Administration Guide in the Adobe Portable Document Format (PDF).
b. Click the Information Desk tab. c. Under Technical Support, click Symantec Backup Exec support.
118
Administrators Guide
119
Display the job summary Select this option to have Backup Exec display a summary of before creating a job the job options you selected before submitting the job to the job queue. Create jobs after a new policy is created Select this option to have Backup Exec automatically display the Create or Delete Policy Jobs dialog box after you create a policy. You can use the Create or Delete Policy Jobs dialog box to create jobs by associating selection lists with policies.
120
Administrators Guide
Backup Exec Defaults Options - Set Application Defaults - Preferences (continued) Item Display progress indicators for backup jobs (requires additional time to pre-scan devices) Description Select this option to display the percentage complete number while a backup job is processing. These indicators appear in the Job Activity tab, and they allow you to monitor the progress of the job. Backups might take a little longer to complete when this option is selected because the target resources must be scanned to determine the amount of data to be backed up. Note Due to the time required to scan the target resources, selecting this option when backing up remote resources is not recommended. Enable percentage bars when available Select this option to display a shaded percentage complete bar in the Percent Complete column for active jobs. The percentage complete bar displays in addition to the percentage complete number.
Alerts Automatically display new alerts Select this option to have alerts automatically appear on the desktop when they are sent. If you do not choose this option, you are required to view and respond to alerts through the Alerts view. Select this option to have Backup Exec send an audible tone when an alert is generated. Information about alerts can be found in the Alerts view.
ScreenTips Enable ScreenTips Select this option to enable or disable ScreenTips, which provide brief explanations of selected items on the Administration Console. When ScreenTips are enabled, you can view them by holding the mouse pointer on an item. Only selected items have ScreenTips.
Seconds to delay display If you selected the Enable ScreenTips option, type the of ScreenTips number of seconds you want Backup Exec to wait before displaying ScreenTips. For example, if you type 10, the mouse must be held over the item for 10 seconds before Backup Exec displays the ScreenTip for the item.
121
Backup Exec Defaults Options - Set Application Defaults - Preferences (continued) Item Row highlights Enable highlighting of every other row in Backup Exec views Select this option to enable or disable highlighting on every other row in various lists, such as the current jobs and job history lists on the Job Monitor. Highlighting facilitates viewing of long lists. This option is selected by default. If you selected the Enable highlighting of every other row in Backup Exec views option, use the slide bar to set the darkness of the highlighting in the rows. Description
Media set
122
Administrators Guide
Chapter
Managing Devices
Device management in Backup Exec simplifies how you organize and allocate the storage devices recognized by Backup Exec, including:
Tape drives or robotic libraries physically attached to a media server. Virtual devices called Backup-to-Disk Folders created through Backup Execs Backup-to-Disk feature. Shared devices used in a SAN environment. Removable storage devices shared by applications through the use of Microsofts Removable Storage Feature. http://support.veritas.com/rd/bews-compatibility.htm.
For a list of supported devices, see: With Backup Exec, you can maximize your hardware investment by organizing your devices in one or both of the following methods:
Device pools. Devices are grouped so that jobs assigned to the device pool are run on the first available device. Setting up device pools offers the following benefits:
Automatic job rescheduling. If a device fails while a job is running on it, that job is rescheduled and placed on hold. Other scheduled jobs are rerouted to working devices in the device pool. Concurrent processing. Devices in the device pool run different jobs at the same time, allowing maximum hardware efficiency. Dynamic load balancing. Jobs are more evenly distributed between all of the devices included in the device pool when running simultaneous jobs.
123
Cascaded drive pools. Drives of the same type are linked together so that large backup jobs that exceed the capacity of the media in one drive automatically continue on the media in the next drive that is defined in the pool. The cascaded drives appear logically as one device.
Or, you can use the storage devices as they are configured by Backup Exec at installation, without making any changes. The default device pool, All Devices (Computer Name) is the default destination device when you create a backup job. By default, the All Devices device pool contains all locally attached devices, or if you are using the SAN Shared Storage Option, both locally attached and shared storage devices appear in All Devices (Computer Name). In addition to device pools and cascaded drive pools, Backup Exec provides other device management capabilities. You can:
Identify and monitor the current status of all storage devices. Change physical tape devices without rebooting the Backup Exec server. Monitor device usage statistics and track hardware errors. Backup Exec keeps track of the devices age, hours of use, mounts, number of bytes processed (written and read), errors, when the device was last cleaned, and so on. Manage the physical devices attached to the media server and perform operations on these devices and the media contained in them.
Note Most of the benefits derived from Backup Execs device management functionality are realized when using more than one storage device. However, users with only one device can still take full advantage of Backup Execs device monitoring to help make sure their devices are working properly. Related Topics: Symantec Backup Exec - SAN Shared Storage Option on page 957
124
Administrators Guide
Viewing Devices
Viewing Devices
When Backup Exec is installed, all storage devices connected to the media server are automatically recognized as either robotic libraries or stand-alone drives. A stand-alone drive is a single, locally attached tape drive. Note Support for a single robotic library device is included with Backup Exec for Windows Servers. Licenses for additional robotic library devices are available for purchase. If you group one or more robotic library slots into partitions, the partition drive pools appear in the Devices view under the Device Pools icon. For information about partitioning robotic library slots, see Creating Robotic Library Partitions on page 172. Click Devices on the navigation bar to see how devices are organized logically in device pools, and how devices are arranged physically on servers. All devices that are displayed under Storage Devices are available, including device pools, stand-alone drives, robotic libraries, backup-to-disk folders, and cascaded drive pools. If the Shared Storage Option is installed, you can also view available secondary storage devices on the storage area network. All logical groupings of the physical devices are displayed under Device Pools and Cascaded Drive Pools. Cascaded drive pools are displayed under servers because they only consist of drives from that server; they effectively act as a single device under that server. The default device pool All Devices (Computer Name) contains the media servers locally attached devices as well as any Backup-to-Disk Folders created. Backup-to-Disk Folders are destination devices for backups that are directed to your hard disk. The data from these backups is saved on disk as backup files. If you are using the SAN Shared Storage Option, each server on the SAN will have an All Devices (Computer Name) node that contains both local and shared devices available to the server. At installation, all storage devices are automatically assigned to All Devices (Computer Name). Related Topics: Viewing Media Information on page 126 Viewing Device Pool Properties on page 138 Viewing Properties of a Cascaded Drive Pool on page 143 Viewing and Using Device Properties and Statistics on page 151 About Devices in the Shared Storage Environment on page 961
125
Viewing Devices
Cleaning slot
Media label
126
Administrators Guide
Viewing Devices Media information in the Devices view Item Media type Description Type of media, such as 4mm, and any defined category of this media type, such as CLN for cleaning tape. Media types that have numbers appearing in brackets (for example, 4mm [6]) can be used to define specific bar code rules. To change the media type, click the browse button to the right of the field, and select another media type. Export pending When a template runs that has an associated export template to export this media, Yes is displayed; otherwise, No is displayed. For more information, see Adding an Export Media Template to a Policy on page 370. Name of the media set this media belongs to. Name of the device or vault where this media is located. Date and time when the media was first entered into Backup Exec. Date and time when the media was added to a media set as a result of an overwrite operation. Date and time when data was last written to the media. Date and time after which the media can be overwritten.
Date and time after which the media can no longer be appended to. Displays the number of cleanings performed so far by this cleaning media. Type the maximum number of times you want to use this media for cleaning. If the media contains Media Auxiliary Memory, the maximum number of cleanings displays automatically.
Related Topics: Symantec Backup Exec - Library Expansion Option on page 1115 About Devices in the Shared Storage Environment on page 961
127
Configuring Devices
Configuring Devices
Backup Exec provides two wizards for configuring and adding storage devices to your media server:
The Device Configuration Wizard. This wizard, which also appears when Backup Exec is first started, allows you to verify that all of the storage devices attached to your system appear, and to ensure that robotic libraries and storage devices are properly configured. You can also use the Device Configuration Wizard to configure Backup Folders on your hard disk. On the Tools menu, point to Wizards, and then select Device Configuration Wizard to run this wizard at any time. The Hot-swappable Device Wizard. This wizard allows you to replace or add storage devices without having to reboot the media server. The VERITAS device driver Installation Wizard. This wizard guides you through the installation of VERITAS device drivers.
If you are using a robotic library, make sure the robotic library hardware is configured properly. Related Topics: First Time Startup Wizard on page 108 Hot Swap for Storage Devices on page 128 VERITAS device driver Installation Wizard on page 129 Setting Up Robotic Library Hardware on page 1115
128
Administrators Guide
Configuring Devices
The replaced storage device is displayed in the Devices view with a status of Offline. To remove the storage device from Backup Exec, disable it and then delete it from the Devices view. Note Only tape devices that have hot-swap capability are supported for hot swapping and adding. Refer to the documentation for the tape device for more details. To start the Hot-swappable Device Wizard: 1. On Tools menu, point to Wizards, and then click Hot-swappable Device Wizard. 2. Follow the on-screen prompts.
129
Configuring Devices
130
Administrators Guide
Configuring Devices
Related Topics: Renaming a Backup Folder on page 180 Pausing and Resuming a Backup Folder on page 182 Renaming a Device Pool on page 137 Renaming a Cascaded Drive Pool on page 143
131
132
Administrators Guide
Device sub-type:
Select the devices to be Select the devices that you want to include in the new device pool. included in this device pool
Related Topics: Using Cascaded Drive Pools on page 139 Creating a Cascaded Drive Pool on page 139
133
Device sub-type:
Select the devices to be Select the devices you want to include in the device pool. included in this device pool
134
Administrators Guide
135
136
Administrators Guide
5. If scheduled jobs are assigned to the deleted device pool, you are prompted to redirect the jobs to another device pool or stand-alone drive. Related Topics: Deleting Devices from a Device Pool on page 136 Retargeting Jobs from a Deleted Device Pool or Media Set on page 137
3. Under General Tasks, select Rename. 4. On the Rename dialog box, type the new name of this device pool, and then click OK. The device pool is listed with the new name. Related Topics: Viewing Device Pool Properties on page 138
Description
Creation date
138
Administrators Guide
139
To create a cascaded drive pool: 1. On the navigation bar, click Devices. 2. Select Cascaded Drive Pools. 3. Under Device Pool Tasks in the task pane, select New device pool. 4. Select the appropriate options as follows, and then click OK:
New Cascaded Drive Pool options Item Drive pool name Description Type the name of the new cascaded drive pool that you want to create. Description of the cascaded drive pool.
Select a device type from the drop-down list to filter the list of drives available for the cascaded drive pool. Only drives of this type are displayed for selection. If device sub-types are available, you can select a subtype to increase the filter on the list of drives available for the cascaded drive pool. Only drives of this type and sub-type are displayed for selection. Select the drives that you want to include in the new cascaded drive pool. Any drives moved to a cascaded drive pool will be removed from any device pools they are currently in.
Device sub-type:
Related Topics: Deleting Drives from a Cascaded Drive Pool on page 142 Deleting a Cascaded Drive Pool on page 142
140
Administrators Guide
Device sub-type:
Select the devices to be Select the drives you want to include in the drive pool. included in this device pool
141
142
Administrators Guide
4. When prompted, click Yes or Yes to All to delete the cascaded drive pool or pools that are displayed. 5. If scheduled jobs are assigned to the deleted cascaded drive pool, you are prompted to redirect the jobs to another device pool or stand-alone drive. 6. If scheduled jobs are assigned to the deleted cascaded drive pool, you are prompted to redirect the jobs to another destination. Related Topics: Retargeting Jobs from a Deleted Device Pool or Media Set on page 137
143
The Cascaded Drive Pool Properties dialog box provides the following information:
Cascaded Drive Pool properties Item Name Description Name of the cascaded drive pool. Rename the drive pool by typing a new name in this field. Description of the cascaded drive pool. You can enter a description or modify the current description. Date and time that this cascaded drive pool was created.
Description
Creation date
144
Administrators Guide
Online - All services are running. Pause - The server has been paused. You can pause a media server to prevent scheduled and new jobs from running on that server while maintenance activities, such as replacing a tape device, are being performed. Active jobs will not be affected if they started before the server was paused. Unavailable - The Backup Exec services are not responding. Depending on the thresholds that were set, active jobs will become stalled, then failed, and then will be recovered. For more information, see Setting Thresholds to Recover Jobs on page 445. Offline - The media server is not online. Services have been stopped.
Note If the Central Admin Server Option is installed, additional statuses are displayed. For more information, see Columns in the Media Servers View on page 853 Chapter 4, Managing Devices 145
Viewing Media Server Properties and Running Server Diagnostics Media Server Properties General Tab properties (continued) Item Media server type Description If this is a single installation of Backup Exec, the media server type displayed is a stand-alone media server. If the Central Admin Server Option is installed, the media server type displayed is either a managed media server or a central administration server. For more information, see Columns in the Media Servers View on page 853. Description Version Serial number Enter a description of the server. Backup Exec version and revision information. The serial number under which Backup Exec is installed. Evaluation Edition is displayed if a serial number was not provided during Backup Execs installation. Number of storage devices connected to this media server. In systems with multi-drive robotic libraries attached, each drive in the robotic library represents a separate device. Number of jobs currently in progress on this media server. Total number of alerts generated on this media server since the Backup Exec services were last started. Displays the time zone set for this media server. Date and time Backup Exec was initially installed and launched on this media server. Current date and time.
Number of devices
146
Administrators Guide
Viewing Media Server Properties and Running Server Diagnostics Media Server Properties General Tab properties (continued) Item Run Diagnostics Description Note If you call Technical Support, they may request that you run Diagnostics and provide them with the results. Technical Support can use the results of this utility to pinpoint your problem and quickly solve it. Click to run the Diagnostics utility to a file (bediag(machine_name).txt) that includes useful configuration information for the server such as:
Account groups, account privileges, and environment settings. Backup Exec Software version and registry information, Backup Exec Agent listing, Windows version information, SCSI hardware configuration, SQL Server information, Driver services information, and Windows Services information. File Server information, supported shared directories, and Windows sockets information.
Refresh
147
Viewing Media Server Properties and Running Server Diagnostics Media Server Properties System tab properties (continued) Item Build Processor Type Total processors Memory Physical Virtual remaining Page size Page file Amount of hardware RAM installed in the media server. Amount of virtual memory remaining on the media server. Size of a single virtual memory page. Size of the virtual memory paging file. Processor installed in this media server. Number of processors on this media server. Description Build number of the operating system.
148
Administrators Guide
Note Advanced properties are displayed only for the media server that the Backup Exec Administration Console is connected to. To view media server advanced properties: 1. On the navigation bar, click Devices. 2. Select the media server from the tree view. 3. Under General Tasks in the task pane, select Properties, and then click the Advanced tab. The Media Server Properties Advanced tab provides the following information:
Media Server Properties Advanced tab properties Item Backup Exec Database Server Name of the Microsoft SQL Server that contains the Backup Exec database. Name of the instance that the Backup Exec database is installed on. SQL database name of the Backup Exec database. The path of the Backup Exec database. Description
Device and Media Database Server Name of the Microsoft SQL Server that contains the Advanced Device and Media Management (ADAMM) database. Name of the instance that the Advanced Device and Media Management (ADAMM) database is installed on. SQL database name for the Advanced Device and Media Management (ADAMM) database. The path of the Advanced Device and Media Management (ADAMM) database.
Instance
Name
Path
149
Viewing Media Server Properties and Running Server Diagnostics Media Server Properties Advanced tab properties (continued) Item Catalog Database Server Name of the Microsoft SQL Server that contains the Backup Exec catalog database. Database instance that contains the catalog database. SQL database name for the Backup Exec catalog database. The path of the Backup Exec catalog database. Description
Installed
150
Administrators Guide
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the device for which you want to view properties.
4. Under General Tasks in the task pane, select Properties. Related Topics: Viewing General Device Properties on page 152 Viewing Drive Configuration Properties on page 154 Viewing Drive SCSI Information Properties on page 158 Viewing Drive Statistics Properties on page 159 Viewing Drive Cleaning Properties on page 161 Viewing and Specifying a Devices Media Types on page 163
151
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the device for which you want to view properties.
4. Under General Tasks in the task pane, select Properties, and then on the Drive Properties dialog box, click General. The General tab for device properties provides the following information:
General Device Properties Item Name Description Name of the device. You can also rename the device by typing a new name in this field.
152
Administrators Guide
Viewing and Using Device Properties and Statistics General Device Properties (continued) Item Status Description
Pause: Select this check box to pause the device, and then click OK. Enable: Select this check box in order for Backup Exec to use this device. Clear this check box to disable the device, and allow it to be available for other applications. If the box is clear, the device is disabled, and cannot be used by Backup Exec. After changing the option, click OK. Online: If the device is online, the check box appears dimmed, with a check mark. If the device is offline, the check box is available, with no check mark. To bring the device online, check Online. No operations are allowed on the device until it is online again. The device was turned off after Backup Exec was started. The device was being used by another application (such as a Windows backup utility) when Backup Exec was started. The device is removed from the computer. A tape drive failure occurred. A tape is stuck in the drive. The firmware of the device was updated; Backup Exec will behave as if the device with its old name or identity no longer exists.
Check to make sure the device has power and that cables are properly attached. Turn the device on and reboot the server, or stop and restart the Backup Exec services. Stop the utility that is using the device, and then reboot the server, or stop and restart the Backup Exec services. To restart the Backup Exec services: For Windows 2000, Windows XP, and Windows Server 2003, go to Computer Management, select System Tools, select Services, and then select Applications. If the device firmware has changed, delete the device and restart Backup Exec services. After the device appears with its new firmware identity, retarget all jobs that were using the old device name to the new device name.
Name of the vendor of the drive. Product ID from the SCSI Inquiry string. 153
Viewing and Using Device Properties and Statistics General Device Properties (continued) Item Firmware Drive type Media type Description Version of the firmware used in the device. Media and memory specifications of the device. If the device is a stand-alone drive, the media type used in this drive type is displayed. Date this device was first detected by this installation of Backup Exec. Serial number of the drive.
Date in service
Serial number
Related Topics: Viewing and Using Device Properties and Statistics on page 151 Viewing Backup Folder Properties on page 183
Enable or disable hardware compression (if compression is supported by the drive). Change the preferred block size, buffer size, buffer count, and high water count.
Caution Preferred Configuration settings are used to tune the performance of backup and restore operations. Changing Preferred Configuration settings is not generally recommended and may have a negative effect on your backup and system performance. Any changes should be thoroughly tested to make sure system performance does not deteriorate before being put into general use. To view a drives configuration properties: 1. On the navigation bar, click Devices.
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3.
154
4. Under General Tasks in the task pane, select Properties, and then on the Drive Properties dialog box, click Configuration. The Configuration tab for drive properties provides the following information:
Drive Configuration Properties Item Enable compression Description If this option is available, this device is capable of supporting hardware compression. Select this check box to enable hardware compression. If a job is configured to use hardware compression, but is run on a device on which hardware compression is disabled (even though it is supported), hardware compression is considered unavailable and is not used. If a device that does not support hardware compression is added to a cascaded drive pool, the hardware compression option on all other drives in that pool is automatically disabled. You can enable the hardware compression option on the other drives again, but the pool will then have mixed compression, and could make restore operations difficult.
155
Viewing and Using Device Properties and Statistics Drive Configuration Properties (continued) Item Preferred configuration Note Preferred Configuration settings are used to tune the performance of backup and restore operations. Changing Preferred Configuration settings is not generally recommended and may have a negative effect on your backup and system performance. Any changes should be thoroughly tested to make sure system performance does not deteriorate before being put into general use. Block size (per device) The default is the preferred size of the blocks of data written to new media in this device. You can change the block size by selecting another size from the scroll list, and then clicking OK. Some devices (for example, DLT devices) provide better performance when larger block sizes are used. The preferred block size can range from 512 bytes to 64 kilobytes. Backup Exec does not ensure that the requested block size is in fact supported by that device. You should check the device specifications to make sure that the block size is supported. If the device does not support a block size, it will default to its standard block size. If the device does not support block size configuration, this option is unavailable. Buffer size (per device) The default is the preferred amount of data sent to the device on each read or write request. The buffer size must be an even multiple of the block size. You can change the buffer size by selecting another size from the scroll list, and then clicking OK. Depending on the amount of memory in your system, increasing this value may improve device performance. Each type of device requires a different buffer size to achieve maximum throughput. Description
156
Administrators Guide
Viewing and Using Device Properties and Statistics Drive Configuration Properties (continued) Item Buffer count Description The default is the preferred number of buffers allocated for this device. You can change the buffer count by selecting another count from the scroll list, and then clicking OK. Depending on the amount of memory in your system, increasing this value may improve device performance. Each type of device requires a different number of buffers to achieve maximum throughput. If you change the buffer count, you may need to adjust the high water count accordingly. High water count The default is the preferred number of buffers to be filled before data is first sent to the device, and any time after that if the device underruns. You can change the high water count by selecting another count from the scroll list, and then clicking OK. The high water count cannot exceed the buffer count. A value of 0 disables the use of high water logic; that is, each buffer is sent to the device as it is filled. The default setting provides satisfactory performance in most instances; in some configurations, throughput performance may be increased when other values are specified in this field. If you increase or decrease the buffer count, the high water count should be adjusted accordingly. If a device has a high water count default of 0, it should be left at 0. Default Settings Click this button to return all the Preferred Configuration settings to their defaults, and then click OK. Select this check box to have this device read only one block of data at a time. If this check box is selected, the device will read a single block of data at a time, regardless of the size of the buffer block. Symantec recommends selecting this option if the device is a shared storage device. Write single block mode Select this check box to have this device write only one block of data at a time. Selecting this check box provides greater control over the handling of data write errors. Symantec recommends selecting this option if the device is a shared storage device.
157
Viewing and Using Device Properties and Statistics Drive Configuration Properties (continued) Item Read SCSI pass-through mode Description Select this check box to have this device read data without going through a Microsoft tape device API. Selecting this check box allows the data to pass directly through the device and allows more detailed information if device errors occur. Symantec recommends selecting this option if the device is a shared storage device. Write SCSI pass-through mode Select this check box to have this device write data without going through the Microsoft tape device API. Selecting this check box allows data to pass directly through the device driver and allows more detailed information if device errors occur. Symantec recommends selecting this option if the device is a shared storage device.
Related Topics: Viewing and Using Device Properties and Statistics on page 151
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the device for which you want to view properties.
4. Under General Tasks in the task pane, select Properties, and then on the Drive Properties dialog box, click SCSI Information. The Drive Properties SCSI Information tab provides the following information about the Small Computer System Interface (SCSI):
Drive Properties SCSI Information Tab Item Inquiry Description Device information read from the device firmware.
158
Administrators Guide
Viewing and Using Device Properties and Statistics Drive Properties SCSI Information Tab (continued) (continued) Item Port Description Identifying number of the port on the server to which the device is attached. Identifying number of the bus to which the device is attached. Unique SCSI ID number (physical unit number). Logical Unit Number of the device.
Related Topics: Viewing and Using Device Properties and Statistics on page 151
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the device for which you want to view properties.
4. Under General Tasks in the task pane, select Properties, and then on the Drive Properties dialog box, click Statistics. The Statistics tab provides the following information:
Device Properties Statistics Tab Item Last mount date Chapter 4, Managing Devices Description Last date that media was mounted by this device. 159
Viewing and Using Device Properties and Statistics Device Properties Statistics Tab (continued) Item Drive totals Total bytes written Total bytes read Total mounts Total seeks Number of bytes that have been written by this device. Number of bytes that have been read by this device. Number of times media has been mounted by this device. Total number of seek operations (performed when a specific piece of information is being located) that have been performed by this device. Total number of hours that this device has been in use (performing read, write, mount, and seek operations). Description
Drive errors Seek errors Soft read errors Number of errors encountered while trying to locate data. Number of recoverable read errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the device and perform maintenance on it, and check the media for damage. Number of unrecoverable read errors encountered. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage. Number of recoverable write errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the device and perform maintenance on it, and check the media for damage. Number of unrecoverable write errors encountered. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage.
Related Topics: Viewing and Using Device Properties and Statistics on page 151
160
Administrators Guide
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the device for which you want to view properties.
4. Under General Tasks in the task pane, select Properties, and then on the Drive Properties dialog box, click Cleaning. The Cleaning tab provides the following information:
Drive cleaning properties Item Last cleaning date Hours since last cleaning Description Last date a cleaning operation was performed on the device. Number of hours that the device has been in use since the last cleaning. Click this to reset all cleaning statistics to zero (stand-alone drives only).
Totals since last cleaning Bytes written Number of bytes that have been written by this device since the last cleaning. Number of bytes that have been read by this device since the last cleaning.
Bytes read
161
Viewing and Using Device Properties and Statistics Drive cleaning properties (continued) Item Total mounts Description Number of times media has been mounted by this device since the last cleaning. Total number of seek operations (performed when a specific piece of information is being located) that have been performed by this device since the last cleaning. Total number of hours that this device has been in use (performing read, write, mount, and seek operations) since the last cleaning.
Total seeks
Hours in use
Errors since last cleaning Seek errors Number of errors encountered since the last cleaning while trying to locate data. Number of recoverable read errors encountered since the last cleaning. Soft errors may indicate the beginning of a problem. If excessive errors are reported for your environment, check the device and perform maintenance on it, and check the media for damage. Number of unrecoverable read errors encountered since the last cleaning. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage. Number of recoverable write errors encountered since the last cleaning. Soft errors may indicate the beginning of a problem. If excessive errors are reported for your environment, check the device and perform maintenance on it, and check the media for damage. Number of unrecoverable write errors encountered since the last cleaning. If you receive hard errors, check the device and perform maintenance on it, and check the media for damage.
Related Topics: Viewing and Using Device Properties and Statistics on page 151
162
Administrators Guide
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the device for which you want to view properties.
4. Under General Tasks in the task pane, select Properties, and then on the Drive Properties dialog box, click Media Type. The Media Types tab provides the following information:
Media type options for a device Item Media Type Description Type of media, such as 4mm, and any defined category of this media type, such as CLN for cleaning tape. Media types that have numbers appearing in brackets (for example, 4mm [6]) can be used to define specific bar code rules.
163
Using Robotic Libraries with Backup Exec Media type options for a device (continued) Item Read Description Displays Yes if this media type can be read by the device; otherwise, displays No. Displays Yes if this media type can be written to by the device; otherwise, displays No.
Write
Related Topics: Viewing and Using Device Properties and Statistics on page 151 Bar Code Rules in Mixed Media Libraries on page 236
164
Administrators Guide
tape and another overwritable tape is available in the robotic library, the job will automatically continue on that tape. When Backup Exec runs out of tapes, it prompts the operator to add more scratch media. In a robotic library, Backup Exec selects the oldest recyclable media in the library to use first. If more than one media meeting the requirements is found, Backup Exec then selects the media in the lowest-numbered slot; for example, media in slot 2 would be selected before equivalent media in slot 4. If a job requiring overwritable media is targeted to a robotic library and no overwritable media is available, the job is skipped and the next job targeted to the robotic library is queued. When overwritable media becomes available either by the addition of media to the robotic library or by the overwrite protection period expiring for a media currently in the robotic library, the skipped job will run. Related Topics: Symantec Backup Exec - Library Expansion Option on page 1115
165
During startup, if there is media in the storage devices in the robotic library, Backup Exec attempts to return the media to its original magazine slot. If the media cannot be returned to the slot, an error message appears requesting that the media be ejected from the storage device. Related Topics: Setting Up Robotic Library Hardware on page 1115 Installing Backup Exec on page 65 First Time Startup Wizard on page 108 Setting Up Cleaning Jobs on page 204
2. Expand the server icon in the tree view, and then click Robotic Libraries. 3. Select the robotic library. 4. Under General Tasks in the task pane, select Properties. Related Topics: Viewing General Robotic Library Properties on page 166 Viewing Robotic Library Configuration Properties on page 169 Viewing SCSI Information for a Robotic Library on page 170 Viewing Statistics for a Robotic Library on page 171
166
Administrators Guide
To view general properties of a robotic library: 1. On the navigation bar, click Devices.
2. Expand the server icon in the tree view, and then click Robotic Libraries. 3. Select the robotic library. 4. Under General Tasks in the task pane, select Properties, and then on the Library Properties dialog box, click General. The General tab provides the following information:
General properties options for robotic library Item Name Description Name of the robotic library. You can rename the device by typing a new name in this field.
167
Using Robotic Libraries with Backup Exec General properties options for robotic library (continued) Item Status Description
Pause: Select this check box to pause the device, and then click OK. Enable: Select this check box in order for Backup Exec to use this device. Clear this check box to disable the device, and allow it to be available for other applications. If the box is clear, the device is disabled, and cannot be used by Backup Exec. After changing the option, click OK. Online: If the device is online, the check box appears dimmed, with a check mark. If the device is offline, the check box is available, with no check mark. To bring the device online, check Online. No operations are allowed on the device until it is online again. The device was turned off after Backup Exec was started. The device was being used by another application (such as a Windows backup utility) when Backup Exec was started. The device is removed from the computer. A tape drive failure occurred. A tape is stuck in the drive. The firmware of the device was updated; Backup Exec will behave as if the device with its old name or identity no longer exists.
Check to make sure the device has power and that cables are properly attached. Turn the device on and reboot the server, or stop and restart the Backup Exec services. Stop the utility that is using the device, and then reboot the server, or stop and restart the Backup Exec services. To restart the Backup Exec services: For Windows 2000, Windows XP, and Windows Server 2003, go to Computer Management, select System Tools, select Services, and then select Applications. If the device firmware has changed, delete the device and restart Backup Exec services. After the device appears with its new firmware identity, retarget all jobs that were using the old device name to the new device name.
Name of the vendor of the robotic library. Product ID from the SCSI Inquiry string. Administrators Guide
Using Robotic Libraries with Backup Exec General properties options for robotic library (continued) Item Firmware Library type Date in service Serial number Description Version of the firmware used in the device. Manufacturer and model number of the robotic library. Date this device was first detected by Backup Exec. Serial number of the robotic library.
2. Expand the server icon in the tree view, and then click Robotic Libraries. 3. Select the robotic library. 4. Under General Tasks in the task pane, select Properties, and then on the Library Properties dialog box, click Configuration. The Configuration tab provides the following information:
Configuration properties options for robotic library Item Enable startup initialization Description Select this option to have Backup Exec initialize the robotic library when Backup Exec is started. Depending upon the robotic library, initialization can include reading all bar code labels on media. Select this check box to enable bar code rules (see Bar Code Rules in Mixed Media Libraries on page 236).
169
Using Robotic Libraries with Backup Exec Configuration properties options for robotic library (continued) Item Enable Removable Storage (RSM) Description Select this option if you want to allow Removable Storage to share the devices in robotic libraries between two or more applications. If the device is enabled in Removable Storage, Backup Exec uses Removable Storage for device and media operations; if the device is disabled in Removable Storage, Backup Exec controls the device directly. For more information about using Removable Storage with Backup Execs Advanced Device and Media Management feature, see Using Microsofts Removable Storage Feature with Backup Exec on page 189. Slot base Depicts the starting slot. Some robotic libraries have slots starting at "0"; others start at "1". If your robotic library uses a zero-based slot configuration you can reassign how the slots are displayed by typing the appropriate number in the Slot Base field.
2. Expand the server icon in the tree view, and then click Robotic Libraries. 3. Select the robotic library. 4. Under General Tasks in the task pane, select Properties, and then on the Library Properties dialog box, click SCSI Information. The SCSI Information tab of a robotic librarys properties dialog box displays the following information:
SCSI Information for a robotic library Item Inquiry Description Device information that is read from the device firmware.
170
Administrators Guide
Using Robotic Libraries with Backup Exec SCSI Information for a robotic library (continued) Item Port Description Identifying number of the port on the server to which the device is attached. Identifying number of the bus to which the device is attached. Unique SCSI ID number (physical unit number). Logical Unit Number of the device.
172
Administrators Guide
Note Depending upon your robotic library configuration, the first slot could be numbered 1 or 0. If your robotic library uses a zero-based slot configuration and you assign the first partition to begin with slot 1, the Partition Utility will actually use slot 0 as the first slot for partition 1 and adjust the starting slot accordingly for all other partitions.
Configure Partitions dialog box Partition Divider
6. While defining your partitions, use the following buttons to help you make selections:
Configure Partitions dialog box Item Remove Partition Description Remove the selected partition. The slots contained in the partition you are removing are added to the partition preceding it. Move the selected partition divider up to increase the number of slots in the partition. (The number of slots in the preceding partition is decreased.) Move the selected partition divider down to decrease the number of slots in the partition. (The number of slots in the preceding partition is increased.) Remove all partition settings.
Move Up
Move Down
Remove All
173
8. Click Yes to accept the partitions. The partition drive pools appear under Robotic Libraries for the robotic library on which they were created. All partition drive pools for a robotic library have the same name and display the slot ranges for the partition in parentheses within the name. After defining the partitions, you can submit jobs to those partitions drive pools. The partition drive pools appear in the list of devices along with other devices available to the media server. Click the target partition drive pool and run the job as you would any other Backup Exec job.
is repartitioned so that:
174
Administrators Guide
Then any jobs targeted to the old partition 2 (slots 3-4) must be retargeted. Note If a job is targeted to a particular robotic library drive (or a device pool that is not a partition drive pool), the job defaults to the first partition in the robotic library. Related Topics: Creating Robotic Library Partitions on page 172 Retargeting Jobs from a Deleted Device Pool or Media Set on page 137
175
176
Administrators Guide
NTFS partitions (local or remote) Network Attached Storage (NAS) devices DFS shares FAT/FAT32 partitions (local or remote) Symantec Volume Manager partitions RAID drives with any configuration Mapped drives NFS volumes
You can create removable backup-to-disk folders on any removable device, provided the device appears as a drive letter and is formatted with a file system. Removable devices can include:
For CDR-RW and DVD-RW, third-party software must be used to format the media with a file system before it can be used with Backup Exec. You can use the following steps to manually add a new backup folder. You also can use the Device Configuration Wizard to create a new backup folder. To add a backup folder: 1. On the navigation bar, click Devices. 2. Select Backup-to-Disk Folder. 3. Under Backup-to-Disk Tasks in the task pane, select New folder.
Chapter 4, Managing Devices 177
The New Backup-to-Disk Folder dialog box appears. 4. Select the appropriate options as follows, and then click OK:
New Backup-to-Disk Folder options Item Name Description Type a name for this folder. Note Backup folder names must not exceed 243 characters. Path or Drive Enter the location where the folder is to reside. Path is required if the option Backup-to-Disk folder is selected. Drive is specified if the Removable Backup-to-Disk folder option is selected. Note If you do not know the exact path, click the button next to the Path field to browse to the correct path. Backup-to-Disk folder Select this option if the folder is to exist on a device that has non-removable media. This type of folder supports concurrent operations from one or more media servers. You can create a backup folder in any location where you can write a file, such as:
NTFS partitions (local or remote) Network Attached Storage (NAS) devices DFS shares FAT/FAT32 partitions (local or remote) Symantec Volume Manager partitions RAID drives with any configuration Mapped drives NFS volumes
Note Backup Exec does not determine if the device is a non-removable device; however, Symantec recommends that you do not select this option if you want to use removable media, such as a zip drive.
178
Administrators Guide
Using Backup-to-Disk Folders and Files New Backup-to-Disk Folder options Item Removable Backup-to-Disk folder Description Select this option if the folder is to exist on a device that has removable media. This type of folder supports spanning of backup sets from one piece of media to another, but does not support concurrent operations. This type of folder should not be shared between media servers. When creating this type of folder, you must specify only a device, not a path. You can create removable backup-to-disk folders on any removable device, provided the device appears as a drive letter and is formatted with a file system. Removable devices can include:
For CDR-RW and DVD-RW, third-party software must be used to format the media with a file system before it can be used with Backup Exec. Set Default Path Click this button to set a default path for all future backup folders. Then, type or select the default path.
The folder appears on the Devices tab below the Backup-to-Disk Folders or Removable Backup-to-Disk Devices icon, depending on which type you created, and the All Devices icon. It also appears in Windows Explorer as a folder. You can back up data to this folder now. Related Topics: Viewing Devices on page 125
179
6. To rename the new backup folder to match the name of the original backup folder, delete the original backup folder and then rename the new folder. Related Topics: Adding a Backup Folder on page 177 Renaming a Backup Folder on page 180 Deleting a Backup File on page 187
181
8. When prompted to delete the folder, click Yes. The folder is removed from the disk. You cannot recreate the folder or the files.
182
Administrators Guide
To pause or resume a backup folder: 1. On the navigation bar, click Devices. 2. Expand the icon for the computer where the backup folder is located. 3. Click either Backup-to-Disk Folders or Removable Backup-to-Disk Devices. 4. Select the backup folder you want to pause or resume. If the backup folder is currently paused, this status is displayed next to the backup folder name in the Devices tree view. 5. Under Device Tasks in the task pane, select Pause. If the folder was not already paused, it is now paused. If the folder was already paused, it is now resumed.
183
Pause: Select this check box to pause the device, and then click OK. Enable: Select this check box in order for Backup Exec to use this device. Clear this check box to disable the device, and allow it to be available for other applications. If the box is clear, the device is disabled, and cannot be used by Backup Exec. After changing the option, click OK. Online: If the device is online, the check box appears dimmed, with a check mark. If the device is offline, the check box is available, with no check mark. To bring the device online, check Online. No operations are allowed on the device until it is online again.
Path
184
Administrators Guide
Using Backup-to-Disk Folders and Files General Backup Folder Properties dialog box Item Priority Description The Priority field is only available when the backup folder belongs to a device pool and is selected for viewing under the device pool icon. Backup folder properties displayed under the Backup-to-Disk Folders and Removable Backup-to-Disk icons do not display the Priority field. For more information, see Setting Priorities for Devices in a Device Pool on page 135. Set a priority for a backup folder that determines the order in which the devices in a device pool are used. In the Priority box, type a number from 1 to 99, with 1 designating this device as the first device to be used in the device pool, or click the arrows to select a value. The default priority is 10 so all devices have the same priority initially. The device to which you assign the lowest number is the first device to be used in the device pool; for example, a device with a priority of 1 is used before a device with a priority of 5. Note Overwrite and append periods for media take precedence over device priority.
185
Backup-to-Disk file management Maximum size for Backup-to-Disk files Type the maximum size for each backup-to-disk file contained in this folder and then select either MB or GB as the unit of size. The file size can be as small as 1 MB or as large as 4096 GB. The default is 1 GB. Type the maximum number of backup sets to be written to each backup-to-disk file in this folder. The maximum number can range from 1 to 8192. The default is 100.
Maximum number of backup sets per Backup-to-Disk file Disk Space Settings Disk space reserve
Type the minimum number of megabytes or gigabytes of disk space that can remain before the backup-to-disk folder stops accepting jobs. If the backup-to-disk folder is a removable storage folder, the jobs will span to new media after the reserved disk space reaches this minimum.
Device settings Auto detect settings Clear this check box if you have a storage device for which you can set buffer reads or writes. Otherwise, when this option is selected Backup Exec will detect the preferred settings for your device. Select this check box if you do not want Backup Exec to auto-detect device settings and you know that your device allows buffered reads, which is the reading of large blocks of data. Select this check box if you do not want Backup Exec to auto-detect device settings and you know that your device allows buffered writes, which is the writing of large blocks of data.
Buffered reads
Buffered writes
Concurrent Operations Allow x concurrent operations for this Backup-to-Disk Folder This option only appears if the backup-to-disk folder is a non-removable folder. Type the number of concurrent operations that can be performed on this folder. This number can range from 1 to 16.
186
Administrators Guide
The backup file is deleted from Backup Exec, but not from the disk. To delete the backup file from the disk, continue to step 7. If you do not want to delete the backup file from the disk, you have completed this procedure. Caution If you perform step 7 to delete the backup file from the disk, you can no longer restore the deleted file. 7. Using Windows Explorer, navigate to the location where the backup file is stored. 8. Right-click the backup file. 9. Click Delete, and then click Yes.
188
Administrators Guide
189
Only Microsoft tape class drivers can be used if you plan to use Backup Exec and the Removable Storage feature. If you want to use a third party tape class driver or a Symantec tape class driver, you must disable the device through Removable Storage before installing the driver.
In Computer Management on the local computer, under the Storage node, open Removable Storage, and then open Media Pools. Move media from the Import or Free media pools into a Backup Exec media pool (see your Microsoft Windows 2000 documentation or online help for details). The next time that Removable Storage is scanned, any media that is in the Backup Exec pool is allocated to Backup Exec and marked as "in use" by Backup Exec. Acquire available media through normal Backup Exec operations. This media is then placed in the Removable Storage Import pool and can be accessed by Backup Exec using the policies you established for Imported media.
Media that is in the Removable Storage Free media pool or that is unrecognizable by Removable Storage is marked as unknown media within Backup Exec. You must run an Inventory job to mount and read the media header. The media is imported into Backup Exec and marked as "in use" by Backup Exec. If you do not want that media used by Backup Exec, delete it from the ADAMM database. For more information, see Deleting Media on page 252. Backup Exec cannot append to media prepared initially by Removable Storage. To be able to use this media, you must run an overwrite operation. If media is introduced for the first time into Removable Storage, but it was previously possessed by Backup Exec or written to by Backup Exec during a mount operation, even on another server, then that media is allocated to Backup Exec for exclusive use.
190
Administrators Guide
191
Inventory robotic library or device Erase media in a robotic library or device Import media Export media Export expired media (robotic libraries only) Lock robotic library Unlock robotic library Clean drive
Utility jobs that can be created only as run-once jobs, which are jobs that are scheduled to run now or to run once at a specified date and time, include:
Label media Format media Retension media Eject media Initialize robotic library
If you have a robotic library, you can perform utility operations on the robotic library, the robotic library drive, all slots, and individual slots. You can perform operations on devices in Backup Exec by doing one of the following:
Right-click an object to display options on the shortcut menu. Select an object, and then click an available task on the task pane.
192
Administrators Guide
4. Click OK.
b. Double-click Backup-to-Disk Folders. c. Double-click either Backup-to-Disk Folders or Removable Backup-to-Disk Devices.
d. Click the backup folder that contains the file you want to inventory. e. On the Results pane, select the file you want to inventory.
5. Under Media Tasks in the task pane, select Inventory. 6. Select the appropriate options as follows:
Inventory Job Properties options Item Job name Job priority Description Type a name for the job or accept the default name. Select the priority for the job. Available options are:
194
7. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 8. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). There may be a delay (up to several minutes for some drives) as the media is mounted and inventoried. The inventory operation can be monitored or canceled through the Job Monitor. Related Topics: Media Labeling on page 234 Inventory all drives on Backup Exec services startup on page 120
Erasing Media
You can erase media using either Quick erase or Long erase. Not all devices support a long erase; those that do not can only perform a quick erase. Quick erase writes an indicator at the beginning of the media that makes the data contained on the media inaccessible. For most uses, a Quick erase is sufficient. Long erase instructs the drive to physically erase the entire media. If you have sensitive information on the media and you want to dispose of it, use Long erase. Running Long erase on media can take several minutes to several hours to complete (depending on the drive and the media capacity). Quick and Long erase do not change the media label. To change a media label, use Label Media or Rename prior to the Erase operation. To erase media: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the device resides in a robotic library, click Robotic Libraries. 3. Select the drive or slot containing the media you want to erase. 4. Under Media Tasks in the task pane, select either Erase media, quick or Erase media, long.
195
Note If the drive does not support a long erase, Erase media, long will not be available. The following warning is displayed: "This operation will be performed on the current media in the drive or slot. If the media has been changed since the last inventory operation was performed, the media label in the next dialog may not match the media in the drive or slot selected." 5. Click OK to continue. The media displayed was read during the last inventory operation; the display does not change until another inventory operation occurs. Therefore, if you change media in the slot or drive but did not run Inventory, the media label displayed may not match the actual media in the slot or drive. 6. When prompted, click Yes to erase the media. 7. Select the appropriate options as follows:
Erase media options Item Job name Job priority Description Type a name for the job or accept the default name. Select the priority for the job. Available options are:
8. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). You can monitor the Erase operation through the Job Monitor. You cannot cancel an Erase operation after it has started; however, you can use Cancel to stop a queued erase operation.
196
Administrators Guide
197
Creating Utility Jobs Erase media options (continued) Item Job priority Description Select the priority for the job. Available options are:
9. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 10. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398).
Retensioning a Tape
Use Retension media to run the tape in the tape drive from beginning to end at a fast speed so that the tape winds evenly and runs more smoothly past the tape drive heads. Refer to the documentation that came with your tape drive to see how often this utility should be performed. Retensioning is primarily for Mini Cartridge and quarter-inch cartridges and is not supported on most other types of tape drives. To retension a tape: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the drive or slot containing the media you want to retension. 4. Under Media Tasks in the task pane, select Retension media.
198
Administrators Guide
6. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and select the options you want (see Selecting Recipients for Notification on page 534). 7. Click Run now. The job will be submitted as a Run now job, unless you submitted the job on hold. You can monitor the Retension operation from the Job Monitor. You cannot cancel a Retension operation after it has started; however, you can use Cancel to stop a queued retension operation.
199
3. Select the drive or slot containing the media you want to format. 4. Under Media Tasks in the task pane, select Format media. The media label that is displayed was read during the last inventory operation. The media label displayed does not change until another inventory operation occurs. Therefore, if you changed media in the slot or drive but did not run Inventory, the media label displayed may not match the actual media in the slot or drive. 5. To format the media that is displayed, click Yes. 6. Select the appropriate options as follows:
Format media options Item Job name Job priority Description Type a name for the job or accept the default name. Select the priority for the job. Available options are:
7. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and select the options you want (see Selecting Recipients for Notification on page 534). 8. Click Run now. The job will be submitted as a Run now job, unless you submitted the job on hold. You can monitor the Format operation from the Job Monitor. You cannot cancel a Format operation after it has started; however, you can use Cancel to stop a queued Format operation.
200
Administrators Guide
Labeling Media
Use Label media to immediately write a new media label on the media in the selected drive. This operation destroys any data on the media. To change the media label without destroying the data on the media (until an overwrite operation occurs), use Rename. To label media: 1. On the navigation bar, click Devices. 2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a robotic library, click Robotic Libraries. 3. Select the drive or slot containing the media you want to label. 4. Under Media Tasks on the task pane, select Label media. The following warning is displayed: "This operation will be performed on the current media in the drive or slot. If the media has been changed since the last inventory operation was performed, the media label in the next dialog may not match the media in the drive or slot selected." 5. Click OK. 6. Type the name you want to use as the recorded media label for this media. Note This media will be overwritten. 7. Click OK to erase all data on the media and re-label the media. 8. Select the appropriate options as follows:
Label media options Item Job name Description Type a name for the job or accept the default name.
201
Creating Utility Jobs Label media options (continued) Item Job priority Description Select the priority for the job. Available options are:
9. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 10. Click Run now. The job will be submitted as a Run now job, unless you submitted the job on hold. You can monitor the Label media operation from the Job Monitor. You cannot cancel a Label media operation after it has started; however, you can use Cancel to stop a queued Label media operation. 11. Write this same media label on an external label fixed to the outside of the physical media. Related Topics: Renaming Media on page 238
202
Administrators Guide
5. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and select the options you want (see Selecting Recipients for Notification on page 534). 6. Click Run Now. The job will be submitted as a Run now job, unless you submitted the job on hold.
203
204
Administrators Guide
Creating Utility Jobs Clean Robotic Library Drive options Item Job priority Description Select the priority for the job. Available options are:
5. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). You can monitor the cleaning job through the Job Monitor. You can view cleaning statistics for the drive by right-clicking the drive and selecting Properties. For more information, see Viewing and Using Device Properties and Statistics on page 151.
Importing Media
Backup Exec fully supports robotic libraries with portals through its Import and Export utility jobs. It is important to create Import and Export jobs when changing media in your robotic library so that the Backup Exec database is updated. You can select any number of slots to import and export. When you use the Import utility, the slots you highlighted are checked for media. If media is present, it is exported to the portals. After all the media has been exported, you are prompted to insert new media into the portal so it can be imported. This process continues until all of the requested media has been imported into the robotic library. If your robotic library uses a media magazine, make sure no jobs are currently running and that all media are ejected from the drive and are back in the magazine slots before swapping the magazine. To import media in the robotic library: 1. On the navigation bar, click Devices. 2. Select the robotic library.
205
3. Click Slots. 4. On the Results pane, select the slots you want to import media to. 5. Under Media Tasks in the task pane, select Import media. 6. Select the appropriate options as follows:
Import options Item Job name Job priority Description Type a name for the job or accept the default name. Select the priority for the job. Available options are:
7. If you want Backup Exec to automatically create an inventory job to run after the import job completes, double-click Settings, click Options and select Auto-inventory after import is completed. 8. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). You can monitor the import job through the Job Monitor.
206
Administrators Guide
Exporting Media
The Import media and Export media utilities allow Backup Exec to fully support robotic libraries with portals. When you use the Export media utility on one or more robotic library slots, the exported media is placed in the portals. If you select more media than there are portals, the robotic library will fill as many slots as possible, then you are prompted to remove the media from the portal. This process continues until all of the selected media has been removed from the robotic library. To export media: 1. On the navigation bar, click Devices. 2. Select the robotic library. 3. Click Slots. 4. On the Results pane, select the slots you want to export media from. 5. Under Media Tasks in the task pane, select Export media. 6. Select the appropriate options as follows:
Export media options Item Job name Job priority Description Type a name for the job or accept the default name. Select the priority for the job. Available options are:
7. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 8. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). You can monitor the export job through the Job Monitor.
Chapter 4, Managing Devices 207
5. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). You can monitor the lock job through the Job Monitor.
3. Under Robotic Library Tasks in the task pane, select Unlock. 4. Select the appropriate options as follows:
Unlock options Item Job name Job priority Description Type a name for the job or accept the default name. Select the priority for the job. Available options are:
5. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). You can monitor the unlock job through the Job Monitor.
209
To export expired media from a robotic library: 1. On the navigation bar, click Devices. 2. Select the robotic library. 3. Under Robotic Library Tasks in the task pane, select Export expired media. 4. On the Export Job Properties pane, under Settings, click General, and enter information as necessary:
Export expired media options Item Job name Job priority Description Type a name for the job or accept the default name. Select the priority for the job. Available options are:
5. To set options for the export expired media job, on the Properties pane, under Settings, click Options, and select the following as appropriate:
Export expired media Job options Item Include cleaning media in export Description Select this check box to include cleaning media in the export of expired media.
Export cleaning media Select the number of times that the cleaning media can be used used more than x times before it is exported by this job. After export, automatically prompt for new media to be imported Select this check box to be prompted to import new media to the slot after the export expired media operation has completed.
210
Administrators Guide
6. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification and select the options you want (see Selecting Recipients for Notification on page 534). 7. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). You can monitor the export expired media job through the Job Monitor.
211
212
Administrators Guide
Chapter
Managing Media
Protect data from being overwritten. Set up media rotation strategies. Track the location of media. Label media automatically. Read and track media labels with bar codes. Collect and report media statistics.
On the navigation bar, click Media to view all the media used in Backup Exec, view how the media is organized into media pools, media sets, and media vaults, and view media properties.
213
how long new jobs can be written to the media after the first job has been written (the append period), and another restriction is placed on how long the data is preserved after it is written (the overwrite protection period). These two restrictions, the append period and the overwrite protection period, are applied to groups of media, called media sets. Media sets are media that have the same append period and the same overwrite protection period.
Media Set
The append period is the amount of time that data can be appended (added) to a media and is measured from the time the media was first allocated (assigned) to the media set. It can be specified in hours, days, weeks, or years. The overwrite protection period is the amount of time that media is protected from being overwritten and is measured from the time of the last write to the media, that is, at the end of the last append or overwrite job. It can be specified in hours, days, weeks, or years. When the overwrite protection period is over, the media becomes recyclable and can be overwritten.
214
Administrators Guide
APPENDPERIOD
The Overwrite Protection Period is measured from the time of the last write to the media. During the Append Period, data can be added to the media. Any data already on the media is protected against loss. The Append Period ends. After the Append Period expires, and while the Overwrite Protection Period is still active, data cannot be added to the media. Any data already on the media is protected against loss. The Protection Period expires. The media cannot be overwritten by another job during this interval. (However, you could erase the media or move it to a scratch pool.)
TIME
TIME
New data
TIME
After the Overwrite Protection Period expires, the media becomes Recyclable. This means that new data can be written to the beginning of the media by a new backup job (causing loss of the original data).
Old data
The append and overwrite protection periods that you specify apply to all the data on the media. Therefore, each time data is written to a media, the time remaining in the overwrite protection period is reset and the countdown restarted.
215
Time in days
Time in days
Time in days
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Normal Bkup
First Day
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Second Day
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20
Normal Bkup Normal Bkup Normal Bkup Normal Bkup Normal Bkup
1 1 2 1 23 1 234
Fifth Day
The media can be overwritten at this time
Because the overwrite protection period does not begin until the job completes, the amount of time that the job takes to complete affects the amount of time until the media can be overwritten. For example, suppose that you create a media set named Weekly with an overwrite protection period of seven days, and an append period of 0 days, and you schedule a full backup job to run each Friday at 9 p.m. When it is time for the full backup to run at 9 p.m. the following Friday, the job cannot run because the first backup job that ran the previous Friday did not complete until 10:10 p.m. Therefore, the overwrite protection period for the Weekly media set still has 70 minutes remaining. Typically, to prevent this situation, you would shorten the overwrite protection period to account for the amount of time a job may run. For this example, the scheduled job recurring at 9 p.m. can run if the overwrite protection period is set to 6 days instead of 7 days.
216
Administrators Guide
A media set named Media Set 1 is created. The append and overwrite protection periods for Media Set 1 are set to Infinite. All backup jobs you create are targeted to Media Set 1, unless you change the target during the First Time Startup Wizard.
By using these defaults, you can keep all of your backup data safe from overwriting forever (unless you erase, label, or format the media, or move it to Scratch Media). You will eventually run out of overwritable media unless you continually introduce scratch media into Backup Exec. To ensure that Backup Exec has media available, you can:
Create new media sets with append and overwrite protection periods set to intervals of time that accommodate your needs (such as weekly, monthly, etc.) and then assign jobs to these media sets. When the overwrite protection period expires, the media become recyclable and Backup Exec can use them for other overwrite jobs. Change the append and overwrite protection periods of Media Set 1 to finite periods. The risk with changing the overwrite protection period in Media Set 1 is that if you continue to use Media Set 1 as the default destination media set for all backup jobs, your data may not be protected as long as you need it to be.
The media for many jobs can be targeted to the same media set. Allocated media are media that belong to a media set. As long as the append and overwrite protection periods are current, the media are allocated to that media set. Backup Exec automatically allocates media. When the overwrite protection period expires, the media become recyclable. The media are still displayed as being in that media set, but with a status of recyclable. You do not need to move recyclable media to or from a media set; Backup Exec can overwrite the recyclable media in any media set whenever more media are needed for other jobs. Related Topics: Creating Media Sets on page 218 Deleting a Media Set on page 221 Renaming a Media Set on page 222 General Media Set Properties on page 223
217
218
Administrators Guide
Media Overwrite Protection New Media Set, General tab (continued) Item Media set periods Overwrite protection period Enter the length of time in hours, days, weeks, or years to retain the data on the media before the media can be overwritten (unless the media is erased, formatted, labeled, moved to Scratch Media, or if the Media Overwrite Protection Level is set to None). The overwrite protection period begins when the backup job is completed. If there is an append period, the overwrite protection period begins again each time an append job completes. Because the overwrite protection period does not begin until the job completes, the amount of time that the job takes to complete affects the amount of time until the media can be overwritten. You may shorten the overwrite protection period to take into account the amount of time a job may run. For example, setting the overwrite protection period for seven days and the append period for four days ensures that data will not be overwritten for at least seven days, and that data can be appended to the media for the next four days. The last data appended to this media is retained for at least seven days. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The default is Infinite - Dont Allow Overwrite, which protects the media from being overwritten for 1,000 years, unless the media is erased, formatted, labeled, moved to Scratch Media, or if the media overwrite protection level is set to None. Append period Enter the length of time in hours, days, or weeks, that data can be added to media. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The append period starts when the first backup job is written to this media. The default is Infinite - Allow Append, which allows data to be appended until the media capacity is reached. Description
4. To specify vault rules to set dates for when media should be moved to or returned from a media vault, click the Vault Rules tab.
219
Related Topics: Media Overwrite Protection on page 213 Deleting a Media Set on page 221 Renaming a Media Set on page 222 General Media Set Properties on page 223 Vault Rule Properties for Media Sets on page 225 Update Media Vaults by Using a Wizard on page 245
220
Administrators Guide
221
5. If there are scheduled jobs allocated to the deleted media set, you are prompted to redirect the jobs to another media set. 6. In the Media Set selection box, click the Down arrow to see more options, and then select the new media set to which you want to redirect the scheduled jobs. 7. Click Yes to redirect the displayed job to the selected media set, or if there are multiple scheduled jobs, click Yes to All to redirect all scheduled jobs to this media set without further prompting. The scheduled jobs are redirected.
222
Administrators Guide
Name of a media set Overwrite protection and append periods for a media set Media vault and the vaulting periods associated with a media set.
To change or view general media set properties: 1. On the navigation bar, click Media. 2. In the Media selection pane, under Media Sets, select a media set. 3. Under General Tasks on the task pane, click Properties. 4. To change the media set name or overwrite or append periods, click the General tab. The Media Set Properties General tab appears. 5. Select the appropriate options as follows, and then click OK:
Media Set properties, General tab Item Name Description View or change the media set name. When you rename a media set, properties for any jobs that belong to that media set will still display the previous media set name. To update the media set name for these jobs, select the job from the Job Setup view and then under General Tasks on the task pane, click Properties. The media set name is updated to the new name. See Renaming a Media Set on page 222. Creation date Date when the media set was created.
223
Media Overwrite Protection Media Set properties, General tab (continued) Item Media set periods Overwrite protection period Enter the length of time, in hours, days, weeks, or years to retain the data on the media before the media can be overwritten (unless the media is erased, formatted, labeled, moved to Scratch Media, or if the Media Overwrite Protection Level is set to None). The overwrite protection period is measured from the time of the last write to the media, that is, at the end of the last append or overwrite job. For example, setting the overwrite protection period for seven days and the append period for four days ensures that data will not be overwritten for at least seven days, and that data can be appended to the media for the next four days. The last data appended to this media is retained for seven days. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The default is Infinite - Dont Allow Overwrite, which protects the media from being overwritten for 1,000 years, unless the media is erased, formatted, labeled, moved to Scratch Media, or if the media overwrite protection level is set to None. Append period Enter the length of time, in hours, days, or weeks, that data may be added to the media. Because of the method Backup Exec uses to compute time, the unit of time that you enter may be converted. For example, if you enter 14 days, the next time you view this property, it may be displayed as two weeks. The append period starts when the first backup job is written to this media. The default is Infinite - Allow Append which allows data to be appended until the media capacity is reached. Description
224
Administrators Guide
The media vault that you want the media in this media set sent to after a period of time. The amount of time to wait after the media cannot be written to before sending it to the vault. The amount of time to return the media from the vault after it was first sent.
The media are not automatically moved to or from the vault. Use the task Update vault using wizard to print or view reports that contain details on which media are ready to be moved to and from the vault, and to update the media location. For more information, see Update Media Vaults by Using a Wizard on page 245. To change or view vault rule properties for media sets: 1. On the navigation bar, click Media. 2. In the Media selection pane, under Media Sets, select a media set. 3. Under General Tasks on the task pane, click Properties. 4. Click the Vault Rules tab. The Media Set Properties, Vault Rules tab appears. 5. Select the appropriate options as follows, and then click OK:.:
Media Set Properties, Vault Rules tab Item Select the media vault to use with this media set: Description Click the drop-down arrow to select a media vault. This media vault will be used to store the media in this media set that meet the move and return time periods. Before the media location can be updated, even if the move and return dates are overdue, you must run the task Update vault using wizard (see Update Media Vaults by Using a Wizard on page 245). This wizard can print reports that detail which media are ready to move to and return from the vault, and can update the location of the media if you choose to move them. However, you must physically collect the media, and move the media to and from the vault.
225
Media Overwrite Protection Media Set Properties, Vault Rules tab (continued) Item Description
Move media to this vault x after it Specify a time period after which this media will be can no longer be written to reported as ready to be moved to this vault. Return media from this vault x after it was sent to the vault Specify a time period after which this media will be reported as ready to be returned from this vault.
Related Topics: Update Media Vaults by Using a Wizard on page 245 Creating Media Sets on page 218
Full. Allows you to overwrite scratch (media that contains data you are willing to discard) and recyclable media (media with an expired overwrite protection period). Partial. Allows you to overwrite imported media, which is media that was created by another installation of Backup Exec or some other backup product, and overwrite scratch media. None. Allows you to overwrite all media, including those that have current overwrite protection periods (allocated media).
Caution The None option is not recommended because it does not protect data from being overwritten. Section 1 in the figure Media Overwrite Protection on page 231 illustrates the media overwrite protection level. Related Topics: Setting Default Media Options on page 239
226 Administrators Guide
Media Categories
Backup Exec recognizes media that is inserted into storage devices and categorizes it as:
All Media. All media that has been introduced into Backup Exec. Any media that is available for overwriting in backup operations, such as scratch or recyclable media, displays in blue. When you click the All Media icon, the Results pane displays properties for the media in Backup Exec. For more information, see Viewing Media Information on page 126. System Media. All media that has been introduced into Backup Exec, except those media that have been allocated to a media set. System Media includes Scratch, Retired, and Imported Media. Scratch media displays in blue in the Media and Devices views.
Retired Media. Media that you have taken out of service, usually because of an excessive number of errors. After a media has been categorized as retired, it is not selected for use in a media set by Backup Exec. It is still available for restore operations, if it has not been damaged. You can delete media that is in Retired Media to remove it from Backup Exec. You may want to delete media, for example, when you have a lot of offsite media that you do not want to recycle or if you throw away the media. If you decide to use deleted media in Backup Exec, it is recognized as Imported Media and must be cataloged before you can restore from it.
Scratch Media. Media that do not belong to a media set and can be overwritten, including:
New or blank media. Media that you have moved from another group, such as a media set or Imported Media. Erased media.
Cleaning Media. All cleaning media. Imported Media. Media created by a product other than this installation of Backup Exec. By default, Imported media have an overwrite protection period of Infinite, but can still be overwritten if the media overwrite protection level is set to Partial or None. You can overwrite imported media using several methods. Data can be restored from imported media until that media is overwritten. Other media pools that are contained in Imported Media are:
Backup Exec and Windows NT Backup Media. Media from another installation of Backup Exec. Backup Exec Archive Media. Media that was used for archive jobs. Foreign Media. Media from a product other than Backup Exec.
227
Media Sets. Media sets are groups of media that have the same overwrite protection period and append period. The overwrite protection period is the length of time that data is retained on a specific media before becoming available for overwriting. The append period is the length of time that data can be added to a media. You can create different media sets, each with different data overwrite protection and append periods. When a backup job is created, you target it to a specific media set that defines the particular data overwrite protection and append periods you want applied to the backup job. Use media sets to set up media rotation strategies. Media sets include:
Allocated media. Media that belong to a media set. Allocated media are always displayed in the allocated media set, even after the data overwrite protection date expires. Recyclable media. Media that are allocated to a media set, but have expired overwrite protection periods. You can move recyclable media to Scratch Media, or you can let it remain in the media set list. When a backup job runs, by default Backup Exec uses scratch media first, and then selected recyclable media that is in the targeted media set for overwriting if no scratch media are available. To change this default, on the Tools menu, click Options, and then under Settings, click Media Management. Recyclable media, along with scratch media, display in blue in the Media and Devices views.
Overwrite scratch media before overwriting recyclable media contained in the targeted media set. If you choose to overwrite scratch media before recyclable media, more media may be required for the same number of jobs, but the recyclable media may be preserved longer for possible recovery.
Overwrite recyclable media contained in the targeted media set before overwriting scratch media. If you choose to overwrite recyclable media before scratch media, you will re-use the same media more frequently than if you choose to overwrite scratch media before recyclable media.
228
Administrators Guide
Note In a device pool, Backup Exec selects the oldest recyclable media in all of the devices in the device pool to use first. In a robotic library, Backup Exec selects the oldest recyclable media in the library to use first. If the robotic library is partitioned, Backup Exec searches for the oldest recyclable media in the targeted partition only. Caution It is recommended that you physically write-protect media containing critical data by using the write-protect tab on the media cartridge to protect against unintentional move or erase operations, or expired overwrite protection periods. Related Topics: Setting Default Media Options on page 239
1. Scratch media 2. Recyclable media in the targeted media set 3. Recyclable media in any media set 1. Recyclable media in the targeted media set 2. Scratch media 3. Recyclable media in any media set
1. Scratch media 2. Recyclable media in the targeted media set 3. Recyclable media in any media set 4. Imported media
229
Media Overwrite Protection How Backup Exec searches for overwritable media (continued) Overwrite protection level and overwrite option: Partial + Overwrite recyclable media first Media is overwritten in this order:
1. Recyclable media in the targeted media set 2. Scratch media 3. Recyclable media in any media set 4. Imported media
None - No overwrite protection + overwrite scratch media first Caution This option is not recommended because it does not protect data from being overwritten.
1. Scratch media 2. Recyclable media in the targeted media set 3. Recyclable media in any media set 4. Imported media 5. Allocated media in any media set 1. Recyclable media in the targeted media set 2. Scratch media 3. Recyclable media in any media set 4. Imported media 5. Allocated media in any media set
None - No overwrite protection + overwrite recyclable media first Caution This option is not recommended because it does not protect data from being overwritten.
230
Administrators Guide
1 1 1 2
Media Overwrite Protection Level
None
Partial
Full
2
Recyclable Media (current user media sets) Media Overwrite Option can reverse these, causing the Scratch media set to be examined second rather than first.
Scratch Media
Scratch Media
Imported Media
Allocated Media
Allocated Media
With the Media Overwrite Options, you can make Backup Exec favor scratch media over the expired (recyclable) media in the Media Set of the current job (on the right side of this page), or favor the latter over the former (on the left of this page).
When Backup Exec is unable to locate usable media, it prompts you to provide one.
The most obvious candidates for backup jobs requiring overwritable media are scratch media and recyclable media (media with expired overwrite protection periods). These are the first types of media for which Backup Exec searches when a backup requires media to overwrite. The search pattern is different according to whether you have chosen Full, Partial, or None. The media indicate that a type of media set is examined for availability. In addition to setting overwrite protection levels, you must set overwrite options, which set the order in which Backup Exec searches for overwritable media. Related Topics: Media Overwrite Options on page 228
Chapter 5, Managing Media 231
Append to media, overwrite if no appendable media is available. When you are performing an append backup operation and the backup job is set to this option, Backup Exec searches for available media as follows: 1. Searches for appendable media in the media set that is targeted in the backup operation. 2. If no appendable media can be found, Backup Exec changes the backup operation to overwrite and continues searching for overwritable media as outlined in How Backup Exec Searches for Overwritable Media on page 229.
Caution If an append job fills a media, the job continues on another piece of overwritable media. Depending on your configuration, overwritable media is selected from Scratch Media or Recyclable Media. If the media in the device is not overwritable, a message prompts you to insert overwritable media.
Append to media, terminate job if no appendable media is available. When you are performing an append backup operation and the backup job is set to this option, Backup Exec searches for available media as follows: 1. Searches for appendable media in the media set targeted in the backup operation. 2. If no appendable media is found, the backup operation is terminated.
Move the media to Scratch Media. The media is overwritten when it is selected for an overwrite job. Erase the media. Erased media is automatically recognized as scratch media and will be overwritten immediately.
232
Administrators Guide
Label the media. The Label Media operation immediately writes a new media label on the media, which destroys any data contained on the media. Format the media. Formatting destroys any data contained on the media. Change the overwrite protection period for the media set so that it is expired. Select the media set, and then under General Tasks, click Properties.
Related Topics: Deleting Media on page 252 General Media Set Properties on page 223 Media Overwrite Options on page 228
233
Media Labeling
Media Labeling
Media used in Backup Exec is identified by its media label. When new, blank, or unlabeled media is used during a backup operation, Backup Exec automatically labels the media. This label consists of a prefix that identifies the cartridge type, and an incrementing number. For example, if the media is a 4mm tape, then the prefix would be 4M, followed by 000001. The next media label generated for an unlabeled 4mm tape would be 4M000002, and so on. You can allow the media label to be assigned automatically by Backup Exec, or you can specify a label prefix and number to be assigned for a type of media. For example, you can specify that all 4mm media that are entered for the first time into this installation of Backup Exec are labeled with a prefix of ACCT, and with numbering starting from 1000. You can specify another media type to be labeled with a prefix of FIN, and with numbering starting at 10,000. Customizing labels in this manner can help you recognize and organize media. Another type of media label used by Backup Exec is the media ID, which is a unique label assigned by Backup Exec to individual media used in Backup Exec. The media ID is used internally by Backup Exec in order to keep statistics on each media. Because the media label or bar code label for media can be changed, Backup Exec must use the media ID, which cannot be changed or erased, to preserve continuity in record keeping for each individual media. The media ID has no effect on the media label, or on your ability to rename, label, or erase media. At times, you may need to use the media ID to distinguish media that have duplicate media labels. Duplicate labels can be automatically generated in instances when Backup Exec is reinstalled or media from another Backup Exec installation is used. Use the media ID to distinguish between duplicate labels. You can view the media ID in a medias property page. Write the media label on an external label fixed to the outside of the physical media. Whenever you change the media label, you should also change the external label to match. Three methods are available in Backup Exec to change a media label:
Label Media operation. Writes a new media label on the media. This write operation destroys any data on the media. This option is available on the Devices view. Rename operation. Changes the name of the media in the display, but does not write the new label to the media until an overwrite operation occurs. The data on the media is viable until the media is overwritten. Edit the label in the medias property page. Editing the label changes the name of the media in the display, but does not write the new label to the media until an overwrite operation occurs. The data on the media is viable until the media is overwritten.
234
Administrators Guide
Media Labeling
Related Topics: Setting Default Media Options on page 239 Labeling Media on page 201 Bar Code Labeling on page 235 Renaming Media on page 238 Viewing General Media Properties on page 253
235
Media Labeling
scans the bar code ID on the media label. Backup Exec selects this media for the operation and detects that a bar code label has been assigned to the media. Backup Exec automatically uses the bar code label and continues the operation. When you change magazines or insert new media in a magazine, bar code readers allow you to quickly update slot information by right-clicking the slot (or slots) and selecting Scan. Related Topics: Media Labeling on page 234
Enable the bar code rules for the robotic library by selecting the bar code rules option on the Configuration tab in the robotic librarys properties. For each drive in the mixed media library, indicate what type of media can be used and whether that media can be used for read or write operations. To set this up, see Viewing and Specifying a Devices Media Types on page 163.
To set up a bar code label rule: 1. On the Tools menu, click Options. 2. In the Properties pane, under Settings, click Bar Code Rules. 3. Click New. 4. Select the appropriate options as follows:
Add Bar Code Rule dialog box Item Select a media type Description Select the media for which you want to add a bar code rule.
236
Administrators Guide
Media Labeling Add Bar Code Rule dialog box (continued) Item Vendor Description (Optional) Type the name of this librarys manufacturer. You can find the name of the library manufacturer on the librarys property page. This field is not case-sensitive. By typing a vendor name here, you restrict the bar code rule to that vendors libraries. If you are creating a general bar code rule that applies to libraries from different vendors, leave this field blank. Barcode prefix Type a code to be placed before the bar code that represents a media type. The code can be up to 16 characters, and any combination of letters and numbers. This field is not case-sensitive. Type a code to be placed after the bar code that represents a media type. The code can be up to 16 characters, and any combination of letters and numbers. This field is not case-sensitive.
Barcode suffix
5. Click OK to save the bar code rule for the media. 6. Verify that bar code rules are enabled for the robotic library. The bar code rules do not go into effect until you enable them for the robotic library. For more information, see Viewing Robotic Library Configuration Properties on page 169. To change a bar code rule: 1. On the Tools menu, click Options. 2. In the Properties pane, under Settings, click Bar Code Rules. 3. Click Edit, and then change the options as needed. 4. Click OK to save the changes, and then click OK to exit. To delete a bar code rule: 1. On the Tools menu, click Options. 2. In the Properties Pane, under Settings, click Bar Code Rules. 3. Select a bar code rule to delete, and then click Delete. 4. Click Yes to verify that you want to delete the rule, and then click OK.
237
Media Labeling
Renaming Media
Use Rename to assign a new label to media. The new label is not actually written to the media until an overwrite operation occurs. All data on the media is preserved until the next overwrite job. However, the new media label is stored in the database and is displayed for that media. To write a new media label to the media immediately, use Label Media on the devices property page. The medias contents will be erased. If you rename a media, and then use it in another installation of Backup Exec, that media is treated as imported media, and the medias original media label is displayed; the renamed label is not transferred to other installations of Backup Exec. To rename a media label: 1. Do one of the following:
If the media is in a device, then from the navigation bar, click Devices, and then click that device to display the media. If you dont know where the media is, from the navigation bar, click Media, and then click All Media to display all media.
2. Select the media you want to rename. 3. Under General Tasks in the task pane, click Rename. 4. In Name, type a new media label, and then click OK. 5. Write this media label on an external label fixed to the outside of the physical media. Related Topics: Viewing General Media Properties on page 253
238
Administrators Guide
Media overwrite protection level Full - protect allocated and imported media Select this option to protect media in media sets and imported media from being overwritten. This is the safest option to choose because the media being protected cannot be overwritten until:
The overwrite protection period for the media expires. You move media that belongs to an active media set to Scratch Media. You erase, format, or label the media. You move media from Imported Media to Scratch Media.
Select this option to allow imported and scratch media to be overwritten. Media in a media set that has an overwrite protection period that has not expired (allocated media), cannot be overwritten. This option is recommended if you have media from an earlier version of Backup Exec or another product (imported media) that you want to reuse.
Select this option to be prompted before Backup Exec overwrites imported media when Partial has been selected. Note The job will not run until you respond to this prompt.
239
Setting Default Media Options Media Options - Set Application Defaults dialog box (continued) Item None Caution This option is not recommended because it does not protect data from being overwritten. Description Select this option to disable the media overwrite protection feature. With this option, you are responsible for making sure that the media in your storage devices are not accidentally overwritten. For example, when an overwrite job is submitted to a device, and the media overwrite protection level is set to None, the media in that device is overwritten. If you selected None (no overwrite protection), it is highly recommended that you select this option to be prompted before overwriting allocated or imported media. Note The job will not run until you respond to this prompt. Media overwrite options Overwrite scratch media before overwriting recyclable media contained in the targeted media set Select this option to have Backup Exec overwrite scratch media first when an overwrite job occurs. If no scratch media are found in any of the storage devices, Backup Exec overwrites recyclable media in the targeted media set. If no recyclable media are found, Backup Exec automatically searches for other media to overwrite. The media that is overwritten depends on the level of overwrite protection that you set (Full, Partial, or None). See How Backup Exec searches for overwritable media on page 229. If you select this option, more media may be required for the same number of jobs than if you choose to overwrite recyclable media first. Because this option affects the order in which Backup Exec overwrites media, choosing to overwrite scratch media first may allow the recyclable media to be preserved longer for possible recovery.
240
Administrators Guide
Setting Default Media Options Media Options - Set Application Defaults dialog box (continued) Item Overwrite recyclable media contained in the targeted media set before overwriting scratch media Description Select this option to have Backup Exec overwrite recyclable media in the targeted media set when an overwrite job occurs. If no recyclable media are found in any of the storage devices, Backup Exec overwrites scratch media. If no recyclable or scratch media are found, Backup Exec automatically searches for media to overwrite. The media that is overwritten depends on the level of overwrite protection that you set (Full, Partial, or None). See How Backup Exec searches for overwritable media on page 229. If you choose to overwrite recyclable media in the targeted media set first, you will re-use the same media more frequently than if you choose to overwrite scratch media first. Media label configuration Media type Select the type of media for which you want to create default labels. For example, if you select 4mm, then all 4mm-type media that are entered for the first time into this installation of Backup Exec are assigned a label according to what you specify in the following fields. Displays the current default prefix for the selected cartridge type. To specify a new prefix on the label, type from one to eight alphanumeric characters. Displays the next number that will be included in the label of the next media that matches the selected cartridge type when that media is entered for the first time into this installation of Backup Exec. This number is incremented by one each time a media that matches the selected cartridge type is entered into this installation of Backup Exec. For example, if Cartridge type is set to 4mm, and Next value is set to 1, the first time a 4mm media is entered into this installation of Backup Exec, its label will include the number 1. The label on the next 4mm media entered will include the number 2. To enter a new value, type from one to eight numeric characters. This number must not exceed the number specified in the Digits field.
Prefix
Next value
241
Setting Default Media Options Media Options - Set Application Defaults dialog box (continued) Item Digits Description Displays the length of Next value, including placeholder zeroes. This field defines the minimum size of the numeric portion of the label. For example, if Next value is set to 1, and Digits is set to 6, then the Next value for the media label is 000001, 000002, 000003, and so on. If the Next value exceeds the entry in the Digits field, the extra digit is added. Using the previous example, if label numbering continued until 999,999, the next label would be 1,000,000 even though the value specified in Digits is 6. Rolling over the label numbering to 1,000,000 and 1,000,001 rather than 000,000 and 000,001 prevents the duplication of labels. The number entered in the Digits field must be in the range of three to eight. Backup-to-Disk default folder location Type the default path for new backup folders. This default path appears in the New Backup-to-Disk Folder dialog box where you add a new backup folder. For more information, see Using Backup-to-Disk Folders and Files on page 176. When making selections for backups that you are targeting to a backup folder, avoid including that backup folder in the selections for the job. For example, if you create a new backup folder in c:\Backup Folders and then select the entire c:\ volume for backup, make sure you exclude c:\Backup Folders from the selection list. When adding backup folders, make sure there is sufficient space on the disk for the data you are backing up. Backups that exceed the size of available disk space will fail.
Related Topics: Media Overwrite Options on page 228 Media Append Options on page 232 Media Labeling on page 234
242
Administrators Guide
Media Location
Media Location
Backup Exec helps you track the location of your media. There are three categories available for tracking media:
Online media. The online media location lists media that reside in a storage device, robotic library slot, or Backup-to-Disk folder. The online location is defined by Backup Exec, so you cannot delete or rename it. In addition, you cannot add media to the online location.
Note If you move media from an online location, its overwrite protection period and append period remain in effect.
Offline media. The offline media location displays all media that are onsite but are not in devices or slots, or media vaults. Media are automatically moved to this location if you use Backup Exec to remove media from a device or slot. You can add media to the offline location from another media location. To move offline media back to online, run an inventory of the devices or slot, or catalog the media. You cannot delete or rename the offline location. User-defined media vault. A media vault is a logical representation of the actual physical location of media. You can create media vaults to keep track of where media is physically stored, such as a special media room, a scratch bin, or an offsite location. For example, you could create a media vault where media to be sent offsite are moved. Then, print the Media Vault Contents report, which lists the media contained in that vault, to accompany the physical media to their offsite storage. You can also create vault rules to help you track when media should be moved to or returned from a vault.
Related Topics: Finding Media in a Location or Vault on page 244 Vault Rule Properties for Media Sets on page 225 Update Media Vaults by Using a Wizard on page 245 Renaming a Media Vault on page 244 Adding Media to the Offline Location or a Media Vault on page 245 Moving Media by Dragging and Dropping on page 247 Deleting a Media Vault on page 248 Media Vault Contents Report on page 583
243
Media Location
244
Administrators Guide
Media Location
3. Under General Tasks in the task pane, click Rename. 4. Type the new name, and then click OK.
245
Media Location
To specify vault media rules when creating a new media set, see Creating Media Sets on page 218. To change vault media rules for an existing media set, see Vault Rule Properties for Media Sets on page 225. To update media vaults: 1. On the navigation bar, click Media. 2. Select the vault that you want to update. 3. Under Media Location Tasks on the task pane, click Update vault using wizard. The Vault Wizard appears. 4. Follow the instructions on the wizard. Related Topics: Creating Media Sets on page 218 Vault Rule Properties for Media Sets on page 225
246
Administrators Guide
Media Location
Online location
No
No
No
No
Yes
Yes
No
No
No
Yes, with a warning Yes, with a warning that the media is not physically moved from the online location.
Yes
No
No
Yes, with a Yes warning that the media is not physically moved from the online location.
No
247
To move media from a location or vault: 1. On the navigation bar, click Media. 2. On the Media selections pane, click the vault containing the media. 3. Select the media from the Results pane, and drag it to the new location.
Son. Uses the same media each day to run a full backup. See Son Media Rotation Strategy on page 249. Father/Son. Uses multiple media, includes a combination of weekly full and daily differential or incremental backups for a two-week schedule, and provides backups for offsite storage. See Father/Son Media Rotation Strategy on page 249. Grandfather. Uses multiple media, includes a combination of weekly and monthly full and daily differential or incremental backups, and provides backups for offsite storage. See Grandfather Media Rotation Strategy on page 250.
For information on how to create these strategies, see Creating a New Policy on page 362.
248
Administrators Guide
Full Backup
249
Media Rotation Strategies Father/Son Backup Strategy Mon Media 1 Week 1 Media 1 Week 2 Media 2 Media 3 Media 4 Media 6 Tue Media 2 Wed Media 3 Thu Media 4 Fri Media 5
Full Backup
Note When this backup strategy is first implemented, you must start with a full backup. The Father/Son strategy is easy to administer and allows you to keep data longer than the Son strategy, but it is not suitable for the stringent data protection needs of most network environments.
250
Administrators Guide
Media Operations Grandfather Backup Strategy Mon Mon 1 Week 1 Mon 1 Week 2 Mon 1 Week 3 Mon 1 Week 4 Incremental or Differential Backup Tue 2 Wed 3 Thu 4 Monthly Tue 2 Wed 3 Thu 4 Fri 7 Tue 2 Wed 3 Thu 4 Fri 6 Tue Tue 2 Wed Wed 3 Thu Thu 4 Fri Fri 5
Full Backup
The Grandfather strategy is recommended because it offers a good media number to storage life ratio (19 media/1 year). It is also easy to modify if you want to incorporate more media. For example, you could perform a full backup on the last Saturday of the month to archive permanently.
Media Operations
You can perform several types of operations on media. You can delete media from the Retired Media set, move media to a different media set, or create a new catalog for a media. In addition, you can view properties for the media, including the general, management, statistical, and cleaning properties. Related Topics: Deleting Media on page 252 Moving Media to a Media Set or Media Vault on page 252 Cataloging Media in a Drive on page 452 Viewing General Media Properties on page 253 Viewing Statistics for Media Properties on page 255
251
Media Operations
Deleting Media
You may want to delete media when:
You have a lot of offsite media that you do not want to recycle. You throw away damaged or old media.
Media can only be deleted from Backup Exec when it is part of the Retired Media set. When deleted media is reused in Backup Exec, it is recognized as imported media. Before you can restore from the media, it must be cataloged. Note Deleting media from Backup Exec is not the same as erasing media. To delete media: 1. On the navigation bar, click Media. 2. If the media is not already in Retired Media, move it there. To look at the contents of Retired Media, expand the server icon, then expand System Media, then expand Retired Media. To move media to Retired Media, drag the media to the Retired Media icon. 3. Select the media you want to delete. 4. Under General Tasks in the task pane, click Delete. If Delete is unavailable, the media is not in Retired Media. You must move the media to Retired Media before Delete is available. 5. Click Yes or Yes to All to delete the media that are displayed. Related Topics: Removing Damaged Media on page 233
252
Administrators Guide
Media Operations
To move media: 1. On the navigation bar, click Media. 2. Expand All Media to display a list of media, and then select the media you want to move. 3. You can drag the media to a media set, or under Media Tasks on the task pane, click Move to media set or Move to vault. 4. Click the Down arrow next to the Move to field to display the media set to which you want to move this media, and then click Yes or Yes to All.
253
Media Operations
Export pending
254
Administrators Guide
Media Operations General Media Properties tab (continued) Item Allocated date Description Date and time when the media was added to a media set as a result of an overwrite operation. Date and time when data was last written to the media. Date and time after which the media can be overwritten.
Date and time after which the media can no longer be appended to.
Note In BEWAC, the servers date and time format are used instead of the clients date and time format. Related Topics: Media Labeling on page 234 Creating a Test Run Job on page 320 Viewing Media Information on page 126 Viewing Statistics for Media Properties on page 255
255
Media Operations
Compression ratio
Bytes written
256
Administrators Guide
Media Operations Media Properties, Statistics tab (continued) Item Seeks Description The total number of seek operations (performed when a specific piece of information is being located) that have been performed on this media. The number of errors encountered while trying to locate data. The number of recoverable write errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the media for damage. The number of unrecoverable write errors encountered. If you receive hard errors, check the media for damage. The number of recoverable read errors encountered. If you receive soft errors, it may indicate the beginning of a problem. If you receive excessive errors for your environment, check the media for damage. The number of unrecoverable read errors encountered. If you receive hard errors, check the media for damage.
Related Topics: General Media Set Properties on page 223 Creating Media Sets on page 218
257
Media Operations
258
Administrators Guide
Chapter
Backing Up Data
Backups are crucial for data protection, and Backup Exec offers you many choices for creating backup jobs to protect your data, including:
Using the Backup Wizard. Use this wizard to submit a backup job if you are a new or inexperienced Backup Exec user. The wizard guides you through the process of creating a backup job using most of the default options. After you become more experienced with Backup Exec, you will probably create backups by configuring backup job properties. Configuring backup job properties. Experienced Backup Exec users can create customized backup jobs by selecting resources to protect and setting backup options on the backup job properties pages accessed by either clicking the Backup button or selecting New Job from the Job Setup task pane. Using the backup job properties pages allows you to set some options, such as job priority and database options, that cannot be set per job using the Backup Wizard. Creating a selection list. Select the data you want to back up and save the selections as a selection list. You can then choose the selection list when creating a backup job. You can use selection lists for multiple jobs. You can also choose a selection list and combine it with a policy to create a job. You can also choose Using Backup Execs Windows Explorer interface. Select and back up files and folders from Windows Explorer without having to launch the Backup Exec Administration Console. Running a one-button backup job. Select one-button backup from the Backup Exec Assistant or the Information Desk to quickly back up the local media server. One-button backups use the default backup settings.
Backup Exec allows you to set default options for backup jobs, but also gives you the flexibility to override these options for specific jobs. You can direct all backup jobs to a specified network segment, isolating the backup data so that other connected networks are not affected when backup operations are performed, or you can specify a LAN for a single job.
259
Backup Exec also provides the option of setting up backup jobs that take place on a routine basis (scheduled jobs), or set up one-time backup jobs. In addition to creating backup jobs to protect data, you can create:
A test run of a scheduled backup job to determine whether or not it is likely to complete successfully. A job that duplicates backup sets either from previously backed up data or data scheduled to be backed up. If the backup sets are to be duplicated from a scheduled job, the duplicate backup data job runs automatically after the backup job completes. Verify jobs to test the integrity of the media. Archive jobs to preserve storage space. Resource discovery jobs to find new resources that may need to be backed up on a regular basis.
Before you begin backing up data, you should develop a backup strategy that includes the method, frequency, and media rotation methods that are appropriate for your organization. You may have different strategies for different areas of the organization. You may also want to configure device and media management before creating backup jobs. You can set up Backup Exec to use physical devices, such as stand-alone drives, or virtual devices, such as backup-to-disk folders. Or, you can have Backup Exec use logical groupings of devices, such as drive pools. Specifically, you might want to perform the following tasks to help you manage storage hardware and media most effectively:
Set up drive pools for systems with more than one storage device. For more information, see Creating Device Pools on page 133. Create media sets. For more information, see Creating Media Sets on page 218.
Caution To protect remote resources, you must install the Backup Exec Remote Agent for Windows Servers on the remote computer. The Remote Agent is a system service that runs on Windows servers and workstations and provides efficient backup processing by locally performing tasks that, in typical backup technologies, require extensive network interaction. Related Topics: Creating a Backup Job on page 261 Setting Default Backup Options on page 324 About Backup Strategies on page 351 Symantec Backup Exec - Remote Agent for Windows Servers on page 789
260
Administrators Guide
Unless you specify otherwise, the backup job will use the defaults set through the Tools menu by selecting Options. You can use the Backup Wizard to have Backup Exec guide you through the creation of a backup job, but after you become familiar with Backup Exec, you will probably choose to set your options by configuring backup job properties. Related Topics: Using the Backup Wizard on page 262 Creating a Manual Backup Job by Configuring Job Properties on page 262 Setting Default Backup Options on page 324 Specifying Backup Networks on page 334
261
262
Administrators Guide
You can select additional configuration options for your backup job if, before selecting to run or submit the job, you select additional options on the Backup Job Properties dialog boxs Properties pane:
If you want to set advanced options for the backup job, on the Properties pane, under Settings, click Advanced. Then, complete the options as described in Advanced Options for Backup Jobs on page 276. If you want to set commands to run before or after a job, on the Properties pane, under Settings, click Pre/Post Commands and complete the options as described in Pre/Post Commands for Backup or Restore Jobs on page 280. If you are using the Advanced Open File Option, on the Properties pane, under Settings, select Advanced Open File and complete the options as described in Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999. If you are backing up other platform types or database agents, such as NetWare, Exchange, or SQL, select the platform type or database agent from the Properties pane. Refer to the chapter or appendix for that item for instructions on completing the options. If you want to change the backup network for this job, on the Properties pane, under Settings, click Network and Firewall, and then set up the backup network for this job (see Changing the Backup Network for a Job on page 339). If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see Selecting Recipients for Notification on page 534). If you want Backup Exec to notify someone when a backup job containing a specific selection list completes, on the Properties pane, under Source, click Selection List Notification (see Selecting Recipients for Notification on page 534).
5. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398), and then click Submit. Note If you are using Backup Exec Web Administration Console (BEWAC), under Frequency, click Schedule to set the scheduling options or click OK to run the job. 6. If the backup job summary appears, review it, and then click OK to run the job. If you want to turn off the job summary for future backup jobs, from the Tools menu, select Options, and then clear Display the job summary dialog before creating a backup job (see Backup Exec Defaults on page 119).
263
Note If a drive loses power during a backup operation, you should restart the backup job using a different tape. You can restore the data written to the tape up to the point of the power loss, but you should not reuse the tape for subsequent backup operations. Related Topics: Using the Backup Wizard on page 262 Selecting Data to Back Up on page 284 Setting Default Backup Options on page 324
264
Administrators Guide
Selection list description Enter a description for the selection list. Load Selections from Existing List Click this button if you want to use a previously created selection list or merge existing selection lists (see Using Selection Lists on page 293).
View Format Graphical Show file details Select this option to view selections in a directory tree view. Select this option to display details about the files available for selecting. Select this option to view selections as a list of files and directories. Click this button if you want to use the Advanced File Selection for selecting files for backing up (see Including or Excluding Files for Backup Using Advanced File Selection on page 288). Select this option if you want to select the contents of all the subfolders when a directory is selected.
Text Advanced
Include subdirectories
Related Topics: Selecting Data to Back Up on page 284 Changing the Order for Processing Backup Selections on page 291 Changing and Testing Logon Accounts for Resources on page 292 Including or Excluding Files for Backup Using Advanced File Selection on page 288 Creating Selection Lists on page 293 Setting Up User-defined Selections on page 304
265
266
Administrators Guide
Moving the backup files to another disk or backing up the files to a tape. Changing the location of the backup folder. Erasing the backup files. Overwriting the existing backup files.
If you are unable to create more free space and cannot continue the backup job, you can restore the data that was backed up prior to the failure. Note Backup files are subject to the same overwrite and append options as other media. Make sure that appropriate media (overwritable or appendable) is in the stand-alone drive or drive pool you select. If the media in the drive is not overwritable or appendable, a message is displayed requesting that you insert overwritable media.
267
Creating a Backup Job Device and Media options for backup job (continued) Item Media set Description Select the media set for the backup (see General Media Set Properties on page 223). If you select Overwrite, the media in the drive is overwritten if the media is scratch, or if its overwrite protection period has expired. If allocated or imported media are in the drive, they may also be overwritten depending on the Media Overwrite Protection Level that is set. For more information, see Setting Default Media Options on page 239. If you selected one of the append options, the backup will be added to an appendable media (if one exists). Family name Specify a name for the new or overwritable media. This name is used to identify the media in the Restore Selections dialog boxes. The family name defaults to Media created date time. To customize the family name, you can use any combination of the following variables in this field: %s - includes the media server name %j - includes the job name %d - includes the date the media was created %t - includes the time the media was created
268
Administrators Guide
Creating a Backup Job Device and Media options for backup job (continued) Item When this job begins Overwrite media Select this option to place this backup on an overwritable media. Make sure that appropriate media is in the stand-alone drive or drive pool you select in the Device field in this dialog box. The media in the drive is overwritten if the media is scratch or recyclable (its overwrite protection period has expired). If allocated or imported media are in the drive, they may also be overwritten depending on the Media Overwrite Protection Level that is set. For more information, see Setting Default Media Options on page 239. Depending on your configuration, overwritable media is selected from scratch media or recyclable media. For more information, see Media Overwrite Options on page 228. If the media in the drive is not overwritable, an alert appears requesting that you insert overwritable media. Append to media, overwrite Select this option to append this backup to the media set listed in if no appendable media is the Media Set field in this dialog box. The backup set is appended if available an appendable media is available in the selected media set; if not, an overwritable media is used and added to the media set. Note If an append job fills a media, the job continues on another piece of overwritable media. If the media in the drive is not overwritable, an alert appears requesting that you insert overwritable media. Append to media, terminate Select this option to append this backup to the media set listed in job if no appendable media the Media Set field in this dialog box. The backup set is appended if is available an appendable media is available in the selected media set; if not, the job is terminated. Eject media after job completes Retension media before backup Select this option to have Backup Exec automatically eject the media in the drive when the operation completes. Select this option to have Backup Exec run the tape in the drive from beginning to end at a fast speed, which helps the tape wind evenly and run more smoothly past the tape drive heads. Retensioning is primarily for Mini Cartridge and quarter-inch cartridges and is not supported on most other types of tape drives. Description
269
Creating a Backup Job Device and Media options for backup job (continued) Item Media Protection Password protect media Select this option if you are overwriting the media and you want to protect it. When the Enter Password dialog box appears, enter a media password. When a password-protected media is taken to another location, such as another media server, the password is required to catalog the tape. Note Password protected media can be erased without requiring the password. Change password Click this button to change the password for the media. Description
270
Administrators Guide
271
Creating a Backup Job General settings options (continued) Item Backup method for files Description Select a backup method. Your choices are:
Full - Back up files - Using archive bit (reset archive bit). Includes all of the files selected for backup and resets the archive bit to indicate that the files have been backed up. - Using modified time. Includes all of the files selected for backup and allows the use of incrementals and differentials using the modified date and time stamp. - Copy the files. Includes all selected data, and does not affect any media rotation scheme because the archive bit is not reset. - Archive the files (delete files after successful copy). Backs up the selected data, verifies the media, and then deletes the data from the volume. For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up, but not deleted.
Note Backup Exec does not delete data from Backup Exec Agent workstations when using the archive feature.
Differential - Back up changed files since last full - Using archive bit (does not reset archive bit). Includes all files that have changed (based on the archive bit) since the last full backup, and does not affect any media rotation scheme because the archive bit is not reset. - Using modified time. Includes all files changed since the last full backup, using the files last modified date and time stamp. Make sure that the same script or selection list is used for the differential backup that was used for the full backup.
Incremental - Back up changed files since last full or incremental - Using archive bit (reset archive bit). Includes only the files that have changed (based on the archive bit) since the last full or incremental backup and resets the archive bit to indicate that the files have been backed up. - Using modified time. Includes all files that have changed since the last full or incremental backup, using the files last modified date and time stamp. Make sure that the same script or selection list is used for the incremental backup that was used for the full backup.
Working Set - Back up files - Changed today. Backs up all files that were created or modified today.
272
Administrators Guide
Creating a Backup Job General settings options (continued) Item Backup method for files (continued) Description - Last accessed in (x) days. Includes all files that were created or modified since the last full or incremental backup. If you select this backup method, you can then indicate in the Files accessed in x days field that you want to include data that has been accessed in a specific number of days. For more information, see Understanding Backup Methods and Their Advantages on page 354. Files accessed in x days If you selected the working set backup method in the Backup method for files field, use this field to specify the number of days for which to include accessed files. Note Symantec recommends that you specify at least 30 days in order to include the data needed to make your system operational if you have to restore a working set backup. Use the Windows Change Journal if available Select this option if you want to use Windows NTFS Change Journal to determine which files have been modified since the last full backup. This option can only be used with NTFS volumes and only when the backup method selected is FULL - Back Up Files Using modified time, DIFFERENTIAL - Back up changed files since last full - Using modified time or INCREMENTAL - Back up changed files since last full or incremental - Using modified time. Select this option to retain the directory structure on the hard drive of the files backed up in an archive job. This option is only available when Archive is selected as the backup method.
273
Creating a Backup Job General settings options (continued) Item Collect additional information for synthetic backup Description This option displays only for templates. It is used with synthetic backups. It specifies that Backup Exec collects the information required to detect files and directories that have been moved, renamed, or newly installed since the last backup, and then includes those files and directories in the backup jobs. If this option is not selected, Backup Exec skips these files and directories if their archive bits are unchanged. With this option selected, Backup Exec compares path names, file names, modified times, and other attributes with those from the previous full and incremental backups. If any of these attributes are new or changed, then the file or directory is backed up. Backups that have this option selected require more disk space, and take more time to run, than backups that do not. You must select this option for the baseline and incremental backup template in a synthetic backup policy. For more information about synthetic backups, see Symantec Backup Exec Advanced Disk-based Backup Option on page 875. Verify after backup completes Select this option to have Backup Exec automatically perform a verify operation to make sure the media can be read once the backup has been completed. Verifying all backups is recommended.
274
Administrators Guide
Creating a Backup Job General settings options (continued) Item Compression type Description Select one of the following:
None. Select this option to copy the data to the media in its original form (uncompressed). Using some form of data compression can help expedite backups and preserve storage media space. Hardware data compression should not be used in environments where devices that support hardware compression are used interchangeably with devices that do not have that functionality. For example, if a drive that does not support hardware compression is added to a cascaded drive pool that includes drives supporting the feature, hardware compression is automatically disabled. You can manually re-enable hardware compression on the drives that support it, but this results in media inconsistency. If the drive that supports hardware compression fails, the compressed media cannot be restored with the non-compression drive.
Software. Select this option to use STAC software data compression, which compresses the data before it is sent to the storage device. Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression the data is backed up uncompressed. Hardware [if available, otherwise software]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature hardware data compression, STAC software compression is used.
Related Topics: Creating a Manual Backup Job by Configuring Job Properties on page 262
275
276
Administrators Guide
Caution If the backup job does not run to completion, the file data may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same files. You must run a full or copy backup to ensure that all files are backed up completely. If the 'incremental - using modified time' backup method was used, running the same backup job to completion will back up the files correctly.
Back up files and directories by following junction points Select this check box to back up the information for the junction points and the files and directories to which they are linked. If this check box is not selected, then only the information for the junction points is backed up; the files and directories to which they are linked are not backed up. Note Since Mounted Drives that do not have a drive letter assigned to them cannot be selected, the files and directories to which they are linked are backed up regardless of whether this option is selected. If this option is selected and the actual files and directories to which the junction points are linked are also included in the backup selections, then the files and directories are backed up twice; once during the full file and directory backup, and again via the junction point. WARNING: If a junction point is linked to a location that encompasses it, then recursion (a situation where data is backed up repeatedly) will occur, resulting in an error and job failure. For example, if c:\ junctionpoint is linked to c:\, recursion will occur when attempting to back up c:\ junctionpoint, and the backup job will fail.
277
Creating a Backup Job Advanced options for backup job (continued) Item Back up data in Remote Storage Description Select this check box to back up data that has been migrated from primary storage to secondary storage. The data is not recalled to its original location; it is backed up directly to the backup media. If this option is selected, you should not run a backup of your entire system because Backup Exec has to load the data that has been migrated to secondary storage and additional time is required for any set that includes migrated data. If this check box is cleared, only the placeholder that stores the location of the data on secondary storage will be backed up, not the data itself. Note This option should not be selected if the device used for secondary storage and backups contains only one drive because Remote Storage and Backup Exec will compete for use of the drive. Set Remote Agent priority This option allows you to select the number of CPU cycles the media server will use to maintain optimal server performance while Remote Agent backups are running. The higher the priority, the more the protected servers CPU processing power is used during backup operations. Note Allocating fewer CPU cycles to a backup job may result in slower backup performance. This field contains the following options:
Normal Priority. Select this option to allocate the default number of CPU cycles the protected server will use during a Remote Agent backup. Below Normal Priority. Select this option to allocate fewer server CPU cycles to the backup job. Lowest Priority. Select this option to allocate the fewest number of CPU cycles to the backup job.
278
Administrators Guide
Creating a Backup Job Advanced options for backup job (continued) Item Description
Open file backup when Advanced Open File Option is not used Never Select this option to have Backup Exec skip open files if they are encountered during the backup operation. A listing of skipped files appears in the job log for the backup. Select this option to have Backup Exec wait the specified time interval for files to close before skipping the open file and continuing the backup operation. If the file does not close during the specified interval, it is skipped. A listing of skipped files appears in the job log for the backup. Note If multiple files are open, Backup Exec waits the specified time interval for each file; depending on the number of open files, this may significantly increase the backup time. With a lock Select this option to have Backup Exec attempt to open files that are in use. If Backup Exec is able to open a file, the file is locked while it is being backed up to prevent other processes from writing to it. Backing up open files is not as effective as closing applications and allowing the files to be backed up in a consistent state. Select this option to have Backup Exec attempt to open files that are in use. If Backup Exec is able to open the file, the file is NOT locked while it is being backed up. This allows other applications to write data to the file during the backup operation. WARNING: This option allows files that contain inconsistent data and possibly corrupt data to be backed up.
Without a lock
Note To back up the Removable Storage database in the \Ntmsdata subdirectory, the WMI repository in the wbem\Repository subdirectory, and the Terminal Services database in the default \LServer subdirectory, select the <Systemroot>\System32 directory. Files that you place in the Systemroot\System32\Ntmsdata subdirectory, the \wbem\Repository subdirectory, or the default \LServer subdirectory may not be backed up; only system files are included in the backup. It is recommended that you do not place user files in the Systemroot\System32 directory or subdirectories. Related Topics: Creating a Manual Backup Job by Configuring Job Properties on page 262 Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999
Chapter 6, Backing Up Data 279
Run the backup or restore job only if the pre-command is successful Run the post-command only if the pre-command is successful Run the post-command even if the backup or restore job fails Allow Backup Exec to check the return codes (or exit codes) of the pre- and post-commands to determine if the commands completed successfully. An exit code of zero returned to the operating system by the pre- or post-command is interpreted by Backup Exec to mean the command completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the command ended with an error.
If it is critical that the job does not run if the pre-command fails, then configure Backup Exec to check the return codes of the pre- and post-commands to determine if the pre-command failed or completed successfully. For example, if a pre-command that shuts down a database before a backup is run fails, the database could be corrupted when the backup is run. In this situation, it is critical that the backup job does not run if the pre-command fails. Additionally, if Backup Exec is configured to check the return codes of the pre- and post-commands, and the post-command returns a non-zero code, the job log reports that the post-command failed. If you also selected to run the job only if the pre-command is successful, and both the pre-command and the job ran successfully, Backup Exec will mark the job as failed if the post-command fails. For example, if the pre-command runs successfully and shuts down the database and the backup job also runs successfully, but the post-command cannot restart the database, Backup Exec marks the job and the post-command as failed. If you select the option On each server backed up, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.
280
Administrators Guide
281
Creating a Backup Job Pre- and post-command options (continued) Item Allow pre- and post-commands to be successful only if completed with a return code of zero Description Select this option to allow Backup Exec to check the return codes of the pre- and post-commands to determine if they completed successfully. An exit code of zero returned to the operating system by the pre- or post-command is interpreted by Backup Exec to mean that the command completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the command ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the pre- and post-commands. If this option is not selected, the success of the pre- and post-commands is not determined based on the return code. Run job only if Select this option to run the backup or restore job only if the pre-command is successful pre-command is successful. If the pre-command fails, the job does not run, and is marked as failed. If it is critical that the job does not run if the pre-command fails, then select Allow pre- and post-commands to be successful only if completed with a return code of zero. If a non-zero code is returned, it is interpreted by Backup Exec to mean that the pre-command did not run successfully. The job is not run and the job status is marked as Failed. Run post-command only if Select this option to run the post-command only if the pre-command is successful pre-command is successful. If it is critical that the post-command does not run if the pre-command fails, then select Allow pre- and post-commands to be successful only if completed with a return code of zero. If a non-zero code is returned for the pre-command, it is interpreted by Backup Exec to mean that the pre-command did not run successfully. The post-command does not run. If you also select Run job only if pre-command is successful, and both the pre-command and the job are successful, but the post-command returns a non-zero code, the job log reports both the job and the post-command as failed.
282
Administrators Guide
Creating a Backup Job Pre- and post-command options (continued) Item Run post-command even if job fails Description Select this option if it is critical to run the post-command regardless of whether the job is successful or not. If you also select Allow pre- and post-commands to be successful only if completed with a return code of zero and the post-command returns a non-zero code, the job log reports the post-command as failed. Run post-command after job verification completes If you selected the Verify after backup completes option on the General backup properties dialog box, select this option to run the post-command after the verification completes.
Cancel command if not Select the number of minutes Backup Exec should wait before completed within x minutes canceling a pre- or post-command that did not complete. The default time-out is 30 minutes. Run these commands On this media server Select this option to run the pre- and post-commands on this media server only. Select this option to run the pre- and post-commands one time on each server backed up. The pre- and post-command selections apply to each server independently. If you select this option, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.
Related Topics: Creating a Manual Backup Job by Configuring Job Properties on page 262 Setting Default Backup Options on page 324 Setting Default Pre/Post Commands on page 331
283
Server name Local drives System State Backup Exec databases User-defined selections Network shares
There are several ways you can select data to back up. You can select an entire drive, a folder, files, System State, network share, Backup Exec Agent volume, or user-defined selection. You also can use the Advanced File Selection feature to include or exclude specific files or specific types of files. Or you can set up a selection list that you can reuse for several backups. Note If the account to which you are logged on does not have sufficient rights, you are required to supply another logon account that can be used to view files for backup. To expand the view for an item, click the plus sign (+) next to it or double-click the item name. To collapse the view, click the minus sign (-) next to an item or double-click the item name. To view the contents of an item, double-click the items icon. The items contents appear in the right frame of the backup selections view. For all items (except System State), you can traverse file levels from either side of the window by clicking folders and subfolders as they appear. To select data, select the check box next to the drive or directory you want to back up. The check box and check mark displayed are described in the following.
284
Administrators Guide
Selecting Data to Back Up Data selection descriptions A slash in a shaded check box means some items below the check box are selected, but the item itself cannot be selected. A slash in a check box means some items below the directory or drive level are selected. A check mark in a check box means all items at or below the directory or drive level are selected. A clear check box means the item can be selected.
A shaded check box means the item cannot be selected, but items below this item may be selectable.
Local Drives. Includes hard drives as well as CD-ROM drives physically residing on the media server. Backup Exec database. Includes job, schedule, job history, notification, alerts, device, media, and catalog indexes data for Backup Exec. Shadow Copy Components (Windows Server 2003 only). The Backup Exec Shadow Copy Components file system uses Microsofts Volume Shadow Copy Service to protect critical operating system and application service data, and third party application and user data on Windows Server 2003 resources. A Writer is specific code within an application that participates in the Volume Shadow Copy Service framework to provide point-in-time, recovery-consistent operating system and application data. Writers appear as Shadow Copy Components, which are listed as resources in backup and restore selections. When expanded, the Backup Exec Shadow Copy Components file system includes the following types of Writers:
Service State. Critical operating system and application service data, such as Event Logs, Windows Management Instrumentation (WMI), Removable Storage Manager (RSM), etc. System State. Critical operating system data, such as Windows System File Protection (System Files), COM+ Class Registration Database, Registry, Active Directory, etc. User Data. Third party application and user data, etc.
285
System State. This collection of system-specific data is selected for backup whenever the Local Selections icon is selected. Backing up System State is recommended; however, you can clear the check box next to System State if you do not want to back it up with the Local Selections. When you double-click the icon for System State, the resources that comprise it appear to the right of it. If a resource is not installed on the computer, then it is not listed. You cannot select or expand the System State resources individually. They are backed up and restored only as a collection, never individually. You can only perform a full backup on System State. However, if you select other items at the same time, you can perform other backup methods on those items. You can back up System State remotely on other computers if Backup Exec Remote Agent is installed on the remote computer. For more information about System State, refer to your Microsoft Windows 2000 or Windows Server 2003 documentation.
Utility Partition. Includes the utility partitions installed on the system and available for backup. Individual utility partition objects are named Utility Partition on Disk Disk_Number (for example, Utility Partition on Disk 0), and cannot be expanded. Backing up utility partitions is recommended when a full system backup is done, such as for disaster recovery preparation. Utility partitions can be backed up individually. If there are not utility partitions on the system, this resource is not available. Administrative rights are required to browse and back up utility partitions. You can only perform a full backup of utility partitions. However, if you select other items at the same time, you can perform other backup methods on those items. You can back up utility partitions remotely on other computers
The User-defined Selections lists shortcuts to servers or shares that were created and saved as user-defined selections. Use this feature to quickly access shares that have a very long path or that are offline when you are setting up a backup job. The Remote Selections include:
Network Shares. Includes Microsoft Windows systems protected by the Remote Agent for Windows Servers. On 64-bit Intel Itanium computers, EFI system partitions can be displayed here. Workstation Agents. The Backup Exec Workstation Agents protect workstations running Windows 98/Me, Macintosh, and UNIX. If an agent workstation is password-protected, you must enter a password to access the agents published data. If some or all of the computers shared directories cannot be selected, a gray check box appears next to the agent. If this occurs, only the agent computers that Backup Exec scanned successfully are selected for backup. Review your security and attachment rights to the computers that are not selected. You cannot restore or archive workstation agent shares that are published as read-only. Valid logon accounts are required to access the systems.
Administrators Guide
286
When you are browsing remote selections, Backup Exec requires a valid logon account to expand the resources and devices. If the default logon account does not enable access to a remote selection, Backup Exec prompts you to select another existing logon account or create a new logon account that can access the selection. Related Topics: Protecting Windows Server 2003 Systems on page 344
Include or exclude files by filename attributes. For example, you can select only files with .txt extensions, or exclude files with .exe extensions from a backup. Select only files that fall within a specified date range. For example, you can select files that were created or modified during the month of December. Specify files that have not been accessed in a specified number of days. For example, you can select files that have not been accessed in 30 days from your My Documents folder for an archive operation.
To select files using Advanced File Selection: 1. On the navigation bar, click Backup. 2. Select the resource that contains the files you want to include or exclude from the backup. 3. Select the path or file that contains the files you want to include or exclude. 4. Click Advanced. 5. Select the appropriate options as follows:
Advanced File Selection options Field Drives Description If you want to include or exclude files from a backup of a different drive than the one you selected previously on the Backup Job Properties dialog box, select the new drive that contains the files you want to include or exclude.
288
Administrators Guide
Selecting Data to Back Up Advanced File Selection options (continued) Field File Selection Path If you want to include or exclude a specific file, type the name of the folder and/or subfolder on the selected drive that contains the file. You can use wildcard characters. Use a question mark (?) to represent any single character. Use a single asterisk (*) to represent any number of characters before the next backslash. Use a double asterisk (**) to represent any number of characters, irrespective of any backslashes. For example, on your C: drive you have a My Documents folder that contains a subfolder called Work Files. There are three Work Files subfolders called 1999, 2000, and 2001. Each one of those subfolders has a subfolder called Personnel. If you type the path as \My Documents\**\Personnel, the backup will include or exclude:
Description
In addition, every subfolder below the ** wildcard is included or excluded. However, the only files from the subfolders that are included or excluded are those that match the file name you type in the File field. So in the example above, every subfolder of C:\My Documents is included in or excluded from the backup, and only the files that match the file name you type in the File field are included or excluded. After you type the path, type the file name in the File field.
289
Selecting Data to Back Up Advanced File Selection options (continued) Field File Description Type the name of the file you want to include in or exclude from the backup. You can use wildcard characters. Use a question mark (?) to represent any single character. Use a single asterisk (*) to represent any number of characters. For example, to include all files with the .exe extension, type *.exe. You can use more than one asterisk if you know that a file name has certain letters in it, but not the exact file name. For example, to include or exclude any file that has the name Sam in it, type *Sam*.*. The default entry is *.*, which means every file name with every extension is selected. After you type the file name, indicate whether you want to include or exclude it. Type Include Exclude Selection Criteria Include subdirectories Select this option if you want to select the contents of all the subfolders when a directory is selected. Select this to include or exclude modified files in the path you specify. Select this to include or exclude files that cannot be modified. Select this to include or exclude the files created or modified during a specific time period. Then select the beginning and ending dates. Select this to include or exclude files that have not been accessed in a specified number of days. This is useful when you need to migrate older files from your system. (Default) Select this option to include the files in the job. Select this option to exclude the files from the job.
Note If the data does not match all of the criteria specified in the Advanced Backup File Selection dialog box, Backup Exec does not include or exclude it in the backup.
290
Administrators Guide
6. After completing your selections, click OK. 7. Submit the operation using the same procedures as required for other backups. For more information, see Creating a Manual Backup Job by Configuring Job Properties on page 262.
You can order resources within a server, but you cannot alternate selections across servers. For example, you can select C: and D: from Server A followed by selections from Server B. However, you cannot order selections as C: from Server A and then C: from Server B and then D: from both servers. For any given server, system state must be ordered last.
To specify the order in which selections are backed up: 1. On the navigation bar, click Backup. 2. Select the data you want to back up. 3. On the Properties pane, under Source, click Resource Order. 4. Select an item you want to move. 5. Then, click Move Up or Move Down until the item is in the correct order. Click Make First to move an item to the top of the list or click Make Last to move an item to the bottom of the list. 6. Process the backup job (see Creating a Manual Backup Job by Configuring Job Properties on page 262).
291
292
Administrators Guide
Create a separate selection list for each computer you choose. Create a separate selection list for each resource you choose. Create one selection list, regardless of the number of computers or resources you choose.
293
To create a backup selection list: 1. On the navigation bar, click Job Setup. 2. Under Selection Lists Tasks in the task pane, select New backup selection list. 3. Select the resources you want to back up from the backup selections pane. For more information about selecting data, see Selecting Data to Back Up on page 284. 4. Select the appropriate options as follows:
Selections options for selection list Item Selection list name Selection list description Load Selections from Existing List Description Enter the name of this selection list. Enter a description for this selection list.
Click this button if you want to load an existing selection list or merge multiple selection lists (see Merging and Replacing Selection Lists on page 297).
View format Graphical Show file details Select this option to view selections in a directory tree view. Select this option to display details about the files available for selecting. Select this option to view selections as a list of files and directories. Click this button if you want to use the Advanced File Selection for selecting files for backing up (see Including or Excluding Files for Backup Using Advanced File Selection on page 288). Select this option if you want to select the contents of all the subfolders when a directory is selected.
Text Advanced
Include subdirectories
5. (Optional) To notify users that a job containing this selection list was completed, on the Properties pane, under Source, click Selection List Notification. For details on adding notification recipients, see Selecting Recipients for Notification on page 534. 6. Click OK.
294 Administrators Guide
Related Topics: Using Selection Lists on page 293 Using Selection Lists to Create a Backup Job on page 296 Deleting Selection Lists on page 298 Editing Selection Lists on page 298 About the Excludes Selection List on page 299 Creating Multiple Selection Lists from a Single Selection List on page 303
295
b. Click Load Existing Selection List. c. On the Use Selections dialog box, select the selection lists you want to merge with the previously selected items.
d. Click Merge. 4. To replace selections with an existing selection list: a. Click Load Existing Selection List.
b. On the Use Selections dialog box, select the selection lists you want to replace with the previously selected. c. Click Replace.
5. Click OK. 6. Complete the other options on the New Backup Selection List dialog box as described in Selections options for selection list on page 294. 7. Click OK.
297
4. If the selection list is being used by jobs, any change you make to this selection list will affect all jobs associated with it. Click Yes to continue. 5. Make the changes you want to Selections, Resource Order, Resource Credentials, Priority and Availability, and Selection List Notification. 6. Click OK. Related Topics: Using Selection Lists on page 293 Creating Selection Lists on page 293 Selecting Recipients for Notification on page 534 Using Selection Lists to Create a Backup Job on page 296 Deleting Selection Lists on page 298 About the Excludes Selection List on page 299
299
6. If the Excludes list has been previously edited, you can select the Selection rule you want to edit and click Edit (see Including or Excluding Files for Backup Using Advanced File Selection on page 288), or select the Selection rule you want to remove and click Delete. 7. If this is the first time the Excludes list is being edited, click Insert (see Including or Excluding Files for Backup Using Advanced File Selection on page 288). 8. Click OK to save your changes and exit the Edit Selection List window. Related Topics: Deleting Selection Lists on page 298 Creating Selection Lists on page 293
300
Administrators Guide
301
Availability Window Limit availability of this selection list for backup to the following daily time window: This option displays only when you are setting priority and availability for a specific selection list. It does not display when you are setting default options. Select this check box to enable the availability window, which specifies when the selection list will be available for backup each day. Then specify the window settings or use the default settings. If you do not select this option, the resources in the selection list are always available for backup. First available date Select the first date when the selection list should be available to be backed up. The list will be available every day from this date onward. Select the earliest time when this selection list will be available for backup. Select the latest time when this selection list will be available for backup. Select this option if you want Backup Exec to cancel the job associated with this selection list if the job does not complete within the selected number of hours or minutes. Backup Exec starts timing the length of time the job takes to run when the job is queued, not when the job begins. Type the number of hours or minutes you want to allow jobs to complete before they are automatically canceled. The default amount of time is three hours.
Begin time
End time
302
Administrators Guide
For backup selections that you have chosen, have Backup Exec create a Separate backup selection list for each computer Separate backup selection list for each resource Single backup selection list for all selections Select this option to have Backup Exec create a different backup selection list for each computer that you select when you create a selection list outside of a backup job. Select this option to have Backup Exec create a different backup selection list for each resource that you select when you create a selection list outside of a backup job. Select this option to have Backup Exec create one selection list, regardless of the number of resources or computers selected for backup. This is the default option.
303
304
Administrators Guide
Note TCP/IP addresses can be provided for user-defined selections, but are not recommended. Backup Exec does not support user-defined selections for IP addresses in a Dynamic Host Configuration Protocol (DHCP) environment. 4. Click Add. The share appears in the Selections defined section of the dialog box. Repeat steps 4-5 to add additional user-defined selections. 5. When you are finished adding selections, click Close. The selections that you specified can be selected for backup operations from the User-defined Selections node. Related Topics: Using Selection Lists on page 293 Creating Selection Lists on page 293 Using Selection Lists to Create a Backup Job on page 296 Deleting Selection Lists on page 298 Editing Selection Lists on page 298 About the Excludes Selection List on page 299
3. Select Enable backup from Windows Explorer. 4. Click OK. The Back up with Backup Exec option will now appear on the Windows Explorer shortcut menu. Related Topics: Backup Exec Defaults on page 119 Submitting a Backup Job from Windows Explorer on page 306 Archiving Data on page 309
306
Administrators Guide
Using Backup Execs Windows Explorer Interface Backup Settings options (continued) Name Remote Server Login User Name View or change the user name. The default is the name of the user currently logged on to the machine. You can enter a different user or administrator. Note If you are logged on as part of a workgroup, the user domain is your local machine name. Password Backup Options Job Name View or change the job name. Backup Exec generates a unique name for the backup job in the format: Backup <local machine name><numeric ID>. If the job name exceeds 25 characters, the utility truncates the local machine name. For example: For a backup run on a machine named ADMN-30PAYROLL, Backup Exec could generate the job name Backup ADMN-30P 960576233. If you change the default job name, you must ensure it is a unique job name. Device Name Include subdirectories in backup Save Settings Type the name of the backup device. Select this option to include all subfolders within the selected folders in the backup job. Select this option to save the backup settings as defaults for subsequent backup jobs. Note You must submit a backup job to save the settings in the Registry. Clear this option if you want to change the settings for a single backup job but keep the defaults saved in the Registry. Job Status View the status of a job, confirmation and error messages, and the job ID. Type the password for the user. Description
Note The backup job defaults to the options set in the Backup tab. For more information, see Setting Default Backup Options on page 324. 4. Click Submit Job.
Chapter 6, Backing Up Data 307
5. Click Close Dialog after the backup job has been submitted and confirmed. You must close the Backup Settings dialog box to submit another backup job from Windows Explorer. Related Topics: Archiving Data on page 309
Local drives that do not use removable media Lotus Domino resources Microsoft SQL Server databases Microsoft Sharepoint Portal Server Microsoft Exchange 5.5 Directory Microsoft Exchange 5.5 and 2000 Information Store Microsoft Exchange 2000 Key Management Service (KMS) and Site Replication Service (SRS) Microsoft SQL Server filegroup resources Microsoft Sharepoint Portal Server workspaces Microsoft Exchange individual mailboxes and public folders Microsoft Exchange 2000 installable filesystem (IFS) drive (usually M:)
You cannot back up the following types of data with one-button backup:
In addition, you cannot run one-button backup in a cluster environment or in a Central Admin Server Option environment.
308
Administrators Guide
Archiving Data
To run a one-button backup job: 1. On the navigation bar, click Overview. Note You can also run a one-button backup job from the Backup Exec Assistant. To access the Backup Exec Assistant, on the Tools menu, select Backup Exec Assistant. 2. Click the Information desk tab. 3. Under Getting Started, click Back up this media server now with One-Button Backup. Backup Exec submits the job to the job queue.
Archiving Data
With Backup Execs archive feature, you can free valuable disk space and reduce clutter on your server volume by migrating stagnant directories and files from the server to media. If you select archive as your backup method when creating a job, Backup Exec backs up the selected data, verifies the media, and then deletes the data from the volume. Note For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up, but not deleted. Backup Exec does not delete data from Backup Exec Agent workstations when using the archive feature. During an archive job, Backup Exec automatically performs a verify operation after the data is backed up. If the verify operation fails, the archive job stops and you are notified. If you get a verification failure, investigate the problem by viewing the job log, try to correct the problem, and then retry the archive operation. After the data is backed up and verified, Backup Exec automatically deletes the data included in the archive job. The job log contains a list of the data that was deleted. Note If the checkpoint restart setting is enabled for an archive backup job that is resumed when a cluster failover occurs, the files selected for archive are not automatically deleted from the source volume after the backup completes.
309
Archiving Data
b. Click Files not accessed in x days. Then, type or select the number of days (up to 999) to use as the criteria for selecting files. At this time, you may specify other criteria for data you want to include in the operation. For example, type *.doc in the File field to groom all of your document files not accessed in the number of days specified in the Files not accessed in x days field. c. Click OK.
4. On the Properties pane, under Settings, click General, and then select Archive as the backup method. 5. Complete the backup job options following the procedures described in Creating a Manual Backup Job by Configuring Job Properties on page 262. Related Topics: Including or Excluding Files for Backup Using Advanced File Selection on page 288 Archiving Data on page 309
310
Administrators Guide
311
Using Resource Discovery to Search for New Resources General settings options for resource discovery job (continued) Item Job priority Description Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are:
7. On the Properties pane, under Settings, click Resources and then complete the appropriate options as follows:
Resources options for resource discovery job Item Description
Select the types of resources to automatically discover Network administrative Select this option if you want Backup Exec to search for new shares administrative network shares or volumes. Network user shares Select this option if you want Backup Exec to search for new user-defined shares. Select this option if you want Backup Exec to search for new Microsoft SQL databases. Select this option if you want Backup Exec to search for new Microsoft Exchange servers. Backup Exec searches for Information Store, Exchange Directory, or Storage Groups; it does not discover individual databases under storage groups. Select this option if you want Backup Exec to search for new Lotus Domino databases. Select this option if you want Backup Exec to search for new System State resources or shadow copy components.
312
Administrators Guide
Using Resource Discovery to Search for New Resources Resources options for resource discovery job (continued) Item Send separate notification for each new resource found Send one notification for all new resources found Include previously discovered resources when sending notification Description Select this option if you want Backup Exec to send separate notifications when each new resource is found.
Select this option if you want Backup Exec to send out a single notification for all new resources found.
Select this option if you want Backup Exec to send a notification that includes all resources previously found during resource discovery jobs.
8. If you want Backup Exec to notify someone when this job completes, on the Properties pane, under Settings, click Notification (see Selecting Recipients for Notification on page 534). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398).
313
314
Administrators Guide
b. Select the backup sets you want to copy. 4. If you want to duplicate backup sets created when a scheduled backup job runs: a. Select Duplicate backup sets following a job, and then click OK.
b. Select the scheduled backup job to be used as the source. 5. On the Properties pane, under Destination, select Device and Media, and complete the options as described in Device and Media Options for Backup Jobs and Templates on page 266.
315
6. On the Properties pane, under Settings, click General, and complete the appropriate options as follows:
General settings for New Duplicate Job Item Job name Job priority Description Type the name for this backup job. Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are:
Type a description of the information you are backing up. Select the device used as the destination device for the original backup job.
7. On the Properties pane, under Settings, click Advanced, and complete the appropriate options as follows: :
Advanced options for duplicate job Item Verify after backup completes Description Select this option to have Backup Exec automatically perform a verify operation to make sure the media can be read after the backup has been completed. Verifying all backups is recommended.
316
Administrators Guide
Duplicating Backed Up Data Advanced options for duplicate job (continued) Item Compression type Description Select one of the following:
None. Select this option to copy the data to the media in its original form (uncompressed). Using some form of data compression can help expedite backups and preserve storage media space. Hardware data compression should not be used in environments where devices that support hardware compression are used interchangeably with devices that do not have that functionality. For example, if a drive that does not support hardware compression is added to a cascaded drive pool that includes drives supporting the feature, hardware compression is automatically disabled. You can manually re-enable hardware compression on the drives that support it, but this results in media inconsistency. If the drive that supports hardware compression fails, the compressed media cannot be restored with the non-compression drive
Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression the data is backed up uncompressed.
8. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see Selecting Recipients for Notification on page 534). 9. If you are duplicating data from a scheduled backup job, click Run Now. The duplicate job will launch immediately following the completion of the scheduled backup job. 10. If you are duplicating data from an existing backup set, either click Run Now or under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398).
317
Verifying a Backup
Verifying a Backup
In addition to the verification of files that is done when a backup or archive job runs, you can submit verify jobs to test the integrity of the media. If you perform a verify operation and files fail to verify, the media may be bad. Details about files that failed to verify are provided in the job log, which can be viewed from the Job Monitor. To create a verify job: 1. On the navigation bar, click Job Setup. 2. Under Backup Tasks in the task pane, select New job to verify backup data. 3. Select the media you want to verify. Note The default view is the Resource view, which lists data by the device from which it was backed up. The Media view lists the data that is contained on a piece of media. To switch views, under View by, select the view you want to use. In addition, you can set Backup Exec to display the selections in a graphic format or a text format. To switch the format, select either Graphical or Text from the View format section. 4. On the Properties pane, under Destination, click Device. 5. Select the device that contains the media you want to verify. 6. On the Properties pane, under Settings, click General. 7. Select the appropriate options as follows:
General Verify dialog box Item Job Name Description Type a name that describes the data you are verifying.
318
Administrators Guide
Verifying a Backup General Verify dialog box Job priority Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are:
8. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see Selecting Recipients for Notification on page 534). 9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). After verification has completed, you can check the results in the job log. Related Topics: Setting Default Backup Options on page 324 Verify after backup completes on page 316
319
The logon credentials are incorrect. Insufficient media is available. Media is not in the drive. There is no overwritable media for an overwrite job. There is no appendable media for an append job.
Test run jobs that are targeted to All Drives will fail the test if any of the devices in the All Drives drive pool cannot handle the job. For example, if one of the devices does not have any media. A test run job checks media capacity available for the selected job. However, you can check if there is enough available media for multiple test run jobs in the Test Run Results report. Note Before you create a test run job, Symantec recommends that you run backup jobs to your devices first. Backup Exec does not recognize the capacity of a backup device until an actual backup job is targeted to the device. If you create a test run job before any other jobs, Backup Exec cannot check that the device has sufficient capacity to perform the backup job. After at least one backup job has been targeted to a device, Backup Exec can determine the capacity. To create a test run of a job: 1. On the navigation bar, click Job Setup. 2. In the Jobs pane, select the job for which you want to create a test run. 3. Under General Tasks, click Test Run.
320
Administrators Guide
Method for determining job size Use previous job history, Select this option to use past job histories to determine whether if available there is enough media available to run the scheduled backup job. Checking the previous job history is faster than performing a pre-scan. Perform Pre-scan Select this option to enable Backup Exec to scan the scheduled backup job to determine whether there is enough media available to run the job. This is the most accurate method of determining media capacity and should be selected if there is not an existing job history. Select this option to have the scheduled job placed on hold if any failures are detected during the test run.
321
Creating a Test Run Job General settings options for test run job (continued) Item Run at priority Description Select the priority level for the test job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are:
5. If you want Backup Exec to notify a recipient when the backup job completes, on the Properties pane, under Settings, click Notification (see Selecting Recipients for Notification on page 534). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). Related Topics: Viewing General Media Properties on page 253 Creating a Manual Backup Job by Configuring Job Properties on page 262 Test Run Results Report on page 602
322
Administrators Guide
Perform Pre-scan
Place the scheduled job Select this option to have the scheduled job placed on hold if any on hold if any failure failures are detected during the test run. occurs during the Test Run job
4. Click OK.
323
Back Up Files - Allow incrementals and differentials using modified time, DIFFERENTIAL - Using modified time or INCREMENTAL - Using modified time.
324
Administrators Guide
Setting Default Backup Options Backup default options (continued) Item Collect additional information for synthetic backup Definition This option is used with synthetic backups. It specifies that Backup Exec collects the information required to detect files and directories that have been moved, renamed, or newly installed since the last backup, and then includes those files and directories in the backup jobs. If this option is not selected, Backup Exec skips these files and directories if their archive bits are unchanged. With this option selected, Backup Exec compares path names, file names, modified times, and other attributes with those from the previous full and incremental backups. If any of these attributes are new or changed, then the file or directory is backed up Backups that have this option selected require more disk space, and take more time to run, than backups that do not.
325
Setting Default Backup Options Backup default options (continued) Item Media overwrite protection Definition Select one of the following media overwrite options:
Overwrite media. Select this option to place this backup on an overwritable media. Make sure that appropriate media is in the stand-alone drive or drive pool you select in the Device field in this dialog box. The media in the drive is overwritten if the media is scratch or recyclable (its overwrite protection period has expired). If allocated or imported media are in the drive, they may also be overwritten depending on the Media Overwrite Protection Level that is set. For more information, see Media Overwrite Protection Levels on page 226. If the media in the drive is not overwritable, a message is displayed requesting that you insert overwritable media.
Append to media, overwrite if no appendable media is available. Select this option to add this backup to the media set listed in the Media Set field in the General applications dialog box (see Options - Set Application Defaults Preferences on page 120). The backup set is appended if an appendable media is available in the selected media set; if not, an overwritable media is used and added to the media set. If an append job fills a media, the job continues on another piece of overwritable media. Depending on your configuration, overwritable media is selected from Scratch media or Recyclable media. For more information, see Media Overwrite Options on page 228. If the media in the drive is not overwritable, a message is displayed requesting that you insert overwritable media.
Append to media, terminate job if no appendable media is available. Select this option to add this backup to the media set listed in the Media Set field in the General applications dialog box (see Options - Set Application Defaults Preferences on page 120). The backup set is appended if an appendable media is available in the selected media set; if not, the job is terminated.
326
Administrators Guide
Setting Default Backup Options Backup default options (continued) Item Compression type Definition Select one of the following compression types:
None. Select this option to copy the data to the media in its original form (uncompressed).
Note Using some form of data compression can help expedite backups and preserve storage media space.
Software. Select this option to use STAC software data compression, which compresses the data before it is sent to the storage device. Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression, the data is backed up uncompressed. Hardware [if available, otherwise software]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature hardware data compression, STAC software compression is used.
Select this option if you want backups to be verified after they are completed. Verify operations make sure the media can be read once the backup has been completed. Verifying all backups is recommended.
327
Setting Default Backup Options Backup default options (continued) Item Back up files and directories by following junction points Definition Select this check box to back up the information for the junction points and the files and directories to which they are linked. If this check box is not selected, then only the information for the junction points is backed up; the files and directories to which they are linked are not backed up. If you use junction points created by linkd.exe (or a similar tool) to span volumes, then Advanced Open File Option (AOFO) backups and Change Journal incremental backups will not follow the junction points properly. To perform AOFO and Change Journal incremental backups of volumes with junction points, clear this option. Junction points created by Disk Manager or mountvol.exe are supported. Note Since Mounted Drives that do not have a drive letter assigned to them cannot be selected, the files and directories to which they are linked are backed up regardless of whether this option is selected. If this option is selected and the actual files and directories to which the junction points are linked are also included in the backup selections, then the files and directories are backed up twice; once during the full file and directory backup, and again via the junction point. WARNING: If a junction point is linked to a location that encompasses it, then recursion (a situation where data is backed up repeatedly) will occur, resulting in an error and job failure. For example, if c:\ junctionpoint is linked to c:\, recursion will occur when attempting to back up c:\ junctionpoint, and the backup job will fail.
328
Administrators Guide
Setting Default Backup Options Backup default options (continued) Item Back up data in Remote Storage Definition Select this check box to back up data that has been migrated from primary storage to secondary storage. The data will not be recalled to its original location; it will be backed up directly to the backup media. If this option is selected, you should not run a backup of your entire system because Backup Exec will have to load the data that has been migrated to secondary storage and additional time will be required for any set that includes migrated data. If this check box is cleared, only the placeholder that stores the location of the data on secondary storage will be backed up, not the data itself. Note This option should not be selected if the device used for secondary storage and backups contains only one drive because Remote Storage and Backup Exec will compete for use of the drive. Enable single instance backup for NTFS Select this option if you want Backup Exec to protect Single Instance Store (SIS) volumes. SIS, which is used by Remote Installation Services to save disk space, maintains a single physical copy of all identical files on a specified volume. If SIS finds an identical file on the volume, a copy of the original file is placed in the SIS and a link is made to the actual physical location. By selecting this option, Backup Exec will back up the physical file one time, no matter how many links have been created.
Caution If the backup job does not run to completion, the file data may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same files. You must run a full or copy backup to ensure that all files are backed up completely. If the incremental - using modified time backup method was used, running the same backup job to completion will back up the files correctly.
329
Setting Default Backup Options Backup default options (continued) Item Definition
Open file backup when Advanced Open File Option is not used Never Select this option to have Backup Exec skip open files if they are encountered during the backup operation. A listing of skipped files appears in the job log for the backup.
If closed within x seconds Select this option to have Backup Exec wait the specified time interval for files to close before skipping the open file and continuing the backup operation. If the file does not close during the specified interval, it is skipped. A listing of skipped files appears in the job log for the backup. Note If multiple files are open, Backup Exec waits the specified time interval for each file; depending on the number of open files, this may significantly increase the backup time. With a lock Select this option to have Backup Exec attempt to open files that are in use. If Backup Exec is able to open a file, the file is locked while it is being backed up to prevent other processes from writing to it. Backing up open files is not as effective as closing applications and allowing the files to be backed up in a consistent state. Select this option to have Backup Exec attempt to open an in use. If Backup Exec is able to open the file, the file is NOT locked while it is being backed up. This allows other applications to write data to the file during the backup operation. WARNING: This option allows files to be backed up that contain inconsistent data and possibly corrupt data. For information about the Advanced Open File Option, see on page 991.
Without a lock
330
Administrators Guide
Run the backup or restore job only if the pre-command is successful Run the post-command only if the pre-command is successful Run the post-command even if the backup or restore job fails Allow Backup Exec to check the return codes (or exit codes) of the pre- and post-commands to determine if the commands completed successfully. An exit code of zero returned to the operating system by the pre- or post-command is interpreted by Backup Exec to mean the job completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the job ended with an error.
If it is critical that the job not run if the pre-command fails, then configure Backup Exec to check the return codes of the pre- and post-commands to determine if the pre-command failed or completed successfully. For example, if a pre-command that shuts down a database before a backup is run fails, the database could be corrupted when the backup is run. In this situation, it is critical that the backup job not run if the pre-command fails. Additionally, if Backup Exec is configured to check the return codes of the pre- and post-commands, and the post-command returns a non-zero code, the job log reports that the post-command failed. If you also selected to run the job only if the pre-command is successful, and both the pre-command and the job ran successfully, Backup Exec will mark the job as failed if the post-command fails. For example, if the pre-command runs successfully and shuts down the database and the backup job also runs successfully, but the post-command cannot restart the database, Backup Exec marks the job and the post-command as failed. If you select the option On each server backed up, the pre- and post-commands are run and completed for each server before processing begins on the next selected server. To set pre/post command options: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Pre/Post Commands.
331
332
Administrators Guide
Setting Default Pre/Post Commands Pre-job and Post-job options (continued) Item Run post-command even if job fails Description Select this option if it is critical to run the post-command regardless if the job is successful or not. If you also select Allow pre- and post job commands to be successful only if completed with a return code of zero and the post-command returns a non-zero code, the job log reports the post-command as failed. Run post-command after If you selected the Verify after backup completes option on the job verification completes General backup properties dialog box, select this option to run the post-command after the verification completes. Cancel command if not completed within x minutes Run these commands On this media server Select this option to run the pre- and post-commands on this media server only. Select the number of minutes Backup Exec should wait before canceling a pre-job or post-command that did not complete. The default time-out is 30 minutes.
On each server backed up Select this option to run the pre- and post-commands one time on each server backed up. The pre- and post-command selections apply to each server independently. If you select this option, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.
4. Click OK. Related Topics: Pre/Post Commands for Backup or Restore Jobs on page 280
333
backup network network ID: 128.10.0.0 subnet mask: 255.255.0.0 IP address: 128.10.0.1 IP address: 128.20.0.1 database server running Remote Agent Backup Exec media server
corporate network network ID: 128.20.0.0 subnet mask: 255.255.0.0
IP address: 128.10.0.3
router A
IP
router B mail server running Remote Agent
database user
mail user
In the example, the database server and mail server are connected to both the backup network and the corporate network.
334 Administrators Guide
When backup operations are performed by the Backup Exec media server, the backup data will use either the backup network or the corporate network to back up the database server. If the backup data goes through the corporate network, the amount of time it takes to back up the database server will increase because the network route between the two computers is longer. This may cause users to experience network latencies when accessing the mail server since there is an increase in network traffic. In contrast, if the Specified Backup Network feature is enabled and you back up the database server, the backup data traffic is isolated to the backup network and users accessing the mail server are not affected. The backup network will be used to perform all backup operations, unless the remote computer is not connected to the backup network. If you want to back up remote computers that are not connected to the backup network, such as the database users computer, then choose to use any available network route. This allows you to back up the remote computer even though it does not reside on the backup network. Related Topics: Using Backup Exec with Firewalls on page 341 Browsing Systems Through a Firewall on page 342
335
Select this option to use the TCP/IP network protocol to communicate with other devices on the network. If you select this option, make sure that all agent workstations are configured to advertise their IP addresses directly to the media server. To set up this protocol, refer to your Windows documentation.
336
Administrators Guide
Specifying Backup Networks Network Options - Set Application Defaults (continued) Item Description
Enable agents using Select this option to use the IPX/SPX network protocol to NetWare IPX/SPX protocol communicate with other devices on the network. If you are using Backup Exec Agents that communicate using SPX, you should ensure that you are using a consistent IPX frame type on your network. If you do not, and Backup Exec is using a different IPX frame type than the workstations running the Backup Exec Agent software, all SPX packets must be routed through a server that can translate the packets. This generates excessive network traffic and, if the router does not properly handle large SPX packets, some packets may be lost. One symptom of this problem is a backup that times-out with a Device not responding error message. Please note that the Auto-Detect frame type will not work if there are any combinations of 802.2 and 802.3 on the network. To set up this protocol, refer to your Windows documentation. Enable Media Server TCP dynamic port range Select this option if you want to allow the media server to use a range of ports for communications, and then enter the port range. If you select the Media server to remote agent option, you do not need to enter a port range for the media server. If the first port Backup Exec attempts to use is not available, communications will be attempted through one of the other ports in the range. If none of the ports in the range are available, Backup Exec will use any available dynamic port. Default port ranges are 1025 to 65535. Symantec recommends using a range of 50 allocated ports for the media server if using Backup Exec with a firewall (Using Backup Exec with Firewalls on page 341).
337
Specifying Backup Networks Network Options - Set Application Defaults (continued) Item Description
Enable Remote Agent TCP Select this option if you want to allow remote agents to use a dynamic port range range of ports for communications, and then enter the port range. If the first port Backup Exec attempts to use is not available, communications will be attempted through one of the other ports in the range. If none of the ports in the range are available, Backup Exec will use any available dynamic port. Default port ranges are 1025 to 65535. Symantec recommends using a range of 25 allocated ports for the remote systems if using Backup Exec with a firewall (see Using Backup Exec with Firewalls on page 341). Default Network Network Interface Select the name of the network interface card that connects the media server to the network you want to use for the backup network. The list includes all available network interface cards on the media server. Displays the IP address of the network interface card you selected for the backup network. Displays the 32-bit number that determines the subnet to which the network interface card belongs. Displays the base network that Backup Exec calculated based on the IP address and the subnet mask of the network interface card you selected. This is the network that will be used to perform remote backups and restores. For Windows 2000 and later operating systems, this field displays the Media Access Control (MAC) address for the network identification card you selected. If a remote system that you selected for backup or restore is not part of the specified backup network, select this check box to ensure that the data from the remote system is backed up or restored over any available network. If you do not select this check box and you selected data from a remote system that is not part of the specified backup network, the job fails because Backup Exec cannot back up or restore the data from the remote system
IP address
Subnet mask
Network ID
Physical address
Use any available network route for remote agents not bound to the above Network ID
338
Administrators Guide
Specifying Backup Networks Network Options - Set Application Defaults (continued) Item Description
Default network interface for delegated jobs Use any available network This option displays only if you have the Central Admin Server interface Option (CASO) installed. Select this option to use any network interface card installed on the managed media server. For more information, see Setting the Default Network Interface for Delegated Jobs on page 858 Use the default network This option displays only if you have the Central Admin Server interface for the managed Option (CASO) installed. Select this option if you want CASO media server delegated backup jobs to be processed using the network interface card configured as the default in the managed media server. For more information, see Setting the Default Network Interface for Delegated Jobs on page 858
Related Topics: Changing the Backup Network for a Job on page 339 Specifying the Restore Network on page 493
339
Network Backup Job Properties Item Network Interface Description Select the name of the network interface card that connects the media server to the network you want to use for the backup network for this backup job. The list includes all available network interfaces on the media server. If you are using the Central Admin Server Option (CASO), select the Use the default network interface for the managed media server option if you want CASO delegated backup jobs to be processed using the network interface card configured as the default in the managed media server. IP address Displays the IP address of the network you selected as the backup network. Displays the 32-bit number that determines the subnet to which the network interface card belongs. Displays the network identification or subnet address that Backup Exec calculated based on the network you selected as the backup network. For Windows 2000 and later operating systems, this field displays the Media Access Control (MAC) address for the network card you selected. If a remote system that you selected for backup is not part of the specified backup network, select this check box to ensure that the data from the remote system is backed up over any available network. If you do not select this check box and you selected data from a remote system that is not part of the specified backup network, the job fails because Backup Exec cannot back up the data from the remote system.
Subnet mask
Network ID
Physical address
Use any available network route for remote agents not bound to the above Network ID
5. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see Selecting Recipients for Notification on page 534). 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398).
340
Administrators Guide
Related Topics: Specifying Backup Networks on page 334 Specifying Default Backup Network and Firewall Options on page 336 Creating a Manual Backup Job by Configuring Job Properties on page 262
The number of ports used for backup network connections is kept to a minimum. Ports opened on the Backup Exec Server and systems using the Remote Agent for Windows Servers are dynamic and offer high levels of flexibility during browsing, backup, and restore operations. You can set specific firewall port ranges and specify backup and restore networks within these ranges to isolate data traffic and provide high levels of reliability.
Note The Remote Agent for Windows Servers is required to perform remote backups and restores. Because firewalls affect system communications between a media server and remote systems that reside outside the firewall environment, special port requirements must be considered when configuring Backup Exec for use with firewalls. Symantec recommends having port 10000 open and available on the Backup Exec media server as well as on the remote systems. In addition, you must open the dynamic port ranges specified for communications between the media server and remote agents. When a media server makes a connection with a remote system, the initial connection will be initiated to the well known port 10000. The Remote Agent will be listening for connections on this predefined port. The media server side of this connection will be bound to an available port. Additional connections from the media server to the Remote Agent will be initiated on any available port. Communication between the media server and the Remote Agent will usually require up to 2 ports on the remote agent side per backup operation. If you plan on supporting multiple backups and restores occurring simultaneously, you must configure your firewall to allow a range of ports large enough to support the maximum number of simultaneous operations desired. Should a conflict arise, the default port of 10000 can be changed to another port number by modifying the %systemroot%\System32\drivers\etc\services file, and changing the NDMP port to an alternate port number. For example, if you installed Windows 2000 to its default location, from your Windows Explorer, select
341
C:\WINNT\System32\drivers\etc\services. Using a text editor, such as Notepad, modify your NDMP entry, or if necessary, add an NDMP entry with the new port number. This entry should be formatted as follows: ndmp 10000/tcp #Network Data Management Protocol
Note If the default port is changed, it must be changed on the media server and all remote systems being backed up through the firewall on this port. When setting up TCP dynamic port ranges, Symantec recommends using a range of 50 allocated ports for the media server (see Enable Media Server TCP dynamic port range on page 337), and 25 allocated ports for the remote systems (see Enable Remote Agent TCP dynamic port range on page 338). For optimum reliability, port ranges should not overlap. Note The number of dynamic ports used by the media server and remote systems can change based on the number of devices being protected and the number of tape devices in use. You may need to increase these port ranges to maintain the highest level of performance. Backup Exec and the firewall need to have the ranges defined (and port 10000). Unless you specify a range, Backup Exec uses the full range of dynamic ports available. When performing remote backups through a firewall, you should select a specific range on the Network and Firewall defaults dialog box.
342
Administrators Guide
5. On the navigation bar, click Backup. 6. Right-click User-defined Selection. 7. From the shortcut menu, click User-defined Selections. 8. In UNC Name, after \\, type the name or IP address of the remote system, and then click Add. 9. Click Close. Under User-defined Selections, you can now select the data to be protected, providing a valid user name and password if prompted, and create a backup job to protect this data by following the procedures described in Creating a Manual Backup Job by Configuring Job Properties on page 262.
343
Service State - Critical operating system and application service data, such as Event Logs, Windows Management Instrumentation (WMI), Removable Storage Manager (RSM), etc. System State - Critical operating system data, such as Windows System File Protection (System Files), COM+ Class Registration Database, Registry, Active Directory, etc. User Data - Active Directory Application Mode, third party application and user data, etc.
Only Writers that have been tested for use with Backup Exec are available for selection in the backup selection list. Other Writers may be displayed in the selection list, but cannot be selected for backup.
344
Administrators Guide
The following table lists the System State Writers and their equivalents in Windows 2000 System State:
System State Writer Internet Information Services (IIS) Metabase Writer Registry System Files COM+ Class Registration Database SYSVOL Active Directory Cluster Quorum Certificate Services
Registry Boot Files COM+ Class Registration Database SYSVOL Active Directory Cluster Quorum Certificate Server
The following table lists the Service State Writers and their equivalents in Windows 2000
Selection for restore in Window 2000 At the volume level with the Restore Removable Storage data option selected. Volume level
Volume level
At the volume level, with the Restore Windows Management Instrumentation repository option selected
345
Selection for restore in Window 2000 At the volume level, with the Restore Terminal Services database option selected. Volume level Volume level Volume level
346
Administrators Guide
347
remote computers running Windows Server 2003. Remote Agents from Backup Exec 9.0 Revision 4367 are not supported on production versions of Windows Server 2003. To prevent backup jobs that target Windows Server 2003 resources and include System State from failing, you must replace the System State selection with the Shadow Copy Components selection. If both the media server and the remote computers running Windows Server 2003 are upgraded to the latest Backup Exec, then the Backup Exec user interface will detect and notify you when obsolete selections such as System State are found. When you select a server or expand it using the graphical view, selections are checked for items that are no longer on the server, such as System State. If invalid items are found, you are prompted to remove them from the selection list (see To replace the System State selection: on page 348). If only the remote computers running Windows Server 2003 are upgraded to the latest Backup Exec, but the media server is not, you must manually edit the selection lists (see To edit selection lists when only the remote computers are upgraded: on page 349). To replace the System State selection: 1. On the navigation bar, click Job Setup. 2. On the Backup Selection Lists pane, select the selection list you want to edit. 3. Under General Tasks in the task pane, click Properties. 4. If the selection list is being used by jobs, you will be prompted to click Yes to continue. If System State is in the selection list, the following message is displayed: System State is selected but cannot be found on server LocalTest. If this server has been upgraded to Windows Server 2003 or later, remove this selection, and then select Shadow Copy Components to fully protect your server. Do you want to remove the System State selection? 5. Click Yes to remove the System State selection. After removing invalid items from the selection list, backup jobs for that computer do not fail, but the System State-equivalent resource is not backed up. You must include the Shadow Copy Components resource in the backup selection list in order to back up the equivalent resources.
348
Administrators Guide
Note To protect Windows Server 2003 resources, you must select all Shadow Copy Components resources, the system drive, and the boot drive for backup. Only full backups can be run on the Shadow Copy Components. 6. Add the Shadow Copy Components resource to the selection list. Editing a selection list affects all jobs using that selection list. If you want to only edit selections for a specific job, edit the job rather than the selection list. 7. Make any necessary changes to the job. To edit selection lists when only the remote computers are upgraded: 1. On the Edit menu, click Edit Selection List. 2. On the Edit Selection List dialog box, click the Edit button. 3. Under View Format, click Text. 4. Highlight the System State selection, and then click Delete. 5. Click OK. Related Topics: Editing Selection Lists on page 298
349
350
Administrators Guide
The importance of the data you are backing up. How often your system needs to be backed up. How much storage media you will use. When you will use certain storage media. How you will keep track of your backup information.
Before choosing a strategy to use with the Backup Exec system, you should answer the following questions: How often should I back up? While there is no requirement on how often to back up your data, there is one consideration that can help you decide: The cost of re-creating data that was added or modified since the last backup. Calculate the manpower, lost time and/or sales, and other costs that would be incurred if the file server or workstation crashed right before the next backup was scheduled to take place (always assume the worst scenario). If the cost is excessive, the strategy should be adjusted accordingly.
351
For example, the cost to re-create an extensive database system that is continually updated by several database operators would be quite substantial. On the other hand, the cost to re-create the data for a user creating one or two inter-office memos would be considerably less. In this scenario, the network administrator would probably opt to back up the database several times daily, and set up daily jobs for the users workstation. In an ideal environment, one full backup should be performed on workstations every day and servers should be fully backed up more often. Important data files and directories that constantly change may need to be backed up several times a day. Because of time and media constraints, this is not feasible for many environments, so a schedule including incremental or differential backups must be implemented. For safety reasons, a full backup should always be performed before adding new applications or changing the server configuration. How much data must be backed up? The amount of data to be backed up is a key determinant of the media rotation strategy you choose. If you are backing up large amounts of data that needs to be retained on media for long periods of time, you will need to select a strategy that is suitable for these requirements. How long does the data need to be stored? The amount of time the data needs to be stored is directly related to the media rotation scheme you use. For example, if you use one media and back up every day, your backups will never be more than a day old. Since storage media is relatively inexpensive when compared to the value of your data, it is a good idea to periodically back up your system on media not used in the media rotation scheme and store it permanently. Some administrators may choose to do this every week, while others may choose to store only one permanent backup per month. The threat of viruses is an issue also. Some viruses take effect immediately, while others may take days or weeks to cause noticeable damage. Because of this, you should have at least the following backups available to restore at any time:
3 daily backups (for example, Monday, Tuesday, Wednesday). A one-week-old full backup. A one-month-old full backup.
Having these backups available should allow you to restore your system prior to when it became infected.
352
Administrators Guide
Which devices am I backing up? Since Backup Exec can back up servers, workstations, and agents, you should consider which devices you want to protect. You will need to coordinate times that are suitable to back up different devices. For example, you may want to back up file servers during the evening and back up workstations at lunchtime. Should I include more than one system in each job? When you are setting up jobs for the network, you must decide if you want to create one job that includes many devices or a job for each device. Here are some of the advantages and disadvantages of each method.
Advantages:
If a job fails, you know immediately which device was not backed up. If a device is turned off or moved, backups of other devices are not affected. When devices are added to the network you can simply set up new jobs for each device. You have more jobs to keep track of (for example, reviewing job histories, and so forth).
Disadvantages:
Advantages:
There are fewer jobs to keep track of and create. You know the order in which the data is backed up. You could make it an overwrite job and thus be able to use the same name for the media and the job. If any of the devices in the job are not available during the backup, the job results in an abnormal completion status.
Disadvantages:
353
Full. Includes all of the data that was selected for backup and uses the full backup method. Backup Exec detects the device as having been backed up. You can use either archive bit or modified time to determine if a file has been backed up.
Note You will need to perform a full backup of your server to establish a baseline for disaster recovery. Full backups also include Copy backups, which include all selected data and do not affect any media rotation scheme because the archive bit is not reset. Copy backups are useful when you need to:
Back up data for a special purpose (for example, to send to another site). Back up specific data. Perform an additional backup to take off-site. Back up data that belongs to a media rotation job without affecting the rotation cycle.
Another Full backup option is the archive backup option, which automatically deletes files from the volume after they have been successfully backed up. This backup method is designed for migrating data from disk to storage media and should not be incorporated in a regular backup schedule. Using the archive backup method allows you to free valuable disk space and reduce clutter on your server volume by migrating stagnant directories and files from the server to media. An archive backup job backs up the selected data, verifies the media, and then deletes the data from the volume. Note For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up but not deleted. Backup Exec will not delete data from Backup Exec Agent workstations when using the archive feature.
Differential. Includes all files that have changed since the last full backup. The difference between differential and incremental backups is that incremental backups include only the files that have changed since the last full or incremental backup.
354
Administrators Guide
Backup Exec provides two differential backup methods, one that uses archive bit and one that uses modified time to determine if the file was backed up. If you select to use the FULL - Back Up Files - Reset Archive Bit and want to run differential backups, you must use the DIFFERENTIAL - Changed Files method. If you select to use the FULL - Back Up Files - Allows incrementals and differentials using modified time, you must use the DIFFERENTIAL - Using modified time method. In most schemes, differential backups are recommended over incremental backups. Differential backups allow much easier restoration of an entire device than incremental backups since only two backups are required. Fewer required media also decreases the risk of not being able to restore important data because of media errors.
Incremental. Incremental backups include only the files that have changed since the last full or incremental backup. Backup Exec provides two incremental backup methods, one that uses archive bit and one that uses modified time to determine if the file was backed up. If you select to use the FULL - Backs Up Files - Reset Archive Bit and want to run incremental backups, you must use the INCREMENTAL - Changed Files method. If you select to use the FULL - Backs Up Files - Allows incrementals and differentials using modified time, you must use the INCREMENTAL - Using modified time method. The advantages and disadvantages described in this section pertain to either type of differential backup.
Working set. The working set backup option includes two options; Changed today and Last accessed in x days. The Changed today option was called Daily backup in previous versions of Backup Exec. You can perform backups using the Changed today method in addition to the media rotation scheme selected. The Changed today method backs up all files with todays date (created or changed today). The Changed today method does not affect the files backup status because the archive bit is not reset. The Last accessed in x days method allows you to back up data that has been created and modified since the last full or incremental backup, and to specify to include data that has been accessed in the last x days. This option is similar to a differential backup, in which files that have been created or changed since the last full backup are included; however, the difference lies in that you can also specify to include all files accessed within the last x number of days. This option can speed the recovery of a crashed server because you only need to restore the working set backup to get up and running again, and then restore the latest full backup at a later time (if necessary). To effectively include the data needed to make your system operational after restoring a working set backup, specifying at least 30 days in the Files accessed in x days field is recommended. With a full/working set backup scheme, the non-full backups will require more media space than full/differential or full/incremental
355
schemes. However, in environments where active data is migrated frequently between machines, or when restore times are especially critical, working set backups can make up the cost of extra media in time savings for restoring data. There are advantages and disadvantages to each backup method.
Backup Method Advantages and Disadvantages Method Full Advantages
Disadvantages
Files are easy to find - Since full backups include all data contained on a device, you dont have to search through several media to find a file that you need to restore. There is always a current backup of your entire system on one media or media set - If you should need to restore your entire system, all of the most current information is located on the last full backup. Files are easy to find - Restoring a system backed up with a differential strategy requires a maximum of two backups - the latest full backup and the latest differential backup. This is less time consuming than backup strategies that require the latest full backup and all incremental backups created since the full backup. Less time required for backup and restore - Differential backups take less time to restore than full backups. Faster recovery is possible in disaster situations because you only need the latest full and differential backup media to fully restore a device.
Redundant backups - since most of the files on your file server rarely change, each full backup following the first is merely a copy of what has already been backed up. This requires more media. Full backups take longer to perform Full backups can be time consuming, especially when you have other devices on the network that need to be backed up (e.g., agent workstations, remote servers). Redundant backups - All of the files created or modified since the last incremental backup are included; thus creating redundant backups.
Differential
356
Administrators Guide
About Backup Strategies Backup Method Advantages and Disadvantages Method Incremental Advantages
Disadvantages
Better use of media - Only files that have changed since the last backup are included, so there is much less data storage space required. Less time required for backup Incremental backups take much less time than full and differential backups to complete.
Backups are spread across multiple media - Since multiple media is required in a disaster situation, this can cause recovery of a device to take longer. In addition, the media must be restored in the correct order to effectively bring the system up to date.
Working Set
Restoring a system backed up with a working set strategy requires only the media containing the latest working set backup media and the media containing the most recent full backup. You can perform a working set backup, restore the data to a new system, and be up and running faster than if you had to restore a full backup followed by all of the incremental or differential backups. Working set backups take less time to run than full backups.
Along with all files accessed in the specified time, all of the files created or modified since the last full or incremental backup are included on each media, thus creating redundant working set backups. This option is available only on platforms that support the last accessed date (Windows, NetWare, and UNIX). Working set backups will work as differential backups when selected for other platforms.
bit is turned on again, and Backup Exec will back up the file in the next full or incremental backup. Backups using the DIFFERENTIAL - Changed Files backup method include only files that were created or modified since the last full backup. When this type of differential backup is performed, the archive bit is left intact. Consider the following backup strategy scenario: Fred wants to implement a backup strategy for the office fileserver. Fred knows that all backup strategies begin with a full backup (backup of an entire device using the full backup method), so he creates a Selection List (see Creating Selection Lists on page 293) for his server and submits the job to run at the end of the day on Friday. Since most files on the server, such as operating system files and application files, seldom change, Fred decides that he can save time and media by incorporating incremental or differential backups in his media rotation scheme. Fred opts to use incremental backups, so he schedules the script to run at the end of the day, Monday through Thursday, with the incremental backup method. Heres what happens: Freds Friday tape contains all of the data on the fileserver and Backup Exec changes all of the files statuses to backed up. At the end of the day on Monday, the incremental job runs and only the files that were created or changed (had the archive bit re-set by the operating system) are backed up. When the incremental job completes, Backup Exec will turn the archive bit off, showing that the files have been backed up. On Tuesday through Thursday, the same events happen. If Freds fileserver crashed on Thursday morning, after he got it running, he would restore each backup in the order in which it was created (for example, Friday, Monday, Tuesday, and so forth). If Fred had decided to perform differential backups on Monday through Thursday, he would have only needed Fridays and Wednesdays tapes: Fridays tape because it included all of the data, and Wednesdays tape because it included every file that had been created or changed since Fridays backup.
358
Administrators Guide
recorded in the Backup Exec database. If the file system time is later than the database time, the file is backed up. When an incremental backup is run, a new time is recorded in the Backup Exec database. The database time is not updated with differential backups. Using the modified time allows Backup Exec to run differential backups on file system, such as Unix, which do not have an archive bit. If you want Backup Exec to use modified time to determine if a file has been backed up, the full and incremental (or full and differential) backups must use the same backup selection list. Related Topics: Using Selection Lists on page 293
359
360
Administrators Guide
Chapter
Policies provide a method for managing backup jobs and strategies. Policies contain job templates, which are job attributes that define how and when Backup Exec processes a job. Templates specify the devices, settings, and schedule for a job, but do not include the selections to be backed up. To create jobs, combine a policy with a selection list. Policies are useful in a number of situations. For example, you can set up policies for:
Rotating media. If you use the policy wizard to create a policy, you can use the Monthly full backup with weekly and daily backups option to create a Grandfather, Father, Son media rotation scheme. Setting relationships between jobs. When a policy contains more than one template, you can use template rules to establish relationships between the templates. For example, you can set a template rule so that when one backup job completes, Backup Exec automatically starts another backup job. Creating duplicate copies of backup sets. Set up a policy that contains a backup template and a duplicate backup set template. The duplicate backup set template initiates a job that copies the backup set created by the backup job. Exporting media. Set up a policy that contains an export media template and at least one backup template. Then, set up a template rule that schedules a media export job after the backup completes. Creating a synthetic backup. If you have purchased and installed the Advanced Disk-based Backup Option (ADBO), then you can set up a policy that contains the necessary job templates for creating a synthetic backup.
After you combine a selection list with a policy, Backup Exec automatically creates a job for each template in the policy. For example, if a policy contains three templates, Backup Exec will create one job for each template, for a total of three jobs. Polices are reusable, so you can create a single policy and combine it with several different selection lists.
361
Related Topics: Policy Jobs Summary Report on page 590 Backup Set Details by Resource Report on page 566 Policy Protected Resources on page 592 About the Synthetic Backup Feature on page 876 Resource Backup Policy Performance Report on page 595
Daily full backups Weekly full backup with daily backups Monthly full backup with weekly and daily backups (this creates the Grandfather, Father, Son media rotation scheme)
362
Administrators Guide
To create a new policy manually: 1. On the navigation bar, click Policy. 2. Complete the policy options as follows:
New Policy General options Item Policy name Description Type a unique name for this policy. You might want to use a name that describes the type of backup or the resources that this policy will protect, such as "Monthly full backup policy" or "My documents daily backup". The policy name that you enter here displays in the Policies list on the Job Setup view. Type a description of this policy.
Policy description
3. Click New Template. Then select the type of template you want to add:
Backup template. See Adding a Backup Template to a Policy on page 367. Export media template. See Adding an Export Media Template to a Policy on page 370. Duplicate backup set template. See Adding a Duplicate Backup Template to a Policy on page 382. Synthetic backup template. See Symantec Backup Exec - Advanced Disk-based Backup Option on page 875.
Note If you want to import an existing backup template into this policy, click Import Template. For more information, see Importing a Template into a Policy on page 372. To create a policy using the Policy Wizard: 1. On the navigation bar, click Job Setup. 2. In the task pane, under Policy Tasks, click New policy using wizard. 3. Follow the instructions in the wizard to create a policy.
363
Editing a Policy
To edit a policy: 1. On the navigation bar, click Job Setup to edit a policy that is either associated with a scheduled job or that is not associated with any jobs, or click Job Monitor to edit a policy that is associated with a scheduled job. 2. To edit a policy that is associated with a job, right-click the job, and then select Edit Policy. To edit a policy that is not associated with a job, double-click the policy. Related Topics: Editing a Template in a Policy on page 372
Deleting a Policy
If you no longer need a policy, you can delete it. Before you delete a policy, you should be certain that you no longer need the jobs that are associated with the policy. Before you can delete a policy, you must remove the association between the selection lists and the policy. When you dissociate selection lists and policies, any active jobs that were associated with the policy will complete and then will be deleted. To delete a policy: 1. On the navigation bar, click Job Setup. 2. Select the policy that you want to delete. 3. If selection lists are associated with the policy: a. In the task pane, under Policy Tasks, click Delete jobs created by policy.
b. Clear the check boxes for the selection lists that are associated with this policy. c. Click OK.
4. Select the policy that you want to delete, and then under General Tasks on the task pane, click Delete. 5. Click Yes to confirm that you want to delete this policy.
364
Administrators Guide
Backup. Use this template to create backup jobs, such as full, incremental, and differential. For more information, see Adding a Backup Template to a Policy on page 367. Export media. Use this template to set up an export media utility job that runs automatically after a backup or duplicate backup set job completes. The export media job either moves media from robotic library slots into a portal or displays an alert reminding you to remove the media from a slot. For more information, see Adding an Export Media Template to a Policy on page 370. Duplicate backup set. With this type of template, you can use a staging strategy to create duplicate copies of backup sets. It allows multiple levels of data duplication, either within the backup window or outside of the backup window. For more information, see About Duplicate Backup Set Templates on page 381. Synthetic backup. This template is available only with the Backup Exec Advanced Disk-based Backup Option. For more information, see Symantec Backup Exec Advanced Disk-based Backup Option on page 875.
You can copy backup templates from one policy to another using the Import Template option. You can save time by importing templates that contain all or most of the settings you want to use. After you import templates, you can give the template a unique name and change any of the settings. Related Topics: Exporting Media on page 207 Importing a Template into a Policy on page 372
366
Administrators Guide
7. On the Properties pane, under Settings, click Pre/Post Commands. Complete the Pre/Post Command options. For more information about pre/post commands, see Pre/Post Commands for Backup or Restore Jobs on page 280.
Chapter 7, Policies and Templates 367
8. On the Properties pane, under Settings, select additional options for this job as needed:
If you are using the Advanced Open File Option, select Advanced Open File and complete the options as described in Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999. If you want to use Offhost backup, select Advanced Disk-based Backup and complete the options as described in About the Offhost Backup Feature on page 888. If you are backing up other platform types or database agents, such as NetWare, Exchange, SQL, or SharePoint, select the platform type or database agent. Refer to the chapter for that item for instructions on completing the options. If you want to change the backup network for this job, select Network and Firewall. For more information, see Changing the Backup Network for a Job on page 339. If you want Backup Exec to notify someone when the backup job completes, select Notification. For more information, see Selecting Recipients for Notification on page 534. If you want Backup Exec to notify someone when a backup job containing a specific selection list completes, on the Properties pane, under Source, click Selection List Notification (see Selecting Recipients for Notification on page 534). If you want to prevent certain files or file types from being included in the backup, select Exclusions. For more information about file exclusion, see Including or Excluding Files for Backup Using Advanced File Selection on page 288.
9. Set the schedule for the template. See Setting the Schedule for a Template on page 369. 10. Click OK. The template is complete. You can add another template or combine the policy with a selection list. For more information, see Creating Jobs Using Policies on page 378.
368
Administrators Guide
Run now and run according to rules for this template. If you select this option, the job will run as soon as a selection list is combined with the policy in which the template is contained. If the template is also linked to another template via a template rule, the job will also run according to the rule selected for the template. Run according to schedule and run according to rules for this template. If you select this option, you can set a date when the template will go into effect, a time window, and the days on which the job will run. If the template is also linked to another template via a template rule, the job will also run according to the rule selected for the template. This is the default setting for templates. Run only according to rules for this template. If you select this option, the template must be part of a template rule. The job created from the template will run based on the rule set for the template.
You can set an availability window and a priority on selection lists. If you set a schedule for a template that is not within the availability window for the selection list, Backup Exec displays the job status as Invalid Time Window. To set the schedule for a template: 1. On the Properties pane, under Frequency, select Schedule. 2. Select one of the following options:
Template Schedule Options Item Run now and run according to rules for this template Description Select this option to run the job immediately after a selection list is combined with the policy in which this template is contained. If the template is part of a template rule, the job will also run according to the template rule. Select this option to configure a schedule for a recurring job, and then click Edit Schedule Details to set the schedule. For more information, see Editing the Job Schedule on page 401. If the template is part of a template rule, the job will also run according to the template rule.
Run according to schedule and run according to rules for this template
369
Using Templates in Policies Template Schedule Options Item Run only according to rules for this template Description Select this option to set the job to run based on a template rule. For example, with the After <First Template> completes, start <Second Template> template rule, the <Second Template> will run whenever the <First Template> completes. Select this option to submit the jobs that are created using this template with an on-hold status. You should select this option if you want to submit the job, but do not want it to run until you change the jobs hold status.
4. On the Template Selection dialog box, select Export Media Template, and then click OK. Note The Export Media template displays only if the policy contains a backup template. 5. Select the media-producing template to use as the source for the export job. For example, if you want to export media after the monthly full backup completes, select the template for monthly full backups as the source media set template. 6. On the Properties pane, under Settings, click General. Type a name for this export media template. 7. If you want to set up notification for this job, on the Properties pane, under Settings, click Notification. For more information, see Selecting Recipients for Notification on page 534. Note The export media job must run according to the template rule, so you do not need to set any schedule options for this job. 8. Click OK. Backup Exec adds the template rule called After <First Template> completes, start <Second Template> to export media. The template is complete. You can add another template or combine the policy with a selection list. For more information, see Creating Jobs Using Policies on page 378.
371
373
Rules to handle conflicting job start times If start times conflict, <First Template> supersedes <Second Template>. If two templates in the same policy have the same start time, the <First Template> will run first. The <Second Template> will run according to the schedule set for it, after the <First Template> job completes. For example, you set a weekly backup to run every Saturday at 5:00 p.m. and a daily backup to run every day at 5:00 p.m. On Saturday, both the weekly backup and the daily backup are scheduled to run at 5:00 p.m. If you set the weekly backup as the <First Template> and the daily backup as the <Second Template>, the weekly backup will run at 5:00 p.m. on Saturday. The daily backup will not run on Saturday, but it will run on Sunday at 5:00 p.m., according to its schedule. If two templates in the same policy have the same start time, the <First Template> will start first. After the <First Template> completes, the <Second Template> will start automatically.
If start times conflict, <First Template> will start and upon completion, starts <Second Template>.
Rules to link jobs together After <First Template> starts, also start <Second Template>. After <First Template> completes, start <Second Template>. With this rule, you can run two jobs simultaneously.
Use this rule if you want Backup Exec to start a job automatically after a selected job completes. The second job will start regardless of whether the first job completes successfully. For example, if the first job fails, the second job will run. Use this rule if you want Backup Exec to automatically start a job after a selected job successfully completes. The second job will not start if the first job fails.
If <First Template> fails, Use this rule if you want Backup Exec to automatically start a new job start <Second if a selected job fails. Template>.
374
Administrators Guide
Rules to limit when jobs run <First Template> must complete at least once before any other templates will be allowed to start. This rule is used when baseline backups are needed, such as with synthetic backup templates. If you set up a baseline backup job, it must complete before any other synthetic backups can begin. If you set the baseline backup template as the <First Template> in this rule, you can ensure that no other synthetic backup jobs will run until the baseline backup completes. This rule applies to synthetic backups. If you set up a baseline backup, it needs to run only once.
Rules to duplicate backup sets Duplicate all backup sets that were created by <First Template> using <Second Template> as scheduled. This rule applies to a duplicate backup template. It displays only if the policy contains a duplicate backup template and the template has a schedule associated with it. Backup Exec automatically adds this rule to the policy if you set the schedule for the template to Run now and run according to rules for this template or Run according to schedule and run according to rules for this template. With this rule, you can set up the data duplication job to run outside of the backup window. This rule applies to a duplicate backup template and displays only if the policy contains a duplicate backup template. After you create a duplicate backup template, Backup Exec automatically adds this rule to the policy if you set the schedule for the template to Run only according to rules for this template. Backup Exec replaces <First Template> with the template that you selected as the source for the duplicate backup template, and replaces <Second Template> with the duplicate template you created. With this rule, it is likely that the duplication job will run during the backup window. If you do not want to run the duplication during the backup window, use the Duplicate all backup sets that were created by <First Template> using <Second Template> as scheduled rule.
After <First Template> completes, start <Second Template> to duplicate the backup set.
Rules to export media After <First Template> completes, start <Second Template> to export media. This rule applies to export media templates and displays only if the policy contains an export media template. After you create an export media template, Backup Exec automatically adds this rule to the policy. Backup Exec replaces <First Template> with the template that you selected as the source for the export media template, and replaces the <Second Template> with the export media template you created. 375
To set a template rule: 1. On the navigation bar, click Job Setup. 2. If you want to set template rules for existing templates in an existing policy, in the Policies section, double-click the policy. If you want to create a new policy, in the task pane, under Policy Tasks, click New policy. Enter a policy name and description. Then create a new template. 3. On the Policy Properties screen, click New Rule. 4. Complete the fields that display as follows:
Template Rule options Item Template rule First template Description Select the template rule that you want to apply. Select the template that you want to insert into the <First Template> slot in the template rule you selected. The first template is usually the trigger for the second template. For example, in the template rule After <First Template> completes, start <Second Template>, the first template must complete before Backup Exec will start the second template. Select the template that you want to insert into the <Second Template> slot in the template rule you selected. Some rules do not require a second template. If a second template is not required for a template rule, you cannot select a template from this option.
Second template
5. Click OK.
376
Administrators Guide
377
378
Administrators Guide
379
380
Administrators Guide
You want to stage your data. For example, you may want to back up data to disk with a 28 day retention (stage 1), then copy the data to another disk for three months for longer term storage (stage 2), and then move the data to tape for offsite storage (stage 3). A policy for this example staging would include a backup template to back up the data to disk for the 28 days, a duplicate backup set template to copy the data from the original disk to the second disk, and another duplicate backup set template to copy the data from the second disk to the tape. Each of these stages may have a different media set to define the data retention period differently for each stage. You want to reduce your backup window. For example, create a policy that contains a backup job template that uses the Backup-to-Disk option to back up data to disk during the backup window. Then create a duplicate template to copy the backed up data from disk to tape and schedule the duplication job to occur outside the backup window. You want to create a duplicate set of backup tapes to store offsite. For example, create a backup template to back up data to either disk or tape. Then create a duplicate template and either set the duplication job to run immediately after the first backup job completes or schedule it to run at a specific time.
If you need to restore data from duplicate backups, you can restore from the source backup or from any of the duplicate backups. There are two methods to configure duplicate backups:
The direct link method. This method requires a policy with one backup template and one duplicate backup template. The direct link is established by the After <First Template> completes, start <Second Template> to duplicate the backup set template rule. The <First Template> is the backup template and <Second Template> is the duplicate template. The template rule provides a direct link between the backup job and the duplication job. To set up duplicate backups using this method, you must set up a policy and then:
Add a backup template with a recurring schedule. Add a duplicate template and set the Run only according to rules for this template schedule option.
Backup Exec automatically adds the After <First Template> completes, start <Second Template> to duplicate the backup set template rule to the policy.
Chapter 7, Policies and Templates 381
The incremental duplication method. This method requires at least one backup template and at least one duplicate template. If a policy contains several templates, you can use this method to associate one duplicate backup template to several backup and/or duplicate backup templates. With this method, use the Duplicate all backup sets that were created by <First Template> using <Second Template> as scheduled template rule. To set up duplicate backups using this method, you must set up a policy and then:
Add a backup template with a recurring schedule. Add a duplicate backup template with a recurring schedule. Set up a template rule using the Duplicate all backup sets that were created by <First Template> using <Second Template> as scheduled template rule.
382
Administrators Guide
7. In the Properties pane, under Settings, select General. Complete the appropriate options as follows:
New duplicate backup Job Template General Options Item Template name Backup set description Preferred source device Description Type the name for this template. Type a description of the information you are backing up. Select the device that was used as the destination device for the original backup job.
8. In the Properties pane, under Settings, select Advanced. Complete the appropriate options as follows:
New duplicate backup Job Template Advanced Options Item Verify after job completes Description This option enables Backup Exec to automatically verify that the media can be read after the backup completes. This option is selected by default. Symantec recommends that you verify all backups.
383
About Duplicate Backup Set Templates New duplicate backup Job Template Advanced Options Item Compression type Description Select one of the following:
None. Select this option to copy the data to the media in its original form. If the data was backed up using software compression, then it is copied in its software compression form. Using some form of data compression can help expedite backups and preserve storage media space. Hardware data compression should not be used in environments where devices that support hardware compression are used interchangeably with devices that do not have that functionality. For example, if a drive that does not support hardware compression is added to a cascaded drive pool that includes drives supporting the feature, hardware compression is automatically disabled. You can manually re-enable hardware compression on the drives that support it, but this results in media inconsistency. If the drive that supports hardware compression fails, the compressed media cannot be restored with the non-compression drive
Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression the data is backed up uncompressed.
9. If you want to set up notification for this job, on the Properties pane, under Settings, click Notification. For more information about notifications, see Selecting Recipients for Notification on page 534. 10. Set the schedule for the backup job. See Setting the Schedule for a Template on page 369. Note You must set a schedule for the template if you want to use the Use scheduled <Second Template> to duplicate all backup sets that were created by <First Template> template rule. 11. Click OK. You can add another template to the policy or combine the policy with a selection list to create jobs.
384
Administrators Guide
Chapter
Configure logon accounts (Configuring Logon Accounts on page 386) Copy jobs, selection lists, and policies to local or remote servers (Copying Jobs, Selection Lists, and Policies on page 394) Copy media server configuration settings and logon account information to other media servers (Copy Configuration Settings and Logon Information on page 396) Schedule jobs (Scheduling Jobs on page 398) Monitor jobs (Monitoring Jobs on page 405) Link directly from an error code in a job log to the Symantec Technical Support web site to view more information about the error (Unique Message Identifier (UMI) Error Codes In Job Logs on page 432) Configure audit logs (Configuring the Audit Log on page 439) Configure error-handling rules (Error-Handling Rules on page 439) Configure thresholds to recover jobs (Setting Thresholds to Recover Jobs on page 445) Configure database maintenance (Configuring Database Maintenance on page 447)
385
Browse resources. Your default Backup Exec logon account enables you to browse local and remote resources when you create backup jobs. To browse resources, each user must have a default Backup Exec logon account that is associated with their Windows user account. The Backup Exec logon account does not have to be the same user name as the Windows user that is used to log on to Backup Exec.
Administrators Guide
386
For example, you are logged on to a media server named MEDIASERVER as the local Windows administrator. When you start Backup Exec, you are prompted to create a default Backup Exec logon account for the local administrator because one does not exist. You can create a Backup Exec logon account for the local administrator that has the credentials for a domain administrator. The Backup Exec logon account will have the following properties: User name: DOMAIN\Administrator Description: MEDIASERVER\Administrator Default Account Owner: MEDIASERVER\Administrator When you change your default Backup Exec logon account, you can use your new default Backup Exec logon account to browse resources immediately; you do not have to restart your system in order for the changes take effect.
Make backup selections. You can select a different Backup Exec logon account when you make selections for backup. If your default does not have rights, the Logon Account Selection dialog box appears and enables you to create or select a different Backup Exec logon account. You can also change the Backup Exec logon account when making backup selections using the Connect As command in the context menu.
Note For more information on using Backup Exec logon accounts with Exchange mailbox and SQL backups, see Using Backup Exec Logon Accounts for SQL Resources on page 1015 and Using Backup Exec Logon Accounts with Exchange Resources on page 1068.
Restore. You can assign Backup Exec logon accounts to resources when you create restore jobs. The default Backup Exec logon account is used unless you choose a different Backup Exec logon account when you create the restore job, in Resource Credentials in the Restore Job Properties.
Related Topics: Changing Your Default Backup Exec Logon Account on page 392
387
The Backup Exec System Logon Account may have access to most or all of your resources since it contains the Backup Exec Services credentials. If you want to make Backup Exec more secure, you can change the SLA to be a restricted account or you can delete it. However, if you delete the SLA, the jobs in which it is used may fail. If the SLA is deleted, you can re-create it using the Logon Account Management dialog box. The SLA is used for the following tasks and jobs:
Jobs migrated from a previous version of Backup Exec Windows Explorer interface jobs One-button backup jobs (if a default Backup Exec logon account does not exist for the user running the job) Duplicate backup data jobs Command Line Applet Backup Exec R/3 Agent
Related Topics: Creating a New Backup Exec System Logon Account on page 392
On the Tools menu, point to Wizards, and then click Logon Account Wizard. The wizard will guide you through the process of creating a Backup Exec logon account.
To create a new Backup Exec logon account using the Logon Account Management dialog: 1. On the Network menu, click Logon Accounts. 2. Click New.
388
Administrators Guide
Password
Confirm password
Account name
Notes
This is my default logon Select this check box to make this your default Backup Exec logon account account used to browse, make selections, or restore data on your local and remote resources.
4. Click OK to create the Backup Exec logon account. Related Topics: Deleting a Backup Exec Logon Account on page 391 Replacing a Backup Exec Logon Account on page 391
389
To edit a Backup Exec logon account: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears. 2. Select the Backup Exec logon account you want to change, and then click Edit. If you are not logged on to Backup Exec with the same user name as the Backup Exec logon account owner, you must provide the password before you can edit the account. 3. Modify the Backup Exec logon account properties as needed. 4. To change the password for the Backup Exec logon account: a. Click Change password. If you are using the Backup Exec Web Administration Console, select Check here to change the password for this account.
b. In Password, type a new password. c. In Confirm, re-type the password, and then click OK.
390
Administrators Guide
Being referenced by a job. Owned by a user who is logged on to the media server. Set as the default Backup Exec logon account of a user who is logged on to the media server.
You can delete a Backup Exec logon account when the owner is logged off and all users who have it set as their default logon account are logged off. To delete a Backup Exec logon account: 1. On the Network menu, click Logon Accounts. The Logon Account Management dialog box appears. 2. Select the Backup Exec logon account you want to delete, and then click Delete.
391
3. Click Yes to confirm the deletion. The Backup Exec logon account is removed from the Backup Exec logon account list.
Click Set as Default. Click Edit, select the check box This is my default logon account, and then click OK.
392
Administrators Guide
3. Select the appropriate options as follows, and then click OK to create the system logon account:
Edit Logon Credentials dialog box Item User name Description Type the fully qualified user name for the Backup Exec logon account. For example, DOMAIN\Administrator. The user name is provided when you attempt to connect to a resource. The user name you enter is not case-sensitive for the resources that are accessed. Enables you to type and confirm a new password for the account. The password you enter is encrypted for security. You can leave this field blank if this Backup Exec logon account does not need a password. Type any comments to describe how the Backup Exec logon account will be used. Select this check box to enable the Backup Exec logon account to be used only by the owner of the Backup Exec logon account and those who know the password. If this is not selected, the Backup Exec logon account will be a common account. Common accounts are shared accounts that can be accessed by all users.
Change password
Notes
This is my default logon Select this check box to make this your default account used to account browse, make selections, or restore data on your local and remote resources.
393
If you are copying to other servers, select the media server you want to copy to. If the media server doesnt appear on the list, click Add, and then enter the media server name.
Overwrite Select this option if you want to overwrite an existing job, selection jobs/selection lists, or list, or policy having the same name. policies with identical names that already exist on the destination media server Overwrite logon Select this option if you want to overwrite logon accounts for an accounts used by this existing job having the same name. This option only appears if you job already exist on the are copying a job to another media server. destination server
394
Administrators Guide
Copying Jobs, Selection Lists, and Policies General options for Copy to Media Server job (continued) Item Add Description Click this button if you want to add a media server to the Destination media servers list. Select a media server, and then click this button if you want to edit information stored for a media server, such as logon account information. Select a media server, and then click this button if you want to remove a media server from the Destination media servers list. Click this button if you want to import a list of media servers to be added Destination media servers list. The list should include only the media server name, with one per line.
Edit
Remove
Import List
5. Click OK. The operation is queued. The default time-out is five minutes; if the transfer cannot be completed within five minutes, the transfer is terminated and an alert is issued. The queue checks for copy jobs every 60 seconds, and then sends all the copy jobs that are queued. Backup Exec sends an alert with the job success or failure status along with a log file that allows you to view results. The job log for Copy to Media Server jobs does not display with the other job logs in the Job History. To view the job log for a Copy to Media Server job: 1. On the navigation bar, click Alerts. 2. Click the Active Alerts or Alert History tab. 3. Click the Source column heading. 4. Locate an alert with Job as a Source and Copy to Media Server job as a Job Name. 5. Right-click the alert, and then select View Job Log. 6. If a Copy to Media Server alert does not exist:
395
a.
In the task pane, under Alert Tasks, click Configure alert categories and make sure that the alert categories Job Failed and Job Success are enabled.
b. On the Tools menu, click Options, and then click Preferences. Make sure that the option Automatically display new alerts is selected.
Default schedule
Error-handling rules
Alert configuration
396
Administrators Guide
3. If the destination media servers appear on the list, select all of the media servers that you want to copy to. 4. If a destination media server name does not appear: a. Click Add.
b. Enter the name of the media server. c. If necessary, click Change Logon Account and select or enter the correct logon account information (see Configuring Logon Accounts on page 386).
5. Repeat step 4, if necessary, to add another media server that you want to copy the configurations to. 6. If you want to import a list of media servers, click Import List, browse to select the list, and then click Open. 7. After all media servers have been selected, click OK. To copy logon account information to another media server: 1. From the Network menu, click Logon Accounts. 2. Select the logon account information you want to copy, and then click Copy to Servers. 3. Enter the name of the media server you want to copy the logon account information to, and then click Add. 4. Repeat step 3 for each media server you want to copy the logon account to. 5. Click OK.
397
Scheduling Jobs
Scheduling Jobs
The schedule option enables you to configure the time and the frequency that you want to run jobs. You can configure a schedule for jobs such as backup, restore, inventory, new catalog, etc. During the job setup, you can choose to run jobs immediately, run once on a specific day and time, or run according to a schedule. To configure a schedule for a template in a policy, see Setting the Schedule for a Template on page 369. Note When you create a backup selection list, you can set a time range when the resources in the list will be available for backup. The time range is called the availability window. If you schedule a job to run outside of the availability window, the job does not run and Backup Exec displays an Invalid Schedule status for the job on the Job Monitor. When scheduling a job, be sure that the schedule is within the availability window for the resources. For more information, see Setting Priority and Availability Windows for Selection Lists on page 301. To configure a schedule for a job: 1. Determine the type of job you want to schedule, and then on the navigation bar, click the appropriate button. For example, to schedule a backup job, click Backup. 2. On the Properties pane, under Frequency, click Schedule. 3. Select the appropriate options as described in the following table, and then click Submit:.
Schedule Job Properties dialog box Item Current date and time Schedule Run now Run on Date at Time Select Run now to run the job immediately. Select Run on Date at Time to schedule the job to run one time on the selected date at the selected time, and then type the date and time. Description Displays the current date and time set on this computer.
398
Administrators Guide
Scheduling Jobs Schedule Job Properties dialog box (continued) Item Run according to schedule Description Select Run according to schedule to configure a schedule for a recurring job, and then click Edit Schedule Details to configure the schedule. For more information, see Editing the Job Schedule on page 401. Click View Schedule Summary to verify your schedule. The Summary dialog box displays the Effective Date, Time Window, Restart Interval, and a calendar. The calendar displays a four month period with the selected scheduled run dates in bold. Effective date If Run according to schedule is selected, the effective date displays the day that the schedule begins. If Run according to schedule is selected, the time window displays the specified period of time during which a job can begin on any scheduled day. When setting up the time during which a task runs, you can enter a time window that extends past midnight and into the next day. Bear in mind, however, that this may change the days on which the task runs. For example, if you schedule a task to run every Friday between 8:00 PM and 4:00 AM, its possible for the task to run on Saturday morning sometime before or at 4:00 AM. If you dont want the task to run on Saturday, you must alter the time window, for example, by changing the ending value from 04:00:00 AM to 11:59:59 PM. Then, the task is confined to one day. Note When a time window crosses midnight, the start time is later in the day than the end time. Submit job on hold Select Submit job on hold if you want to submit the job with an on-hold status. You should select this option if you want to submit the job, but do not want the job to run until you change the jobs hold status. Enable automatic cancellation Select Enable automatic cancellation, and then type the number of hours or minutes in the Cancel job if not completed within option. This option enables you to cancel the job if is not completed within the selected number of hours or minutes. Backup Exec starts timing the length of time the job takes to run when the job is dispatched to the job engine, not when the job begins. This option is available for restore and utility jobs but not for backup jobs.
Time window
399
Scheduling Jobs Schedule Job Properties dialog box (continued) Item Job deletion Delete the job if the job Select this to delete jobs that complete successfully, have been successfully completes created to run once, either now or at a scheduled time, and have not been created from a template. This option is selected by default. Delete the job after the Select this to delete jobs that complete, but with exceptions, have job completes been created to run once, either now or at a scheduled time, and have not been created from a template. This option is selected by default. Do not delete the job Select this to keep the jobs that were created to run once, and were not created from a template, in the Job Setup view. Description
Note If you are using Backup Exec for Web Administration Console (BEWAC), click OK when you are ready to submit the job to the job queue or run the job after you view the job summary. If you are not satisfied with the settings you selected, click Cancel, and reset all of the settings Related Topics: Backing Up Data on page 259 Monitoring Jobs on page 405 Configuring Default Schedule Options on page 403 Configuring Holiday Scheduling for Jobs on page 404 Setting the Schedule for a Template on page 369
400
Administrators Guide
Scheduling Jobs
401
Scheduling Jobs Schedule Options (continued) Item Time Window Description Select this option to specify the time window on any scheduled run day during which the job can begin. On the right pane, select both the earliest and the latest time the job can start. A job can run any time between 11:00:00PM and 10:59:59 PM. The time window does not extend beyond 24 hours, or more specifically, beyond 23 hours, 59 minutes, and 59 seconds. For example, you cannot set a time window starting at 3:00 AM and ending at 5:00 AM the following day. Restart Time Interval Select this option to specify a time period during which the job can be restarted on the run day. On the right pane, select the Restart task every check box, and then enter the repeat interval in hours, minutes, and second. Run Day Options Week Days Select this option to schedule the job for specific days of the week, weeks of each month, or days on specific weeks of the month. On the right pane, select a check box to specify the day that the job is scheduled to run. You can click Select All to select all the days, and then click specific days to clear them. To select an entire column or row, click the heading. Day Interval Select this option to schedule a task to run every selected number of days starting from a particular date. By default, the date from which the interval is calculated is the current date. On the right pane, select the Every x days check box, and enter the number of days for the interval. To change the calculated date, in the calculated from option, enter a new date. Days of the Month Select this option to schedule a task to run on specific days of each month. On the right pane, select the day or days you want the task to run. You can also select Last to schedule a task to run on the last day of the month, regardless of the actual date the month ends. Specific Dates Select this option to schedule specific dates for a task. On the right pane, select the dates you want from the calendar, and then click << to move that date to the Include list. To delete a date from the Include list, select the date and click Delete. 402 Administrators Guide
Scheduling Jobs Schedule Options (continued) Item Exclude Dates Description Select this option to exclude specific dates, such as holidays, from a run schedule. On the right pane, select the dates you want to exclude from the calendar, and then click << to move that date to the Exclude list. To delete a date from the Exclude list, select the date and click Delete. Summary Enables you to verify your schedule. The dialog box includes the Effective Date, Time Window, Restart Interval, and a calendar. The calendar displays a six month period with the selected scheduled run dates in bold.
5. Click OK to return to the Schedule dialog box. 6. You can start the job after editing the schedule or select other options from the Properties pane. Related Topics: Configuring Holiday Scheduling for Jobs on page 404
403
Scheduling Jobs
5. Click View Schedule Summary to verify your schedule. The Summary dialog box displays the Effective Date, Time Window, Restart Interval, and a calendar. The calendar displays a six month period with the selected scheduled run dates in bold. 6. Click Enable automatic cancellation, and then type the number of hours or minutes in the Cancel job if not completed within option. This option enables you to cancel the job if is not completed within the selected number of hours or minutes. Backup Exec starts timing the length of time the job takes to run when the job actually begins, not when the job is scheduled to begin. 7. Click OK to save the options or select other options from the Properties pane. Related Topics: Backup Exec Defaults on page 119
Monitoring Jobs
Monitoring Jobs
Backup Execs Job Monitor enables you to monitor and perform tasks on active, scheduled, or completed jobs that have been submitted for processing. The Job Monitor has two views for jobs: Jobs list and Job Calendar. You can select filters to limit the type of jobs you want to appear in each view. The Jobs list view displays active and scheduled jobs in the Current Jobs pane and successful, completed with exceptions, failed, and canceled jobs in the Job History pane. The Calendar view displays scheduled, active, and completed jobs in either a day, week, or monthly view. Related Topics: Managing Custom Filters on page 407 Viewing and Changing Active Jobs on page 415 Viewing and Changing Scheduled Jobs on page 420 Viewing and Changing Completed Jobs on page 427
405
Monitoring Jobs
3. Under Current Job View Filters or Job History View Filters, select or clear the appropriate filters as follows:
Jobs List View Filters Item Current Job View Filters Show active jobs Show scheduled jobs Use custom filter Lists jobs currently processing or in the job queue. Lists the next occurrence for a job. Select a custom filter from the drop down list. Only information that you have specified in a custom filter about current jobs or a type of current job, such as a backup or restore job, is displayed. Note Only custom filters that you have created are displayed. If no custom filters have been created, you are prompted to create one. See Creating Custom Filters for the Current Jobs View on page 408. Job History View Filters Show successful jobs Show completed jobs with exceptions Show failed jobs Lists all jobs that completed without errors. Lists jobs that completed, but may contain one or more minor errors. Lists jobs that were processed, but one or more significant errors occurred. Lists jobs that were terminated as the operation was running. Lists all the jobs that were processed in the last 24 hours. Lists all the jobs that were processed in the last 7 days. Lists all jobs that were processed. Description
Show canceled jobs Show last 24 hours Show last 7 days Show all
406
Administrators Guide
Monitoring Jobs Jobs List View Filters (continued) Item Use custom filter Description Select a custom filter from the drop down list. Information that you have specified in a custom filter about job histories is displayed. Note Only custom filters that you have created are displayed. If no custom filters have been created, you are prompted to create one. See Creating Custom Filters for the Job History View on page 410.
Related Topics: Managing Custom Filters on page 407 Viewing and Changing Active Jobs on page 415 Viewing and Changing Scheduled Jobs on page 420 Viewing and Changing Completed Jobs on page 427
407
Monitoring Jobs
To create, edit, or delete custom filters: 1. On the navigation bar, click Job Monitor. 2. Click the Job List tab. 3. Under Custom Filter Tasks in the task pane, click Manage custom filters. The Custom Filters Management dialog box appears, and displays the name, description, and type of custom filter that currently exist. 4. Do any of the following:
To create a new custom filter, click New, and then click either Job History Custom Filter, or Current Jobs Custom Filter. To edit a custom filter, select the filter from the list, and then click Edit. To delete a custom filter, select the filter from the list, and then click Delete. When you delete a custom filter, it is also deleted from the files created for each logon account: C:\Program Files\Backup Exec\NT\Data\JobHistoryFilters_<logon account name>.xml C:\Program Files\Backup Exec\NT\Data\CurrentJobsFilters_<logon account name>.xml
Related Topics: Creating Custom Filters for the Current Jobs View on page 408 Creating Custom Filters for the Job History View on page 410 Viewing and Filtering Jobs in the Calendar View on page 413
In the Current Jobs Filter box, under Custom Filter, click <new filter>.
Administrators Guide
408
Monitoring Jobs
Under Custom Filter Tasks in the task pane, click Manage custom filters, click New, and then click Current Jobs Custom Filter.
The New Custom Filter dialog box appears. 4. Select the following options as appropriate, and then click OK.
New Custom Filter options for the Current Jobs View Item General Name
Description
Name - Type a name for the new custom filter for the current job view. Description - Type a description of the new filter.
Criteria State
Enable this filter - Select this check box to use job states as a criteria for refining the current jobs view. If this check box is not selected, State is not used as a criteria for this custom filter. State - Select the check boxes for the job state that you want listed in the current jobs view. For quicker selection, click Check All or Uncheck All. Enable this filter - Select this check box to use job types as a criteria for refining the current jobs view. If this check box is not selected, Job Type is not used as a criteria for this custom filter. Job Type - Select the check boxes of the job types that you want listed in the current jobs view. For quicker selection, click Check All or Uncheck All. Enable this filter - Select this check box to use active job statuses as a criteria for refining the current jobs view. If this check box is not selected, Job Status is not used as a criteria for this custom filter. Job Status (Active Jobs) - Select the check boxes for the active job statuses that you want listed in the current jobs view. For quicker selection, click Check All or Uncheck All.
Job Type
409
Monitoring Jobs New Custom Filter options for the Current Jobs View (continued) Item Job Status (Scheduled Jobs) Description
Enable this filter - Select this check box to use scheduled job statuses as a criteria for refining the current jobs view. If this check box is not selected, Job Status is not used as a criteria for this custom filter. Job Status (Scheduled Jobs) - Select the check boxes for the scheduled job statuses that you want listed in the current jobs view. For quicker selection, click Check All or Uncheck All.
Media Server
This option is only available if the Central Admin Server Option is installed.
Enable this filter - Select this check box to use media servers as a criteria for refining the current jobs view. Media Server - Select the check boxes of the media servers for which you want current jobs listed in the current jobs view. For quicker selection, click Check All or Uncheck All.
For more information, see Changes to the Job Monitor/Job History View with CASO on page 856. Date Range
Do not use a date range - Select this option to display all of the current jobs that meet the criteria you have specified. Show next <number> <Hours/Days> - Select this option, and then enter a number of hours or days. Only the current jobs that are scheduled or active in the next number of hours or days that you specify and that meet the other criteria for this filter are displayed on the Job Monitor.
In the Job History Filter box, under Custom Filter, click <new filter>.
410
Administrators Guide
Monitoring Jobs
Under Custom Filter Tasks in the task pane, click Manage custom filters, click New, and then click Job History Custom Filter.
The New Job History Custom Filter dialog box appears. 4. Select the following options as appropriate, and then click OK
New Custom Filter options for the Job History View Item General Name
Description
Name - Type a name for the new custom filter for the job history view. Description - Type a description of the new filter.
Enable this filter - Select this check box to use job types as a criteria for refining the job history view. Job Type - Select the check boxes of the job types that you want listed in the current jobs view. For quicker selection, click Check All or Uncheck All. Enable this filter - Select this check box to use job status as a criteria for refining the job history view. Job Status - Select the check boxes of the job statuses that you want listed in the job history view. For quicker selection, click Check All or Uncheck All.
Job Status
Media Server
This option is only available if the Central Admin Server Option is installed.
Enable this filter - Select this check box to use media servers as a criteria for refining the job history view. Media Server - Select the check boxes of the media servers for which you want job histories listed in the job history view. For quicker selection, click Check All or Uncheck All.
For more information, see Changes to the Job Monitor/Job History View with CASO on page 856.
411
Monitoring Jobs New Custom Filter options for the Job History View (continued) Item Protected Server Description
Show job histories that backed up or restored data on this server - To show job histories for jobs that have backed up or restored data on a protected server, type all or part of the server name. If you type only part of the server name, all job histories for servers with names that contain that text are displayed. For example, if you type the server name bat, then all protected servers with names that include *bat* are displayed. A protected server is any computer on the network that is being backed up by Backup Exec, including Backup Exec media servers.
Job Name
Show job histories with the following job name - To show job histories for jobs with specific job names, type all or part of the job name. If you type only part of the job name, all job histories for jobs with names that contain that text are displayed. For example, if you type the job name bat, then all job histories for jobs with names that include *bat* are displayed. Do not use a date range - Select this option to display all of the job histories that meet the criteria you have specified. Show last <number> <Hours/Days> - Select this option, and then enter a number of hours or days. Only the job histories created in the last number of hours or days that you specify and that meet the other criteria for this filter are displayed on the Job Monitor. Show using the following range: Select this option, and then enter a range of dates and times. Only the job histories created between the dates and times that you specify and that meet the other criteria for this filter are displayed on the Job Monitor. Enable this filter - Select this check box to use byte count as a criteria for refining the job history view. The byte count is the number of bytes that were processed for the job. Do one of the following: To filter for job histories that have a byte count greater than a given byte count, select Greater than, enter a number for the byte count, and then select the measurement to use in bytes, kilobytes (KB), megabytes (MB), or gigabytes (GB). To filter for job histories that have a byte count less than a given byte count, select Less than, enter a number for the byte count, and then select the measurement to use in bytes, kilobytes (KB), megabytes (MB), or gigabytes (GB).
Date Range
Byte Count
412
Administrators Guide
Monitoring Jobs New Custom Filter options for the Job History View (continued) Item Elapsed Time Description
Enable this filter - Select this check box to use elapsed time as a criteria for refining the job history view. The elapsed time is the amount of time from when the operation started until it ended. Do one of the following: To filter for job histories that have an elapsed time greater than a given elapsed time, select Greater than, enter a number for the elapsed time, and then select the measurement to use (seconds, minutes, or hours). To filter for job histories that have an elapsed time less than a given elapsed time, select Less than, enter a number for the elapsed time, and then select the measurement to use (seconds, minutes, or hours).
413
Monitoring Jobs Calendar Views (continued) Item Week Description Lists all the jobs for the selected week. For recurring jobs, only the next 24 occurrences for the job are listed for a day. You can view previous or subsequent weeks using the scroll bar. Lists all the jobs for the selected month. You can view previous or subsequent weeks using the scroll bar.
Month
4. If the current day is not selected for a calendar view, under Navigation, click Go To Today. The current day appears in the view. To set View Filters and Display Filters for the Job Calendar: 1. On the navigation bar, click Job Monitor. 2. Click the Calendar tab. 3. In the Job Calendar Filter box, click the appropriate filters as follows:
Job Calendar View Filters Item View Filters Show active jobs Show scheduled jobs Show scheduled job recurrences Show successful jobs Show completed jobs with exceptions Show failed jobs Lists jobs currently processing or in the job queue. Lists the next occurrence for a job. Lists all occurrences of a recurring job. If the Show scheduled jobs filter is clear, this filter cannot be selected. Lists all jobs that completed without errors. Lists jobs that completed, but may contain one or more minor errors. Lists jobs that were processed, but one or more significant errors occurred. Lists jobs that were terminated as the operation was running. Description
414
Administrators Guide
Monitoring Jobs Job Calendar View Filters (continued) Item Show media server Description This filter displays only if the Central Admin Server Option is installed. Select the media server for which you want to view jobs. Select All media server to view jobs for all of the managed media servers that this central administration server delegates to. For more information, see Changes to the Job Monitor/Job History View with CASO on page 856. Display Filters Show job state icon Show job time Displays the job status icon for the jobs. Displays the time jobs are scheduled to run.
Related Topics: Viewing and Changing Active Jobs on page 415 Viewing and Changing Scheduled Jobs on page 420 Viewing and Changing Completed Jobs on page 427 Changes to the Job Monitor/Job History View with CASO on page 856.
415
Monitoring Jobs
The Job Activity dialog box appears. The Job Activity dialog contains two tabs: Job Activity and Job History. The Job Activity tab only appears for active jobs and provides detailed information about the jobs current status. The Job History tab provides a summary of the job as it is being processed. For more information on the job history, see Viewing and Changing Completed Jobs on page 427. The Job Activity tab provides the following information:
Job Activity dialog box Item Job Name Job log Description The job name entered during job configuration. The filename of the job log. The job log cannot be viewed until the job has completed. The job log is located in Program Files\VERITAS\Backup Exec\NT\Data. The status of the operation. For details, see Active Job Statuses on page 419. The type of operation currently in progress (Backup, Catalog, Restore, Verify, etc.). The media server processing the job. The name of the storage device processing the job. The media or share being processed. The icon field to the left of the field name displays either:
Status
Operation
A disk drive icon when a backup or archive operation is running, or A tape drive icon when a restore or verify operation is running.
Destination
Where the data is being written. The icon field to the left of the field name displays either:
A tape device icon when a backup operation is running, or A disk drive icon when a restore operation is running.
Current Directory
Name of the current directory being processed. The icon field to the left of the field displays either:
A folder if the active job is a backup or restore operation No icon, if the active job is not a backup or restore operation, but a job such as an Erase or Format operation.
416
Administrators Guide
Monitoring Jobs Job Activity dialog box (continued) Item Current File Description Name of the current file being processed. The icon field to the left of the field name displays either:
A page, if the active job is a backup or restore operation No icon, if the active job is not a backup or restore operation, but a job such as an Erase or Format operation.
Media server
The media server on which this job is running. If the Central Admin Server Option is installed, this is the managed media server that the central administration server has delegated this job to. For more information, see Changes to the Job Monitor/Job History View with CASO on page 856.
Delegation status
If the Central Admin Server Option is installed, indicates the current status of a job that is being delegated from the central administration server to the managed media server. These statuses include the following, where <x> is replaced with the name of the managed media server:
Preparing to delegate job to <x> Delegating job to <x> Job has been delegated to <x> Job has been received by <x> Job is actively running on <x> Job has completed on <x> Error in delegating job ... re-submitting job to <x>
For more information, see Changes to the Job Monitor/Job History View with CASO on page 856. Statistics Directories Files Skipped Files Corrupt Files Files in use Job Rate Number of directories processed. Number of files processed. Number of files skipped during the operation. Number of corrupt files encountered during the operation. Number of files in use encountered during the operation. Amount of data backed up per minute for the entire job.
417
Monitoring Jobs Job Activity dialog box (continued) Item Bytes Start Time Elapsed Time Percent complete Description Number of bytes processed. Time the operation started. Length of time that has elapsed since the operation started. Select percentage of the job that has completed. To display this option, on the Tools menu, select Options, and then in Preferences, select Display progress indicators for backup jobs. The total number of bytes for the backup job estimated during a prescan. To display this option, on the Tools menu, select Options, and then in Preferences, select Display progress indicators for backup jobs The estimated time it will take for the job to complete. To display this option, on the Tools menu, select Options, and then in Preferences, select Display progress indicators for backup jobs
4. Click Cancel Job to cancel the processing of the job. If the job is scheduled, it will run again at the next scheduled time. Canceling a job may take a considerable amount of time depending on the tape drive selected for the job. 5. Click Print to print the job activity information. You must have a printer attached to the computer and configured in order to print the report. 6. Click Find to search for a word in the Job Activity log. To cancel an active job: 1. On the navigation bar, click Job Monitor. 2. Click the Job list or Calendar tab. 3. Select the active job from the Current Jobs pane or the Job Calendar, and then under Active Job Tasks in the task pane, click Cancel. Confirm the cancellation of the job. If the job is scheduled, it will run again at the next scheduled time.
418
Administrators Guide
Monitoring Jobs
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Cancel on more than one job at a time, as long as the jobs are of similar type. To place all scheduled occurrences of an active job on hold: 1. On the navigation bar, click Job Monitor. 2. Click the Job list or Calendar tab. 3. Select the active job from the Current Jobs pane or the Job Calendar, and then under General Tasks in the task pane, click Hold Schedule. The active job continues and all scheduled occurrences of the job are placed on hold. To remove the hold on future jobs, click Hold Schedule again. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want to select. This allows you to perform Hold Schedule on more than one job at a time, as long as the state of the jobs are the same. Related Topics: Viewing and Changing Completed Jobs on page 427 Scheduled Job Statuses on page 421
Cancel Pending
Loading Media
419
Monitoring Jobs Active Job Statuses Item Pre-processing Description This status can indicate any or all of the following:
Backup Exec is calculating the amount of data that will be backed up, if the Display progress indicators for backup jobs option is enabled. To view this option, from the Tools menu, click Options, and then under Settings in the task pane, click Preferences. Backup Exec is waiting for a pre- or post-command to complete. Backup Exec is retrieving the set maps and is positioning the tape to the append point location for an append job.
Snapshot processing
Backup Exec is processing a snapshot operation for the Advanced Open File Option (AOFO) or the Advanced Disk-based Option (ADBO). The device that the job was sent to is paused. For more information, see Pausing, Resuming, and Renaming Devices on page 130 The media server is paused. For more information, see Pausing, Resuming, and Renaming Devices on page 130 The Backup Exec services have become unresponsive. For more information, see Setting Thresholds to Recover Jobs on page 445. The Backup Exec services continued to be unresponsive past the threshold for being stalled, and the job has been recovered by Backup Exec. Any error-handling rules that are enabled for the error that caused the job to be recovered will apply. For more information, see Custom Error-handling Rule for Recovered Jobs on page 443.
Device Paused
Server Paused
Stalled
Recovered
Related Topics: Scheduled Job Statuses on page 421 Completed Job Statuses on page 433
420
Administrators Guide
Monitoring Jobs
The Jobs list view displays a single occurrence of a scheduled job in the Current Jobs pane. The Calendar view can display a single occurrence or all occurrences of a scheduled job depending on the View Filters selected. If you select the Calendar view and the job is not displayed, click the arrow that appears above the listed jobs to display all the jobs for the selected day. You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job, and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want to select. This allows you to perform tasks such as Test Run or Delete on more than one job at a time, as long as the jobs are of similar type. Related Topics: Running a Scheduled Job Immediately on page 423 Placing a Scheduled Job on Hold on page 424 Changing the Priority for a Scheduled Job on page 425 Running a Test Job for a Scheduled Job on page 426 Deleting Scheduled Jobs on page 426
Blocked by template rule The scheduled job cannot run because it was created by a policy that contains a job template with the template rule <First Template> must complete at least once before any other templates will be allowed to start. The job designated as <First Template> in the policy must run before this scheduled job can run. For more information, see Setting Template Rules on page 373. Invalid Schedule The scheduled job will not run because:
An associated record in the database is missing, or The availability window and the schedule for the selection list being backed up by this job do not have a time in common. For more information, see Setting Priority and Availability Windows for Selection Lists on page 301.
421
Monitoring Jobs Scheduled Job Statuses (continued) Scheduled Job Status Not in Time Window Description The job was ready to be sent for processing, but the time window for the job closed. This probably occurred because appropriate destination devices were not available during the common time between the jobs time window and the selection lists availability window. For more information, see Setting Priority and Availability Windows for Selection Lists on page 301. On Hold Queued The job has been placed on hold. A temporary state that displays when Backup Exec is applying an error-handling rule that is enabled to retry the job. For more information, see Custom Error-handling Rule for Recovered Jobs on page 443. The job is ready to run, but cannot for the reason displayed:
Ready
Internal error. No devices are available, but the cause is unknown. Invalid job. The job type in unknown; there may be an internal error or the database is corrupted. Invalid target. This is a device type that no longer exists. Media server not available. No devices are available. No license for x. A license must be purchased and installed on the targeted media server. No media servers are available. No media servers available in media server pool. Specified destination cascaded drive pool is empty. Specified destination device pool is empty. Specified destination device is not in media server pool. Specified destination device not on local media server. Specified destination device pool on local media server is empty. The destination device cannot be a cascaded drive pool. The destination device cannot be a device pool. The destination device cannot be a media server. There is another job running in the system that is blocking. execution of this job. This job will run after the other job completes.
422
Administrators Guide
Monitoring Jobs Scheduled Job Statuses (continued) Scheduled Job Status Recovered Description The Backup Exec services continued to be unresponsive past the threshold for being stalled, and the job has been recovered by Backup Exec. Any error-handling rules that are enabled for the error that caused the job to be recovered will apply. For more information, see Custom Error-handling Rule for Recovered Jobs on page 443. This status may also refer to a media server in a cluster that was shut down while a job was active. If the job did not have the Checkpoint restart option enabled, an error-handling rule was applied, and the job was scheduled to restart immediately. See Cluster Failover Error-Handling Rule on page 444. Scheduled The job is scheduled to run in the future. Scheduled jobs that are linked to another job, such as a job to duplicate backup sets, will not display a scheduled job status. The job is ready, but the Backup Exec media server has been paused. No jobs are dispatched while the media server is paused. See Pausing, Resuming, and Renaming Devices on page 130. The scheduled job cannot run because it was created by a policy that contains a job template with the template rule If start times conflict, <First Template> supersedes <Second Template>. The <Second Template> job will run according to the schedule set for it, after the <First Template> job completes. For more information, see Setting Template Rules on page 373. A state the scheduled job transitions through as it is being sent for processing.
Server Paused
Superseded by job x
To Be Scheduled
Related Topics: Active Job Statuses on page 419 Completed Job Statuses on page 433
Monitoring Jobs
3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then under Scheduled Job Tasks in the task pane, click Run now. The scheduled job is submitted to the job queue for processing. Related Topics: Changing the Priority for a Scheduled Job on page 425 Running a Test Job for a Scheduled Job on page 426 Deleting Scheduled Jobs on page 426
424
Administrators Guide
Monitoring Jobs
3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then under Scheduled Job Tasks in the task pane, click Increase priority or Decrease priority. The priority is increased or decreased. To change the priority for a scheduled job from the Job Setup view: 1. On the navigation bar, click Job Setup. 2. Select the job from the Jobs pane, and then under General Tasks in the task pane, click Increase Priority or Decrease Priority. The priority is increased or decreased.
425
Monitoring Jobs
426
Administrators Guide
Monitoring Jobs
To delete a scheduled job: 1. On the navigation bar, click Job Monitor. 2. Click the Job list or Calendar tab. 3. Right-click the scheduled job in the Current Jobs pane or the Job Calendar, and then click Delete. 4. Confirm the deletion of the scheduled job. Deleting this job deletes this occurrence and all other occurrences of this job. To delete only the occurrences for a specific date, click Cancel on the warning message. On the navigation bar, click Job Setup and then right-click the job. Click Properties, and then under Frequency on the Properties pane, click Schedule. Click Run according to schedule, click Edit Schedule Details, and then exclude that date. 5. After clicking Delete, you are prompted to delete backup selection lists that are no longer in use by any other jobs. Click Yes to delete all of the unused backup selection lists, or click No to leave the backup selection lists intact. To delete selection lists later, on the Edit menu, click Delete Selection Lists. Related Topics: Deleting a Job Created from a Policy on page 380
427
Monitoring Jobs
To view completed job properties: 1. On the navigation bar, click Job Monitor. 2. Click the Job list or Calendar tab. 3. Select the completed job you want to view from the Job History pane or the Job Calendar, and then under General Tasks in the task pane, click Properties. The Job History dialog box appears. Click Expand All to view all the information contained in the topics. Click Collapse All to hide the information in the topics. The Job History tab provides the following job summary and set detail information:
Job History Item Previous Description Click this to display the job history of the previous job that was run as part of this recurring job. Click this to display the job history of the next job that was run as part of this recurring job. Job name entered during job configuration. Type of operation that was performed (Archive, Backup, Catalog, Restore, Verify). Status of the operation. File name and location of the job log. Media server that processed the job. Selection list processed in the job. Name of the device that processed the job. Name of the device selected during job configuration. Name of the media set that processed the job.
Next
Job status Job log Server name Selection list name Device Name Target name Media set name
Job Summary Information Original start time Time the job was submitted for processing.
428
Administrators Guide
Monitoring Jobs Job History (continued) Item Job started Job ended Elapsed time Files Directories Skipped Files Corrupt files Files in use Byte count Rate Final disposition Set Detail Information Set type Type of operation that was performed on the media set (Archive, Backup, Catalog, Restore, Verify). Status of the operation. Job name entered during job configuration. Name of the resource for the job. Name of the logon account that was used for the job. Description Time the operation started. The time the operation ended. Length of time the operation took. Total number of files processed. Total number of directories processed. Number of files skipped during the operation. Number of corrupt files encountered during the operation. Number of open files encountered during the operation. Number of bytes processed. Number of megabytes processed per minute. The final status of the job.
429
Monitoring Jobs Job History (continued) Item Error Description If an error occurred, the error code is displayed. Click the Job Log. To locate where the error occurred in the Backup Set Detail Information, click the error text. Then, if additional information on an error is available, click the Unique Message Identifier in the blue hyperlink to go to the Symantec Software Support Services web site. See Unique Message Identifier (UMI) Error Codes In Job Logs on page 432 for more information. After you click OK and exit the log, right-click the job in the Job History pane, and then click Error-Handling. The Error-Handling Rule Settings dialog box is displayed. Using this dialog box, you can enable retry options and final job disposition for jobs when this error occurs. See Error-Handling Rules on page 439 for more information. Agent used Advanced Open File Option used Image used Indicates if the Backup Exec agent was used during the operation. Indicates if the Advanced Open File Option was used during the operation. Indicates if the Backup Exec ServerFree Option was used during the operation. Time the operation started. Length of time the operation took.
4. Click Job Log to view detailed information about the job. The job log is in an HTML format. Click Expand All to view all the information in the topics or Collapse All to hide the information in the topics. The Job Log tab provides the following information, depending on the type of operation:
Job Log Item Job Information Description Displays the job server, job name, the date and time the job started, the type of job, and the job log name. Displays the drive name, media label, the overwrite protection and append periods, and the media set that this job was targeted to. Administrators Guide
Monitoring Jobs Job Log (continued) Item Utility Job Information Description Displays information about the slot, bar code, media label, status, and device that the utility job was processed on. For more information, see Creating Utility Jobs on page 192. Displays the job end time, completion status, error codes, error description, and error category. The job completion section is green, orange, or red, depending on the job status (for more detail, see Completed Job Statuses on page 433). Displays a detailed description of the errors encountered during job processing. The errors are grouped by set and labeled. The label includes the operation and destination resource name for that set. The error section is red in the job log. To locate where the error occurred in the Backup Set Detail Information, click the error text. Then, if additional information on an error is available, click the underlined error code number to go to the Symantec Software Support Services web site. Exceptions Displays a detailed description of the minor errors encountered during job processing. The exceptions section is orange in the job log.
Errors
5. Click Save As to save the job history or job log under a different name or in a different location. 6. Click Print if you want to print the job history or job log; however, you must have a printer attached to your system and configured in order to print the report. 7. Click Find to search for a word in the job history. 8. Click OK to close the log. Related Topics: Completed Job Statuses on page 433 Configuring Default Job Log Options on page 435
431
Monitoring Jobs
432
Administrators Guide
Monitoring Jobs
433
Monitoring Jobs Job Completion Status Status Failed over Description The job ran in a cluster environment and was active on one computer, and then the cluster performed a failover and the job was restarted on another computer in the cluster. There are two separate sets of job history when a job is failed over. The first job history will have the Failed over status and the second job history will have the status that is appropriate for the completed job. The status is the same as the failed over status, however the Apply CheckPoint Restart option was selected. The administrator terminated the operation as it was running. The Enable automatic cancellation feature in the Frequency Schedule property was enabled and the job was not completed within the specified timeframe. See Scheduling Jobs on page 398. The operation took place, but one or more significant errors occurred. The job log should indicate what caused the errors so that you can decide if you want to run the job again. For example, if a job failure occurred due to a lost connection during job processing, you could choose to resubmit the job when the connection is restored. If a drive loses power during a backup operation, you should restart the backup job using a different tape. You can restore the data written to the tape up to the point of the power loss, but you should not reuse the tape for subsequent backup operations. A failed job will have an error message in the Errors section of the job log with a navigable link to the Symantec Software Support Services web site. See Unique Message Identifier (UMI) Error Codes In Job Logs on page 432. Some reasons a job may fail are:
Resumed
Failed
Devices specified by the job were not available when the job was run. The logon account information used in the backup job is incorrect. Verify the logon account information is valid for the resource being backed up. There was a problem with the storage device when the job was run. The computer being backed up was shut down before or during the backup job.
434
Administrators Guide
Monitoring Jobs
Information to include in log Summary information only Select this option to include the:
Job name Job type Job log name Media server name Storage device Starting date and time Errors encountered Ending date and time Completion statistics
This option also includes the name of files that were skipped, the media set name, the backup type and results of the verify operation if one was performed. Summary information and directories processed Summary information, directories, and files processed Select this option to include summary information and a list of all processed subdirectories.
Select this option to include Summary information, processed subdirectories, and a list of all the filenames that were processed.
435
Monitoring Jobs Job Log default options (continued) Item Summary information, directories, files and file details Prefix for the job log file name Description Select this option to include Summary information, processed subdirectories, a list of all the filenames and their attributes. Selecting this option increases the job log sizes significantly. Enter a prefix to prepend to the job logs that are processed. The default prefix is BEX. The job log file name consists of Prefix_ServerName_Count, where Prefix is the label that you enter in this field, ServerName is the name of the media server that ran the job, and Count is the number of job logs that this job has produced. E-mail job log attachments Attach job logs as html Click this to attach the job logs in an html format when an email notification is sent. Click this to attach the job logs in a text format when an email notification is sent.
Related Topics: Backup Exec Defaults on page 119 Viewing and Changing Completed Jobs on page 427
436
Administrators Guide
bemcmd -o31 -f"C:\program files\VERITAS\Backup Exec\NT\Data\bex00001.xml" > bex00001.txt or bemcmd -o31 -l"bex00001.txt" -f"C:\program files\VERITAS\Backup Exec\NT\Data\bex00001.xml"
Audit logs Logon accounts Selection lists Devices and media Error-handling rules Jobs Policies and job templates Alerts Server configuration
You can delete the audit logs as part of the Backup Exec database maintenance, and you can save the audit log to a file. Changes made to the audit log, such as when database maintenance occurs, can also be displayed in the audit log. To view the audit log: 1. On the Tools menu, click Audit Log. The Audit Logs dialog box appears.
437
Select category to view Click the drop-down arrow to view all of the items for which you can view and configure audit logging. Select All to display changes for all Backup Exec items, or select another category for which to display changes. Audit log Date/Time The date and time that this change was made in Backup Exec. Click the column head to sort the information by date. The domain and user name of the user that made the change. Click the column head to sort the information alphabetically. The item or items that you have selected for audit logging. Click the column head to sort the information alphabetically. The action that was recorded by Backup Exec for the operation that was performed. Click the column head to sort the information alphabetically.
User Name
Category
Message
2. Use the scroll bar at the bottom of the Audit log window to view the whole entry, or double-click the entry to display the same information in an easy-to-read Audit Log Record. 3. Do any of the following:
Click Refresh to update the audit log with new entries. Click Clear Log to remove all entries from the audit log. Click Save Log to File to specify a file name and location to save the audit log entries. Click Properties to display information about the entry. Click Configure Logging to select the types of items and the types of changes made to the items that you want to display in the audit log. See Configuring the Audit Log on page 439.
Related Topics: Configuring Database Maintenance on page 447. Configuring the Audit Log on page 439
438 Administrators Guide
Error-Handling Rules
Error-Handling Rules
You can enable default rules or create custom rules to set retry options and final job disposition for failed or canceled jobs. Retry options let you specify how often to retry a job if it fails and the time to wait between retry attempts. The final job disposition lets you either place the job on hold until you can fix the error, or cancel the job and reschedule it. To apply an error-handling rule for a group of similar errors, or error categories, you can enable a default error-handling rule. Each default error-handling rule applies to one category of errors, such as Network Errors or Security Errors. Default error-handling rules are disabled by default, so you must edit a rule and enable it before the retry options and job disposition settings will apply to jobs that fail with errors in the selected category. You cannot delete default error-handling rules, or add specific error codes to a category, or add new error categories. Before the error-handling rules will apply, the final error code must be in an error category that is associated with a rule, and the rule must be enabled. To apply an error-handling rule for a specific error code that is in an error category, you can create a custom error-handling rule. You can select up to 28 error codes in an error category that a custom error-handling rule can apply to. You can also add an error code to an existing custom rule.
439
Error-Handling Rules
One custom error-handling rule, named Recovered Jobs, is created when Backup Exec is installed and is enabled by default. This rule applies retry options and a final job disposition to jobs that fail and that are not scheduled to run again. See Custom Error-handling Rule for Recovered Jobs on page 443. If both a custom error-handling rule and a default error-handling rule apply to a failed job, the settings in the custom rule are applied to the job. Note If the server on which Backup Exec is installed is in a cluster environment, the Cluster Failover error-handling rule is displayed on the list of error-handling rules. This rule is enabled by default. See Cluster Failover Error-Handling Rule on page 444. To create a custom error-handling rule or to edit error-handling rules: 1. Do one of the following:
On the Tools menu, click Error-Handling Rules. Right-click a failed or canceled job in the Job History pane in the Job Monitor view. Click Properties, and then click Error-Handling. Go to step 4 on page 441.
The Error-Handling Rules dialog box appears. 2. Select the appropriate options as described in the following:
Error Handling Rules dialog box options Item Name Type Description The name of the error-handling rule.
Default: Predefined default error-handling rules for a category of errors. You cannot delete default rules and you cannot modify default rules to include specific error codes in a category. Custom: Error-handling rules that you can create for a specific error code or codes in an error category.
If both a custom error-handling rule and a default error-handling rule apply to a failed job, the settings in the custom rule are applied to the job. Job Status The status of the job that will activate this rule. Statuses are:
440
Error-Handling Rules Error Handling Rules dialog box options Item Error Category Enabled Description The category of error codes that this rule applies to.
Yes: This rule is enabled. Retry options and final job disposition will be applied to jobs that failed with the error codes selected for this rule. No: This rule is disabled.
To create a new, custom error-handling rule for a specific job error, click New. Continue with step 4. To delete a custom error-handling rule, select the rule, and then click Delete. To update a default or custom error-handling rule, select a rule, and then click Edit. Continue with step 4.
4. Complete the items in the Error-Handling Rule Settings dialog box as follows, and then click OK:
Error-Handling Rule Settings Item Name Description Enter a new name or change the name for the error-handling rule. To add or update a custom error-handling rule, you must enter a rule name. The status for the job that will activate the rule. The job status can be viewed, but not modified. Statuses are:
441
Error-Handling Rules Error-Handling Rule Settings (continued) Item Error Category Description The category of error for which the rule will be applied. If you are editing a default or custom error-handling rule, the error category can be viewed, but not modified. If you are creating a custom error-handling rule, you must select an error category that contains the errors to apply this rule to. Available error categories include:
Other Network Server Resource Security Backup Device Backup Media Job System Dispatch
Enabled
Select this check box to enable the error-handling rule, or clear the check box to disable the rule. This check box must be selected before you can set the retry options and the final job disposition options. Error codes that are not associated with a custom error-handling rule. This field will not be displayed if you are editing a default error-handling rule. If you are creating or editing a custom error-handling rule, you must select the check box of the error code that you want this rule to apply to. You can select up to 28 error codes. To change the list of available errors, select a different error category.
Available errors
Retry Options Retry job Maximum retries Select this check box to allow Backup Exec to retry the job. Enter the number of times you want the job retried. The maximum number of times the job can be retried is 99. Enter the number of minutes to wait before the job is retried. The maximum number of minutes is 1440. Administrators Guide
Retry interval
442
Error-Handling Rules Error-Handling Rule Settings (continued) Item Final job disposition Place job on hold until error condition has been manually cleared Cancel job and reschedule for its next scheduled service Notes Select this option to place the job on hold until you can manually clear the error. After you clear the error, you must remove the hold for the job. Select this option to cancel the current job after the selected number of retry options has been met. After the job is canceled, it will run at the next scheduled time. Enter any miscellaneous information for the error-handling rule. Description
Related Topics: Error-Handling Rules on page 439 Custom Error-handling Rule for Recovered Jobs on page 443 Cluster Failover Error-Handling Rule on page 444
443
Error-Handling Rules Error codes for Recovered Jobs custom error-handling rule Error code 0xE0008820 E_JOB_LOCAL RECOVERNORMAL 0xE000881F E_JOB_REMOTE RECOVERNORMAL 0xE0008821 E_JOB_STARTUP RECOVERY Description The displayed error message is: The local job has been recovered. is required. The displayed error message is: The remote job has been recovered. is required. The displayed error message is: Job was recovered as a result of Backup Exec RPC service starting. No user action is required. No user action No user action
Note If the Central Admin Server Option is installed, additional error codes are selected. See CASO Error Codes and the Recovered Jobs Custom Error-Handling Rule on page 872. Related Topics: Error-Handling Rules on page 439 Cluster Failover Error-Handling Rule on page 444
444
Administrators Guide
445
Setting Thresholds to Recover Jobs Thresholds for recovering jobs Item Recovered Description Enter the number of seconds before jobs are failed and then recovered by Backup Exec. A custom error-handling rule named Recovered Jobs is applied to recovered jobs. If this rule is disabled, then any other error-handling rules that have been enabled will apply to the recovered jobs. If there are no error-handling rules that apply to the job, then the job fails.
446
Administrators Guide
Optimize database size Delete expired data Save the contents of the database files Perform a database consistency check
You do not have to select all the options; however, each one performs a different process that enables you to protect and maintain your database. Selecting all the options enables you to recover the database quickly and maintain optimal performance. Informational alerts are generated at the beginning and the end of the database maintenance process each time database maintenance is performed. The alerts provide details about the type of maintenance that was performed on each database and the amount of time the maintenance took to complete. If the database maintenance process fails, the alert indicates where the failure occurred and the reason for the failure. To configure database maintenance: 1. On the Tools menu, click Options. 2. On the Properties pane, under Settings, click Database Maintenance. 3. Select the appropriate options as follows, and then click OK:
Database Maintenance options Item Enable Backup Exec database maintenance Last time maintenance was performed Perform database maintenance at Descriptions Select this check box to activate the database maintenance process. The date and time the last database maintenance was performed.
Enter the time you want to perform database maintenance. All the maintenance will occur once a day at the time you specify.
447
Configuring Database Maintenance Database Maintenance options (continued) Item Delete expired data Delete expired data Select this check box to activate the deletion of expired job history, job logs, alert history, and reports from the Backup Exec database after the specified number of days have passed. Note For the Desktop and Laptop Option (DLO) database, only the Alert History setting applies. DLO does not have job history, job logs, or reports. Number of days to keep data before deleting it from the Backup Exec database Job history Enter the number of days to keep job history data in the database before it is deleted. Job history data includes summary statistics for a job and details about media, devices and backup sets used to process the job. Enter the number of days to keep job logs in the database before they are deleted. Job logs includes detailed information about the job. Enter the number of days to keep alert history data in the database before it is deleted. Alert history data includes property and response information for the alert. Enter the number of days to keep report data in the database before it is deleted. Report data includes property information about report jobs that were generated. The report itself is not deleted. Enter the number of days to keep audit log data in the database before it is deleted. Audit logs include information that you have selected about operations that are performed in Backup Exec. See Using Audit Logs to Review Activity Performed in Backup Exec on page 437. Select this check box to check the logical and physical consistency of the data in the database. Note The option is not enabled by default, but it is recommended that you run a consistency check periodically at a time when there is minimal activity from Backup Exec. Descriptions
Job logs
Alert history
Reports
Audit logs
448
Administrators Guide
Optimize database size Select this check box to reorganize fragmented pages and decrease the size of the physical database to 10 percent above what is actually used. Save contents of Select this check box to dump the data contained in the database database to the Backup into the Backup Exec data directory so that the database backup Exec data directory file (BEDB.bak) can be backed up. The dump file will be maintained in the data directory until the next database maintenance process is performed and then this file will be overwritten. Selecting this option enables you to recover the database in the event of failure. For more information, see Recover a Media Server Database on page 760.
449
450
Administrators Guide
Chapter
Restoring Data
The restore operation enables you to retrieve information from storage media, including media created with backup software other than Backup Exec, and restore it to any server or remote workstation. In most cases, you will need to restore only one file, but there may be times when directories, groups of files, or an entire system will need to be restored. Backup Exec offers several methods for finding the files you need to restore:
Resource view. The resource view lists backed up data by the resource from which it was backed up. This feature is useful for finding files that were located on a certain server or workstation. Media view. The media view lists the data that is contained on a piece of media. This feature is useful for viewing the contents of a tape that was backed up from another media server. Advanced file selection. The Advanced File Selection feature enables you to specify file and date attributes for the data you want to restore. Search catalogs. The Search Catalogs feature makes it easy to find files that you want to restore, or to make sure that you have backups of certain files. This feature also enables you to see all cataloged, backed up versions of a file, so you can restore earlier versions if needed.
You can select options that you want to use for most restore operations. Backup Exec will use the default options unless you override them when setting up a specific restore job. When creating your restore jobs, you can:
Restore data to the system from which it was originally backed up or redirect the restore to another system.
451
Specify if the restore job should begin processing immediately or schedule it to run at a future time. Specify which local network is to be used for restoring data, ensuring that other connected critical networks are not affected by this Backup Exec operation.
Related Topics: Using the Resource View on page 479 Using the Media View on page 479 Selecting Data to Restore on page 479 Using Advanced File Selection to Restore on page 482
452
Administrators Guide
To catalog media: 1. On the navigation bar, click Devices. 2. Select the device containing the media to be cataloged, and then select the media you want to catalog. 3. Under Media Tasks in the task pane, select New catalog. 4. Select the device options as follows:
Device options for catalog job Item Device Password Description Select the device on which this job will run. If this media is password protected and being cataloged by this system for the first time, enter the password. If this media is password protected and being cataloged by this system for the first time, re-enter the password.
Confirm Password
5. On the Properties pane, under Settings, click General. Select the options as follows:
General options for catalog job Item Job name Job priority Description Enter a name for the job or accept the default name. Select the priority level for this job. If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. Your choices are:
6. If you want a person or group to be notified when the job completes, on the Properties pane, under Settings, click Notification, and then select the options you want (see Selecting Recipients for Notification on page 534).
453
7. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). The catalog operation can be monitored or canceled through the Job Monitor. Related Topics: Using Backup-to-Disk Folders and Files on page 176 Monitoring Jobs on page 405 Setting Catalog Defaults on page 454 Selecting Data to Restore on page 479 Canceling a Restore Operation on page 495
454
Administrators Guide
Restore Operations and the Catalog Default catalog options (continued) Item Truncate catalogs after x days Description Select this option to retain only the header information and to remove all file and directory details after the specified number of days. This option reduces the size of the catalogs considerably. After the catalogs have been truncated, the files and directories cannot be restored unless the media is recataloged. The last access date is not reset when catalogs are truncated. Therefore, if you select to have catalogs truncated after 20 days and then select Remove unused catalogs after 30 days, the catalogs will be truncated on the 20th day. On the 30th day, unless the catalogs have been accessed, they will be removed. Remove unused catalogs after x days This enables Backup Exec to automatically delete disk-stored catalogs that have not been accessed in the specified number of days. Enabling this feature can help manage disk space used by catalogs; however, after removing catalog information for media, the media must then be re-cataloged before data can be selected from it for a restore operation. The access date for disk-stored catalogs is updated each time data is restored from, or appended to the media. Truncating and removing the catalogs is performed according to the last accessed date and time, not the created date and time. Check the catalogs last accessed date. Current path The path where the catalog files are located. This path defaults to \Backup Exec\NT\Catalogs. Select a volume where the catalog files are located. This is useful if you have limited disk space on your media server. Specify a path on the volume for the catalog files. If the path you provide does not exist, you will be prompted to create the path.
Catalog drive
Catalog path
4. Click OK. Related Topics: Restore Operations and the Catalog on page 452 Catalog Levels on page 456
455
Catalog Levels
The amount of information that can be viewed through the catalog for media is determined by the medias catalog level. Backup Exec fully catalogs each backup; however, there may be instances where media does not appear as fully cataloged in the Restore Job Properties dialog box. The following are possible catalog levels within the Backup Exec system as shown in the Media view and within Restore selections:
Media catalog levels Item Fully Cataloged Media Description With fully-cataloged media, you can:
View information on all the directories and files contained in each backup set. Search for files to restore. Use the file versioning feature.
Truncated Cataloged Media Truncated cataloged media lists only backup set information. No files or file attributes can be viewed. This version of Backup Exec writes only full catalogs. However, truncated cataloged media that was migrated from earlier versions of Backup Exec, but not cataloged by this version, will appear as truncated cataloged media. Truncated cataloged media will not allow you to make restore selections. You must catalog the media to view and select files to restore. Uncataloged Media There is no catalog information for the media. You must catalog the media to view and select files to restore.
Related Topics: Setting Catalog Defaults on page 454 Restore Operations and the Catalog on page 452
456
Administrators Guide
Unless you specify otherwise, the restore job will use the default options set through the Tools menu. You can use the Restore Wizard to have Backup Exec guide you through the creation of a restore job, but after you become familiar with Backup Exec, you can set your options by configuring restore job properties. Related Topics: Setting Restore Defaults on page 490
457
If you want to redirect this job to another system other than the one from which the data was backed up, on the Properties pane, under Destination, click one of the following (see Redirecting a Restore Operation on page 487):
File Redirection. Select this option to redirect file sets. Microsoft SQL Redirection. Select this option to redirect SQL Server sets to another SQL server. Microsoft Exchange Redirection. Select this option to redirect Exchange sets to another Exchange server. Microsoft Sharepoint Redirection. Select this option to redirect Sharepoint Portal Server sets to another Sharepoint server.
If you want to set advanced options for the restore job, on the Properties pane, under Settings, click Advanced. Complete the options as described in Advanced Options for Restore Jobs on page 464. If you want to set commands to run before or after the job, on the Properties pane, under Settings, click Pre/Post Commands and complete the options as described in Pre/Post Commands for Restore Jobs on page 467.
458
Administrators Guide
If you are restoring other platform types or database agents, such as SQL, Exchange, or NetWare, select the platform type from the Properties pane, under Settings, and then refer to the chapter or appendix for that item for instructions on completing the options. If you want to specify a local network to be used for this restore job, on the Properties pane, click Network, and then enter the network information (see Specifying the Restore Network on page 493). If you want Backup Exec to notify recipients when this job completes, on the Properties pane, under Settings, click Notification, and then select each recipient to be notified when the job completes (see Configuring E-mail and Pager Notification Methods on page 514).
Depending on how the default settings for your software are configured, some of the options may or may not already be selected. You can override the default options by selecting or clearing items in these dialog boxes. 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). To monitor the job while it is processing, click Job Monitor, and ensure Show active jobs is selected under Current Job View Filters. You can review results of the restore job in the jobs log. Caution When restoring System State, you must reboot your system before performing subsequent restore operations. Note Depending on your file system environment, byte counts for restored data may not match the byte count recorded when the data was backed up. This is normal and does not mean that files were excluded in the restore operation. For more information, see Restore Questions on page 626. Related Topics: Selecting Data to Restore on page 479 Symantec Backup Exec - Remote Agent for Windows Servers on page 789 Redirecting a Restore Operation on page 487 Redirecting Restores for SQL on page 1049 Restoring Exchange Data on page 1089 Restore Options for Exchange on page 1086 Restoring NetWare Servers on page 1400
459
Restore Options for Lotus Domino Databases on page 1340 Viewing and Changing Completed Jobs on page 427 Restoring File Permissions on page 471
Select this option to display backed up data by the resource from which it was backed up. This feature is useful for finding files that were located on a certain server or workstation. Select this option to display the data that is contained on a piece of media. This feature is useful for viewing the contents of a tape that was backed up from another media server.
Media
Preview pane
Select this check box to display the preview pane at the bottom of the dialog box, or clear this check box to remove the preview pane.
View Format Graphical Select this option to view selections in a directory tree view.
460
Administrators Guide
Restoring Data to a Server or Workstation Selections options for restore job (continued) Item Show file details Description Select this option to display details about the files available for selecting. Select this option to view selections as a list of files and directories. Click this button if you want to use the Advanced File Selection for selecting files for restoring (see Using Advanced File Selection to Restore on page 482). Select this option if you want to select the contents of all the subfolders when a directory is selected.
Text Advanced
Include subdirectories
461
Job priority
Restoring existing files Restore over existing files Select this option to have Backup Exec overwrite files on the target resource that have the same name as files that are being restored. Use this option only when you are sure that you want to restore an older version of a file. Select this option to prevent Backup Exec from overwriting files on the target disk with files that have the same names that are included in the restore operation. Select this option to prevent Backup Exec from restoring over files that exist on the target resource if they are more recent than the files included in the restore operation. This option is useful if you are rebuilding a system. For example, after installing the operating system on a crashed computer, you could restore a previous full backup of the system without worrying about overwriting later versions of operating system files.
462
Administrators Guide
Restoring Data to a Server or Workstation General settings options for restore job (continued) Item Restore corrupt files Description Select this option only if you do not want to have Backup Exec automatically exclude corrupt files from the restore process. This option is only recommended if a job has failed because a catalog query could not determine the corrupt files on the tape. Normally, when a restore job is run, Backup Exec queries the catalog to determine if any corrupt files are on the tape and excludes them from the restore job. If, during the query process, Backup Exec cannot determine if a file is corrupt, the Restore job will not continue and will be marked as Failed. If a corrupt file cannot be excluded automatically, you can manually exclude corrupt files in the Restore selections window and run the job with the Restore Corrupt File option enabled. Restore security Select this check box to restore file-level security information on NTFS partitions, if it exists in the data you selected. Select this check box to restore the data with its original directory structure intact. This option is enabled by default. If you clear this option, all data (including the data in subdirectories) is restored to the path you specify in the Redirection dialog box. Clearing the Preserve Tree option is useful when restoring several subdirectories or individual files from media, but it should not be cleared when restoring an entire drive.
Preserve tree
Related Topics: Creating a Manual Restore Job by Configuring Job Properties on page 458
463
Restore Removable Storage Select this check box to restore the Removable Storage data. The data Removable Storage database is stored in the Systemroot\System32\Ntsmsdata directory and is automatically backed up when the system directory is selected for backup. Removable Storage is a service used to manage removable media and storage devices; it enables applications to access and share the same media resources. Restore disk quota data Select this check box to restore disk quota data. Disk quota data is automatically backed up when the root directory of a volume is selected for backup. Disk quotas track and control disk usage on a per user, per volume basis; the values can be restored to the limits that were set before the backup. Restore Terminal Services database Select this check box to restore the Terminal Services database. The default location for the Terminal Services database, which contains licensing data for client licenses, is the Systemroot\System32\LServer directory and is automatically backed up when the system directory is selected for backup. Terminal Services allow client applications to be run on a server so that client computers can function as terminals rather than independent systems. Restore Windows Select this check box to restore the Windows Management Management Instrumentation (WMI) repository. The WMI repository is stored in Instrumentation repository the Systemroot\System32\wbem\Repository directory and is automatically backed up when the system directory is selected for backup. The Windows Management Instrumentation repository provides support for monitoring and controlling system resources and provides a consistent view of your managed environment. Restore Cluster Quorum Select this check box to restore the cluster configuration. For more information about restoring clusters, see Restoring Data to a Microsoft Cluster on page 684.
464
Administrators Guide
Restoring Data to a Server or Workstation Advanced options for restore (continued) Item Force the recovery of the cluster quorum even if other nodes are online and/or disk signatures do not match. Description Select this check box to restore the cluster configuration if you are not able to take the other nodes in the cluster offline or if the disk that the cluster quorum previously resided on has been changed. This option is only available if Restore Cluster Quorum is also selected. If this option is selected, the cluster service for any nodes that are online is stopped. This option also enables the drive letter of the disk that the cluster quorum was on to remain the same, even if the configuration has changed and the disk signatures contained in the restore media do not match the disk signatures contained in the cluster quorum. Any changes made to the cluster quorum after the last backup will be lost.
Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State.
Select this check box to designate this server as the primary replicator for all members in the set when restoring FRS-managed folders or SYSVOL as part of System State. If all members of a replication set are to be restored, then stop replication, restore all the member servers, and then when restoring the last member server, select this option to designate the server as the primary replicator. If this option is not selected, replication may not function. Note In this version of Backup Exec, all restores of SYSVOL and FRS-managed folders are non-authoritative. An authoritative restore can only be performed by redirecting the restore and then copying the files to the server. Refer to your Microsoft documentation for details on performing an authoritative restore.
Select this check box to restore registry information if it exists in the data you selected.
Merge the existing Select this option if you want to merge the existing hardware and hardware configuration and registry services with the data you selected to be restored. This registry services with the option should only be used for restoring System State. data to be restored Overwrite the existing hardware configuration and registry services with the data to be restored Select this option if you want to overwrite hardware configuration and registry services with the data you selected to be restored. This option should only be used for restoring System State and there have been no hardware changes.
465
Restoring Data to a Server or Workstation Advanced options for restore (continued) Item Junction Points Restore junction points, directories, and files from backup media Select this option to restore the information for the junction points and the files and directories to which they are linked. Selecting this option overwrites existing junction points on your system. Note If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see Back up files and directories by following junction points on page 328), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter. Preserve existing junction points and restore files and directories from backup media Select this option to restore files and directories backed up from junction point links while retaining the system's current junction points. This option keeps current junction points from being overwritten with the junction point information restored from the backup media. When this option is selected and identical junction points or directory names exist on both the target system and the media, the files and directories are restored to the target system's junction point or directory. If a junction point or directory does not already exist in the same location and with the same name as the junction point to be restored, then the information for the junction point and the files and directories to which they point will be restored. Note If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see Back up files and directories by following junction points on page 328), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter. Description
Related Topics: Creating a Manual Restore Job by Configuring Job Properties on page 458
466
Administrators Guide
Run the job only if the pre-job command is successful Run the post-job command only if the pre-job command is successful Run the post-job command even if the job fails Allow Backup Exec to check the return codes (or exit codes) of the pre- and post-job commands to determine if the commands completed successfully. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the command completed successfully. A non-zero exit code is interpreted by Backup Exec to mean the command ended with an error.
If it is critical that the job not run if the pre-job command fails, then configure Backup Exec to check the return codes of the pre- and post-job commands to determine if the pre-job command failed or completed successfully. For example, if a pre-job command that shuts down a database before a restore is run fails, the database could be corrupted when the restore is run. In this situation, it is critical that the restore job fail if the pre-job command fails. Additionally, if Backup Exec is configured to check the return codes of the pre- and post-job commands, and the post-job command returns a non-zero code, the job log reports that the post-job command failed. If you also selected to run the job only if the pre-job command is successful, and both the pre-job command and the job ran successfully, Backup Exec will mark the job as failed if the post-job command fails. For example, if the pre-job command runs successfully and shuts down the database and the restore job also runs successfully, but the post-job command cannot restart the database, Backup Exec marks the job and the post-job command as failed. If you select the option On each server backed up, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.
467
Restoring Data to a Server or Workstation Pre/post commands options for restore job
To set up commands to run before or after a restore job" 1. On the Properties pane, under Settings, click Pre/Post Commands. 2. Select the following options as needed:
Pre/Post Commands for restore Item Pre-job command Description Specify a command to be run on the specified server before the restore job is run. Use local paths, and make sure the paths exist on each server and are correct. Note Commands that require user interaction, such as prompts, are not supported.
468
Administrators Guide
Restoring Data to a Server or Workstation Pre/Post Commands for restore (continued) Item Post-job command Description Specify a command to be run on the specified server after the restore job has run. Use local paths, and make sure the paths exist on each server and are correct. Note Commands that require user interaction, such as prompts, are not supported. Allow pre- and post-job commands to be successful only if completed with a return code of zero Select this option to allow Backup Exec to check the return codes of the pre- and post-job commands to determine if they completed successfully. An exit code of zero returned to the operating system by the pre- or post-job command is interpreted by Backup Exec to mean the command completed successfully. A non-zero exit code is interpreted by Backup Exec as the command ended with an error. After checking the return codes, Backup Exec continues processing according to selections you made for running the pre- and post-job commands. If this option is not selected, the success of the pre- and post-job commands is not determined based on the return code. Run job only if pre-job command is successful Select this option to run the restore job only if the pre-job command is successful. If the pre-job command fails, the job does not run, and is marked as failed. If it is critical that the job not run if the pre-job command fails, then select Allow pre- and post-job commands to be successful only if completed with a return code of zero. If a non-zero exit code is returned, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The job is not run and the job status is marked as Failed. Run post-job command only Select this option to run the post-job command only if the pre-job if pre-job command is command is successful. successful If it is critical that the post-job command fail if the pre-job command fails, then select Allow pre- and post job commands to be successful only if completed with a return code of zero. If a non-zero exit code is returned for the pre-job command, it is interpreted by Backup Exec to mean that the pre-job command did not run successfully. The post-job command is not run. If you also select Run job only if pre-job command is successful, and both the pre-job command and the job are successful, but the post-job command returns a non-zero code, the job log reports both the job and the post-job command as failed.
469
Restoring Data to a Server or Workstation Pre/Post Commands for restore (continued) Item Run post-job command even if job fails Description Select this option if it is critical to run the post-job command regardless if the job is successful or not. If you also select Allow pre- and post job commands to be successful only if completed with a return code of zero and the post-job command returns a non-zero code, the job log reports the post-job command as failed. Cancel command if not Select the number of minutes Backup Exec should wait before completed within x minutes canceling a pre-job or post-job command that did not complete. The default time-out is 30 minutes. Run these commands On this media server Select this option to run the pre- and post-job commands on this media server only. Select this option to run the pre- and post-job commands one time on each server backed up. The pre- and post-job command selections apply to each server independently. If you select this option, the pre- and post-commands are run and completed for each server before processing begins on the next selected server.
Related Topics: Creating a Manual Restore Job by Configuring Job Properties on page 458 Setting Default Pre/Post Commands on page 331
470
Administrators Guide
471
b. Click the Log On tab, click This account, enter a user account with local administrators rights, and then click OK. c. Right-click the service, and then click Start.
472
Administrators Guide
6. After the Backup Exec services have started, run Backup Exec and perform a restore of the System State. Set the following option on the Advanced screen: Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State. For more information, see Advanced Options for Restore Jobs on page 464. Caution When restoring System State, you must reboot your system before performing subsequent restore operations. If you have more than one domain controller in the network and you want Active Directory replicated to the other domain controllers, you must perform an authoritative restore of the Active Directory. To perform an authoritative restore of the Active Directory, you must run Microsofts Ntdsutil utility after the Backup Exec restore job completes and you have restored the System State data, but before you restart the server. An authoritative restore ensures that the restored data is replicated to all of the servers. For more information about authoritative restore and the Ntdsutil utility, see your Microsoft documentation. Related Topics: Creating a Manual Restore Job by Configuring Job Properties on page 458 Advanced options for restore on page 464
System State Writers. To restore System State Writers, see Restoring System State on page 472. Service State Writers. To restore Service State Writers, follow normal restore procedures. See Creating a Manual Restore Job by Configuring Job Properties on page 458.
The User Data Writer in Backup Exec is the Active Directory Application Mode Writer (AD/AM Writer).
473
When restoring data with the AD/AM Writer, Backup Exec stops the service for the AD/AM instance you want to restore before the restore job starts. However, Backup Exec does not restart the AD/AM service when the restore job completes because post-processing operations, such as authoritative restores using Adamutil.exe, may be needed. You must restart the AD/AM service. If Backup Exec cannot stop the AD/AM service or if Backup Exec cannot restore all of the AD/AM files, the AD/AM restore will fail. Related Topics: Protecting Windows Server 2003 Systems on page 344 Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media on page 488
Utility partitions, but not the data belonging to the partitions, must be present on the system. You must have Administrator rights to restore utility partitions. The system on which the utility partition data is being restored should be the same system from which the data was originally backed up, unless you are required to do a redirected restore (see Performing Redirected Restores of Utility Partitions on page 475). Utility partitions being restored must belong to the same vendor. For example, Dell utility partitions cannot be restored to a Compaq system. The size of the utility partition on which the data is being restored must be equal or greater in size than the utility partition that was backed up.
Related Topics: Restoring Data to a Server or Workstation on page 457 Selecting Data to Restore on page 479
474
Administrators Guide
Utility partitions, but not the data belonging to the partitions, must be present on the system. You must have Administrator rights to restore utility partitions. Utility partitions being restored must belong to the same vendor. For example, Dell utility partitions cannot be restored to a Compaq system. The size of the utility partition on which the data is being restored must be equal or greater in size than the utility partition that was backed up. The system on which the redirected restore is targeted must be the same make and model and have the same size utility partitions as the system from which the utility partition was backed up.
Related Topics: Redirecting a Restore Operation on page 487 Manual Disaster Recovery of Windows Computers on page 610
475
Microsoft Tape Format (MTF) SIDF BrightStor Enterprise Backup and ARCserve Formats Stac Image Option
Backup Exec also supports restoring NetWare SMS volume backups to non-SMS volumes. For example, data backed up with Backup Exec for NetWare Servers or Novells SBackup can be restored to the Windows media server or another network share. Media from the following products can be restored with Backup Exec:
Backup Exec for Windows NT 7.3 and later (MTF) Backup Exec for NetWare Servers 7.x, 8.x, and 9.x (MTF) Software-compressed media created with previous versions of Backup Exec, such as Backup Exec for Windows NT (5.x, 6.x and 7.x)
476
Administrators Guide
Seagate Backup Director (SIDF) Seagate Storage Exec (SIDF) BrightStor ARCserve for NetWare 4.x, 5.x and 6.x (Native and embedded SMS tape format. Cannot restore System State from tapes created by ARCserve for NetWare 6.x.) BrightStor ARCserve for Windows NT 6.x (cannot restore System State from tapes created from this product) BrightStor ARCserve Backup 9 for Windows BrightStor Enterprise Backup 10 for Windows Novell SBackup (SIDF) Palindrome Backup Director for Windows NT and NetWare (SIDF) Palindrome Storage Manager for Windows NT and NetWare (SIDF)
Note Software-compressed data backed up with products other than Backup Exec for Windows Servers cannot be restored.
System State (from tapes created by ARCserve 6.x for NetWare and ARCserve 6.x for Microsoft Windows Databases, such as Microsoft SQL and Exchange Server and NetWare Directory Services Windows registry Interleaved files Compressed files Encrypted files Long filenames and Extended Attributes for OS/2 files
477
Note Media containing ARCserve backups can be overwritten; however, backup append operations are not supported. All Backup Exec media utility functions can be performed on ARCserve media. To restore data from an ARCserve tape: Note If the ARCserve backup spans multiple tapes, you must have all the tapes that were included in the ARCserve backup available. Make sure you start both the catalog and restore operations with the first tape used in the ARCserve backup. 1. Inventory all the tapes included in the ARCserve backup. 2. Catalog all the tapes included in the ARCserve backup. During cataloging, Backup Exec reports file formats that it can read. Files that cannot be read do not appear in the catalogs. The media description that appears in the Backup Exec catalog comes from the session description used by ARCserve. Media-based catalogs are not supported on tapes created by other vendors backup products. Because of this, cataloging ARCserve tapes takes considerably longer than cataloging a tape made with Backup Exec. 3. Restore selected data to a server or workstation. Due to the naming conventions ARCserve uses for some systems, it may be necessary to select a different location for the data using Backup Execs File Redirection. For more information, see Redirecting a Restore Operation on page 487. Related Topics: Inventorying Media in Devices on page 193 Cataloging Media in a Drive on page 452 Creating a Manual Restore Job by Configuring Job Properties on page 458 Redirecting a Restore Operation on page 487 Restoring Media Created With Other Backup Software on page 476
478
Administrators Guide
To expand the view for a resource or piece of media, click the adjacent box that contains the plus sign (+). To collapse the view, click the minus sign (-). When the view is expanded, backup sets contained on the resource or media are displayed. You can expand the backup set to view the data included in the backup. The data that has been backed up from the resource appears in the right pane of the Restore
Chapter 9, Restoring Data 479
Job Properties - Selections dialog box. Remember that only media cataloged or backed up at this server are displayed in the views. If you want to restore data backed up at another installation of Backup Exec, you must catalog the media first. You can traverse file levels from either side of the window by clicking folders and subfolders as they appear. To select data, select the check box next to the drives, directory, or file you want to restore. If the Include Subdirectories option is selected on the Restore Job Properties dialog box, all files and directories at or below the selected directory level are included in the restore operation. The check box and check mark displayed vary depending on the items status.
Data Selections A slash in a shaded check box means that some items below the check box are selected, but the item itself cannot be selected. A slash in a check box means some items below the directory or drive level are selected. A check mark in a check box means all items at or below the directory or drive level are selected. A clear check box means the item can be selected.
Related Topics: Restore Operations and the Catalog on page 452 Cataloging Media in a Drive on page 452 Creating a Manual Restore Job by Configuring Job Properties on page 458
480
Administrators Guide
481
Include or exclude files by filename extensions. For example, you can select only files with *.txt extensions, or exclude files with *.exe extensions from a restore operation. Select only files that fall within a specified date range. For example, you can select files that were created or modified during the month of December.
To select files using Advanced File Selection: 1. On the navigation bar, click Restore. 2. Under View format, click Advanced. 3. Select the appropriate options as follows:
Advanced Restore Selections Item Media Specification Media File Specification Backup Set Path Select the backup set for which you want to specify attributes. Enter any available directory or subdirectory. Enter the full path to the subdirectory. Specify a filename to be included or excluded. The default for this field is *.*, which means every file name with every extension is selected. Wildcard characters are permitted. The asterisk (*) in a file name or extension is a wildcard character that represents all characters occupying any remaining position in the file name or extension. For example, to specify all files with the .exe extension, type *.exe The question mark symbol (?) wildcard for a single character is also supported ,as well as a double asterisk (**) to represent any number of characters, irrespective of any backslashes. Select the media that contains the files you want to restore. Description
File
482
Administrators Guide
Selecting Data to Restore Advanced Restore Selections (continued) Item Include Subdirectories Description When this option is selected, all subdirectories and their contents in the path you have entered are included in (or excluded from) the operation. If you want to process only the directory listed in the Path field, leave this option cleared.
Type Include Select this option to include the files in the operation. This is the default option. Select this option to exclude files from the operation.
Include or exclude the files created or modified during the specified time period.
4. If you expand the view for the resource from which you included (or excluded) files, you will see check marks in the directories that contain files meeting the criteria you specified. 5. Submit the operation using the same procedures required for other restore operations. Related Topics: Restoring Data to a Server or Workstation on page 457 Redirecting a Restore Operation on page 487
483
To search the catalog: 1. On the Edit menu, click Search Catalogs. The Search Catalog dialog box appears. The Catalog Search box contains two tabs: the Name and Location and the Date Modified. 2. Select which method you want to use for searching catalogs:
To search for a file by name and location, select the Name and Location tab and complete the options described inName and Location Options for Catalog Search on page 485. To search for files by date modified, select the Date Modified tab.
3. Click Find Now. Click Stop to halt the search, or New Search to search for another file. The Catalog Search results window appears. All of the backed up versions of the file appear in the Catalog Search window. Double-click the file to view the files properties. To sort the listings by filename, size, type or date modified, click the appropriate column heading. 4. Check the version of the file you want to restore and click Restore from the toolbar. The Restore Job window opens. 5. Submit the job using the same procedures required for other restore jobs. Backup Exec will prompt you to insert the correct media if it is not already located in a drive. Related Topics: Restoring Data to a Server or Workstation on page 457
484
Administrators Guide
Path
Media
Find directories
Include subdirectories
485
During the previous x day(s) Click this option if you want to restrict the search to the previous day or days, and then specify the number of days.
486
Administrators Guide
Restore to drive
Restore to path
487
Note Entering a name of an agent drive (Win98, Mac, UNIX) that does not appear in the Restore to drive list box causes the agent restore operation to fail. To resolve this, click Browse, and open the Remote Selections window. After Backup Exec detects the agent, the agent shares will appear in the Restore to drive list and the restore operation can be attempted again. 5. If you want to run the job now, click Run Now. Otherwise, in the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use (see Scheduling Jobs on page 398). Related Topics: Preserve tree on page 463 Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media on page 488 Redirecting Restores for SQL on page 1049 Redirecting SharePoint Portal Server Restore Jobs on page 1366 Scheduling Jobs on page 398
Using Redirected Restore for Active Directory, Active Directory Application Mode, and Install from Media
When you want to install a new Windows Server 2003 Server Domain Controller into an existing domain, the Active Directory and SYSVOL data are replicated from the existing Domain Controller that is in the domain to the new Domain Controller. If there is a large amount of data to be replicated or if the connection between the Domain Controllers is slow or intermittent, the replication time can be lengthy. The Active Directory Application Mode replication time is also affected by the amount of data to be replicated and the connection speed. To decrease the replication time for Active Directory and Active Directory Application Mode, you can use the Install from Media feature. For Active Directory, you can use the Install from Media feature to perform a System State backup of an existing Domain Controller in the domain in which you want to add a new Domain Controller. Then, you can perform a redirected restore of the data from the System State backup to the target Domain Controller. For Active Directory Application Mode, you can back up data using the AD/AM Writer. Then, you can perform a redirected restore of the data from the AD/AM backup to the target system.
488
Administrators Guide
To install Active Directory using the Install from Media feature: 1. Perform a standard System State backup of an active Windows Server 2003 Server Domain Controller that is in the target domain. 2. Transport the tape to the location of the system that will be installed into the target Domain. Caution The tape is not encrypted or protected. Use caution when transporting it to the location of the target domain. 3. Inventory the drive where the tape is loaded. 4. Catalog the tape. 5. Perform a redirected restore of the System State backup to a temporary location on a volume or directory on the target system. On the Properties pane, under Destination, click File Redirection. And then select redirection options. Note When you redirect restored data, Backup Exec creates a sub-directory for each type of System State data being restored. Backup Exec creates the following sub-directories: Active Directory, SYSVOL, Registry, Boot Files, COM+ Class Registration Database, Certificate Server (if installed), and Cluster Quorum (if installed). 6. To begin the Domain Controller installation, click Start on the target system, and then click Run. 7. Type dcpromo /adv 8. Click OK. 9. Click Next when the Active Directory Installation Wizard appears. 10. Select Additional domain controller for an existing domain. 11. Click Next. 12. Select From these restored backup files, and then enter the temporary location to which you redirected the System State data in step 5. 13. Click Next.
489
14. Complete the Active Directory Installation Wizard by following the prompts on the screen. 15. Complete the Domain Controller installation. 16. Reboot the system that has the new Domain Controller. 17. Delete any remaining temporary redirected System State files. For more information, refer to your Microsoft documentation. Related Topics: Creating a Manual Backup Job by Configuring Job Properties on page 262 Inventorying Media in Devices on page 193 Cataloging Media in a Drive on page 452 Redirecting a Restore Operation on page 487
490
Administrators Guide
Setting Restore Defaults Restore default options (continued) Item Skip if file exists Description Select this option to prevent Backup Exec from overwriting files on the target disk with files that have the same names that are included in the restore operation.
Skip if existing file is more Select this option to prevent Backup Exec from restoring over recent files that exist on the target resource if they are more recent than the files included in the restore operation. This option is useful if you are rebuilding a system. For example, after installing the operating system on a crashed computer, you could restore a previous full backup of the system without worrying about overwriting later versions of operating system files. Restoring corrupt files Restore corrupt files Backup Exec will automatically exclude corrupt files from the restore process unless you select this option.
Caution Corrupt files, which appear in the restore selections window with a red X, could be incomplete files. Restoring corrupt files could result in corrupt data. Symantec recommends performing redirected restore of corrupt files rather than restoring to the original location.
Junction Points Restore junction points, files and directories from backup media When this option is selected, the information for the junction points and the files and directories to which they are linked is restored. Selecting this option overwrites existing junction points on your system. If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see Back up files and directories by following junction points on page 328), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter.
491
Setting Restore Defaults Restore default options (continued) Item Preserve existing junction points and restore files and directories from backup media Description Select this option to restore files and directories backed up from junction point links while retaining the system's current junction points. This option keeps current junction points from being overwritten with the junction point information restored from the backup media. When this option is selected and identical junction points or directory names exist on both the target system and the media, the files and directories are restored to the target system's junction point or directory. Note If a junction point or directory does not already exist in the same location and with the same name as the junction point to be restored, then the information for the junction point and the files and directories to which they point will be restored. If a junction point was originally backed up without the Back up files and directories by following junction points check box selected (see Back up files and directories by following junction points on page 328), then the files and directories to which the junction point is linked will not be restored, unless the junction point was linked to a mounted drive that did not have an assigned drive letter.
Related Topics: Creating a Manual Restore Job by Configuring Job Properties on page 458
492
Administrators Guide
Subnet mask
Network ID
Physical address
493
Specifying the Restore Network Network options for restore job (continued) Item Use any available network route for remote agents not bound to the above Network ID Description Select this option if you want Backup Exec to attempt to connect using any available network route if a connection cannot be made using the specified network. If you do not select this option, and Backup Exec cannot connect using the specified network interface, the restore job will fail.
5. Continue selecting options for the restore job. 6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane, under Frequency, click Schedule to set the scheduling options you want to use. Related Topics: Restoring Data to a Server or Workstation on page 457 Specifying Backup Networks on page 334 Scheduling Jobs on page 398
494
Administrators Guide
495
A set containing a SQL database that has been partialized to remove details of the set.
A set containing associated transaction logs for a SQL database that has been partialized.
496
Administrators Guide
A set containing associated transaction logs for a SQL database that are corrupt on the backup media.
An Exchange Information store set that has been partialized to remove details from the catalog.
An Exchange Information store transaction log set that has been partialized.
An Exchange Information store transaction log set that is corrupt on the backup media.
An Exchange Directory store transaction log set that has been partialized.
497
An Exchange Directory store transaction log set that is corrupt on the backup media.
An Exchange Mailbox transaction log set that is corrupt on the backup media.
An Exchange 2000 store transaction log set that has been partialized.
498
Administrators Guide
An Exchange 2000 store transaction log set that is corrupt on the backup media.
An Exchange 2000 directory store set that is corrupt on the storage media.
An Exchange 2000 Directory store transaction log set that has been partialized.
An Exchange 2000 Directory store transaction log set that is corrupt on the storage media.
The backup set is incomplete because the backup job was terminated. Review the backup job logs for additional information.
The backup set is incomplete because the backup job failed. Review the backup job logs for additional information.
The Utility partition backup set is corrupt on the storage media. Review the backup job logs for additional information.
499
500
Administrators Guide
Chapter
10
Any event that occurs in Backup Exec that is important enough to present a message to the user or requires a response from the user is an alert. There are 35 alert categories that originate from system, job, media, or device sources. Each alert category may contain one or more events that can generate the alert. Each alert category is also provided with an alert type. The alert type and corresponding colored icon can help you quickly determine the severity of the alert. Backup Exec includes the following alert types:
Attention required - a green icon Errors - a red icon Warnings - a yellow icon Informational - a blue icon
Note BEWAC does not support the use of color icons for alerts. For information about how alerts appear in BEWAC, see Viewing, Clearing, and Responding to Alerts on page 715. The majority of Backup Exec alerts are enabled by default and automatically display. However, three alert categories are disabled by default: Backup job contains no data, Job Start and Job Success. You can modify alert categories to enable or disable the alerts when you configure alert categories, but attention required and error alerts cannot be disabled. The alert type icons that appear with the alert categories appear shaded in the Alert Categories dialog box for disabled alerts. Alerts remain active in the system until you enter a response, or you can configure the alert category property to automatically clear the alert after a specified length of time. Depending on the alert type, it may not be necessary to respond to the alert to continue
501
with operations. After you respond to an alert, it is moved to the alert history, where the alert remains for the length of time you choose to keep it in the Backup Exec database or until you delete it. Notifications can be configured to notify recipients when alerts occur. To use notifications you must perform the following:
You must first configure the methods you want to use to notify the recipient. The methods of notification are MAPI, SMTP, or VIM (Lotus Notes) e-mail and native and alphanumeric pager configurations. Printer and Net Send notification methods do not require pre-configuration. The second step is to configure recipients. Recipients are individuals, computer consoles, printers, or groups and can be configured to use one or more of the notification methods. The last step is assigning the recipients to alerts or jobs for notification.
502
Administrators Guide
The information that appears for each alert includes the following:
Type of alert Category Message displayed by the alert Job Name Device Name Media server on which the alert occurred Source of the alert Time the alert was received
Values, properties, and alert messages for the selected alert also appear in the Active Alert or Alert History Properties pane at the bottom of the view. Note If you are using BEWAC and you want to view values, properties, and alert messages for an alert, select the alert, and then under General Tasks in the task pane, select Properties.
503
To set View Filters for Active alerts and Alert history: 1. On the navigation bar, click Alerts. 2. Click the Active Alerts or Alert History tab. 3. In the Active Alerts or Alert History Filter box, click the option for the alerts you want to view. The following types of alert filters can be selected for the Active alerts and Alert history views.
Alert View Filters Item Show attention required Show errors Show warnings Show information Show system alerts Show media alerts Show device alerts Show job alerts Show media server Description Lists alerts that require a response from the user.
Lists system, job, media, and device error alerts. Lists system, job, media, and device warning alerts. Lists system, job, media, and device information alerts. Lists the alerts that originated from the system. Lists the alerts that originated from media. Lists the alerts that originated from devices. Lists the alerts that originated from a job. This filter displays only if you have the Central Admin Server Option installed. After you select this option, select the media server for which you want to view alerts. Select All media servers to view alerts for all media servers.
504
Administrators Guide
Descriptions
Name of the media server on which the alert occurred. Name of the device on which the alert occurred. The name of the job associated with the alert. Date and time the alert occurred.
505
Viewing Alert Properties Alert Properties (continued) Item Source Descriptions The cause of the alert. Alerts can originate from one of the following sources:
The SNMP message from Backup Exec regarding status and error conditions. SNMP must be installed to view this message.
The alert is activated or disabled. Notifications are enabled or cleared for the alert. Recipients must be configured in order to use this option. SNMP notifications are enabled or cleared for the alert. SNMP must be installed to use this option. The alert is entered into the Windows Event Viewer. The Windows Event log displays all the property information for the alert. If a link appears in the Windows Event log you can search the Symantec Technical Support web site for information about the Event ID.
The alerts ID in the Windows Event Viewer. The length of time the alert remains active before it is moved to the Alert history. For attention required alerts, you can set a default response. For more information, see Editing Media Server Configurations on page 737. This option is available only for the Media Overwrite, Media Remove, Media Insert, Library Insert alert categories. The response Backup Exec automatically sends. Sends the job log to the recipient configured for notification. This option can only be used for recipients that are configured for e-mail or printer notification.
Respond with
506
Administrators Guide
Response (Alert History Properties) User who responded Response machine Time user responded User response User ID that responded to the alert. Name of the computer from which the user responded. Date and time the user responded to the alert. The response the user entered for the alert.
5. After you view the alert properties, click OK. Related Topics: Configuring Alert Category Properties on page 511 Configuring Recipients on page 518 Configuring SNMP Notification on page 536
507
If you click Close, you will close the dialog box, but the alert remains active. To clear the alert and move it to the alert history, you must select a response such as OK, Yes, No, or Cancel from the alert dialog box. The alert dialog box provides the following information:
Alert Options Item Category Name Message Description The title of the alert. Describes the event that caused the alert and provides suggestions for responding to the alert. The name of the computer on which the alert occurred. The name of the device on which the alert occurred. The job associated with the alert. The date and time the alert occurred.
Automatically display new Select this check box to have alerts automatically appear in the alerts Backup Exec console when they are sent. If you do not select this option, you must respond to alerts through the Active Alerts pane. For more information, see Changing Default Preferences on page 120. Note The Automatically display new alerts option is not available in Backup Exec Web Administration Console (BEWAC).
4. Click a response for the alert. Note If you are using Backup Exec Web Administration Console (BEWAC), click OK after selecting a response for the alert. After the alert condition is resolved, the alert is moved to the Alert history.
508
Administrators Guide
If the alert is in Active alerts, under Alert Tasks in the task pane, click View job log. If the alert is in the Alert history, under Alert History Tasks, click View job log.
5. To search for a specific word or phrase, click Find. Type the text you want to find, and then click Find Next. Be sure to expand all sections of the job log. The Find feature searches only the expanded sections of the job log. 6. To print the job log, click Print. You must have a printer attached to your system and configured in order to print the log. To save the job log as an .html or .txt file, click Save As and then select the file name, file location, and file type. 7. After you have finished viewing the job log, click OK. Related Topics: Viewing and Changing Completed Jobs on page 427
509
510
Administrators Guide
511
Configuring Alert Category Properties Alert Category Properties (continued) Item Include job log with a notification to an e-mail or printer recipient Send SNMP Notifications Description Select this check box to send the job log to the recipient configured for notification. The recipient must be configured to receive e-mail or printer notifications. Select this check box to enable SNMP notifications. SNMP must be installed to use this option. For more information, see Configuring SNMP Notification on page 536. Select this check box to enter the alert into the Windows Event Viewer. The Windows Event log displays all the property information for the alert. If a link appears in the Windows Event log you can search the Symantec Technical Support web site for information about the Event ID. Automatically clear after x Select this check box to enter the number of minutes, hours, or days/hours/minutes days you want the alert to remain active before it is moved to the Alert history. For attention required alerts, you can set a default response. For more information, see Editing Media Server Configurations on page 737. Respond with This option is available only for the Media Overwrite, Media Remove, Media Insert, Library Insert alert categories. Select the response that you want Backup Exec to send automatically. The choices are Cancel, No, Yes or OK.
6. Click Apply to apply the properties to the alert and continue configuring additional alerts. 7. Click OK to exit the Alert Configuration dialog box. Related Topics: Assigning Recipients to Alert Categories for Notification on page 533 Using Audit Logs to Review Activity Performed in Backup Exec on page 437
512
Administrators Guide
513
514
Administrators Guide
Configuring E-mail and Pager Notification Methods SMTP Configuration dialog box (continued) Item SMTP mail server Description Type the name of an SMTP mail server on which you have a valid user account. Backup Exec will not check the server name or the e-mail address for validity. Defaults to a standard SMTP port. In most cases, the default should not have to be changed. Type the e-mail address of the user from whom the notification message will be sent. The e-mail address should contain a name that identifies the user to the mail server, followed by an at sign (@) and the host name and domain name of the mail server. For example, john.smith@company.com.
SMTP port
Default sender
515
4. Click the MAPI Configuration tab and select the appropriate options as follows:
MAPI Configuration dialog box Item Enable Mail server name Description Select this check box to activate the notification method. Type the name of the Exchange server. You must use an Exchange server to which the Backup Exec service account has access. For more information, see Changing Windows Security on page 61. Type the mailbox from whom the notification message will be sent, for example, John Smith. The name appears in the From field in the message and does not require a full address. Note The Backup Exec services must be running under a domain account that has rights to the Exchange mailbox used for MAPI notification in order to save the MAPI configuration settings.
516
Administrators Guide
4. Click the VIM Configuration tab and select the appropriate options as follows:
VIM Configuration dialog box Item Enable Notes client directory Description Select this check box to activate the notification method. Type the path of the directory in which the Notes client is located. Type the password that enables you to connect to the Notes client. Re-type the password that enables you to connect to the Notes client.
Mail password
Configuring Recipients
Configuring Recipients
Recipients are individuals with a predefined notification method, computer consoles, printers, or groups. Recipient configuration consists of selecting a notification method and defining notification limits. After you create entries for the recipients, you can assign them to alerts, jobs, or selection lists. The following types of recipients can be configured for notifications:
Person. An individual that has a predefined method of notification such as SMTP, MAPI, or VIM e-mail, or a pager. You must configure the notification method before you can enable it for the recipient. Net Send. A computer that serves as a notification recipient. Printer. A specific printer to which notifications can be sent. Group. A group of one or more recipients, including person recipients, Net Send recipients, and other groups.
Related Topics: Configuring E-mail and Pager Notification Methods on page 514 Assigning Recipients to Alert Categories for Notification on page 533 Selecting Recipients for Notification on page 534 Using Selection Lists on page 293
518
Administrators Guide
Configuring Recipients
6. Click the SMTP Mail tab and select the appropriate options as follows:
SMTP Mail dialog box Item Enable Description Select this check box to activate this notification method for the recipient. Type the e-mail address of the recipient to whom the notification message will be sent. For example, john.smith@company.com. Enables you to test the notification configuration for the recipient.
Address
Test
Limit the number of notifications sent Enable Select this check box to activate the option.
Notify me a maximum of x Type the total number of notifications you want sent to the times within x minutes recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day. Reset the notification limits after x minutes Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.
Limit when notifications can be sent Enable Select this check box to activate the option and configure the length of time the recipient is available for notification. Enables you to select the days and times when notifications can be sent to the recipient. For more information, see Scheduling Notification for Recipients on page 531.
Schedule
7. Click OK. Related Topics: Editing Recipient Notification Methods on page 532 Editing Recipient Notification Properties on page 531
Chapter 10, Alerts and Notifications 519
Configuring Recipients
Mailbox
Test
520
Administrators Guide
Notify me a maximum of x Type the total number of notifications you want sent to the times within x minutes recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day. Reset the notification limits after x minutes Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.
Limit when notifications can be sent Enable Select this check box to activate the option and configure the length of time the recipient is available for notification. Enables you to select the days and times when notifications can be sent to the recipient. For more information, see Scheduling Notification for Recipients on page 531.
Schedule
7. Click OK. Related Topics: Editing Recipient Notification Methods on page 532 Editing Recipient Notification Properties on page 531 Assigning Recipients to Alert Categories for Notification on page 533
521
Configuring Recipients
Address
Test
522
Administrators Guide
Notify me a maximum of x Type the total number of notifications you want sent to the times within x minutes recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day. Reset the notification limits after x minutes Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.
Limit when notifications can be sent Enable Select this check box to activate the option and configure the length of time the recipient is available for notification. Enables you to select the days and times when notifications can be sent to the recipient. For more information, see Scheduling Notification for Recipients on page 531.
Schedule
Related Topics: Editing Recipient Notification Methods on page 532 Editing Recipient Notification Properties on page 531 Assigning Recipients to Alert Categories for Notification on page 533
Configuring Recipients
4. Click New, click Person in the Recipient Type dialog box, and then click OK. 5. In the Name field, type the name of the recipient that you want to configure. 6. Click the Pager tab and select the appropriate options as follows:
Pager dialog box Item Enable Description Select this check box to activate this notification method for the recipient. Type the area code and phone number to access the paging service providers modem. The paging service number may be different from the number you enter to manually enter a page. Enter the country or region name and country code in which the pager is located. Type the pager identification number provided by the paging service provider. You will have a pin if you use TAP services and in most cases, the number is the last seven digits of the pagers phone number.
Carrier Phone
Advanced Pager setup options Advanced Enables you to configure additional settings for the pager. For more information about the options, see Advanced Pager Information dialog box on page 525. Enables you to test the notification configuration for the recipient. Note If you are using Backup Exec Web Administration Console (BEWAC), this option is not available. Limit the number of notifications sent Enable Select this check box to activate the option.
Test
Notify me a maximum of x Type the total number of notifications you want sent to the times within x minutes recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day.
524
Administrators Guide
Configuring Recipients Pager dialog box (continued) Item Reset the notification limits after x minutes Description Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.
Limit when notifications can be sent Enable Select this check box to activate the option and configure the length of time the recipient is available for notification. Enables you to select the days and times when notifications can be sent to the recipient. For more information, see Scheduling Notification for Recipients on page 531.
Schedule
7. Click Advanced to configure advanced pager setup options and select the appropriate options as follows:
Advanced Pager Information dialog box Item Pager Configuration Password Message Length Type the password for the pager, if one is required. Type the maximum number of characters you want to use for messages. The number is determined by the paging service provider. Type the number of times you want the paging service provider to retry the page. The number is determined by the paging service provider. Description
Retrys
Pager type Numeric Select this option if you are configuring a pager that accepts only numbers. Select this option if you are configuring a pager that accepts letters and numbers.
Alpha-numeric
525
Configuring Recipients Advanced Pager Information dialog box (continued) Item Modem Configuration Modem Baud Rate Select the speed of the modem. The speeds that appear are limits set by the paging service; select the appropriate speed regardless of the modem speed rating. Select the communication protocol. In most cases, you should use the Windows default. Description
8. Click OK to save the settings in the Advanced Pager Information dialog box, and then click OK to save the pager configuration settings. Related Topics: Editing Recipient Notification Methods on page 532 Editing Recipient Notification Properties on page 531 Assigning Recipients to Alert Categories for Notification on page 533
526
Administrators Guide
Configuring Recipients
Test
Notify me a maximum of x Type the total number of notifications you want sent to the times within x minutes recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day. Reset the notification limits after x minutes Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.
Limit when notifications can be sent Enable Select this check box to activate the option and configure the length of time the recipient is available for notification.
527
Configuring Recipients Net Send Recipient Properties dialog box (continued) Item Schedule Description Enables you to select the days and times when notifications can be sent to the recipient. For more information, see Scheduling Notification for Recipients on page 531.
6. Click OK. Related Topics: Editing Recipient Notification Methods on page 532 Editing Recipient Notification Properties on page 531 Assigning Recipients to Alert Categories for Notification on page 533
528
Administrators Guide
Configuring Recipients
Printer Recipient Properties dialog box Item Name Description Type the recipient for whom you are configuring the notification. You cannot use a fax printer device to receive the notification. Select the name of the printer to which the notification message will be sent. Enables you to test the notification configuration for the recipient. Note If you are using Backup Exec Web Administration Console (BEWAC), this option is not available. Limit the number of notifications sent Enable Select this check box to activate the option.
Target Printer
Test
Notify me a maximum of x Type the total number of notifications you want sent to the times within x minutes recipient for all alerts generated within the specified number of minutes. After the specified number of notifications have been sent, additional notifications are not sent until the specified minutes have been reached. The maximum number of minutes that can be set is 1440, which is the number of minutes in a day. Reset the notification limits after x minutes Select this check box to enter the number of minutes that must be reached before the notification limits are reset. When the time limit has been reached, the number of notifications sent is reset to zero.
Limit when notifications can be sent Enable Select this check box to activate the option and configure the length of time the recipient is available for notification. Enables you to select the days and times when notifications can be sent to the recipient. For more information, see Scheduling Notification for Recipients on page 531.
Schedule
Related Topics: Editing Recipient Notification Methods on page 532 Editing Recipient Notification Properties on page 531 Assigning Recipients to Alert Categories for Notification on page 533
Chapter 10, Alerts and Notifications 529
Configuring Recipients
530
Administrators Guide
Configuring Recipients
531
Configuring Recipients
3. Under Notification Tasks in the task pane, click Configure recipients. The Configure Recipients dialog box appears. 4. Select the recipient you want to edit, and then click Properties. The Recipient Properties dialog box for the type of recipient you selected appears. 5. Edit the properties for the selected recipient. You can edit any of the properties except for the recipient name in the Name field. To modify the recipient name, you must create a new recipient, and then delete the old one. 6. Click OK.
SMTP Configuration. See SMTP Configuration dialog box on page 514. MAPI Configuration. See MAPI Configuration dialog box on page 516. VIM Configuration. See VIM Configuration dialog box on page 517. Pager Configuration. Click Enable to activate or clear the notification method, and then select a modem from the Configured Modems list.
6. Click OK.
532 Administrators Guide
Removing Recipients
You can delete recipients that do not want to receive notification messages; however, the recipient is permanently removed upon deletion. If you want to keep the recipient, but do not want the recipient to receive notifications, clear the Enable check box in the recipient properties. To remove a recipient: 1. On the navigation bar, click Alerts. 2. Click the Active Alerts tab. 3. Under Notification Tasks in the task pane, click Configure recipients. 4. Select the recipient you want to delete, and then click Remove.
533
Under Alert Categories, select the alert category from which you want to clear the recipient and then under Recipients, click the check box for the recipient you want to clear.
To modify alert category properties: 1. Under Alert Categories, select the alert category you want to modify. You can select more than one alert category and the properties you modify will be applied to all the selected alert categories. 2. Click Properties. The Alert Category Properties dialog box appears. 3. Enter property information for the alert category. 4. Click OK. Related Topics: Configuring Alert Category Properties on page 511 Configuring E-mail and Pager Notification Methods on page 514 Configuring Recipients on page 518
To select recipients to be notified when a job completes, select the type of job for which you want to configure notifications. When the job properties dialog box appears, on the Properties pane, under Settings, click Notification.
534
Administrators Guide
To select recipients to be notified when a job containing a specific selection list completes, on the navigation bar, click Job Setup. Then, on the Backup Selection Lists pane, select the selection list that you want to add notification to. Under General Tasks in the task pane, click Properties, and then under Source, click Selection List Notification.
2. Select the recipients you want to assign to the job or selection list. 3. If the recipient is using an e-mail or printer notification method, click Include job log with a notification to an e-mail or printer recipient. 4. You can continue selecting other options from the Properties pane. To configure new recipients or edit recipient properties: 1. Repeat step 1 on page 534. 2. Perform one of the following:
To configure a new recipient, click New, select the recipient type you want to configure, and then click OK. To edit recipient properties, select the recipient for which you want to edit properties, and then click Properties.
Person
SMTP Mail. See SMTP Mail dialog box on page 519 MAPI Mail. See MAPI Mail dialog box on page 520 VIM Mail. See VIM Mail dialog box on page 522 Pager. See Pager dialog box on page 524
Net Send. See Net Send Recipient Properties dialog box on page 527 Printer. See Printer Recipient Properties dialog box on page 529 Group. Perform the following: In the Group Name field, type the group for whom you are configuring the notification.
a.
b. To add members to the group, select recipients from the All Recipients list, and then click Add to move them to the Group Members list.
Chapter 10, Alerts and Notifications 535
c.
To remove members from the group, select recipients from the Group Members list, and then click Remove to move them to the All Recipients list.
4. Click OK. 5. You can edit recipient properties or select other options from the Properties pane. Related Topics: Backing Up Data on page 259
machine name product, version, revision machine name product, version, revision machine name job name local or remote Operator name detail message
Product Stop
1302.3.1.1.9.2
Job Canceled
1302.3.1.2.8.2
Job Failed
1302.3.1.2.8.1
536
Administrators Guide
Configuring SNMP Notification SNMP Traps Trap Type Object ID String 1 String 2 String 3 String 4 detail message
Storage device 1302.3.2.5.3.3 requires human intervention Robotic library 1302.3.2.4.3.3 requires human intervention
Backup Exec: machine name job name Storage device requires attention Backup Exec: machine name job name robotic library device requires attention
detail message
Intelligent Disaster Recovery Message Intelligent Disaster Recovery Message Backup Exec system error
detail message
1302.3.1.4.2.1. Backup 2 complete, update DR disks 1302.3.1.1.9.3 The application has encountered an error Information on normal events The job succeeded
detail message
detail message
1302.3.1.1.9.4
detail message
1302.3.1.2.8.3
detail message
1302.3.1.2.8.4
The job machine name job name succeeded, but there was a problem The job has started machine name job name
detail message
Job Started
1302.3.1.2.8.5
detail message
537
Configuring SNMP Notification SNMP Traps Trap Type Object ID String 1 String 2 String 3 String 4 detail message
The job machine name job name succeeded, but there was no data The job has a warning machine name job name
Job Warning
1302.3.1.2.8.7
detail message
1302.3.1.5.1.1. The device has machine name job name 1 encountered an error 1302.3.1.5.1.1. The device has machine name job name 2 encountered a warning 1302.3.1.5.1.1. Normal device machine name job name 3 information 1302.3.1.5.1.1. Device 4 requires attention 1302.3.1.5.2.1. There is an 1 error with the media machine name job name
detail message
detail message
detail message
detail message
detail message
1302.3.1.5.2.1. There may be machine name job name 2 a problem with the media 1302.3.1.5.2.1. Normal media machine name job name 3 information 1302.3.1.5.2.1. Media 4 requires attention 1302.3.1.5.3.1. There is an 1 error with the catalog machine name job name
detail message
detail message
detail message
Catalog Error
detail message
538
Administrators Guide
Configuring SNMP Notification SNMP Traps Trap Type Tape Alert Error Object ID String 1 String 2 String 3 String 4 detail message
1302.3.1.5.4.1. There is a 1 TapeAlert error 1302.3.1.5.4.1. There is a 2 TapeAlert warning 1302.3.1.5.4.1. Normal 3 TapeAlert information 1302.3.2.5.5.1. There is a 1 database maintenance error 1302.3.2.5.5.1. Normal 2 database maintenance information 1302.3.2.5.6.1. There is a 1 software update error 1302.3.2.5.6.1. There is a 2 software update warning 1302.3.2.5.6.1. Normal 3 software update information
detail message
detail message
detail message
detail message
detail message
detail message
detail message
detail message
Install Update 1302.3.2.5.7.1. Normal Install machine name job name Information 2 information
detail message
539
In order to receive Backup Exec traps at the SNMP console, you must configure the SNMP system service with the SNMP console's IP address. To install the SNMP system service and configure it to send traps to the SNMP console for Windows 2000 and Windows Server 2003: 1. Click Start, point to Settings, point to Control Panel, and then double-click Add/Remove Programs. 2. Click Add/Remove Windows Components. 3. In Add/Remove Windows Components, select Management and Monitoring Tools, and then click Details. When selecting the component, do not select or clear its check box. 4. Select Simple Network Management Protocol, and then click OK. 5. Click Next. SNMP starts automatically after installation. You must be logged on as an administrator or a member of the Administrators group in order to complete this procedure. If your computer is connected to a network, network policy settings might also prevent you from completing this procedure. Related Topics: Configuring Alert Category Properties on page 511
540
Administrators Guide
To install the WMI SNMP provider: Note Before you install the SNMP provider included with Backup Exec, you must have the Microsoft SNMP provider installed on your system. For more information, refer to your Microsoft documentation. 1. Insert the Backup Exec Installation CD. 2. At the command prompt, type the following: mofcomp <CD Drive Letter>:\winnt\wmi\snmp\eng\bkupexecmib.mof Note To use the WMI SNMP provider you must set up SNMP notification.
541
542
Administrators Guide
Chapter
11
Reports
Backup Exec includes 44 reports that show detailed information about your system. When generating most of the reports, you can specify settings that server as filter parameters or a time range for the data that you want to include in the report. You can then run and view the report immediately, or you can create a new job that saves the report data in the Job History. You can also view general properties for each report. Backup Exec also provides:
The ability to schedule a report to run at a specified times or specify a recurring schedule for the report to run. The ability to have Backup Exec distribute reports through notification.
To run reports across multiple media servers, you must install the Backup Exec SAN Shared Storage Option, even if you are not operating in a shared storage environment. Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548 Scheduling Report Jobs and Setting Notification Recipients on page 553 Available Reports on page 555
543
Viewing Reports
Viewing Reports
Reports are generated using Crystal Reports and can be viewed and printed in an HTML file format. If the Adobe Acrobat Reader is detected by Backup Exec, reports are displayed in Adobe Portable Document Format (PDF). To go to a web site to download the Adobe Acrobat Reader, on the Help menu, click Adobe Acrobat Web Site. To properly format integrated Backup Exec reports, you must configure a default printer using the Windows Control Panel Printers applet. This is required even if you do not have a printer attached to your system. To view the list of available reports:
The Reports pane lists the name, a description, and a category for each report. You can sort the reports in alphabetical or reverse alphabetical order by clicking Name.
Reports
Related Topics:
Running and Viewing a New Report Job on page 548 Scheduling Report Jobs and Setting Notification Recipients on page 553 Available Reports on page 555
544
Administrators Guide
Running a Report
Running a Report
When you run a report, you can specify the criteria that is used to determine the items that will be included in the report. The settings, or parameters, available for you to select depend on the type of data that can be included in the report. After the report is generated, only the items that match the criteria appear in the report. To run a report: 1. On the navigation bar, click Reports. 2. On the Reports pane, select the report you want to run. 3. Under Report Tasks in the task pane, click Run report now. 4. If the Run Report Now Properties box appears, then select the appropriate Settings, or filter parameters, for the data you want to include in the report. Only filter parameters that are available for a report appear. Select the appropriate options as follows:
Report filters Item Media set Description Filters the report based on media set names. Media sets include all the media that is inserted into the storage device. For more information on media sets, see Media Categories on page 227. Filters the report based on media server names. The media server is the server on which Backup Exec is installed. This setting is only available if the SAN Shared Storage Option is available. Filters the report based on job status. Filters the report based on specific protected server names. The protected server is the server that is being backed up. Filters the report based on specific vault names. A media vault is a virtual representation of the actual physical location of media. For more information on media vaults, see Media Location on page 243.
Media server
Vault
545
Running a Report Report filters (continued) Item Ranges Description Filters the report based on the time range for the data that you
want to include in the report. If range parameters are not available for a report, you will not be able to select the parameter. Range parameters or options available include:
Days. Select this check box to enable the date filter.
- Number of days before day report runs. Type the number of days prior to the current day to begin the filter process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days. - Number of days after day report runs. Type the number of days after the current day to begin the filter process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days.
Hours. Select this check box to enable the hours filter. - Number of hours within time report. Type the number of hours either before or after the present hour to filter the data to be included in the report. The time frame depends on the type of report. You can enter a minimum of 0 and a maximum of 32,000 hours.
Event count. Select this check box to enable the event count filter. - Maximum number of events to include. Enter the number of events to include in the report. Events generate alerts and originate from one of the following sources: system, job, media, or device. You can enter a minimum of 0 and a maximum of 32,000 events.
Note Entering a value of zero for the range parameter does not limit the amount of data included in the report; this can result in an extensive report.
5. Click Run report. The report appears and displays data based on the criteria you set when you ran the report. 6. To save the report, click Save As; for a report in PDF, click the Save a Copy icon. When prompted, enter the file name and location where you want to save the report and then click Save.
546
Administrators Guide
Running a Report
The report is saved in the location you specify. Backup Exec also creates a folder, with the same name as the report, in the same location in which the report is saved. The folder contains images and report pages that enable you to view the saved report. 7. To print the report, click Print; for a report in PDF, click the Print icon. You must have a printer attached to the computer, and configured in order to print the report. For reports in an HTML format, do the following:
To ensure the reports print correctly, in the Layout tab of the Print dialog box, under Orientation, select Landscape. To print all the pages in a multiple page report, in the Options tab of the Print dialog box, select Print all linked documents.
Note If all the data does not print in an HTML-formatted report, you may need to edit the page setup for the report. To edit the page setup, open Microsoft Internet Explorer, and then on the File menu, click Page Setup. Under Header and Footers, delete the Header and Footer and then under Margins, set the Left and Right margins to the minimum setting that your printer will accept. 8. After you have finished viewing the report, click OK. The report will automatically be deleted. Related Topics: Scheduling Report Jobs and Setting Notification Recipients on page 553 Available Reports on page 555
547
4. On the Properties pane, under Settings, click General and then type the name for the job in Job name and select the Job priority.
548
Administrators Guide
If another job is scheduled to run at the same time as this job, the priority you set determines which job runs first. 5. On the Properties pane, under Settings, select the appropriate filter parameters for the data you want to include in the report. If filter parameters or settings are not available for a report, you will not be able to view the parameters. Select the appropriate options as follows.
Report filters Item Media set Description Filters the report based on media set names. Media sets include all the media that is inserted into the storage device. For more information on media sets, see Media Categories on page 227. Filters the report based on media server names. The media server is the server on which Backup Exec is installed. This option is only available if the SAN Shared Storage Option is installed. Filters the report based on job status. Filters the report based on specific protected server names. The protected server is the server that is being backed up. Filters the report based on specific vault names. A media vault is a virtual representation of the actual physical location of media. For more information on media vaults, see Media Location on page 243.
Media server
Vault
6. On the Properties pane, under Settings, click Ranges and select the appropriate range parameters for the data you want to include in the report. If range parameters are not available for a report, you will not be able to select the parameter. Select the appropriate options as follows
Report ranges Item Days Number of days before day report runs Description Select this check box to enable the date filter. Type the number of days prior to the current day to begin the filter process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days.
549
Running and Viewing a New Report Job Report ranges (continued) Item Number of days after day report runs Description Type the number of days after the current day to begin the filter process on the data to be included in the report. You can enter a minimum of 0 and a maximum of 32,000 days. Select this check box to enable the hours filter.
Hours
Number of hours within Type the number of hours either before or after the present hour time report to filter the data to be included in the report. The time frame depends on the type of report. You can enter a minimum of 0 and a maximum of 32,000 hours. Event count Maximum number of events to include Select this check box to enable the event count filter. Enter the number of events to include in the report. Events generate alerts and originate from one of the following sources: system, job, media, or device. You can enter a minimum of 0 and a maximum of 32,000 events.
Note Entering a value of zero for the range parameter does not limit the amount of data included in the report; this can result in an extensive report. 7. On the Properties pane, under Settings, click Notification and enter notification information for the items. For more information, see Selecting Recipients for Notification on page 534. When the notification is sent to the recipient, the report is not included. 8. On the Properties pane, under Frequency, click Schedule and then click Submit job on hold if you want to submit the job with an on-hold status. Select this option if you want to submit the job, but do not want the job to run until you change the jobs hold status. 9. Click Enable automatic cancellation, and then type the number of hours or minutes in the Cancel job if not completed within option. Select this option if you want to cancel the job if is not completed within the selected number of hours or minutes. Backup Exec starts timing the length of time the job takes to run when the job actually begins, not the scheduled time. 10. After you have completed all the items you want to set for the new report job, click Run Now.
550 Administrators Guide
The report is submitted according to the options you selected. Note If you are using BEWAC, click Next to submit the report to the job queue. After viewing the job summary, click Finish. To view the report in the Job History: 1. On the navigation bar, click Job Monitor. 2. Click the Job List tab. 3. On the Job History pane, select the report you want to view. 4. Under General Tasks in the task pane, click Properties. The report and job history appear and display data based on the criteria you selected when you set up the job. 5. Click Job History to view detailed information about the job or Report to view the contents of the report. 6. To print the report, click Print; for a report in PDF, click the Print icon. You must have a printer attached to the computer, and configured in order to print the report. For reports in an HTML format, do the following:
To ensure the reports print correctly, in the Layout tab of the Print dialog box, under Orientation, select Landscape. To print all the pages in a multiple page report, in the Options tab of the Print dialog box, select Print all linked documents.
Note If all the data does not print in an HTML-formatted report, you may need to edit the page setup for the report. To edit the page setup, open Microsoft Internet Explorer, and then on the File menu, click Page Setup. Under Header and Footers, delete the Header and Footer and then under Margins, set the Left and Right margins to the minimum setting that your printer will accept. 7. After you have finished viewing the report, click OK. The report is saved for the length of time you set in the database maintenance option.
551
To save the report to a new location: 1. On the navigation bar, click Job Monitor. 2. Click the Job List tab. 3. On the Job History pane, right-click the report you want to save. 4. Click Properties. 5. Click Save As. The Save As dialog box appears. 6. Enter the file name and location where you want to save the report and then click Save. The report is saved in the location you specify. Backup Exec also creates a folder, with the same name as the report, in the same location in which the report is saved. The folder contains images and report pages that enable you to view the saved report. To delete the report from Job History: 1. On the navigation bar, click Job Monitor. 2. Click the Job List tab. 3. On the Job History pane, select the report you want to delete. 4. Under General Tasks in the task pane, click Delete. 5. Confirm the job deletion. The report and associated job history are deleted. Related Topics: Configuring Database Maintenance on page 447 Viewing and Changing Completed Jobs on page 427 Available Reports on page 555
552
Administrators Guide
553
Viewing Report Properties Report Properties (continued) Item Category Description Classification for the report. Available report categories include:
The creator of the report. The version of the product for which the report was created. The primary information used to categorize the report. The location of the report. The size of the report. The date the report was installed on the system.
4. Click OK after you have finished viewing the properties. Related Topics: Running a Report on page 545
554
Administrators Guide
Available Reports
Available Reports
This section provides detailed information about each report available in Backup Exec. The file name of the report, a description, and the information included in the report are listed for each report. The data included in each report will vary depending on the criteria you selected to include in the report. The following reports are included in Backup Exec:
Backup Exec Reports Report Name Active Alerts Description Lists all active alerts chronologically, displaying the most recent alerts first (see Active Alerts Report on page 559). Lists all active alerts grouped and filtered by media server, displaying the most recent alerts first (see Active Alerts by Media Server Report on page 559). Lists all alerts in the alert history chronologically, displaying the most recent alerts first (see Alert History Report on page 561). Lists all alerts in the alert history grouped and filtered by media server, displaying the most recent alerts first (see Alert History by Media Server Report on page 562). Lists the contents of the audit logs for selected servers for the specified time period (see Audit Log Report on page 563) Lists the success rate for backup jobs run to protect selected servers (see Backup Job Success Rate Report on page 564). Lists the success rate for backup jobs for specified past number of days for resources on selected servers (see Backup Resource Success Rate Report on page 565). Lists all backup sets that ran within the last 72 hours. The sets are grouped by the server and resource (see Backup Set Details by Resource Report on page 566). Lists all backup sets by media set (see Backup Sets by Media Set Report on page 567).
Alert History
Audit Log
555
Available Reports Backup Exec Reports (continued) Report Name Backup Size by Resource Description Lists the backup size for each resource job for up to seven previous runs and then computes the trailing average for up to seven previous runs for each job run (see Backup Size By Resource Report on page 568). Lists the contents of the Backup Exec system configuration parameters table (see Configuration Settings Report on page 569). Details the job queue sorted by status (see Current Job Status Report on page 570). Lists drive summary history for each archive device for the past 30 days including daily job count, bytes processed, and the percentage of drive utilization (see Daily Network Device Utilization Report on page 571). Lists device usage and error summary for each selected media server (see Device Summary Report on page 571). Lists all the policies that are targeted to specific drive selections (see Device Usage by Policy on page 573). Lists all the defined error-handling rules (see Error-Handling Rules Report on page 573). Lists all Backup Exec and other system and application event logs (see Event Logs Report on page 575). Lists all events registered by each notification recipient (see Event Recipients Report on page 576). Lists all the failed backup jobs sorted by the resource server and time frame (see Failed Backup Jobs Report on page 576). Lists all the jobs that have been run on each system device during the specified period (see Job Distribution by Device Report on page 577). Lists all the jobs that ran within the last 72 hours in chronological order (see Jobs Summary Report on page 578). Lists all the servers that have been protected by Backup Exec (see Machines Backed Up Report on page 579).
Configuration Settings
Device Summary
Error-Handling Rules
Event Logs
Event Recipients
Jobs Summary
Machines Backed Up
556
Administrators Guide
Available Reports Backup Exec Reports (continued) Report Name Managed Media Servers Description Lists the status and configuration for all media servers managed by Backup Exec (see Managed Media Servers Report on page 579). Lists the media that contain the backup sets for each system backed up on selected servers for the specified time period. This report can be inaccurate if media overwrite settings allow the media to be overwritten (see Media Required for Recovery Report on page 581). Lists all the media sets and media used by Backup Exec servers. The current location is given for each media (see Media Set Report on page 582). Lists the media located in each media vault (see Media Vault Contents Report on page 583).
Media Set
Missed Availability Window Lists all jobs that have missed scheduled availability windows within the specified time range. The jobs are listed in chronological order (see Missed Availability Report on page 584). Move Media to Vault Lists all media that can be moved to a media vault. The media listed are not currently in a media vault and the medias append period has expired (see Move Media to Vault Report on page 585). Lists past and future operations data for user-set period (see Operations Overview Report on page 586). Lists the results of backup jobs for each resource during the last 24 hours. This report includes backup jobs that were scheduled to run but did not run. Jobs are given a grace period of 24 hours before being marked as past due (see Overnight Summary Report on page 588). Lists all backup sets that were created in the selected period. The sets are grouped by target server and resource (see Policy Jobs by Resource Summary Report on page 589). Lists in chronological order all jobs derived from selected policies that have run within the specified time range (see Policy Jobs Summary Report on page 590). Lists all policies and policy job templates that are defined for the server (see Policy Properties Report on page 591).
Operations Overview
Overnight Summary
Policy Properties
557
Policy Protected Resources Lists job information for each job that is derived from a policy and assigned to protect any part of the named resource (see Policy Protected Resources on page 592). Problem Files Lists all the problem files reported for jobs. The files are grouped by day and resource (see Problem Files Report on page 593). Lists all media that have been modified in the last 24 hours (see Recently Written Media Report on page 594). Lists the success rate for policy derived backup jobs (see Resource Backup Policy Performance Report on page 595). Lists job information for resources on which the last backup job run on the resource failed. The data is filtered by resource server (see Resource Risk Assessment Report on page 596). Lists all restore sets that ran within the last 72 hours. The sets are grouped by the server and resource (see Restore Set Details by Resource Report on page 597). Lists all reusable media currently in the specified vault (see Retrieve Media from Vault Report on page 598). Lists the contents of slots in robotic libraries attached to media servers. Usage statistics are provided for each piece of media (see Robotic Library Inventory Report on page 599).
Scheduled Server Workload Lists the estimated scheduled workload for the next 24-hour period by server (see Scheduled Server Workload on page 600). Scratch Media Availability Lists the aging distribution of media. Shows how many media are available for overwrite and when other media will become available for overwrite (see Scratch Media Availability Report on page 601). Lists the results for the test run jobs set for the selected time period and media servers (see Test Run Results Report on page 602).
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
558
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
559
Available Reports Active Alerts by Media Server Report (continued) Item Job Name Device Name Category Message Description Name of the job associated with the alert. Name of the device on which the job ran. Title of the alert, such as Service Start or Job Failed. Describes the event that caused the alert.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
560
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
561
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
562
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
563
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
564
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
565
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
566
Administrators Guide
Available Reports
Set Method
Date / Time
Backup Set Description / Describes the data that was backed up and the location of the data. Source Directories Files MB Number of directories backed up. Number of files backed up. Amount of data backed up in megabytes.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
567
Available Reports
Resource Job Job Date and Time Run Backup Size, MB Trailing Avg, MB Difference %
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
568
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
569
Available Reports
On Hold Type
Displays an X if the job is on hold; otherwise, displays a dash (-). Type of job that was run, such as Backup or Restore.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
570
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
571
Available Reports Device Summary Report (continued) Item Device Name Description Name of the device, such as the name of the robotic library. This field is left blank for stand-alone drives. Name of the drive in the robotic library. Name of the vendor of the drive, the product ID, and firmware from the SCSI Inquiry string. Address of the SCSI Card, SCSI Bus, Target Device ID, and LUN. Device state, such as online. Date media was created. Date last cleaning job was run on the drive.
SCSI Target State Created Cleaned Post Cleaning Totals Hours Errors MB Mounts Totals Hours Errors MB Mounts
Hours the device has been in use since the last cleaning job. Number of errors occurring since the last cleaning job. Megabytes read and written since the last cleaning job. Number of mounts occurring since the last cleaning job.
Total number of hours the device has been in use. Total number of errors occurring on the device. Total number of megabytes read and written to the device. Total number of mounts occurring to the device.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
572
Administrators Guide
Available Reports
Method
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
573
Available Reports Error Handling Rules Report (continued) Item Job Status Description Final job status that activates the rule. Possible statuses are:
Error Canceled
Error Category
Category of error for which the rule will be applied. Available error categories include:
Displays if the rule is enabled or disabled. Displays an X if this option is selected for the error-handling rule. The option cancels all jobs after the maximum number of retries have been attempted. Displays an X if this option is selected for the error-handling rule. The option enables Backup Exec to pause the job until you can manually clear the error. Displays an X if this option is selected for the error-handling rule. The option enables Backup Exec to retry the job. Number of times the job is to be retried. Number of minutes the job is to wait before being retried.
Pause Job
Retry Job
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
574
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
575
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
576
Administrators Guide
Available Reports Failed Jobs Report (continued) Item Category Description Category for the failed job that may be generated by a system, job, media, or device error. Displays the error code that corresponds to the failure. Describes the event that caused the error. Status of the operation, such as Completed. Name of the device on which the job ran.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
577
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
578
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
Online - available for use. Stalled - not responding immediately to messages No Comm - communications to the server have been lost for some period of time.
579
Available Reports Managed Media Server Report (continued) Item Communication Threshold Stalled No Comm Catalog Location Time limit used for determining Stalled communications status. Time limit used for determining No Comm communications status. Location where server keeps catalog information. Possible locations are:
Description
Local - the catalog information is kept on the media server itself. CASO - the catalog information is kept on the Central Admin Server.
Upload Job Data Logs When job logs are uploaded from the managed server to the CASO database. Possible upload times are:
History
When job history is uploaded from the managed server to the CASO database. Possible upload times are:
Status
When status is uploaded from the managed server to the CASO database. Possible upload times are:
Time Difference Display Alert Displays Yes if you have configured an alert to be set if time between server clocks exceed a preset value (maximum time difference tolerance). Administrators Guide
580
Available Reports Managed Media Server Report (continued) Item Sec Description Maximum time difference tolerance in seconds set for server.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
581
Available Reports
Modified Location Totals Hours Mounts Soft Errors Hard Errors Write MB Current MB
Total number of hours that this media has been in use. Total number of times this media has been mounted. Number of recoverable read errors encountered. Number of unrecoverable read errors encountered. Number of bytes that have been written to this media. Estimate of the number of megabytes currently on this media.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
582
Administrators Guide
Available Reports
Overwrite Protection End Date Vault Media Rule Move Date Media Set Vault Media Rule Name
Name of media set to which the media belongs. Name of vault media rule.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
583
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
584
Administrators Guide
Available Reports
The media has met or exceeded the vault move date specified for the media containing the media. The append period has expired, but the overwrite protection period is still current (allocated).
You can limit the amount of data that appears in the report by entering filter parameters for Media Server and range parameters for the Days option. Information displayed in the Move Media to Vault report is described in the following table.
Move Media to Vault Report Item Media Server Description Name of the media server where the data for the backup job was located. Name of the media set. Media label assigned by Backup Exec, assigned by the administrator, or contained on a pre-assigned bar code label. Location of the media. Last date that data may be added to the media. Date that data on the media may be overwritten.
Location Append Period End Date Overwrite Protection End Date Vault Media Rule Move Date Vault Name Vault Media Rule Name
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
585
Available Reports
Total number of canceled jobs. Total number of jobs that failed. Total number of jobs that completed successfully. Total number of jobs that completed successfully, but may contain one or more skipped files, corrupt files, virus infected files or files in use. Total number of media used to back up the completed jobs. Total amount of data backed up.
Media Total Total Size (MB) Active Alerts Summary Errors Warnings Information Attention Required Media Availability Scratch Media
Total number of system, job, media, and device error alerts. Total number of job, media, and device warning alerts. Total number of system, job, media, and device information alerts. Total number of alerts that require a response from the user.
586
Administrators Guide
Available Reports Operations Overview (continued) Item Recyclable Allocated Imported Description Total number of recyclable media available. Number of allocated media (media belonging to a user media set). Number of imported media (media created by a product other than this installation of Backup Exec). Total number of appendable media available. Displays level of overwrite protection (Full, Partial, None) assigned to the media.
Appendable Media Overwrite Protection Level Current Jobs Summary Active Jobs Scheduled Scheduled (On hold) Job Status
Total number of active jobs. Total number of scheduled jobs. Total number of scheduled jobs on hold. Displays the job status.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
587
Available Reports
Service Level
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
588
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
589
Available Reports
590
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
591
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
592
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
593
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
594
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
595
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
596
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
597
Available Reports
Overwrite Protection End Date Vault Media Rule Move Date Media Set Vault Media Rule Name
Date media can be moved to vault. Name of the media set. Name of vault media rule.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
598
Administrators Guide
Available Reports
State
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
599
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
600
Administrators Guide
Available Reports
Size (GB)
Available to Append (GB) Capacity of scratch media available for append. Group Total Media Total Total number and capacity of scratch media available to the system. Total number of scratch media available.
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
601
Available Reports
Media Total
Available to Overwrite, MB Online Media Total Credential Check Capacity of media available in the device to which data can be written. Total amount of overwritable media available to the system. Indicates if the Backup Exec logon account was verified as correct for the resources being backed up. Size in megabytes of the backup.
Backup Size, MB
602
Administrators Guide
Available Reports
Related Topics: Running a Report on page 545 Running and Viewing a New Report Job on page 548
603
Available Reports
604
Administrators Guide
Chapter
12
Manual recovery. This section provides procedures for manually recovering both local and remote Windows 2003/XP/2000 computers. Automated recovery. Backup Execs Intelligent Disaster Recovery (IDR) option automates the disaster recovery process for Windows Server 2003/XP/2000 computers. IDR is an option you must purchase separately.
Related Topics: Symantec Backup Exec - Intelligent Disaster Recovery Option on page 901 Disaster Preparation of the Windows Computer on page 607 Manual Disaster Recovery of Windows Computers on page 610
605
Hardware protection. The hardware devices on your network (CPUs, drives, video) are susceptible to damage from many disaster situations. Uninterruptible power supplies (UPS), surge protectors, and security monitoring devices are the equipment most often used today to protect hardware. If you do not already have these items in place, you should consider installing them. The initial investment could be justified many times over in the event of a disaster. The ability to maintain business operations during a disaster period. Make sure that proper precautions are taken by everyone to implement plans for network interruptions. For example, the phones in the sales department wont stop ringing because the server is down, so orders may have to be handwritten until the server is up again. Each department should work out strategies for such occurrences. If the proper precautions are taken, the server can be rebuilt quickly and operations can still continue. A sound backup strategy. A well-designed backup strategy that includes a strong media rotation scheme plays a key role in quickly restoring your file server. Off-site storage of backups. It is imperative that backed up data be moved off-site regularly. This ensures that if something happens to your facility, all of your backups will not be destroyed. Depending on the importance of your data, you may choose to use several off-site storage facilities. There are companies that provide off-site storage services that pick up and deliver tapes when they are to be rotated. Effective DPP management. The last element - and possibly the most important - is proper management of your DPP strategy. A person or group of people should be charged with constantly supervising your organizations disaster preparation efforts. Someone should install and maintain hardware protection devices, make sure all departments have a plan if the server goes down temporarily, and make sure that backups are made and rotated off-site regularly. Also, it is a good idea to document your Disaster Preparation Plan for reference purposes. Backup Exec plays a major role in your DPP by offering an easy, reliable way of backing up and restoring your files. The rest of this chapter describes how to take some precautionary measures to make restoration as straightforward as possible in the event of a disaster.
606
Administrators Guide
Safe Mode. This option allows you to diagnose and fix system startup problems. For more information, see your Microsoft documentation. Last Known Good Configuration. This option allows you to return to a previous saved configuration.
Related Topics: Creating a Hardware Profile Copy on page 608 Creating an Emergency Repair Disk on page 609
607
608
Administrators Guide
609
Related Topics: Returning to the Last Known Good Configuration on page 607 Creating a Hardware Profile Copy on page 608 Creating an Emergency Repair Disk on page 609
Using Windows Automated System Recovery and System Restore to Recover a Windows XP or Windows Server 2003 System
The ASR feature, which replaces the Emergency Repair Disk for Windows XP and Windows Server 2003, allows you to restore the operating system to a previous state so that you can start Windows XP Professional or Windows Server 2003 when other recovery methods do not work. Microsoft recommends using System Restore, which saves only incremental changes and lets you start Windows XP Professional in normal or safe mode, before resorting to ASR. For more information about ASR or System Restore, refer to your Microsoft documentation.
Local Windows computer (see Manual Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative and authoritative restore of Active Directory for a domain controller) on page 611) Remote Windows computer (see Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative and authoritative restore of Active Directory for a domain controller) on page 615)
These procedures will restore your computers operating system to its pre-disaster state and will restore your data files, except those protected by one of the Backup Exec agents. Use these disaster recovery procedures in the following situations:
610 Administrators Guide
The Windows operating system has become corrupted and cannot be restored using the Emergency Repair Disks. The hard drive containing the Windows operating system has encountered an unrecoverable error that requires reformatting the disk. The hard drive containing the Windows operating system needs to be replaced.
Manual Disaster Recovery of a Local Windows 2000/XP/Server 2003 Computer (includes non-authoritative and authoritative restore of Active Directory for a domain controller)
Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR), see Symantec Backup Exec - Intelligent Disaster Recovery Option on page 901 for information on automated disaster recovery. The procedure described in the following section allows you to manually recover a computer not protected by IDR. This procedure will restore your computers operating system to a pre-disaster state and will restore your data files, except those protected by one of the Backup Exec database agents, such as the Exchange Agent or SQL Agent. If any of your data is protected by Backup Exec agents, refer to the section on restoring the data protected by the agent before beginning disaster recovery. A media drive must be attached to the computer that is being recovered. You will also need:
A current full backup of the computer to be recovered and any subsequent incremental/differential backups. The Windows 2000/XP/Server 2003 installation media. The Backup Exec for Windows Servers installation media.
To manually recover a local Windows 2000/XP/Server 2003 computer: 1. Install Windows 2000/XP/Server 2003. This basic Windows installation is necessary to provide Backup Exec with a target to which it can restore the system. The computer name, Windows directory, and the file system (such as NTFS) must be the same as the previous Windows installation. This installation will be overwritten by the backed up version, which will restore your original system configuration, application settings, and security settings.
611
If you are recovering from an entire hard disk failure, use Windows setup to partition and format the new disk during installation. Format the partitions with the same file system as before the failure.
If the system was in a specific domain or workgroup, do not join the domain or workgroup at this time. If you are recovering a domain controller, do not perform the domain controller installation process at this time.
2. Install Backup Exec for Windows Servers to a directory other than where it was originally installed (this is a temporary installation). Note Always log on to Windows using the Administrator account or its equivalent during this procedure. 3. Using the Device Driver Installation Wizard, install the appropriate device driver for the attached media drive. For more information, see First Time Startup Wizard on page 108. 4. Start Backup Exec for Windows Servers. 5. From the navigation bar, click Devices. 6. Inventory the media containing the latest full backup of the computer to be recovered (see Inventorying Media in Devices on page 193). 7. Catalog the media containing the latest full backup of the computer to be recovered (see Cataloging Media in a Drive on page 452). If the subsequent differential/incremental backups are on separate media, catalog those also. 8. From the navigation bar, click Restore. 9. Select all sets from the full and incremental backups that contain logical drives on the hard disk. If differential backup sets are to be restored, select only the last differential set. Make sure you include System State or Shadow Copy components as part of the restore selections. 10. On the Properties pane, under Settings, click General, and then select the following options:
612
Administrators Guide
11. On the Properties pane, under Settings, click Advanced, and then select the appropriate options (see Advanced options for restore on page 464). If you are restoring a computer that is the only domain controller in the domain or the entire domain is being rebuilt and this is the first domain controller, select the option Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State. 12. Click Run Now. 13. If you are restoring a computer that is the only domain controller in the domain or the entire domain is being rebuilt and this is the first domain controller, reboot the computer after the restore job successfully completes. Your computers operating system is now restored to a pre-disaster state. Your data files have been restored, except those protected by Backup Exec database agents. If you are performing an authoritative restore, continue with these steps: 14. Change the Backup Exec services to the local system account. a. Right-click My Computer and then select Manage.
b. From the left pane of the Computer Management utility, double click Services and Applications. c. Click Services.
d. In the right pane, double click each Backup Exec service, and from the Log On tab, change Log on as to use Local System account. e. Close the Computer Management utility.
15. Reboot the computer. 16. Press <F8> during startup. A menu appears that allows you to diagnose and fix system startup problems. 17. Select Directory Services Restore Mode. 18. Launch Backup Exec. 19. From the navigation bar, click Restore.
613
20. Select System State (Windows 2000 or Windows XP) or Shadow Copy (Windows 2003) components as the restore selections. Run the Restore job. 21. At this point, you can either choose to restore the entire Active Directory, or specific objects from the Active Directory: Restore the entire Active Directory by performing the following: a. Open a command prompt.
b. Type NTDSUTIL and press Enter. c. Type Authoritative Restore and press Enter.
d. Type Restore Database, press Enter, click OK and then click Yes. Restore specific objects from the Active Directory by performing the following: a. Open a command prompt.
b. Type NTDSUTIL and press Enter. c. Type Authoritative Restore and press Enter.
d. Type Restore Subtree "ou=<OU Name>.dc=<domain name>,dc=<xxx> (without the quotation marks), and then press Enter, where <OU Name> is the name of the organizational unit you want to restore, <domain name> is the domain name the OU resides in, and <xxx> is the top level domain name of the domain controller, such as com, org, or net. You can do this as many times for as many objects you need to restore. 22. Once you have finished restoring Active Directory information, exit NTDSUTIL. 23. Reboot the computer. Related Topics: Creating a Manual Restore Job by Configuring Job Properties on page 458 Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative and authoritative restore of Active Directory for a domain controller) on page 615 Manual Disaster Recovery of Windows Computers on page 610
614
Administrators Guide
Disaster Recovery of a Remote Windows 2000/XP/Server 2003 Computer (includes non-authoritative and authoritative restore of Active Directory for a domain controller)
Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR), see Symantec Backup Exec - Intelligent Disaster Recovery Option on page 901 for information on automated disaster recovery. The procedure described in the following section allows you to manually recover a computer not protected by IDR. You can perform disaster recovery on a remote computer attached to the media server. This procedure will restore your computers operating system to its pre-disaster state and will restore your data files, except those protected by one of the Backup Exec agents. If any of your data is protected by Backup Exec agents, see Backup Exec Options on page 51 before beginning disaster recovery. You will need:
A current full backup of the computer to be recovered and any subsequent incremental/differential backups. The Windows 2000/XP/Server 2003 installation media.
Note Always log on to Windows using the Administrator account or its equivalent during this procedure. To manually recover a remote Windows 2000/XP/Server 2003 computer: At the remote computer: 1. Install Windows 2000/XP/Server 2003. This basic Windows installation is necessary to provide Backup Exec with a target to which it can restore the system. The computer name, Windows directory and the file system (such as NTFS) must be the same as the previous Windows installation. This basic installation will later be overwritten by the backed up version, which will restore your system configuration, application settings, and security settings. If you are recovering from an entire hard disk failure, use Windows setup to partition and format the new disk during installation. Format the partitions with the same file system as before the failure.
If the system was in a specific domain or workgroup, do not join the domain or workgroup at this time. If you are recovering a domain controller, do not perform the domain controller installation process at this time.
615
At the media server: 2. Install the Backup Exec Remote Agent to the remote computer. For more information, see Installing the Remote Agent to Remote Windows Computers on page 793. 3. Start Backup Exec for Windows Servers. 4. From the navigation bar, click Devices, and then inventory the media containing the latest full backup of the computer to be recovered (see Inventorying Media in Devices on page 193). 5. Catalog the media containing the latest full backup of the computer to be recovered. If the subsequent differential/incremental backups are on separate media, catalog those also (see Cataloging Media in a Drive on page 452). 6. From the navigation bar, click Restore, and then select all sets from the full and incremental backups that contain logical drives on the hard disk. If differential backup sets are to be restored, select only the last differential set. Make sure you include System State or Shadow Copy components as part of the restore selections. 7. On the Properties pane, under Settings, click General, and then select the following options:
8. On the Properties pane, under Settings, click Advanced, and then select the appropriate options (see Advanced options for restore on page 464). If you are restoring a computer that is the only domain controller in the domain or the entire domain is being rebuilt and this is the first domain controller, select the option Mark this server as the primary arbitrator for replication when restoring folders managed by the File Replication Service, or when restoring SYSVOL in System State. 9. Click Run Now. 10. After the job completes, reboot the remote computer. Your computers operating system is now restored to its pre-disaster state. Your data files have been restored, except those protected by Backup Exec database agents.
616
Administrators Guide
If you are performing an authoritative restore, continue with these steps: At the remote server: 11. Press <F8> during startup. A menu appears that allows you to diagnose and fix system startup problems. 12. Select Directory Services Restore Mode. At the media server: 13. Launch Backup Exec. 14. From the navigation bar, click Restore. 15. Select System State (Windows 2000 or Windows XP) or Shadow Copy (Windows 2003) components as the restore selections. 16. From the Properties pane, under Source, select Resource Credentials. 17. Highlight the restore selection for the remote server and click New. 18. Create a new logon account for this restore job. The account should have administrator privileges on the remote server. 19. Select the new logon account and click OK. 20. Run the Restore job. At the remote server: 21. At this point, you can either choose to restore the entire Active Directory, or specific objects from the Active Directory: Restore the entire Active Directory by performing the following: a. Open a command prompt.
b. Type NTDSUTIL and press Enter. c. Type Authoritative Restore and press Enter.
d. Type Restore Database, press Enter, click OK and then click Yes. Restore specific objects from the Active Directory by performing the following:
617
a.
b. Type NTDSUTIL and press Enter. c. Type Authoritative Restore and press Enter.
d. Type Restore Subtree "ou=<OU Name>.dc=<domain name>,dc=<xxx> (without the quotation marks), and then press Enter, where <OU Name> is the name of the organizational unit you want to restore, <domain name> is the domain name the OU resides in, and <xxx> is the top level domain name of the domain controller, such as com, org, or net. You can do this as many times for as many objects you need to restore. 22. Once you have finished restoring Active Directory information, exit NTDSUTIL. 23. Reboot the computer. Related Topics: Creating a Manual Restore Job by Configuring Job Properties on page 458 Manual Disaster Recovery of Windows Computers on page 610
618
Administrators Guide
Chapter
13
Troubleshooting
This section provides information on troubleshooting Backup Exec. Note For more information, the Symantec Technical Support web site (support.veritas.com) provides information on error messages, how to/troubleshooting information and software downloads. Problems can be caused by a number of conditions, so when you experience a problem you will need to narrow the possibilities to solve it quickly. Use the following table to help isolate the problem:
If you receive an error See Error Messages on page 623 message in Backup Exec: For performance issues: For issues relating to backing up data: For issues relating to restoring data: To contact Technical Support: See Improving Backup Exec Performance on page 626. See Backup Questions on page 624.
619
Hardware-related Questions
Hardware-related Questions
My drive is not listed in Backup Execs Devices list. The drive is connected, powered on and recognized in the Windows Device Manager. What should I do? First, make sure that your devices are supported by Backup Exec for Windows Servers. Refer to the Hardware Compatibility List available on the Symantec support web site, at http://support.veritas.com/rd/bews-compatibility.htm. If your device is listed on the Hardware Compatibility List, try running Backup Execs Device Configuration wizard and installing VERITAS device drivers (see Configuring Devices on page 128). The VERITAS device driver Installation wizard will find and install the most suitable driver for your storage device. Note The Hardware Compatibility List is frequently updated with newly-supported devices. My drive appears as offline. Why? If the device is offline, this message is displayed. No operations are allowed on the device until it is online again. When the device is online, no message is displayed. Backup-to-Disk folders may go offline if:
The drive containing the Backup-to-disk folder is full. The drive containing the backup-to-disk folder is offline. The remote server containing the Backup-to-disk folder is offline. The device was turned off after Backup Exec was started. The device was being used by another application (such as a Windows 2000/XP/Server 2003 backup utility) when Backup Exec was started. The device is removed from the computer. A tape drive failure occurred (check the Event Log to troubleshoot the problem). A tape is stuck in the drive. The firmware of the drive was updated; Backup Exec will behave as if the drive with its old name or identity no longer exists. Check to make sure the device has power and that cables are properly attached. Turn the device on and reboot the server, or stop and restart the Backup Exec services.
620
Administrators Guide
Hardware-related Questions
Stop the utility that is using the device, and then reboot the server, or stop and restart the Backup Exec services.
To restart the Backup Exec services: From the Tools menu, select Backup Exec Services and then click the Restart all services button. If the drives firmware is updated or changed: If the drives firmware has changed, delete the drive and restart Backup Exec services. After the drive appears with its new firmware identity, retarget all jobs that were using the old drive name to the new drive name. I set up bar code rules through the Tools menu by selecting Options, and then selecting Bar Code Rules. However, my bar code rules dont seem to be working. Why? After setting up bar code rules, you must perform two more steps in order for the bar code rules to work. 1. You must enable the bar code rules for the robotic library by selecting the bar code rules option on the Configuration tab in the robotic librarys properties. 2. In addition to setting the bar code rules for each type of media you use, for each drive in your mixed media library you should indicate what type of media can be used and whether that media can be used for read or write operations. For more information, see Bar Code Rules in Mixed Media Libraries on page 236. How do I get the latest device drivers for my hardware? The latest device drivers for Backup Exec can be found at http://support.veritas.com/rd/bews-drivers.htm. Backup Exec doesnt detect my robotic library. What could be wrong? Be sure that Windows 2000/XP/Server 2003 properly recognizes the device. This can be verified by checking the Windows Device Manager. For configuration and setup instructions, see Symantec Backup Exec - Library Expansion Option on page 1115. You may also want to read Using Microsofts Removable Storage Feature with Backup Exec on page 189. Im getting an error "Storage device [device] reported an error on a request to read/write data to/from media. Error reported: Data error (cyclic redundancy check)." What should I do? The cyclic redundancy check (CRC) error can be caused by many factors. The following list contains the most common reasons for this error and potential ways to resolve the problem:
Chapter 13, Troubleshooting 621
Hardware-related Questions
1. Contaminated read/write heads of the tape device. Check with the hardware manufacturer for proper cleaning techniques. 2. Bad media. Replace the media. Try a new tape that is certified by the hardware manufacturer. 3. Tape driver. Load the appropriate Backup Exec tape driver. The latest Backup Exec tape drivers can be downloaded from the Symantec Technical Support web site at http://support.veritas.com/rd/bews-drivers.htm. 4. SCSI controller wide negotiation not configured properly. If the device is a wide (68 pin) SCSI device, then wide negotiation may and should be used. If the device is a narrow (50 pin) SCSI device, disable wide negotiation. Use the manufacturer's SCSI setup program to disable wide negotiation on the SCSI controller card. 5. SCSI controller transfer rate is too fast. Use the manufacturer's SCSI setup program to lower the SCSI transfer rate. Check with the controller and backup device manufacturer for the proper configuration for the SCSI transfer rate. 6. SCSI controller synchronous negotiation enabled. Use the manufacturer's SCSI setup program to disable synchronous negotiation on the SCSI controller card. Check with the controller and backup device manufacturer for the proper configuration for SCSI synchronous negotiation. 7. Incorrect termination or bad cables. Verify that the SCSI cable is good and that it is configured to provide proper SCSI termination. Do not mix passive and active termination. 8. Confirm that the tape drive is functioning properly. Check with the tape drive manufacturer for diagnostic software to test the condition of the tape drive hardware. 9. General SCSI problems. Isolate the tape drive on its own controller card. Why does my DLT tape drive hang when cataloging some tapes? The DLT tape drive maintains internal information about the tape on a tape directory track. The directory track is updated before the tape is ejected from the drive. If the drive is powered off without ejecting the tape first, this information is lost. Re-generating the tape directory information takes several hours to complete, which makes it seem like the drive is hung. Allow sufficient time for the operation to complete and then eject the tape. Normal operation will resume after the directory track has been updated.
622
Administrators Guide
Error Messages
A backup to my DLT tape drive is stuck at 99% complete. What should I do? The backup most likely fails to complete because the Eject media after job completes option is selected on tape drives that require you to manually remove the tape (such as Digital Linear Tape (DLT), Linear Tape-Open (LTO), Travan, and Onstream drives). To remedy this situation, either deselect the Eject media... option or using BEUTILITY, you can configure Backup Exec to set automatic responses to the media alert (see Editing Media Server Configurations on page 737). Related Topics: Configuring Devices on page 128 Error Messages on page 623 Improving Backup Exec Performance on page 626
Error Messages
Backup Exec generates an error message when a condition occurs that is important enough to warrant your attention, or requires that you submit a response. Most alerts and error messages are self explanatory, but there may be times when you need to get more information to resolve an error condition. There are two ways to get more information on Backup Exec error messages.
Look in the job log and follow the link for the Unique Message Identifier (UMI) error message Unique Message Identifier (UMI) Error Codes In Job Logs on page 432. Search the Symantec technical support knowledge base for the error. From the Help menu, click Symantec on the Web and then select Search Knowledge Base.
Related Topics: Error-Handling Rules on page 439 Hardware-related Questions on page 620.
623
Backup Questions
Backup Questions
I am unable to back up certain files on my system that are being used by other processes. Why is that? When Backup Exec encounters a file that is in use by another process, it either skips the file or waits for the file to become available, depending on the Backup open files setting. When Backup Exec is configured to back up open files, it attempts to open the files in a different mode. It locks these files while they are being backed up to prevent other processes from writing to them. This mode should be a last resort to obtaining a backup of open files; in most circumstances, it is more desirable to close applications that leave files open so their files may be backed up in a consistent state. If you want to back up open files on Windows computers, Backup Execs Advanced Open File Option (sold separately) provides uninterrupted data protection for network environments. Why do Backup Execs consoles continue to own a storage device even when it's not running? Backup Exec is a true client/server application that must always be available to process jobs submitted from both local and remote administrative consoles. Because of the Advanced Device and Media Management functionality, all storage devices attached to the media server are claimed by Backup Exec whenever the server is running. The Advanced Device and Media Management feature in Backup Exec requires constant control of the storage devices in order to perform two important and useful operations: collection of statistics on media and device usage, and media overwrite protection. When performing a local backup, the total number of bytes backed up by Backup Exec does not match the number of bytes displayed by Windows. Why? This problem may be caused by the type of partition for which the system is formatted. If you have a Windows NTFS compressed partition, Backup Exec displays the uncompressed byte count of the files being backed up while Windows Explorer displays the compressed byte count of the files on the hard drive. For example, a NTFS partition that contains 1 GB of data is compressed by Windows to 500 MB. Backup Exec reports that 1 GB of data was backed up, even though Windows Explorer displays that only 500 MB of compressed data exists on the hard drive. If you have a FAT partition, Backup Exec reports the actual number of bytes of the files being backed up while File Manager reports an inflated amount of disk space. For example, a 2 GB FAT partition has a 32 K cluster size and File Manager displays 1.9 GB of used space. Backup Exec reports that 1.4 GB of data was backed up. Assuming that a 50 MB pagefile.sys is excluded from the backup, there is a 450 MB difference in the number of bytes.
624 Administrators Guide
Backup Questions
Converting to NTFS will regain disk space since it is more efficient and the default cluster size (automatically set by Windows) in NTFS is less than FAT. Windows allows you to specify a cluster size other than the default; however system performance may decrease. For more information, see the Windows documentation. The following tables display the cluster sizes for NTFS partitions.
NTFS Partition Cluster Sizes Partition Size (MB) <= 255 256 - 511 512 - 1023 1024 - 2047 Cluster Size 512 1024 2048 4096
The following tables display the cluster sizes for FAT partitions.
FAT Partition Cluster Sizes Partition Size (MB) <= 127 128 - 255 256 - 511 512 - 1023 512 - 1023 Cluster Size (K) 2 4 8 16 32
Related Topics: Backing Up Data on page 259 Hardware-related Questions on page 620. Improving Backup Exec Performance on page 626.
625
Restore Questions
Restore Questions
Sometimes the byte counts for data that I restore dont match the byte counts indicated when the data was initially backed up. Why? When data backed up from an NTFS volume is restored to an NTFS volume, the byte count will match between the backup and restore operations. However, when data backed up from a NTFS or FAT volume is restored to a FAT volume, the byte count restored is expected to be less than that backed up. The reason for the discrepancy is that the Windows returns a default ACL (access control list) for FAT data; the stream of data is backed up (and the bytes are counted) but is discarded during a restore (and the bytes are not counted). Related Topics: Restoring Data on page 451 Hardware-related Questions on page 620.
Hardware
The speed of the disk controller and hardware errors caused by the disk drive, the tape drive, the disk controller, the SCSI bus, or the improper cabling/termination can slow performance. Confirm that the controller is rated for the tape backup hardware and that the SCSI Bios Settings are set properly. Newer models of SCSI Controllers are set to communicate with SCSI Hard Drives by default. Most tape drives can only handle a maximum sync transfer rate (bus speed) of between 3 to 22 MB/sec when utilizing hardware compression. Speed in excess of this will not only affect the ability for data to write to the tape in a continuous stream, but can also potentially damage the tape hardware. In addition, you should also make sure that:
Enable disconnect and enable Sync Negotiation is set to NO (in most cases). Initiate Wide Negotiation is set to Yes when the tape device is connected to a 68 pin wide SCSI Cable Connector. Tape drives are not connected to a SCSI Raid Controller.
626
Administrators Guide
System
The capacity and speed of the media server performing the backup, or the remote system being backed up significantly impacts performance. System activity during backup also impacts performance. Fragmented disks take a longer time to back up. Heavily fragmented hard disks not only affect the rate at which data is written to tape, but also affect the overall system performance. Fragmented files take longer to back up because each segment of data is located at a different location on the disk, which causes the disk to take longer to access the data. Make sure you defragment disks on a regular basis.
Memory
The amount of available memory will impact backup speed. Insufficient memory, improper page file settings, and a lack of available free hard disk space will cause excessive paging and slow performance. The average file can potentially compress at a 2:1 ratio when hardware compression is used. Higher and lower compression occur depending on the type of files being backed up. Average compression can double the backup speed, while no compression runs the tape device at its rated speed. Image and picture files are fully compressed on disks. Therefore, no hardware compression takes place during the backup causing the tape drive to operate at its native (non-compression) rate of speed. Hardware compression is performed by the tape device and not the backup software.
File Types
Compression Successful compression can increase the tape drive's data transfer rate up to twice the native rate. Some tape drives use the Lempel-Ziv (LZ1) compression algorithm for its superior versatility and efficiency. Compression can be highly variable depending on your input data. Compression algorithms look for repeatable data patterns that can be compacted. Image files from a graphical program like Microsoft Paint, may compress at 4.5:1 or more, while binary files may compress at just 1.5:1. Data that has already been compressed or random data (such as encrypted data or MPEG files) may actually expand by about five percent if you attempt to compress it further. This can reduce drive throughput. Files The total number of files on a disk and the relative size of each file impacts backup performance. Fastest backups occur when the disk contains fewer large size files. Slowest backups occur when the disk contains thousands of small files. A large number of files located in the same directory path back up more efficiently than backing them up from multiple directory locations.
627
Block Size
Larger block sizes improve the compression ratio, which helps the drive to achieve better throughput and more tape capacity. Make sure that the block and buffer size are set properly. The throughput will increase in proportion to the compression achieved, until the drive's maximum throughput is reached. Symantec does not recommend increasing the Block Size above the default settings. The backup speed for a remote disk is limited by the speed of the physical connection. The rate at which a remote server's hard disks are able to be backed up depends on:
Network
The make/model of network cards. The mode/frame type configuration for the adapter. The connectivity equipment (hubs, switches, routers, and so on). Windows Settings.
Local disk drives on the media server can usually be backed up at a higher rate of speed than backing up remote servers across a network.
Know your Backup Exec version and revision number (see Finding Version and Revision Information for Your Backup Exec Installation on page 629) Use one of the diagnostic utilities (see Locally, the version and build information can be located by selecting the About Backup Exec option from the Help menu. on page 629) included with Backup Exec to collect information that technical support can use to diagnose your issue.
628
Administrators Guide
Finding Version and Revision Information for Your Backup Exec Installation
Locally, the version and build information can be located by selecting the About Backup Exec option from the Help menu.
BEDiag.EXE generates a comprehensive diagnostic file that contains specific environmental information such as service information, registry settings, user privileges, and file versions. This diagnostic file can be used in conjunction with many Symantec Backup Exec knowledgebase articles to resolve your issue more quickly. Running BEDIAG.EXE to Generate a Diagnostic File for Troubleshooting on page 629 BEGather.exe captures the most common diagnostic and historical files necessary for troubleshooting purposes. By default BEGather will find Windows Event Logs, Backup Exec Installation logs, Backup Exec internal application logs, and when present, BEGather also executes BEDIAG. These files can then be used either by you or Symantec Technical support to resolve your issue more quickly. . See Running BEGather to Collect Log File Information for Troubleshooting on page 632.
Account groups, account privileges and environment settings. Backup Exec software version and registry information, Backup Exec Agent listing, Windows version information, SCSI hardware configuration, SQL Server information, Driver services information and Windows Services information. Server information, supported shared directories and Windows sockets information.
629
Note You can also run BE Diagnostics for a remote server (see Running BEDiag on a Remote Computer on page 631) To create a BEDIAG.TXT from within Backup Exec: 1. Start Backup Exec. 2. On the Tools menu, select Backup Exec Diagnostics. Note You can also create a BEDIAG.TXT file from the Device view. On the navigation bar, click Devices. Select the media server. On the Task pane, under General Tasks, click Properties. Then select the System tab. 3. Click Run Diagnostics. The BEDiag text file will appear. From a command line prompt on the media server: 1. Launch the command prompt. 2. From the directory ...\Backup Exec\NT\", type bediag servername (the server can be the local media server or a remote server. If you are running this from a workstation, type bediag workstationname). 3. The file BEDIAG.TXT will be created in the directory containing BEDIAG.EXE (by default ...\Backup Exec\NT\). 4. The following switches can be used with the command line option (bediag [switches] servername):
Meaning Dump Agent List Specify a Backup Exec server to poll for service account information Dump Backup Exec software configuration from the registry Dump Application Event log Dump System Event log
630
Administrators Guide
Meaning Dump only Backup Exec entries in the Application Event log Dump only error events from any event log Dumps only newest n records from given event logs ***The bex, err and recs switches must be used in conjunction with the app and/or sys switches
/o:[file]
Specifies output job log for append ***Omitting [file] will send output to the screen
/h /l /n /p /q /s /u /v /w /x /?
Dump SCSI hardware subkey from registry Dump Lotus Notes information Dump Windows Socket Network Protocols Dump user privileges Dump Microsoft SQL Server information Dump information on Services Dump Microsoft update information. Dump Server Information Dump Windows version information Dump Microsoft Exchange Server Information Display usage information
Running BEDiag on a Remote Computer You can run diagnostics on a remote media server provided:
Backup Exec is installed on the remote server. Backup Exec services are running.
631
To run BE diagnostics on a remote media server: 1. On the Tools menu, click Backup Exec Diagnostics. 2. Click Select Server and select the remote media server on which you want to run the diagnostic utility. 3. Enter the logon credentials for this remote system. 4. Click Run Diagnostics. Diagnostic information appears in a .TXT file. To print this information, on the File menu select Print.
632
Administrators Guide
not evident based on the gathered logs, please have these logs available when contacting support. The support technician may request an e-mail containing the log files.
On the Help menu, click Symantec on the Web and then select Open DirectAssist e-Support Case.
You will automatically be connected to the Symantec Technical Support site, where you can learn more about Symantec DirectAssist and download the application. Related Topics: Contacting Technical Support on page 628
633
634
Administrators Guide
Chapter
14
The directories and drives on the workstation that you want the media server to be able to access for operations (these are called published directories or drives). The level of access that the Backup Exec administrator has to each published directory and/or drive. For example, you can assign a password to any directory or drive. Then, before the directory or drive can be backed up, the administrator must provide that password. You can also designate directories or drives as read-only, which prevents data from being restored to those directories or drives.
635
You must have access to the Network option on the workstations Control Panel. The server must run the IPX/SPX or TCP/IP network protocols.
636
Administrators Guide
637
Computer Name
Password
638
Administrators Guide
The Backup Exec Windows 98 and Windows Me Agents Backup Exec Agent Publisher Properties (continued) Option Current Status Action Displays the current status of the agent. Status messages include: Not Running, Idle, and Connected. Not Running indicates the agent is either disabled or shut down. Idle indicates the agent has loaded and is waiting for a connection by a user or the media server. Connected indicates that a user or the media server has connected to the agent and is accessing it.
Registry Allow Registry to be restored Published Folders Name, Path, Access Control Lists any published directories and drives, or their aliases, and the level of access control assigned. By default, all local drives are published. Used to add directories and drives to the list of published folders. Used to remove the selected directory or drive from the list of published folders. Used to change the access control for published folders. Enables the workstations Windows 98/Me registry to be restored.
Add
Remove
Details
Related Topics: Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent on page 639 Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent on page 641
Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent
To have the media server back up drives and directories, you must add them (or publish them) to the Published Folders list (all local drives are published by default). You can list up to eight published folders. When you publish the drives and directories, you can also choose to password-protect them, or to designate them as read only.
639
To publish drives and directories using the Windows 98/Me Agent: 1. For Windows 98 or Windows Me, click Start and then click Settings. Click Control Panel and then double-click Network. 2. Click the Configuration tab. 3. In the list of installed network components, double-click Backup Exec Agent. 4. At the bottom of the General tab, click Details. 5. Select the appropriate options as follows:
Folder Details options Item Path Description Enter the path to the folder you want to protect, or click Browse to help locate a folder. (Optional) In Folder Name, enter an alias that you want to use for this folder. (Optional) Sets or changes access control for a published folder, do one of the following Password-protects a published folder. Using a password protects the published folder from unauthorized backup. Designates the folder as read-only. Clicking Read Only enables only backup operations to be performed on the path; restore operations are not allowed.
Folder Name
Access Control
6. Click OK. The drives and folders you selected, and any access control that you designated for those folders, are displayed in the Published Folders window on the Backup Exec Agent Properties dialog box.
640
Administrators Guide
Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent
To use the Backup Exec Windows 98/Me agent, the computer on which Backup Exec is installed must be running either the IPX/SPX or TCP/IP communications protocols. Choosing which protocol to use is your decision; either one can be used, or you can run them both simultaneously. If you use TCP/IP, make sure all Backup Exec Windows 98/Me agent computers are configured to advertise their IP addresses directly to the media server and servers that are used for remote administration purposes. No additional configuration is needed when the IPX/SPX protocol is used. To set up and run the IPX/SPX or TCP/IP protocols on the media server, refer to your Windows documentation. Note If you use Dynamic Host Configuration Protocol (DHCP) on a media server or a server that is used for remote administration purpose, and plan to use the Windows 98 Agent on TCP/IP, read the following: By using DHCP to dynamically configure the IP address of the host computer running Backup Exec for Windows Servers, the possibility exists that a different IP address will be assigned to the host computer each time it is restarted. Because the IP address assigned to the Backup Exec Windows 98/Me agent during agent installation is supposed to match the IP address of the computer running Backup Exec, agent-to-host communication problems may occur since the hosts IP address might change each time it boots. You can also enter a DNS host name instead of an IP address. This eliminates the need for a static IP address. In order to ensure that the Backup Exec Windows 98/Me agent consistently communicates with the Backup Exec host computer, you should RESERVE an IP address for the host running Backup Exec using the Windows DHCP Administrator program. Refer to your Windows documentation for details. To configure the Windows 98/Me Agent network protocol: 1. For Windows 98 or Windows Me, click Start and then click Settings. Click Control Panel and then double-click Network. 2. Click the Configuration tab.
641
3. In the list of installed network components, double-click Backup Exec Agent. 4. Click the Protocol tab. 5. Select the appropriate options from the following:
Backup Exec Agent Publisher options Item SPX/IPX Description Configures the Backup Exec Agent for use with SPX/IPX-based networks. Typically used with Novell NetWare-based networks. Configures the Backup Exec Agent for use with TCP/IP-based networks. TCP/IP is the communications protocol typically used in heterogeneous networks. Shows all previously configured media servers.
TCP/IP
6. If you select TCP/IP, click Add. 7. In the Adding Media Server box, type the host name or IP address of the media server that will be used to back up this computer, then click OK. 8. Click OK to close the Backup Exec Agent Properties dialog box.
Installing and Configuring the Macintosh Agent on a Mac OS X Computer on page 643 Requirements for Running the Backup Exec Macintosh Agent on page 643
To install the Mac OS X Agent, the root account must be activated and you must have access to it. The Mac OS X BSD Subsystem and its associated utilities must be installed. A media server must be reachable from the host using DNS, NIS, NetInfo, LDAP, or another naming system. Otherwise, the media server must be added to the local NetInfo database on the host. As a third option, you can also use the Backup Exec media servers IP address, in place of the media server name. Agents using the TCP/IP protocol must be enabled from the Backup Exec media server.
643
7. Using Finder, select Applications and then Utilities and then Terminal. 8. In the Terminal window, change to the root user by typing su at the command prompt and then pressing <Enter>. 9. Because the Macintosh Agent must communicate with the Backup Exec media server, you must either specify the IP address, use a naming service or enter the media servers IP address in the NetInfo database in order for communications to occur.
To use a naming service (DNS, NIS, LDAP, etc.), you must configure the Macintosh to use this feature. For more information, see your Macintosh OS X documentation. To use the media servers IP address, specify it in place of the media servers name in step 31. To use NetInfo, perform the steps listed in Modifying the NetInfo Database on page 648 and then continue with step 10 in this section.
10. Copy the be_agnt.tar file, which contains the Macintosh OS X Agent, to a temporary directory on the workstation to be protected. The be_agnt.tar file is located on the Backup Exec installation CD and in the Agents subdirectory of the Backup Exec media servers Programs directory. You can copy the file to the workstation via the network using FTP, a Macintosh share on the media server, or any other method you prefer. Or you can insert the Backup Exec installation CD in the workstation to be protected and copy the file from the CD. Note If you are pushing the Macintosh OS X Agent from the media server to the workstation using FTP, ensure that you use the binary transfer mode, not the ascii mode. Prior to starting the file transfer, type binary at the command prompt on the media server, and then press <Enter>. 11. At the workstation, from the temporary directory you want to use, type tar -xvf be_agnt.tar 12. Press <Enter>. 13. Then, run the installation script by typing: ./INSTALL 14. Press <Enter>.
644
Administrators Guide
The installation begins by reporting the Macintosh platform to which the agent is being installed. You are prompted for information to complete the installation and configuration of the Backup Exec Macintosh Agent. 15. If prompted, select a language by typing the number that corresponds to the language you want to use, then press <Enter>. 16. Enter the full directory path where you want the Backup Exec Macintosh Agent to be installed. By default, the agent is installed in /etc/bkupexec. You can specify another directory. If the full directory path that you specify does not exist, you are prompted to have it created. 17. Enter the name for this workstation. By default, the network node name is used. If you want to use a different name, make sure it is a unique name not used by other Backup Exec Macintosh agents. 18. You can choose to require a password for this workstation. If you do, you are prompted to enter a password. For Backup Exec 9.x and later, to access the workstation you must create a Backup Exec logon account that uses the same password as the one entered here. The logon account user name is ignored. Add this logon account as the resource credential for the workstation. For more information, see Configuring Logon Accounts on page 386 and Changing and Testing Logon Accounts for Resources on page 292. For problems encountered when passwords are changed, see Troubleshooting Workstation Agents on page 656. 19. You are asked about the number of network interfaces in your workstation. If you have more than one network interface, you are asked if you want to specify which network interface to use. If you answer yes, then you must specify an IP address of a local network interface for the agent to use. Should you have more than one network interface and choose not to specify which one to use, the agent will use an appropriate interface to communicate with a media server 20. Enter the directory path that you want backed up. If you want to back up the Macintosh workstations entire hard disk, simply define a directory path as /. This allows the network administrator to select the entire disk for backup. You can create and publish up to eight unique directory paths. Note If your computer has more than one file storage volume on the same physical hard disk, or has more than one hard disk, then specifying the root directory (/) for backup will not protect all of the volumes. To back up the desired additional
Chapter 14, Symantec Backup Exec - Workstation Agents 645
volumes, they must be specified individually. For example, to back up a disk called Videos, you must also specify /Volumes/Videos as one of the directories to be backed up. 21. Enter a unique resource name for each published path. The resource name is used by the media server to identify the contents of each published path. If you chose a directory path of /, by default the resource name is [root]. For any other path, the default name is the path name. 22. To allow files to be restored to a published path, type y, when prompted. If you do not want to allow the Backup Exec application to restore files, type n. 23. You can choose to require a password for each published path. If you choose to password-protect the path, the password is required before Backup Exec can perform operations on this path. 24. You can continue to publish directory paths for backup and restore operations by repeating these steps. 25. When you have finished creating published paths, you are prompted to enter the names of the media servers that will back up your workstation. A maximum of twenty media servers is allowed. After entering a media server name, the server is located and added to the list of valid media servers. 26. You are prompted to enter the frequency (in seconds) that you want the Backup Exec Macintosh Agent to send advertisement messages to the media servers so that the servers are aware that the workstation is accessible. Note It is recommended that you use the default frequency of 30 seconds. 27. You are prompted to choose a method to back up symbolic links. Choose one of the following methods:
Method 1: The symbolically linked directory is handled as a special file and only the information required to create the symbolic link is backed up. Method 2: The symbolically linked directory is backed up as a normal directory. All files and subdirectories within the symbolically linked directory are also backed up.
646
Administrators Guide
28. After choosing a backup method for symbolic links, your Backup Exec Macintosh Agent configuration is complete. You can edit the agent.cfg file to change your agent configuration at any time. Changes to the configuration file take effect after the Macintosh workstation is rebooted. 29. Start the Mac OS X Agent by moving to the folder where the Backup Exec Macintosh Agent is installed. 30. At the command prompt, type: ./agent.be & The agent starts and runs in the background. The data on the Macintosh is now available for backup.
647
648
Administrators Guide
About the Backup Exec 8.x and 9.x Agent for Unix
About the Backup Exec 8.x and 9.x Agent for Unix
The Backup Exec 8.X and 9.x Agent for Unix allows Windows Server network administrators to perform backup and restore operations on UNIX workstations and servers that are connected to the network. This agent must be running on the UNIX device before backup or restore operations can be performed. After the agent is configured and the UNIX device is restarted, the workstation is ready for backup. When backing up data using the Backup Exec 8.x and 9.x Agent for Unix, Backup Exec allows you to protect data using multiple backup types. These include:
Full - Back up files - Allow incrementals and differentials using modified time Differential - Using modified time Incremental - Using modified time Working set - Back up files - Changed today
Related Topics: Understanding Backup Methods and Their Advantages on page 354 Requirements for Running the Backup Exec 8.x and 9.x Agent for Unix on page 649 Installing the Backup Exec 8.x and 9.x Agent for Unix on the Workstation on page 650 Configuring the Backup Exec 8.x and 9.x Agent for Unix on page 653
Requirements for Running the Backup Exec 8.x and 9.x Agent for Unix
You must have root privileges on the UNIX computer to install the UNIX agent. TPC/IP is required on the media server. The names and IP addresses of each media server used to access UNIX workstations must be in the /etc/hosts file on the UNIX workstations.
649
About the Backup Exec 8.x and 9.x Agent for Unix
Installing the Backup Exec 8.x and 9.x Agent for Unix on the Workstation
When you install the Backup Exec 8.x and 9.x Agent for Unix, you are prompted to configure it as well. The agent configuration information is saved to a text file called agent.cfg that you can edit to change any configuration options. Before installing the Backup Exec 8.x and 9.x Agent for Unix on a system using a network name service (for example NIS), you must modify the networks master database /etc/services file. Make sure you have root privileges at the master server. Note During the initial installation of Backup Exec, the Backup Exec 8.x and 9.x Agent for Unix files are copied automatically from the Backup Exec installation CD to the Program Files\VERITAS\Backup Exec\NT\Agents\UNIX directory on the media server. To modify the /etc/services files: 1. Edit the input file (/etc/services) for the map you want to change. 2. Add the following line, then save and exit the file: grfs 6101/tcp # Backup Exec Agent 3. Type the following: cd /var/yp make services.byname The make command updates the NIS map according to the changes made to the input file, then propagates the changes to all other NIS servers on the network. The Backup Exec 8.x and 9.x Agent for Unix is then installed by using ftp to push the agent files from the server to the workstation. Installing the Backup Exec 8.x and 9.x Agent for Unix from the Server: 1. Log on as root on the media server, and put the Backup Exec installation CD in the servers CD-ROM drive. 2. Transfer the file be_agent.tar to the Linux or UNIX workstation. Transfer methods include FTP, NFS, SAMBA, and SCP. See your system administrator for transfer details.
650
Administrators Guide
About the Backup Exec 8.x and 9.x Agent for Unix
3. Because the UNIX agent file must be pushed from the server to the workstation in binary mode, change from the ASCII default mode to the binary mode by typing the following at the prompt: binary <Enter> 4. Create a temporary directory on the workstation. If you prefer, you can use the /tmp directory. Go to the temporary directory or /tmp directory, and then type put be_agnt.tar <Enter> 5. At the workstation, from the temporary directory you want to use, type tar -xvf be_agnt.tar <Enter> 6. Then, run the installation script by typing: ./INSTALL <Enter> The installation begins by reporting the UNIX platform to which the agent is being installed. You are prompted for information to complete the installation and configuration of the Backup Exec 8.x and 9.x Agent for Unix. 7. If prompted, select a language by typing the number that corresponds to the language you want to use, then press <Enter>. 8. Enter the full directory path where you want the Backup Exec 8.x and 9.x Agent for Unix to be installed. By default, the agent is installed in /etc/bkupexec. You can specify another directory. If the full directory path that you specify does not exist, you are prompted to have it created. 9. Enter the name for this workstation. By default, the network node name is used. If you want to use a different name, make sure it is a unique name not used by other Backup Exec 8.x and 9.x Agents for Unix. 10. You can choose to require a password for this workstation. If you do, you are prompted to enter a password. 11. You are asked about the number of network interfaces in your workstation. If you have more than one network interface, you are asked if you want to specify which network interface to use. If you answer yes, then you must specify an IP address of a local network interface for the agent to use. Should you have more than one network interface and choose not to specify which one to use, the agent will use an appropriate interface to communicate with a media server.
651
About the Backup Exec 8.x and 9.x Agent for Unix
12. Enter the directory path that you want backed up. If you want to back up the workstations entire hard disk, simply define a directory path as /. This allows the network administrator to select the entire disk for backup. You can create and publish up to eight unique directory paths. 13. Enter a unique resource name for each published path. The resource name is used by the media server to identify the contents of each published path. If you chose a directory path of /, by default the resource name is [root]. For any other path, the default name is the path name. 14. To allow files to be restored to a published path, type y, when prompted. If you do not want to allow the Backup Exec application to restore files, type n. 15. You can choose to require a password for each published path. If you choose to password-protect the path, the password is required before Backup Exec can perform operations on this path. 16. You can continue to publish directory paths for backup and restore operations by repeating these steps. 17. When you have finished creating published paths, you are prompted to enter the names of the media servers that will back up your workstation. A maximum of twenty media servers is allowed. After entering a media server name, the server is located and added to the list of valid media servers. Note You can also enter the media servers IP address in place of the media servers name. 18. You are prompted to enter the frequency (in seconds) that you want the Backup Exec 8.x and 9.x Agent for Unix to send advertisement messages to the media servers so that the servers are aware that the workstation is accessible. Note It is recommended that you use the default frequency of 30 seconds. 19. You are prompted to choose a method to back up symbolic links. Choose one of the following methods:
Method 1: The symbolically linked directory is handled as a special file and only the information required to create the symbolic link is backed up.
652
Administrators Guide
About the Backup Exec 8.x and 9.x Agent for Unix
Method 2: The symbolically linked directory is backed up as a normal directory. All files and subdirectories within the symbolically linked directory are also backed up.
After choosing a backup method for symbolic links, your Backup Exec 8.x and 9.x Agent for Unix configuration is complete. You can edit the agent.cfg file to change your agent configuration at any time. Changes to the configuration file take effect after the UNIX workstation is rebooted.
Configuring the Backup Exec 8.x and 9.x Agent for Unix
To configure the Backup Exec 8.x and 9.x Agent for Unix, edit the agent configuration file, agent.cfg, and make changes. By default, the agent.cfg file is installed on each UNIX agent workstation in the /etc/bkupexec subdirectory. You can use any text editor to make changes to the agent.cfg file. The first portion of the agent.cfg file contains instructions that define and explain each of the configuration lines. The actual agent configuration commands are found at the end of the file. The following table lists the commands and parameters used with the Backup Exec UNIX agent.cfg file. Commands are bold; parameters within [] are optional.
Agent.cfg Commands Item name <workstation name> Description Use this command to enter another name for this workstation. This name appears in the Backup Exec selection screens. This item is optional. If a workstation name is not provided, the workstations network node name (for example, uname -n) is used.
653
About the Backup Exec 8.x and 9.x Agent for Unix Agent.cfg Commands (continued) Item password <passwd> Description Use this command to assign a password to this workstation. If you assign a password, then in order to access this workstation, the Backup Exec administrator must enter the password during operations. If a password was not provided during installation, the Backup Exec administrator must press <Enter> when prompted for a password. This item is optional. For Backup Exec 9.x and later, to access the workstation, you must create a Backup Exec logon account that uses the same password as the one entered here. The logon account user name is ignored. Add this logon account as the resource credential for the workstation. For more information, see Configuring Logon Accounts on page 386 and Changing and Testing Logon Accounts for Resources on page 292. For problems encountered when passwords are changed, see Troubleshooting Workstation Agents on page 656. export Use this command to specify a directory tree to publish so that it will be accessed by Backup Exec. The following commands are used with export:
<resourcename> - Use this command to identify the exported paths of the agent workstation. This name appears in the Backup Exec Networks window under Backup Exec Agents. [write_protected] - Use this command if you want the published path to be accessed for backup operations but not for restore operations. <password> - Use this command to assign a password to a specific published path. The Backup Exec administrator is required to enter the password before the published path can be accessed by backup operations. [include_remote]- Use this command to access remotely mounted (NFS) file systems through their normal mount points. export / as ROOT include_remote <no_nfs_locking> - Use this command to prevent locking of files during backup operations if they are located in remotely mounted file systems with mount points within a directory tree.
654
Administrators Guide
About the Backup Exec 8.x and 9.x Agent for Unix Agent.cfg Commands (continued) Item tell <machine name> Description Use this command to specify a media server name as an argument. This server name is added to the list of computers to which advertisements will be sent. This machine name must be found in the /etc/hosts file. Use this command to specify the number of seconds the agent waits before re-advertising itself to the media server. If you enter a number other than the default setting (30 seconds), the number should not be more than a few minutes or less than 60 seconds. Longer numbers cause a delay in the workstations network broadcast verification and shorter numbers cause excessive network traffic. Each advertisement transaction requires eight (8) network packets. Use this command to specify that the contents of the linked directories be backed up but not the symbolic links themselves. By default, the contents of symbolically linked directories are not backed up, but the symbolic links themselves are. Use this command to specify individual files which should never be backed up. The <filename> must include a fully specified path. No wildcards are permitted. Use this command to exclude individual directories or directory trees from being backed up. The <directory path> must be fully specified. Use this command to force the agent to ignore the message which sets objects (files and directories) attributes when a backup occurs. Normally, during a backup, the backup engine preserves an objects last access timestamp by resetting the last access timestamp to the value before the backup occurred. When the agent modifies the objects last access timestamp, the OS internally updates the objects ctime. An objects ctime is the time when an objects attributes (permissions, timestamps, etc.) have been modified. By not attempting to reset the attributes after a backup, the objects ctime is not updated. This option does not affect object attributes set during restore operations.
tell_interval <number_of_seconds>
follow_symdirs
exclude_file <filename>
preserve_ctime
655
Loading the Backup Exec 8.x and 9.x Agent for Unix
Loading the Backup Exec 8.x and 9.x Agent for Unix
Load the Backup Exec 8.x and 9.x Agent for Unix using the following command: /etc/bkupexec/./agent.be & Note If the agent.cfg file is not located in the default Backup Exec 8.x And 9.x Agent for Unix installation directory, use the -c parameter in conjunction with a path to the location of the agent.cfg file when loading the agent. For example, /etc/bkupexec/./agent.be -c <path_location_of_agent.cfg> &
Modify the job by clearing the selection of the specified published directory, and then reselecting it. You are prompted for new credentials. Update the corresponding logon account credentials stored in Backup Exec with the new password for the published directory. At the workstation, disable access to published directories that use passwords and configure the workstation itself to require password authentication.
656
Administrators Guide
Chapter
15
Backing Up VERITAS Cluster Servers on page 692 Restoring Data to VERITAS Cluster Servers on page 696
658
Administrators Guide
Two-node clusters are supported with Backup Exec for Windows Servers on Microsoft Windows 2000 Advanced Server, Windows Server 2003 Enterprise, Microsoft Windows 2000 DataCenter, and Windows Server 2003 DataCenter. Four-node clusters are supported with Backup Exec for Windows Servers on Microsoft Windows 2000 DataCenter, Windows Server 2003 Enterprise, and Windows 2003 DataCenter. Up to eight-node clusters are supported with Backup Exec for Windows Servers on Microsoft Windows Server 2003 DataCenter. Backup Exec clusters can be installed on a Windows Server 2003 majority node configuration. However, there must be a shared disk in the configuration in order for Backup Exec to share its database files between nodes. In this type of configuration, if the majority of the cluster nodes fail, then the entire cluster will fail. This configuration normally uses more than two nodes in the cluster configuration. The controlling node and designated failover nodes must be online during installation of Backup Exec into the cluster. A unique IP address and a unique network name for the Backup Exec virtual server is required during installation. During installation of a Backup Exec cluster, the node that runs the installation should own the shared disk. If you use a physical disk resource that belongs to another application, the Backup Exec Cluster Wizard will move all the resources that belong to the other application into the Backup Exec group. It is recommended that Backup Exec not be installed on the cluster quorum. An individually licensed copy of Backup Exec for Windows Servers, as well as any applicable agents and options, is required for each active node in the cluster as defined in the End User License Agreement. When installing an evaluation version of Backup Exec, a cluster environment is automatically detected and serial numbers are not required. When you install Backup Exec clusters in a SAN SSO configuration, all Backup Exec installations must have the same server configuration. Either all nodes should be database servers or all nodes should be secondary member servers connecting to the same primary. All Backup Exec installations into a cluster must either be part of a single cluster group, or be locally installed on each node. If cluster-aware Backup Exec is installed in a cluster as well as a locally installed version of Backup Exec (not cluster-aware), then you cannot log on to the locally installed Backup Exec media server. You can
659
only log on using the Backup Exec virtual server name. To be able to log on to the locally installed Backup Exec media server, you must first use the Cluster Configuration Wizard to uninstall cluster-aware Backup Exec from all the nodes in the cluster.
Use the same account for Backup Exec services on all nodes in the cluster. If nodes in a cluster use Backup Exec and have different accounts, change the services to use the same account.
Related Topics: Installing Backup Exec on a Microsoft Cluster Server on page 660 Configurations for Backup Exec and Microsoft Cluster Servers on page 670
660
Administrators Guide
Note On the Virtual Server Information screen, Backup Exec automatically displays a default name called BACKUPEXECVRS for the virtual server. Type a new default name if you do not want to use the default. 5. When the Cluster Configuration Wizard completes, create a device pool that contains all the locally attached storage devices on each node to be used when failover occurs. This ensures that jobs can be run on the storage devices that are attached to the failover nodes. For more information, see Creating Device Pools for Microsoft Cluster Servers on page 664. Related Topics: Creating Device Pools for Microsoft Cluster Servers on page 664 Enabling or Disabling Checkpoint Restart on page 667 Configurations for Backup Exec and Microsoft Cluster Servers on page 670 Specifying a Different Failover Node on page 668
661
To upgrade Backup Exec 9.0.4454 and above on a cluster: 1. Select a node to upgrade and make that node the active Backup Exec cluster node. 2. Run the Backup Exec installation program on the active node. 3. Move the cluster group to the next node you want to upgrade, and then run the Backup Exec installation program on that node. 4. Repeat step 3 for each node in the cluster. Related Topics: Installing Backup Exec on page 65
662
Administrators Guide
663
664
Administrators Guide
NTFS GRFS Exchange mailboxes and public folders Exchange 2000 and 2003 IS with multiple storage groups SQL database non-snapshot backups System State Lotus Domino Exchange 5.5 IS and DS Exchange 2000 and 2003 IS with one storage group GRFS Oracle NTFS Image sets NTFS Snapped volumes SQL database snapshot backups SQL transaction log backups NetWare SMS (the checkpoint restart option should be disabled for NetWare backups using the Remote Agent) The Advanced Open File Option. The offhost backup feature in the Advanced Disk-based Backup Option. When the option Collect additional information for synthetic backups is selected for the synthetic backup feature in the Advanced Disk-based Backup Option. Incremental backups based on the archive bit.
665
Jobs that are restarted from the point of failover display a status of Resumed in the Job Monitor. Before using checkpoint restart, review the following:
If a resource was completely backed up prior to a cluster failover, that resource is skipped upon checkpoint restart, regardless of whether the backup type or file type of that resource is supported by checkpoint restart. This saves media space and backup time. If failover occurs in the middle of backing up a resource, the media that was being used at the time of the failover is left unappendable and new media will be requested upon restart. It is recommended that you select an appropriate media overwrite protection level to ensure that media that was used prior to the failover is not overwritten upon restart. The data that is backed up upon restart is part of a different backup set than the data that was backed up prior to the failover. Separate catalog backup set entries are created for the data backed up prior to the failover and after the failover. In addition, if multiple cluster failovers occur during the backup of a given resource, a different backup set is created each time the job restarts. These multiple backup sets allow potential for duplication of backed up data. It is important to restore the backup sets in the order in which they were backed up. In addition, you should enable the Restore over existing files option when performing a restore operation on these backup sets to ensure that all the data included in the backup set is completely restored. For more information about restore settings, see Restoring Data to a Server or Workstation on page 457.
If failover occurs during a post-backup verify job, or a pre-backup or post-backup database consistency check job, that job starts at the beginning after failover. Entries for full-volume backups that were interrupted by a cluster failover and resumed from the point of failover do not display in the IDR Restore Wizard. However, you can restore these backup sets manually after you make the initial recovery using the IDR Restore Wizard. If the checkpoint restart setting is enabled for an archive backup job that is resumed when a cluster failover occurs, the files selected for archive are not automatically deleted from the source volume after the backup completes. If a failover occurs on a clustered managed media server, the job that is recovered resumes on the active cluster node. The job will not be recovered to any other managed media servers outside of the Backup Exec cluster.
666
Administrators Guide
667
Change the order in which the nodes fail over. Add a failover node to the cluster. Remove a failover node from the cluster.
By default, in a cluster, failover from the controlling node to a designated node occurs in alphabetical order according to the machine name of each node. To change the order in which failover will occur on the designated nodes, rename the machines in the order in which they should fail over.
To add or remove a failover node: Before you add a node to the Backup Exec cluster configuration, you must install Backup Exec on it. Cluster services for a node should be online before you add or remove it from the cluster. If you are removing a node, do not run the cluster configuration wizard from the node you want to remove. 1. On the controlling node, on the Tools menu, point to Wizards. 2. Click Cluster Configuration Wizard. 3. Follow the instructions on the screen to add or remove a node. 4. If you have added a failover node, also add any locally attached storage devices that are to be used when failover occurs to the cluster device pool. This ensures that jobs can be run on the storage devices that are attached to the failover nodes. If you remove some, but not all, nodes in a cluster, an uninstall of Backup Exec results in a password being requested for the virtual server and the services continuing to run. You must remove Backup Exec from all nodes on the cluster, following the procedures detailed in Uninstalling Backup Exec From a Microsoft Cluster on page 663. Related Topics: Creating Device Pools for Microsoft Cluster Servers on page 664 Specifying a Different Failover Node on page 668 Configurations for Backup Exec and Microsoft Cluster Servers on page 670
668
Administrators Guide
Designating a New SAN SSO Primary Server and Central Administration Server in a Microsoft Cluster Server
Designating a New SAN SSO Primary Server and Central Administration Server in a Microsoft Cluster Server
To designate a new primary SAN Shared Storage Option server or central administration server for a cluster environment, use BEUtility.exe. BEUtility enables you to do various types of configuration and maintenance operations on your Backup Exec for Windows Servers media servers. For more information, see Backup Exec Utility on page 717. Note In a cluster environment, do not use Change Service Account in BEUtility.exe. To change a Backup Exec Cluster server from a Database Server to a Member Server: 1. Install the new server as a secondary server with the Library Expansion Option and SAN Shared Storage Option installed. Make sure connections to the Backup Exec cluster and other member servers are working properly. 2. Using the cluster administrator, shut down the Backup Exec cluster services. Be sure to keep the Disk resource online. 3. Move the catalog files from the Backup Exec cluster installation path to the respective installation paths on the new database server. 4. Use BEUtility.exe to connect all Backup Exec servers to the new database server and to start all Backup Exec services. 5. Stop and restart the Backup Exec Services on the new database server. 6. Using the Cluster Administrator, move the Backup Exec resource group to the failover node and make sure services start on that node. 7. Use BEUtility.exe to stop and restart the Backup Exec Services on all the member servers of the SAN in order for them to connect to the new database server. To change a Backup Exec Cluster server from a central administration server to a managed media server: 1. Install the new server as a managed media server. Make sure connections to the Backup Exec cluster and other managed media servers are working properly.
669
2. Using the cluster administrator, shut down the Backup Exec cluster services. Be sure to keep the Disk resource online. 3. Move the catalog files from the Backup Exec cluster installation path to the respective installation paths on the new central administration server. 4. Use BEUtility.exe to connect all Backup Exec servers to the new central administration server and to start all Backup Exec services. 5. Stop and restart the Backup Exec Services on the central administration server. 6. Using the Cluster Administrator, move the Backup Exec resource group to the failover node and make sure services start on that node. 7. Use BEUtility.exe to stop and restart the Backup Exec Services on all the managed media servers in order for them to connect to the new central administration server. Related Topics: Multi-node Clusters on a Fibre Channel SAN with the SAN SSO on page 675
To add or remove hot-swappable devices in a cluster, run the Hot-swap Device Wizard on all Backup Exec Cluster nodes. If a server is not updated to recognize a new device, any job that is targeted to that device may fail. For more information about hot-swapping devices, see Hot Swap for Storage Devices on page 128. See the following for examples of various cluster configurations: Two-node Cluster with Locally Attached Storage Devices on page 671 Two-node Cluster with Tape Devices on a Shared SCSI Bus on page 672 Multi-node Clusters on a Fibre Channel SAN with the SAN SSO on page 675
Failover node Shared SCSI Bus for disks Heartbeat LAN Locally attached storage devices
Related Topics: Multi-node Clusters on a Fibre Channel SAN with the SAN SSO on page 675
671
Backup Exec Virtual Server Controlling node Shared SCSI Bus for Disks Shared SCSI Bus for Tape Devices Failover node
Heartbeat LAN
Related Topics: Multi-node Clusters on a Fibre Channel SAN with the SAN SSO on page 675
672
Administrators Guide
SCSI adapters. This method is not recommended because if the server is disconnected from the shared bus, or if there is a power supply failure, the bus may not be properly terminated and may be inoperable.
673
Pass-through (or feed-through) SCSI terminators. These can be used with SCSI adapters and with some tape devices. If the tape device is at the end of the bus, you can attach a pass-through SCSI terminator to terminate the bus. The internal terminators in the tape device must be disabled. This is a recommended method. To ensure termination if a power supply failure occurs, turn off the on-board terminators on the SCSI controller (using the host adapter manufacturers recommended method) and physically terminate the controller with a terminator. Y cables. These can be used with some tape devices. If the tape device is at the end of the bus, you can attach a terminator to one branch of a Y cable to terminate the bus. The internal terminators in the tape device must be disabled. This is a recommended method. Trilink connectors. These can be used with some tape devices. If the tape device is at the end of the bus, you can attach a terminator to one of the trilink connectors to terminate the bus. The internal terminators in the tape device must be disabled. This is a recommended method.
Tip
Besides terminating the bus, Y-cables and trilink connectors also allow you to isolate the devices from the shared bus without affecting the bus termination. You can maintain or remove that device without affecting the other devices on the shared SCSI bus. To configure a shared SCSI bus for tape devices: 1. Install the SCSI controllers for the shared SCSI bus. Make sure that the SCSI controllers for the shared SCSI bus are using different SCSI IDs. For example, on the controlling node, set the SCSI controller ID to 6 and on the failover node, set the SCSI controller ID to 7. 2. Prepare the SCSI controllers for the shared SCSI bus. Refer to your SCSI host adapter manufacturers documentation for details. Note Do not have power on to both nodes while configuring the computers, or if both nodes have power on, do not connect the shared SCSI buses to both nodes. 3. Connect the shared SCSI tape devices to the cable, connect the cable to both nodes, and then terminate the bus segment using one of the methods discussed in the previous section. Related Topics: Two-node Cluster with Tape Devices on a Shared SCSI Bus on page 672
674
Administrators Guide
675
Configurations for Backup Exec and Microsoft Cluster Servers Two 2-node Clusters on a Fibre Channel SAN with the SAN SSO
Secondary server
Backup Exec Virtual Server A Controlling node Shared SCSI Busfor disks Failover Heartbeat node
Backup Exec Virtual Server B Shared SCSI Bus for disks Controlling node Heartbeat
Failover node
LAN
676
Administrators Guide
Configurations for Backup Exec and Microsoft Cluster Servers Four-node Cluster on Fibre Channel SAN with the SAN SSO Secondary server Fibre Channel SAN Shared Drives Secondary Storage Devices Backup Exec Virtual Server Controlling node
Failover nodes
Heartbeat
LAN
For details on installing the SAN SSO, see Installing the SAN Shared Storage Option on page 960. Related Topics: Designating a New SAN SSO Primary Server and Central Administration Server in a Microsoft Cluster Server on page 669
677
Using the Central Admin Server Option with Microsoft Clusters and SAN SSO
Using the Central Admin Server Option with Microsoft Clusters and SAN SSO
Managed media servers can be clustered, however, it is not recommended because the central administration server recovers all failed jobs in a distributed job environment. The following configurations can be used when installing Backup Exec clusters with the Central Admin Server Option (CASO) and SAN SSO.
Backup Exec cluster with CASO Backup Exec cluster with CASO and SAN Shared Storage Option Backup Exec cluster with the managed media server configuration Backup Exec cluster with the managed media server configuration and SAN Shared Storage Option
Installing Backup Exec cluster with CASO: 1. Install Backup Exec with CASO and any additional options onto your Microsoft cluster nodes. 2. From the node that you want to designate as the active node, start Backup Exec. 3. From the Tools menu, point to Wizards, and then click Cluster Configuration Wizard. 4. Follow the instructions on the screen. 5. When the Cluster Configuration Wizard completes, install the managed media server. Use the virtual Backup Exec cluster name when prompted for the central administration server. Installing Backup Exec cluster with CASO and SAN Shared Storage Option: 1. Install Backup Exec with CASO, the SAN Shared Storage Option, and any additional options onto your Microsoft cluster nodes. 2. From the node that you want to designate as the active node, start Backup Exec. 3. From the Tools menu, point to Wizards, and then click Cluster Configuration Wizard. 4. Follow the instructions on the screen.
678
Administrators Guide
Using the Central Admin Server Option with Microsoft Clusters and SAN SSO
5. When the Cluster Configuration Wizard completes, install the managed media server. Use the virtual Backup Exec cluster name when prompted for the central administration server and the primary SAN server. Installing Backup Exec cluster with the managed media server configuration: 1. Install Backup Exec with the managed media server option and any additional options onto your Microsoft cluster nodes. Note All nodes that run Backup Exec in the managed media server cluster configuration must access the same central administration server. If the nodes do not access the same central administration server, failovers do not occur properly. 2. From the node that you want to designate as the active node, start Backup Exec. 3. From the Tools menu, point to Wizards, and then click Cluster Configuration Wizard. 4. Follow the instructions on the screen. Installing Backup Exec cluster with the managed media server configuration and SAN Shared Storage Option: 1. Install Backup Exec with the managed media server option, SAN Shared Storage Option, and any additional options onto your Microsoft cluster nodes. Note All nodes that run Backup Exec in the managed media server cluster configuration must access the same central administration server. If the nodes do not access the same central administration server, failovers do not occur properly. 2. From the node that you want to designate as the active node, start Backup Exec. 3. From the Tools menu, point to Wizards, and then click Cluster Configuration Wizard. 4. Follow the instructions on the screen.
679
Local disks and System State on each node. The cluster quorum, which contains recovery information for the cluster and information about changes to the cluster configuration, is included in the System State backup. For more information, see Backing Up Local Disks in a Microsoft Cluster on page 682. All shared disks, including the data in the Microsoft Cluster Server folder on the Quorum disk. For more information, see Backing Up Shared Disks in a Microsoft Cluster on page 682. Virtual servers, which may contain data or contain applications such as Microsoft SQL Server or Exchange Server. Use Backup Exec database agents to back up databases. For more information, see Backing Up Database Files in a Microsoft Cluster on page 683.
For details on setting up and running backup operations, see Creating a Backup Job on page 261. Note When performing an offhost backup, the media server and the remote computer must not be in the same cluster group. The cluster applications cannot support devices logical unit numbers (LUNs) that have duplicate signatures and partition layouts, therefore, the snapshots containing the LUNs must be transported to a host, or remote computer, that is outside the cluster. The Command Line Applet can be used with Backup Exec when Backup Exec is installed in a cluster. The only limitation is that you cannot use the Command Line Applet to specify a device for backup. You can use the Command Line Applet to target a device pool, but not a specific device in that pool. Related Topics: Backing Up Local Disks in a Microsoft Cluster on page 682 Backing Up Shared Disks in a Microsoft Cluster on page 682 Backing Up Database Files in a Microsoft Cluster on page 683 Backing Up Windows 2000 and Windows Server 2003 Features in a Microsoft Cluster on page 681
680
Administrators Guide
Backing Up Windows 2000 and Windows Server 2003 Features in a Microsoft Cluster
You must purchase and install the Backup Exec Remote Agent for Windows Servers on all remote Windows 2000 and Windows Server 2003 computers that you want backed up. Without the Remote Agent, the following Windows 2000 and 2003 features cannot be correctly backed up:
Encrypted files SIS files Disk quota data Removable Storage data Remote Storage data Mount points Sparse files Windows Management Instrumentation Terminal Services System State data, including:
COM+ Class Registration database Boot and system files Registry Certificate Services database (if the server is operating as a certificate server) Active Directory (if the server is a domain controller) SYSVOL (if the server is a domain controller) Cluster quorum (if the server is part of a cluster)
Note You can select System State or Shadow Copy Components for backup on a remote computer only when the Remote Agent is installed on the remote computer. Related Topics: Restoring Windows 2000 and Windows Server 2003 Features to a Microsoft Cluster on page 684
681
3. Continue with the full backup procedure as usual. For more information, see Creating a Backup Job on page 261. Tip If you created a device pool for the cluster, select it as the default destination device so that jobs can restart on the failover node if failover occurs.
682
Administrators Guide
Tip
If you created a device pool for the cluster, select it as the default destination device so that jobs can restart on the failover node if failover occurs.
683
Restoring Windows 2000 and Windows Server 2003 Features to a Microsoft Cluster
To fully restore Windows 2000 features to a remote Windows 2000 system, the restore operation MUST be performed by a Windows 2000 media server, and the Remote Agent must be installed on the remote system. You can restore Windows Server 2003 features from either a Windows 2000 media server or a Windows Server 2003 media server.
684
Administrators Guide
Restoring the Cluster Quorum for Windows 2000 and Windows Server 2003 Computers to a Microsoft Cluster
The cluster quorum is backed up as part of System State. If Active Directory is running on the target server in the cluster, do not select Restore cluster quorum. For more information, see Restoring the Cluster Quorum to a Windows 2000 or Windows Server 2003 Node Running Active Directory to a Microsoft Cluster on page 686. If you need to specify a new disk to which the cluster quorum will be restored, see Specifying a New Drive Letter for the Cluster Quorum Disk on page 688. To restore the cluster quorum: Note If possible, take the other nodes in the cluster offline before restoring the cluster quorum. If the nodes cannot be taken offline, you should select the Force the recovery... option on the Advanced Restore Job Properties dialog box (explained in step 4). 1. On the navigation bar, click Restore. 2. On the Properties pane, under Settings, click Advanced. 3. Select Restore Cluster Quorum. 4. Select Force the recovery of the cluster quorum even if other nodes are online and/or disk signatures do not match in the following circumstances:
If you are not able to take the other nodes in the cluster offline. When this option is selected, the cluster service for any nodes that are online is stopped. If the disk that the cluster quorum previously resided on has been changed. The disk may have been replaced with a new one, or the disk configuration may have been changed so that the cluster quorum now resides on a different disk. This option allows the drive letter of the disk that the cluster quorum was on to remain the same, even if the configuration has changed and the disk signatures contained in the restore media do not match the disk signatures contained in the cluster quorum.
5. Continue the restore operation by following the steps in Restoring Data to a Server or Workstation on page 457. 6. When the restore operation is complete, use the cluster administrator software to restart the cluster service on nodes on which it was stopped.
685
Restoring the Cluster Quorum to a Windows 2000 or Windows Server 2003 Node Running Active Directory to a Microsoft Cluster
To restore the quorum to a node that is a domain controller running Active Directory, the node must be in Directory Services Restore Mode. The cluster services cannot run in this mode, so the cluster quorum must be restored separately, after System State is restored and the node has been rebooted. To exclude the cluster quorum from being restored with System State, clear the Restore Cluster Quorum option on the Advanced Restore Job Properties dialog box. When System State is restored, the cluster quorum is copied to a default location. For Windows 2000 the default location is: %SystemRoot%\cluster\BackupExec For Windows Server 2003, the default location is: %SystemRoot%\windows\repair\backup\bootablesystemstate\clusterdatabase Then, use the command-line utility clrest.exe to restore the cluster quorum from the default location to the quorum drive. To restore the cluster quorum to a node running Active Directory without using Backup Exec Cluster: Note If possible, take the other nodes in the cluster offline before restoring the cluster quorum. If the nodes cannot be taken offline, you should use the -f option with the clrest.exe command, explained in step 8. 1. To restore System State, start the computer in safe (repair) mode (restart the computer and then press <F8> when prompted to select an operating system) and then select Directory Services Restore Mode. If this is a local restore, you must also start the Backup Exec services before you restore the System State data. For instructions on starting the Backup Exec services, see Starting and Stopping Backup Exec Services on page 92. 2. On the Backup Exec navigation bar, click Restore. 3. In the Restore Selections pane, click System State. 4. On the Properties pane, under Settings, click Advanced. 5. Clear the Restore cluster quorum option. This option must not be selected.
686
Administrators Guide
6. Start the restore operation. During the restore, the cluster quorum files are copied to the default location. For Windows 2000 the default location is: %SystemRoot%\cluster\BackupExec For Windows Server 2003, the default location is: %SystemRoot%\windows\repair\backup\bootablesystemstate\clusterdatabase 7. When the restore has completed, reboot the target node.
8. After reboot is complete, run clrest.exe from the command line to restore the cluster quorum from the default location to the quorum disk: clrest path where path is the complete path to the cluster quorum; typically, the path is %SystemRoot%\cluster\BackupExec for Windows 2000 and %SystemRoot%\windows\repair\backup\bootablesystemstate\clusterdatabase for Windows Server 2003. A path is required. You can include other options on the command line to force the restore to proceed even if other cluster nodes are online, and/or if the disk signatures do not match, and to specify another disk as the quorum disk: clrest [-f] path [drive letter] where [-f] forces the restore to proceed even if other cluster nodes are online and/or the disk signatures do not match. When this option is selected, the cluster service for any nodes that are online is stopped. This option also allows the drive letter of the disk that the cluster quorum was on to remain the same, even if the configuration has changed and the disk signatures contained in the restore media do not match the disk signatures contained in the cluster quorum. [drive letter] specifies another drive letter for the quorum disk. If you use this option, the drive letter that the cluster quorum resides on will be changed to the drive letter specified. Otherwise, the drive letter that the cluster quorum resides on will stay the same as it was previously. 9. After the cluster quorum is restored, use the cluster administrator to bring the other cluster nodes online.
687
688
Administrators Guide
689
32-node clusters are supported with Backup Exec for Windows 2000, and Windows Server 2003 and Microsoft Windows 2000 Advanced Server and Windows Server 2003 Enterprise and DataCenter and Windows Server 2003 DataCenter. An individually licensed copy of Backup Exec for Windows Servers, as well as any applicable agents and options, is required for each active node in the cluster as defined in the End User License Agreement. You must enter a serial number for each node in the cluster (the cluster must have at least two nodes). Storage Foundation for Windows Servers High Availability server components must be installed on the cluster nodes. Storage Foundation for Windows Servers High Availability Administrative Console components must be installed on the central administration server. VERITAS Cluster Server must be configured to run in Secure mode.
Related Topics: Installing Backup Exec on a Microsoft Cluster Server on page 660
690
Administrators Guide
691
Local disks and System State on each node All shared disks Virtual servers, which may contain data or contain applications such as Microsoft SQL Server or Exchange Server. Use Backup Exec database agents to back up databases.
For details on setting up and running backup operations, see Creating a Backup Job on page 261. Note When performing an offhost backup, the media server and the remote computer must not be in the same cluster group. The cluster applications cannot support devices logical unit numbers (LUNs) that have duplicate signatures and partition layouts, therefore, the snapshots containing the LUNs must be transported to a host, or remote computer, that is outside the cluster. The Command Line Applet can be used with Backup Exec when Backup Exec is installed in a cluster. The only limitation is that you cannot use the Command Line Applet to specify a device for backup. You can use the Command Line Applet to target a device pool, but not a specific device in that pool. Related Topics: Backing Up Local Disks in a VERITAS Cluster on page 694 Backing Up Shared Disks in a VERITAS Cluster on page 694 Backing Up Database Files in a VERITAS Cluster on page 695 Backing Up Windows 2000 and Windows Server 2003 Features in a VERITAS Cluster on page 693
692
Administrators Guide
Backing Up Windows 2000 and Windows Server 2003 Features in a VERITAS Cluster
You must purchase and install the Backup Exec Remote Agent for Windows Servers on all remote Windows 2000 and Windows Server 2003 computers that you want backed up. Without the Remote Agent, the following Windows 2000 features cannot be correctly backed up:
Encrypted files SIS files Disk quota data Removable Storage data Remote Storage data Mount points Sparse files Windows Management Instrumentation Terminal Services System State data, including:
COM+ Class Registration database Boot and system files Registry Certificate Services database (if the server is operating as a certificate server) Active Directory (if the server is a domain controller) SYSVOL (if the server is a domain controller)
Note You can select System State for backup on a remote computer only when the Remote Agent is installed on the remote computer. Related Topics: Restoring Windows 2000 and Windows Server 2003 Features to a VERITAS Cluster on page 696
693
3. Continue with the full backup procedure as usual. For more information, see Creating a Backup Job on page 261. If you created a device pool for the cluster, select it as the default destination device so that jobs can restart on the failover node if failover occurs. Note If the computer on which you are running a backup using the Advanced Open File Option is in an environment with the Central Admin Server Option and the VERITAS Cluster Server installed, and if failover occurs to a VCS node, you must manually clean up the snapshots before restarting the backup on the failover node. Refer to the VSFW documentation for details.
694
Administrators Guide
3. Select the drive letters that represent the shared disks. 4. Continue with the full backup procedure as usual. For more information, see Creating a Backup Job on page 261. Tip If you created a device pool for the cluster, select it as the default destination device so that jobs can restart on the failover node if failover occurs.
695
Restoring Windows 2000 and Windows Server 2003 Features to a VERITAS Cluster
To fully restore Windows 2000 features to a remote Windows 2000 system, the restore operation MUST be performed by a Windows 2000 media server, and the Remote Agent must be installed on the remote system. You can restore Windows Server 2003 features from either a Windows 2000 media server or a Windows Server 2003 media server.
696
Administrators Guide
Cluster name Cluster IP address and subnet mask Cluster node names Node IP addresses Local and shared drive letters and partition scheme Disk signatures Group name Preferred nodes Failover/failback policies Resource name Resource type Group membership Possible owners Resource dependencies Restart and Looks Alive/Is Alive properties Resource-related parameters Application-specific configuration (SQL Database Character Set)
Cluster Groups
Cluster Resources
697
If you are recovering a Microsoft Cluster Server, run Dumpcfg.exe from the Microsoft 2000 Resource Kit or and the Clusterrecovery.exe from the Microsoft 2003 Resource Kit to retrieve the disk signatures from the shared disk. The Microsoft 2000 Resource Kit allows you to replace disk signatures. If you are recovering a VERITAS Cluster Server, run Vmgetdrive.exe to retrieve the disk signatures, disk group, and volume information from the shared disk.
If you cannot get the IDR Recovery Wizard to properly detect the hard drive order, you can still manually set up hard drive partitions using the Disk Administrator option within the Recovery Wizard. After this is done, you can continue with automated restore of your backup media afterward. Note After Windows has been installed, you cannot change the system drives letter. You must restore the system to the same drive letter from which it was backed up. Use the following sequence to recover the nodes. For detailed instructions, see Symantec Backup Exec - Intelligent Disaster Recovery Option on page 901. To recover nodes on the cluster using IDR: 1. If you are recovering more than one node, disconnect the shared disks. If you are recovering only one node, the shared disks do not need to be disconnected. If all nodes in the cluster are unavailable and must be recovered, the cluster cannot fail over. Disconnect the shared disks before recovery begins. 2. To restore the nodes, follow the steps in Recovering a Computer Using IDR on page 942. 3. Reconnect the shared drives and bring the nodes online. 4. To restore a database to the shared drives, use the appropriate Backup Exec agent. For procedures, read the following sections:
Disaster Recovery of SQL on page 1059 Disaster Recovery for Exchange Server 5.5 on page 1111 Disaster Recovery of a Lotus Domino Server on page 1343 Recovering a Remote Oracle Database Server from a Disaster on page 1322
699
If you are recovering a VERITAS Cluster Server, install the Storage Foundation for Windows High Availability server components which include Volume Manager and then use Volume Manager to create disk groups and volumes that match the original cluster configuration. If you are recovering a Microsoft Cluster Server, after booting the nodes in a cluster, make sure that the drive letters match the original cluster configuration. If the original configuration does not match, then to a certain extent, you can control the hard drive numbering scheme that Windows devises
700
Administrators Guide
by using the Disk Administrator. See the table Windows hard drive numbering scheme on page 947 that lists the normal order that Windows uses to assign disk drive numbers. 4. Do one of the following:
If you are recovering a VERITAS Cluster Server, re-install Backup Exec. For more information, seeInstalling Backup Exec on a VERITAS Cluster Server on page 691. If you are recovering a Microsoft Cluster Server, use the Cluster Wizard to reinstall Backup Exec for Windows Servers on the cluster. You must use the same settings used during the initial installation. For more information, see Installing Backup Exec on a Microsoft Cluster Server on page 660.
5. Catalog the media in the cluster. 6. On the Backup Exec navigation bar on the active node, click Restore. 7. In the Restore selections pane, select the last full backup sets made of the active node, and then select System State. 8. Do one of the following:
If you are recovering a VERITAS Cluster Server, proceed to step 9. If you are recovering a Microsoft Cluster Server, on the Properties pane, under Settings, click Advanced and then select the Restore cluster quorum option (this option must be selected).
9. Start the restore operation. 10. When the restore has completed, reboot the active node. 11. For each node that you need to recover, repeat step 6 through step 10. 12. After all nodes are recovered, restore the Backup Exec data files, and all other data files, to the shared disks. 13. To restore a database to the shared disks, use the appropriate Backup Exec agent. For procedures, read the following sections:
Disaster Recovery of SQL on page 1059 Disaster Recovery for Exchange Server 5.5 on page 1111 Disaster Recovery of a Lotus Domino Server on page 1343 Recovering a Remote Oracle Database Server from a Disaster on page 1322
701
702
Administrators Guide
703
704
Administrators Guide
Troubleshooting Clusters
Troubleshooting Clusters
After I recovered my cluster and all shared disks, the cluster service will not start. Why wont it start and how can I get it started? The cluster service may not start because the disk signature on the Quorum disk is different from the original signature. If you have the Microsoft 2000 Resource Kit use Dumpcfg.exe or Clusterrecovery from the Microsoft 2003 Resource Kit to replace the disk. For example, type: dumpcfg.exe /s 12345678 0 Replace 12345678 with the disk signature and replace 0 with the disk number. You can find the disk signature and the disk number in the event log. If you do not have the Microsoft 2000 Resource Kit, you can use -Fixquorum to change the Quorum disk signature. 1. Start the cluster service on one node with the -Fixquorum option in the startup parameters. 2. Open the Cluster Administrator and right-click the cluster, and then select Properties. 3. Select the Quorum tab. 4. In the Quorum resource field, select a different disk. 5. Click OK.
Chapter 15, Using Symantec Backup Exec with Server Clusters 705
Troubleshooting Clusters
6. Stop the cluster services and then restart them without the -Fixquorum option. Note You may run the -Fixquorum option as many times as needed to redesignate a Quorum disk signature. 7. Bring all other nodes online. I used the Checkpoint Restart option for my backups. During one of my backups, a Microsoft cluster failover occurred. Multiple backup sets were created. When I try to verify or restore using these backup sets, an "Unexpected End of Data" error occurs on the set that contains the data that was backed up prior to the failover. Why does this occur? Is my data safe? You received this error because failover occurred in the middle of backing up the resource, therefore the backup set was not closed on the media. However, the objects that were partially backed up in the first backup set were completely backed up again during restart, ensuring data integrity. Therefore, all of the objects on the media for the given backup set should still be restored and verified. I clustered a primary SAN server with a secondary SAN server. Now the device and media service on the secondary server fails. Why? This occurs when the secondary server becomes the active node and attempts to connect to the Backup Exec database on the primary server, which is no longer available. To correct this, you must use the Backup Exec Utility (BEUTILITY.EXE) or reinstall the secondary server to be a primary server. An Advanced Disk Based backup failed due to the application virtual server failover. How do I clean up VERITAS Storage Foundation for Windows cluster disk groups and their associated volumes? If the application virtual server fails when you use VERITAS Storage Foundation for Windows (SFW) snapshot provider to perform an advanced disk-based backup, the backup job will fail. The original cluster disk group that the snapped volumes belong to has moved from the primary node to a secondary node and the snapped volumes will not be able to resynchronize with the original volumes. The following is a description of the steps that occur for an advanced disk-based backup: 1. The snapped volumes are split from the original volumes. 2. The previously split snapped volumes are placed into a new cluster disk group. 3. The new cluster disk group is removed from the physical node where the production virtual server is currently online and then added to the Symantec Backup Exec media server.
706
Administrators Guide
Troubleshooting Clusters
4. The new cluster disk group will eventually be removed from the media server and then added back into the physical node where it previously resided, regardless of where the production virtual server is currently located. 5. The new cluster disk group joins the original cluster disk group if it is located in the same node. 6. The snapped volumes resynchronize with the original volumes. During this process if the production virtual fails over from the currently active node to a secondary node, the new cluster disk group cannot rejoin the original cluster disk group. To manually re-join the two cluster disk groups and resynchronize the volumes: 1. Import the cluster disk group into the node, if the original cluster disk group is not already imported into the node where the production virtual server is currently online. 2. Rejoin the new cluster disk group with the original cluster disk group. 3. Snap back the snapped volumes with their original volumes. Ensure that the option to synchronize using the original volume is selected. If you are not able to import the new cluster disk group into the node where the original cluster disk group is currently located, failover the application virtual server back to its original node before rejoining the two cluster disk groups. For detailed instruction on how to perform SFW operations, consult the VERITAS Storage Foundation for Windows user guide. After I performed a manual failover of a VERITAS cluster resource, my backup jobs hang. Why wont the backup jobs terminate? If a manual failover of a VERITAS cluster resource occurs, VERITAS Cluster Server does not dismount MountV resources if there are open handles. It is recommended that all backup jobs complete before performing a manual failover. If a backup job does hang, you must manually cancel the job before you can complete a manual cleanup process.
707
Troubleshooting Clusters
708
Administrators Guide
Chapter
16
Service Pack 4 or later installed Microsoft Server Appliance Kit 2.0 or later Backup Exec for Windows Servers 10.0
OR
Remote Administration (HTML) components installed Backup Exec for Windows Servers 10.0
Microsoft Server Appliance Kit 2.01 or Windows Storage Server 2003 Backup Exec for Windows Servers 10.0
Installing BEWAC
Installing BEWAC
To install BEWAC, select the Web Administration Console option when you install Backup Exec for Windows Servers. For details about installing Backup Exec, see Installing Backup Exec on page 65. Note This option is only available if the installation requirements for BEWAC are met.
Starting BEWAC
To start BEWAC after installing it: 1. Open Internet Explorer. 2. In the Address field, type: http://server name:port number Example http://BackupServer:8099 Most servers require the use of a secure channel to access BEWAC. For these servers, use the format: https://servername:secureportnumber Note It is recommended that you add a link to this address for quick access. 3. On the primary navigation bar, click Backup Exec. 4. If this is the first time you have started Backup Exec, run the First Time Startup Wizard.
710
Administrators Guide
Alternate server selection for Backup Exec Diagnostics AppleTalk network support Calendar view in the Job Monitor. Only the Jobs list view is available. Connect to another media server Cluster server support IDR settings and the ability to create bootable media Menus. Many of the options that are available through menus in Backup Exec for Windows Servers are available on the Tools tab in BEWAC. For more information, see Tools on page 714. Right-click functionality. The ability to right-click an item and then select an option from a Backup Exec shortcut menu is available only in the Selection pane and Results pane on the Backup Job Properties and Restore Job Properties dialog boxes. For example, if you right-click the icon for the C: drive in the Backup Selection pane, you can refresh the screen, select advanced file selection or user-defined selection options, connect as a different user, check or uncheck the drive, or view properties. If you right-click an item in any other area of BEWAC, the Internet Explorer shortcut menu displays.
Inventorying multiple slots. The ability to perform an inventory on multiple slots of a robotic library is not available. Making multiple selections. Job Summary for restore operations. A Job Summary page for restore jobs does not appear after creating the restore job. Wizards. Some of the wizards that display on the Tools menu or the Information Desk in Backup Exec for Windows Servers, such as the Logon Account Wizard, are not available. However, the First Time Startup Wizard is available in both BEWAC and Backup Exec for Windows Servers. Other wizards available in BEWAC include the Device Configuration Wizard and Policy Wizard. Preview panes. The BEWAC user interface does not have the preview pane that displays in the lower right side of the screen in Backup Exec for Windows Servers.
711
Navigating in BEWAC
Accessing Help
To access Help for BEWAC, click the question mark (?) in the upper right corner of each screen. If you click the Help tab on the primary navigation bar or press F1, the Windows Storage Server 2003 help displays. You can refer to the Backup Exec for Windows Servers Administrators Guide and Help for overview information and procedures for BEWAC. If a different step is required for BEWAC, the alternate step is indicated in a note in the procedure.
Navigating in BEWAC
Navigation in BEWAC differs from navigation in Backup Exec for Windows Servers. BEWAC contains a status area at the top of the screen, which is where alerts display. Below the status area are two navigation bars. The blue bar is the primary navigation bar. From the primary navigation bar you can select the tab for the application or task you want to work with, such as Backup Exec. The white bar is the secondary navigation bar. From the secondary navigation bar you select BEWAC options, such as backup and restore. The secondary navigation bar in BEWAC is the equivalent of the navigation bar in Backup Exec for Windows Servers. You also can click the icons to access BEWAC options.
712
Administrators Guide
Status area Primary navigation bar Secondary navigation bar Help button
713
Tools
Tools
The Tools tab serves the same function in BEWAC as the Tools menu in Backup Exec for Windows Servers. When you are following instructions in the Backup Exec for Windows Servers Administrators Guide, replace any mention of the Tools menu with the Tools tab. The Tools tab includes several Task Categories, such as Main settings. The Task Categories and their available functions include:
Main settings
Configure default options for Backup, Restore, Media, Database Maintenance, Job Logs, Catalogs, and Agents. Copy settings to other Backup Exec servers. Configure alert categories and properties. Configure the recipients available to receive alert notifications. Configure the Audit Log. Modify MAPI, SMTP, VIM, and pager configurations for notifications. Modify the instructions for how to handle job errors. Configure Managed Media Server defaults (only available if the Central Admin Server Option is installed) Add and/or remove edition and option serial numbers. List all installed updates. View available software updates and configure scheduling options. View current installed Backup Exec license options. Stop and start all of the Backup Exec services and change logon credentials. Run Backup Exec diagnostics. Modify the logon account credentials. Re-create the set of example policies that are normally created by the First Time Startup Wizard. Edit the contents of a previously saved selection list. Re-enable all warnings that have been previously disabled.
Administrators Guide
Configuration
Other settings
714
715
716
Administrators Guide
Chapter
17
The Backup Exec Utility (BEUTILITY.EXE) enables you to do various types of configuration and maintenance operations on your Backup Exec for Windows Servers media servers. It is installed by default in your Backup Exec working directory during the initial Backup Exec for Windows Servers installation. With the Backup Exec Utility, you can:
Reconfigure Backup Exec SAN Shared Storage environments by moving primary media server responsibilities among Backup Exec media servers. Configure logical groups of Backup Exec media servers, enabling you to perform operations on all computers at the same time in the group. These operations can include starting or stopping services or configuring application service security, such as changing service account information as well as startup options for one or more servers in the group. With the Backup Exec Utility, you can also add or remove media servers from the group. Start immediate database utility operations on the Backup Exec Database (BEDB) that are normally initiated by the database maintenance utilities themselves. These maintenance operations include database dumps, shrink and grooming operations, along with BEDB database consistency and data integrity checks.
Caution The Backup Exec Utility should be used only with the guidance of Technical Support. Improper use of this utility can result in configuration changes that may prevent Backup Exec from running. Related Topics: Starting the Backup Exec Utility on page 718 Completing Tasks using the Backup Exec Utility on page 720 Running Backup Exec Utility General Tasks on page 722
717
Running Backup Exec Utility CASO Tasks on page 745 Running Backup Exec Utility Services Tasks on page 733 Running Backup Exec Utility SAN SSO Tasks on page 751 Running Database Tasks on page 756 Running Media Server Group Tasks on page 765 Running Cluster Tasks on page 768
From the Backup Exec main program directory, double-click BEUtility.exe. By default, the main program directory is located in: \Program Files\VERITAS\Backup Exec\NT.
The Backup Exec Utility
results pane
task pane
preview pane
Related Topics: Completing Tasks using the Backup Exec Utility on page 720
718 Administrators Guide
Getting Started
Getting Started
Before you can reconfigure or modify Backup Exec media servers, you must add the names of the media servers to the list of media servers that the Backup Exec Utility knows about. To add media servers: 1. On the Media Servers pane, click All Media Servers. 2. On the task pane, under General Tasks, click New Media Server. 3. Select the appropriate options from the following:
New Media Server dialog box options Item Media Server Description Enter the name of a media server you want to add, or click Browse to find a server to add. Validates that the media server is indeed a media server before adding it to the Backup Exec Utility master list of known servers. Adds other media servers that may be part of a SAN SSO or a CASO environment to the Backup Exec Utility master list of known servers.
Get Server Information Shows the properties of the media server entered in the Media server field.
4. Click OK. The media server name appears in the results pane when All Media Servers is selected. Related Topics: Completing Tasks using the Backup Exec Utility on page 720
719
Add a media server. Add a new media server group. Delete a media server. Delete a media server group. Run Backup Exec diagnostics. Enable debug logs. View media server properties.
Start and stop services on media servers. Change media server service accounts. Edit media server configurations. Copy media server configurations. Apply copied media server configurations. Update media server configuration to reflect a new media server name.
Set a central administration server. Remove a central administration server. Enable and disable CASO job delegation on a media server. Move the central administration server. Change the storage location for the catalogs.
720
Administrators Guide
Completing Tasks using the Backup Exec Utility Backup Exec Utility tasks (continued) If you want to:
See: Running Backup Exec Utility SAN SSO Tasks on page 751
Set or remove the primary SAN SSO server. Configure the SAN Shared Storage Option. Promote a Backup Exec media server to the primary server in a SAN Shared Storage Option environment. Move the primary SAN Shared Storage Option server to a different Backup Exec media server.
Check Backup Exec Database consistencies. Age Backup Exec Databases. Compact Backup Exec Databases. Dump Backup Exec Databases. Rebuild, repair and recover Backup Exec Databases. Change the SQL Server sa password. Change the database access. Create a new Backup Exec database location. Copy a database.
Add a media server to a media server group. Remove a media server from a media server group. Set a central administration server for a media server group.
721
Add a New Media Server on page 722 enables you to add a media server to Backup Exec Utilitys list of known Backup Exec media servers. Create a New Media Server Group on page 723 enables you to create a container where you can logically group together multiple media servers. Delete a Media Server from the All Media Servers Node on page 724 enables you to remove Backup Exec media servers from the Backup Exec Utility master list of known servers. Delete a Media Server Group on page 725 enables you to remove user-defined media server groups from the Media Server Groups subnode. Run Backup Exec Diagnostics on page 726 enables you to run Backup Exec for Windows Servers Diagnostics application on media servers listed in the Backup Exec Utility. Enable Debug Logs on page 726 enables you to activate logs for a variety of Backup Exec engine-related debugging activities. View Media Server Properties on page 729 enables you to view server and system properties, along with the installed options for any Backup Exec media server that appears in Backup Exec Utility.
Related Topics: Completing Tasks using the Backup Exec Utility on page 720
722
Administrators Guide
Get Server Information Shows the properties of the media server entered in the Media server field.
4. Click OK. Related Topics: Delete a Media Server from the All Media Servers Node on page 724 Completing Tasks using the Backup Exec Utility on page 720
723
Create group from SAN Enables you to create the new media server group and populate it SSO configuration with the computers found in your SAN SSO environment. Primary SAN SSO server The name of your primary SAN SSO server from which this new media server group will be created.
4. Click OK. Related Topics: Add Media Server on page 765 Delete a Media Server Group on page 725 Completing Tasks using the Backup Exec Utility on page 720
Related Topics: Remove a Media Server on page 766 Add a New Media Server on page 722 Completing Tasks using the Backup Exec Utility on page 720
725
726
Administrators Guide
To use the Enable Debug Logs task: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. Under General Tasks, click Enable Debug Logs. 3. Enter the appropriate options as directed by Symantec Technical Support:
Debug Log for Backup Exec Server Service Enable Debug Log for Backup Exec Server Service Debug Detail Level Enables you to activate logging and set the log levels for the Backup Exec Server service.
Sets the level of detail desired in the debug log files. Choices include Normal, Medium, High and Max. The level to be selected will be determined by Symantec Technical Support. Activates basic Backup Exec log functions. Sets the level of detail in the SQL logs. Two levels are available, Low and High. The level selected will be determined by Symantec Technical Support. Sets the level of detail in the Job logs. Two levels are available, Low and High. The level selected will be determined by Symantec Technical Support. Activates the logs required to debug the Backup Exec messaging system. Activates the logs required to debug system performance. Activates the log required to debug the Backup Exec message queue service.
Job Log
Message Log
Enable debug log for Activates the log required to debug both the Backup Exec Job Job Engine and Remote Engine and Remote Agent services. Agent service
727
Item
Description
Engine NDMP debug Enables you to set the level of Engine NDMP debug details that are level logged. Choices include: Log NDMP errors only, Log flow messages and Verbose Logging. Selecting Log NDMP errors only gives you general information and errors that are generated. Selecting Log flow messages includes both a higher level overview of the activity occurring, and the NDMP errors that are generated. Verbose Logging offers even more information and should only be used with Symantec Technical Support guidance. Remote Agent NDMP debug level Enables you to set the level of Remote Agent debug details that are logged. Choices include: Log NDMP errors only, Log flow messages and Verbose Logging. Selecting Log NDMP errors only gives you general information and errors that are generated. Selecting Log flow messages includes both a higher level overview of the activity occurring, and the NDMP errors that are generated. Verbose Logging offers even more information and should only be used with Symantec Technical Support guidance. Activates the log required to debug the Backup Exec Notification services. Activates notification logging on a media server running the Backup Exec BESERVER service. Selecting either Media server or Administration console should be done at the direction of Symantec Technical Support. Activates notification logging on a computer running the Backup Exec administration console. Selecting either Media server or Administration console should be done at the direction of Symantec Technical Support.
Administration console
728
Administrators Guide
Media Server Properties - Server Tab on page 729 Media Server Properties - Options Tab on page 731 Media Server Properties - System Tab on page 732
Media Server Properties - Server Tab To view media server Server properties: 1. On the Media Servers pane, click All Media Servers. 2. On the results pane, select a media server. 3. On the task pane, under General Tasks, click Media Server Properties. 4. Click Server. The Media Server Properties Server tab provides the following information:
Media Server Properties Server Tab properties Item Name Description The name of the media server.
729
Running Backup Exec Utility General Tasks Media Server Properties Server Tab properties (continued) Item Status Description The status of the media server:
Online - All services are running. Pause - The server has been paused. You can pause a media server to prevent scheduled and new jobs from running on that server while maintenance activities, such as replacing a tape device, are being performed. Active jobs will not be affected if they started before the server was paused. Unavailable - The Backup Exec services are not responding. Depending on the thresholds that were set, active jobs will become stalled, then failed, and then will be recovered. For more information, see Setting Thresholds to Recover Jobs on page 445. Offline - The media server is not online. Services have been stopped.
Note If the Central Admin Server Option is installed, additional statuses are displayed. For more information, see Columns in the Media Servers View on page 853 Description Version Serial number A user-defined description of the server. Backup Exec version and revision information. The serial number under which Backup Exec is installed. Evaluation Edition is displayed if a serial number was not provided during Backup Execs installation.
Server Time Start date and time Date and time Backup Exec was initially installed and launched on this media server. Current date and time.
Number of storage devices connected to this media server. In systems with multi-drive robotic libraries attached, each drive in the robotic library represents a separate device. Number of jobs currently in progress on this media server.
730
Administrators Guide
Running Backup Exec Utility General Tasks Media Server Properties Server Tab properties (continued) Item Total number of alerts since startup Description Total number of alerts generated on this media server since the Backup Exec services were last started.
Related Topics: View Media Server Properties on page 729 Completing Tasks using the Backup Exec Utility on page 720
Installed
Related Topics: View Media Server Properties on page 729 Completing Tasks using the Backup Exec Utility on page 720
731
Running Backup Exec Utility Services Tasks Media Server Properties System tab properties (continued) Item Page size Page file BE Diagnostics Description Size of a single virtual memory page. Size of the virtual memory paging file. Note If you call Symantec Technical Support, they may request that you run BE Diagnostics and provide them with the results. Symantec Technical Support can use the results of this utility to pinpoint your problem and quickly solve it. Click to run the Diagnostics utility to a file (bediag(machine_name).txt) that includes useful configuration information for the server such as:
Account groups, account privileges, and environment settings. Backup Exec Software version and registry information, Backup Exec Agent listing, Windows version information, SCSI hardware configuration, SQL Server information, Driver services information, and Windows Services information. File Server information, supported shared directories, and Windows sockets information.
Related Topics: View Media Server Properties on page 729 Completing Tasks using the Backup Exec Utility on page 720
Stop Services on page 734 enables you to remotely stop Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility. Start Services on page 734 enables you to remotely start Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility. Change Service Accounts on page 736 enables you to configure the credentials that comprise the Backup Exec service account. Editing Media Server Configurations on page 737 enables you to configure Backup Exec to set automatic responses to several media alerts. Copy Media Server Configurations on page 742 Apply Copied Media Server Configuration on page 743
733
Related Topics: Completing Tasks using the Backup Exec Utility on page 720
Stop Services
Stop Services enables you to remotely stop Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility. Caution When stopping services on a clustered Backup Exec media server, the entire Backup Exec cluster group will be taken offline. To bring the entire group back online, restart the services using Start Services. To stop Backup Exec services on a media server: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Services Tasks, click Stop Services. 3. Click Yes to confirm the stop services operation. 4. After the services stop, click Close on the Operation Progress screen. Related Topics: Start Services on page 734 Running Backup Exec Utility Services Tasks on page 733 Completing Tasks using the Backup Exec Utility on page 720
Start Services
Start Services enables you to remotely start Backup Exec services on any Backup Exec media server that appears in the Backup Exec Utility. Caution When starting services on a clustered Backup Exec media server, the entire Backup Exec cluster group will be placed online. To bring the entire group back offline, stop the services using Stop Services.
734
Administrators Guide
To start Backup Exec services on a media server: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Services Tasks, click Start Services. 3. After the services start, click Close on the Operation Progress screen. Related Topics: Stop Services on page 734 Running Backup Exec Utility Services Tasks on page 733 Completing Tasks using the Backup Exec Utility on page 720
735
Account
Start type
3. Click OK. 4. Click Close when the service account changes are completed. Before the new service account configuration takes affect, you must stop and restart the services on the media server.
736
Administrators Guide
Related Topics: Stop Services on page 734 Start Services on page 734 Running Backup Exec Utility Services Tasks on page 733 Completing Tasks using the Backup Exec Utility on page 720
Automated Alert Responses Media Overwrite Alert Enables you to set the automated response for the Media Overwrite Alert. Responses include: Yes or OK, No, or Cancel. Enables you to set the automated response for the Media Remove Alert. Responses include: Yes or OK, No, or Cancel. Enables you to set the automated response for the Media Insert Alert. Responses include: Yes or OK, No, or Cancel. Enables you to set the automated response for the Library Insert Alert. Responses include: Yes or OK, No, or Cancel.
The following media alerts can be configured to use automatic responses: Media Overwrite, Media Remove, Media Insert and Library Insert. You can also use the Edit Configuration dialog box to change the amount of time that a media server waits to release a tape drive before attempting to acquire another tape drive. In addition, you can also change the amount of time that the media server keeps possession of a tape drive after a job completes.
737
To edit a media server configuration: 1. Select a media server from either a media server group or from the All Media Servers subnode. 2. On the task pane, under Services Tasks, click Edit Configuration. 3. Enter the appropriate options as follows:
Edit Server Configuration options Item Server(s) Description The name of the media server where the service account is being changed.
General Delay before mount time (in seconds) Changes the amount of time the media server waits after releasing a tape drive and before attempting to acquire a storage device. Note In a SAN SSO environment, this option should be used in order to keep one media server from monopolizing the storage device.
738
Administrators Guide
Running Backup Exec Utility Services Tasks Edit Server Configuration options (continued) Item Next job wait time (in seconds) Description Changes the amount of time that the media server keeps possession of a storage device after a job completes.
739
Running Backup Exec Utility Services Tasks Edit Server Configuration options (continued) Item Media Insert Alert Description Enables you to set the automated response for the Media Insert Alert. Responses include: Yes or OK, No, or Cancel. Enables you to set the automated response for the Library Insert Alert. Your choices are Yes or OK, No, or Cancel.
NTFS File system uses asynchronous I/O Used as a technical support diagnostic option, this option determines whether Backup Exec uses a proprietary method for accessing files (on tape and on hard drive file systems) for both read and write functionality. Selecting this option means Backup Exec will use a proprietary method to accelerate such operations and clearing the option means it will not. This option will negatively affect the performance of Backup Exec tape operations (backup, verify, restore, seeking, and so on) in an attempt to resolve minor hardware-related errors. Enable restrict anonymous support Enables support for Microsofts Restrict Anonymous security feature which prevents anonymous connectivity to a Windows server. Enabling Restrict Anonymous support forces Backup Exec to provide credentials when connecting to a resource.
740
Administrators Guide
Running Backup Exec Utility Services Tasks Edit Server Configuration options (continued) Item Tape format Use fast file restore When enabled, Backup Exec uses Fast File Access to speed up the process of finding the appropriate spot on the tape that contains the necessary data. In some cases there can be problems accessing the tape using Fast File Access; disabling this feature can work around tape access problems during restores. When enabled, Backup Exec uses Fast File Access which speeds up the process of finding the appropriate spot on the tape that contains the necessary data. In some cases there can be problems accessing the tape using Fast File Access; disabling this feature can work around tape access problems during backups. Description
Related Topics: Running Backup Exec Utility Services Tasks on page 733 Completing Tasks using the Backup Exec Utility on page 720
741
Jobs, including backup, restore, and report jobs. Policies, templates and selection lists Logon information Media sets Other information such as job defaults, error handling rules, alert configuration and default schedule data.
To copy a media server configuration: 1. Start BEUtility. 2. Select a media server from either a media server group or from the All Media Servers subnode. 3. On the task pane, under Services Tasks, click Copy Media Server Configuration. 4. Enter user name and password credentials to the media server listed in the Media server field. 5. Enter the path to a target folder in which to store the configuration file, or click Browse to navigate to a target folder. 6. Enter a name for the configuration file. Include the file name extension, cfg. For example, C:\Datatemp\Eng_1.cfg 7. Click OK. 8. After the copy operation completes, click Close. Note The Copy Media Server Configuration operation may take longer to run on some media servers that on others, as the time required to complete the operation depends on the amount of configuration information contained at a media server. Related Topics: Running Backup Exec Utility Services Tasks on page 733 Completing Tasks using the Backup Exec Utility on page 720
742 Administrators Guide
743
Caution Using Update Configuration for New Media Server Name does not change the media server name included inside existing backup selection lists. If you use this task to update the media server name, you must recreate all selection lists that back up data from that media server. Otherwise, the backup jobs will fail. In addition, when creating a restore job that targets the original media server, you must redirect all data being restored to the newly named media server. To use the Update Configuration for New Media Server Name task: 1. Start BEUtility. 2. Select a media server from either a media server group or from the All Media Servers subnode that you have renamed. 3. On the task pane, under Services Tasks, click Update Configuration for New Media Server Name. 4. Make the changes, as appropriate:
Update Configuration for New Media Server Name fields Item Current domain name Description The new domain name, of which the media server is now a member. The new computer name of the media server.
The previous domain name, of which the media server was a member. The previous media server name.
5. Click OK. 6. When the operation completes, click Close. Related Topics: Running Backup Exec Utility Services Tasks on page 733 Completing Tasks using the Backup Exec Utility on page 720
744
Administrators Guide
Set Central Administration Server on page 746 enables you to add a stand-alone Backup Exec media server to a Backup Exec central administration server database. Remove Central Administration Server on page 747 enables you to remove a managed media server from the central administration server database. Enable CASO Job Delegation on a Media Server on page 748 enables you to resume communications between the central administration server and a managed media server, bringing the managed media server online. Disable CASO Job Delegation on Media Server on page 748 enables you to stop communications between the central administration server and a managed media server, thus rendering the managed media server unavailable. Move Central Administration Server on page 749 enables you to move the central administration server to a different Backup Exec managed media server. Change Catalog Storage Location on page 750 enables you to change the storage location for the Backup Exec catalogs from the managed media server to the central administration server or from the central administration server to the managed media server.
Related Topics: Completing Tasks using the Backup Exec Utility on page 720
745
746
Administrators Guide
747
748
Administrators Guide
To use the Disable CASO Job Delegation on Media Server task: 1. Start BEUtility on the central administration server. 2. Select a managed media server from either a media server group or from the All Media Servers subnode. 3. On the task pane, under CASO Tasks, click Disable CASO Job Delegation. Note Because using this task involves the stopping and starting of Backup Exec services, this operation may take some time to complete. 4. When the operational status message appears indicating a successful completion, click Close. Related Topics: Running Backup Exec Utility CASO Tasks on page 745 Completing Tasks using the Backup Exec Utility on page 720
All managed media servers that previously communicated with the original central administration server now begin communicating with the newly configured central administration server after the move process completes. The original central administration server reverts to a managed media server, which then falls under the management of the new central administration server. All managed media servers that previously communicated with the destination central administration server need to be redirected so that they can communicate with the newly created central administration server. To redirect the managed media servers, see Set Central Administration Server on page 746.
To use the Move Central Server task: 1. Start BEUtility on the central administration server. 2. Select a media server group that contains both central administration servers. If one does not exist, create one.
749
3. On the task pane, under CASO Tasks, click Move Central Administration Server. Note Because this task involves stopping and starting Backup Exec services, this operation may take time to complete. 4. In the Current central administration server list box, select the current central administration server. 5. In the Destination central administration server list box, select the destination central administration server that will become the new central administration server. 6. Click OK. 7. When the operational status message appears indicating a successful completion, click Close. Related Topics: Running Backup Exec Utility CASO Tasks on page 745 Completing Tasks using the Backup Exec Utility on page 720
To use the Change Catalog Storage Location task: 1. From a media server group, select a target computer at which you want to store the Backup Exec catalogs. 2. On the task pane, under CASO Tasks, click Change Catalog Storage Location. 3. Click the appropriate radio button to select the new catalog storage location at either a managed media server or a central administration server. 4. Click OK. Related Topics: Running Backup Exec Utility CASO Tasks on page 745 Completing Tasks using the Backup Exec Utility on page 720
Set the Primary SAN SSO Server on page 752 enables you to add a media server to an existing SAN SSO-enabled storage area network. Remove the Primary SAN SSO Server on page 752 enables you to remove a media server in a SAN SSO storage area network and return it to standalone status. Configure the SAN SSO on page 753 enables you to create a primary SAN SSO Server from one of the media servers found within a Media Server Group. Promote a Media Server to a Primary SAN SSO Server on page 754 enables you to reconfigure a media server as the primary SAN SSO Server. Move the Primary SAN SSO Server on page 755 enables you to change the computer that serves as a primary SAN SSO Server.
Note When adding a Backup Exec cluster media server, use the virtual Backup Exec cluster name. Do not use the cluster node name. Related Topics: Completing Tasks using the Backup Exec Utility on page 720
751
4. After the operation finishes, click Close on the Operation Progress screen. Related Topics: Running Backup Exec Utility SAN SSO Tasks on page 751 Completing Tasks using the Backup Exec Utility on page 720
753
4. Click OK. After the operation finishes, click Close on the Operation Progress screen. Related Topics: Running Backup Exec Utility SAN SSO Tasks on page 751 Completing Tasks using the Backup Exec Utility on page 720
754
Administrators Guide
Move Primary SAN SSO Server list box options Item Servers Description Lists the names of the media servers that comprise the media server group. The name of the existing primary SAN SSO Server.
Old primary SAN SSO server New primary SAN SSO server
The name of the media server to be converted to the new primary SAN SSO Server. The target media server is selected from the list of media servers that appear in the Servers field.
4. Click OK. After the operation finishes, click Close on the Operation Progress screen. Related Topics: Running Backup Exec Utility SAN SSO Tasks on page 751 Completing Tasks using the Backup Exec Utility on page 720
755
Check the Database Consistency on page 757 enables you to check the consistency or validity of a media servers Backup Exec Database) Age the Database on page 757 enables you to age a media servers Backup Exec Database by deleting information considered old. Compact a Media Server Database on page 758 enables you to shrink the database by removing a databases unused space. Dump a Media Server Database on page 758 enables you to back up the Backup Exec Database to your hard drive. Rebuild Media Server Database Indices on page 759 enables you to rebuild media server database indices in the event the indices become corrupt. Repair a Media Server Database on page 759 enables you to repair a database. Recover a Media Server Database on page 760 enables you to recover a database. Change the SQL Server sa Password on page 761 enables you to change a media servers SQL Server sa password. Change Database Access on page 762 enables you to grant or revoke a users database access. New Backup Exec Database Location on page 763 Copy Database on page 764
Related Topics: Completing Tasks using the Backup Exec Utility on page 720
756
Administrators Guide
757
758
Administrators Guide
759
Item Server
Description The name of the media server on which the database is being recovered. Select the database you want to recover, either the Backup Exec database or the Desktop and Laptop Option (DLO) database. You can perform this operation on only one database at a time.
Database instance
Recovery method Use best recovery method for current configuration As the Backup Exec Utility default, this option attempts to fix and recover the existing database before either deleting it and creating a new database, or deleting it and recovering from the previous database dump.
Drop existing database Deletes the existing database and restores the backup. and reload from backup This option works in conjunction with the Backup Exec for Windows Servers option, Save contents of database to the Backup Exec data directory, found in the Database Maintenance node. If this option is set, Backup Exec automatically dumps the database to the media servers hard drive at a predetermined, user-defined schedule. When you run the Backup Exec Utility task Recover Database and select the option, Drop existing database and reload from backup, the existing database is deleted and replaced with the copy of the database that was dumped to Backup Execs data directory. For more information, see Configuring Database Maintenance on page 447.
760
Administrators Guide
Item
Description
Drop existing database Deletes the existing database and creates, in its place, a new and and reload from base empty database. For more information, see Configuring Database Maintenance on page 447.
4. After the operation finishes, click Close on the Operation Progress screen. Related Topics: Running Database Tasks on page 756 Completing Tasks using the Backup Exec Utility on page 720
762
Administrators Guide
763
Copy Database
Copy Database enables you to copy an existing database that may have been backed up to a hard drive location. 1. Start BEUtility. 2. On the task pane, under Database Tasks, click Copy Database. 3. Enter the name of an existing database file from which to copy, or click Browse to navigate to the location of the existing database. The database file uses the file name extension, .mdf. 4. Enter the name of an existing database log file from which to copy, or click Browse to navigate to the location of the existing database log file. The log file uses the file name extension, .ldf. 5. Click OK. 6. After the operation completes successfully, click Close. Related Topics: Running Database Tasks on page 756 Completing Tasks using the Backup Exec Utility on page 720
764
Administrators Guide
Add Media Server on page 765 enables you to add a media server to a media server group. Remove a Media Server on page 766 enables you to remove a media server from a media server group. Set Central Administration Server for the Media Server Group on page 766 enables you set a central administration server for a group of stand-alone media servers that are part of a media server group.
Related Topics: Completing Tasks using the Backup Exec Utility on page 720
765
766
Administrators Guide
A list of stand-alone media servers that comprise the media server group appears in the Media servers field. 4. In the Central administration server list box, select a stand-alone media server to be the central administration server for the group of media servers listed. 5. Click OK. A message appears stating that the Backup Exec services will be stopped and restarted on both the new central administration server and all other stand-alone media servers in the group. 6. Click Yes to continue. After the operation successfully completes, click Close. Related Topics: Running Media Server Group Tasks on page 765 Completing Tasks using the Backup Exec Utility on page 720
767
Edit Cluster Configuration on page 768 enables you to reset a SCSI bus or reset a specific SCSI LUN on a media server or a group of media servers that are in a clustered environment.
Related Topics: Completing Tasks using the Backup Exec Utility on page 720 Caution When adding a Backup Exec Cluster Media Server, use the Virtual Backup Exec Cluster name. Do not use the cluster node name.
768
Administrators Guide
Running Cluster Tasks Cluster Configuration Options Item SCSI LUN Reset Description Enables the device and media service to issue a targeted LUN reset to a storage device that is being reserved in the cluster fail-over configuration. This targeted LUN reset will be issued only if the device (storage device, router, etc.) supports targeted LUN resets. Check your hardware documentation for support of this feature. This option is typically enabled in a fibre channel SAN SSO configuration and your devices support targeted SCSI LUN reset.
3. Select SCSI Bus Reset if your storage device is being shared on a shared SCSI bus. Caution Do not use the option, SCSI Bus Reset, in a SAN Shared Storage Option configuration. 4. Select SCSI LUN Reset if your device or devices support targeted LUN reset and your environment is using a fibre channel storage area network (SAN). 5. Click OK. Related Topics: Completing Tasks using the Backup Exec Utility on page 720
769
770
Administrators Guide
Chapter
18
Familiarity with TSM terminology and operation, and the operating system on which the server resides. TSM versions 4.2, 4.2.1, 5.1, 5.1.5 and 5.2 Backup Exec for Windows Servers 9.x or later installed on the media server. TCP/IP installed on the media server.
Note The Backup Exec TSM feature does not support the following communication protocols: SPX, NetBEUI, NetBIOS or any mainframe protocols such as SNA The Tivoli Storage Manager Administrators Guide and Administrators Reference Guide may also be helpful.
771
Corporate Network
TSM client
TSM client
Windows 2000, Windows XP, Windows Server 2003 Exchange Server (optional) SQL Server (optional) Backup Exec for Windows Server v9.x or later Backup Exec for Tivoli Storage Manager option
After establishing communication with the TSM Server, Backup Exec recognizes the TSM server as a virtual single tape drive robotic library and stores the contents of its backup jobs on it. Because the TSM option is implemented within Backup Exec as an add-on logical device driver, all standard robotic library features are available except LABM. You can also configure a variable number of logical media slots within the virtual tape robotic library.
772
Administrators Guide
Backup Exec Architecture and the TSM Server Device Driver Backup Exec Scheduler and Job Engine Backup Exec Device Handling Device Driver Device Driver Device Driver Tape Device
Tape Device
Tape Loader
TCP/IP Protocol
TSM Server
Related Topics: TSM Backup Exec Components on page 773 Requirements for the TSM Feature on page 771
The position information (PI) data stream is bound to the new management class named MC_PI. The PI data stream is directed to the newly-created, disk-based storage pool, named backupexec_pi. Backup Exec uses the backupexec_pi storage pool to retain position information about each backup set that it sends to the TSM servers BACKUPPOOL storage pool. Migration is turned off, and should remain off, for the backupexec_pi storage pool so
773
that the position information for each stored file is not migrated off the disk to tape, but is always immediately available to Backup Exec. If the position information data were migrated to tape, performance in Backup Exec would be severely impaired.
The virtual tape (VT) data stream is bound to the new management class MC_VT. The VT data stream contains the actual client backup data packaged as objects. This backup data can be stored on disk or migrated to tape, disk, or RCD and is managed automatically by the TSM database.
Note The VT data stream must first be written to a disk-based storage pool, then optionally migrated to tape. Configurations in which the VT data stream is sent directly to tape are not supported. Finally, a node named Backupexec is registered on the TSM server. All of the Backup Exec media servers can share this node, with backup sessions from the servers differentiated on the TSM server by the media servers file space name. Symantec includes a TSM server preparation macro named BEX.MAC that automatically performs all steps necessary to prepare the TSM server. Regardless of your experience with TSM, it is extremely important that you use the instructions under Preparing the TSM Server and Running the BEX Macro to properly configure the TSM server. From the Backup Exec interface, you can direct output from Backup Exec jobs to the TSM server by selecting the name of the TSM robotic library as the destination. Related Topics: Preparing the TSM Server on page 775 BEX.MAC Macro Command Details on page 783
774
Administrators Guide
Allocating storage space using the Volume Formatting Wizard. Creating a storage volume for the backupexec_pi storage pool. Running the BEX.MAC preparation macro.
Note Regardless of your experience with TSM, it is extremely important to install this TSM option using both the following instructions and the included macro, BEX.MAC. The TSM command conventions used within the BEX.MAC macro file may need to be adjusted to reflect the operating system conventions your TSM server is using. Related Topics: Allocating Storage Space on page 775 Creating The bexpi.dsm Storage Volume on page 776 Running the BEX.MAC Macro on page 778
775
TSM command variables Item Description The drive and directory location of the DSMFMT utility. The location of the DSMFMT utility may vary according to the operating system your TSM server is using.
[drive:][path]
dsmfmt
776
Administrators Guide
Preparing the TSM Server TSM command variables (continued) Item Description The drive and directory location where you want to create the bexpi.dsm file. The DSMFMT utility specifies the bexpi.dsm file as a storage volume for the storage pool backupexec_pi. Important: The BEX.MAC macro looks for the bexpi.dsm file in the root or top-level directory, then associates it with the backupexec_pi storage pool. If you locate the bexpi.dsm file in a directory other than the root or top-level, you must edit the BEX.MAC macro and change the location of the bexpi.dsm file so it can be associated with the backupexec_pi storage pool. 30 Specifies that the size of the bexpi.dsm file is 30MB. (When using the Volume Formatting Wizard, this value is expressed in megabytes by default.) If you require the file to be a size other than 30MB, use the following formula to find the maximum filespace needed: (number of slots +1) x 64K = maximum space required per robotic library. Add the maximum space required for each robotic library to find the total space required by the bexpi.dsm file.
[drive:][path]
bexpi.dsm
For example, if you are using TSM on Windows 2000, Windows XP, or Windows Server 2003 platforms and you want to format a 30MB file to be located in the root directory, type: dsmfmt <path>bexpi.dsm 30 where <path> is the directory to create the file in. 2. After formatting the bexpi.dsm file, run the BEX.MAC macro to associate the backupexec_pi storage pool with the bexpi.dsm file. The macro also executes commands that complete the preparation of the TSM server. Note For the BEX.MAC macro to run correctly, the BACKUPPOOL storage pool must exist on the TSM server. Related Topics: BEX.MAC Macro Command Details on page 783
777
Easy access of backup data between Backup Exec servers since each server is identified by the file space name of the server submitting the job. Only one administration console and one password are required for any number of Backup Exec servers. A macro, BEX.MAC, included on the TSM feature CD, that automates the association of the new storage pool, and the creation of the necessary policy domain, policy set, management classes, and node registration. With shared nodes, this macro is run once to complete preparation of the TSM server. Difficult access of backup data written by other Backup Exec servers since file space names are not easily shared across nodes. A unique node name and a unique password are required for each Backup Exec server.
Disadvantages of using individual nodes for each Backup Exec server include:
3. After the BEX.MAC macro completes with no errors, enable Backup Exec to run with TSM. Refer to Enabling TSM Support on page 779.
778
Administrators Guide
779
Changing the Defaults for Backup Exec for Windows Servers Registry Key Values For The TSM Option
Following is a description of the values in the registry key that can be changed. The values are given as decimal values:
Registry Key Values Item CommTimeout: Description This value must match the Communications Timeout entry in the DSMSERV.OPT file on the TSM server. Minimum: 1 second Maximum: 65535 seconds, Default: 60 seconds If the If closed with X seconds setting is selected in Backup Exec, (under Advanced node in the Backup Job Properties pane) its value should not exceed the Communications Timeout setting on the IBM TSM server. If the time-out value does exceed the TSM CommTimeout value, backups may fail with an I/O device error indicated for the TSM drive. The TSM CommTimeout value must be coordinated with the CommTimeout value on the TSM server, as described in the TSM installation documentation.
780
Administrators Guide
Changing the Defaults for Backup Exec for Windows Servers Registry Key Values (continued) Item Enabled: Description Enables or disables TSM support. When this field is set to 0, TSM is disabled. Default: 1 (on) Changes the file space name of a media server for which you want to view or restore data. By default, the machine name is used as the file space name. Multiple Backup Exec servers can send backup data to the TSM server. If the media servers are sharing a node, which is the default, the TSM server uses the servers file space name to distinguish backup sessions. To be able to view or access backup data, you must use the same file space name that was used when the data was sent to the TSM server. For example, if you backed up data to the TSM server using the media server with the file space name of ACCT, but you are now on a media server with the file space name of PUBS, you can view or restore the backup data from ACCT by changing the file space name on PUBS to ACCT and cataloging the tapes/slots you want to view. Maximum length: 1023 characters Default: MachineName LoaderSlots: Sets the number of slots you can define in any given magazine Minimum: 1 slot, Maximum: 255 slots Default: 10 slots Sets the name of the node used to communicate with the TSM server. This name must match the node name registered for Backup Exec on the TSM server. Maximum length: 63 characters, Default: BackupExec
FileSpaceName:
NodeName:
781
Changing the Defaults for Backup Exec for Windows Servers Registry Key Values (continued) Item ObjectMegSize: Description When Backup Exec sends data to the TSM server, it sends the data in blocks. For example, 50MB of data is sent to the TSM server in five 10MB blocks. This key is used to change the default block size. You may want to change the block size from the 10MB default according to your system performance. A recommendation is to set the object size to 1/100 of the available space in the BACKUPPOOL storage pool, if more than 100 MB are available in that pool. An indication that the object size is too large, or that the TSM server is running out of storage space, is if the following errors appear in the Event Log: 7106: Storage device TSM Storage reports an error on a request to write a file mark to media. The error reported is Hardware failure. 14000: An error occurs while processing an TSM command, ANS4311E (RC11) Server out of data storage space, and ANSO2661 (RC2302) The dsmEndTxn vote is ABORT. Check the reason field. Minimum: 0MB, Maximum: 3096MB, Default: 10MB PI_MgmtClass: Sets the name of the position information management class. This name must match the PI management class name on the TSM server. Maximum length: 29 characters, Default: MC_PI. Platform: Used to further identify a session on the TSM Client Console Monitor. Maximum length: 15 characters, Default: MachineName_01 VT_MgmtClass: Sets the name of the virtual tape management class. This name must match the VT management class name on the TSM server. Maximum length: 29 characters, Default: MC_VT.
782
Administrators Guide
Changing Passwords
To change the password for TSM on a Backup Exec server, run ADSMCFG.EXE, found in the Backup Exec program directory. For example: C:\PROGRAM FILES\VERITAS\BACKUP EXEC\NT. You are prompted to enter a new password, and then to re-enter it to confirm it. You must make the same password change on the TSM server or you will receive an authentication failure error when the next Backup Exec session starts. On a shared node, if the password is changed for one Backup Exec server, it must be changed for all servers sharing that node. The TSM server automatically expires node passwords after a specified amount of time. When the password expires, Backup Exec instructs the TSM server to reuse the previous password.
Associates the storage pool backupexec_pi with the storage volume file bexpi.dsm. Creates a new policy domain named VERITAS. Creates a new policy set in the VERITAS domain named bex_backup. Creates a management class named MC_PI. Creates a management class named MC_VT, and modifies it to be the default management class for the policy set bex_backup. Creates a backup copy group (inside the MC_PI management class) with a destination pointing to the backupexec_pi storage pool. Creates a backup copy group (inside the MC_VT management class) with a destination pointing to the TSM servers BACKUPPOOL storage pool. Activates all the changes and additions. Registers a node on the TSM server named backupexec with a password of bex.
Note If you change any of the default names used in the BEX.MAC macro, you must make the same changes on the Backup Exec server.
783
Creates a policy domain named VERITAS. Creates a policy set in the domain VERITAS named bex_backup.
Creates a management class named MC_PI for the policy set bex_backup in the domain VERITAS with space management disabled. The MC_PI management class acts like a map for all the backup data files that are stored on the TSM server. It is written to and read from by Backup Exec during almost every operation. Creates a management class called MC_VT for the policy set bex_backup in the domain VERITAS. This class is where the bulk of the data being backed up resides. Backup Exec stores its data on the TSM server in chunks called objects. By default, the object size is 10MB, but the size can be changed. For details on how to change the object size, and when it might be necessary, see Changing the Defaults for Backup Exec for Windows Servers on page 779. Modifies the management class MC_VT to be the default management class.
784
Administrators Guide
BEX.MAC Macro Command Details BEX.MAC macro commands (continued) Item define copygroup VERITAS bex_backup mc_pi DESTination = backupexec_pi VERExists = 1 VERDeleted = 0 RETExtra = 0 RETOnly = NOLimit define copygroup VERITAS bex_backup mc_vt DESTination = BACKUPPOOL VERExists = 1 VERDeleted = 0 RETExtra = 0 RETOnly = NOLimit Description Creates a backup copy group with a destination pointing to the backupexec_pi storage pool. The number of backup versions to keep is set to one because Backup Exec only recognizes one copy of backup data. Because Backup Exec does not use the Length of Time To Retain Only Backup Version feature, it is set to No Limit. Creates a backup copy group for the VT data stream with a destination pointing to the TSM servers BACKUPPOOL storage pool. Note The VT data stream must first be written to a disk-based storage pool, then optionally migrated to tape. Configurations in which the VT data stream is sent directly to tape are not supported. Activates all the previously listed additions/modifications.
activate policyset VERITAS bex_backup REGister Node backupexec bex DOMain = VERITAS BACKDELETE = YES
Registers a node on the TSM server called backupexec with a password of bex, using the policy domain called VERITAS, and allowing the deletion of file spaces. If you are using individual nodes for each Backup Exec server, you can use this node registration for one server. You must manually register all other servers using a unique node name and password, and using the policy domain VERITAS. You must also change the default names on the Backup Exec server to match the new node registration. See Changing the Defaults for Backup Exec for Windows Servers on page 779.
785
Troubleshooting
Troubleshooting
If the TSM server and the Backup Exec server cannot communicate after the TSM feature has been installed, check the following:
Are all the necessary API and OPT files copied to the correct locations? Does the DSM.OPT file have the correct TCP/IP address and port number entered? Can you ping the TSM servers TCP/IP address? If you cannot ping the server, the support will not work.
Related Topics: TSM Problem Resolutions for Backup Exec for Windows Servers on page 786
786
Administrators Guide
Logical Unit Id 1 DeviceName: REG_SZ: Tape41 Identifier: REG_SZ: ADSM Tape Device Type: REG_SZ: TapePeripheral 2. Verify that TSM is enabled in the Registry: HKEY_LOCAL_MACHINE\SOFTWARE\VERITAS\Backup Exec\ADSM Enabled: REG_DWORD: 0x1 You may need to restart the Backup Exec services for the changes to take effect. 3. To restart the services, go to Control Panel - Settings. Select the Backup Exec services, and then click Stop. 4. Click Start. Item: Hardware Error Detected message box says, No storage device has been detected. The Windows Event Viewer will contain an entry under Application Log. Possible error messages and corrective actions for this problem are listed in the following table:
TSM Troubleshooting Guide Error Message An error occurred while attempting to load the IBM ADSM32.DLL. The files ADSM32.DLL, BLKHOOK.DLL, DSCAMENG.TXT and DSM.OPT must reside in the same directory as Backup Exec. An error occurred while processing a TSM command. (610) Corrective Action Verify that these files are present.
The file DSCAMENG.TXT is missing. The file DSM.OPT is missing. Verify that TCP/IP is installed properly. Ensure the DSM.OPT entry for TCPServeraddress points to a valid TSM server.
An error occurred while processing a TSM command. Options file not found. An error occurred while processing a TSM command. Session rejected: TCP/IP connection failure.
787
Viewing TSM-related Errors TSM Troubleshooting Guide (continued) Error Message An error occurred while processing a TSM command. Session rejected: Unknown or incorrect ID entered. Corrective Action Ensure that the Backup Exec node exists on the TSM server.
Item: If the object size is set too large, or the TSM server is running out of storage space, the following errors appear in the Event Log:
7106: Storage device TSM Storage reports an error on a request to write a file mark to media. The error reported is Hardware failure. 14000: An error occurs while processing a TSM command, ANS4311E (RC11) Server out of data storage space, and ANSO2661 (RC2302) The dsmEndTxn vote is ABORT. Check the reason field.
788
Administrators Guide
Appendix
Enables the remote backup and restore of Windows features. You can use the Remote Agent Monitor, installed with the Remote Agent, to check if a backup or restore job is running on the remote Windows computer, to add or change the media servers that the Remote Agent advertises to, and to enable debug logging. You can also use the Remote Agent Monitor to open the Registry Editor, the Services window, and the Event Viewer on the remote Windows computer.
Increases backup throughput on Windows systems. The Remote Agent provides faster backup processing by locally performing tasks that, in typical backup technologies, require extensive network interaction. The Remote Agent processes backup data into a continuous stream that the media server then processes as a single task. This method provides better data transfer rates over traditional technologies, which require multiple requests and acknowledgments between the media server and the remote server.
Enables you to backup and restore in firewall environments. Enables you to backup and restore using a specified local network.
789
To display the Remote Agent as a selection in a media server's backup selection tree, and to be able to specify a local network for use between the Remote Agent and a media server, you are prompted during installation to enter the names or IP addresses of the media servers that you want the Remote Agent to advertise to. You can add media servers for the Remote Agent to advertise to, and change their names and IP addresses by using the Remote Agent Monitor.
Enables the backup and restore of the Extensible Firmware Interface (EFI) on Intel Itanium 64-bit computers. These computers must have the Remote Agent installed. Significant performance increases are attained when running modified backups (for example, differential and incremental). This occurs because file selection is performed locally by the Remote Agent instead of across the network as performed by traditional network backup applications.
Note Network hardware has a major impact on performance. Performance is directly related to the capabilities of the networking hardware in the media server and the remote device. Higher network bandwidth ratings also contribute to faster operation processing. In order to back up and restore the following platforms, the Remote Agent must be purchased and installed. These platforms include:
Windows Server 2003 Product Family (all server versions) Windows 2000 Server Product Family (all server versions)
To protect the Workstation versions of these platforms, you must install the Remote Agent on each platform; however a license is not required for systems running Windows workstation operating systems. Related Topics: Requirements for the Remote Agent on page 791 Installing Backup Exec Agents to Remote Computers on page 77 Specifying Default Backup Network and Firewall Options on page 336 Enable Remote Agent TCP dynamic port range on page 338 Using Backup Exec with Firewalls on page 341 Backing Up EFI System Partitions on page 350 The Remote Agent Monitor for Windows Servers on page 797
790
Administrators Guide
Shadow Copy Components file system. Backup Exec Advanced Open File Option.
The Remote Agent for 64-bit computers also supports the Backup Exec Agent for Microsoft SQL Server on a 64-bit version of SQL Server 2000. The Remote Agent for 64-bit computers has the following limitations:
Can be installed only on 64-bit Intel Itanium and Itanium 2 computers running the Windows Server 2003 family or Windows XP 64-bit Edition. Cannot be push installed. A local installation of the Remote Agent on the 64-bit computer is required. Supports only the Symantec Volume Snapshot Provider (VSP) and Microsoft Volume Shadow Copy Service (VSS) when used with the Advanced Open File Option.
Related Topics: Installing the Remote Agent to Remote Windows Computers on page 793 Enable Remote Agent TCP dynamic port range on page 338
Appendix A, Symantec Backup Exec - Remote Agent for Windows Servers 791
Encrypted files SIS files Disk quota data Removable Storage data Remote Storage data Mount points Sparse files System State data, including:
COM+ Class Registration database Boot and system files Registry Certificate Services database (if the server is operating as a certificate server) Active Directory (if the server is a domain controller) SYSVOL (if the server is a domain controller) Cluster quorum
Note You can select System State for backup on a remote computer running Windows 2000, Windows XP, or Windows Server 2003 only when the Remote Agent is installed on the remote computer.
792
Administrators Guide
Installing the Remote Agent on a 64-bit Computer Using the Installation Program
The installation program for the 64-bit Remote Agent is separate from the Backup Exec installation program. In addition, the 64-bit Remote Agent installation process differs from the 32-bit Remote Agent installation process. The 32-bit Remote Agent is installed locally or is push installed to a remote computer. The 64-bit Remote Agent can only be installed locally or via a mapped drive. The 64-bit Remote Agent installation program is available on the Backup Exec media server in the default directory \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64. A Remote Agent serial number is not required during the installation of the 64-bit Remote Agent. However, you must enter a Remote Agent serial number on the media server. After you install the 64-bit Remote Agent, you can use the Windows Add/Remove Programs feature to modify or uninstall the option. To install the 64-bit version of the Remote Agent: 1. On the remote computer, map a drive letter to the Backup Exec for Windows Servers media server using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64, or you can type a UNC path. 2. Double-click setup.exe, and then click Next.
793
3. Select the type of installation you want, either Complete or Custom, and then click Next. The Complete option installs the 64-bit version of the Remote Agent and the Advanced Open File Option. Select the Custom option if you do not want to install the Advanced Open File Option at this time. You can install it later if needed. 4. If you selected the Complete option, go to step 5. If you selected the Custom option, select the option you want to install, and then click Next. You cannot clear the Remote Agent selection because it is a required component and you cannot change the installation destination. 5. Click Install. 6. If you installed the Advanced Open File Option, you must reboot the computer. Backup Exec creates an installation log in \Windows\BKUPINST.log.
Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line
To install the Remote Agent on a remote computer using the Windows command line: 1. At a remote computer, map a drive letter to the Backup Exec for Windows Servers media server RANT32 directory using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT32 2. Open a command prompt and type the drive letter you mapped in step 1. 3. To install the Remote Agent without advertising enabled, run the following command: setup.exe /RANT32: -s -boot To install the Remote Agent with advertising enabled, run the following command: setup.exe/RANT32: -s /ADVRT: <media server name 1> <media server name 2> The Remote Agent is installed on the remote computer in the following directory: \Program Files\VERITAS\Backup Exec\RANT The Remote Agent installation log file is installed in \WINNT\bkupinst.log or \Windows\bkupinst.log.
794
Administrators Guide
To uninstall the 32-bit Remote Agent from a remote computer using the Windows command line: 1. At the remote computer, map a drive letter to the Backup Exec for Windows Servers media server RANT32 directory using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT32 2. Open a command prompt and type the drive letter you mapped in step 1. 3. Run the following command: setup.exe /RANT32: -s -u Note The -s parameter is used to run the operation in silent mode, without the benefit of a user interface. The -u parameter specifies an uninstall operation. The Remote Agent is uninstalled from the remote computer. Related Topics: Enable Advertising for the Remote Agent for Windows Servers on page 800
Installing and Uninstalling the 64-bit Remote Agent and Advanced Open File Option Using a Command Script
You can install and uninstall the 64-bit Remote Agent and the Advanced Open File Option using command script files. The command script files are included in the 64-bit Remote Agent download. The command script file setupaa64 installs the 64-bit Remote Agent. The command script file setupaofo64 installs the Remote Agent and the Advanced Open File Option. One command script file, Uninstallaaofo64, is available to uninstall both the 64-bit Remote Agent and the Advanced Open File Option. The uninstall command script removes both options together. You cannot remove the options separately using the command script. To install the 64-bit Remote Agent and Advanced Open File Option using a command script: 1. Map a drive letter to the Backup Exec for Windows Servers media server using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64. Note Scripts do not support UNC paths. 2. Do one of the following:
The command script installs the option automatically on the remote server in the following directory: \Program Files\VERITAS\Backup Exec\RANT. 3. If you installed the Advanced Open File Option, you must reboot the remote computer. Backup Exec creates an installation log in \Windows\BKUPINST.log. To uninstall the 64-bit Remote Agent and Advanced Open File Option using a command script: 1. Map a drive letter to the Backup Exec for Windows Servers media server using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT64. 2. Double-click Uninstallaaofo64. Both the 64-bit Remote Agent and the 64-bit Advanced Open File Option are removed from the computer. 3. Reboot the remote computer.
796
Administrators Guide
797
The Remote Agent Monitor icon is placed in the system tray. 3. To display the Remote Agent Monitor, double-click the icon in the system tray, or right-click the icon, and then on the shortcut menu click Options. After the Remote Agent Monitor is started for the first time, you can configure it to start whenever you log on. 4. To open the Registry Editor, the Services window, and the Event Viewer on the remote Windows computer, right-click the Remote Agent Monitor icon in the system tray, and then on the shortcut menu click Tools. Related Topics: Setting Defaults for the Remote Agent Monitor on page 799 Viewing Remote Agent Monitor Activity on page 799 Enable Advertising for the Remote Agent for Windows Servers on page 800 Enable Debug Logging for Remote Windows Computers on page 802
798
Administrators Guide
Start the Remote Agent Select this check box to start the Remote Agent Monitor when you Monitor when you log log on. on
Related Topics: Enable Advertising for the Remote Agent for Windows Servers on page 800 Enable Debug Logging for Remote Windows Computers on page 802
Idle Backup is running Restore is running Backup and Restore are running The BEREMOTE service or process is not running
799
To view Remote Agent Monitor status: 1. Double-click the Remote Agent Monitor icon in the system tray to view the monitor, or right-click the icon and then click Options from the shortcut menu. 2. Click the Status tab. The options are described in the following table:
Backup Exec Remote Agent Monitor Options, Status tab Item Activity Media server Source Current folder Name of the media server processing the current operation. Media or share that is being processed. Name of the current directory, folder, or database (depending on the specific agent) that is being processed. Name of the current file that is being processed. Description
Current file
Related Topics: Setting Defaults for the Remote Agent Monitor on page 799 Enable Debug Logging for Remote Windows Computers on page 802
800
Administrators Guide
To add or edit names or IP addresses of media servers for Remote Agent advertising: 1. Double-click the Remote Agent Monitor icon in the system tray to view the monitor, or right-click the icon and then click Options from the shortcut menu. 2. Click the Advertising tab, set the following options as appropriate, and then click Apply.
Backup Exec Remote Agent Monitor Options, Advertising tab Item Enable Remote Agent advertising Description Click this to enable the Remote Agent to advertise to media servers.
Media server name or IP address Media server name IP address Add Click this to enter the name of a media server. Click this to enter the IP address of a media server. After entering a media server name or IP address, click Add to enter the media server to the displayed list. To change a media server name or IP address, select the media server in the displayed list, and then click Edit. To delete a media server name or IP address from the list of media servers to advertise to, select the media server in the displayed list, and then click Remove.
Edit
Remove
Related Topics: Specifying Default Backup Network and Firewall Options on page 336 Setting Defaults for the Remote Agent Monitor on page 799
801
3. If you make changes to the Debug Log tab, you must restart the Backup Exec Remote Agent for Windows Servers service before the changes take effect. 4. To restart the Remote Agent service, right-click the Remote Agent Monitor tray icon, click Tools, and then click Open Services. The local services appear. 5. Right-click the Backup Exec Remote Agent for Windows Servers service, and then click Restart. 6. When prompted to restart this service, click Yes.
802
Administrators Guide
Appendix
Full Differential - Using modified time Incremental - Using modified time Working set
Installation on a supported platform and file system. Supported platforms include: Redhat Advanced Server 2.1 and Redhat Enterprise Linux 3.0 (WS, AS or ES) on x86 using ext2, ext3, or VxFS file systems, Solaris 8 and 9 on 32 or 64 bit Sparc systems using Solaris file system or VxFS and Suse Linux Enterprise Server 8 on x86 using ext2, ext3, VxFS, ReiserFS, or JFS.
803
Caution RALUS has dependencies on other packages and libraries. These must be installed prior to installing RALUS. Installing RALUS on Redhat Enterprise Linux requires libstdc++-libc6.2-2.so.3 or later, which is provided by compat-gcc-c++-7.3-2.96.122.i386.rpm or a newer version. Dependent .rpm files may also have dependencies of their own.
Root, Super User, or Admin privileges are required on Linux and Unix hosts in order to install the Remote Agent for Linux or Unix. Access to a mounted CD-ROM drive. TCP/IP, which is used for communication with the Unix host computers, is required on the media server. RALUS can be installed on the same Unix host where the Backup Exec 8.x and 9.x Agent for Unix is installed. However, only one agent should be running at a time. Running both RALUS and the Backup Exec 8.x and 9.x Agent for Unix simultaneously is not supported. For information on disabling or enabling either of the agents, see RALUS and the Backup Exec 8.x and 9.x Agent for Unix on page 816.
To install RALUS from the Backup Exec for Windows Servers CD, see Installing RALUS Using the Installer on page 805. To manually install RALUS from a tar file, see Manual Install and Uninstall of RALUS on page 814. To manually start the RALUS daemon, see Manually Starting the RALUS Daemon on page 815.
Caution If the beoper group is not created by the RALUS installer or is not created manually, connections to the hosts from the Backup Exec media server will fail. When creating the group manually, do the following at each Unix host where RALUS will be installed. For hosts that are members of a NIS domain, refer to the NIS documentation for information on adding groups to a NIS domain.
Create the group beoper. When creating the group, use lowercase letters. After creating the beoper group, add all users to the group that should be granted rights to protect the Unix host with Backup Exec.
For more information on creating groups, see your Unix system documentation.
Appendix B, Symantec Backup Exec - Remote Agent for Linux or Unix Servers
805
3. Logon to the target computer with super user, root, or admin privileges. 4. Navigate to Remote Agent for Linux or Unix Servers installer on the Backup Exec CD using the following path: <device_name>/ralus/<platform_name>/installralus 5. At the command prompt, type: installralus and press ENTER. 6. Enter the name of a Unix host or hosts on which to install RALUS and press ENTER. When entering multiple host names, use spaces between each name. 7. After the installer successfully checks for a valid Unix host operating system during the initial system check, press ENTER. 8. After reviewing the package installation summary, press ENTER. 9. Press ENTER to start the RALUS installation requirements precheck. Note If you are running the Backup Exec 8.x and 9.x Agent for Unix, a message appears informing you that the Backup Exec 8.x and 9.x Agent for Unix will be disabled, but not uninstalled. Press ENTER to disable the Backup Exec 8.x and 9.x Agent for Unix and continue with the install process. If you do not want to disable the Backup Exec 8.x and 9.x Agent for Unix, the RALUS installer will terminate and exit and RALUS will not be installed. 10. Press ENTER after the RALUS installer installation requirements precheck completes. 11. Press ENTER when prompted, Are you ready to configure RALUS? [y,n,q] <y>. RALUS configuration consists of answering a set of configuration-related questions designed to guide you through the process of entering the IP address or the DNS name of the Backup Exec media server you want to back up the Unix host. 12. Read the RALUS configuration overview and then press ENTER. 13. Enter the Host Name or IP address of the Backup Exec media server you want to communicate with RALUS, and then press ENTER. When prompted, press either Y then ENTER to repeat the process of adding Backup Exec media servers, or press ENTER to continue. 14. Verify the Backup Exec media server configuration information is correct and then press ENTER.
806 Administrators Guide
15. Read the beoper group requirement and then press ENTER to start the NIS server scan. 16. Examine the results of the NIS server scan. If a NIS server is detected the RALUS installer is unable to create the beoper group and it must be done manually. If no NIS server is detected press ENTER to RETURN to have the installer scan for the beoper group and root membership. 17. If no beoper group is found, press ENTER to create the group or press <n> then ENTER if the group will be created manually. 18. Press Y then ENTER to enter a specific Group ID (GID) or press ENTER to have the installer select the next available GID. 19. Press ENTER to have the root user added as a member to the beoper group. Press <n> then ENTER if the account will be added manually. 20. Press ENTER to begin the installation. A message appears stating the installation has completed successfully after the installation finishes. 21. Press ENTER. After RALUS is configured, a message appears stating that the RALUS configuration has completed successfully. 22. Press ENTER. The installation summary, installralus log, and installation response files are saved to the following locations on the Unix host: Installation summary:
/opt/VRTS/install/logs/installralus<summary file number>.summary
Installralus log:
/opt/VRTS/install/logs/installralus<summary file number>.log
Installation response:
/opt/VRTS/install/logs/installralus<summary file number>.response
After the log files are saved, the Remote Agent for Linux or Unix Servers installation is complete.
Appendix B, Symantec Backup Exec - Remote Agent for Linux or Unix Servers
807
808
Administrators Guide
Installing the Remote Agent for Linux or Unix Servers Ralus.cfg formatting example A B C
A = Required string B = Required and unique identifier (the order or appearance is irrelevant) C = Required DNS name or IP address
Editing a ralus.cfg file can be done using the Unix text editor, vi. However, any basic text editor can be used for editing purposes. File and Directory Exclusions in ralus.cfg You may have files and directories on the UNIX hosts that you do not want to backed up. Rather than manually deselecting them when making backup selections, you can enter file and directory exclusion information in the ralus.cfg file. After the information is added, the file and directories are ignored and will not be backed up.
File and Directory Exclusions in the ralus.cfg File
A A = Required string B = Required and unique identifier (the order or appearance is irrelevant) C = File or directory to be excluded
Appendix B, Symantec Backup Exec - Remote Agent for Linux or Unix Servers
809
On initial access of the Unix host, a Logon Account Selection screen appears stating that the system logon account used by Backup Exec to access to the Unix host has failed, and that access to the Unix host is denied. To proceed, a new logon account must be created for the Unix host using credentials that allow access to the Unix host. Note The logon account credentials you provide during the creation of logon account used during the initial access of the Unix host are stored by Backup Exec. These credentials will be used again when making future backup selections from the
810
Administrators Guide
Unix host. However, if the access credentials for the Unix host change, a new Backup Exec Unix host logon account will need to be created in order to access the host. Use the following steps to add logon credentials for the Unix host. To add logon credentials: 1. In Backup Job Properties, double-click Remote Selections. 2. Double-click Unix Agents. 3. Double-click the desired Unix host. A Logon Account Selection screen appears stating that the Backup Exec System Logon Account failed to access the Unix host. 4. On the Logon Account Selection screen, click New. 5. Add account credentials for the Unix host and then click OK. Note Credentials supplied for the Unix host must have root or super user privileges that can be authenticated by the Unix host.
Add Logon Credentials dialog box Item User name Description The user name required to access the Unix host. This name must have root, super user, or admin rights, which can be authenticated by the Unix host. The password used to access the Unix host. The same password entered in the Password field, which is used to confirm the password was entered correctly in the Password field. A label you enter to name the logon account. Pertinent notes about the account.
6. After authenticating the credentials entered, access to the Unix host is granted and backup selections can be made.
Appendix B, Symantec Backup Exec - Remote Agent for Linux or Unix Servers
811
Back up contents of Use this option to back up the contents of directories that are linked soft-linked directories using soft links. For more information on soft linked directories, see your Unix/Linux documentation. Lock remote files Use this option if RALUS requires exclusive access to the files on remote systems connected through Network File System (NFS).
2. Make the appropriate selections or use the default selections provided. 3. Click General in the Properties pane of the Backup Job Properties screen.
812 Administrators Guide
4. In the list box for Backup method for files, select Full - Back up files - Using modified time rather than Full - Back up files - Using archive bit (reset archive bit), as the concept of an archive bit is not valid in Unix environments.
Uninstallralus log:
/opt/VRTS/install/logs/uninstallralus<summary file number>.log
After the log files are saved, the Remote Agent for Linux or Unix Servers uninstall is complete.
Appendix B, Symantec Backup Exec - Remote Agent for Linux or Unix Servers 813
For example: /ralus/linux/pkgs/linux/ralus.tar 5. Extract the contents of the ralus.tar file using tar -xf ralus.tar (use tar xf ralus.tar on Unix hosts running the Solaris operating system). 6. Change the owner for all RALUS files to root / id 0 (zero) using chown -R 0 etc opt var. 7. Change the group for all RALUS files to id 0 (zero) using chgrp -R 0 etc opt var. 8. Change the permissions for all RALUS binaries using chmod -R 0500 opt.
814
Administrators Guide
9. Change the permissions for all other RALUS files using chmod -R 0600 etc var 10. Copy the RALUS files to their target destinations using cp -r etc opt var / 11. Change to the /opt/VRTSralus/bin directory. 12. Execute the VRTSralus.service-install script to enable RALUS to start up as a daemon. 13. Reboot the host or start up the RALUS daemon.
5. Remove all RALUS files from the Unix host using rm -r /etc/VRTSralus /opt/VRTSralus /var/VRTSralus
RALUS and the Backup Exec 8.x and 9.x Agent for Unix
/etc/init.d/VRTSralus.init start
RALUS and the Backup Exec 8.x and 9.x Agent for Unix
Both the Backup Exec 8.x and 9.x Agent for Unix and RALUS can be installed together on the same host, but only one can be running at one time. If you are manually installing RALUS and the Backup Exec 8.x and 9.x Agent for Unix is already installed, the Backup Exec 8.x and 9.x Agent for Unix must be disabled. After disabling the Backup Exec 8.x and 9.x Agent for Unix, proceed with the manual RALUS installation. Use the following steps to disable/enable the Backup Exec 8.x and 9.x Agent for Unix. Disabling the Backup Exec 8.x and 9.x Agent for Unix: 1. On the Unix host, kill all processes named agent.be. 2. Rename the Backup Exec 8.x and 9.x Agent for Unix binary /etc/bkupexec/agent.be to etc/bkupexec/agent.be.disabled. Enabling the Backup Exec 8.x and 9.x Agent for Unix: 1. On the Unix host where the Backup Exec 8.x and 9.x Agent for Unix was disabled, kill all processes named beremote, which are the processes used by RALUS. 2. Rename the Backup Exec 8.x and 9.x Agent for Unix binary /etc/bkupexec/agent.be.disabled to etc/bkupexec/agent.be 3. Start the Backup Exec 8.x and 9.x Agent for Unix as usual or reboot the host.
816
Administrators Guide
RALUS and the Backup Exec 8.x and 9.x Agent for Unix
Disabling RALUS: 1. On the Unix host, kill all processes named beremote. 2. Rename the RALUS binary /opt/VRTSralus/bin/beremote to /opt/VRTSralus/bin/beremote.disabled. Enable RALUS: 1. On the Unix host where RALUS was disabled, kill all processes named agent.be, which are the processes used by the Backup Exec 8.x and 9.x Agent for Unix. 2. Rename the RALUS binary /opt/VRTSralus/bin/beremote.disabled to /opt/VRTSralus/bin/beremote. 3. Start RALUS as usual or reboot the host.
Appendix B, Symantec Backup Exec - Remote Agent for Linux or Unix Servers
817
RALUS and the Backup Exec 8.x and 9.x Agent for Unix
818
Administrators Guide
Appendix
Use of a Backup Exec for Windows Servers media server as a centralized administration server. Use of the central administration server to store catalogs, device and media information, policies, jobs and selection lists. Job log information generated by the managed Backup Exec media servers can also be stored on this central server.
819
Use of your existing storage hardware through the use of job delegation concepts across media servers. Use of existing storage hardware using job delegation concepts, which enables you to automatically distribute the processing of backup and restore jobs to various Backup Exec media servers on your network. Use of a scalable architecture to handle the future growth of data on your network.
With the Central Admin Server Option installed, you can group your existing Backup Exec media servers into logical media server pools. Using these pools, you can restrict protected server backup jobs to a selected set of Backup Exec managed media servers, while also implementing the CASO job delegation feature. Job delegation automatically load balances jobs to any available Backup Exec managed media server in your environment. As additional managed media servers become available, additional jobs can be delegated for processing. Restore operations are initiated at the managed media servers by default. However, with CASO, you also have the option of centralizing the restore process by running restore jobs from the central administration server. Related Topics: How the Central Admin Server Option Works on page 821 Requirements for Installing the Central Admin Server Option on page 828
creating backup jobs by creating policies and selection lists from a centralized location. centralizing job delegation by targeting a managed media server to run a job and then delegating the job to the selected managed media server for processing. all job policy functionality. the management of notification and alerts. job monitoring. job history and job logs.
Administrators Guide
820
Note The central administration server can also be used to run centralized restore jobs. However, you must centralize the storage of all catalogs produced during backup operations at the individual media servers on the central administration server. For more information, see CASO Restore Operations and Centralized Catalogs on page 861. b. Managed media servers. These Backup Exec media servers, with one or more storage devices attached to them, are managed by the central administration server. They are responsible for the actual processing of backup and restore jobs. By default, the catalogs produced by managed media servers are stored locally at the managed media server where they are produced. However, as an option, you can override the default catalog storage location and select the central administration server as the catalog storage location. Note A central administration server can also be targeted as a managed media server to process jobs. Related Topics: Requirements for Installing the Central Admin Server Option on page 828
821
The next diagram shows a local area network environment where one Backup Exec media server is designated as the central administration server, while other media servers become managed media servers, communicating directly with, and being managed and monitored from, the central administration server. Backup Exec jobs can also be delegated by the central administration server to each of the managed media servers for processing.
822
Administrators Guide
About the Central Admin Server Option CASO-configured Backup Exec Environment - Local Area Network Local Area Network
The next diagram shows a wide area network implementation of Backup Exec with the Central Admin Server Option installed.
823
About the Central Admin Server Option CASO-configured Backup Exec Environment - Wide Area Network
Wide Area Network Windows Data Center Backup Exec 10.0 Central Administration Serve - Device and media - Policies - Job histories - Centralized catalogs Managed Media Servers
Jobs
Jobs Jobs
Jobs
Remote branch office Managed Media Servers Protected Servers
Remote branch
Jobs
The final diagram shows CASO installed in a Backup Exec SAN Shared Storage Network environment.
CASO-configured Backup Exec Environment - SAN Shared Storage Network
Managed media servers not attached to the SAN
824
Administrators Guide
Job Processing and Job Delegation with CASO on page 825 Policies with CASO on page 826 Centralized Catalog Storage with CASO on page 826 Centralized Reports on page 826 Centralized Restore on page 827 Centralized Job Logs and History Details on page 827 Centralized Alerts on page 827 Using CASO to Maintain Backup Exec Network Storage Executive 8.6 Functionality on page 827 Using Media Server Pools in CASO on page 866 Using the Central Admin Server Option with Microsoft Clusters and SAN SSO on page 678
Job Processing and Job Delegation with CASO Job delegation is the automatic load balancing of jobs among the various storage devices attached to the Backup Exec managed media servers. These storage devices, when logically grouped in drive pools, process jobs delegated from the central administration server as they become available. For example, if a device pool contains two storage devices and one is busy processing a job, the central administration server automatically delegates another job to the idle storage device. Jobs are automatically created and submitted to the central administration servers job queue after a policy is applied to a selection list. Queued jobs are processed in priority order. Depending on job parameters and system configuration, the central administration server then delegates jobs to available storage devices in a selected device pool. Templates within a policy can be targeted to either a device pool or a specific device. Device pools can consist of devices attached to a single managed media server, or they can consist of devices from different managed media servers. The advantage of job delegation is realized when a template is targeted to a drive pool that spans managed media servers. When multiple managed media servers and their devices are available to the central administration server for job delegation, the efficiency of Backup Exec for Windows Servers is greatly improved because job processing does not have to wait for a specific device or managed media server to become available.
825
For more information on device pools, see Managing Devices on page 123. After the job is processed, the following occurs:
The managed media server retrieves all relevant job completion information and forwards it to the central administration server. If the job ends in an error, the central administration server determines what to do with the job by invoking error-handling rules that specify how the job will be handled if an error condition appears. The managed media server creates a set of catalogs for the processed job, and then moves the catalog set to the central administration server or a designated catalog server for storage.
Policies with CASO Default and user-defined Backup Exec policies are supported using CASO. For more information about policies, see Policies and Templates on page 361. Centralized Catalog Storage with CASO Backup Exec catalogs created on individual stand-alone media servers are stored locally, at the media server where they are created. After CASO is installed and configured, you have the option of either continuing to store catalogs locally at the media server where they are produced, or moving them to the central administration server for centralized storage. Storing catalogs on the central administration server enables you to initiate restore operations from the central administration server, rather than having to run restore operations at each managed media server. For more information on centralizing the catalog storage location, see Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840. Centralized Reports Centralized reports are available and can be viewed at the central administration server for all delegated jobs that use the CASO job delegation feature. Reports for jobs that are initiated and run locally at the managed media server, (which are not initiated at the central administration server), cannot be viewed from the central administration server. However, as with stand-alone media servers, the reports can be viewed at the media server where the jobs run. For more information on Backup Exec reports, see Reports on page 543.
826
Administrators Guide
Centralized Restore Using the Central Admin Server Option, you can run restore operations from a central administration server, or you can run restore operations from each of the managed media servers where the backup jobs occurred. When using the centralized restore feature, restore jobs are created and submitted to the central administration server job queue for job delegation among the managed media servers in the media server pool. For more information, see How Centralized Restore Works on page 862. Centralized Job Logs and History Details Job logs and the job history for each job can be automatically copied from the managed media servers to the central administration server, giving you access to the information from a either the central administration server or the managed media servers. For more information, see Setting Job Log and Job History Options for Managed Media Servers on page 844. Centralized Alerts Using CASO, alerts generated at the managed media server are sent to the central administration server, where they are displayed. For more information, see Configuring CASO Alerts on page 845. Using CASO to Maintain Backup Exec Network Storage Executive 8.6 Functionality Sites running Symantec Network Storage Executive version 8.6 can use the Central Admin Server Option to migrate existing NSE 8.6 installations to Backup Exec for Windows Servers 10.0 and the Central Admin Server Option. By providing a migration path for existing NSE 8.6 installations, you maintain the centralized benefits of your previous NSE installations while incorporating the latest in technology with the Central Admin Server Option. For more information, see Migrating from Network Storage Executive v8.6 (NSE) on page 838. Media Server Pools with CASO CASO enables you to group multiple managed media servers together in media server pools. Media server pools can be used to restrict protected server backup jobs to a specific set of managed media servers and their attached storage devices. And because media server pools are associated with selection lists, the restrictions they encompass are defined by the selection lists being protected.
827
To configure media server pools, see Using Media Server Pools in CASO on page 866. CASO in a Clustered Environment CASO is fully configurable in a Microsoft Cluster Server environment. For more information see Using Symantec Backup Exec with Server Clusters on page 657.
Administrative rights on both the Windows 2000 or higher computers where you will be installing the Central Admin Server Option. When installing CASO on media servers in multiple domains, the Backup Exec service account should reside in the trusted domain and should have administrative rights on all media servers to be managed by the central administration server. Backup Exec for Windows Servers 10.0 must be installed on the media server you target as the central administration server. 512 MB RAM required, 1 GB recommended.
Note The system requirements (except RAM) for running the Central Admin Server Option follow the minimum requirements for running Backup Exec for Windows Servers 10.0. However, processor speed, memory, and disk space requirements may increase based on the number of managed media servers being managed, the number of protected servers being backed up, and the amount of catalog storage space required. Related Topics: Installing the Central Admin Server Option on page 832
828
Administrators Guide
829
The frequency that Backup Exec sends job logs and job history information from the managed media server to the central administration server. For more information, see Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840. The amount of time that Backup Exec waits before changing the media servers status if the media server becomes unresponsive. For more information, see Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840. When job log and job history information is sent to the central administration server. For more information, see Setting Job Log and Job History Options for Managed Media Servers on page 844. Centralized catalogs. For more information, see Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840.
Create selection lists for all resources you want to back up. Configure the selection list properties.
For more information about configuring selection lists, see Using Selection Lists on page 293. 7. Configure where you want to back up data. If you want to configure server fault tolerance and load balancing, create one or more device pools that represent the managed media servers on which delegated jobs can run. For more information, see Using Device Pools on page 132. 8. Use policies and templates to configure how and when to back up data. For more information, see Policies and Templates on page 361. 9. Create jobs by associating selection lists with policies. For more information, see Creating Jobs Using Policies on page 378. 10. Use the Job Setup view to review the jobs you created. 11. Use the Job Monitor view to monitor the active and scheduled jobs. The Media Server column indicates which managed media server an active job is running on. For more information, see Monitoring Jobs on page 405. To upgrade existing Backup Exec or NSE installations to CASO: Symantec recommends that you follow these steps in the order provided to ensure successful installation and configuration of CASO.
830
Administrators Guide
1. Determine which media server will be the central administration server, and then install CASO on that media server. You should install CASO only on the media server that you selected to be the central administration server. For instructions on installing CASO on an existing Backup Exec media server or NSE backup server, see Upgrading a Backup Exec Media Server to a Central Administration Server on page 836. 2. Launch Backup Exec on the central administration server and verify that the Media Servers view displays on the navigation bar. Then from the Media Servers view, verify that Central Administration Server displays in the Media Server Type column for the media server on which you installed CASO. 3. Determine which existing media servers will be the managed media servers in the CASO environment, and then set the central administration server for the media servers. For instructions on setting the central administration server for media servers, see Setting a Central Administration Server for Stand-alone Media Servers on page 837. 4. Push-install the Backup Exec Remote Agent to all servers you want to back up. For more information, see Installing Backup Exec Agents to Remote Computers on page 77. 5. (Optional) Configure the default options for the managed media servers. You can configure the following:
The frequency that Backup Exec sends job logs and job history information from the managed media server to the central administration server. For more information, see Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840. The amount of time that Backup Exec waits before changing the media servers status if the media server becomes unresponsive. For more information, see Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840. When job log and job history information is sent to the central administration server.Setting Job Log and Job History Options for Managed Media Servers on page 844. Centralized catalogs. For more information, see Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840.
831
Click Add Remote Computer, and then browse the list to select all of the remote computers that you want to install an option to, and then click Next.
832
Administrators Guide
Click Add Remote Computer Manually, and then type the Domain and Computer Name, and then click OK. Add as many remote computers as you want to install Backup Exec to.
5. Enter the user name, password, and domain of an account that has administrative rights on the remote computers, and then click OK. Note To avoid entering credentials separately for each remote computer that you have selected, click Use this user name and password when attempting to connect to additional computers during the installation. 6. On the Remote Installation Types dialog box, select Remote install with serialized options, and then click Next. 7. On the Remote Destination Folder dialog box, enter the folder to which the Backup Exec media server files on the remote computer will be installed, and then click OK. The default location is C:\Program Files\VERITAS\Backup Exec\NT. 8. Type the serial numbers for Backup Exec and any options that you want to install. Click Add after entering each serial number. When finished, click Next. To import the serial numbers from an existing besernum.xml file, click Import, and then browse for and select an existing besernum.xml file. When finished, click Next. The serial numbers you entered are saved to the file besernum.xml, located in the Windows directory. Note A unique serial number must be entered for each option for each remote computer that you are installing to. If a previous installation of a Backup Exec for Windows Servers is found on the computer, the serial number appears in the Existing Serial Numbers field. To remove an older serial number, select the number and click Remove. A serial number is not required for a fully functional Evaluation version. 9. Provide a user name and password that the Backup Exec system services can use (see The Backup Exec Service Account on page 66), and then click Next. The Symantec Backup Exec Database dialog box appears, and you are prompted to select a location on which to store the Backup Exec database. 10. Do one of the following:
833
Choose to create a local Backup Exec MSDE instance on which to store the Backup Exec database, and then click OK. For more information about creating a local Backup Exec MSDE instance, see Microsoft SQL Server 2000 Desktop Engine (MSDE) Components Installed with Backup Exec on page 57. Choose to use an existing SQL Server 2000 instance (with service pack 3a installed) that is on the network. You are prompted to select an instance from a list, or to type the instance name, and then click OK. Backup Exec will attempt to connect to the instance.
Note When Backup Exec is installed into an existing instance, the automated master database restore feature is not available. To recover the Master database, you must replace it with the Master database copy that Backup Exec automatically creates and updates when the Master database is backed up. When Backup Exec is installed into an existing instance, the Cluster Configuration Wizard is not available. 11. If prompted, select how the VERITAS device driver Installer should install device drivers for the tape storage devices that are connected to the server, and then click OK. It is recommended that you select Use VERITAS device drivers for all tape devices. 12. Type the name of the central administration server with which this managed media server will communicate, and then click OK. 13. Under Backup Exec for Windows Servers, verify that Managed Media Server is selected, and then click Next. If you are prompted, enter information or choose settings for additional options being installed. Click Next after each selection. 14. Read the Backup Exec installation review, and then click Install. 15. When the installation finishes, restart the computer. After restarting the managed media server, the Backup Exec central administration server and the managed media server begin communicating with one another. Each managed media server name is also added to the Media Server view on the central administration server. Related Topics: Installing Backup Exec to Remote Computers on page 73
834 Administrators Guide
Database connections require an open SQL port in both directions to the central administration servers database. Port 3527 needs to be open in both directions to enable communication for the Backup Exec Server service. An open port range is required for the Remote Agent for Windows Servers, which will allow browsing for remote selections.
In addition, the Alias for the managed media server must be set up correctly. To set up the Alias for managed media servers: 1. On the central administration server, use the svrnetcn.exe utility to determine the port on which the Backup Exec SQL instance is running. The svrnetcn.exe utility is located in \Program Files\Microsoft SQL Server\80\Tools\Binn. a. On the General tab, select the Backup Exec SQL instance. b. Under Enabled Protocols, select TCP/IP, and then click Properties. 2. On the managed media server, use the SQL Server Client Network Utility (cliconfg.exe) to create an alias for the managed media server The cliconfg.exe utility is located in \Windows\System32. a. On the Alias tab, click Add. server name\instance name c. Under Network libraries, select TCP/IP. server name\instance name e. f. Clear the Dynamically determine port check box In the Port number field, type the port number of the remote Backup Exec SQL Server instance. d. In the Server name field, type: b. In the Server alias field, type:
835
836
Administrators Guide
837
838
Administrators Guide
Using CASO to Maintain Backup Exec Network Storage Executive 8.6 Functionality on page 827 Upgrading a Backup Exec Media Server to a Central Administration Server on page 836 Installing Managed Media Servers on page 832
839
Configuring Managed Media Server Time Thresholds and Catalog Storage Locations on page 840 Setting Job Log and Job History Options for Managed Media Servers on page 844 Configuring CASO Alerts on page 845 Configuring CASO Notification on page 847
Configuring Managed Media Server Time Thresholds and Catalog Storage Locations
You can set managed media server time threshold options and catalog storage locations for each managed media server being managed by the central administration server. These options include:
Setting time thresholds for handling unresponsive managed media servers. Setting the time between job status updates. Setting time drift alerts. Setting the catalog storage location.
Communication Statuses and Time Thresholds In a CASO environment, communications about jobs that occur between managed media servers and the central administration server can sometimes be disrupted even if network communications between both computers are fine. If job-related communication disruptions occur between a managed media server and the central
840 Administrators Guide
administration server, the managed media servers communication status changes from Enabled to Stalled, and the jobs waiting to be processed by the managed media server are held in the managed media servers job queue until the communications are restored. You can set the amount of time that Backup Exec waits before changing the managed media servers status if it becomes unresponsive. The configuration settings use time thresholds, which, if exceeded, change the managed media server statuses that are reported to the central administration server. These statuses include Stalled and No Communication. When a managed media servers status changes to Stalled or No Communication, the central administration server changes the way it handles present and future jobs delegated to the stalled managed media server. For example, if communications from a managed media server are not received at the central administration server after five minutes, the central administration server marks the media servers communication status as Stalled, and suspends the delegation of future jobs to the managed media server as it continues to wait for the managed media server to return to an Enabled status. At this point, although there are still jobs in the central administration server job queue waiting on the stalled managed media server, future jobs will be delegated to other managed media servers that are represented in the target device pool. CASO continues to monitor the amount of time during which no communications are received from the managed media server. After a total of 15 minutes passes from the time a Stalled status appears, CASO then changes the status of the managed media server to No Communication. When this occurs, CASO marks the jobs as Failed and then begins the job recovery process by invoking the custom error handling rule, Recovered Jobs for any job that is active at the time the No Communication status appears. Note The settings on the managed media servers Configuration tab can be used to fine-tune the performance of managed media server communications with the central administration server in a wide area network (WAN) environment. Job Update Status By default, managed media servers send job updates to the central administration server every 10 seconds. You can change the frequency of job update statuses by adjusting the amount of time (in seconds) that pass before another job update status is sent. With many backup jobs running, you can preserve network bandwidth by adjusting the amount of time allocated before job update status messages are sent. Specifying more time causes fewer updates to be sent, while specifying less time results in more updates being sent.
841
Time Drifts CASO monitors the internal computer clocks on both the managed media servers and the central administration server. If time differences, or time drifts, develop between the central administration server and the managed media servers, jobs could run at unexpected times. To prevent job problems caused by time drifts, the time reported on managed media server clocks should match the time reported on the central administration server clock. If you receive time difference alerts, reset the managed media server system clock to match the system clock on the central administration server. Catalog Storage Locations By default, all Backup Exec catalogs are stored locally at the managed media server where the backup jobs occur. Using the Store catalogs on option enables you to change the catalog storage location from the managed media server to the central administration server. After changing the catalog storage location, the catalogs that presently reside on the managed media server are immediately moved to the central administration server for storage. In addition, future catalogs created at the managed media server are moved to the central administration server for storage. If you change the storage location from the central administration server back to the managed media server, the catalogs that are stored on the central administration server remain at the central administration server. After the catalog location changes however, all future catalogs produced by the managed media server will be stored locally, at the managed media server where they are produced. If you decide to restore data at the managed media server by remotely connecting to it, only the catalogs produced after the storage location is changed back to the managed media server are available for restore operations. The catalogs that remain on the central administration server cannot be used for restore operations if you remotely connect to the managed media server To set managed media server time thresholds and the catalog storage location for all managed media servers: 1. At the central administration server, start Backup Exec. 2. From the navigation bar, click Media Servers. 3. In the selections pane, click Media Servers. 4. In the task pane, under Media Server Tasks, click Configure managed media server defaults. 5. Click the Configuration tab.
842 Administrators Guide
Managed media server status Communication Stalled (no more jobs are queued to the managed media server) No Communication (Jobs are recovered from the managed media server) If the managed media server becomes unresponsive, this option sets the amount of time that will pass before the unresponsive media servers status changes to Communication Stalled. The default threshold is five minutes. See Communication Statuses and Time Thresholds on page 840. If the managed media server becomes unresponsive, this option sets the amount of time that will pass before the unresponsive media servers status changes from Communication Stalled to No Communication. The default threshold is 15 minutes. See Communication Statuses and Time Thresholds on page 840.
Seconds between Enables you to adjust the number of seconds that a managed media sending job status server waits between sending job status updates to the central updates administration server. See Job Update Status on page 841. Display alert when the difference in seconds between the clocks on the managed media server and the central administration server is more than: Store Catalogs On Managed media server Central administration server Select this option to store catalogs on the managed media server. Select this option to enable Backup Exec to create an alert if the clock on the managed media server differs from the clock on the central administration server. Then set the number of seconds that, if exceeded, will cause the alert to be generated. See Time Drifts on page 842.
Select this option to store catalogs on the central administration server. See Catalog Storage Locations on page 842.
843
Setting Job Log and Job History Options for Managed Media Servers
During and after job processing, job log and job history information is generated for each job processed at each managed media server. By default, this information is stored locally at the managed media server where the jobs are processed. However, both job log and job history information can be automatically copied and moved to the central administration server, based on the options you select in the Job Logs and Histories tab. To set job log and job history information: 1. At the central administration server, start Backup Exec. 2. From the navigation bar, click Media Servers. 3. In the selection pane, click Media Servers. 4. In the task pane, under Media Server Tasks, click Configure managed media server defaults. 5. Click Job Logs and Histories. 6. Select the appropriate options as follows.
Job Logs and History Tab Options Item Description
Send job logs to central administration server Never By selecting this option, all job logs remain at the managed media server where the jobs ran and where the logs were produced. Selecting this option creates copies of the job logs, which are produced locally at the managed media server. These copies are then moved to the central administration server every day at the time you specify. Selecting this option creates copies of the job logs, which are produced locally at the managed media server. These copies are then moved to the central administration server when the jobs complete.
Every day at
On job completion
844
Administrators Guide
Configuring the Central Admin Server Option Job Logs and History Tab Options (continued) Item Description
Only if the job fails Selecting this option creates copies of the job logs, which are produced locally at the managed media server. These copies are then moved to the central administration server only if the job fails. Send job history details to central administration server Only when required by job type The job types, Set Copy and Synthetic Backup, require job histories to be stored on the central administration server. Selecting this option will create and move a copy of job histories to the central administration server when jobs that contain one or both of these job types are processed by the managed media server. Selecting this option creates copies of the job history, which are produced locally at the managed media server. These copies are moved to the central administration server every day at a specified time. Selecting this option creates copies of the job history, which are produced locally at the managed media server. These copies are then moved to the central administration server when the jobs complete.
Every day at
On job completion
Only if the job fails Selecting this option creates a copy of a jobs history, which is produced locally at the managed media server. The copies of the job history are then moved to the central administration server only if the job fails.
7. Click OK.
845
If you enable the Backup Exec alerts feature at the managed media servers without enabling the alerts feature at the central administration server, alerts will only appear at the managed media servers where they are generated; they will not appear on the central administration server. You can enable and configure alerts at the central administration server and then use the Backup Exec feature Copy Settings to Media Servers to copy the exact alert configurations to the managed media servers in your CASO environment. After copying the alert configurations, alerts appear at both the managed media servers and at the central administration server when the alert is generated at a managed media server. When starting Backup Exec on the central administration server, the central administration server synchronizes with each managed media server in order to reconcile the existing alerts that are common on each computer. Related Topics: Alerts and Notifications on page 501 Copy Configuration Settings and Logon Information on page 396
Configuring Alerts on the Central Administration Server and Managed Media Servers
Use the following steps as an example of how to configure centralized alerts between the central administration server and managed media servers. To configure specific alerts on the central administration server: 1. Start Backup Exec at the central administration server. 2. From the Tools menu, click Alert Categories. 3. Scroll down the list of alert categories until you find the category you want to configure. 4. From Category Properties, select the check box Enable alerts for this category. 5. Click OK. To copy specific alerts to managed media servers. 1. From the Tools menu, select Copy Settings to Media Servers. 2. Under Select Settings to Copy, select the check box for Alert Configuration.
846
Administrators Guide
3. Click Add. 4. Enter the name of a managed media server to which the configuration will be copied. 5. Click OK. 6. On the Copy Settings dialog box, click OK. An alert on the central administration server will confirm that the copy succeeded. 7. Click OK to clear the active alert. Related Topics: Alerts and Notifications on page 501 Copy Configuration Settings and Logon Information on page 396.
847
Running Managed Media Server Operations from the Central Administration Server
Running Managed Media Server Operations from the Central Administration Server
You can run managed media server operations from the central administration server. These operations include the following:
Pausing and Resuming a Managed Media Server on page 848 Disabling and Enabling Communications with the Central Administration Server on page 849. Stopping and Starting Backup Exec Services on the Managed Media Server from the Central Administration Server on page 850 Remotely Connecting to a Managed Media Server on page 851 Deleting a Managed Media Server from the Media Servers View on page 852 Viewing Managed Media Server Properties on page 852.
848
Administrators Guide
Running Managed Media Server Operations from the Central Administration Server
The managed media server status changes from Online to Paused in the Media Servers Status column, and an icon representing a managed media server in a paused state appears. 5. To resume job delegation to a managed media server, from the task pane, under Media Server Tasks, click Paused. The check mark appearing before the Pause selection is removed, and the managed media server status changes from Paused to Online in the Media Servers Status column. An icon representing a managed media server in an online state appears. Related Topics: Communication Statuses and Time Thresholds on page 840 CASO Error Codes and the Recovered Jobs Custom Error-Handling Rule on page 872 CASO Icons on page 856
849
Running Managed Media Server Operations from the Central Administration Server
The managed media servers communications status changes from Disabled to Enabled in the Communications Status column. Its status change is also reflected in the Media Server Status column, which changes from Unavailable to Online. Finally, an icon representing a fully functioning managed media server appears. Related Topics: Communication Statuses and Time Thresholds on page 840 CASO Error Codes and the Recovered Jobs Custom Error-Handling Rule on page 872 CASO Icons on page 856
Stopping and Starting Backup Exec Services on the Managed Media Server from the Central Administration Server
You can manually start and stop the Backup Exec services on managed media servers from the central administration server using the following steps. To stop or start Backup Exec services: 1. Start Backup Exec on the central administration server. 2. From the navigation bar, click Media Servers. 3. Select the managed media server for which you want to start or stop services. 4. From the task pane, under Media Server Tasks, click Backup Exec Services. 5. Select the appropriate options.
Backup Exec Services Manager options Item Server Description Type the name of a server you want to add to the list, and then click Add. To import a list of servers, click Import List and select the file containing the server list. Click this to start all Backup Exec services for the selected server. Click this to stop all Backup Exec services for the selected server. Click this to stop all Backup Exec services and then restart the services for the selected server.
850
Administrators Guide
Running Managed Media Server Operations from the Central Administration Server Backup Exec Services Manager options Item Services credentials Description Click this to change service account information or to change startup options. Click this to refresh this dialog box. Click this to remove a selected server or servers from the server list.
851
Running Managed Media Server Operations from the Central Administration Server
Note After making a remote connection to a managed media server, the central administration server console is closed and the managed media server console becomes the active interface. To return to the central administration server console, close the managed media server console and restart Backup Exec on the central administration server.
Task pane. The Media Servers task pane contains tasks related to the configuration and management of managed media servers. Selection pane. The Selection pane is where you select items to work with. Preview pane. The Preview pane displays general and/or system information about an item selected in either the Selection pane or the Results pane.
Related Topics: Columns in the Media Servers View on page 853 Using the Administration Console on page 110 Centralized Catalog Storage with CASO on page 826
Description
853
CASO Changes to Backup Exec Column descriptions (continued) Item Communication Status Description Shows the status of communications between the managed media server and the central administration server. Statuses include:
Enabled - Communications about jobs between the managed media server and the central administration server are working properly. Disabled - Communications between the managed media server and the central administration server have been disabled by the user. Stalled - Communications between the managed media server and the central administration server have not occurred within the configured time threshold. See Communication Statuses and Time Thresholds on page 840. No communication - No communication about jobs is being received at the central administration server from the managed media server. The configured time threshold has been reached. Jobs targeted to the managed media server are recovered. Possible causes could range from a network failure to hardware failure in either the managed media server or the central administration server. See Communication Statuses and Time Thresholds on page 840 and Recovering Failed Jobs on page 871. N/A - This status appears when the computer displayed in the Name column is a central administration server.
Shows the present status of a managed media server. Valid statuses include:
Online - All managed media server services are running and communication with the central administration server is functioning as expected. Paused - Managed media servers have been placed in a Paused state by the user. Jobs are not delegated to the managed media server when it is in a Paused state. Unavailable - A state where no communications have been received by the central administration server from the managed media server. Offline - All managed media server services have been stopped; the media server cannot run jobs in an offline state.
Shows the Backup Exec description of the media server. It can be either a managed media server or a central administration server. Shows the version of Backup Exec for Windows Servers installed and running on the media server.
Version
854
Administrators Guide
CASO Changes to Backup Exec Column descriptions (continued) Item Operating System Description Shows the type of operating system installed and running on the media server. Shows the build number of the operating system installed on the media server. Shows the storage location of managed media server-produced catalogs. If the catalogs are stored locally at the managed media server, No appears. If the catalogs are stored at the central administration server, Yes appears. By default, catalogs are stored locally at the managed media server where the backup jobs are run. However, to use the CASO centralized restore feature, catalogs must be stored at the central administration server. See Store Catalogs On on page 843.
Centralized Catalogs
855
CASO Icons
Icons are used in the Media Server view to help you quickly identify the operational status of Backup Exec managed media servers that appear in the Results pane. These icons include the following:
Identification Icons Icon Description Central Administration Server - This icon represents a Backup Exec central administration server. Paused Central Administration Server - This icon represents a Backup Exec central administration server that has been placed in a Paused state. Managed Media Server - This icon represents a Backup Exec media server that has been converted to a Backup Exec CASO-configured managed media server. Paused Managed Media Server - This icon represents a managed media server that has been placed in a Paused state. Disabled Managed Media Server - This icon represents a disabled managed media server. No Icon Appears- A computer name appearing without an associated icon is marked as Unknown.
856
Administrators Guide
The options in this property enable you to specifically target a managed media server or a media server pool at which to process your backup jobs. The Media Server property also gives you the opportunity of allowing Backup Exec to make the managed media server selection for you. In either case, the managed media server or media server pool selected must be able to access the storage devices at which the backup jobs are targeted in order for the backup jobs to run.
857
858
Administrators Guide
3. In the Properties pane, under Job Defaults, click Network and Firewall. 4. At the bottom of the dialog box under Default network interface for delegated jobs, select the appropriate options as follows.
Default Network for Delegated Jobs Item Use any available network interface Description Select this option to use any network interface card installed in the managed media server. Using this option enables Backup Exec to use any available network interface on the media server. Select this option if you want CASO delegated backup jobs to be processed using the network interface card configured as the default in the managed media server.
Use the default network interface for the managed media server
5. Click OK. Related Topics: Specifying Default Backup Network and Firewall Options on page 336.
859
860
Administrators Guide
861
Managed media server catalogs must reside on the central administration server. Managed media server communications must be operating properly, with all communication statuses showing Enabled. Managed media servers must be online with all media server statuses showing Online.
Related Topics: Restoring Data Using the Central Administration Server on page 860 How Centralized Restore Works on page 862 How CASO Restores Data That Resides on Multiple Storage Devices on page 863
with a selection of drive pools and storage devices that are compatible with the type of media being used during the restore operation, thus giving you the flexibility of choosing a storage device in which to load your media. After noting the identity and location of the storage device you have selected to run the job, you:
Submit the restore job on hold as a scheduled job Retrieve the media, place it in the storage device Remove the job from hold at the central administration server, at which time the restore job begins.
CASO then delegates the job to the managed media server that controls the selected storage device. If the data being restored spans multiple storage media, you will be prompted to load additional media as needed to successfully complete the restore operation. Related Topics: Managing Media on page 213
863
Restoring Data Using the Central Administration Server Example of subscript numerals linking split restore jobs
Single restore job split into multiple jobs, are visually linked using a subscript numeral appended to the original job name.
4. The job is delegated and processing begins. 3. ...CASO creates one restore job, which will be delegated for processing at the managed media server where the data resides.
864
Administrators Guide
Restoring Data Using the Central Administration Server For data stored on multiple storage devices
1. Data selections for restore are made at the central administration server. 2. For data that resides on multiple storage devices...
3. ..CASO creates multiple restore jobs, which will be delegated for processing to the managed media servers where the data resides.
Using the Device and Media Property with Centralized Restore Jobs
When using the CASO centralized restore feature, the Device and Media property under Restore Job Properties must be considered. When the data selected for restore resides on media that is online, the Device and Media property page shows the name of the media required for the restore job, the device location and name of the storage device that will process the job. When media is online, clicking Run Now starts the restore operation, with no further user intervention necessary. When the data selected for restore resides on media that is stored offline, the Device and Media property page shows the name of the media required for the restore job. In the Location of First Media column, Unknown appears because the media cannot be found in any of the compatible storage devices that are candidates to run the job. The Device column lists storage devices that are compatible with the media being restored, and are possible candidates to process the restore job.
865
After retrieving the media from the offline location, you select a storage device from the Device column list box and then place the media in the device. Set other restore job properties from the Properties pane, and then click Run Now. No further user intervention is necessary to complete the restore job. Note If data to be restored resides on multiple media in a media family, the name of each piece of media required to complete the restore operation appears in the Media column. After retrieving the offline media, you must place the first piece of media from the media family in the selected storage device for the restore job to start successfully. Related Topics: How Centralized Restore Works on page 862
866
Administrators Guide
Using Media Server Pools in CASO An example of a CASO-configured media server pool inside a corporate network Central Administratio n Server
Related Topics:
Adding Additional Managed Media Servers to a Media Server Pool on page 868 Renaming a Media Server Pool on page 869 Deleting a Media Server Pool on page 869 Removing a Managed Media Server from a Media Server Pool on page 870
867
Note Because the central administration server also can be used as a managed media server, it also appears in the list of media servers. Be sure to select the central administration server (if it has attached storage devices) if it is also to be used as a managed media server during job delegation. 6. Click OK. Related Topics: Adding Additional Managed Media Servers to a Media Server Pool on page 868 Renaming a Media Server Pool on page 869 Deleting a Media Server Pool on page 869 Removing a Managed Media Server from a Media Server Pool on page 870
868
Administrators Guide
Configuring Device Pools for Use with CASO Media Server Pools
Before a media server pool can be used for job processing, the storage devices attached to each managed media server in the media server pool must be configured as a device pool. After the device pool is created, it can be associated to the media server pool when configuring backup job properties in the Job Properties dialog box. If you want to use the CASO job delegation feature to process your backup jobs, the media server pool and its associated device pool can be targeted as the devices to process jobs. If you have multiple devices attached to each of the managed media servers in the media server pool, you can create multiple, smaller device pools made up of fewer storage devices. Using this method, some jobs can be targeted to a particular device pool in the media server pool, while other jobs can be targeted to a different device pool using the same media pool.
870
Administrators Guide
Special Considerations
Related Topics: Adding Additional Managed Media Servers to a Media Server Pool on page 868 Creating a Media Server Pool and Adding Managed Media Servers on page 867 Deleting a Media Server Pool on page 869 Removing a Managed Media Server from a Media Server Pool on page 870
Special Considerations
This section provides information about the following CASO topics:
Recovering Failed Jobs on page 871. Pausing Storage Devices on Managed Media Servers from the Central Administration Server on page 873. Backup Duplicate Data and Synthetic Backup Templates Considerations on page 873.
871
Special Considerations
When viewing the Job History tab on the central administration server, CASO jobs that are failed and then recovered by Backup Exec because of No Communication statuses are displayed differently in Backup Exec than CASO jobs that are failed due to errors in normal daily activities. The jobs that are failed and recovered due to No Communication statuses are not indicated in red text in the job history as other failed jobs are. Instead, these jobs are displayed in gray text, along with a job status of Recovered. When the job history entry is opened, the error category will list Job Errors as the reason for the failure, along with an explanation of the type of internal communication error that occurred. The job history entry will also indicate that the job was recovered. Note Job logs are not created for jobs that are recovered. Related Topics: Error-Handling Rules on page 439 Custom Error-handling Rule for Recovered Jobs on page 443 Communication Statuses and Time Thresholds on page 840 CASO Error Codes and the Recovered Jobs Custom Error-Handling Rule on page 872
CASO Error Codes and the Recovered Jobs Custom Error-Handling Rule
The following table describes the CASO-related error codes that are selected by default for the Recovered Jobs custom error-handling rule:
Error codes for Recovered Jobs custom error-handling rule Error code 0xE000881B JOBDISPATCH 0xE000881D JOB_CASO_QUEUE FAILURE Description The displayed message is: Job failed while being dispatched. The job will be recovered. The displayed message is: The job could not be delegated to the destination managed media server. The managed media server may not be online, or there may be a communications failure. The job will be recovered.
0xE000881E The displayed message is: The job failed to start on the JOB_CASO_REMOTEMMS destination managed media server, possibly because a _STARTFAILURE database error occurred. The job will be recovered.
872
Administrators Guide
Special Considerations
Pausing Storage Devices on Managed Media Servers from the Central Administration Server
After pausing managed media server storage devices at the central administration server, the storage devices appear in the Devices view with both a Paused Managed Media Server status icon, and the word Paused. However, when viewing the list of storage devices under the Devices view at the managed media server, the storage devices that were paused at the central administration server do not appear as Paused. You must refresh the managed media servers Devices view by pressing F5 at the managed media server in order to see the actual state of the storage devices. Related Topics: CASO Icons on page 856 Managing Devices on page 123
873
In a CASO environment, all disaster preparation files (*.dr files) created for each managed media server are centrally located on the central administration server. To create recovery media for any managed media server or central administration server, the IDR Preparation Wizard must be run at the central administration server. Or if running on remote administration environment, connect to the central administration server. If you want managed media servers to be protected using a bootable tape image, you must run the IDR Preparation Wizard at each of the managed media servers where a bootable tape device is installed. For CASO, two options appear on the Welcome screen when the IDR Prep Wizard is run on a managed media server. These options include:
Yes, create the bootable tape image now - For details on creating bootable tape images, see Creating a Bootable Tape Image on page 924. No, connect to a central administration server - If a bootable tape drive is not detected on a managed media server, only this option appears.
874
Administrators Guide
Appendix
Synthetic backup - This feature uses a policy to enable a full backup to be assembled, or synthesized, from a baseline and subsequent incremental backups that are also contained in a policy. The benefits of using a synthetic backup include:
A reduced backup window since the synthetic backup can be scheduled outside of the time-critical backup window. Reduced network traffic since the synthetic backup does not need to access the network.
Offhost backup - This feature enables the backup operation to be processed on a Backup Exec media server instead of on the remote computer, or host computer. Moving the backup from the remote computer to a media server enables better backup performance and frees the remote computer as well.
Related Topics: About the Synthetic Backup Feature on page 876 About the Offhost Backup Feature on page 888
b. Recurring incremental backups. Subsequent backups that back up files that are changed after the baseline backup. After the baseline backup completes, at least one incremental backup is necessary. c. Recurring synthetic backups. The process that combines the data from the baseline backup and the incremental backups to form a synthesized full backup of the selected resources. This synthesized full backup becomes a new baseline backup, which can then be combined with subsequent incremental backup sets to form the next synthesized full backup.
a. Baseline backup is run from the synthetic backup policy Network Backup Exec media server Resource selected for backup from the media server
876
Administrators Guide
About the Synthetic Backup Feature b. Incremental backups are run from the synthetic backup policy Network Backup Exec media server Incremental backups
Resource selected for backup from the media server Baseline backup (can be backed up to disk or tape)
c. Synthetic backup is run from the policy and assembled from the baseline and incremental backups Network Backup Exec media server Incremental backups Synthetic backup Storage device
Resource selected for backup from the media server Baseline backup (can be backed up to disk or tape)
Tape library
Synthetic backups can only be created within a policy. You can use the Policy Wizard to create a policy that will contain the necessary job templates for the synthetic backup feature, or you can copy the example policy for synthetic backup and then modify it to suit your specific needs, or you can manually create a policy, and then add the necessary job templates. For all of the associated synthetic backup templates in a policy, you can also use a Duplicate Backup Set template to create a multi-stage backup strategy for backing up data to disk and then copying it to tape. For details, seeAbout Duplicate Backup Set Templates on page 381. Related Topics: Best Practices for Synthetic Backup on page 879
877
Creating A Synthetic Backup on page 880 Collecting Additional Information for Synthetic Backup on page 879
Synthetic backups and their associated templates can only be created in policies. Backup templates that create incremental backup jobs must have Backup-to-Disk folders as destination devices. Before you can save a policy that contains the synthetic backup templates, you must have a Backup-to-Disk folder that you can select as the destination device for the required incremental backup jobs. Additionally, in order for the example policy for synthetic backup to be displayed after installation, you must create a Backup-to-Disk folder when the First Time Startup Wizard is run. If the example policy for synthetic backup is not displayed, create a Backup-to-Disk folder, and then on the Tools menu, click Re-create Example Policies. The example policy will be displayed in the Policies pane in the Job Setup view.
The option Collect additional information for synthetic backup must be selected for backup templates for incremental and full backup jobs created for synthetic backup. This option is on the General page of the Backup Job Template properties (for details, see Creating a Synthetic Backup By Adding Templates to a Policy on page 883). If the baseline backup job was written to tape, and if you also want to write the synthetic backup job to tape, two tape drives are required: one to mount the source job on (the baseline backup) and one to mount the destination job on (the synthetic backup job). Only file system resources are supported for synthetic backup. If a backup selection list contains resources that are not supported, such as databases, and the selection list is associated with a policy that contains the synthetic backup template, the jobs for the synthetic backup will not be created. If the Central Admin Server Option is installed, the synthetic backup job template and any associated full and incremental job templates must be run on destination devices that can all be accessed by the media server that runs the synthetic backup job. For more information, see Backup Duplicate Data and Synthetic Backup Templates Considerations on page 873.
878
Administrators Guide
The option Checkpoint Restart is not supported when the option Collect additional information for synthetic backups is selected. For more information on Checkpoint Restart, see Using Checkpoint Restart on Microsoft Cluster Server Failover on page 665.
Related Topics: Collecting Additional Information for Synthetic Backup on page 879 Creating a Synthetic Backup By Copying the Example Policy for Synthetic Backup on page 881 Creating a Synthetic Backup By Adding Templates to a Policy on page 883
A separate backup template for the baseline backup is optional. If you want the destination device for the baseline backup to be different from that of the recurring incremental backups, or if you want the baseline job to run at a different time than the recurring incremental backups, you must create a separate backup template for a full backup job to be the baseline backup. Make sure that none of the synthetic backup-related job templates, that is, the baseline backup template, the recurring incremental backup template, and the synthetic backup template, run at the same time. You can use template rules to enforce when these templates are allowed to run. For more information, see Setting Template Rules on page 373.
Related Topics: About the Synthetic Backup Feature on page 876 Creating a Synthetic Backup By Copying the Example Policy for Synthetic Backup on page 881 Policies and Templates on page 361
879
selected, Backup Exec skips these files and directories if their archive bits are unchanged. With this option selected, Backup Exec compares path names, file names, modified times, and other attributes with those from the previous full and incremental backups. If any of these attributes are new or changed, then the file or directory is backed up. The first backup that is associated with the synthetic backup always backs up all of the files, even if it is an incremental backup. Backup Exec starts collecting the additional information beginning with the next incremental backup that is associated with the synthetic backup. Note Any job templates using the incremental backup method and the Collect additional information for synthetic backup option must use a Backup-to-Disk folder as the destination device. Related Topics: About the Synthetic Backup Feature on page 876 Creating A Synthetic Backup on page 880 Adding a Backup Template to a Policy on page 367
Use the Policy Wizard. See Creating a Synthetic Backup By Using the Policy Wizard on page 881. Make a copy of the synthetic backup policy example and then modify the job templates to suit your specific needs. See Creating a Synthetic Backup By Copying the Example Policy for Synthetic Backup on page 881. Manually create a policy, and then add the necessary job templates for the synthetic backup feature. See Creating a Synthetic Backup By Adding Templates to a Policy on page 883.
Before creating a synthetic backup, review the requirements in Requirements for Synthetic Backups on page 878. Related Topics: About the Synthetic Backup Feature on page 876 Best Practices for Synthetic Backup on page 879
880
Administrators Guide
A weekly synthetic backup with daily incremental backups. A monthly synthetic backup with a weekly synthetic or incremental backup and daily incremental backups.
To create a policy for synthetic backup using the Policy Wizard: 1. On the navigation bar, click Job Setup. 2. In the task pane, under Policy Tasks, click New policy using wizard. 3. On the Welcome page, click Next. 4. On the Backup Strategy page, select the weekly or monthly strategy, and then select the option Use synthetic backups instead of full backups. 5. Click Next to continue, and follow the instructions in the wizard to complete the policy. All of the necessary job templates for synthetic backup will be created in the new policy. Related Topics: About the Synthetic Backup Feature on page 876 Requirements for Synthetic Backups on page 878 Best Practices for Synthetic Backup on page 879
Creating a Synthetic Backup By Copying the Example Policy for Synthetic Backup
Backup Exec provides example policies that contain standard settings for different tasks. The example policy for synthetic backup contains the standard settings and job templates that are required to run a synthetic backup. You can copy this example policy, rename it, and change the times when the templates are scheduled to run. For instructions on how to copy an example policy, follow the steps in Using an Example Policy on page 365.
881
Note In order for the example policy for a synthetic backup to be displayed after installation, you must configure a Backup-to-Disk folder when the First Time Startup Wizard is run. The backup template that creates the incremental backup must have a Backup-to-Disk folder as the destination device. If the example policy for synthetic backup is not displayed, create a Backup-to-Disk folder, and then on the Tools menu, click Re-create Example Policies. The example policy for synthetic backup will be displayed in the Policies pane in the Job Setup view. To view the synthetic backup policy example, on the navigation bar, click Job Setup. In the Policies pane, double-click Example: Synthetic Backup. The example policy for synthetic backup contains the following templates:
Baseline Backup - the backup template that creates the baseline backup job. This job runs once only. Incremental Backup - the backup template that creates the subsequent incremental backup jobs and runs after the baseline backup job runs. Synthetic Backup - the backup template that creates the synthetic backup job.
The example policy displays the template rules that you can use to set the order in which the templates should run. All template rules are optional, but they can help you make sure that the templates run in the proper sequence. In the example policy, because a full backup template is included to act as the baseline, it should be the first template to run, and it should only run once. Therefore, the following rules were added:
<First Template> must complete at least once before any other templates will be allowed to start. Baseline Backup is selected as the <First Template>. If start times conflict, <First Template> will start and upon completion, starts <Second Template>. Incremental Backup is selected as the <First Template> and Synthetic Backup is selected as the <Second Template>. Run <First Template> only once. Baseline Backup is selected as the <First Template>.
Related Topics: Requirements for Synthetic Backups on page 878 Setting Template Rules on page 373 About the Synthetic Backup Feature on page 876 Best Practices for Synthetic Backup on page 879
882
Administrators Guide
Select Full - Back up files - Using archive bit (reset archive bit) to add an optional baseline full backup template. Select Incremental - Back up changed files since last full or incremental Using archive bit (reset archive bit) to add a recurring, incremental backup template.
6. Select the option Collect additional information for synthetic backup. Note If you selected an incremental backup method, then under Destination, click Device and Media and select a Backup-to-Disk folder as the destination device. 7. Under Frequency, click Schedule and set the scheduling options you want to use (for details, see Setting the Schedule for a Template on page 369). If you added the optional full backup template for the baseline backup in step 5, you must configure it to be the first backup template to run, and it must run only once.
883
If you added an incremental backup template, you must configure it to be a recurring job so that the first instance can become the baseline backup. 8. Select other options as appropriate, and then click OK. For details on these options, see Adding a Backup Template to a Policy on page 367. Note Backup templates that create incremental backup jobs must have Backup-to-Disk folders as destination devices. 9. Do one of the following:
If you added the optional full backup template for the baseline backup in step 5, then continue with the next step to create a backup template for an incremental backup job. If you added a recurring incremental backup template, go to step 15 on page 884 to add the synthetic backup template
10. On the New Policy dialog box, click New template, and then on the Template Selection dialog box, select Backup Template again, and then click OK. 11. On the Properties pane, under Settings, click General, and select the backup method Incremental - Back up changed files since last full or incremental - Using archive bit (reset archive bit). 12. Select the option Collect additional information for synthetic backup. 13. Under Frequency, click Schedule and set the scheduling options you want to use (for details, see Setting the Schedule for a Template on page 369). 14. Select other options as appropriate, and then click OK. For details on these options, see Adding a Backup Template to a Policy on page 367. Note Backup templates that create incremental backup jobs must have Backup-to-Disk folders as destination devices. 15. On the New Policy dialog box, click New template, select Synthetic Backup Template, and then click OK. 16. On the Properties pane, under Destination, select Device and Media, and complete the options as described in Device and Media Options for Backup Jobs and Templates on page 266.
884
Administrators Guide
17. On the Properties pane, under Settings, click General, and complete the appropriate options as follows:
General options for synthetic backup Item Template name Backup set description Preferred source device Description Type the name for this job template. Type a description of the information you are backing up. Select the device used as the destination device for the original backup job.
18. On the Properties pane, under Settings, click Advanced, and complete the appropriate options as follows:
Advanced options for synthetic backup Item Verify after backup completes Description Select this option to have Backup Exec automatically perform a verify operation to make sure the media can be read after the backup has been completed. Verifying all backups is recommended.
885
Creating A Synthetic Backup Advanced options for synthetic backup (continued) Item Compression type Description Select one of the following:
None. Select this option to copy the data to the media in its original form. If the data was backed up using software compression, then it is copied in its software compression form. Using some form of data compression can help expedite backups and preserve storage media space. Hardware data compression should not be used in environments where devices that support hardware compression are used interchangeably with devices that do not have that functionality. For example, if a drive that does not support hardware compression is added to a cascaded drive pool that includes drives supporting the feature, hardware compression is automatically disabled. You can manually re-enable hardware compression on the drives that support it, but this results in media inconsistency. If the drive that supports hardware compression fails, the compressed media cannot be restored with the non-compression drive
Hardware [if available, otherwise none]. Select this option to use hardware data compression (if the storage device supports it). If the drive does not feature data compression, the data is backed up uncompressed.
19. If you want Backup Exec to notify someone when the backup job completes, on the Properties pane, under Settings, click Notification (see Selecting Recipients for Notification on page 534). 20. Do one or both of the following
Under Frequency, click Schedule to set the scheduling options you want to use (for details, see Setting the Schedule for a Template on page 369). Create template rules, explained in step 1 in the following procedure (Recommended) Create template rules to run job templates for synthetic backup: on page 886.
(Recommended) Create template rules to run job templates for synthetic backup: Note You may want to review the topic Setting Template Rules on page 373 before creating template rules.
886
Administrators Guide
1. On the New Policy dialog box, under Template rules, click New Rule. 2. On the Template Rule Properties dialog box, click the template rules drop down list, and then do one of the following:
If you created a backup template for a full backup job to run as the baseline backup, select Run <First template> only once. Click the First template drop down list and select the name of the template that you want to run as the baseline backup, and then click OK. If you created a backup template for a recurring incremental backup job to run as the baseline backup, go to step 4.
3. Click New Rule again to add another rule. 4. On the Template Rule Properties dialog box, click the template rules drop down list, and then select <First template> must complete at least once before any other templates will be allowed to start. 5. Click the First template drop down list, select the template name of the baseline backup, and then click OK. 6. Click New Rule again to add another rule. 7. On the Template Rule Properties dialog box, click the template rules drop down list, and then select If start times conflict, <First Template> will start and upon completion, starts <Second Template>. 8. Click the First template drop down list, and select the template name of the incremental backup. 9. Click the Second template drop down list, select the template name of the synthetic backup, and then click OK. 10. On the New Policy dialog box, click OK. The policy is displayed on the Job Setup view, in the Policies pane. After you create a policy and set up templates in it, you should combine the policy with a selection list to create jobs. When a policy is combined with a selection list, Backup Exec creates jobs based on the settings in the templates. For details on how to create jobs using this policy, see Creating Jobs Using Policies on page 378. Related Topics: About the Synthetic Backup Feature on page 876
Appendix D, Symantec Backup Exec - Advanced Disk-based Backup Option 887
Requirements for Synthetic Backups on page 878 Best Practices for Synthetic Backup on page 879
1 3
Tape library 1. A snapshot of the selected volume on the remote computer is mirrored to the attached SAN device. 2. The mirror is split and the snapshot is imported to the media server. 3. The media server backs up the snapshot.
After the backup, the snapshots are deported from the media server and mounted back on the remote computer and resynchronized with the source volume. This process requires solutions from hardware or software providers that can support transportable
888 Administrators Guide
snapshots, that is, snapshots that can be imported to and deported from the media server. The Microsoft Volume Shadow Copy Services (VSS) provider that you select is used for each volume in the offhost backup. An offhost backup job is performed on one remote computer at a time. Offhost backup supports the following:
Microsoft Volume Shadow Copy Service (VSS). VERITAS Storage Foundation for Windows (VSFW). Backups for NTFS volumes that use the full, incremental, and differential backup methods. Microsoft SQL Server 2000 database backups by the Backup Exec Agent for SQL Server. For more information, see Using the ADBO With the SQL Agent on page 1024. Microsoft Exchange Server 2003 (Service Pack 1) database backups by the Backup Exec Agent for Exchange Server. For more information, see Using Snapshot Technology With the Exchange Agent on page 1074.
Related Topics: Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider on page 890 Setting Offhost Backup Options for Backup Jobs on page 892 Troubleshooting the Offhost Backup on page 896 Browsing Remote Computers for Installed Snapshot Providers on page 894 Restoring Offhost Backup Data on page 895
Must have Backup Exec for Windows Servers version 10.0 or later installed. Must have the Advanced Disk-based Backup Option installed.
Must have the Backup Exec Remote Agent for Windows Servers version 10.0 or later installed.
889
Must both have Microsoft Windows Server 2003, Datacenter or Enterprise Edition installed. Must both have the selected Microsoft Volume Shadow Copy Services (VSS) hardware or software provider installed. Otherwise, the snapshots of the volumes cannot be deported to the media server. Must both be able to access disks that are shared between them.
Note The option Checkpoint Restart is not supported for the offhost backup feature. For more information on Checkpoint Restart, see Using Checkpoint Restart on Microsoft Cluster Server Failover on page 665. Related Topics: About the Offhost Backup Feature on page 888 Best Practices for Using Offhost Backup on page 891 Troubleshooting the Offhost Backup on page 896 Browsing Remote Computers for Installed Snapshot Providers on page 894
Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider
If you are using the VERITAS Storage Foundation for Windows (VSFW) FlashSnap option provider, read the following before running an offhost backup:
VSFW version 4.1 must be installed on the media server and on the computer that contains the volumes that you want to back up. The VSFW FlashSnap option must be installed on the computer that contains the volumes that you want to back up. Use the VSFW FlashSnap Snap Start command to mirror the volumes on the remote computer. The offhost backup option does not create mirrored volumes or resynchronize volumes that are already created and split. For details on using Snap Start, see Using Snap Start on a VERITAS Storage Foundation for Windows Volume on page 1005. Confirm that the mirrored volumes that you create with the VSFW FlashSnap option reside on disks that are shared between the remote computer (the computer containing the volumes to be backed up) and the media server.
890
Administrators Guide
All volumes selected for offhost backup using the VSFW FlashSnap provider must belong to the same disk group. A maximum of seven volumes can be snapped at one time. Do not select dynamic volumes and basic volumes for the same offhost backup job because the VSFW FlashSnap option cannot perform snapshots of basic volumes. Symantec recommends that you use other backup methods for backing up basic volumes if the VSFW FlashSnap provider is selected. If the computer on which you want to perform an offhost backup is in an environment with the Central Admin Server Option and the Symantec Cluster Server installed, and if failover occurs to a Symantec Cluster Service node, you may need to manually clean up the snapshots before restarting the offhost backup on the failover node. Refer to the VSFW documentation for details.
Related Topics: Troubleshooting the Offhost Backup on page 896 Browsing Remote Computers for Installed Snapshot Providers on page 894
Keep source volumes and snapped volumes from sharing the same physical disks. If this is not maintained, then any attempt to split the snapshot volume from the original volume fails. Most hardware and software providers have some limitation about the types of volumes that are transportable. Therefore, Symantec recommends that you use offhost backup jobs only for backing up data for which all dependent volumes, or mounted volumes, can be imported and deported. The offhost backup will fail if any one volume that you select for backup is only supported by a Microsoft Volume Shadow Copy Services (VSS) provider and cannot be imported or deported, or if the required VSS hardware provider is not on a Symantec-approved compatibility list. You can choose to continue the backup if the offhost backup fails. If the Central Admin Server Option (CASO) is installed, for jobs that use offhost backup, you must manually select the destination device that will run the job rather than allowing the job to be delegated by the central administration server. Otherwise, the job could be delegated to a media server that does not have offhost capability. See Setting Media Server Property Options for CASO Backup Jobs on page 857. When performing an offhost backup in a Microsoft Cluster Server (MSCS) or Symantec Cluster Services environment, the media server and the remote computer must not be in the same cluster group. The cluster applications cannot support
891
devices logical unit numbers (LUNs) that have duplicate signatures and partition layouts, therefore, the snapshots containing the LUNs must be transported to a host, or remote computer, that is outside the cluster. See Using Symantec Backup Exec with Server Clusters on page 657. Related Topics: About the Offhost Backup Feature on page 888 Requirements for Offhost Backup on page 889 Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider on page 890 Setting Offhost Backup Options for Backup Jobs on page 892 Browsing Remote Computers for Installed Snapshot Providers on page 894 Troubleshooting the Offhost Backup on page 896
To set offhost backup options for a single backup job, on the navigation bar click Backup, and then on the Properties pane, under Settings, click Advanced Disk-based Option. To set offhost backup options for all backup jobs, on the Tools menu, click Options. On the Properties pane, under Job Defaults, click Advanced Disk-based Backup Option.
892
Administrators Guide
2. Select the appropriate options, described in the following table, and then click OK.
Advanced Disk-based Backup default options Item Use offhost backup to move backup processing from remote computer to media server Snapshot provider Description Select this check box to enable offhost backup. If you are enabling this for a single job, or as a default for all backup jobs, then an offhost backup of all volumes will be performed if all requirements are met. For more information about offhost backup, see About the Offhost Backup Feature on page 888. Automatic - Use hardware if available; otherwise use software. Select this option to enable VSS to select the best provider for the selected volume. Software - Use VERITAS Storage Foundation for Windows. Hardware - Use technology provided by hardware manufacturer: If you select Software or Hardware as the snapshot provider, then:
The provider must support transportable snaps. If multiple volumes are selected, then all volumes must be snappable by the same type of provider. Software and hardware providers cannot both be used to snap different volumes in the same job. You must either create another job, or select the option Process logical volumes for offhost backup one at a time.
Job disposition: If any of the selected resources do not support offhost backup:
Continue the backup job (offhost backup is not used): Select this to allow the backup job to complete even if any of the volumes selected do not support offhost backup, or if an error that is related to the snapshot or volume import occurs. The backup will run according to all the other options that have been set for this job. Fail the backup job (further selections are not backed up after failure occurs): Select this to terminate the offhost backup job if any of the selected volumes do not support offhost backup, or if an error that is related to the snapshot or volume import occurs.
893
About the Offhost Backup Feature Advanced Disk-based Backup default options (continued) Item Description
Process logical volumes Enables the backup of multiple volumes in one job, while creating a for offhost backup one snapshot of only one logical volume at a time. To ensure database at a time integrity, or if a volume contains mount points, multiple volumes may need to be snapped at one time. After the logical volume is snapped and backed up, the snapshot is deleted before the next logical volume is snapped. This option increases the ability to meet the minimum quiet time needed to complete a snapshot. A logical volume can comprise multiple physical volumes. A single logical volume can encompass all of the volumes on which databases reside.
Related Topics: About the Offhost Backup Feature on page 888 Requirements for Offhost Backup on page 889 Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider on page 890 Best Practices for Using Offhost Backup on page 891 Troubleshooting the Offhost Backup on page 896
894
Administrators Guide
The Snapshot Providers dialog box appears. 4. View the list of the available snapshot providers on the remote computer. Related Topics: Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider on page 890 Requirements for Offhost Backup on page 889 Best Practices for Using Offhost Backup on page 891 Setting Offhost Backup Options for Backup Jobs on page 892
All volumes to be backed up are snappable. Volumes are shared between the remote computer and the media server.
For example, when using VERITAS Storage Foundation for Windows (VSFW) as the provider, you can use the VERITAS Enterprise Administrator (VEA) to verify snapshots of the volumes, split the snapped volumes into a different Disk Group (DG), deport the DG from the remote computer and import it to the media server. All providers will have similar administration console or command-line tools that will allow you to take a snapshot of volumes, and deport and import volumes. It is also required that an offhost backup job contain only volumes that can be transported to the media server for backup. Please read the requirements section carefully. For more information, see Requirements for Offhost Backup on page 889 and Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider on page 890. Other factors to consider are:
Microsoft Windows Server 2003 Enterprise or Data Center edition must be installed on both the media server and the remote computer. Microsoft XML Core Services (MSXML4) must be installed and running on both the media server and the remote computer.
Troubleshooting offhost backup Troubleshooting offhost backup issues depends to an extent on the VSS provider used for the snapshots, but there are setup issues that are common to all providers that may cause offhost backup to fail:
Volumes are not shared For offhost backup to work, all volumes must reside on disks that are shared between the remote computer and the Backup Exec media server. It is the backup administrator's responsibility to confirm this. If the volumes are not shared, the import operation will fail, and you may need to clean up the snapshots and resynchronize the volumes manually.
896
Administrators Guide
The provider used for snapshot must be installed on both the media server as well as on the remote computer. If the provider is not installed on the media server, the import operation will fail, and you may need to clean up the snapshots and resynchronize the volumes manually.
All volumes are not transportable All volumes selected for backup must be transportable to the media server. If Microsoft SQL or Exchange, or other database applications are selected for backup, make sure that the databases and log files reside on transportable volumes.
VSS Provider selection In addition to being transportable, all volumes selected for backup must be snappable by the same provider. It is the backup administrator's responsibility to ensure that all volumes in a backup job are supported by the same VSS provider.
Log path location Log files created by the provider or by its supporting application during normal snapshot operation should not reside on any of the volumes being snapped. This prevents VSS from flushing the write buffers, and the snapshot will time-out. Change the log path to another volume.
Provider or VSS services not started Make sure that the provider service is running and make sure that the Microsoft Windows "Volume Shadow Copy" service has not been disabled.
Credentials Make sure that the machine-level credentials used for the job are the same on both the media server and the remote computer. Incorrect credentials will cause snapshots or the backup to fail.
Central Admin Server Option (CASO) environment If a backup job is configured in a CASO environment, you must target the job to media servers on which the selected VSS provider is installed rather than allowing the job to be delegated by the central administration server. Otherwise, the job could be delegated to a media server that does not have offhost capability. See Setting Media Server Property Options for CASO Backup Jobs on page 857.
Clusters When performing an offhost backup in a Microsoft Cluster Server (MSCS) or Symantec Cluster Services environment, the media server and the remote computer must not be in the same cluster group. The cluster applications cannot support devices' logical unit numbers (LUNs) that have duplicate signatures and partition layouts; therefore, the snapshots containing the LUNs must be transported to a media server that is outside the cluster in which the host cluster resides. See Using Symantec Backup Exec with Server Clusters on page 657.
897
Offhost backup failures when using VSFW as a provider Following are the most common causes of snapshot failure and offhost backup failure when using the VERITAS Storage Foundation for Windows (VSFW) software provider:
Volume has not been snap started. Backup Exec requires that you first snap start all volumes using the VERITAS Enterprise Administrator administration console or command-line interface before attempting an offhost job (see Using Snap Start on a VERITAS Storage Foundation for Windows Volume on page 1005). If you already performed the snap start for a previous snapshot operation, you must either snap start the volume again (to another physical disk) or snap back the previous snapshot volume. For details on how to snap back, refer to the documentation for the VERITAS Storage Foundation for Windows (VSFW) software provider. Volumes to be backed up are basic volumes. VSFW allows only dynamic volumes to be snapped. You are trying to back up a volume that resides on a disk with other volumes and so the disk group cannot be deported. Any attempt to split the snapshot volumes from the source volumes will fail if the snapshot volumes and the source volumes share the same physical disks. The administrator must keep the source volumes and the snap volumes from sharing the same physical disks. Offhost backup requires that VSFW version 4.1 or later be installed on both the remote computer and on the media server. Previous releases are not supported. Compatible VSFW software versions must reside on both the media server and the remote computer. It is recommended that the same version of VSFW be installed on both computers. All dynamic volumes designated for backup must be in the same Disk Group (DG). Multiple disk groups in the same offhost job are not supported. Ensure that there are no more than seven volumes in a single snapshot operation. When more volumes are installed, they cannot all be snapped within the ten-second time-out that VSS imposes for snapshots to complete, and the snapshot will fail. Basic volumes and dynamic volumes cannot be mixed in a backup job that uses the offhost feature. A workaround is to select the option Process logical volumes for offhost backup one at a time. This restriction also applies to dynamic volumes that are mounted by mount points on basic volumes. Dynamic boot and system volumes are restricted from VSFW FlashSnap functionality for compatibility reasons. Therefore, dynamic boot and system volumes are not supported for an offhost backup.
Note Most VSS providers have some limitation about the types of volumes that are transportable. Therefore, it is recommended that you do not use offhost backup jobs for complete system protection. A best practice is to use offhost backup jobs
898 Administrators Guide
to back up databases and logs when all of the dependent volumes on which data resides are transportable. Any volumes that are used to host mount points for data volumes must also be transportable because the offhost backup must snap both the data volumes and the volume with the mount point for backup. Offhost backup issues when using a hardware provider Hardware disk array vendors may support VSS snapshots and the transporting of volumes to the media server for backup in a SAN environment. Using hardware providers requires a sound understanding of how disk arrays are configured for shared access between the remote computer and the media server in a SAN. Consult the documentation for your hardware disk array on how to set up such disk arrays for offhost backup. Specifically, note any limitations on using the disk arrays in context with VSS snapshots, and note how to verify if the volumes are transportable. It is highly recommended that you make use of any tools provided by the vendor to help verify the setup and for troubleshooting issues. Related Topics: Requirements for Offhost Backup on page 889 Requirements for Offhost Backup When Using the VERITAS Storage Foundation for Windows Provider on page 890 Best Practices for Synthetic Backup on page 879
899
900
Administrators Guide
Appendix
The IDR Preparation Wizard guides you through the preparation of the bootable media that you will use to recover protected computers and copies the *.dr file and other recovery information to the Intelligent Disaster Recovery diskette. After you have performed these steps for each computer you want to protect, you are prepared to recover those computers using any of the following recovery methods:
Restore a media server (Backup Exec server) using a locally attached storage device. Restore a Windows computer by moving the media and the storage device to the computer being restored, and then restoring the computer through the locally attached storage device. Restore a remote Windows computer using a network connection to the media server
Related Topics: Getting Started with IDR on page 906 About Creating and Updating Recovery Media on page 912
Symantec Backup Exec for Windows Servers. See the requirements for using Backup Exec in Introducing Backup Exec on page 43. The Symantec Backup Exec Remote Agent for Windows or NetWare Servers (Remote Agent) or Backup Exec must be installed on any remote computers to be protected with IDR. Windows 2000/XP/Server 2003 recovery requires sufficient hard drive space to hold an entire Windows installation (600 MB to 2 GB).
Note Disaster recovery from virtual devices, such as Backup-to-Disk devices, must be done via Remote IDR using a media server with access to the virtual device. Mixed media loaders are not supported for local IDR. Related Topics: Requirements for Running the IDR Preparation Wizard on page 913 Using an Evaluation Version of the IDR Option on page 903 Symantec Backup Exec - Remote Agent for Windows Servers on page 789
902
Administrators Guide
903
Tape
Diskettes
Yes
Did you create a tape image with the Config. Wizard? No Run the IDR Prep Wizard to create a tape image.
CD
Run a full backup Run a full backup
Run the IDR Prep
Wizard to create
Run the IDR Prep Wizard to create the bootable CD. Run the IDR Prep Wizard again to update DR diskettes.
bootable diskettes.
904
Administrators Guide
You can create three types of bootable media with the IDR Preparation Wizard:
Diskettes (not supported for Windows XP or Windows Server 2003) CD-R (CD-Recordable) or CD-RW (CD-Rewritable). For 64-bit computers, CDs are the only supported bootable media. Bootable tape (the tape device must support bootable specifications)
Consider what type of Windows computer is being protected, the available hardware, and the system BIOS when selecting the type of bootable media to create. You can also combine media to make updating the *.dr files easier. If you are using bootable CD-R or CD-RW, or tape, you can still back up the *.dr files to diskette using the IDR Preparation Wizard so that you can easily update them when required. Use the chart below to decide which type of media to use.
Bootable Media Comparison Chart Type of Media Diskettes Advantages
Disadvantages
Works on most computers. Can also be used to protect remote Windows computers on the network. Can create bootable diskettes for remote computers. Requires less preparation and recovery time than diskettes. Can also be used to protect remote Windows computers on the network. Can create bootable CD images for remote computers. Requires less preparation and recovery time than diskettes.
Requires more preparation and recovery time than CDs and tapes. Not supported for Windows XP or Windows Server 2003.
CD-R, CD-RW
Bootable tape
Requires a BIOS that supports booting from a SCSI CD and a bootable tape device that emulates a SCSI CD drive. Cannot create bootable tape images for remote computers.
905
Hardware-specific information for each computer, such as hard disk partition information, mass storage controller information, and Network Interface Card information. A list of catalog entries that identify the backup media used to recover the computer. For Windows XP and Windows Server 2003 computers, Windows Automated System Recovery (ASR) configuration information files (asr.sif and asrpnp.sif). The ASR files are necessary to recreate partitions on Windows XP and Windows Server 2003 computers during the recovery process.
To run the IDR Configuration Wizard: 1. On the Welcome screen, click Next. Backup Exec automatically creates a *.dr file for the IDR-protected computer when it is backed up and stores it in the default location on the media servers hard drive, which is: C:\Program Files\VERITAS\Backup Exec\NT\IDR\Data\<computer name>.dr. The Enter An Alternate Data Path screen enables you to specify an alternate location where a copy of the *.dr file can be stored so that the *.dr file is available even if the media server has been damaged.
906
Administrators Guide
Getting Started with IDR Enter an Alternate Data Path dialog box
Symantec recommends that the alternate location be on another computer or on a different physical drive than the default location. Note When using Backup Execs Remote Administrator, specifying drive A: as the Alternate Data Path points to the media servers floppy disk drive. The remote computers drive A: is not used as the Alternate Data Path unless the full path is entered and a valid share exists for this drive. Be sure to check the path and make sure that the correct computer and directory path are specified. 2. Enter the alternate location where a copy of the *.dr file will be stored, and then click Next. Symantec recommends that you enter a mapped network location. Note If you are using IDR to protect a media server in a cluster, or any remote media server, set the alternate data path to a shared drive or to a drive outside the cluster. 3. If the computer does not have a locally attached bootable tape device, the IDR configuration is complete. You are ready to run backups and create bootable media. Click Finish, and then go to About Creating and Updating Recovery Media on page 912 to continue disaster recovery preparation. If a bootable tape device is detected, you are prompted to create a bootable tape image.
907
Getting Started with IDR Bootable Tape Device Detected dialog box
Click Yes, create the image now (recommended), click Next, and then continue with step 5. Click No, I will create the image later, and then click Next. The IDR Configuration wizard is finished. Create the bootable image for tape later by running the IDR Preparation Wizard before running the overwrite backup job; otherwise the tape will not be bootable. Click Finish, and then go to About Creating and Updating Recovery Media on page 912 to continue disaster recovery preparation.
5. When the Starting Tape Image Creation screen appears, the option Let IDR automatically partition the boot and system drive during restore is selected by default for a Windows 2000 media server. This option enables IDR to automatically partition the boot and system drives for a Windows 2000 computer during the recovery process, and to restore any utility partitions that previously existed. If you clear this option, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition or reformat the boot and system drives. See Using IDR To Recover Windows 2000 Computers on page 941. 6. Click Next to continue. The completed IDR Configuration screen appears.
908 Administrators Guide
The bootable tape image is stored on this computer. When you run an overwrite backup job for this computer, the bootable image is written to the tape. 7. Click Finish, and then go to About Creating and Updating Recovery Media on page 912 to continue disaster recovery preparation. Related Topics: Recovering a Computer Using IDR on page 942 About Creating and Updating Recovery Media on page 912 Creating a Bootable Tape Image on page 924 Backing Up Data on page 259
909
910
Administrators Guide
Getting Started with IDR Intelligent Disaster Recovery Options - Set Application Defaults (continued) Item Alternate path Description Enter an alternate directory path where a copy of the *.dr files for the protected computers will be stored. Backup Exec automatically creates or updates the *.dr file during a backup and stores it in the specified location during a backup. It is recommended that you specify an alternate data path that is not on the media server, or is on a different physical drive than the default location. During a recovery, you can copy the *.dr file from the alternate path to a diskette to recover the target computer if the media servers hard drive is unavailable.
If you are specifying a remote computers hard drive as the alternate data path, it is recommended that you map a drive letter to the remote computer. When mapping the drive letter, be sure to select the Reconnect at Logon option so that you can reconnect to the drive letter every time you log on. Check the directory later to make sure the *.dr files were copied. If you are specifying a directory on a different physical hard drive on the local computer, browse to or type the drive name and the path: d:\drfiles
Note When using Backup Execs Remote Administrator, specifying drive A: as the Alternate Data Path points to the media servers floppy disk drive. The remote computers drive A: is not used as the Alternate Data Path unless the full path is entered and a valid share exists for this drive. Be sure to check the path and make sure that the correct computer and directory path are specified.
911
The bootable media contain the system files necessary to make a failed Windows computer operational after a disaster. Create a new bootable image whenever hardware, SCSI drivers, or storage device drivers change on the computer that is being protected. Prepare and test bootable media before a disaster to make sure that the media was prepared correctly. For more information on testing the bootable media, see Recovering a Computer Using IDR on page 942.
912
Administrators Guide
The bootable media also contains a text file called <computer name>-diskconf.txt, which contains information about the computers hard disk layout.
The recovery diskettes, which you can create and update separately from the bootable media by using the IDR Preparation Wizard, are labeled the Intelligent Disaster Recovery diskette 1 and 2, and contain:
One or more *.dr files, which include computer-specific information such as hardware-specific information, and catalog entries that identify the media necessary to recover the computer. For XP and Windows Server 2003 computers, Windows Automated System Recovery (ASR) configuration information is also included and is required in order to recreate critical partitions on these computers during the recovery process. Any necessary drivers. The Disaster Recovery Wizard. These items are copied to the Intelligent Disaster Recovery diskettes. Create and update this diskette separately from the bootable media. At times, the *.dr file may not fit on the Intelligent Disaster Recovery diskettes. If this occurs, copy the *.dr file to a separate diskette.
Related Topics: Creating A Full Set of Diskettes on page 917 Creating a Bootable CD Image on page 920 Creating a Bootable Tape Image on page 924 Creating the Intelligent Disaster Recovery Diskettes Only on page 927 Updating the Full Set of Disaster Recovery Diskettes on page 931 Updating the Intelligent Disaster Recovery Diskettes Only on page 934 Updating Bootable Media on page 929
Run a full backup of the hard drive before creating the boot and recovery media (unless you are creating a bootable tape image). When running full backups for IDR preparation:
Make sure that volumes (C, D, etc.) have been backed up. The *.dr files are not created or updated if only individual directories are backed up. Additionally:
For Windows Server 2003, back up Shadow Copy components. For 64-bit Intel Itanium computers, back up the EFI system partition. If the server is also the media server, back up the Backup Exec SQL instance.
Make sure that if utility partitions are present on the computer, they are selected for backup. Utility partitions are usually small partitions installed on the hard disk by OEM vendors and contain system diagnostic and configuration utilities. For more information on selecting utility partitions for backup, see Backing Up Utility Partitions on page 350. Do not include or exclude files from the backup using the Advanced File Selection feature. Make sure that if the computer is a remote computer, a compatible version of the Remote Agent has been installed on it. To determine if the Remote Agent is installed on a remote computer, from Windows Explorer, right-click the remote server and then from the shortcut menu, click Properties. The status of the Remote Agent, if installed, is displayed.
If this computer does not have the IDR option installed locally, select Choose a media server that has the IDR option installed, and then see Preparing IDR Media Via Other Media Servers on page 937 for instructions on how to create bootable media. If this computer has the IDR option installed locally, click Next to create bootable media.
3. In the Available Computers area, select the computer for which you want to create bootable media, and then click the right arrow to move the computer to the Selected Computers area. As long as a *.dr file exists for the computer, it should display in the Available Computers area. 4. On the Create IDR Boot Media dialog box, select the type of recovery media you want to create, and then follow the instructions in the wizard. For more information about creating recovery media, see the topic for the type of media you are creating:
Creating a Bootable CD Image on page 920 Creating a Bootable Tape Image on page 924 Creating A Full Set of Diskettes on page 917 Creating the Intelligent Disaster Recovery Diskettes Only on page 927
915
The Windows installation CD that matches the version and language (English, French, etc.) installed on the protected system is required. For example, if you are running the IDR Preparation Wizard from a computer running Windows 2003, but the computer for which you want to prepare recovery media is running Windows 2000, then you must have a Windows 2000 installation CD with the same language and type of licensing that is on the Windows 2000 computer.
For Windows 2000, XP, and Windows Server 2003: If the Windows product key does not appear on this screen by default, type the Windows product key in the space provided, and then click Next. This product key is saved on the recovery media so that it does not have to be manually entered during recovery.
Related Topics: Including or Excluding Files for Backup Using Advanced File Selection on page 288 Creating A Full Set of Diskettes on page 917 Creating a Bootable CD Image on page 920 Creating the Intelligent Disaster Recovery Diskettes Only on page 927 Creating a Bootable Tape Image on page 924 Updating the Full Set of Disaster Recovery Diskettes on page 931 Updating the Intelligent Disaster Recovery Diskettes Only on page 934 Updating Bootable Media on page 929. Updating the Intelligent Disaster Recovery Diskettes Only on page 934
916
Administrators Guide
For Windows XP or Windows Server 2003, bootable diskettes are not supported. At least six blank, formatted 1.44 MB diskettes are required for each set of disaster recovery diskettes to be created. Do not use the Quick Format option when formatting the diskettes. Quick Format removes files from the diskette without scanning it first for bad sectors that can make the diskette unusable.
To allow IDR to automatically partition the boot and system drives for a Windows 2000 computer during recovery, and to restore any utility partitions that existed, select the option Let IDR automatically partition the boot and system drive during restore when creating recovery media for a computer. If this option is not selected, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition and reformat the boot and system drives. See Using IDR To Recover Windows 2000 Computers on page 941. For instructions on updating the Intelligent Disaster Recovery diskette, see Updating the Intelligent Disaster Recovery Diskettes Only on page 934.
Prior to a disaster, test the bootable diskettes to ensure that the computer can boot from them.
To create bootable diskettes: Note This option is available only for Windows 2000. 1. Verify that the computer to be protected has been backed up. 2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. 3. By default, the IDR Preparation Wizard uses this computer to create the full set of disaster recovery diskettes.
Appendix E, Symantec Backup Exec - Intelligent Disaster Recovery Option 917
If this computer does not have the IDR option installed locally, select Choose a media server that has the IDR option installed, and then see Preparing IDR Media Via Other Media Servers on page 937 for instructions on how to create bootable media. If this computer has the IDR option installed locally, click Next to create bootable diskettes.
4. In the Available Computers area, select the computer for which you want to create bootable media, and then click the right arrow to move the computer to the Selected Computers area. If the computer you want to protect does not display in the Available Computers area, click Browse to search for the computer, or type the name of the computer in the field next to the Add button, and then click Add.
Select Computers to Protect dialog box.
5. Click Next. 6. Under Create, select Full set of diskettes to boot the Windows Installation CD, and then click Next.
918
Administrators Guide
About Creating and Updating Recovery Media Create IDR Boot Media dialog box
7. Enter the path to the Windows operating system files for this computer, and then click Next. 8. Label a diskette "Windows 2000 Setup Boot Diskette", insert it into the floppy disk drive, and the click Next. 9. When the first diskette completes, insert the next blank diskette, and then click Next. 10. Repeat step 9 until all the diskettes are used. 11. Type the Windows product key, and then click Next. 12. Insert the Windows Setup Boot Diskette that you created in step 8, and then click Next. 13. If the option Let IDR automatically partition the boot and system drive during restore has been selected, insert Windows Setup Disk 4, and then click Next. 14. When the Windows Setup Boot Diskette is complete, insert the IDR diskettes to store computer-specific disaster recovery files for the computer being protected, and then click Next. 15. When the Finish screen appears, click View Disk Configuration to display the Disk Configuration Report. This report is also automatically copied to the diskette that has the *.dr file on it. Related Topics: Recovering a Computer Using IDR on page 942
Appendix E, Symantec Backup Exec - Intelligent Disaster Recovery Option 919
Backup Exec includes support for burning the disaster recovery CD image to supported CD-R and CD-RW drives. If a CD-R or CD-RW drive is not supported by this component, use a third party ISO 9660-compliant application. You should verify the image created by third-party CD burning software before you need it for disaster recovery. CD-R is the recommended media for creating a bootable CD image. If CD-RW media is used, the CD drive must have MultiRead ability; otherwise, inconsistent behavior may occur when running IDR. Test the media with the CD drive before relying on it for disaster recovery. A blank, writable or rewritable CD is required if the Symantec IDR CD writing feature is used. To allow IDR to automatically partition the boot and system drives for a Windows 2000 computer during recovery and to restore any utility partitions that existed, select the option Let IDR automatically partition the boot and system drive during restore when creating recovery media for a computer. If you do not select this option, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition and reformat the boot and system drives. See Using IDR To Recover Windows 2000 Computers on page 941.
Prior to a disaster, test the bootable CD to ensure that the computer can boot from it.
920
Administrators Guide
To create a bootable CD image: 1. Verify that the computer to be protected has been backed up. 2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to create a bootable CD image. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to create a bootable CD image. 3. Do one of the following:
To use another computer to create the bootable CD image, select Choose a media server that has the IDR option installed, and see Preparing IDR Media Via Other Media Servers on page 937 for details. To use this computer to create the bootable CD image, on the Welcome screen, click Next.
4. In the Available Computers area, select the computer for which you want to create bootable media, and then click the right arrow to move the computer to the Selected Computers area. If the computer you want to protect does not display in the Available Computers area, click Browse to search for the computer, or type the name of the computer in the field next to the Add button, and then click Add
Select Computers to Protect dialog box.
5. Click Next.
Appendix E, Symantec Backup Exec - Intelligent Disaster Recovery Option 921
6. Under Create, select Bootable CD Image for use with CD Writers (ISO 9660), and then click Next.
.Create IDR Boot Media dialog box
7. Enter the location to store the bootable CD image, and then click Next. 8. Enter the location where copies of the operating system setup files are located, and then click Next. You can enter one of the following:
If the files are on a CD, type the CD drive letter. If the files are stored on a network or the local computers hard drive, type the path to files. If an .ISO image for operating system CD is available, specify the path to that image.
922
Administrators Guide
About Creating and Updating Recovery Media Select Path to Windows operating system installation files dialog box
9. Type the Windows product key in the Enter the Windows Product Key dialog box, and then click Next. If you do not enter the product key now, you may have to enter it during disaster recovery. During the creation of the CD image, the logging area of the screen is inactive. When the process completes, the logging window can be scrolled or copied to the clipboard by selecting the text and pressing CTRL + C. This logging information can then be pasted into a text editor or e-mailed to Technical Support to help diagnose why IDR restore issues. 10. If the computer you want to protect uses Windows XP or Windows 2003, label a diskette "Windows Automated System Recovery" and then insert it into drive A. Click Next to create the diskette, which will store the ASR files. 11. To create the bootable CD now, select a CD writer from the Select a CD Writer to create the CD with option, insert a blank CD into the CD writer, and then click Create a bootable IDR CD. If you do not want to create the CD now, click Next. 12. When the bootable CD image is complete, run the IDR Preparation Wizard again to create the Intelligent Disaster Recovery diskettes. Related Topics: Recovering a Computer Using IDR on page 942 Creating the Intelligent Disaster Recovery Diskettes Only on page 927
923
To use another computer to create the bootable tape image, select Choose a media server that has the IDR option installed, and see Preparing IDR Media Via Other Media Servers on page 937 for details. To use this computer to create the bootable tape image, on the Welcome screen, click Next.
924
Administrators Guide
About Creating and Updating Recovery Media Create IDR Boot Media dialog box
3. Under Create, select Bootable Tape Image for use with bootable tape devices, and then click Next. 4. Read the Starting Tape Image Creation screen, and then click Next. 5. Enter a location to store the bootable image until you perform a full backup, and then click Next.
.Select Location for Bootable Tape Image dialog box
6. Enter the path for the location of the Windows operating system files, and then click Next.
Appendix E, Symantec Backup Exec - Intelligent Disaster Recovery Option 925
7. Enter the Windows product key, and then click Next. 8. For Windows XP, label a diskette "Windows Automated System Recovery" and insert it into drive A, and then click Next. 9. When the bootable tape image has completed, run an overwrite backup job so that the bootable image is written to the tape. For details on specifying a backup job as an overwrite job, see Device and Media Options for Backup Jobs and Templates on page 266. 10. When the backup job has completed, run the IDR Preparation Wizard again to create the Intelligent Disaster Recovery diskettes. Related Topics: Updating Bootable Media on page 929 Recovering a Computer Using IDR on page 942 Backing Up Data on page 259
926
Administrators Guide
To use another computer to create the Intelligent Disaster Recovery diskettes, select Choose a media server that has the IDR option installed, and see Preparing IDR Media Via Other Media Servers on page 937 for details. To use this computer to create the Intelligent Disaster Recovery diskettes, on the Welcome screen, click Next.
3. In the Available Computers area, select the computer for which you want to create bootable media, and then click the right arrow to move the computer to the Selected Computers area. If the computer you want to protect does not display in the Available Computers area, click Browse to search for the computer, or type the name of the computer in the field next to the Add button, and then click Add
927
4. Click Next. 5. Under Create, select IDR diskettes only (includes ASR files for Windows XP/Windows 2003), and then click Next.
Create IDR Boot Media dialog box
6. Label a blank diskette "Intelligent Disaster Recover Diskette 1", insert it into drive A, and then click Next.
928
Administrators Guide
7. Label a blank diskette "Intelligent Disaster Recovery Diskette 2", insert it into drive A, and then click Next. 8. Insert a diskette that you created previously for the computer you selected in step 3, and then click Next. 9. When the Finish screen appears, click View Disk Configuration to display the Disk Configuration Report. 10. Remove the diskette from the drive and store both with the rest of the disaster recovery media. Both diskettes will be labeled as Intelligent Disaster Recovery. Related Topics: Updating the Intelligent Disaster Recovery Diskettes Only on page 934
929
To use another computer to update the bootable tape image, select Choose a media server that has the IDR option installed, and see Preparing IDR Media Via Other Media Servers on page 937 for details. To use this computer to update the bootable tape image, on the Welcome screen, click Next. The Create or Update IDR Boot Media screen appears.
3. Select Create - Bootable Tape Image for use with bootable tape devices, and then click Next. The Starting Tape Image Creation screen appears. 4. To allow IDR to automatically partition the boot and system drives for a Windows 2000 computer during recovery, and to restore any utility partitions that existed, select Let IDR automatically partition the boot and system drive during restore, and then click Next. If you do not select this option, then before starting the recovery process, reinstall any utility partitions by using the OEM-supplied installation media. During the recovery, manually repartition and reformat the boot and system drives. If you have previously prepared a bootable image for tape, the Disaster Recovery Image Found screen appears. 5. Select Delete the existing image to write the new bootable image to the bootable tape when the first overwrite backup job runs. 6. Continue to follow the prompts until the wizard is complete.
930 Administrators Guide
7. When the bootable image is complete, run an overwrite backup job so that the image is written to the tape. For details on specifying a backup job as an overwrite job, see Device and Media Options for Backup Jobs and Templates on page 266. 8. When the backup job is complete, run the IDR Preparation Wizard again to create the Intelligent Disaster Recovery diskettes. Related Topics: Recovering a Computer Using IDR on page 942 Backing Up Data on page 259
Make sure that volume (C, D, etc.) have been backed up. The *.dr files are not created or updated if only individual directories are backed up. Additionally:
931
For Windows Server 2003, back up Shadow Copy components. For 64-bit Intel Itanium computers, back up the EFI system partition. If the server is also the media server, back up the Backup Exec SQL instance.
Make sure that if utility partitions are present on the computer, they are selected for backup. Utility partitions are usually small partitions installed on the hard disk by OEM vendors, and contain system diagnostic and configuration utilities. For more information on selecting utility partitions for backup, see Backing Up Utility Partitions on page 350. Do not include or exclude files from the backup using the Advanced File Selection feature. Make sure that if the computer is a remote computer, the Remote Agent has been installed on it.
2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to update the full set of disaster recovery diskettes. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to update the diskettes. 3. Do one of the following:
To use another computer to update the disaster recovery diskettes, select Choose a media server that has the IDR option installed, and see Preparing IDR Media Via Other Media Servers on page 937 for details. To use this computer to update the disaster recovery diskettes, on the Welcome screen, click Next.
4. Select Update Media, and then click Next. 5. Under Update, select Full set of diskettes used to boot the Windows Installation CD, and then click Next twice.
932
Administrators Guide
About Creating and Updating Recovery Media Update IDR Boot Media dialog box
6. Select the computer for which you want to update disks, and then click Next
.Update Disks dialog box
7. Insert a diskette that you created previously for the computer you selected in step 6, and then click Next. 8. When the Finish screen appears, click View Disk Configuration to display the Disk Configuration Report.
933
9. Remove the diskette from the drive and store it with the rest of the disaster recovery media. The full set of diskettes used to boot the Windows installation CD are now updated.
Hardware-specific information for each computer, such as hard disk partition information, mass storage controller information, and Network Interface Card information. Catalog entries that identify the backup media used to recover the computer. For Windows XP and Windows Server 2003 computers, Windows Automated System Recovery (ASR) configuration files are contained in the asr.sif and asrpnp.sif files. The ASR files are necessary to recreate partitions on Windows XP and Windows Server 2003 computers during the recovery process.
Note If you created a bootable CD image and chose to create and add the ASR files to the CD image, you must recreate the bootable CD image to update the ASR files.
Necessary drivers.
When you have finished updating the Intelligent Disaster Recovery diskettes, click View Disk Configuration to display the Disk Configuration Report. To update the Intelligent Disaster Recovery diskettes only: 1. Run a full backup of the target computer. When running full backups for IDR preparation:
Make sure that the default shares on each hard disk volume (C$, D$, etc.) have been backed up. The *.dr files are not created or updated if only individual directories are backed up. Additionally:
For Windows 2000 and Windows XP, back up System State. For Windows Server 2003, back up Shadow Copy components. For 64-bit Intel Itanium computers, back up the EFI system partition. If the server is also the media server, back up the Backup Exec SQL instance.
934
Administrators Guide
Make sure that if utility partitions are present on the computer, they are selected for backup. Utility partitions are usually small partitions installed on the hard disk by OEM vendors, and contain system diagnostic and configuration utilities. For more information on selecting utility partitions for backup, see Backing Up Utility Partitions on page 350. Do not include or exclude files from the backup using the Advanced File Selection feature. Make sure that if the computer is a remote computer, the Remote Agent has been installed on it.
2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery Preparation Wizard. By default, the IDR Preparation Wizard uses this computer to update the Intelligent Disaster Recovery diskettes. If this computer does not have the IDR option installed locally, select another media server on which the IDR option is installed to update the Intelligent Disaster Recovery diskettes. 3. Do one of the following:
To use another computer to update the Intelligent Disaster Recovery diskettes, select Choose a media server that has the IDR option installed, and see Preparing IDR Media Via Other Media Servers on page 937 for details. To use this computer to update the Intelligent Disaster Recovery diskettes, on the Welcome screen, click Next.
4. Select Update Media, and then click Next. 5. Under Update, select IDR diskettes only (includes ASR files for Windows XP/Windows 2003), and then click Next.
935
About Creating and Updating Recovery Media Update IDR Boot Media dialog box
6. Select the computer for which you want to update disks, and then click Next
.Update Disks dialog box
7. Insert a diskette that you created previously for the computer you selected in step 6, and then click Next. 8. When the Finish screen appears, click View Disk Configuration to display the Disk Configuration Report. The Intelligent Disaster Recovery diskettes are now updated.
936
Administrators Guide
9. Remove diskette #2 from the drive and store both diskettes with the rest of the disaster recovery media.
2. On the IDR Preparation Wizard Welcome screen, select the Choose a media server that has the IDR option installed, and then click Next.
937
About Creating and Updating Recovery Media Select a Server dialog box
3. Click Browse to browse the network and select a media server that has the IDR option installed, and then click Next to continue preparing disaster recover media. The media server that you select here will be the computer that actually creates the media.
938
Administrators Guide
The hardware must be identical to the original computer except for hard disks, video cards, and network interface cards. There must be enough disks to restore all of the critical system disks. A disk is considered critical if it is required for the computer to boot successfully. The storage capacity of each critical disk must be greater than or equal to the corresponding original disk. Disk geometries, which may also be called disk parameters, must be compatible.
939
Floppy and CD devices cannot be external PC-card drives. Because external PC-card devices are not supported during the GUI-mode Windows Setup phase, they cannot be used to access data, and recovery cannot be completed. If a *.dr file is unavailable for the computer being restored, you can still use IDR to recover the computer, but you must first manually restore the non-critical partition information, including utility partitions. IDR does not recover software mirrored volumes or any kind of software RAID with the auto-partitioning feature. You must manually apply the mirror with the Disk Manager. In addition, hardware RAID components must be set up before you perform the disaster recovery.
Related Topics: Changing Hardware in the Computer to be Recovered on page 940 Recovering a Computer Using IDR on page 942 Using the Disaster Recovery Wizard on page 945
Hard drives. Any hard drives you use should be the same size or larger than the original drive; otherwise repartitioning problems may occur. Processors. The computer you want to recover should have the same number of processors as the original, and should be the same type of processor. SCSI cards. Install SCSI cards on the computer before running the IDR recovery process so that the cards can be incorporated during the restore. Only SCSI cards that are running during the recovery process are integrated into the restored Windows computer. To install OEM third-party SCSI drivers, select the Custom Setup option during IDR and then add the drivers manually. For more information, see Recovering Computers Requiring OEM-Specific SCSI Drivers on page 950. Video hardware. If you install different video hardware, install the video driver for that hardware after the original Windows operating system boots into VGA compatibility mode. IDR will not install new video drivers.
940
Administrators Guide
Install and configure the IBM ServeRAID controller card and ServeRAID software so that a boot partition will be visible to the Windows operating system. Start the server using the IBM servers ServeRAID Configuration and Management CD in the CD-ROM drive prior to using the IDR bootable media. This will start IBM ServeRAID utilities configuration and installation process to view and update the current BIOS and firmware levels.
Refer to the IBM ServeRAID documentation for complete installation instructions for installing Windows on an IBM Server with the ServeRAID controller. Create and initialize the ServeRAID disks in order for partitions to be visible to the Windows operating system.
941
Only basic disks and upgraded dynamic disks (upgraded from basic) are supported. However, any partitions created after upgrading the basic disks to dynamic are not supported. After disaster recovery, the disks that were upgraded dynamic disks will be basic, but can later be upgraded to dynamic by using the Windows Disk Administrator. For more information about basic and dynamic disks, refer to your Windows documentation. If the Let IDR automatically partition the boot and system drive during restore option was not selected during the IDR preparation for Windows 2000 computers, then use the OEM-supplied installation media to boot and re-create any utility partitions before continuing with the instructions in Recovering a Computer Using IDR on page 942.
Booting the computer using the bootable diskettes, tape, or CD created with the IDR Preparation Wizard. Using Windows Setup to prepare the computer for recovery. Using the Disaster Recovery Wizard to restore the computer to an operational state and to restore the computers data from the last backup set.
942
Administrators Guide
To recover a computer using IDR: 1. Locate the type of bootable media you are using in the table below and follow the instructions provided for that type of media:
Bootable media options For this type of media Diskettes Do this
At the computer being recovered, insert the first bootable diskette. Replace the bootable diskettes as prompted. When prompted, insert the Windows installation CD in the computers CD-ROM drive, and then press ENTER. Proceed to step 3. At the computer being recovered, insert the last full backup media that contains the bootable image into the tape drive. Follow the bootable tape drive manufacturers instructions for booting from the tape drive.
Tape
Note You may need to change the SCSI BIOS settings to enable booting from a SCSI CD-ROM. Some bootable tape drives require that you hold the eject button while powering up the tape drive. CD
At the computer being recovered, insert the Backup Exec IDR bootable CD into the CD-ROM drive.
Note Be sure that the BIOS is enabled to boot from a CD. CD on EFI-aware 64-bit Intel Itanium computer
At the computer being recovered, insert the Backup Exec IDR bootable CD into the CD-ROM drive. On the EFI Boot Manager menu, select the option to boot from CD.
2. For bootable tape or CD, when the Backup Exec Intelligent Disaster Recovery for Windows screen displays, press ENTER to begin the disaster recovery process. The Windows Setup process will occur first, followed by the restoration of data using the Disaster Recovery Wizard Caution When you press ENTER, the computers hard disks may be repartitioned and reformatted, and all existing data may be destroyed.
943
3. If the computer being recovered uses Windows XP or Windows Server 2003, you must press F2 on the Windows Setup screen to enter Automated System Recovery (ASR) mode. IDR uses Windows ASR to restore the critical partitions that were on the computer previously. The partitions are created as they were defined in the ASR configuration file. Note This F2 prompt may display for a very short time. Be sure to look at the bottom of the Windows Setup screen for this prompt and press F2 as soon as you are prompted. 4. If the computer being recovered contains OEM-specific, third-party SCSI or RAID drivers, press F6 when prompted on the Windows Setup screen to manually add the drivers before loading Windows. If you do not add the drivers before loading the operating system, hard drive partitions and tape devices on the computer may not be recognized by Windows. 5. If the computer being recovered is Windows 2000, do one of the following:
If the option Let IDR automatically partition the boot and system drive during restore was selected during the IDR preparation, then all partitions on all critical disks are created. Install Windows 2000 on the same partition as in the previous configuration. If the option Let IDR automatically partition the boot and system drive during restore was not selected during the IDR preparation, and if a new hard drive is detected on the computer, then manually create the boot and system drives. Install Windows 2000 on the same partition as in the previous configuration. For more information, see Using IDR To Recover Windows 2000 Computers on page 941.
After selecting a file system, press ENTER. 6. Remove any diskettes or CDs from the drives, and then press ENTER to reboot the computer. Note For a diskette-based IDR on Windows 2000 only, you must insert the Intelligent Disaster Recovery diskettes when prompted. 7. Continue with Using the Disaster Recovery Wizard on page 945.
944
Administrators Guide
Restoring the computer to an operational state. You can restore the original layout of the hard disks, or you can make changes. Restoring the computers data from the last backup set (including all Full, Incremental, and/or Differential sets). The Recovery Wizard prompts you for the correct media to use during restore operations by reading the Backup Exec catalog information recorded on the disaster recovery diskettes. You can also restore from other backup media if necessary.
To fully automate the recovery, the current *.dr file for the computer being recovered is required; however, if a *.dr file is unavailable or if the *.dr file is not current, you can still use IDR to recover the computer. Instructions for recovering the computer without using a *.dr file are included in the following procedure. To restore using the Disaster Recovery Wizard, the following are required:
The media set containing the full backup of the target computer being restored. For recovery on a local computer, a storage device must be connected to the computer being recovered. If bootable diskettes or bootable CD are being used, a media server that can restore the backup sets to the target computer must be connected on the network.
To use the Disaster Recovery Wizard: 1. After reading the Welcome screen, place the diskette containing the *.dr file into drive A and then click Next. Note If you are recovering a 64-bit Itanium computer, see About Recovering 64-bit Itanium Computers with IDR on page 955 for special considerations. 2. Choose a level of assistance, and then click Next.
Disaster Recovery Assistance Level options Option Automated Description Uses information saved in the *.dr file to fully automate the recovery process. All of the backup sets found in the *.dr file will be restored to their original locations. Minimal user interaction is required during recovery.
945
Recovering a Computer Using IDR Disaster Recovery Assistance Level options Option Assisted Description Backup set information in the *.dr file will be used, but you will have the opportunity to select which sets to restore
Manual
Backup set information from the *.dr file will not be used to automate the recovery process. Individual backup sets will be identified by reading backup media, and you will have the opportunity to select which sets to restore. If a *.dr file is unavailable or is not updated, select this option and refer to Performing a Manual Restore on page 951.
Clear this check box if you replaced any of the hardware on the computer you are restoring. Select this option if the system configuration is the same except for the hard drives. Any hard drives being added must be the same size or larger than the drive being replaced. Otherwise, repartitioning problems may occur.
3. Select the *.dr file for the computer being recovered, and then click Next. Each *.dr file is labeled using the name of the computer from which it was created, and displays the date and time it was created. If the necessary *.dr file is not displayed, copy the *.dr file from the default or alternate locations on the media server that ran the last backup to any diskette. Insert this diskette into drive A, and then click Scan Drive A: to find the file that you just copied. To proceed without selecting a *.dr file, click Next. Note If the evaluation period has expired, enter a valid serial number after you select a *.dr file. 4. For Windows XP and Windows Server 2003, go to step 5. For Windows 2000, if the hard disk partition layout changed, you are prompted to keep the current layout or restore the original layout that is contained in the *.dr file. If you are recovering a Windows 2000 computer, and you receive messages that one or more of the hard drives are smaller than the originals, the version of Windows 2000 that runs the Recovery Wizard may have detected the hard drives in a different order than they were originally configured.
946
Administrators Guide
If the original configuration does not match, then to a certain extent, you can control the hard drive numbering scheme that Windows 2000 devises. The following chart lists the normal order that Windows 2000 uses to assign disk drive numbers. The information in this chart may change if third party drivers are used.
Windows hard drive numbering scheme Primary IDE Master Slave Master Slave SCSI ID 0 SCSI ID 1 SCSI ID 7 (or 15 if Wide SCSI) SCSI ID 0 SCSI ID 1 SCSI ID 7 (or 15 if Wide SCSI) SCSI ID 0 SCSI ID 1 SCSI ID 7 (or 15 if Wide SCSI)
Secondary IDE
SCSI Adapter 0
(In order of the lowest I/O port address)
SCSI Adapter 1
Other types of mass storage controllers are usually seen as SCSI controllers by Windows. Note If the Disaster Recovery Wizard cannot detect the hard drive order properly, set up hard drive partitions manually using the Windows Disk Administrator option within the Disaster Recovery Wizard. Then, continue with the automated restore of the backup media. For more information, see Using IDR To Recover Windows 2000 Computers on page 941. 5. When the Modify Hard Disk Layout screen appears, do one of the following:To use the original configuration from the *.dr file, click Next.
To save the contents of this screen as a text file, click Save Configuration.
947
To make changes to the hard disk layout, click Run Disk Management. Use Disk Administrator to make additional changes to the partition information. For more information on these programs and fault tolerant configurations, please refer to your Windows documentation, and to Altering Hard Drive Partition Sizes on page 949. If a *.dr file does not exist for the computer being recovered, click Run Disk Management and manually repartition the hard drive to match the partition layout found on the original computer.
6. If you are restoring with bootable CD or diskettes, select one of the following methods to access the storage device: Note If you are using bootable tape, only the Use locally attached media device option is available.
Use locally attached media device and then click Next. Select the storage device from which you want to restore, and then click Next. Use the network to restore from a remote media server and then click Next. Follow all prompts to acquire network connectivity.
7. After media devices are detected, click Next. A Finish screen appears. If changes were made to the partitions, the computer is rebooted. 8. Select the device containing media to be restored, and then click Next. Depending on the level of assistance selected earlier, all backup sets may be automatically restored, or you can select individual backup sets to restore. After the restore is complete, you can provide additional media to restore. If a *.dr file does not exist, or if there are no catalog entries in the *.dr file, then perform a manual restore and select I will provide my own media, and then go to Performing a Manual Restore on page 951. 9. Select the device that contains the restore media. 10. Insert the correct media and click Next. Note If a robotic library is being used to recover your computer, the first drive in the robotic library is used for the restore. 11. Remove any diskettes and CDs from the drives.
948
Administrators Guide
12. To make changes to the computer before starting the operating system, click Run CMD.EXE to open a command prompt window, or click Edit BOOT.INI to modify the boot.ini file on the root of the system partition. The Edit BOOT.INI option is not available for 64-bit Itanium computers. Caution Modifying the boot.ini file incorrectly may prevent the computer from restarting. 13. Click Finish to exit the Recovery Wizard and restart the computer. Related Topics: Changing Hardware in the Computer to be Recovered on page 940
949
950
Administrators Guide
Click Restore Set to restore the backup set displayed in Media Information and Set Information. IDR begins restoring the data to the selected partition. When the restore is complete, the Found Backup Set dialog box reappears for the next backup set found on the media. If there are no more backup sets, the Select Tape Drive screen appears. To restore another backup set, click Restore Set again to restore the next backup set. Repeat this step for each backup set found on the media. Click Skip Set to skip the restoration of this backup set and search the media for another backup set from which to restore. Click Skip Media to eject the media and replace it with different media.
6. After the last backup set is restored, click Finish to end the recovery process and exit Intelligent Disaster Recovery.
951
Related Topics: Recovering Computers Requiring OEM-Specific SCSI Drivers on page 950 Changing Hardware in the Computer to be Recovered on page 940
The Temporary IDR User logon account was created by the IDR Recovery Wizard on the Connect to Media Server dialog box in a previous step. Related Topics: Microsoft SQL Server Recovery Notes on page 953 Microsoft Exchange Recovery Notes on page 954 Using IDR To Recover IBM Computers on page 941 Recovering Computers Requiring OEM-Specific SCSI Drivers on page 950 Changing Hardware in the Computer to be Recovered on page 940 Using Backup-to-Disk Folders and Files on page 176
953
IDR of a remote computer is not supported if Citrix is installed on the media server and drive C on the media server is remapped. If other drives on a Citrix computer were remapped prior to IDR, the drives must also be remapped during the IDR process before any files are restored.
If you selected Automated or Assisted during the IDR process and selected a *.dr file, Backup Exec automatically remaps the drives. If you selected Automated, Assisted, or Manual during the IDR process, but did not select a *.dr file, you must manually remap the drives.
954
Administrators Guide
Extensible Firmware Interface (EFI) partitions, which are present on all 64-bit Intel Itanium computers, need to be restored. Because the operating system boot loader is present on the EFI partitions, these partitions are critical for booting the system. Only bootable CDs are supported for IDR on 64-bit Itanium computers. Most 64-bit Itanium computers do not have floppy drives. When creating bootable CDs, verify that a floppy drive is present on the 64-bit Itanium computer before copying the .asr files to a diskette. 64-bit Itanium computers can only be recovered remotely by connecting to a 32-bit media server.
955
Remote IDR
If you want to perform disaster recovery on a remote computer, the Remote Agent must be purchased separately and must be running on the remote computer. Always verify that the *.dr file was created in the alternate data path that you selected. When creating bootable tape, run the IDR Preparation Wizard and create the bootable image before you run a full backup. When creating bootable CD or floppy disks, run a full backup before you create the bootable media. Have the Windows license key available. The license key is needed to install the operating system. If the backup media resides on another Backup Exec media server, select the option Choose a media server that has the IDR option installed on the first IDR Preparation Wizard screen. For local IDR, do not use Backup-to-Disk. Floppy disks cannot be used for IDR on Windows 2003 and Windows XP computers. Have at least 6 blank floppies available. Windows 2000/2003/XP must have at least 2 GB of hard drive space available. The new partition layout must be the same size or larger than the original. Have the latest RAID, SCSI, or NIC (if remote) drivers available on disks.
Disaster Recovery
956
Administrators Guide
Appendix
957
SCSI Tape
SCSI Tape
You can use any media server to change the names of the robotic libraries and drives to names that are more descriptive of your operations. If you have multiple SANs, it is recommended that you treat each SAN independently, with each SAN having its own Backup Exec database server for the shared ADAMM database and catalogs for that loop. Using a single Backup Exec database server for more than one SAN increases the number of single-point failures that can affect the system. Job completion statistics or errors can be viewed through any administration console attached to the server that ran the job. RELATED TOPICS: Sharing Media on page 971. Scheduling and Viewing Jobs on page 970 Requirements for the SAN Shared Storage Option on page 959
958
Administrators Guide
Windows 2000 or Windows Server 2003 must be installed. Physical Memory Available, as shown in the Windows Task Manager, plus the File Cache should exceed 256 MB. The SAN Shared Storage Option must be locally installed at each server that will be sharing secondary storage devices. The devices in your SAN must be on the supported device list at http://support.veritas.com/rd/bews-compatibility.htm All hardware drivers must be up to date and started. See http://support.veritas.com/rd/bews-drivers.htm The primary server must have enough space for the catalogs of all the servers in the SAN. A fibre channel host adapter and its device drivers must be installed and connected to the SAN. A hub or switch must be connected to all the fibre to SCSI bridges on the SAN. All the robotic libraries must be connected to the SCSI bridges. The hub or switch must be powered up before the bridges. All robotic libraries must be powered up before the bridges. The bridges must be powered up before Windows loads the fibre channel driver (usually during the boot phase).
Note If the SAN Shared Storage Option is installed on a media server, Backup Exec disables all fibre channel-connected devices in Removable Storage. You cannot re-enable the devices in Removable Storage until the SAN Shared Storage Option and VERITAS device drivers are uninstalled. Related Topics: Installing the SAN Shared Storage Option on page 960
959
You can install the SAN Shared Storage Option while installing Backup Exec by following the procedures described in Installing Backup Exec on page 65. If you have already installed Backup Exec, follow the procedures described in Installing Backup Exec Options to the Local Computer on page 71. If installing to the database server, select Primary. You can install the Backup Exec device drivers as part of the Backup Exec installation. If the SAN Shared Storage Option has already been installed to the primary, or database, server, and you are installing to a secondary server, select Secondary and enter the name of the database server. If you installed Backup Exec on the database server, reboot the database server before loading Backup Exec on other servers. The server containing the shared database must be running before other media servers can be installed properly. The first time you run Backup Exec, the First Time Startup Wizard displays automatically. The First Time Startup Wizard is a collection of wizards that help you set up the important features of Backup Exec, including media sets, overwrite protection settings, devices, and logon accounts. You must complete the applicable sections of this wizard as it guides you in preparing Backup Exec for operations. The Media Overwrite Protection Wizard only appears on the database server. Setting the appropriate Media Overwrite Protection Level is important since the media is shared throughout the SAN. Note When uninstalling Backup Exec, you must uninstall from the secondary servers before uninstalling from the primary server. For more information about uninstall procedures, see Uninstalling Backup Exec on page 93. Related Topics: Symantec Backup Exec - Remote Agent for Windows Servers on page 789 Starting Backup Exec on page 108 Scheduling and Viewing Jobs on page 970 Best Practices for SAN SSO on page 979
960
Administrators Guide
Device allocation. Jobs must first reserve the shared secondary backup devices before they can be used. The job that gains a reservation on a drive keeps it reserved while the drive is in use. The drive is released after a job completes, which allows other jobs to compete for it. Drive pools. You can assign the drives to drive pools in which one or more drives are combined as a backup target. Jobs submitted to a particular drive pool run on the first available drive in that pool. You can also submit a job to a selected individual drive in the drive pool.
Note Cascaded drive pools, in which multiple drives are linked together to create the appearance of one drive with greater capacity, are not supported for shared storage environments. Related Topics: Using Drive Pools with the SAN Shared Storage Option on page 963 Using Device Operations with the SAN Shared Storage Option on page 964
Appendix F, Symantec Backup Exec - SAN Shared Storage Option 961
962
Administrators Guide
963
964
Administrators Guide
Sharing Robotic Libraries Between Backup Exec for NetWare Servers and Backup Exec for Windows Servers
Backup Exec for NetWare Servers and Backup Exec for Windows Servers SAN Shared Storage Options inside the same fibre environment can share robotic libraries, which lowers hardware costs. With robotic library sharing, you first create partitions on the robotic libraries for use with Backup Exec for Windows Servers. Then you can create additional partitions on the same robotic libraries for use with Backup Exec for NetWare Servers. You can view NetWare servers from a NetWare console and Windows servers from a Windows console. If a Backup Exec for NetWare Servers job is targeted to a drive being used for a Backup Exec for Windows Servers job, the drive appears as reserved. Related Topics: Viewing Devices on page 125 Library Sharing Prerequisites on page 965 Configuring Media Servers for Robotic Library Sharing on page 966
Backup Exec for Windows Servers on the Windows media servers. Backup Exec for NetWare Servers version 9.0 or later on the NetWare media servers. The Backup Exec for Windows Servers SAN Shared Storage Option on each Windows media server you want to operate in the shared environment. Backup Exec for NetWare Servers SAN Shared Storage Option on each NetWare media server you want to operate in the shared environment. The Backup Exec for Windows Servers Library Expansion Option or the Backup Exec for NetWare Servers Library Expansion Option.
Note The drive licenses you purchase for your robotic library are not platform-specific for this implementation. For example, if you plan to share a ten-drive robotic library, you can purchase nine Backup Exec for Windows Servers or Backup Exec for NetWare Servers drive licenses (the first drive in a robotic library does not require a Library Expansion Option license). In order to successfully share robotic libraries, you need a working knowledge of both Backup Exec for Windows Servers and of Backup Exec for NetWare Servers. You also should have complete access to hardware and the ability to restart media servers.
965
Before proceeding with the robotic library sharing configuration, plan how you want to use your robotic library in this shared environment. For example, if you have a robotic library that has 100 slots in it, you may want to partition your robotic library so Backup Exec for Windows Servers uses 50 slots and Backup Exec for NetWare Servers uses 50 slots. Factors affecting how many slots you use for each operating system include media rotation schemes, the number of servers you are protecting, and the types of data stored on each server. Label your media according to operating system or Backup Exec type. Color-coded or unique bar codes identifying whether the tapes are being used with Backup Exec for Windows Servers or Backup Exec for NetWare Servers is recommended. This will help you identify the media when you need to restore data or rotate the media back into your media rotation schedule.
966
Administrators Guide
8. Repeat steps 6 and 7 for all drives in the unused partition. 9. Reboot all other Windows servers and make sure you can see the shared robotic library on each server. Note No fibre activity or backup jobs should be run until all Backup Exec for Windows Servers and all Backup Exec for NetWare Servers are configured for robotic library sharing. To configure Backup Exec for NetWare Servers 9.x running in the partition management mode: 1. From the Administration Console, ensure you are connected to the Primary Group Server and that you are running in partition management mode. From the Administration Console for NetWare at the Primary Group Server, ensure you are running in partition management mode. 2. Delete existing partitions. To delete a partition from the Administration Console: a. Click Drives.
b. Click Partitions. c. Right-click the partition you want to delete, and click Delete.
d. When prompted, click OK. e. Repeat step c and step d for each partition you want to delete.
To delete a partition from the Administration Console for NetWare: a. Select Drives.
b. Select Partitions. c. Select the partition you want to delete, and press DEL.
d. When prompted, press Y. e. Repeat step c and step d for each partition you want to delete.
3. Create the partitions in the shared library to be used by Backup Exec for NetWare Servers.
Appendix F, Symantec Backup Exec - SAN Shared Storage Option 967
To create a partition from the Administration Console: a. From the Administration Console, click Drives.
4. Enter options in the New Partition General dialog box. 5. Enter options in the New Partition Configuration dialog box. 6. Click OK. To create a partition from the Administration Console for NetWare: a. From the Administration Console for NetWare, select Drives.
d. Select a drive to be included in this partition. e. Ensure Configuration is selected, and press ENTER to view or edit options on the Configuration dialog box. Press F2 to return to the General dialog box. Select Advanced Configuration and then press ENTER to view or edit options on the Advanced Configuration dialog box.
f. g.
7. If you plan to share more than one library, repeat step 2 and step 3 for each library that will be shared. 8. Restart Backup Exec for NetWare Servers on the group servers and make sure you can see the shared library on each server.
968 Administrators Guide
To configure Backup Exec for NetWare Servers 9.x running in the media management mode: 1. From the Administration Console, ensure you are connected to the Primary Group Server and that you are running in media management mode. From the Administration Console for NetWare at the Primary Group Server, ensure you are running in media management mode. 2. Select Drives. 3. Select Drive Pools. 4. Select All Drives. 5. From the Administration Console, right-click the robot you want to share, and then click Properties. From the Administration Console for NetWare, select the robot you want to share, and press F4. 6. Select Configuration. 7. Enter the starting slot and number of slots to be used by NetWare servers. 8. From the Administration Console, click OK. From the Administration Console for NetWare, press F2. 9. Restart Backup Exec for NetWare Servers on the group servers and make sure you can see the shared library on each server. Related Topics: Symantec Backup Exec - Library Expansion Option on page 1115
969
970
Administrators Guide
Sharing Media
The Backup Exec servers can share media within the shared storage devices, but not simultaneously. For example, media server A can write a backup to a media, and when that job is finished, media server B can append another backup to the same media. Or, if overwrite protection is not enabled, media server B may overwrite that media. Media sets are not server-centric. In the shared storage environment, all users have a view of all media and media sets. Each media set can contain media in the shared devices and media in any local devices attached to servers. Note The default media overwrite protection is not server-centric; this option is set in the shared ADAMM database and affects all media, including media in locally attached devices. For example, if media overwrite protection is set to None by one server, all media in the shared storage environment including media in other servers locally attached devices are immediately available for overwriting. Media stored in locally-attached secondary storage devices are not accessible by other media servers.
971
Restrict use of the Media Rotation Wizard to a single media server. Use the same Overwrite Protection Periods and the same full backup day whenever you use the Media Rotation Wizard on all media servers in the shared storage environment. Edit the jobs and rename the media sets created by each Media Rotation Wizard used so the jobs and media sets are server-centric.
972
Administrators Guide
A newer, faster server has become available. The database server has stopped functioning.
If the current database server is functioning, you should consider specifying the current database server when installing SAN Shared Storage Option to the new system. This will allow you to test the fibre connections before designating a new database server. If the current database server is not functioning, installing the new system as the database server is recommended. For steps on designating a new database server, see Running Backup Exec Utility SAN SSO Tasks on page 751.
Tips for Maintaining the Database Server and the ADAMM Database
The ADAMM database and the database server are important components of the SAN Shared Storage Option. To protect against possible loss of the ADAMM and catalog databases, you should run frequent backup jobs of the entire Backup Exec directory tree on the shared database server. When scheduling backups of the database servers Backup Exec directory, base the frequency of these backup jobs on the rate at which backup sets are being created and the number of tapes affected by all of the media servers on the SAN. All backup sets and tapes affected since the last shared database/catalog server backup would have to be recataloged if all information on the database server was lost. Create a special media set just for backing up the Backup Exec directory tree and the Windows operating system on the database server. This will reduce the number of tapes that must be cataloged to find the files for restoring the ADAMM database and catalogs. Caution If you allow the backups of these files to go to a large media set, you may have to catalog every tape in that large media set in order to find the latest versions of the ADAMM database and catalogs to restore. If the database server is not operational, Backup Exec is unusable on all of the servers on the SAN. The Intelligent Disaster Recovery Option is strongly recommended for protecting the database server. Should this entire system be lost, you can use IDR to quickly recover this system.
Appendix F, Symantec Backup Exec - SAN Shared Storage Option 973
If you deem the Backup Exec functions to have a high availability requirement, you should consider setting up one of the other media servers on the storage network as a standby primary server.
974
Administrators Guide
8. On the original primary server, navigate to \Program Files\VERITAS\Backup Exec\NT. Copy the Catalogs directory to the same directory on the new primary server. If the original primary server is unavailable, locate the latest copy of the Catalogs directory and copy it to the new primary server. 9. Use BEUtility to restore the database you copied in step 6 (see Recover a Media Server Database on page 760.) Be sure to select the Drop existing database and reload from backup option. 10. Use BEUtility to start the Backup Exec services on all the media servers in the media server group (see Start Services on page 734.) Related Topics: Symantec Backup Exec - Intelligent Disaster Recovery Option on page 901 Promote a Media Server to a Primary SAN SSO Server on page 754 Creating a Manual Restore Job by Configuring Job Properties on page 458 Move the Primary SAN SSO Server on page 755
975
b. Select the library, and then under Robotic Library Tasks, click Initialize
976
Administrators Guide
6. If initializing the library does not bring the devices online, check the library for the following: an error display on the front panel, mechanical problems, or tapes inappropriately in the drives. Correct any errors that you find. 7. If no errors exist on the library or if you corrected the errors and the devices are still offline, stop Backup Exec services and then restart them when all Backup Exec jobs are inactive in the SAN. 8. If restarting the services does not bring the devices online, restart the operating system. Be sure that no Backup Exec jobs are running when you restart. 9. If restarting the operating system does not bring the devices online, reset the SAN to help identify problem tape devices. Recycling the SAN may also resolve fibre problems. Related Topics: Resetting the SAN on page 978
977
978
Administrators Guide
Before installing Backup Exec, be sure that all hardware in the SAN is working and configured properly. Make sure that the primary server is the fastest server and has the fewest extraneous operations. Use a separate primary server for each SAN. Make sure that the HBA drivers, SCSI to fibre bridges, and library firmware have been updated to the hardware vendors most current release. Make sure that all HBA cards on the SAN are using the same and the most current firmware and driver levels. Keep the servers in the SAN in the same Microsoft Administration domain. Cross-domain environments can cause authentication problems during install and can block access to resources during backups. Change the display names of libraries and drives to names that reflect the servers or jobs for which you will use them. Do not use cascaded drive pools in a SAN environment. Run frequent backups of the entire Backup Exec directory tree on the shared database server. Create a separate media set to use only for backups of the Backup Exec directory tree and the Windows operating system on the database server. This will reduce the number of tapes you need to catalog to find the files to restore the ADAMM database and catalogs. Use a switch administration tool to verify that each server is in a zone configuration with the tape devices. Disable the operating systems removable storage service.
979
980
Administrators Guide
Appendix
981
Traditional SAN backup operation without using the ServerFree Option Network Backup Exec for Windows Servers
Da
ta
Flo w
SAN-attached target backup device Backup operations from the disk array to the SAN-attached target backup device use media server CPU and memory cycles to process the backup operation. As such, engaging the media server during backup operations results in a decrease in media server performance.
Unlike traditional SAN backup operations, the Symantec ServerFree Option keeps the use of Backup Exec media server CPU and memory resources to a minimum during the backup operation, thus enhancing performance. Using the ServerFree Option, the majority of the processing done by the Backup Exec media server is completed at the beginning of the backup operation. The actual process of moving data from the fibre channel disk array to the target backup device is done by the Fibre-to-SCSI bridge or router, where the data mover is located. By using the ServerFree Option, along with the Fibre-to-SCSI bridge or router (data mover), Backup Exec media server processing is kept to a minimum. The media server is now free to use its processing power for other business operations.
982
Administrators Guide
Minimal media server CPU cycles used during the backup operation Fibre-to-SCSI bridge or router Data mover operations occur in the Fibre-to-SCSI bridge or router Fibre Channel Switch and attached disk array storage
Data Flow
Volume snapshot
Using the ServerFree Option, backup operations use minimal media server CPU cycles when backups are running. By essentially bypassing the media server, backup performance is enhanced, while also freeing the media servers processing resources for other important applications.
983
Required Components
If any of the following requirements are not met, the ServerFree backup job you have configured will run as a standard backup job will run. After the backup job completes, the Backup Exec job log will indicate what backup option was used. Hardware In order to benefit from ServerFree Option technology, you must have certified SAN hardware that supports data moving operations. This support is provided by SAN hardware manufacturers. Contact your hardware vendor for a complete list of required and supported components that support data moving operations. Symantec will certify new ServerFree-supported SAN solutions as they become available. For more information on whether your hardware vendor supports this technology, and for a complete list of requirements, please contact the hardware vendor directly. You can also contact Symantec by going to www.support.veritas.com/dsl for information regarding tested solutions. If you presently have storage area network hardware in place, you may need to update both the SANs hardware software drivers or firmware in order to use the ServerFree Option. Hardware components that may require updating include:
Fibre channel host bus adapter (HBA) Fibre-to-SCSI bridge or router Fibre channel disk array Fibre channel switch
Software To install the ServerFree Option on a media server, you need to purchase the following Symantec Software products:
Backup Exec for Windows Servers SAN Shared Storage Option ServerFree Option (includes the Advanced Open File Option)
Administrators Guide
984
Note ServerFree Option by default, uses the included Symantec Volume Snapshot Provider from the Advanced Open File Option, to create a snapshot of the volume on the fibre disk array. Alternatively, VERITAS Storage Foundation for Windows FlashSnap Option can be used to create the snapshot of the volume on the fibre disk array.
(Optional) VERITAS Storage Foundation for Windows FlashSnap Option One license key for each of the above items for each Backup Exec media server in your SAN. See your Backup Exec for Windows Servers Administrators Guide for more information on these options and how to install them.
Related Topics: Installing Backup Exec Options to the Local Computer on page 71 Supported Operating Systems for the media server
Windows 2000
Note Consult your hardware documentation for Windows XP and Windows Server 2003 compatibility. Supported Symantec Backup Exec Agents and Options The ServerFree Option works with the following:
Symantec Backup Exec for Windows Servers Agent for Microsoft SQL Server Microsoft Windows NTFS file systems
Other agents and options may be supported in future releases of the ServerFree Option.
985
- Backup Exec for Windows Servers - Symantec SAN Shared Storage Option - Symantec ServerFree Option - Windows 2000
- (optional) VERITAS Storage Foundation for Windows FlashSnap Option
SAN-attached
986
Administrators Guide
To set the ServerFree Option as the default for all backup jobs: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click Advanced Open File. 3. Select Use Advanced Open File Option. 4. Under Open file configuration, select a snapshot method. Note The ServerFree Option uses the Symantec Volume Snapshot Provider by default. Note Microsoft Volume Shadow Copy Service cannot be used in a ServerFree backup job configuration. Note The VERITAS Storage Foundation for Windows (VSFW) FlashSnap Option is compatible with Windows 2000 only. The volumes you want to back up with the VSFW FlashSnap Option must first be snap-started using the VERITAS Enterprise Administrator (VEA). For more information, see Using Snap Start on a VERITAS Storage Foundation for Windows Volume on page 1005. 5. Select Use ServerFree Option.
988
Administrators Guide
989
990
Administrators Guide
Appendix
991
During the backup, files can be open and data can be changed. Depending on the snapshot provider that you are using, open files are handled using different methods. For details on how the Symantec Volume Snapshot Provider handles open files during a backup, see Best Practices for Using the Symantec Volume Snapshot Provider on page 1006.
Advanced Open File Option with Symantec Snapshot Provider Backup Exec media server
3 2
Volume C: Snapshot C:
Original Word file (open) Start of backup job Data Block During the backup, data is changed A B 1 2 B i D End of backup job Data Block A 1 D 2 C 3 iii Changed file C 3 B ii Cache file for original data
The illustration represents the following: 1 - A backup begins for volume C on a Windows server using the Advanced Open File Option.
992
Administrators Guide
2 - A snapshot is taken of volume C, that provides a point-in-time record of the data. 3 - After the snapshot is taken, the backup job starts and the data from volume C is written to tape. During the backup job, files can be opened, and data can change. The Advanced Open File Option allows data to change by making a copy of the original data, named a cache file. The snapshot tracks the data changes, as illustrated in the cache file diagram. For example, an open file such as a Microsoft Word document contains the data A, B, and C in blocks 1, 2, and 3. i - During the backup job, "B" changes to "D" in block 2. ii - The original data in block 2 is copied to a cache file. In this case, "B" is the original data. iii - The changed file is now the most current file. 5 - When the snapshot comes to a changed block, it replaces these changed blocks with the original data from the cache file before being sent to tape. The snapshot then sends the point-in-time data to Backup Exec. The data is then written to tape. When the backup is complete, the snapshot is deleted. Symantec strongly recommends that Backup Exec database agents be used to back up databases. Backup Exec database agents provide selective restores of data and more integration with the database application while preventing backups of partial transactions. Agents also enable backups on a database that is spread across multiple disk volumes. If the Advanced Open File Option is selected for a backup job on Microsoft SQL or Microsoft Exchange Servers, all database files on these servers will automatically be excluded from the backup. For Oracle Server, to avoid backing up the database files twice, you should manually exclude any Oracle database files from backup jobs run with AOFO selected. You can use the Advanced Open File Option on the same volume as a database to provide open file support for other applications. The Advanced Open File Option provides generic protection for flat files when Backup Exec agents are not used, and provides protection for Microsoft Outlook PST files. The Advanced Open File Option is not available for use with Extensible Firmware Interface (EFI) system partition backups. Related Topics: Symantec Backup Exec - Agent for Microsoft Exchange Server on page 1065 Symantec Backup Exec - Agent for Microsoft SQL Server on page 1013
993
Symantec Backup Exec - Agent for Oracle Server on page 1297 Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999 Best Practices for Using the Symantec Volume Snapshot Provider on page 1006
Symantec Volume Snapshot Provider (VSP). Installing AOFO will install the Symantec Volume Snapshot Provider (VSP) only. VERITAS Storage Foundation for Windows (VSFW), formerly known as VERITAS Volume Manager (VM), FlashSnap Option. Microsoft Volume Shadow Copy Service (VSS). For Microsoft Volume Shadow Copy Service (VSS), you must be using the Windows Server 2003 platforms. Third party software vendors also provide additional components that work in conjunction with the Microsoft Volume Shadow Copy Service. These components, called Writers, are used to flush application data or file data (if a file is open) residing in the computers memory before the Microsoft Volume Shadow Copy Service makes a snapshot of the volume to be backed up. See your software documentation for information about VSS Writers that may be provided by the application software vendor.
Related Topics: Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999 Changing the Default Settings for the Symantec Volume Snapshot Provider on page 1008 Using Snap Start on a VERITAS Storage Foundation for Windows Volume on page 1005 Best Practices for Using the Symantec Volume Snapshot Provider on page 1006 Symantec Volume Snapshot Provider Cache File Location on page 1007
994
Administrators Guide
Backup Exec for Windows Servers If the Advanced Open File Option is to be used locally, then the media server must also have:
The remote computer you want to back up with the Advanced Open File Option must have:
Windows 2000 or Windows Server 2003 Advanced Open File Option Backup Exec Remote Agent for Window Servers (AOFO automatically installs the Remote Agent)
The volumes you want to back up with the Advanced Open File Option must have:
Enough free disk space to start the AOFO operation. Free disk space should at least equal the size of the backup job in MBs being backed up. An NTFS, FAT32, or FAT file system. At least one NTFS partition is required to use Symantec Volume Snapshot Provider (VSP).
Note The Advanced Open File Option cannot be used on CD-ROM, floppy diskettes, removable media, or remote shares. Additionally, the Checkpoint Restart option is not supported by the AOFO. For more information about Checkpoint Restart, see Enabling or Disabling Checkpoint Restart on page 667. When backing up encrypted files with the Advanced Open File Option on Windows 2000 computers, a drive letter for the snapshot will display in Windows Explorer and on the Backup Exec Administration Console. Do not attempt to access or back up this drive letter. If no drive letters are available, encrypted files are backed up from the original volume, and the job is logged as Complete with Exceptions. To protect remote and local computers, the Backup Exec Remote Agent for Windows Servers must be installed. The Remote Agent is installed by default on the media server.
995
If you are installing the Advanced Open File Option locally to protect data on the media server, you can uninstall the Remote Agent license that was included with the Advanced Open File Option installation from the media server, and install it on one remote Windows server so that resource can be protected by Backup Exec. If the Advanced Open File Option is protecting a remote resource, the Remote Agent is necessary in order to perform remote backup and restore operations, and you cannot install it on another Windows server. For instructions on installing the Remote Agent to another Windows computer, see Installing and Uninstalling the 32-bit Remote Agent to Remote Windows Computers Using the Command Line on page 794. Related Topics: Understanding the Advanced Open File Option on page 991 Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999 Changing the Default Settings for the Symantec Volume Snapshot Provider on page 1008 Using Snap Start on a VERITAS Storage Foundation for Windows Volume on page 1005 Best Practices for Using the Symantec Volume Snapshot Provider on page 1006 Symantec Volume Snapshot Provider Cache File Location on page 1007
996
Administrators Guide
To install the Advanced Open File Option on a remote media server, see Installing Backup Exec Agents to Remote Computers on page 77. To install the 64-bit Advanced Open File Option using the 64-bit installation program, see Installing the Remote Agent on a 64-bit Computer Using the Installation Program on page 793. To install the 64-bit Advanced Open File Option using a command script, see Installing and Uninstalling the 64-bit Remote Agent and Advanced Open File Option Using a Command Script on page 795. You can also install and uninstall the Advanced Open File Option on remote servers using the Windows command line. See Installing and Uninstalling the Advanced Open File Option to Remote Windows Computers Using the Command Line on page 997. Related Topics: Upgrading Backup Exec Options on Remote Computers on page 105
Installing and Uninstalling the Advanced Open File Option to Remote Windows Computers Using the Command Line
You can install the Advanced Open File Option (AOFO) using silent mode on a remote computer using the Windows command line. Note Silent mode runs the installation operation without the benefit of a user interface. To use the Windows command line to install the AOFO on a remote computer: 1. Move to a remote server. 2. Map a drive letter to the Backup Exec for Windows Servers media server and change directories to the Advanced Open file Option install directory using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT32 or copy the RANT32 directory locally. 3. Open a command prompt and enter the drive letter you mapped in step 2. 4. To install AOFO without advertising enabled, run the following command: setup.exe /AOFO: -s -boot To install AOFO with advertising enabled, run the following command:
997
setup.exe /AOFO: -s /ADVRT: <media server name 1> <media server name 2> Note The -s parameter is used to run the install operation in silent mode, without the benefit of a user interface. The parameter -boot is used to automatically reboot your computer. If you want to do this, add the parameter -boot; if not, you must reboot the computer manually at your convenience in order to activate the Advanced Open File Option. 5. The AOFO files are installed on the remote computer in the following directory: \Program Files\VERITAS\Backup Exec\RANT 6. The AOFO installation log file is created in \WINNT\bkupinst.log or on Windows Server 2003 platforms, in \WINDOWS\bkupinst.log. After the installation finishes, reboot the computer at your convenience in order to activate the Advanced Open File Option. To use the Windows command line to uninstall the AOFO from a remote computer: 1. At the remote computer, open a command prompt window. 2. Map a drive to the media server and change directories to the AOFO install directory using the following path: \Program Files\VERITAS\Backup Exec\NT\Agents\RANT32 or copy the RANT32 directory locally. 3. Run the following command: setup.exe /AOFO: -s -u Note The -s parameter is used to run the operation in silent mode, without the benefit of a user interface. The -u parameter specifies an uninstall operation. The parameter -boot is used to automatically reboot the computer. If you want to do this, add the parameter -boot; if not, you must reboot the computer manually at your convenience in order to de-activate the Advanced Open File Option. The Advanced Open File Option is uninstalled from the remote computer. After the uninstall finishes, reboot the computer at your convenience in order to de-activate the Advanced Open File Option.
998
Administrators Guide
Setting Defaults for the Advanced Open File Option for Backup Jobs
Setting Defaults for the Advanced Open File Option for Backup Jobs
You can set the Advanced Open File Option defaults for each backup job, or you can set defaults that are used for every backup job. Jobs saved before you installed the Advanced Open File Option will continue to use the previous settings for backing up open files. In order to use the Advanced Open File Option with these jobs, you must edit the job and on the Advanced Open File dialog box in the backup job properties, select Use Advanced Open File Option. After a job is completed, check the section Backup Set Detail Information in the job log to make sure that Advanced Open File was used during the backup.
999
Setting Defaults for the Advanced Open File Option for Backup Jobs
To set the Advanced Open File defaults for backup jobs: 1. Do one of the following:
To set Advanced Open File backup options for a single backup job, on the navigation bar click Backup, and then on the Properties pane, under Settings, click Advanced Open File. To set Advanced Open File backup options for all backup jobs, on the menu bar click Tools, and then click Options. On the Properties pane, under Job Defaults, click Advanced Open File.
The Advanced Open File dialog box appears. 2. Select the appropriate options from the following:
Advanced Open File options Item Description
Use Advanced Open File Select this check box to enable Advanced Open File for backup Option jobs. If you are enabling this for a single job, or as a default for all backup jobs, then Advanced Open File backup will be performed if all requirements are met.
1000
Administrators Guide
Setting Defaults for the Advanced Open File Option for Backup Jobs Advanced Open File options Item Open file configuration Automatically select open file technology Enables Backup Exec to select the best snapshot method to use for the type of data being backed up. However, even if selected, a snapshot method may not be used if the resources do not meet the requirements for using snapshot methods. If the volume you select for backup does not meet the requirements for using the Advanced Open File Option, then the open file backup options (Never; If closed within 30 seconds; With a lock; Without a lock) will apply. For more information on the open file backup options, see Creating a Backup Job. When the option Automatically select open file technology is selected and Microsoft Volume Shadow Copy Service (VSS) provider is selected, then the first available hardware, software, or system provider is used to perform the snapshot for Microsoft Volume Shadow Copy Service (VSS). Note If you select this option for a Windows Server 2003 computer, Microsoft Volume Shadow Copy Service (VSS) is used when Shadow Copy Components and/or Microsoft SQL or Exchange databases are selected for backup, but Symantec Volume Snapshot Provider (VSP) is used in all other cases. If the Windows Server 2003 computer does not have VSP installed, Backup Exec uses VSS as the default. Symantec Volume Snapshot Provider Symantec Volume Snapshot Provider (VSP) is the default snapshot technology for Backup Exec. For details on configuring VSP, see Best Practices for Using the Symantec Volume Snapshot Provider on page 1006. Description
1001
Setting Defaults for the Advanced Open File Option for Backup Jobs Advanced Open File options Item VERITAS Storage Foundation for Windows FlashSnap Option Description VERITAS Storage Foundation for Windows (VSFW) was formerly known as Volume Manager (VM). Note The volumes you want to back up with the VSFW FlashSnap Option must first be snap-started using the VERITAS Enterprise Administrator (VEA), which must be purchased separately. For more information, see Using Snap Start on a VERITAS Storage Foundation for Windows Volume on page 1005. Note If the computer on which you are running a backup using the Advanced Open File Option is in an environment with the Central Admin Server Option and the Symantec Cluster Server installed, and if failover occurs to a Symantec Cluster Service node, you must manually clean up the snapshots before restarting the backup on the failover node. Refer to the VSFW documentation for details. Microsoft Volume Shadow Copy Service For use with vendor-specific, third party software, with Windows Server 2003. Microsoft Volume Shadow Copy Service (VSS) technology enables third party hardware and software vendors to create snapshot plugins for use with Microsofts technology. Microsoft, as well as other third party software vendors, often provide additional components that work in conjunction with VSS. These components, called Writers, are used to flush application data or file data (if a file is open) residing in the computers memory before the Microsoft Volume Shadow Copy Service makes a snapshot of the volume to be backed up. See your software documentation for information about VSS Writers that may be provided by the application software vendor. For more information, see Protecting Windows Server 2003 Systems on page 344.
1002
Administrators Guide
Setting Defaults for the Advanced Open File Option for Backup Jobs Advanced Open File options Item Snapshot provider Description Automatic - Allow VSS to select the snapshot provider Select this option to enable VSS to select the best provider for the selected volume. The order in which a snapshot provider is selected is hardware provider, software provider, and then the system provider. System - Use Microsoft Software Shadow Copy Provider Software - Use VERITAS Storage Foundation for Windows Hardware - Use technology provided by hardware manufacturer If you select Software or Hardware as the snapshot provider, then:
If multiple volumes are selected, then all volumes must be snappable by the same type of provider. Software and hardware providers cannot both be used to snap different volumes in the same job. You must either create another job, or select the option Process logical volumes for backup one at a time.
1003
Setting Defaults for the Advanced Open File Option for Backup Jobs Advanced Open File options Item Description
Process logical volumes Enables the backup of multiple volumes in one job, while creating a for backup one at a snapshot of only one logical volume at a time. To ensure database time integrity, or if a volume contains mount points, multiple volumes may need to be snapped at one time. A volume with mount points to other volumes is considered a logical volume for snapshot purposes. Therefore, that volume and the mount point volumes will be snapped together simultaneously. After the logical volume is snapped and backed up, the snapshot is deleted before the next logical volume is snapped. This option increases the ability to meet the minimum quiet time needed to complete a snapshot. A logical volume can comprise multiple physical volumes. A single logical volume can encompass all of the volumes on which databases reside. If this option is not selected, then a snapshot for all volumes in the backup job is created simultaneously. All volumes must meet the minimum quiet time. This option is only available for Symantec Volume Snapshot Provider (VSP) and Microsoft Volume Shadow Copy Service (VSS) jobs for logical volumes. Note On computers running Windows Server 2003, if the selection list for a backup job contains volumes as well as Shadow Copy Components (SCC), and the options Automatically select open file technology and Process logical volumes for backup one at a time are selected, the snapshots for volumes are created using VSP, and the Shadow Copy Components snapshots are created using VSS. This is reported in the job log and job history. Use ServerFree Option Enables Backup Exec to use third party copy support if your storage hardware supports it and you have a SAN environment. For more information, see Symantec Backup Exec - ServerFree Option on page 981.
3. If you are configuring the Advanced Open File Option for a specific backup job, you can start the backup job or select other backup options from the Properties pane. To monitor the operation while it is processing, click Job Monitor on the navigation bar, and then double-click the job to view the job activity. 4. If you are configuring the Advanced Open File Option as the default for all backup jobs, click OK.
1004
Administrators Guide
Setting Defaults for the Advanced Open File Option for Backup Jobs
5. After the jobs have completed, check the job log to make sure the Advanced Open File Option is being used during the backup. Related Topics: Selecting Data to Back Up on page 284 Using Selection Lists on page 293 Creating a Manual Backup Job by Configuring Job Properties on page 262 Understanding the Advanced Open File Option on page 991 Best Practices for Using the Symantec Volume Snapshot Provider on page 1006 Changing the Default Settings for the Symantec Volume Snapshot Provider on page 1008 Checking the Job Log When Using the AOFO on page 1012
1005
Setting Defaults for the Advanced Open File Option for Backup Jobs
Caution If you are backing up SQL or Exchange databases on the Snap started volume, you must make your selections using the Backup Exec SQL or Exchange database agents. Do not select a database or log at the volume level. Related Topics: Selecting Data to Back Up on page 284 Symantec Backup Exec - Agent for Microsoft SQL Server on page 1013 Symantec Backup Exec - Agent for Microsoft Exchange Server on page 1065
Ideally, allow AOFO exclusive use of a disk. This disk should not have any user data, should never be backed up, and should have the AOFO cache file location directed to it. Make sure there is sufficient space on the disk to encompass all of the changed data. Changed data can include user files, system files, and the NTFS Master File Table (MFT). Exclude the cache file from real-time virus scanning software. Do not run regular scans or disk utilities such as scan disk or defragmenters during backups with AOFO. Avoid running any processes or programs that would write excessive data to the drive being protected. Avoid copying large amounts of data to the drive being protected.
Related Topics: Understanding the Advanced Open File Option on page 991 Requirements for Using the Advanced Open File Option on page 995 Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999 Changing the Default Settings for the Symantec Volume Snapshot Provider on page 1008 Checking the Job Log When Using the AOFO on page 1012
1006
Administrators Guide
Setting Defaults for the Advanced Open File Option for Backup Jobs
If you used the AOFO wizard to specify a location for the cache files, this location is used if it is not write-protected, and if it is not part of the resources that are being snapped. If multiple source volumes (the volumes to be snapped) are being snapped, then multiple cache files (one for each source volume) are located on the volume you specified (if that volume is not being snapped).
If you have not specified a location for the cache file, Backup Exec will attempt to locate the cache file on volumes other than the source volumes. These volumes must meet the following requirements. If any of these criteria are not met, the cache file is created on the source volume.
The volumes must be fixed drives. The volumes must use a recognized file system (FAT, FAT32, or NTFS). The volumes must be mounted locally. The volumes must be valid cache file locations. A valid cache file location:
Cannot be a location for a snapshot by another job that is currently running. Cannot contain another active cache file. Cannot be write-protected or disabled.
Related Topics: Understanding the Advanced Open File Option on page 991 Supported Snapshot Technologies on page 994 Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999 Checking the Job Log When Using the AOFO on page 1012
1007
Changing the Default Settings for the Symantec Volume Snapshot Provider
Changing the Default Settings for the Symantec Volume Snapshot Provider
To change the default settings for the configuration options for the Symantec Volume Snapshot Provider (VSP), use the Advanced Open File Option wizard on the Backup Exec Administration Console. Caution Use caution when you manually enter a specific size for the cache file since that size is used regardless of the size of the volume being backed up, and the job could fail if there is not enough space. It is recommended that in most situations, you allow Backup Exec to automatically calculate the size and location of the cache file for each backup. To change the Symantec VSP default settings using the AOFO wizard: 1. On the Tools menu, select Wizards, and then click Advanced Open File Option Wizard. Click Next to continue past the Welcome page. The Server Selection dialog box appears. 2. Select a server that the Advanced Open File Option has been installed on, and enter a user name and password. Make sure the domain is correct. You can type another domain name, or click the drop-down arrow to select another domain, and then click Next. The Cache File Settings dialog box appears. 3. Do one of the following:
To use the default cache file location, make sure Use default is selected, and then click Next. The default location for the cache file is on the volume that has the most free space, and that is not selected to be snapped in this Advanced Open File Option backup. However, if the volume that is being snapped is the only volume with enough available space, then the cache file is placed on it.
Note Symantec strongly recommends that you do not change the defaults.
To specify alternate locations for the cache files, clear the Use default check box. Type a drive and a path that are located on the computer that is being backed up, or click the browse button to browse to a local drive and path, click Insert, and then click Next.
Administrators Guide
1008
Changing the Default Settings for the Symantec Volume Snapshot Provider
To change or delete existing cache file locations, select the location and then click Edit or Delete. After making changes, click Next. The Advanced Open File Option Configuration dialog box appears. 4. On the Advanced Open File Option Configuration screen, enter new defaults using the following table, and then click Next.
Settings for Symantec Volume Snapshot Provider (VSP) Item Have Backup Exec calculate the initial and maximum size of the cache file Description Enables Backup Exec to automatically calculate the initial and maximum size of the cache file for each backup. If the cache file is located on the volume that is being snapped, Backup Exec uses the following calculations: For the initial size, Backup Exec calculates 10 percent of the used space and 50 percent of the free space, and then uses the smaller number. For the maximum size, Backup Exec calculates 30 percent of the used space and 90 percent of the free space, and then uses the smaller number. If the cache file is located on a different volume than the volume that is being snapped, Backup Exec uses the following calculations: The initial size is zero. For the maximum size, Backup Exec calculates 30 percent of the free space on the target volume and uses that figure. The maximum size cannot be smaller than the initial size. If the maximum size is calculated to be smaller than the initial size, Backup Exec sets the maximum size to match the initial size. Both the initial size and the maximum size must be at least 50 MB. For information on where the cache file will be located, see Symantec Volume Snapshot Provider Cache File Location on page 1007.
1009
Changing the Default Settings for the Symantec Volume Snapshot Provider Settings for Symantec Volume Snapshot Provider (VSP) (continued) Item Initial size of the cache file (1 - 100 percent): Description Sets the initial size of the cache file. If you choose not to use the default, then type the percentage of free space that you want the Advanced Open File Option (AOFO) to use to create the cache file. Increase this percentage if you receive an error message stating that the AOFO is out of disk space. This increase enables additional free space to be allocated on the volume, which can then be used during the backup. Symantec recommends that you set the maximum size before setting the initial size. Maximum size that the cache file can grow to: Sets the maximum size of the cache file. If you do not use the default, then type the maximum percentage to allow for the cache file. If the snapshot exceeds the maximum percentage, the job will fail and the error will be listed in the job log. If the cache file is located on the volume that is being snapped, Backup Exec uses the number that you type in this field to calculate the percentage of used space on the volume. Backup Exec also calculates 90 percent of the free space on the volume and uses the smaller number. If the cache file is located on a different volume than the volume that is being snapped, Backup Exec uses the number that you type in this field to calculate the percentage of free space on the volume and uses that number. The maximum size cannot be smaller than the initial size. If the maximum size is calculated to be smaller than the initial size, Backup Exec sets the maximum size to match the initial size. The maximum size must be at least 50 MB. Number of seconds during which there can be no disk activity before the snapshot is created Sets the minimum length of quiet time in seconds, in which the application waits for disk inactivity before the snapshot is created. During this time, AOFO is waiting for there to be no drive activity to ensure that all buffers have been flushed, and therefore all the data on the drive should be consistent. The default quiet time is five seconds. In some cases it is necessary to lower this setting, but this increases the risk of the data on the drive becoming inconsistent. Decrease this setting if you have an active disk so that the snapshot can be created before reaching the maximum length of quiet time.
1010
Administrators Guide
Changing the Default Settings for the Symantec Volume Snapshot Provider Settings for Symantec Volume Snapshot Provider (VSP) (continued) Item Description The recommended minimum length is five seconds, but you can choose between two and four seconds. This setting should never be lowered below two. Instead, investigate what applications or services may be causing excessive disk writes. You may also want to select the option Process logical volumes for backup one at a time. This option enables the backup of multiple volumes in one job, while creating a snapshot of only one logical volume at a time and increases the ability to meet the minimum quiet time needed to complete a snapshot. See Process logical volumes for backup one at a time on page 1004 Number of seconds that the application tries to obtain the minimum quiet time, after which the job fails Sets the maximum length of time that AOFO waits for disk inactivity before terminating the creation of the snapshot. Increase this setting if a backup fails repeatedly with the message that it could not obtain the minimum quiet time. Increasing this setting maximizes the length of time used to create the snapshot. The default is 2,000 seconds.
A summary of changes made is displayed. 5. Review the summary screen. If the configuration is satisfactory, click Finish. To make more changes, click Back. After you click Finish, the Advanced Open File Option settings for the Symantec Volume Snapshot Provider are saved, and you are prompted to set up another server. Related Topics: Understanding the Advanced Open File Option on page 991 Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999 Best Practices for Using the Symantec Volume Snapshot Provider on page 1006 Symantec Volume Snapshot Provider Cache File Location on page 1007
1011
1012
Administrators Guide
Appendix
Database, transaction log, differential, and filegroup backups, as well as database recovery and replacement. An automated restore of the master database. The Intelligent Disaster Recovery option, which automates the disaster recovery process of SQL 2000 or SQL 7.0, depending upon which SQL version is installed. Backups of multiple instances. For use with the Symantec Backup Exec for Windows Servers - Advanced Disk-based Backup Option (ADBO) and the Advanced Open File Option (AOFO). ADBO and AOFO are separate, add-on components of Backup Exec. The use of ADBO and AOFO can reduce both restore time and backup impact on the server. Standby database. If the primary SQL server fails, or is shut down for maintenance, another database called a standby database can be brought online. The standby database contains a copy of the primary server's databases so that users can continue to access the database even though the primary server is unavailable. When the primary server is available again, the changes on the standby database must be restored back to the primary server or the changes will be lost. The databases on the primary server should then be backed up and restored on the standby database again.
1013
Backup Exec provides a backup option that enables you to put the database in standby mode when the log file backup completes, and a recovery completion state of Leave database read-only and able to restore additional transaction logs to create and maintain a standby database.
Database Consistency Checks (DBCC) for each backup and restore job, including a fast database consistency check of only the physical consistency of the database. Full, bulk-logged, and simple recovery models. The simple recovery model is similar to setting the truncate log on checkpoint option in SQL 7.0. With the simple recovery model, copies of the transactions are not stored in the log file, which prevents transaction log backups from being run. Therefore, you can recover the database to the point of the last backup, but you cannot restore the database to the point of failure or to a specific point in time. Restores of transaction logs to a specific point in time or to a named transaction when log marks are used. Database Consistency Checks (DBCC) before and after each backup job. Restores of transaction logs to a specific point in time.
Backup Exec must have access rights to read both of the following SQL registry keys:
If Backup Exec does not have access to these registry keys, a restore to the default directory may not work, and the Automate master database restore option on the Restore Job Properties for SQL dialog box will not work. To ensure that Backup Exec has access rights, verify that the logon account used has administrator rights to the Windows server that the SQL instance is installed on.
The media server must have access to the SQL installation. The credentials stored in the Backup Exec logon account used for backing up and restoring SQL must have been granted the System Administrator role on the SQL instance.
Administrators Guide
1014
1015
In the backup selections list or in the resource credentials list, apply that logon account to the Windows server that SQL is installed on, not to the actual SQL instance.
How logon account is applied
The Backup Exec logon account containing the Windows credentials is applied to the Windows server that SQL is installed on.
If you are using SQL Server Authentication, then add a Backup Exec logon account that stores the credentials of the SQL user account. In the backup selections list, apply the Backup Exec logon account for the Windows user account to the Windows server that SQL is installed on, and then apply the logon account for the SQL user account to the SQL instance.
1016
Administrators Guide
The Backup Exec logon account containing the SQL user account credentials is applied to the SQL instance.
If you use a Backup Exec logon account that does not have the proper rights, you will receive an error message stating that the username and password are invalid. Related Topics: Changing and Testing Logon Accounts for Resources on page 292 Configuring Logon Accounts on page 386
In small environments, consider running a daily full database backup every evening and daily transaction log backups. In mid-sized environments, consider running a weekly full database backup and daily transaction log backups along with daily differential backups except on the day when the full backup is run.
1017
In large environments, consider running daily differential database backups, weekly full database backups, and transaction log backups as necessary. Many shops run full backups on a weekly basis, preferring to run differential backups throughout the week to keep backup run time to a minimum. Extremely large environments may need to run filegroup backups in order to split the full backup over several days. Log backups are required to be able to recover a system from a filegroup backup.
The trade-off with running fewer full backups and running more differential backups occurs at recovery time when you must recover using the full database backup as well as the last differential database backup, and all log backups made after the last differential database backup. What will work best for you will be based on the size of your environment, the number of transactions processed each day, and the expectations of your users when a recovery is required. You should also separate SQL backup jobs from other backup jobs. When developing a SQL backup strategy, consider the following:
Recommendations for backing up SQL SQL Server backup strategies: Protect the entire SQL Server. Description:
To make sure SQL is completely protected, back up the following on a regular basis:
The system drive that SQL is on. The Windows registry and System State. SQL databases or filegroups. You do not need to back up both. Transaction logs.
If you upgrade SQL, run new full database backups. You may not be able to restore backups from one version or service pack level of SQL to other versions.
1018
Administrators Guide
Backup Strategies for SQL Recommendations for backing up SQL (continued) SQL Server backup strategies: Run consistency checks after backups. Description:
We recommend that you run a consistency check after a backup. If a database, transaction log, or filegroup contains errors when it is backed up, the backup will still contain the errors when it is restored, if it is restorable at all. These consistency checks include:
A full consistency check, including indexes. This check will have significant impacts on SQL performance; therefore, it should be performed in off-peak hours. A full consistency check with no index check. While not as thorough as a full consistency check that includes indexes, this check is faster and can be done during peak hours with little impact on system performance.
Note The option to run a physical check only is only available if running SQL 2000.
A physical check only. Another low-overhead check, this method checks only the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.
Back up the master Back up the master database whenever procedures are run that database whenever data change information in the database, especially after: is changed in the master New databases are created. database. Files are added to an existing database.
If changes are not backed up before the master database must be restored, the changes are lost. Run one backup at a time. Do not schedule more than one backup to occur simultaneously against a database or its transaction log, or a filegroup.
1019
Backup Strategies for SQL Recommendations for backing up SQL (continued) SQL Server backup strategies: For SQL 2000 only: Back up both system and user databases and transaction logs regularly. Copies of the master and model databases are automatically created by Backup Exec whenever you back up the master and model databases. If these databases become corrupted or are missing, and SQL cannot be started, you can replace them with the copies of the master and model databases, and then start SQL. After SQL is running again, you can restore the latest copy of the master database using Backup Execs Automate master database restore option, and then restore any other databases, if needed. If you purchased the Intelligent Disaster Recovery (IDR) option, then during an IDR recovery of the C: drive, it will automatically replace the damaged databases with the copies of the master and model databases that you made. If you have filegroups, back them up instead of databases. Do not back up filegroups and databases. For SQL 7.0 only: Create a copy of the master and model databases, and place the copies in the same directory that the databases are in. Make copies of the master and model databases and place the copies in the same directory that the master and model databases are in. Then, if the master database becomes critically damaged and SQL cannot be started, instead of running the Rebuild Master utility or reinstalling SQL, you can replace the corrupted or missing databases with the copies of the master and model databases, and then start SQL. After SQL is running again, you can restore the latest copy of the master database using Backup Execs Automate master database restore option, and then restore any other databases, if needed. If you purchased the Intelligent Disaster Recovery (IDR) option, then during an IDR recovery of the drive C, it will automatically replace the damaged databases with the copies of the master and model databases that you made. For details, see To create copies of the SQL 7.0 master and model databases: on page 1058. When databases grow too large to be backed up all at once, filegroups can provide an alternative backup method. Different filegroups can be backed up at different times and frequencies. A combination of filegroup and log backups provides complete database protection. Description:
1020
Administrators Guide
Consistency Checks for SQL Recommendations for backing up SQL (continued) SQL Server backup strategies: If you have filegroups, run at least one full database backup first, then back up the filegroups instead of databases. Do not back up filegroups and databases. Description:
When databases grow too large to be backed up all at once, filegroups can provide an alternative backup method. Different filegroups can be backed up at different times and frequencies. However, SQL 7.0 databases cannot be restored using only filegroup and log backups. SQL 7.0 databases must have at least one full database backup in order to be restored. If the database has been deleted or does not exist, restore the full database backup, and then restore all the filegroup and log backups.
CHECKDB, CHECKCATALOG, and PHYSICAL_ONLY are performed for database-related operations. Note PHYSICAL_ONLY is not available for SQL 7.0. CHECKFILEGROUP is performed for filegroup-related operations. For more information concerning these utilities, see your Microsoft SQL documentation. Related Topics: Setting Backup Options for SQL on page 1024
1021
1022
Administrators Guide
The SQL user data and log files must exist on the mirrored volume (plex) in order for the snapshot to occur.
1023
To protect system databases, the system database files must reside on the mirrored volume (plex).
Related Topics: Understanding the Advanced Open File Option on page 991 Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999
The SQL user data and log files must exist on the mirrored volume (plex) in order for the snapshot to occur. To protect system databases, the system database files must reside on the mirrored volume (plex).
1024
Administrators Guide
Full - Back up entire database or filegroup. Select this option to back up the entire database or filegroup. See Backing Up SQL Databases on page 1029. This option is selected by default. Log - Back up transaction log. Select this option to back up only the data contained in the transaction log; it does not back up database data. After the transaction log is backed up, committed transactions are removed (truncated). Select this option to be able to select No recover or Standby under Enable SQL 2000 advanced log backup options. See Backing Up SQL Transaction Logs on page 1033.
Log No Truncate - Back up transaction log - no truncate. Select this method only when the database is corrupted or database files are missing. Since the Log No Truncate method does not access the database, you can still back up transactions that you may not be able to access otherwise when the database is in this state. You can then use this transaction log backup along with the database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. See Backing Up SQL Transaction Logs on page 1033. Differential - Back up database or filegroup changes only. Select this option to back up only the changes made to the database or filegroup since the last full backup. Because differential backups allow the restore of a system only to the point in time that the differential backup was created, you should also create multiple log backups between the differential backups.
1025
Setting Backup Options for SQL Backup job properties for SQL (continued) Item Consistency check before backup Description Select a consistency check to run before a backup.
None. Select this option if you do not want a consistency check to run before a backup. Symantec strongly recommends that you always run a consistency check either before or after the backup. This option is selected by default. Full check, excluding indexes. Select this option to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked. Full check, including indexes. Select this option to include indexes in the consistency check. Any errors are logged. Physical check only (SQL 2000 only). Select this option to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.
Select this option to continue with the backup operation even if the consistency check fails. You may want to continue with the backup when the consistency check fails if you think that a backup of the database in its current state is better than no backup at all, or if you are backing up a very large database with only a small problem in a table.
1026
Administrators Guide
Setting Backup Options for SQL Backup job properties for SQL (continued) Item Consistency check after backup Description Select a consistency check to run after a backup. Because database transactions can occur during or after the consistency check, but before the backup runs, consider running a consistency check after the backup to ensure the data was consistent at the time of the backup.
None. Select this option if you do not want a consistency check to run after a backup. Symantec strongly recommends that you always run a consistency check either before or after the backup. This option is selected by default. Full check, excluding indexes. Select this option to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked. Full check, including indexes. Select this option to include indexes in the consistency check. Any errors are logged. Physical check only (SQL 2000). Select this option to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.
This option is available only if running SQL 2000 and only when the selected backup method is Log - Back up transaction log. Select this option to choose either the No Recover - Place database in loading state option or the Standby - place database in standby state option to apply to the backup.
No recover - Place Select this option to put the database in a loading state when the database in loading state log file backup completes. Users cannot connect to or query the database while it is in a loading state. Note This option is only available if running SQL 2000 and if Enable SQL 2000 advanced log backup options has been selected.
1027
Setting Backup Options for SQL Backup job properties for SQL (continued) Item Description
Standby - Place database Select this option to put the database in standby mode when the in standby state log file backup completes. Users can connect to and query the database when it is in standby mode, but cannot update it. Convert a standby database to a live database by restoring the latest transaction log and specifying the recovery completion state Leave database operational. No additional transaction logs can be restored. Note This option is only available if running SQL 2000 and if Enable SQL 2000 advanced log backup options has been selected. Guide Me Click this to start a wizard that helps you select backup job properties for SQL.
Related Topics: Selecting Data to Back Up on page 284 Using Selection Lists on page 293 Consistency Checks for SQL on page 1021
1028
Administrators Guide
1029
For information on using logon accounts when making backup selections, see Using Backup Exec Logon Accounts for SQL Resources on page 1015. 3. To select SQL data from local or remote selections, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server. A list of shared network directories appears, along with an icon that represents the SQL installation. To select all databases in SQL, click the checkbox preceding the SQL icon, or you can select specific databases by clicking the SQL icon, and then selecting individual databases. 4. To select the SQL backup job properties, on the Properties pane, under Settings, click Microsoft SQL. 5. Select options for the backup job. For details on these options, see Setting Backup Options for SQL on page 1024. 6. Start the backup job or select other backup options from the Properties pane, and then start the backup job. Related Topics: Backing Up Data on page 259 Backing Up SQL Transaction Logs on page 1033 Setting Backup Options for SQL on page 1024
1030
Administrators Guide
1031
For information on using logon accounts when making backup selections, see Using Backup Exec Logon Accounts for SQL Resources on page 1015. 3. To select SQL data, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server. Expand the SQL container and select specific filegroups.
Selections options
4. To select SQL backup job properties, on the Properties pane, under Settings, click Microsoft SQL. 5. After selecting job options, start the backup job or select other backup options from the Properties pane, and then start the backup job.
Related Topics: Backing Up Data on page 259 Setting Backup Options for SQL on page 1024.
1032
Administrators Guide
The transaction log has been truncated, unless you run a full or differential backup after the transaction log truncation occurs and before running a log backup. Files are added or deleted from the database. You should immediately run a full backup instead.
Use the Log No Truncate method only when the database is corrupted or database files are missing. This method backs up transactions that you may not be able to access otherwise when the database is in this state. You can then use this transaction log backup along with the last database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. To use the Log No Truncate backup to restore a database, you should also have a database backup that was created before the Log No Truncate backup. The transaction log contains only the log files used in the restore process, which alone are not sufficient to restore a complete database. You must have at least one database backup or a full set of filegroup backups and a log backup of the database to restore a database. Caution If using SQL 2000, do not run a log backup using either method if the SQL 2000 database is using the simple recovery model. With the simple recovery model, you can recover data only up to the most recent full or differential backup. If you run a log backup on a database using the simple recovery completion state, the backup will fail. If using SQL 7.0, do not run a log backup using either method if the SQL database option truncate log on checkpoint is enabled. When this option is enabled, every time a checkpoint occurs in the database, the transaction log is truncated without the truncated part of the transaction log being backed up, which prevents more transaction log backups from being created. You should run a database or differential backup instead. To check the database properties, from the Enterprise Manager on the SQL Server, right-click the database, click Properties, click the Options tab, and then view the configuration settings.
1033
If using SQL 7.0, do not run a log backup using either method f the SQL database select into/bulkcopy option is enabled, and nonlogged operations have occurred in the database since the last database backup was created. Nonlogged operations break the sequence of transaction log backups. The restore of a database using database and transaction log backups is successful only if there is an unbroken sequence of transaction log backups after the last database or differential backup. If these conditions are present, you should run a database or differential backup and then start running log backups again in order to save any changes necessary to restore the database. To back up SQL transaction logs: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see Using Backup Exec Logon Accounts for SQL Resources on page 1015. 3. To select SQL data, click the domain name icon or icons that contain the SQL installations, and then click the actual Windows computer icon that contains the SQL installation. If you are using a cluster server, make backup selections from the virtual server. A list of shared network directories appears, along with an icon that represents the SQL installation. 4. To select SQL backup job properties, on the Properties pane, under Settings, click Microsoft SQL. 5. After selecting job options, start the backup job or select other backup options from the Properties pane, and then start the backup job.
Related Topics: Setting Backup Options for SQL on page 1024 About Restoring SQL Databases and Filegroups on page 1040 Restoring from SQL Transaction Logs Up to a Point in Time on page 1042 Restoring from SQL 2000 Transaction Logs Up to a Named Transaction on page 1043
1034
Administrators Guide
Recovery completion state Leave database operational. No additional transaction logs can be restored. (With Recovery) Select this option when restoring the last database, differential, or log backup in the restore sequence in order to have the restore operation roll back all uncompleted transactions. After the recovery operation, the database is ready for use. If Leave database operational is not performed, the database is left in an intermediate state and is not usable. If Leave database operational is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning. Leave database nonoperational but able to restore additional transaction logs (No Recovery) Leave database read-only and able to restore additional transaction logs (Standby) Select this option during transaction log and database restore to create and maintain a standby database. See your SQL documentation for information on standby databases. Select this option during a restore if you have additional differential or transaction log backups to be restored in another restore job.
1035
Restore Options for SQL Restore job properties for SQL (continued) Item Take existing target database offline (SQL 2000) Description Select this option if you want Backup Exec to automatically take the SQL 2000 database offline before the restore job runs. If this option is not selected and there are active connections to the SQL database, the restore job will fail. Select this checkbox to replace a database or filegroup, even if another database or filegroup with the same name already exists on the server. If Replace Databases or Filegroups is not specified for a restore, SQL performs a safety check to ensure that a different database or filegroup is not accidentally overwritten. Refer to your SQL documentation for more information about the safety check that occurs when this option is not selected. Select this checkbox to enable Backup Exec to stop SQL so that the master database can be restored. All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other database, those jobs will fail. If Backup Exec does not have access to the SQL registry keys, HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server, and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the Automate master database restore option on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the logon account used has administrator rights to the Windows server that the SQL instance is installed on.
1036
Administrators Guide
Restore Options for SQL Restore job properties for SQL (continued) Item Consistency check after restore Description
None. Select this option if you are doing sequential restores. Do not run a consistency check after a restore until all sequential restores have been done. If a consistency check is selected during a restore, the restore will complete but the consistency check will not be done. Check the job log for this information. If you need to recover the database after restores are complete, select one of the following consistency checks when you select the Leave database operational option.
Full check, excluding indexes. Select this option to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked. Full check, including indexes. Select this option to include indexes in the consistency check. Any errors are logged. This option is selected by default. Physical check only (SQL 2000 only). Select this option to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.
1037
Restore Options for SQL Restore job properties for SQL (continued) Item Description
Default drive for Use this option to select a default drive to which SQL database restoring database files: files can be restored if the drive where one or more of the database files previously resided no longer exists. When a SQL database is backed up, the physical file names (which include the directory path) of the files that make up the database are stored in the backup set by SQL. For example, for the logical file pubs, the physical file name is stored as E:\MSSQL7\DATA\pubs.mdf. If the database must later be restored, SQL uses these same physical file names to target the restore to. During a restore, Backup Exec automatically creates any necessary subdirectories that do not exist. However, if the drive where one or more of the database files previously resided no longer exists, Backup Exec moves those files to their original directory path, but on the default drive specified. Using the same example, if the default drive C is specified, then the file with the original directory path of E:\MSSQL7\DATA\pubs.mdf is restored to C:\MSSQL7\DATA\pubs.mdf. If no default drive is specified in this situation, the job will fail. Restore all database files to default drive Select this checkbox to restore all database files to their original directory path on the default drive, even if the drive where they originally resided exists. To make this option available, select a drive letter in Default drive for restoring database files. Note Do not select this option when restoring filegroups. Filegroups must be restored to the same drive letter and path that they were backed up from. Restore all database files to the target instances data location Select this checkbox to restore files to the default data and log directories of the destination instance. For example, if you are restoring a database to a different instance of SQL, you would select this option to move the database files to the correct location for the new instance. If this option is not selected, then the files are restored to the directory that the master database is in. Note Do not select this option when restoring filegroups. Filegroups must be restored to the same drive letter and path that they were backed up from.
1038
Administrators Guide
Restore Options for SQL Restore job properties for SQL (continued) Item Description
Point in time log restore Select this checkbox to restore transactions from a transaction log up to and including a point in time in the transaction log. After the point in time, recovery from the transaction log is stopped. In the Date box, select the part of the date you want to change, and then enter a new date or click the arrow to display a calendar from which you can select a date. In the Time box, select the part of the time you want to change, and then enter a new time or click the arrows to select a new time. Restore log up to named Select this checkbox to restore transactions from a transaction transaction (SQL 2000) log up to a named transaction (or named mark) in the transaction log; after that, recovery from the transaction log is stopped. The named transactions are case-sensitive. Check your client application event log to find dates and times of named transactions. Include the named transaction Select this checkbox to include the named transaction in the restore; otherwise the restore will stop immediately before the named transaction is restored.
Note This option is only available if you are running SQL 2000 and the Restore log up to named transaction option has been selected.
Found after Select this check box to specify a date and time after which the restore operation is to search for the named transaction. For example, if you specify a restore from a log up to the named transaction AfternoonBreak, found after 6/02/2000, 12:01 p.m., then the restore operation will not search for AfternoonBreak until after that time.
Note This option is only available if you are running SQL 2000 and the Restore log up to named transaction option has been selected.
Guide Me Click this to start a wizard that helps you select restore job properties for SQL.
Related Topics: About Restoring SQL Databases and Filegroups on page 1040.
Appendix I, Symantec Backup Exec - Agent for Microsoft SQL Server 1039
Restoring from SQL Transaction Logs Up to a Point in Time on page 1042 Restoring from SQL 2000 Transaction Logs Up to a Named Transaction on page 1043 Restoring from SQL Filegroup Backups on page 1044
Restoring a database or a primary filegroup from a filegroup backup. Separate restore jobs must be used to restore the primary filegroup, to restore the rest of the filegroup backup sets, and to restore the transaction logs.
Caution SQL 7.0 databases cannot be restored using only filegroups and log backups. SQL 7.0 databases must have at least one full database backup in order to be restored. If the database has been deleted or does not exist, restore the full database backup, and then restore all the filegroup and log backups.
Restoring a nonprimary filegroup. After running a Log No Truncate backup, separate restore jobs must be used to restore the missing filegroup from full and differential backups of the filegroups, and to restore the transaction logs.
If you use multiple jobs to restore a database, make sure that you specify the recovery completion state Leave database nonoperational but able to restore additional transaction logs for all the jobs except the last one, for which you should specify the recovery completion state Leave database operational. SQL database files contain unused space so that the disk file does not have be grown every time a small amount of data is added to the database. SQL fills the unused space with zeros. When SQL databases are restored, it is not known how much of the file will actually be used by the restored data, so SQL creates the required database files on disk and then fills them with zeros.
1040
Administrators Guide
With very large databases this process can take several hours to complete. During this time Backup Exec reports that no data is being transferred, and the Byte count field in the Job Monitor view is not updated. When SQL has completed filling the files with zeros, the restore job continues. This occurs for all database restores but is noticeable only on very large databases. For steps on how to create the restore job, and for descriptions of all the options for restoring SQL data, see Redirecting Restores for SQL on page 1049. Note SQL 7.0 database backups can be restored to SQL 2000, but SQL 2000 backups cannot be restored to SQL 7.0. Related Topics: Restoring Data on page 451 Restoring from SQL Transaction Logs Up to a Point in Time on page 1042 Restoring from SQL 2000 Transaction Logs Up to a Named Transaction on page 1043 Restoring from SQL Filegroup Backups on page 1044 Redirecting Restores for SQL on page 1049
6. Start the restore job or select other restore options from the Properties pane. Related Topics: About Restoring SQL Databases and Filegroups on page 1040
Related Topics: Restoring Data on page 451 About Restoring SQL Databases and Filegroups on page 1040
1042
Administrators Guide
If a date and time are not entered, recovery from the transaction log is stopped at the first transaction with the specified name. For information on other SQL restore options, see Redirecting Restores for SQL on page 1049. 9. Start the restore job or select other restore options from the Properties pane. Related Topics: Restoring Data on page 451 About Restoring SQL Databases and Filegroups on page 1040
All filegroups must be restored to the same point in time. For example, if a table is deleted from a filegroup, you cannot restore that filegroup to a point in time before the table was deleted and then leave it at that time; you must continue restoring the filegroup to the same point in time shared by all existing filegroups. To be able to restore a filegroup to the same point in time as the other filegroups, run one of the following log backups:
If the database is intact, run a Log backup. If any files or filegroups are missing, run a Log - No Truncate backup.
Note If the primary filegroup is missing, the log backup methods are unavailable. You can restore the database only up to the last log backup.
Filegroup restores can be redirected to a different server, but the database file paths cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA then the filegroup must be restored to G:\SQLDATA, regardless of the server the restore is redirected to.
1044
Administrators Guide
The options Restore all databases to default drive and Restore all database files to the target instances data location on the Restore Job Properties for SQL dialog box do not apply to filegroup restores. Filegroups must be restored to the same drive letter and path that they were backed up from.
When restoring from filegroup backups, separate restore jobs are required. Previous versions of Backup Exec cannot restore filegroup backups made with this release of Backup Exec. If using SQL 2000 and restoring from filegroup backups, separate restore jobs are required.
To restore the entire database (SQL 2000 only), a missing primary filegroup, or a filegroup containing a deleted or changed table: Note Use separate restore jobs to restore the primary filegroup, the rest of the filegroup backup sets, and the transaction logs. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup set containing the primary filegroup. 4. On the Properties pane, under Settings, click Microsoft SQL. 5. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database nonoperational but able to restore additional transaction logs. For information on other SQL restore options, see Redirecting Restores for SQL on page 1049. 6. Start the restore job. 7. After the primary filegroup is restored, select the rest of the filegroup backup sets containing the latest full and differential backups. 8. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database nonoperational but able to restore additional transaction logs, and then start the restore job.
9. When the full and differential backups are restored, select the backup set containing the transaction logs.
1045
10. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational and restore all of the transaction logs, or select Point in time log restore or Restore log up to named transaction. 11. Start the restore job or select other restore options from the Properties pane. For information on other restore options, see Restoring Data on page 451. To restore a missing or corrupted nonprimary filegroup: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections. 3. In the backup selections list, select the database. 4. On the Properties pane, under Settings, click Microsoft SQL. 5. Select the backup method Log No Truncate, select None for a consistency check, and then start the backup job. 6. After the Log No Truncate backup is complete, restore the missing or corrupted filegroup by selecting the filegroup backup sets containing the latest full and differential backups, and the transaction log backups. 7. On the Restore Job Properties for SQL dialog box, select the recovery completion state Leave database operational. No additional transaction logs can be restored. 8. Start the restore job or select other restore options from the Properties pane, and then start the restore job. Related Topics: Restoring Data on page 451
1046
Administrators Guide
An inability to start SQL. Segmentation faults or input/output errors. A report generated by SQL Database Consistency Checker utility (DBCC).
If you can still start SQL, you can restore the latest copy of the master database backup using the Automate master database restore option in Backup Execs Restore Job Properties for SQL dialog box and then restore any other databases, if needed. If the master database is critically damaged and SQL cannot be started, rather than running the Rebuild Master utility, or reinstalling SQL to be able to restart SQL, you can replace the corrupted or missing databases with the copies of the master and model databases that Backup Exec automatically creates and updates whenever backups of those databases are run. After SQL is running again, you can restore the latest copy of the master database using Backup Execs Automate master database restore option, and then restore any other databases, if needed. If copies of the master and model databases were not made, then you must use Microsofts rebuildm.exe utility to rebuild the master database and start SQL. Because all changes made to the master database after the last backup was created are lost when the backup is restored, the changes must be reapplied. If any user databases were created after the master database was backed up, those databases cannot be accessed until the databases are restored from backups or reattached to SQL. To restart SQL using database copies: 1. Verify that the database copies are present. The database copies are named master$4idr, mastlog$4idr, model$4idr, and modellog$4idr. In a default installation of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL\Data\*.*. In a named instance of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL$Instance_Name\Data\*.* In a default installation of SQL 7.0, the databases are in C:\MSSQL7\Data. If necessary, restore the master and model database copies from a backup set to the same directory that the original master and model databases are in.
1047
2. Open a command prompt window, and delete the original master and model databases and their transaction logs. For example: C:\Program Files\Microsoft SQL Server\MSSQL\Data> del master.mdf mastlog.ldf model.mdf modellog.ldf or: C:\ mssql7\data> del master.mdf mastlog.ldf model.mdf modellog.ldf 3. Rename the copies of the databases back to their original names, and make sure they are not read-only files or the SQL services will not start. For SQL 2000, type the following: C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename master$4idr master.mdf C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename mastlog$4idr mastlog.ldf C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename model$4idr model.mdf C:\Program Files\Microsoft SQL Server\MSSQL\Data>rename modellog$4idr modellog.ldf For SQL 7.0, type the following: C:\ mssql7\data> rename master$4idr master.mdf C:\ mssql7\data> rename mastlog$4idr mastlog.ldf C:\ mssql7\data> rename model$4idr model.mdf C:\ mssql7\data> rename modellog$4idr modellog.ldf 4. If you are using SQL 2000, use the SQL Service Control Manager to start SQL Server. If you are using SQL 7.0, use the SQL Server Service Manager to start SQL. 5. Continue with the next procedure to restore the latest changes to the master database. To restore the master database: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections.
1048 Administrators Guide
3. On the restore selections list, select the backup set containing the last master database backup. 4. On the Properties pane, under Settings, click Microsoft SQL. 5. On the Restore Job Properties for SQL dialog box, select Automate master database restore. All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other database, those jobs will fail. If Backup Exec does not have access to the SQL registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the account that Backup Exec uses has administrator rights to the computer that is running SQL. 6. Select a consistency check to be run after the restore. 7. Start the restore job. After the restore, SQL is restarted in multi-user mode. Related Topics: Restoring Data on page 451
A database backup to a different server, database, or instance. Differential and log backups to wherever the associated database is restored. One or more filegroups in a backup to a different server or instance. Filegroups can be redirected to a different server, but the database file paths cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA, then it must be restored to G:\SQLDATA, even if it is redirected to another server. Filegroups must be restored to the same drive letter and path that they were backed up from.
Single-job restores and multiple-job restores can both be used in redirected restore operations.
1049
Restoring from SQL Database Backups on page 1041. Restoring from SQL Transaction Logs Up to a Point in Time on page 1042. Restoring from SQL 2000 Transaction Logs Up to a Named Transaction on page 1043. Restoring from SQL Filegroup Backups on page 1044.
2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click Microsoft SQL Redirection. 3. Select the appropriate options as follows, and then start the redirected restore job or select other restore options from the Properties pane:
Restore job properties for redirected SQL sets Item Redirect Microsoft SQL Server sets Restore to server Description Select this checkbox to enable redirection of SQL backup sets.
To redirect this restore to a different server, type the target server name. You can redirect a full database backup to a different server or database; however, if the drive configuration is different from when the database backup was created, you must select either Default drive for restoring database files or Restore all database files to the target instances data location on the Restore Job Properties for SQL dialog box (see Restore Options for SQL on page 1035).
To restore to a server, use a Backup Exec logon account that stores the credentials of a Windows user account. The Windows user account must have been granted the System Administrator role on the SQL instance. The default logon account is displayed. To use another logon account, click Change. For more information about logon accounts, see Using Backup Exec Logon Accounts for SQL Resources on page 1015.
1050
Administrators Guide
About Restoring SQL Databases and Filegroups Restore job properties for redirected SQL sets (continued) Item SQL logon account Description If you are using SQL Server Authentication, use a Backup Exec logon account that stores the credentials of the SQL user account. Apply the Backup Exec logon account for the Windows user account to the Windows server that SQL is installed on, and then apply the logon account for the SQL user account to the SQL instance. To use another logon account, click Change. To remove the SQL logon account displayed in this field, click Clear. For more information about logon accounts, see Using Backup Exec Logon Accounts for SQL Resources on page 1015. Restore to named instance (SQL 2000) To redirect this restore to a named instance, type the instance name. If you are restoring to the default instance, leave the field empty. To redirect the restore to a different database on the target server, type the target database name; otherwise, leave the field blank. You can redirect a full database backup to a different server and/or database; however, if the drive configuration is different from when the database backup was created, you must select either Default drive for restoring database files or select Restore all database files to the target instances data location on the Restore Job Properties for SQL dialog box (see Redirecting Restores for SQL on page 1049). If you are restoring a differential or log backup, and the associated database backup was restored to a different server, enter the new database name.
Restore to database
Related Topics: Restoring Data on page 451 About Restoring SQL Databases and Filegroups on page 1040
1051
Options - set application defaults for SQL Item Backup Backup method
Description
Full - Back up entire database or filegroup. Select this option to back up the entire database or filegroup. See Backing Up SQL Databases on page 1029. This option is selected by default. Log - Back up transaction log. Select this option to back up only the data contained in the transaction log; it does not back up database data. After the transaction log is backed up, committed transactions are removed (truncated). See Backing Up SQL Transaction Logs on page 1033. Log No Truncate - Back up transaction log - no truncate. Select this method only when the database is corrupted or database files are missing. Since the Log No Truncate method does not access the database, you can still back up transactions that you may not be able to access when the database is in this state. You can then use this transaction log backup along with the database backup and any previous transaction log backups to restore the database to the point at which it failed; however, any uncommitted transactions are rolled back. The Log No Truncate method does not remove committed transactions after the log is backed up. See Backing Up SQL Transaction Logs on page 1033.
1052
Administrators Guide
Setting Default Backup and Restore Options for SQL Options - set application defaults for SQL Item Description
Differential - Back up database or filegroup changes only. Select this option to back up only the changes made to the database or filegroup since the last full backup. Because differential backups allow the restore of a system only to the point that the differential backup was created, you should also create multiple log backups between the differential backups. See Backing Up SQL Databases on page 1029.
Consistency check before Select a consistency check to run before a backup. backup None. Select this option if you do not want a consistency check to run before a backup. Symantec strongly recommends that you always run a consistency check either before or after the backup. This option is selected by default.
Full check, excluding indexes. Select this option to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked. Full check, including indexes. Select this option to include indexes in the consistency check. Any errors are logged. Physical check only (SQL 2000 only). Select this option to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.
Select this option to continue with the backup operation even if the consistency check fails. You may want to continue with the backup when the consistency check fails if you think that a backup of the database in its current state is better than no backup at all, or if you are backing up a very large database with only a small problem in a table.
1053
Setting Default Backup and Restore Options for SQL Options - set application defaults for SQL Item Consistency check after backup Description Select a consistency check to run after a backup. Because database transactions can occur during or after the consistency check, but before the backup runs, consider running a consistency check after the backup to ensure the data was consistent at the time of the backup.
None. Select this option if you do not want a consistency check to run after a backup. Symantec strongly recommends that you always run a consistency check either before or after the backup. This option is selected by default. Full check, excluding indexes. Select this option to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked. Full check, including indexes. Select this option to include indexes in the consistency check. Any errors are logged. Physical check only (SQL 2000 only). Select this option to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.
Select this checkbox if filegroups exist that you want to select for backup. If this checkbox is not selected, filegroups are not displayed as backup selections.
1054
Administrators Guide
Setting Default Backup and Restore Options for SQL Options - set application defaults for SQL Item Restore Recovery completion state
Description
Leave database operational. No additional transaction logs can be restored (With Recovery). Select this option when restoring the last database, differential, or log backups in the restore sequence in order to have the restore operation roll back all uncompleted transactions. After the recovery operation, the database is ready for use. If Leave database operational is not performed, the database is left in an intermediate state and is not usable. If Leave database operational is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning. This option is selected by default.
Leave database nonoperational but able to restore additional transaction logs (No Recovery). Select this option during a restore if you have additional differential or transaction log backups to be restored in another restore job. Leave database read-only and able to restore additional transaction logs (Standby). Select this option during transaction log and database restores to create and maintain a standby database. See your SQL documentation for information on standby databases.
Select this checkbox to replace a database or filegroup, even if another database or filegroup with the same name already exists on the server. If Replace databases or filegroups is not specified for a restore, SQL performs a safety check to ensure that a different database or filegroup is not accidentally overwritten. Refer to your SQL documentation for more information about the safety check that occurs when this option is not selected.
1055
Setting Default Backup and Restore Options for SQL Options - set application defaults for SQL Item Consistency check after restore Description
None. Select this option if you are doing sequential restores. Do not run a consistency check after a restore until all sequential restores have been done. If a consistency check is selected during a restore, the restore will complete but the consistency check will not be done. Check the job log for this information. If you need to recover the database after restores are complete, select one of the following consistency checks when you select the Leave database operational option.
Full check, excluding indexes. Select this option to exclude indexes from the consistency check. If indexes are not checked, the consistency check runs significantly faster but is not as thorough. Only the data pages and clustered index pages for each user table are included in the consistency check. The consistency of the nonclustered index pages is not checked. Full check, including indexes. Select this option to include indexes in the consistency check. Any errors are logged. This option is selected by default. Physical check only (SQL 2000 only). Select this option to perform a low overhead check of the physical consistency of the SQL 2000 database. This option only checks the integrity of the physical structure of the page and record headers, and the consistency between the pages' object ID and index ID and the allocation structures.
1056
Administrators Guide
Back up both system and user databases and transaction logs regularly. Copies of the master and model databases are automatically created by Backup Exec whenever you back up the master and model databases. Backup Exec places these copies in the same directory that the databases are in, where they must remain in order to be updated. In a default installation of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL\Data\*.*. In a named instance of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL$Instance_Name\Data\*.* The copies of the master and model databases are named:
Whenever you back up the system drive that contains a SQL instance, copies of the master and model databases are backed up. Backing up the system drive that SQL is on also backs up all the executables and registry settings needed for SQL to run.
Back up the master database whenever any changes are made to SQL. Keep records of any service packs that have been installed. Review Disaster Preparation of the Windows Computer on page 607 to make sure you are prepared to recover the entire server, not just SQL.
Create a copy of the master and model databases, and place the copies in the same directory that the databases are in (see To create copies of the SQL 7.0 master and model databases: on page 1058). Back up both system and user databases and transaction logs regularly. Back up the system drive that contains SQL. Backing up the system drive that SQL is on also backs up all the executables and registry settings needed for SQL to run.
Back up the master database whenever any changes are made to SQL. Keep records of any service packs that have been installed. Review Disaster Preparation of the Windows Computer on page 607 to make sure you are prepared to recover the entire server, not just SQL.
The latest backup of the SQL directory (\Program Files\Microsoft SQL Server\MSSQL), and the Windows registry/System State. The SQL database or filegroup backups, and differential and log backups. An Administrator logon account (or an Administrator equivalent) during the recovery.
To create copies of the SQL 7.0 master and model databases: 1. Use the SQL Server Service Manager to stop the SQL services. 2. Open a command prompt window, and copy the original master and model databases and their transaction logs to the specified file names. In a default installation of SQL 7.0, the databases are in C:\MSSQL7\Data. Type the following:
1058
Administrators Guide
C:\ mssql7\data> copy master.mdf master$4idr C:\ mssql7\data> copy mastlog.ldf mastlog$4idr C:\ mssql7\data> copy model.mdf model$4idr C:\ mssql7\data> copy modellog.ldf modellog$4idr
Manual recovery of the Windows server, and then manual recovery of the SQL databases. This method involves manually restoring the Windows server from full system backups, and then recovering the SQL databases. The Intelligent Disaster Recovery Option. This option provides an automated method of restoring the Windows server as well as the SQL databases from full system backups. See Microsoft SQL Server Recovery Notes on page 953.
To restore only the SQL databases to a newly-installed or other available server, the server must be running on the same hardware platform (cross-platform restores are not supported), and the same version of SQL with the same service pack level as the original server. To restore SQL databases to an existing installation of SQL with other active databases, see Redirecting Restores for SQL on page 1049.
1059
Rename the files created by Backup Exec that replace the master and model databases. After the master and model databases are present on SQL, you must start SQL, restore the master database with the Automate master database restore option, and then restore all other databases. Run the Rebuild Master utility (\Program Files\Microsoft SQL Server\80\Tools\Binn\rebuildm.exe for SQL 2000 or \MSSQL7\binn\rebuildm.exe for SQL 7.0) to rebuild the master database. Reinstall SQL.
This topic only details how to restart SQL by using the copies of the master and model databases made by Backup Exec. For more information on the Rebuild Master utility, or on reinstalling SQL, refer to your Microsoft SQL documentation. If you are restoring to a new SQL installation, start with To restore the master database: on page 1048. To restart SQL 2000 using database copies: 1. Verify that the database copies are present. The database copies are named master$4idr, mastlog$4idr, model$4idr, and modellog$4idr. In a default installation of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL\Data\*.*. In a named instance of SQL 2000, the databases are in: C:\Program Files\Microsoft SQL Server\MSSQL$Instance_Name\Data\*.* If necessary, restore the master and model database copies from a backup set to the same directory that the original master and model databases are in. 2. Open a command prompt window, and delete the original master and model databases and their transaction logs.
1060
Administrators Guide
Type the following: C:\program files\microsoft sql server\mssql\data> del master.mdf mastlog.ldf model.mdf modellog.ldf 3. Rename the copies of the databases back to their original names, and make sure they are not read-only files or the SQL services will not start. Type the following: C:\program files\microsoft sql server\mssql\data> rename master$4idr master.mdf C:\program files\microsoft sql server\mssql\data> rename mastlog$4idr mastlog.ldf C:\program files\microsoft sql server\mssql\data> rename model$4idr model.mdf C:\program files\microsoft sql server\mssql\data> rename modellog$4idr modellog.ldf 4. Use the SQL Service Control Manager to start SQL Server. 5. Continue with the next procedure to restore the latest changes to the master database. To restart SQL 7.0 using database copies: 1. Verify that the database copies are present. The database copies are named master$4idr, mastlog$4idr, model$4idr, and modellog$4idr. In a default installation of SQL 7.0, the databases are in C:\MSSQL7\Data. If necessary, restore the master and model database copies from a backup set to the same directory that the original master and model databases are in. 2. Open a command prompt window, and delete the original master and model databases and their transaction logs. Type the following: C:\ mssql7\data> del master.mdf mastlog.ldf model.mdf modellog.ldf 3. Rename the copies of the databases back to their original names, and make sure they are not read-only files or the SQL services will not start. Type the following:
Appendix I, Symantec Backup Exec - Agent for Microsoft SQL Server 1061
C:\ mssql7\data> rename master$4idr master.mdf C:\ mssql7\data> rename mastlog$4idr mastlog.ldf C:\ mssql7\data> rename model$4idr model.mdf C:\ mssql7\data> rename modellog$4idr modellog.ldf 4. Use the SQL Server Service Manager to start SQL. 5. Continue with the next procedure to restore the latest changes to the master database. To restore the master database: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. On the restore selections list, select the backup set containing the last master database backup. 4. On the Properties pane, under Settings, click Microsoft SQL. 5. On the Restore Job Properties for SQL dialog box, select Automate master database restore. All existing users are logged off, and SQL Server is put into single-user mode. When this option is selected, only the master database can be restored; if this option is selected for any other database, those jobs will fail. If Backup Exec does not have access to the SQL registry keys HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the default directory may not work, and the option Automate master database restore on the restore job properties for SQL will not work. To ensure that Backup Exec has access rights, verify that the account that Backup Exec uses has administrator rights to the computer that is running SQL. 6. Select a consistency check to run after the restore. 7. Start the restore job. After the restore, SQL is restarted in multi-user mode. 8. Continue with the next procedure, restoring the remaining SQL databases.
1062
Administrators Guide
Restore the remaining SQL databases: Note Do not select the master database for restore at this time. If you are restoring the SQL databases from filegroup backups, go to Restoring from SQL Filegroup Backups on page 1044. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. Select all the backup sets that you want to apply, including the full backup, any differential backups, and any log backups. 4. On the Properties pane, under Settings, click Microsoft SQL. 5. Select the option Leave database operational. No additional transaction logs can be restored. 6. Select the option Replace Databases or Filegroups. 7. In the Consistency Check After Database Restore field, select Full check, including indexes. 8. Start the restore job or select other options from the Properties pane. If the restore is being redirected, see Redirecting Restores for SQL on page 1049. When all of the restore operations have completed successfully, then the recovery of the SQL databases is complete. After the recovery has been completed, Symantec strongly recommends that a full database backup be performed as soon as possible. Related Topics: Restoring Data on page 451
1063
1064
Administrators Guide
Appendix
Incremental and differential backups. Individual mailbox backup and restore. The ability to globally exclude or include specified subfolders in each mailbox for backup and restore operations. The ability to back up only a single instance of a message attachment.
Individual public folder backup and restore with the same capabilities that are available for mailbox backup and restore. Backing up and restoring Exchange 2000 and Exchange 2003 resources. Selecting storage groups for backup and restore, or selecting one or more databases within the storage group for backup and restore. Increased performance of mailbox backups through single-instance storage for message attachments. Recovery of individual databases or storage groups using the Recovery Storage Group feature of Exchange 2003 for non-snapshot backups.
1065
In Exchange 2000 and 2003 installations, the Exchange Agent also provides support for:
On Exchange 2003 servers running Windows 2003, the Exchange Agent can be used with the Symantec Backup Exec for Windows Servers - Advanced Disk-based Backup Option (ADBO) and the Advanced Open File Option (AOFO). ADBO and AOFO are separate, add-on components of Backup Exec (see on page 991 and Symantec Backup Exec - Advanced Disk-based Backup Option on page 875).
Related Topics: Installing the Exchange Agent on page 1067 Backup Strategies for Exchange on page 1068 Recommended Configurations for Exchange on page 1072 Symantec Backup Exec - Advanced Disk-based Backup Option on page 875 Understanding the Advanced Open File Option on page 991
To use Backup Exec's Resource Discovery feature, which allows detection of new backup resources within a Windows domain, you must install Microsoft's Exchange System Manager utility on the media server. The media server must be running Windows 2000 or Windows Server 2003.
If you are using Exchange 5.5 and want to use Backup Exec's Resource Discovery feature, which allows detection of new backup resources within a Windows domain, you must install Microsoft's Exchange Administrator utility on the media server. Related Topics: Using Resource Discovery to Search for New Resources on page 311
1066
Administrators Guide
1067
In small office environments with relatively small numbers of messages passing through the system, a daily full backup will provide good data protection and the quickest recovery. If log file growth becomes an issue, consider using incremental online backups at midday to provide an added recovery point and manage the log file growth for you automatically. In large environments, incremental backups should be used to provide more frequent recovery point options throughout the day and to manage log file growth. Many shops run full backups on a weekly basis, preferring to run incremental backups throughout the week to keep backup run time to a minimum. The trade-off with this technique occurs at recovery time when you must recover from the full backup and from each incremental backup as well.
What will work best for you is based on the size of your environment, the number of transactions processed each day, and the expectations of your users when a recovery is required. Anti-virus software may impact backup performance and could result in incorrect job log errors. Mail messages and the attachments will be fully backed up and fully restorable despite job log errors that may be generated when verifying the attached files. Consider the following backup strategies:
Full backups run as frequently as possible, no less than once a day. Full backups daily with differential backups used at regular periods throughout the day. Full backups every few days (no less than weekly) with frequent incremental backups in between each full backup. Separate Exchange backup jobs from other backup jobs.
1069
If using Exchange 2000 or 2003, it is recommended that, in addition to backing up Exchange storage groups, you also back up the following on a regular basis:
Backup selections for Exchange 2000 or 2003 configuration data Recommended backup selections for configuration data File system Description
Back up folders and drives containing files for Windows and Exchange. Usually, this is the root drive C:\ but may be different in each environment. Note Back up the C:\ drive, but do not back up the virtual drive created by Exchange. It is intended only to provide Explorer access to the Exchange data, but all file system functions may not be replicated. Backup and restore operations are not recommended or supported.
Back up the registry by running a full backup. Select System State and run a full backup to back up the following:
The Internet Information Service (IIS) metabase The Windows registry Active Directory
For more information on backing up System State, see Selecting Data to Back Up on page 284. If the entire server must be restored, you must restore System State to the server before you can restore Exchange 2000. Key Management Service Back up the Key Management Service database by selecting the KMS (KMS) database icon in Backup Selections, and then running a full backup. Local or remote backups can be performed on the KMS database. Note KMS is not available in Exchange 2003. Site Replication Services If Exchange 2000 or 2003 is running in an Exchange 5.5 environment, (SRS) database back up the Site Replication Services (SRS) database by selecting the SRS icon in Backup Selections, and then running a full backup. This data is used for interoperability with Exchange 5.5.
1070
Administrators Guide
Backup Strategies for Exchange Backup selections for Exchange 2000 or 2003 configuration data (continued) Recommended backup selections for configuration data Active Directory Description
To back up Active Directory, select System State on the domain controllers and run a full backup. When there are configuration changes on Exchange 2000 or 2003, such as when objects are added, modified, or deleted, back up the Active Directory on the domain controllers. Note Spread multiple domain controllers throughout each domain for efficient Active Directory replication, and so that if one domain controller fails, redundancy is still provided.
When you back up the Exchange server databases, mailboxes and public folders are included in the backup. However, to make restores easier, you can also select one or more mailboxes or public folders for backup separately from the databases. You can also enable features in Backup Exec to make mailbox and public folder backups faster. See Recommendations for backing up Exchange mailboxes and public folders on page 1082.
If using Exchange 5.5, in addition to backing up the Information Store and Directory Store, it is recommended that you also back up the following on a regular basis:
Backup selections for Exchange 5.5 configuration data Recommended backup selections for configuration data File system Description
Back up folders and drives containing files for Windows and Exchange. Usually, these are on drive C:\ unless a different location was specified during installation. Back up the registry by selecting System State and running a full backup.
Windows registry
Key Management Service To back up the KMS database, stop the Key Management Server (KMS) database service if it is running, and then back up the contents of the directory stored in EXCHSRVR\KMSdata. This directory contains security data that includes encryption keys needed to decipher encrypted mail messages. Without these keys, all previously encrypted messages cannot be opened by recipients.
1071
Backup Strategies for Exchange Backup selections for Exchange 5.5 configuration data (continued) Recommended backup selections for configuration data Directory Store for each Exchange Server Description
The Directory Store for each Exchange Server is unique, so it is critical to have a backup of the Directory Store for each Exchange Server.
Related Topics: Backup Options for Exchange on page 1075 Backing Up Exchange on page 1079 Backing Up Exchange Mailboxes and Public Folders on page 1082 Setting Default Backup and Restore Options for Exchange on page 1102 Preparing for Disaster Recovery of Exchange Server on page 1108
Locate transaction log files on a separate physical disk from the database. This is the single most important configuration affecting the performance of Exchange. This configuration also has recovery implications, since transaction logs provide an additional recovery resource. Disable Write Cache on the SCSI controller. Windows does not use buffers, so when Exchange (or other applications) receives a write complete notice from Windows, the write-to-disk has been completed. If Write Cache is enabled, Windows responds as though a write-to-disk has been completed, and will provide this information to Exchange (or other applications) incorrectly. The result could be data corruption if there is a system crash before the operation is actually written to disk. Disable circular logging if possible. Circular logging minimizes the risk that the hard disk will be filled with transaction log files. But, if a solid backup strategy is in place, transaction log files are purged during the backup, thus freeing disk space. If circular logging is enabled, transaction log histories are overwritten, incremental and differential backups of storage groups and databases are disabled, and recovery is only possible up to the point of the last full or copy backup.
1072
Administrators Guide
Avoid making the Exchange Server a domain controller. For disaster recovery purposes, it is much easier to restore Exchange if you dont have to first restore the Active Directory. Install Exchange into a domain that has at least two domain controllers. Active Directory replication is not possible with only one domain controller in a domain. If the domain controller fails and corrupts the Active Directory, some transactions may not be recoverable if they were not included with the last backup. With at least two domain controllers in a domain, databases on the failed domain controller can be updated using replication to fill in missing transactions after the database backups have been restored.
In order to enable backup operations for public folders in Exchange 5.5 using all available backup methods, the mailbox used by Backup Exec to access the folders must be granted the Owner role on each public folder to be backed up, either directly or through membership in a Distribution List. The mailbox is determined by the logon account you specify when selecting public folders for backup. The Exchange Administrator program can be used to set the necessary client permissions for the public folders on your Exchange servers. For more information on setting client permissions on public folders, refer to your Exchange server documentation. Related Topics: Reviewing Circular Logging on page 1081
1073
1074
Related Topics: Protecting Windows Server 2003 Systems on page 344 Understanding the Advanced Open File Option on page 991 Symantec Backup Exec - Advanced Disk-based Backup Option on page 875
1075
FULL - Database & Logs (flush committed logs). Select this to back up the databases as well as their associated transaction log files. After the databases and transaction logs are backed up, the transaction log files that have all transactions committed to the database are then deleted. This option is the default option for Backup Exec but can be changed by selecting Tools, and then selecting Options. COPY - Databases & Logs. Select this to back up the databases as well as their associated transaction log files; however, the transaction logs are not deleted after being backed up. You can use the copy method to make a full backup of a database without disturbing the state of ongoing incremental or differential backups.
DIFFERENTIAL - Logs. Select this to back up all of the transaction logs that have been created or modified since the last full backup. However, the transaction logs are not deleted after being backed up. If you are using the Symantec Backup Exec for Windows Servers - Advanced Disk-based Backup Option (ADBO) or the Advanced Open File Option (AOFO), using this backup method requires the installation of Exchange 2003 and Exchange 2003 Service Pack 1.
Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from differential backups, the last differential backup and the last full backup are required.
INCREMENTAL - Logs (flush committed logs). Select this to back up all of the transaction logs that have been created or modified since the last full or incremental backup, and then delete the transaction logs that have been committed to the database. If you are using the Symantec Backup Exec for Windows Servers - Advanced Disk-based Backup Option (ADBO) or the Advanced Open File Option (AOFO), using this backup method requires the installation of Exchange 2003 and Exchange 2003 Service Pack 1.
Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from incremental backups, the last full backup and all incremental backups done since are required. Guide Me Click Guide Me to start a wizard that helps you choose backup job properties for backing up Exchange data.
1076
Administrators Guide
Backup Options for Exchange Backup job properties for Exchange Server (continued) Item Mailbox backup method Description
FULL - Back up messages. Reset archive bit. Select this to back up all messages in the selected mailboxes. This option is set by default. A time/date stamp placed in each folder indicates the messages have been backed up.
COPY - Back up messages. Select this to back up all messages in the selected mailboxes. A time/date stamp is not used, so incremental and differential backups are not affected. Use the copy method to make a full backup of the mailboxes without disturbing the state of ongoing incremental or differential backups.
DIFFERENTIAL - Back up changed messages. Select this to back up all of the messages that have been created or modified in the selected mailboxes since the last full backup. The time/date stamp placed on the folders during the last full backup is used to determine which messages have been modified since, but the time/date stamp is not updated during the differential backup.
INCREMENTAL - Back up changed messages. Reset archive bit. Select this to back up only the messages that have been modified in the selected mailboxes since the last full or incremental backup. The time/date stamp placed on the folders during the last full or incremental backup is used to determine which messages have been modified since, and the time/date stamp is updated during the incremental backup.
Enable single instance backup for message attachments (for mailbox and public folder backups only)
Select this to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to the attachment is retained and the actual attachment is backed up at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once. Disable this option if you want each identical copy of a message attachment to be backed up and kept in order on the backup set.
Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely.
1077
Backup Options for Exchange Backup job properties for Exchange Server (continued) Item Guide Me Description Click Guide Me to start a wizard that helps you choose backup job properties for recreating user accounts and mailboxes. Select this option if you want a consistency check to be performed when using
Perform consistency check before backup when using Microsoft Volume Shadow Copy Service (VSS) snapshot provider Continue with backup if consistency check fails
Related Topics: Backing Up Exchange on page 1079 Backing Up Exchange Mailboxes and Public Folders on page 1082 Reviewing Circular Logging on page 1081
1078
Administrators Guide
Backing Up Exchange
Backing Up Exchange
To back up Exchange 2000 and 2003, you can select:
Multiple storage groups Individual storage groups Individual databases (not supported if using snapshot technology and not recommended for non-snapshot backups)
It is recommended that you select individual storage groups for backup rather than selecting individual databases in storage groups. Although you can select individual databases in a storage group for backup, the transaction logs for the entire storage group are backed up for each database selected. For example, if you select four databases in a storage group for backup, the entire collection of transaction logs for the storage group is also backed up four times. The transaction logs are not deleted until a full backup is run on every database in the storage group. You can still restore an individual database from a storage group backup. To back up Exchange 5.5, you select the Microsoft Exchange Information Store and Microsoft Exchange Directory. To back up Exchange data: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections, and then select the data you want to back up. For information on using logon accounts when making backup selections, see Using Backup Exec Logon Accounts with Exchange Resources on page 1068. 3. To select Exchange data from local or remote selections, click the domain name icon or icons that contain the Exchange installations, and then click the actual Windows computer icon that contains the Exchange installation. If you are using a server cluster, make backup selections from the virtual server. A list of shared network directories appears, along with an icon that represents the Exchange installation. 4. If backing up Exchange 2000 or 2003 storage groups, to select all storage groups in Exchange, click the check box preceding the Microsoft Information Store, or you can select specific storage groups by expanding the Microsoft Information Store icon, and then individually selecting storage groups.
1079
Backing Up Exchange
If backing up Exchange 5.5, click the check boxes preceding the Microsoft Exchange Information Store and Microsoft Exchange Directory. 5. To select the Exchange backup options, on the Properties pane, under Settings, click Microsoft Exchange. For details on these options, see Backup Options for Exchange on page 1075. Note To perform incremental and differential backups of storage groups, make sure that circular logging is not enabled on the storage group. 6. Select other backup options from the Properties pane or start the backup job. If you are using the Advanced Open File Option, see Setting Defaults for the Advanced Open File Option for Backup Jobs on page 999. If you are using the Advanced Disk-based Option, see Setting Offhost Backup Options for Backup Jobs on page 892 Related Topics: Backup Strategies for Exchange on page 1068 Backing Up Exchange Mailboxes and Public Folders on page 1082 Reviewing Circular Logging on page 1081 Backing Up Data on page 259
1080
Administrators Guide
Backing Up Exchange
1081
Use full and incremental Consider running full backups of mailboxes or public folders on a backups regular basis, supplemented with incremental or differential backups throughout your schedule to keep backup run time to a minimum. Exclude unwanted or unnecessary folders from the backup When you select a mailbox or public folder for backup, by default all folders and subfolders are included. You can easily exclude specific folders and subfolders from the backups by using the ** wildcard in the file selection path on the Advanced File Selection dialog box when making backup selections (see Including or Excluding Files for Backup Using Advanced File Selection on page 288). For example, to exclude all mail in the Deleted Items folder, type: \**\Deleted Items\* To exclude all mail in the Sent Items folder, type: \**\Sent Items\* If you also want to exclude all subfolders of the specified folders from the backup, check the Include Subfolders check box in the Advanced File Selection dialog box.
1082
Administrators Guide
Backing Up Exchange Mailboxes and Public Folders Recommendations for backing up Exchange mailboxes and public folders (continued) Recommendation Use single-instance storage for message attachments Description When backing up mailboxes and public folders, you can choose to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to that attachment is retained, and the actual attachment is backed up only once at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once.
Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely.
Do not back up special system mailboxes created by Exchange Although these special system mailboxes can be backed up, it is not necessary or useful. The following are common examples of special system mailboxes, but there may be others depending on the Exchange server configuration and environment.
System Attendant Any mailbox name starting with SMTP or System Mailbox (for Exchange 2000 or 2003) Microsoft Schedule+Free/Busy Connector (for Exchange 5.5) Directory Service (for Exchange 5.5)
Also, when selecting objects from the mailbox tree, all objects are displayed as messages. Some non-message objects can be identified by the subject line. For example, if you create a Calendar event named Appointment1, that name is displayed in the subject line for that object. However, some objects such as Forms and Views do not have a subject line (even though they can be named) and may not be easily identifiable.
1083
Backing Up Exchange Mailboxes and Public Folders Recommendations for backing up Exchange mailboxes and public folders (continued) Recommendation Select public folders from only one Exchange server. Description The same public folders may be displayed for multiple Exchange servers since public folders can be replicated. Selecting public folders on multiple Exchange servers only increases the time and media required for the backup and does not provide any additional protection.
Mailboxes are displayed in a server-centric view; that is, only mailboxes on the selected Exchange server are displayed in the backup selections list. Public folders may be displayed on more than one server since public folders can be replicated to many servers. Note In versions of Backup Exec prior to 8.6, mailboxes could be selected for backup from a site-centric view, which listed all mailboxes in the Exchange Organization, not just mailboxes on the selected server. Even though only the server-centric view is now available for Exchange mailboxes, you can still restore mailbox backup sets created using a site-centric view. For Exchange 2000 or 2003, if the mailboxes are all selected from the same server, they are placed together in one backup set on the storage media. If the mailboxes are selected from more than one server, then the mailboxes are placed in separate backup sets according to the server. To back up Exchange mailboxes or public folders: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections. 3. To select Exchange mailboxes or public folders from local or remote selections, click the domain name icon or icons that contain the Exchange mailboxes, and then click the Windows computer icon that contains the Exchange mailboxes. If you are using a server cluster, make backup selections from the virtual server. 4. Expand the Microsoft Exchange Mailbox icon that contains the mailboxes or public folders you want to back up. You can select all mailboxes or individual messages, mailboxes, and folders to back up. When you select a mailbox or public folder, all folders and subfolders are included in the backup by default. For a faster backup, consider using Advanced File Selections to exclude some folders, such as Deleted Items or Sent Items, and subfolders from the backup.
1084
Administrators Guide
Because public folders can be replicated on multiple Exchange servers, select public folders from only one Exchange server. 5. If prompted, select a logon account that will allow you to connect to the Exchange mailboxes or public folders. For information on using logon accounts when making backup selections, see Using Backup Exec Logon Accounts with Exchange Resources on page 1068. 6. To select the mailbox or public folders backup method, on the Properties pane, under Settings, click Microsoft Exchange. For details on these options, see Backup Options for Exchange on page 1075. 7. Select other backup options from the Properties pane or start the backup job. Related Topics: Using Backup Exec Logon Accounts with Exchange Resources on page 1068 Recommendations for backing up Exchange mailboxes and public folders on page 1082 Backing Up Data on page 259
1085
1086
Administrators Guide
Restore Options for Exchange Restore job properties Item No loss restore (Do not delete existing transaction logs) Description Select this to preserve the existing transaction logs on Exchange 5.5. Transaction logs on the storage media are then restored and added to the existing set of transaction logs on Exchange 5.5. When the restore operation finishes, Exchange 5.5 automatically updates its databases with the uncommitted transactions found in the existing and newly restored transaction logs. This option is selected by default. Select this to restore only the Information Stores public database (PUB.EDB). Although this database cannot be backed up separately from the Information Stores private database (PRIV.EDB), it can be restored separately.
Restore private mailboxes Select this to restore only the Information Stores private database. Although this database cannot be backed up separately from the Information Stores public database (PUB.EDB), it can be restored separately. If the Restore public folder and Restore private mailboxes options are selected independently, the No loss restore option is automatically selected and cannot be cleared. Exchange 2000 and Exchange 2003 No loss restore (do not delete existing transaction logs) Select this check box to preserve the existing transaction logs on the Exchange 2000 or 2003 server. Transaction logs from the storage media are then restored and added to the existing set of transaction logs on the Exchange 2000 or 2003 server. When the restore operation finishes, Exchange 2000 or 2003 automatically updates its databases with the uncommitted transactions found in the existing and newly-restored transaction logs. This option is selected by default. If you are restoring individual databases into a storage group, the No loss restore check box should be selected. If this check box is not selected, uncommitted transactions for other databases in the storage group may be lost. Note This option is not applicable if using the Advanced Open File Option or the Advanced Disk-based Option.
1087
Temporary location for log Type a location where the associated log and patch files are to be and patch files kept until the database is restored. The default location is \temp, and a subdirectory is created for each storage group. The log and patch files for each storage group are kept in the corresponding subdirectory. Make sure the temporary location for log and patch files is empty before you start a restore job. If a restore job fails, check the temporary location (including subdirectories) to make sure any previous log and patch files from a previous restore job were deleted. Note This option is not applicable if using the Advanced Open File Option or the Advanced Disk-based Option. Dismount database before Select this option if you want Backup Exec to automatically take restore the Exchange database offline before the restore job runs. If this option is not selected, you must manually take the database offline before the restore job can run. When restoring a snapshot backup, all databases in a storage group must be taken offline. Selecting this option automatically takes all databases in a storage group offline. Commit after restore completes If your selection contains the last backup set to be restored, select this check box to direct the restore operation to replay the log files and roll back any uncompleted transactions. If this option is not selected, the database is left in an intermediate state and is not yet usable. If Commit after restore completes is selected when an intermediate backup is being applied, you cannot continue to restore backups. You must restart the restore operation from the beginning. After the database is restored, the log and patch files in the temporary location are applied to the database, and then the current log files are applied. After the restore is complete, the log and patch files are automatically deleted from the temporary location (including any subdirectories). Note This option is not applicable if using the Advanced Open File Option or the Advanced Disk-based Option. Mount database after restore Select this check box to mount the database so that it is available to users. This check box is only available if Commit after restore completes is selected.
1088
Administrators Guide
Restoring Exchange Data Restore job properties Item Guide Me Description Click Guide Me to start a wizard that helps you choose restore job properties for Exchange data.
Related Topics: Restoring Exchange Mailboxes and Public Folders on page 1094
Restore the last full backup, or Restore the last full backup and the last differential backup, or Restore the last full backup and all subsequent incremental backups The storage groups and databases must already exist on the target server, and have the same names as the original storage groups or databases. The target server must have the same Organization and Administrative Group name as the source server. The target databases must be configured so that they can be overwritten. Using the Exchange System Manager utility, right-click the database you want to overwrite, click Properties, and then on the Database tab, select This database can be overwritten by a restore. Use the Exchange System Manager utility to manually dismount any databases that are being restored or select the Dismount database before restore option when creating the restore job. Check the temporary location for log and patch files to make sure it is empty before you start the restore. The default location is \temp, and a subdirectory is created for each storage group. The log and patch files for each storage group are kept in the corresponding subdirectory.
Note The Directory and Information Store services are stopped when the corresponding stores are restored. Users cannot access them until the restore is complete and the services are restarted. Following are requirements for running a restore job for Exchange 5.5 Server:
1089
The Exchange System Attendant service is running on the target server. If you are restoring Exchange data to more than one Windows computer, the System Attendant service must be running on each target computer. If you are restoring the Exchange Directory, the target server must have access to the original Security Account Manager (SAM) information. If the recovered server does not have access to the SAM information from the original domain, and the Directory Store is restored, none of the Exchange data is accessible after the restore. This is because the Exchange Directory uses SID (Security Identifier) information for authenticating access to objects and the restored SID information will not match SID information from the SAM in the new domain.
Note Restoring an Exchange 5.5 Directory Store to an Exchange Server other than the original is not supported; only Information Store data can be restored to a different computer. Before starting the restore job, review Restoring Data on page 451 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. If you need to restore Exchange data to a server other than the one from which it was backed up, see Redirecting Exchange Data on page 1096. To restore Exchange 2000 and 2003 databases: Note Use the Exchange System Manager utility to manually dismount any databases that are being restored or select the Dismount database before restore option when creating the restore job. 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup sets you want to restore.
Restore the last full backup, or Restore the last full backup and the last differential backup, or Restore the last full backup and all subsequent incremental backups
4. On the Properties pane, under Settings, click Microsoft Exchange. 5. Select the appropriate options. For details, see Restore Options for Exchange on page 1086.
1090
Administrators Guide
Do not select the Commit after restore completes check box and the Mount database after restore check box on the Restore Job Properties dialog box for Exchange unless your selections include the last backup set to be restored. These selections direct the Exchange server to replay transactions, roll back uncommitted transactions, and mount the databases to make them available for use after the restore. 6. Start the restore job or select other restore options from the Properties pane. 7. Run a full backup of the restored databases. To restore Exchange 5.5: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, select the backup sets you want to restore.
Restore the last full backup, or Restore the last full backup and the last differential backup, or Restore the last full backup and all subsequent incremental backups
4. On the Properties pane, under Settings, click Microsoft Exchange. 5. Select the appropriate options. For details, see Restore Options for Exchange on page 1086. 6. Start the restore job or select other restore options from the Properties pane. 7. After the restore job completes, reboot the destination Exchange server or start the Exchange services manually. You can also put a batch file in a post-job command to restart the services. See Pre/Post Commands for Restore Jobs on page 467. 8. When the Exchange Server is back online, run the Directory Store/Information Store (DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the consistency adjustment can be found in the Windows Event Log. For more information concerning the DS/IS consistency adjuster, refer to your Exchange documentation. 9. Run a full backup of the restored databases.
1091
Related Topics: Restoring Data on page 451 Backing Up Data on page 259 Redirecting Exchange Data on page 1096
Data being restored cannot be from a snapshot backup. Mailbox stores in the RSG must come from the same storage group. You cannot add mailbox stores from different storage groups to the RSG at the same time. Public Folder stores are not supported for restore using the RSG. Do not mount mailbox stores in the RSG before the restore. If you do mount the stores before the restore, then you must dismount them and select This database can be overwritten by a restore on the database property page in Exchange System Manager prior to restoring them. On the server that hosts the RSG, there must be a storage group with the same name as the original storage group for the data you are restoring. If no such storage group exists on the server, then you can use that name for the RSG when you create it. The Active Directory topology of the Exchange system must be intact and in the same state it was in when the backup was made. You cannot restore mailbox stores that were deleted and recreated. In addition, you cannot recover mailboxes from stores if the mailboxes were deleted and purged from the system or moved to other servers or mailbox stores. Only Exchange mailbox stores from Exchange 2000 SP3 or later can be restored to the RSG. Restored mailbox stores are upgraded to the store version currently running on the RSG server.
1092
Administrators Guide
When the RSG exists on a server, the mailbox stores that it contains are the only stores that can be restored on that server by default. Symantec recommends that you create the RSG only when you intend to recover data using it, and remove the RSG from the server after the data recovery is complete.
Refer to your Microsoft Exchange Server 2003 documentation for more information on the requirements and restrictions of recovering Exchange data using the RSG. To restore Exchange 2003 databases using the Recovery Storage Group: 1. Use the Exchange System Manager utility to create the Recovery Storage Group and add the mailbox stores you want to restore. 2. On the navigation bar in Backup Exec, click Restore. 3. On the Properties pane, under Source, click Selections. 4. In the restore selections list, select the backup sets you want to restore.
Restore the last full backup, or Restore the last full backup and the last differential backup, or Restore the last full backup and all subsequent incremental backups
5. On the Properties pane, under Settings, click Microsoft Exchange. 6. Select the appropriate options. For details, see Restore Options for Exchange on page 1086. Do not select the Commit after restore completes check box and the Mount database after restore check box on the Restore Job Properties dialog box for Exchange unless your selections include the last backup set to be restored. These selections direct the Exchange server to replay transactions, roll back uncommitted transactions, and mount the databases after the restore. 7. If the RSG resides on a different Exchange server than the databases you are restoring, see Redirecting Exchange 2003 Restores Using the Recovery Storage Group on page 1099. 8. Start the restore job or select other restore options from the Properties pane. 9. When the restore is complete, use the EXMerge utility in Exchange 2003 to extract the mailbox data you need from the restored mailbox stores and optionally merge the data back into the online stores.
1093
Related Topics: Restoring Data to a Server or Workstation on page 457 Redirecting Exchange 2003 Restores Using the Recovery Storage Group on page 1099
Mailbox backup sets that were created using a site-centric view in versions of Backup Exec prior to 8.6 may require multiple jobs to be run in order to restore all the mailboxes:
Mailboxes that resided on the target server will restore normally. Mailboxes that resided on other servers must be redirected to those servers.
If you restore mailboxes from a backup created with a version of Backup Exec prior to 8.5, and mailboxes with duplicate Display Names reside on the server, select those mailboxes for restore separately and follow the instructions in Redirecting Mailbox Restores on page 1100. When messages in mailboxes or public folders are restored to a location where a message with the same name already exists, the restored message does not replace the existing message, but is added to the destination folder; therefore, duplicate messages may result in the destination folder. The option Restore Over Existing Files in the Advanced Restore Job Properties does not apply to mailboxes or public folders. If other selections are restored in addition to mailboxes or public folders, and the option Restore Over Existing Files is selected, it applies only to the other selections; mailboxes and public folders are not restored over existing objects. For details on this option, see General settings options for restore job on page 462. Do not restore special system mailboxes created by Exchange.
Administrators Guide
1094
The following are common examples of special system mailboxes, but there may be others depending on the Exchange server configuration and environment.
System Attendant Any mailbox name starting with SMTP or System Mailbox (Exchange 2000 or 2003) Microsoft Schedule + Free/Busy Connector (Exchange 5.5) Directory Service (Exchange 5.5)
Before starting the restore job, review Restoring Data on page 451 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. To restore Exchange mailboxes and public folders: 1. On the navigation bar, click Restore. 2. On the Properties pane, under Source, click Selections. 3. In the restore selections list, navigate to and select the data you want to restore. 4. On the Properties pane, under Settings, click Microsoft Exchange. On the Restore Job Properties dialog box, if the user accounts and their mailboxes that are being restored do not already exist on the target server, and they are being restored to their original location, select Automatically recreate user accounts and mailboxes. If this option is not selected, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this check box is selected, the password entered on the Exchange Options Set Application Defaults dialog box is used as the password for accounts that are recreated. To change the password, on the Tools menu click Options, and then in the Properties pane under Job Defaults, click Microsoft Exchange. Select Automatically recreate user accounts and mailboxes, and then click Change password. 5. If using Exchange 2000 or 2003, start the restore job or select other restore options from the Properties pane. If using Exchange 5.5, after the job completes, reboot the destination Exchange server or start the Exchange services manually. You can also put a batch file in a post-job command to restart the services. See Advanced Options for Restore Jobs on page 464. When the Exchange server is back online, run the Directory
Appendix J, Symantec Backup Exec - Agent for Microsoft Exchange Server 1095
Store/Information Store (DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the consistency adjustment appear in the Windows Event Log. For more information concerning the DS/IS consistency adjuster, refer to your Exchange documentation. 6. After the restore is complete, run a full backup of the restored mailboxes. Related Topics: Restore Options for Exchange on page 1086 Redirecting Mailbox Restores on page 1100
Exchange 2000 and 2003 storage group and database restores (see Redirecting Exchange 2000 and 2003 Storage Group and Database Restores on page 1098) Exchange 5.5 Information Store database (see Redirecting Exchange 5.5 Database Restores on page 1098) Exchange 2003 restores using the Recovery Storage Group feature (see Redirecting Exchange 2003 Restores Using the Recovery Storage Group on page 1099) Exchange mailboxes (see Redirecting Mailbox Restores on page 1100)
To redirect Exchange data: 1. Follow the instructions for the restore in Restoring Exchange Data on page 1089. 2. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click Microsoft Exchange Redirection.
1096
Administrators Guide
Restore to server
Restore to mailbox
4. Start the redirected restore job or select other restore options from the Properties pane. 5. If restoring Exchange 5.5: a. After the restore job completes, reboot the destination Exchange server or start the Exchange services manually. You can also put a batch file in a post-job command to restart the services. See Advanced options for restore on page 464.
b. When the Exchange server is back online, run the Directory Store/Information Store (DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the consistency adjustment can be found in the Windows Event Log. For more information concerning the DS/IS consistency adjuster, refer to your Exchange documentation. 6. After the restore is complete, Symantec recommends that you run a full backup of the restored databases.
1097
Redirecting Exchange 2000 and 2003 Storage Group and Database Restores
Following are requirements for redirecting restores:
The storage groups and databases must already exist on the target server, and have the same names as the original storage groups or databases. The target server must have the same Organization and Administrative Group name as the source server. The target databases must be configured so that they can be overwritten. Using the Exchange System Manager utility, right-click the database you want to overwrite, click Properties, and then on the Database tab, select This database can be overwritten by a restore. A version of Exchange server database to a different version of the database. Service packs for both Exchange servers should also be the same. Site Replication Service (SRS) and Key Management Service (KMS). These services are dependent on the computer they reside on; redirection to another computer is not supported and could result in the loss of functionality of these services.
Note KMS is not available in Exchange Server 2003 Before starting the restore job, review Restoring Data on page 451 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. After completing the restore, it is recommended that a full backup of the restored databases be performed. Related Topics: Redirecting Exchange Data on page 1096
1098
Administrators Guide
The No loss restore option cannot The No loss restore option must be cleared so that any be selected. transaction logs on the destination server are removed to avoid an incompatibility that would prevent the Information Store service from starting. The No loss restore option appears on the Restore Job Properties for Exchange 5.5 dialog box. To access this option, on the navigation bar, click Restore, and then in the Properties pane under Settings, click Microsoft Exchange. The Directory Store cannot be restored through redirection. You cannot redirect a restore job in which you have selected to restore one or more Exchange 5.5 Directory databases.
Before starting the restore job, review Restoring Data on page 451 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs. Related Topics: Redirecting Exchange Data on page 1096
1099
If the mailboxes do not already exist on the target server, you must create them before redirecting the restore. Automatic recreation of mailboxes on the target server is not enabled for redirected restores. To ensure that Backup Exec can access mailboxes on the server that you are redirecting messages or mailbox restores to, click the destination server in the backup selections list, select Microsoft Exchange Mailboxes and verify that the target mailbox is displayed in the list of mailboxes. If you are prompted for a logon account, use a logon account that stores the credentials of a user account that is unique and has a corresponding mailbox of the same name. See Using Backup Exec Logon Accounts with Exchange Resources on page 1068. More than one mailbox can exist with the same Display Name. When the restore of a mailbox is redirected in Backup Exec, it is redirected to the target mailboxs Display Name. If a duplicate Display Name exists, then the data may be restored to the wrong mailbox. To prevent restoring the data to the wrong mailbox, type the name of the target mailbox exactly as it appears when browsing to the mailbox in the backup selections list, including the brackets surrounding the mailbox directory identifier (for example, Mailbox Name [mailboxname]).
Following are requirements for redirecting the restore of individual messages to another mailbox.
When redirecting the restore of mailbox data, all destination mailboxes must already exist before the restore begins. The contents of the restored mailboxes are placed in the destination mailboxes.
1100
Administrators Guide
For example, Mailbox 1 consists of Top of Information Store, Inbox, and Folders 1 and 2, each containing some mail messages. If you back up Mailbox 1 and then you restore Mailbox 1 to the existing Mailbox 2, then all of Mailbox 1, including the Top of Information Store, Inbox, Folders 1 and 2, and messages, are restored to Mailbox 2. Note that Mailbox 1 itself is not created under Mailbox 2.
Redirecting the restore of Mailbox 1 to Mailbox 2
If you redirect the restore of Mailbox 1\Top of Information Store\Folder 2 to Mailbox 2, the contents of Mailbox 1\Top of Information Store\Folder 2, Message 5 and Message 6, are placed in Mailbox 2 in the same folder as they were in Mailbox 1, as illustrated in the following graphic.
Redirecting Mailbox 1\Top of Information Store\Folder 2 to Mailbox 2
Before starting the restore job, review Restoring Data on page 451 for information on finding and viewing specific data to restore, as well as for details on restore options and submitting restore jobs.
1101
Related Topics: Redirecting Exchange Data on page 1096 Restoring Exchange Mailboxes and Public Folders on page 1094
1102
Administrators Guide
Description
FULL - Database & Logs (flush committed logs). Select this to back up the databases as well as their associated transaction log files. After the databases and transaction logs are backed up, the transaction log files that have all transactions committed to the database are then deleted. This option is selected by default. COPY - Databases & Logs. Select this to back up the databases as well as their associated transaction log files; however, the transaction logs are not deleted after being backed up. You can use the copy method to make a full backup of a database without disturbing the state of ongoing incremental or differential backups.
DIFFERENTIAL - Logs. Select this to back up all of the transaction logs that have been created or modified since the last full backup. However, the transaction logs are not deleted after being backed up. If you are using the Symantec Backup Exec for Windows Servers - Advanced Disk-based Backup Option (ADBO) or the Advanced Open File Option (AOFO), using this backup method requires the installation of Exchange 2003 and Exchange 2003 Service Pack 1.
Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from differential backups, the last differential backup and the last full backup are required.
INCREMENTAL - Logs (flush committed logs). Select this to back up all of the transaction logs that have been created or modified since the last full or incremental backup, and then delete the transaction logs that have been committed to the database. If you are using the Symantec Backup Exec for Windows Servers - Advanced Disk-based Backup Option (ADBO) or the Advanced Open File Option (AOFO), using this backup method requires the installation of Exchange 2003 and Exchange 2003 Service Pack 1.
Note If circular logging is enabled, incremental and differential backups cannot be performed. To restore from incremental backups, the last full backup and all incremental backups done since are required. Appendix J, Symantec Backup Exec - Agent for Microsoft Exchange Server 1103
Setting Default Backup and Restore Options for Exchange Microsoft Exchange Default Options Item Mailbox method: Description
FULL - Back up messages. Reset archive bit. Select this to back up all messages in the selected mailboxes. This option is set by default. A time/date stamp placed in each folder indicates the messages have been backed up.
COPY - Back up messages. Select this to back up all messages in the selected mailboxes. A time/date stamp is not used, so incremental and differential backups are not affected. Use the copy method to make a full backup of the mailboxes without disturbing the state of ongoing incremental or differential backups.
DIFFERENTIAL - Back up changed messages. Select this to back up all of the messages that have been created or modified in the selected mailboxes since the last full backup. The time/date stamp placed on the folders during the last full backup is used to determine which messages have been modified since, but the time/date stamp is not updated during the differential backup.
INCREMENTAL - Back up changed messages. Reset archive bit. Select this to back up only the messages that have been modified in the selected mailboxes since the last full or incremental backup. The time/date stamp placed on the folders during the last full or incremental backup is used to determine which messages have been modified since, and the time/date stamp is updated during the differential backup.
1104
Administrators Guide
Setting Default Backup and Restore Options for Exchange Microsoft Exchange Default Options Item Enable single instance backup for message attachments (for mailbox and public folder backups only) Description Select this to back up only a single copy of all identical message attachments. When an identical attachment is found, a reference to the attachment is retained and the actual attachment is backed up at the end of the backup set. Enabling single instance backup for message attachment increases backup performance since duplicate attachments are backed up only once. Disable this option if you want each identical copy of a message attachment to be backed up and kept in order on the backup set.
Caution If the backup job does not run to completion, the message attachments may not be included in the backup set. Rerun the backup until it is successfully completed. If the incremental backup method was used, running the job again will not back up the same messages and attachments. You must run a full or copy backup to ensure that all messages and attachments are backed up completely.
Restore 5.5 No loss restore (do not delete existing transaction logs) Select this to preserve the existing transaction logs on Exchange 5.5. Transaction logs on the storage media are then restored and added to the existing set of transaction logs on Exchange 5.5. When the restore operation finishes, Exchange 5.5 automatically updates its databases with the uncommitted transactions found in the existing and newly restored transaction logs. This option is selected by default. Select this to restore only the Information Stores public database (PUB.EDB). Although this database cannot be backed up separately from the Information Stores private database (PRIV.EDB), it can be restored separately.
1105
Setting Default Backup and Restore Options for Exchange Microsoft Exchange Default Options Item Description
Restore private mailboxes Select this to restore only the Information Stores private database. Although this database cannot be backed up separately from the Information Stores public database (PUB.EDB), it can be restored separately. If the Restore public folder and Restore private mailboxes options are selected independently, the No loss restore option is automatically selected and cannot be cleared. Restore - Exchange 2000 Temporary location for log Type a location where the associated log and patch files are to be and patch files kept until the database is restored. The default location is \temp. If storage groups are being restored, a subdirectory in \temp is created for each storage group. The log and patch files for each storage group are kept in the corresponding subdirectory. If Commit after restore completes is selected for the restore job, the log and patch files in the temporary location are applied to the database, and then the current log files are applied. After the restore is complete, the log and patch files are automatically deleted from the temporary location (including any subdirectories). To select Commit after restore completes, on the navigation bar, click Restore, and then on the Properties pane, under Settings, click Microsoft Exchange. Note Make sure the temporary location for log and patch files is empty before you start a restore job. If a restore job fails, check the temporary location (including subdirectories) to make sure any previous log and patch files from a previous restore job were deleted.
1106
Administrators Guide
Setting Default Backup and Restore Options for Exchange Microsoft Exchange Default Options Item Automatic recreation Automatically recreate user accounts and mailboxes Select this check box to recreate the user accounts and their mailboxes if they do not already exist on the target server. Otherwise, the restore job will fail if a mailbox that is being restored does not exist on the target server. When this check box is selected, the password you entered on the Exchange Options - Set Application Defaults dialog box is used as the password for accounts that are recreated. To change the password, see To restore Exchange mailboxes and public folders: on page 1095. Note This option applies only if mailboxes are being restored to their original location. If the mailbox restore is being redirected, the user account and mailbox must already exist on the target server. Change password... Click this to specify a password to use when user accounts and mailboxes are automatically recreated on the target server. Description
Related Topics: Restoring Exchange Data on page 1089 Understanding the Advanced Open File Option on page 991
1107
An operating system configuration sheet A hard drive partition configuration sheet Any RAID configuration A hardware configuration sheet EISA/MCA configuration disks An Exchange configuration sheet A Windows emergency repair diskette An installed copy of Backup Exec for Windows Servers The latest full, incremental, and differential backups of the Exchange databases you want to recover The Microsoft Exchange Server Installation CD Any service packs that were applied to the original installation
The storage groups and databases must already exist on the target server, and have the same names as the original storage groups or databases.
Administrators Guide
1108
The target server must have the same Organization and Administrative Group name as the source server. The target databases must be configured so that they can be overwritten. Using the Exchange System Manager utility, right-click the database you want to overwrite, click Properties, and then on the Database tab, select This database can be overwritten by a restore.
If you purchased the Intelligent Disaster Recovery option, see Microsoft Exchange Recovery Notes on page 954 for directions on using Intelligent Disaster Recovery to recover the Exchange server. To perform disaster recovery for Exchange 2000 or 2003: 1. Recover the Windows server first. For instructions, see Disaster Preparation of the Windows Computer on page 607. Note Make sure you restore the Exchange 2000 or 2003 files that existed on all disk partitions. When the Windows 2000 server disaster recovery procedure is complete (after the last reboot), you must recover the Exchange 2000 or 2003 server. 2. From the Services applet, verify the Microsoft Exchange Information Store service is started. 3. Start Backup Exec. 4. Catalog the media that contains the latest full, incremental, and differential backups of the Exchange 2000 or 2003 storage groups you want to recover. 5. On the navigation bar, click Restore. 6. On the Properties pane, under Source, click Selections. 7. Select the latest full backups of each storage group for restore. Note If the Exchange 2000 server being recovered contains the Site Replication Service (SRS) and/or Key Management Service (KMS), then select those databases for restore as well. 8. Select all subsequent incremental storage group backups. If differential backups are to be restored, only the most recent differential storage group backups need to be selected.
1109
9. On the Properties pane, under Settings, click Microsoft Exchange. 10. Clear the Exchange 2000 No loss restore (do not delete existing transaction logs) option. 11. In the Temporary location for log and patch files field, type a location where the associated log and patch files are to be kept until the database is restored. Note Make sure the temporary location for log and patch files is empty before you start a restore job. If a restore job fails, check the temporary location (including subdirectories) to make sure any previous log and patch files from a previous restore job were deleted. 12. If your selection contains the last backup set to be restored, select Commit after restore completes. Do not select this check box if you still have backup sets to restore. If Commit after restore completes is selected when an intermediate backup is being applied, you cannot continue to restore backups and you must restart the restore operation from the beginning. After the database is restored, the log and patch files in the temporary location are applied to the database, and then the current log files are applied. After the restore is complete, the log and patch files are automatically deleted from the temporary location (including any subdirectories). 13. If you want the databases to be immediately available to users after the recovery, select Mount database after restore. This check box is only available if Commit after restore completes is selected. 14. Start the restore job or select other restore options on the Properties pane. 15. After completing the restore, it is recommended that a full backup of the restored databases be performed.
1110
Administrators Guide
For Windows 2000, click Start, point to Settings, and then click Control Panel. Double-click Administrative Tools, and then double-click Services. Right-click Microsoft Exchange Directory service, and then click Properties. On the General tab, under Startup, click Disabled, and then click OK. For Windows NT, click Start, point to Settings, and then click Control Panel, and then double-click Services. Double-click Microsoft Exchange Directory service, change the Startup Type to Disabled, and then click OK.
1111
Note Upon reboot, a message is displayed stating that not all services could be started. 4. Double-click the Microsoft Exchange Directory service, and then change the Startup Type to Automatic. 5. Click OK. 6. Verify that the Exchange System Attendant service is started. 7. Start Backup Exec. 8. Catalog the tapes that contain the latest full, incremental, and differential backups of the Exchange Stores you want to recover. 9. On the navigation bar, click Restore. 10. On the Properties pane, under Source, click Selections. 11. On the restore selections list, select the latest full backups of the Directory and Information Stores for restore. 12. Select all subsequent incremental Directory and Information Store backups. If differential backups are to be restored, only the last differential Directory and Information Store backups (the newest) need to be selected. 13. On the Properties pane, double-click Settings, and then click Microsoft Exchange. 14. Select the Exchange 5.5 options Restore Public Folder and Restore Private Mailboxes. 15. Clear the check box for the Exchange 5.5 option No loss restore (do not delete existing transaction logs). 16. Start the restore job. 17. After the restore has completed, insert the Microsoft Exchange Server installation CD into the CD-ROM drive, open a command window, and copy the contents of the \setup\your processor type\bootenv directory on the Exchange CD to the \exchsrvr\mtadata directory on your hard drive: For example, assuming your Exchange installation is on drive C, your CD-ROM drive is drive D, and your processor type is Intel, you would type the following in a command window:
1112
Administrators Guide
copy d:\setup\i386\bootenv\*.* c:\exchsrvr\mtadata Note If you use File Manager or Windows Explorer to copy the files, you must remove the READ ONLY file attribute from the files after you copy them. If you do not remove this file attribute, the Microsoft Exchange Message Transfer Agent service will not start. 18. Using a command window, execute the following: \EXCHSRVR\BIN\ISINTEG -PRI -test mailbox, message, folder \EXCHSRVR\BIN\ISINTEG -PUB -test mailbox, message, folder \EXCHSRVR\BIN\MTACHECK If these diagnostics report errors, refer to your Exchange documentation regarding these utilities. 19. Do one of the following: a. For Windows 2000, click Start, point to Settings, and then click Control Panel. Double-click Administrative Tools, and then double-click Services.
b. For Windows NT, click Start, point to Settings, and then click Control Panel, and then double-click Services. 20. Start ALL of the Exchange services that have Automatic as a Startup Type. This should include:
Microsoft Exchange Directory Microsoft Exchange Information Store Microsoft Exchange Message Transfer Agent Microsoft Exchange System Attendant
21. After the Exchange server is back online, it is recommended that you use the Exchange Administrator to run the Directory Store/Information Store (DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the consistency adjustment can be found in the Windows Event Log. For more information about the DS/IS consistency adjuster, refer to your Microsoft Exchange Server documentation. 22. After completing the restore, it is recommended that a full backup of the restored databases be performed.
1113
1114
Administrators Guide
Appendix
Make sure the robotic arm is set to Random mode. Refer to your robotic library documentation for more information. If you have a multi-LUN robotic library, make sure that the controller card is set to support multiple LUNs (if supported). The SCSI ID of the robotic arm must precede the SCSI ID of the drives in the robotic library.
1115
1116
Administrators Guide
Purchasing an Library Expansion Option serial number for each additional robotic library drive.
Note Support for a single robotic library drive is included with Backup Exec for Windows Servers.
Installing the necessary Library Expansion Option files. Configuring the robotic arm and drives.
Backup Execs Library Expansion Option installation copies all necessary robotic library-related files including the software needed to control the robotic arm and storage devices. To install the Library Expansion Option, follow the installation steps described in Installing Backup Exec Options to the Local Computer on page 71, adding the Library Expansion Option serial number.
Backup Exec is started for the first time following the Library Expansion Option installation. The Confirm Backup Device Availability item is selected from the Backup Exec Assistant. From the Tools menu, you point to Wizards, and then select Device Configuration Wizard. The Detected Hardware dialog box shows all of the devices attached to the media server. If a drive attached to your media server does not appear in the list, click Configure Devices to install the appropriate driver for the device. The Drive Configuration dialog box shows how the devices appear to Backup Exec.
1117
Starting Backup Exec After Installing the Library Expansion Option Detected Hardware dialog box
Make sure that each device in the robotic library is properly associated with the robotic library. Make sure that the drives in the robotic library appear in the device configuration wizard under the robotic library in the order matching their drive element address. The drive with the lowest drive element address should appear at the top of the list. If a robotic library storage device appears in the list as a stand-alone device, make sure the SCSI addresses of the robotic library and the storage device are configured properly.
1118
Administrators Guide
Note During startup, if the storage devices in the robotic library contain media, Backup Exec attempts to return the media to its original magazine slot. If the media cannot be returned to the slot, you are prompted to eject the media from the storage device. Related Topics: Setting Up Robotic Library Hardware on page 1115 Using the Backup Exec Assistant on page 116 Viewing Drive Configuration Properties on page 154
Depending upon your robotic library configuration, the first slot could be numbered 1 or 0. If your robotic library uses a zero-based slot configuration you can reassign how the slots are displayed in Backup Exec, by right clicking the Robotic Library in the left pane, selecting Properties, and then selecting Configuration. Depending on whether your robotic library begins slot numbering at 0 or 1, specify the appropriate number in the Slot Base field.
1119
Starting Backup Exec After Installing the Library Expansion Option Robotic library properties for Library|Configuration tab
After completing the configuration of your robotic library, perform an Inventory operation to update the Backup Exec media database. Related Topics: Inventorying Media in Devices on page 193
1120
Administrators Guide
Appendix
1121
Create Profiles for groups of users or computers. Profiles enable you to control the desktop users level of interaction with the Desktop Agent, define the types of files that are able to be backed up, set the schedule for backups, and configure additional settings for the Desktop Agent. Create Network User Data Folders. Network User Data Folders are locations on the network that are assigned to Desktop Agent users where the data from their protected desktops is stored. DLO Storage Locations can be used to automatically create Network User Data Folders for each new Desktop Agent user, or you can use existing network shares as Network User Data Folders and add them manually to DLO. Create Automated User Assignments. Automated User Assignments determine the Storage Location and Profile to which users are assigned when they install the Desktop Agent. Note Automated User Assignments are not used if users are manually added to DLO.
Add users manually to DLO. Instead of using Automated User Assignments, you can manually add users to DLO and assign a Profile and Storage Location to them. This is particularly useful when network shares already exist for user data storage. Users can be added individually or multiple users can be added at the same time by importing them from a list. View history log files, receive alerts, and restore files to a desktop from the Administration Console.
The Desktop Agent resides on the desktops and laptops that you want to protect. The desktop users level of interaction with the Desktop Agent can vary depending on how the Administrator has configured the Profile assigned to the user. The Desktop Agent may run in the background, automatically protecting files. Alternatively, desktop users with full access to the Desktop Agent interface can schedule backups, select which types of files to back up, restore files, synchronize file versions between different computers, and view the status of their backups. Related Topics: Setting Up DLO on page 1145 Setting up a DLO Profile on page 1146 Managing Backup Selections on page 1155 Creating DLO Storage Locations on page 1165 Setting up Automated User Assignments on page 1168
1122
Administrators Guide
How the Desktop and Laptop Option Works Relationship Between Backup Exec and the Desktop and Laptop Option Components
- Backup Exec media server - Desktop Agent Install Share The BE and DLO Admin Consoles and DLO file servers can reside on the media server or remote servers.
If you use Backup Exec to protect the file servers that host the Network User Data Folders remotely, the Remote Agent for Windows Servers is required.
1123
Microsoft Windows 2000 Professional version, Windows 2000 Server version, Windows 2000 Advanced Server, or Windows 2000 Datacenter Microsoft Windows Server 2003 server family Microsoft Windows XP Service Pack 1 or later
Internet Explorer 5.01 or later; however, version 5.5 is recommended Pentium system Required: 256 MB RAM Recommended: 512 MB (or more for better performance)
Disk Space
150 MB hard disk space required after Microsoft Windows is installed (typical installation)
Other Hardware
Network interface card CD-ROM drive Printer supported by Windows (optional) Mouse (recommended)
Note Novell E-Directory, NIS+ and other non-Windows Domain or Active Directory authentication schemes are not supported.
1124
Administrators Guide
Getting Started
Getting Started
The following topics address issues that should be considered before installing DLO.
Media Server Considerations Server Loading Authentication Considerations Using DLO with Firewalls Configuring DLO to Use a Specific Port for Database Access Excluding Files that are Always Open Using DLO with other Symantec Products Using Hidden Shares as Storage Locations
Server Loading
DLO can be treated as a network file server. The ideal server for DLO has a fast network connection and a fast set of disks. The CPU is not as critical as these other factors for the DLO file server. The number of Desktop Agents that can successfully back up to one DLO installation depends on many factors. Multi-client testing of DLO has found that when there are more than 400 clients attached to a DLO server running Windows 2000 Advanced Server, file operations may begin to fail when Paged Pool memory runs out. For this reason, it is not recommended to configure DLO to run more than 400 concurrent backups of this size.
1125
Getting Started
Authentication Considerations
DLO Administration Console The DLO Administration Console can be managed by any user who has full admin rights on the media server where DLO is installed. The users account must be a domain account and must have rights to create network shares and manage permissions of network shares and directories on any remote server used for Storage Locations or Network User Data Folders. This is commonly accomplished by using a domain admin account. See Creating Administrator Accounts on page 1137 for additional information. Desktop Agent DLO requires domain accounts. Every Desktop Agent user must log in to DLO using a domain account. If you have users who log in using local accounts, they can still use DLO, but they must have domain credentials to authenticate with DLO.
Getting Started
3. On computers that run the Desktop Agent from outside the firewall, create the following registry key as a DWORD value if it does not exist and set the DBUseTCP flag to 1: HKCU\Software\VERITAS\DLO\2.0\Client\DBUseTCP or HKLM\SOFTWARE\VERITAS\DLO\2.0\Client\DBUseTCP 4. Set the DBTcpPort on the computers modified in steps 2 and 3 to the port number you set in step 1. 5. Restart the modified computers.
C:\Windows\System32\Config registry hives and logs, including *.DAT.LOG, *.LOG and the files system, SECURITY, default, SAM, and software C:\Windows\System32\wbem *.EVT *.LOG (in particular, STI_Trace.log, WIADEBUG.LOG, WIASERVC.LOG) *.DAT (in particular, NTUSER.DAT, USRCLASS.DAT)
Related Topics: Managing Backup Selections on page 1155 Configuring the Global Exclude List on page 1174
1127
Getting Started
Share Permissions on NTFS Volumes Administrator Everyone Allow Full Control, Change, Read Allow Full Control, Change, Read
Security Permissions on NTFS Volumes Administrator Everyone Full control Allow Read & Execute Allow List Folder Contents Allow Read 1128 Administrators Guide
Getting Started Permission Settings for Hidden Shares (continued) Drive Type User or Group Special security permissions or advanced settings Permissions Allow Traverse Folder/Execute File Allow List Folder/Read Data Allow Read Attributes Allow Read Extended Attributes Allow Read Permissions Advanced Security Permissions on NTFS Volumes Administrator Everyone Allow Full Control Allow Traverse Folder / Execute File Allow List Folder / Read Data Allow Read Attributes Allow Read Extended Attributes Allow Read Permissions Share Permissions on FAT Volumes Administrator Owner Full Admin Group Allow Full Control, Change, Read Allow Full Control, Change, Read Allow Full Control, Change, Read
1129
1130
Administrators Guide
Updating DLO
Updates to Backup Exec are periodically provided by VERITAS Update or released on CD. As applicable, these updates include updates to the Desktop Agent install set, although the Desktop Agent updates are not automatically installed. To update the DLO Administration Console: 1. Install the DLO Administration Console as directed in Installing the Backup Exec Desktop and Laptop Option on page 1130. 2. Start the DLO Administration Console and set a recovery password using the Password Recovery Wizard which automatically starts the first time DLO version 10.0 is opened after installation. 3. If you are updating from DLO version 9.1 to version 10.0 run the following commands using the DLO command line interface:
Run the -keytest command to determine if there is any existing backup data that cannot be recovered because the user has been deleted. See -KeyTest Command on page 1218 for more information. Run the -createrecoverykeys command to assign recovery keys to existing users. See -CreateRecoveryKeys Command on page 1228 for more information.
To manually update the Desktop Agents, from the Desktop Agent machine, run the following: \\<media server>\DLOAgent\update_10.0\Setup.exe.
The Desktop Agent updates can also be remotely installed using the Backup Exec push install feature.
The DLO Command Line Interface Tool can automatically offer updates to the Desktop Agents using the publish command.
1131
To upgrade Desktop Agents using the Command Line Interface Tool: 1. Update the media server as directed in the update documentation. 2. From the command line on the server, change to the DLO installation directory. Example C:\Program Files\veritas\Backup Exec\NT 3. Run DLOCommandu.exe with the update option to add the configuration file and make note of the ID number returned when this command is run: DLOCommandu -update -add -f Note DLOAgentUpdate_BE.iniIf the configuration file has been moved or renamed, you will need to specify the full path and file name in the command above. Sample output: ID=3 Name= 10.0 Update Description=Updates Backup Exec DLO Desktop Agent from 9.1 to 10.0 Version=2.0 Build=1.XX.XX srcPath=\\MediaServerName\DLOAgent\update_10.0 cmdPath=%DOWNLOADDIR% cmdName=setup.exe cmdArgs=-s 4. Run DLOCommandu.exe with the publish command to make the update available to Desktop Agent users. DLOCommandu -update -publish -UI y -U UserName DLOCommandu -update -publish -UI y -P ProfileName Where 'y' is the ID number returned when the 'add' command was run in step 3. Using a '*' in place of UserName or ProfileName will publish the update to all users. When this command is executed, it will return a list of all users targeted for update. Users will be updated the next time the Desktop Agent application is started. Note For more information on the -update command and additional command options, see -Update Command on page 1222.
1132
Administrators Guide
Related Topics: DLO Command Line Interface Management Tools on page 1213
Related Topics: Setting Up DLO on page 1145 Creating DLO Storage Locations on page 1165 Setting up a DLO Profile on page 1146 Setting up Automated User Assignments on page 1168 Managing Desktop Agent Users on page 1177
1134
Administrators Guide
1135
3. Click Advanced if you would like to set advanced options. Select the desired options described below and click Next.
Data Integrity Scanner Advanced Options Item Permanently remove previously quarantined data Description Check to cause all previously quarantined data to be deleted.
Quarantine data Check to quarantine all files with outdated keys. If this encrypted with outdated option is not checked, data is scanned without being keys quarantined. After the data is quarantined, the Desktop Agent will back up a new version of the file with the correct encryption key. Include computers that have already been validated Verbose output Check to force all data to be rescanned, even if it has previously been validated.
4. Click Start to begin the scan. 5. Review the scan results. If the scan identified data encrypted with outdated keys but you did not choose to quarantine the data, you can run the scan again after setting advanced options to quarantine this data. 6. Click Next. 7. Click Finish. Related Topics: Setting a Recovery Password on page 1135 -SetRecoveryPwd Command on page 1225 -EmergencyRestore Command on page 1224
1136
Administrators Guide
1137
To create and configure DLO administrator accounts: 1. On the DLO Administration Console Network menu, select Administrator Accounts to open the Administrator Account Management dialog.
Administrator Account Management Dialog
1138
Administrators Guide
4. Click OK. 5. To modify the permissions for DLO administrators, click Permissions. If you do not want to set permissions at this time, skip to step 9. 6. Check the Automatically grant DLO administrators access to network user data folders checkbox if you want all DLO administrators to be able to access Network User Data Folders containing desktop user files. Caution Granting access to Network User Data folders allows DLO administrators to access desktop users backup files.
1139
7. To grant DLO administrators in a specified domain group full restore privileges including the ability to restore a desktop users files to an alternate location, enter or browse to a fully qualified domain group in the For DLO administrators with full restore privileges, use the domain group field. Example Enterprise\DLOAdmins 8. To grant DLO administrators in a specified domain group limited restore privileges that do not include the ability to restore a desktop users files to an alternate location, enter or browse to a fully qualified domain group in the For DLO administrators with limited restore privileges, use the domain group field. 9. Click OK. To modify a DLO administrator account: 1. On the DLO Administration Console Network menu, select Administrator Accounts. 2. Click on the account you want to modify. 3. Click Edit. 4. Modify the administrator account as necessary as instructed in To create and configure DLO administrator accounts: on page 1138.
1140
Administrators Guide
To delete an administrator account: 1. On the DLO Administration Console Network menu, select Administrator Accounts. 2. Click on the account you want to delete. 3. Click Remove. 4. When asked if you are sure you want to remove the account, click Yes to continue or No to cancel.
Login information User name Enter the user name for an account with administrator access to the media server. Enter the password for this account. Enter the domain for this account.
Password Domain
3. Click OK.
1141
1142
Administrators Guide
Desktop Computer Status Summary Last Backup Result Summarizes the completion status of the last operation performed on each computer protected by DLO. Totals are provided for the number of computers that completed the last job successfully, with errors, with warnings, or for which the last job was canceled.
With Errors - The last operation was completed, but errors were generated. With Warnings - The last operation was completed, but warnings were generated. Canceled - The job was canceled by selecting cancel or refreshed during the job. Successful - The job was successfully completed without warnings or errors, and it was not canceled or refreshed during the job.
Note Errors take precedent over warnings, so if there are both errors and warnings, the last backup result will say With Errors. See Monitoring Alerts on the DLO Administration Console on page 1200 for additional information on alerts. Pending Jobs Lists restore jobs requested by the DLO administrator that have not yet been run.
Alert Summary Active Alerts Lists alerts that have not been cleared by the DLO administrators and have not yet been removed by the alert grooming process. Alert grooming is managed from the Backup Exec Administration Console (see Configuring Alert Category Properties on page 511).
1143
Using the DLO Administration Console Overview View Content (continued) Item Server Summary Server Status Server Load Lists the status of each DLO server. Lists the number of desktops being protected by DLO and the total number of installed Desktop Agent users. These numbers may not be the same if some users are protecting multiple computers with DLO. Both online and offline users are counted. Description
1144
Administrators Guide
Setting Up DLO
Setting Up DLO
In order for DLO to back up user data, you must set up the following options in the following order: 1. Create a Profile, which determines what files are backed up, when the files are backed up, and the level of interaction the desktop user has with the Desktop Agent. For additional information, see Setting up a DLO Profile on page 1146. 2. Determine where user data will be stored on the network. DLO requires an individual User Data Folder on the network for each desktop user. If Storage Locations are used, they will automatically create Network User Data Folders for each new Desktop Agent user. If network data storage folders already exist for each user, they can be added to DLO individually or many users can be imported at one time using a list. For additional information, see Creating DLO Storage Locations on page 1165 and Managing Desktop Agent Users on page 1177. 3. Create an Automated User Assignment to automatically assign a Storage Location and Profile to new users or configure new users manually. For additional information, see Setting up Automated User Assignments on page 1168. You can set up DLO by using the Desktop and Laptop Configuration Wizard, or by setting options manually. The DLO configuration wizard provides a series of wizards that help you set up DLO in the correct order. The configuration wizard appears when the DLO Administration Console is opened unless the Always show this wizard at startup box is unchecked. The configuration wizard can also be accessed as described below. To access the Configuration Wizard: 1. On the DLO navigation bar, click Setup. 2. Under Getting Started on the task pane, select DLO Configuration using wizard. 3. If you want the Configuration Wizard to display each time the DLO Administration Console is started, select Always show this wizard at startup. Related Topics: Setting up a DLO Profile on page 1146 Creating DLO Storage Locations on page 1165
Appendix L, Backup Exec Desktop and Laptop Option 1145
Setting Up DLO
Setting up Automated User Assignments on page 1168 Managing Desktop Agent Users on page 1177
Backup file and folder selections Desktop and Network User Data Folder storage limits Backup schedules The desktop users level of interaction with the Desktop Agent Logging options Network bandwidth usage
You cannot modify settings for individual DLO users from the DLO Administration Console unless an individual user is the only user assigned to a Profile. However, you can grant permission to Desktop Agent users to modify their own settings. DLO provides two default Profiles. One is for desktop computer users and the other is for laptop computer users. Both back up the My Documents directory by default. The primary difference between the two Profiles is in the number of revisions retained in the Desktop User Data Folder.
DLO Default Profiles Profile Desktop Users Description The Desktop Users Profile uses the My Documents (Desktops) backup selection, which retains zero versions in the Desktop User Data Folder and three versions in the Network User Data Folder by default. This minimizes disk space requirements for DLO on desktop computers and assumes that DLO will be able to access backup files in the Network User Data Folder. The Laptop Users Profile uses the My Documents (Laptops) backup selection, which retains one version in the Desktop User Data Folder and three versions in the Network User Data Folder by default. This provides offline protection for all files in the laptop My Documents folder.
Laptop Users
1146
Administrators Guide
Setting Up DLO
To create a new Profile: 1. On the DLO navigation bar, click Setup. 2. In the Settings pane, click Profiles. 3. Under Profile Tasks in the task pane, click New Profile. 4. From the General tab in the New Profile dialog box, select the appropriate options as follows.
General Profile Properties Item Profile Name Description Type the name of the new Profile that you want to create. The Profile name cannot contain any of the following characters: \@#$%^&*()=+|/{}[] Type a description for the Profile. Clear this check box to disable the Profile. Profiles are enabled by default.
User Bandwidth Settings Limit bandwidth (KB/sec) Limiting the bandwidth for DLO data transfer is a means to manage the trade-off between backup speed vs. the impact of backups on the local machine, network, and server. The default limit is meant to be a conservative setting to minimize the impact of backups, but many factors come into play, such as network speed, connection type, the amount of data backed up and the total number of machines backing up to DLO. If machine performance is not impacted, but DLO data transfer is slow, a higher bandwidth setting may be more suitable. If machine performance is noticeably impacted during backups, a lower value will reduce the impact of backups on machine performance, but backups will take longer to complete. Select Limit bandwidth (KB/sec) and enter a specific maximum bandwidth setting to throttle the rate at which data is sent to the Network User Data Folder. Data transfer is only limited when data is written to the Network User Data Folder, not when it is written to the Desktop User Data Folder.
1147
Yield bandwidth Select this to enable DLO to reduce data transfer over the network when to other programs other applications on the desktop computer are transferring data. DLO automatically resumes normal data transfer rates when other applications are not using this resource. Note Selecting this option can improve system performance when other network-intensive applications are running at the same time. Data transfer is only limited when data is written to the Network User Data Folder, not when it is written to the Desktop User Data Folder. Storage Limits Limit network Select to limit the disk space available to store DLO backup files and type user data folder to the amount of space you want to use for storage. (MB) Enable desktop user data folder Check to enable the use of the Desktop User Data Folder. When Enable desktop user data folder is checked, files are copied to the Desktop User Data Folder first, and then they are copied to the Network User Data Folder from the Desktop User Data Folder. This is true even when DLO is configured to keep zero revisions in the Desktop User Data Folder. When Enable desktop user data folder is unchecked, files are copied straight to the Network User Data Folder from the original location. Advantages to enabling the Desktop User Data Folder:
Offline protection is provided because revisions can be stored locally as well as on the network. Because files are more quickly saved to the local computer than to the network, the time a file is held open for backup is reduced. If local revisions are not desired, this option will prevent backup files from being stored in the Desktop User Data Folder. No revisions are saved in the Desktop User Data Folder even if backup selections specify that a certain number of revisions should be stored locally. Works well for desktop users with very limited disk space.
Note The synchronization process uses the Desktop User Data Folder for file storage and conflict detection. For this reason, the Desktop User Data Folder may contain files that support synchronization, even though Enable desktop user data folder has not been selected.
1148
Administrators Guide
Limit desktop user Select to limit the disk space available to store DLO backup files and type data folder to the amount of space you want to use for storage. Once selected, you will be able to choose from the following options: A percentage of the total disk space (%) Select this option and enter a percentage to limit the amount of disk space used for storing backup files in the Desktop User Data Folder to a percentage of the local drive. A size (MB) Select this option and enter a size in MB to limit the Desktop User Data Folder to a specific maximum size. Note While limiting available disk space for the Desktop User Data Folder can prevent overloading of the desktop hard drive, backups can fail to run if the Desktop User Data Folder space limit is reached.
5. From the Backup Selections tab, check the backup selections that you want to apply to users of this Profile. You can add, modify, and delete backup selections for a Profile from this dialog. When a new backup selection is created, it is available for selection in all Profiles. Changes made to a backup selection in one Profile will impact all other Profiles that use the backup selection. Similarly, when a backup selection is deleted, the change impacts all Profiles that use the backup selection. For more information, see Managing Backup Selections on page 1155.
1149
Setting Up DLO
6. From the User Settings tab, select the appropriate options as follows:
Profile User Settings Dialog Box Item Desktop Agent display settings Description Select one of the following options to determine the desktop users level of interaction with the Desktop Agent:
Display the complete interface. Select this option to enable desktop users to access all Desktop Agent options. Display only the status. Select this option to enable desktop users to view the status of backup jobs. With this option, desktop users cannot change settings for the Desktop Agent or access any options other than the status. Desktop users can right click the system tray icon to open the status view or exit the program.
Display only the system tray icon. Select this option to display the Desktop Agent icon in the system tray in the lower right corner of the screen. Desktop users can right click on the system tray icon to exit the program.
Do not display anything. Select this option to run the Desktop Agent in the background. The desktop user cannot view the Desktop Agent.
Allow Users to
Select the options below to enable desktop users to configure the following features of the Desktop Agent When selected, users in this Profile will be able to disable the Desktop Agent from the tray icon. They will also have the ability to re-enable the Desktop Agent once it has been disabled. When selected, users in this Profile will be able to restore their backed up files. For more information, see Restoring Files Using the Desktop Agent on page 1264.
Restore data
Synchronize files
When selected, users in this Profile will be able to synchronize data across all of their computers that run the Desktop Agent. For more information, see Synchronizing Desktop User Data on page 1254.
1150
Administrators Guide
Setting Up DLO Profile User Settings Dialog Box (continued) Item Change encryption settings Description When selected, users in this Profile will be able to turn backup file encryption on or off. For more information, see Backup Selection Options on page 1245. Modify backup selections For more information, see Modifying Backup Selections in the Standard View on page 1239 or Modifying Backup Selections in the Advanced View on page 1245. Profile backup selections are backup selections that were created by the DLO administrator and included in the Desktop Agent users Profile. For more information, see Modifying Backup Selections in the Advanced View on page 1245. When selected, users in this Profile will be able to limit the amount of disk space that can be used to store backup files in the Desktop User Data Folder. For more information, see Setting Customized Options on page 1252. Modify backup schedule When selected, users in this Profile will be able to modify the schedule on which their files are backed up. For more information, see Changing Backup Job Schedule Options on page 1250. Suppress error messages from users desktop When selected, error messages generated by the Desktop Agent on computers using this Profile will not be displayed in the DLO Administration Console. This will minimize the number of times the Desktop Agent accesses the DLO database, reducing the load on the DLO server.
1151
Setting Up DLO
8. If you selected Edit schedule in the previous step, select the appropriate options as follows, and then click OK:
Backup Schedule Dialog Box Items Run on these days Frequency Run once at Select this option to run a single backup on the days you selected at the time specified. Select this option to run backups at the specified time interval on the days you selected. Description Select the days on which you want to back up files.
Run every
1152
Administrators Guide
Setting Up DLO Backup Schedule Dialog Box (continued) Items From Description If you selected Run every, select the beginning of the time interval over which you want backups to begin. If you selected Run every, select the end of the time interval over which you want backups to begin. Note This field specifies the end of the time period within which backups will begin. If a backup is in progress at this time, it will continue to run to completion. Start backup jobs over a Select this option to stagger start times for backup jobs. Rather period of than starting all backup jobs at exactly the time indicated, DLO will distribute the start times over the specified interval, better distributing the demands on the server and network.
Until
9. From the Options tab, select the appropriate options as follows: Note Events such as file copies, file grooms, errors and warnings are logged by DLO and can be viewed as discussed in Monitoring Alerts on the DLO Administration Console on page 1200.
Additional Profile Options Item Log file maintenance Keep log files for a minimum of (days) Specify the minimum number of days to keep log files. Log files will not be deleted until they are at least as old as specified. Note Log files will not be deleted until their combined size exceeds the setting for the combined size of all log files, which is discussed below. After minimum number Enter the maximum combined size of all log files to be retained of days, delete oldest log before the oldest log files are deleted. files when combined size Note You may have more than the specified number of MB of log exceeds (MB) files stored if none of the log files is as old as specified in the keep log files for a minimum of (days) setting. Logging options Log groom messages Check to create logs for grooming operations. Description
1153
Setting Up DLO Additional Profile Options (continued) Item Log information messages for backup Log warning messages Mail options Enable incremental backups of Outlook PST files Check to enable incremental backups of Microsoft Outlook Personal Folder (PST) files. Incremental backups must be enabled to allow PST files to be backed up while they are open. If this option is not checked, PST files that are configured in Outlook will be fully backed up each time the PST file is saved, which generally occurs when Outlook is closed. When Outlook PST files are backed up incrementally, only one revision is maintained regardless of the number of revisions set in the backup selection. Note DLO is unable to perform incremental backups of Outlook PST files unless Outlook is your default mail application. When you restore Microsoft Outlook PST files, the restored PST file will differ from the original PST file as explained in Restoring Microsoft Outlook Personal Folder Files on page 1268. Note Synchronized files cannot be backed up incrementally. For additional information, see Backing up Outlook PST files on page 1247. Description Check to create logs for all backup operations.
10. When the Profile configuration is complete, click OK. Related Topics: Modifying Desktop Agent Settings on page 1249 Monitoring Alerts on the DLO Administration Console on page 1200
1154
Administrators Guide
Setting Up DLO
Modifying a Profile
Profiles can be modified as required to meet the changing needs of user groups. Note Modifications to a Profile will cause users of that Profile to cancel jobs, load settings, restart backup engines and scan their backup selection tree. To modify a Profile: 1. On the DLO navigation bar, click Setup. 2. Click Profiles in the Settings pane. 3. In the Results pane, select the Profile you want to modify. 4. Under General Tasks in the task pane, click Properties. 5. Modify the Profile properties as desired. For detailed information on available Profile properties, reference the process for creating a new Profile, beginning with step 4 on page 1147. 6. Click OK.
Managing Revisions on page 1156 Adding a Backup Selection on page 1157 File Grooming on page 1164 Using DLO Macros in Backup Selections on page 1162 Modifying a Backup Selection on page 1163 Deleting Backup Selections on page 1164
1155
Setting Up DLO
Managing Revisions
Revisions are versions of a file at a specific point in time and they are configured within backup selections. When a file is changed and backed up, DLO stores a new revision. DLO will store and maintain a specific number of revisions for all files in a backup selection. Because backup selections are configured separately, the number of revisions retained in each backup selection can vary. When the number of revisions is exceeded, DLO removes the oldest revision, maintaining only the specified number of revisions in the Desktop and Network User Data Folders. You can limit the number of revisions retained in a given period of time. If you are working on a document and backing it up frequently, all of your revisions could potentially be just a few minutes apart. By specifying that you want to retain only two revisions every 24 hours, at least 120 minutes apart, you can retain older revisions for a longer period of time. While some intermediate versions will not be retained, it does support situations in which returning to an older revision is needed. Another consideration in determining the number of revisions to retain is the amount of storage space required to store the data. The amount of space required for backups can be estimated by multiplying the number of revisions retained by the amount of data protected. Example If you are have 10 MB disk space consistent retaining three revisions of each file and of data to back up, approximately 30 MB of will be required if file sizes remain between revisions.
Although compression can improve the space utilization, it varies significantly with file type and other factors. Typical compression ratios are approximately 2:1, so in the previous example, the maximum disk space usage might be reduced to approximately 15 MB. Caution Symantec strongly recommends that you consider disk space when choosing backup selections for desktops and laptops. A large number of local copies may cause the Desktop Agent user's computer to run out of disk space. For example, you may want to avoid selecting entire drives for backup or synchronization.
1156
Administrators Guide
Setting Up DLO
1157
Setting Up DLO
7. From the General tab in the Backup Selection dialog box, select the appropriate options as follows:
Backup Selection General Dialog Box Item Name Description Description Type a descriptive name for the backup selection. Type a clear description of the backup selection. This description may include, for example, the folder selected, the group of users it was created for, or the purpose for creating the backup selection.
Folder to back up Type a folder name Select this option to add a specific folder to the backup selection. Type the path to the folder, including the folder name. For example, to add a folder named MyData on drive C, type C:\MyData. Note Once a Backup Selection is created, the folder cannot be modified. Note See Using DLO Macros in Backup Selections on page 1162 for information on using macros to define the folders backed up by a backup selection. Select a pre-defined folder Select this option to choose a pre-defined folder from the list provided. Note See Using DLO Macros in Backup Selections on page 1162 for information on the macros used to define the pre-defined folders. Include subfolders Select this option to also back up all subfolders in the specified directory. This option is selected by default.
Include and exclude only Select this option to include or exclude only specific files or file the items listed below types.
1158
Administrators Guide
Setting Up DLO
9. To add a filter to the Include/Exclude list, verify that you selected Include and exclude only the items listed below in step 8, and click Add Include or Add Exclude. 10. If you selected Add Exclude, you will be notified that all previously backed up files matching this exclude will be deleted from this backup selection. Click Yes to continue or No to cancel. 11. Select the appropriate options as follows:
Add Include Filter and Add Exclude Filter Dialog Box Options Item Add file name extensions Description Select this option to add common file types to your include or exclude list. To select multiple file types, click one item and press <Ctrl> or <Shift> while clicking the other items. Select this option to add a custom file or file type to your include or exclude list. Specify the filter options as described below. Select Files to apply this filter to files or Folders to apply this filter to folders. Type the name of the file or the folder, or a wildcard description of the file or folder that you want to include or exclude from backup selections. Type a description of the custom filter.
Apply to
Filter
Description
12. Click OK. 13. From the Revision Control tab, select the appropriate options for both the Desktop and Network User Data Folders:
Backup Selection Revision Control Dialog Box Item Description
Specify the number of revisions to keep in the Desktop and Network User Data Folders Desktop User Data Folder Type the number of revisions to keep in the Desktop User Data Folder for each file in the backup selection. Note When Outlook PST files are backed up incrementally, only one revision is maintained regardless of the number of revisions set in the backup selection. Appendix L, Backup Exec Desktop and Laptop Option 1159
Setting Up DLO Backup Selection Revision Control Dialog Box (continued) Item Limit to Description Check this option to limit the number of revisions retained in a given amount of time, and specify the following:
Revisions. Select the number of versions to retain. Within the last x hours. Select the time period during which you want to retain the versions. At least x minutes apart. Select the minimum amount of time that must elapse between backups in this backup selection.
Note The oldest revision is deleted when a new revision is created that exceeds one of these limits. Network User Data Folder Limit to Select the number of revisions to keep in the Network User Data Folder for each file in the backup selection. Check this option to limit the number of revisions retained in a given amount of time, and specify the following:
Revisions. Select the number of versions to retain. Within the last x hours. Select the time period during which you want to retain the versions. At least x minutes apart. Select the minimum amount of time that must elapse between backups in this backup selection.
Note The oldest revision is deleted when a new revision is created that exceeds one of these limits.
1160
Administrators Guide
Setting Up DLO
14. From the Options tab, select the appropriate options as follows:
Backup Selection Options Item Compress the files stored in the Network User Data Folder Description Select this option to compress files in this backup selection for data transfer over the network and for storage in the Desktop and Network User Data Folders. This affects files created after this feature is activated. Previously stored files will not be compressed. Encrypt the files for transmission and storage Select this option to encrypt files for transfer and to store files from this backup selection in an encrypted format in the Network User Data Folder. This affects files transmitted and stored after this feature is activated. Previously stored files will not be encrypted. The AES (Advanced Encryption Standard) and a 128 bit key length are used. If enabled, versions are stored unencrypted in the Desktop User Data Folder, and encrypted in the Network User Data Folder. Transfer over the network is encrypted. When source files are deleted, delete the backed up files from the: Desktop User Data Folder after Indicate the number of days after which DLO will delete all file versions from the Desktop User Data Folder after the source file has been deleted from the desktop. Indicate the number of days after which DLO will delete all file versions from the Network User Data Folder after the source file has been deleted from the desktop.
1161
Setting Up DLO
%CURRENTUSERMYDOCS%
The following additional pre-defined folders have been added to the Backup Selection dialog:
Macros for Pre-defined Folders in the Backup Selection dialog Pre-Defined Folder Macro %CURRENTUSERMYDOCS% Folders Backed Up The My Documents directory for the user who is logged on. All local fixed drives The Favorites directory for the user who is logged on
%LOCALFIXEDDRIVES% %CURRENTUSERFAVORITES%
1162
Administrators Guide
Setting Up DLO Macros for Pre-defined Folders in the Backup Selection dialog (continued) Pre-Defined Folder Macro %CURRENTUSERPRINTHOOD% %CURRENTUSERNETHOOD% Folders Backed Up The Printers directory for the user who is logged on. The Network Locations directory for the user who is logged on. The Desktop directory for the user who is logged on. The Recent Files directory for the user who is logged on.
%CURRENTUSERDESKTOP% %CURRENTUSERRECENT%
Setting Up DLO
File Grooming
The Desktop Agent grooms revisions based on backup selection settings and does this as new revisions are created. The oldest revision is deleted when a new revision is created that exceeds the limit. See step 13 on page 1159 for revision control settings. Maintenance grooming is the process of removing backups of deleted files. It occurs at most once every 24 hours. Maintenance grooming occurs during the first backup that runs after 24 hours have passed since the last maintenance grooming.
1164
Administrators Guide
Setting Up DLO
1165
Setting Up DLO Storage Location Configuration Support (continued) Configuration NetWare 3.1x, 4.x, or E-Directory Storage Locations UNIX file systems or SAMBA shares on UNIX systems Supported Not Supported X X
Setting Up DLO
3. Under Storage Location Tasks in the task pane, click New Storage Location. 4. Select the appropriate options as follows.
New Storage Location Dialog Box Item Computer name Description Type a computer name or browse to a computer on which to create the Storage Location. Type or browse to a location on the computer where the Storage Location will be created. Note Storage Locations should be in the same domain as the media server or in a domain that trusts the media servers domain. Storage Location name Type a name for the new Storage Location. The name cannot contain any of the following characters: \@#$%^&*()=+|/{}[] The Summary field automatically displays the location and format of Network User Data Folders that will be created for new users assigned to this Storage Location. Network User Data Folders are automatically created in the Storage Location. DLO uses the %USERDOMAIN% and %USERNAME% variables to determine the actual folder path for each user who is assigned to a Storage Location. DLO uses the users domain and user name to create a unique Network User Data Folder name for that user. If the user is logged on with credentials that do not allow access to the Storage Location, the user will be prompted to enter alternate domain credentials. The network administrator can access this folder, but cannot configure the variables.
Path
Summary
5. Click OK.
1167
Setting Up DLO
Note When a Storage Location is created using an existing share on a remote machine and DLO does not have full machine rights, the Storage Location cannot be deleted from the Administration Console. To remove the Storage Location, first delete the Storage Location share and then delete the Storage Location from the Administration Console. To delete Storage Locations: 1. Click Setup on the DLO navigation bar. 2. Click Storage Locations in the selection pane. 3. In the results pane, click the Storage Location you want to delete. 4. Under General Tasks in the task pane, click Delete. 5. Click Yes to delete the Storage Location or No to cancel. Related Topics: Managing Desktop Agent Users on page 1177 Modifying Existing Automated User Assignments on page 1171 Deleting Automated User Assignments on page 1173
1168
Administrators Guide
Setting Up DLO
Modifying Automated User Assignments does not affect users who have already been configured. Only new users configured with the Automated User Assignment will use the new settings. You can create, reorder, and modify Automated User Assignments from the Setup view in the DLO Administration Console.
Viewing Automated User Assignments
For information on modifying Automated User Assignment priorities, see Changing the Priority of Automated User Assignments on page 1171. To create a new Automated User Assignment: 1. On the DLO navigation bar, click Setup. 2. Click Automated User Assignments in the selection pane. 3. Under Automated User Assignment Tasks in the task pane, click New user assignment.
1169
Domain and Group this user assignment will apply to Domain Select the domain to which this Automated User Assignment will apply. Select the group to which this Automated User Assignment will apply.
Group
Storage Location/Profile Storage Location Select a Storage Location to be assigned to the users in the selected domain and group. Select a Profile to be assigned to the users in the selected domain and group.
Profile
1170
Administrators Guide
Setting Up DLO
1171
1172
Administrators Guide
Setting Up DLO
1173
Setting Up DLO
1174
Administrators Guide
Setting Up DLO
6. Enter a filter, file name or folder name to be excluded from all backups. Wildcards are supported. See Using DLO Macros to Define Global Excludes below for additional information on using macros as global exclude filters.
Add Global Exclude Dialog Item Filter Description The filter determines which files or folders will be affected by the global exclude. Filters can be file names, wildcards or macros. Examples: Wildcard: *.tmp File name: pagefile.sys Macro: %WINDIR% Note When using wildcards you must use the * wildcard. For example, *.tmp will return all results with the .tmp extension while .tmp will return only files explicitly named .tmp. Description Apply to Type a description of the global exclude. Indicate whether this global exclude should apply to files, folders, or both files and folders.
7. Enter a description for the global exclude. 8. Specify if the global exclude should apply to files, folders or both files and folders. 9. Click OK to create the global exclude. To delete a Global Exclude: 1. From the Tools menu in the DLO Administration Console, select Global Excludes. 2. Click on the global exclude you want to delete. 3. Click Delete. 4. Click Yes to delete the global exclude.
1175
Setting Up DLO
1176
Administrators Guide
Setting Up DLO
Setting Up DLO
7. Clear the Allow inheritable permission from parent to propagate to this object check box. 8. Add Administrator and Everyone and give them full control permissions. 9. Create a data folder for each user who will use this Storage Location. 10. Right-click the data folder you created in step 9, select Properties and then select Security. 11. Clear the Allow inheritable permission from parent to propagate to this object check box. 12. Add Administrator and the user who will be assigned to the user data folder to the share permission list. 13. Set full permission for Administrator and the user.
1178
Administrators Guide
Setting Up DLO
User
Setting Up DLO
User
1180
Administrators Guide
Setting Up DLO User Properties (continued) Item Profile Network User Data Folder Description Select a Profile to apply to this user. This is the location where the users backup files are to be stored. It cannot be modified. To move a user to a new location, see Moving a Desktop Agent User on page 1182.
1181
Setting Up DLO
4. Under General Tasks in the task pane, click Delete. 5. To delete the data stored in the User Data Folder, check Delete data stored in the user data folder. When the Delete data stored... option is selected, backup data is deleted from the Network User Data Folder, but not from the Desktop User Data Folder. When the Desktop Agent is uninstalled from the desktop computer, an option is provided to delete the Desktop User Data Folder. 6. Click Yes to delete the user, or click No to cancel. Note If you delete a user from the DLO Administration Console without first uninstalling the Desktop Agent from the users desktop, the Desktop Agent on that user's computers will close automatically.
1182
Administrators Guide
Move the contents of the Select this option to specify a new Storage Location. Type the user data folder to an path in the box provided, or click Browse and navigate to the alternative location new location.
6. Click Start.
1183
Setting Up DLO
Setting Up DLO
5. When asked if you want to delete each selected computer and all backup files, click Yes to continue or No to cancel.
1185
2. In the Computer pane, click the desktop from which the data to be restored originated. 3. In the Backup Folder pane tree view, highlight the folder containing the files you want to restore. 4. To restore the entire folder, check the folder in the Backup Folder pane. 5. To restore specific files, check the files in the File Version pane.
1186
Administrators Guide
Note A red x in a checkbox indicates a deleted file. 6. If multiple versions exist for a file, select the radio button for the file version you want to restore. In some cases, the Restore Search view may contain duplicate entries for the same file. If this occurs, you can select either file to restore and receive the same outcome. Note When a desktop user deletes an original file, the backup files are retained until they are deleted by the file grooming process. If an original file has been deleted, but backup files are still available, the icon for the file in the restore view will have a small red x to indicate the deletion of the original file. See File Grooming on page 1164 for additional information. 7. Under Restore Tasks in the task pane, click Restore files to open the Restore dialog.
Restore Dialog Box
1187
1188
Administrators Guide
Restoring Files and Folders from the DLO Administration Console Restore Dialog Box (continued) Item Restore Options If file already exists: Select Do not overwrite to cancel the restoration of files that already exist in the destination folder. Select Prompt to be prompted before overwriting the file if it already exists in the destination folder. Select Overwrite to overwrite the file without prompting if it already exists in the destination folder. Description
9. Click OK. Note If you customize NTFS permissions or directory attributes such as compression or encryption for files or folders, you must reapply these settings after restoration. If you use a password for your PST file, you must reset the password after restoring your PST file. 10. In the Restore Summary dialog box, review the selected restore settings, and then click Print to print a copy of the restore summery, or Restore to continue with the restore. 11. Click OK when the restore job completes.
1189
Restoring Files and Folders from the DLO Administration Console Search Dialog Box
Modified
Today
Between
1190
Administrators Guide
Restoring Files and Folders from the DLO Administration Console Search Dialog Box Options (continued) Item Of the following type Description Select this check box to select a file type from the list provided. Select this check box and then enter information as follows:
Select from equal to, at least, or at most in the first drop-down menu. Type a file size. Select KB, MB, or GB.
1191
1192
Administrators Guide
The History view includes a computer history and a job history for each desktop that is displayed. The Computer History pane displays all desktops that are backed up with the Desktop Agent and provides the following summary information:
Computer History pane Item User Computer Last Backup Result Description The user name of the desktop user who generated this message. The name of the desktop that generated this message. The outcome of a completed backup, for example, Success, Warnings, Failed, Canceled. For descriptions of possible backup outcomes, see Desktop Computer Status Summary on page 1143. Profile The Profile to which the desktop user who generated the message belongs. For more information on Profiles, see Setting up a DLO Profile on page 1146 Backup Mode Describes the backup mode specified in the Profile. Backup modes include:
Continuous. The backup occurs whenever a file changes. Scheduled. The backup occurs according to a schedule. Manual. The backup occurs when initiated by the desktop user.
Desktop Data Folder Size Network Data Folder Size Network Data Folder Path
1193
1194
Administrators Guide
3. Determine the type of jobs to view by selecting one of the following filters under Job History View Filters on the task pane:
Type of Jobs Viewed in the History View Item List all jobs Description Lists history logs for all jobs that have run on the selected desktop. These may include backup, synchronization, restore, or move user jobs. Lists history logs only for backup jobs that have run on the selected desktop. Lists history logs only for restore jobs that have run on the selected desktop.
4. Filter job history logs based on alerts received by selecting one or more of the following:
Selections to Filter Job Histories Based on Alerts Received Item Show successful jobs Description Lists history logs for all successful jobs on the selected desktop.
Show jobs with warnings Lists history logs for all jobs that generated warnings on the selected desktop. Show jobs with errors Lists history logs for all jobs that generated errors on the selected desktop. Lists history logs for all jobs that were canceled on the selected desktop.
1195
5. Select a time frame for filters to be viewed by selecting one of the following:
Time Frame for Job Histories viewed Item Show last 24 hours Description Lists history logs that have been generated in the last 24 hours, and that meet all other filtering criteria. Lists history logs that have been generated in the last 7 days, and that meet all other filtering criteria. Lists all history logs that have been generated in the last 24 hours, and that meet all other filtering criteria.
Show all
To view a history log in the DLO Administration Console: 1. On the DLO navigation bar, click History. Jobs that meet the current filtering criteria for the History view are displayed in the Job History window. For additional information on filtering, see To set job history view filters: on page 1194. 2. In the History pane, select the computer for which you want to view a history log. 3. Click on the log you want to view in the Job History pane. 4. Under General Tasks on the task pane, click View history log file to display the log file viewer with all log messages for this job.
1196
Administrators Guide
With timestamp
1197
Monitoring DLO Job Histories Log File Viewer Filtering Options (continued) Item With Type Description Check the With Type checkbox to show only logs of the indicated type. You may select one of the following types:
Check the With Filename like checkbox to enter a filename, or filename type. Wildcard entries are supported. Example: *gold.doc Note When using wildcards you must use the * wildcard. For example, *.tmp will return all results with the .tmp extension while .tmp will return only files explicitly named .tmp.
Filter All entries except maintenance Failed entries only Warning entries only Maintenance entries only Select this option to display all entries other than those for maintenance operations such as the grooming of deleted files. Select this option to display only entries for failed operations. Select this option to display only for entries with warnings. Select this option to show only maintenance operations such as the grooming of deleted files.
Local data folder entries Select this option to display all log entries for Desktop User Data only Folders. Failed local data folder entries only Network data folder entries only Select this option to only display entries for failed Desktop User Data Folder operations. Select this option to display all log entries for Network User Data Folders.
1198
Administrators Guide
Monitoring DLO Job Histories Log File Viewer Filtering Options (continued) Item Failed network data folder entries only Debug entries only Description Select this option to only display entries for failed Network User Data Folder operations. Select this option to display debug entries only. Debug entries are used for troubleshooting.
1199
1200
Administrators Guide
Monitoring Alerts on the DLO Administration Console DLO Administration Console Alerts View
Warning
Error
1201
Server Alerts Warnings Queued Restore Job Has Not Completed Client Backup Has Not Completed Appears when a queued restore job has not completed within a pre-determined time (7 days, 14 days, or 28 days). Appears when a specific desktop has not completed a backup within a pre-determined time (7 days, 14 days, or 28 days).
Informational Restore Job Queued Appears when a restore job is initiated from the DLO Administration Console.
Desktop Agent Alerts Errors Configuration of User Failed Exceeded Local Disk Quota Appears when a new user connects and for an unknown reason cannot be configured properly. Appears when attempting to add a new version to the Desktop User Data Folder, which would exceed the specified disk storage limit. Appears when attempting to add a new version to Network User Data Folder which would exceed the specified disk storage limit. Appears when the available disk space on the desktop computer reaches a pre-determined percentage. Appears when the available disk space on the network computer reaches a pre-determined percentage. Appears when a running backup job is unable to be completed and fails.
Local Out of Disk Condition Share Out of Disk Condition Backup Job Failed
1202
Administrators Guide
Monitoring Alerts on the DLO Administration Console DLO Alerts (continued) Type Name Restore Job Failed Description Appears when a running restore job is unable to be completed and fails.
Warnings No Matching User Assignment Appears when a new user connects and no matching combination of domain and/or group could be found within the defined User Assignments. Appears when a users Desktop User Data Folder is approaching the specified size limit. Appears when a users Network User Data Folder is approaching the specified size limit. Appears when the available disk space on the desktop computer reaches a pre-determined percentage.
Approaching Local Disk Quota Approaching Share Disk Quota Approaching Local Low-Disk-Space Condition Approaching Share Low-Disk-Space Condition Backup Job Completed with Errors Backup Job Completed with Warnings Restore Job Completed with Errors Restore Job Completed with Warnings Informational Job Completed Successfully
Appears when the available disk space on the network computer reaches a pre-determined percentage.
1203
Monitoring Alerts on the DLO Administration Console DLO Alerts (continued) Type Name Restore Job Completed Successfully User Configured Successfully Description Appears when a restore job completes successfully.
Configuring Alerts
The DLO Administrator can select the type of alerts to display in the DLO Administration Console. To configure DLO alerts: 1. On the DLO navigation bar, click Alerts. 2. Under General Tasks in the task pane, click Configure alerts.
Configure Alerts Dialog Box
3. Select the alerts you want to receive, and clear the check boxes for the alerts you do not want to receive. 4. Click OK.
1204 Administrators Guide
Managing Alerts
From the Alerts view in the DLO Administration Console, you can view a subset of alerts, clear alerts, and move alerts from the administration console to a history log. To view DLO alerts: 1. On the DLO navigation bar, click Alerts. 2. Under Views in the task pane, click Active alerts to view active alerts, or Alert history to view alerts that have been cleared. Note Alerts that are older than a specified number of days are cleared and moved into alert history. The number of days is specified in the Backup Exec Administration Console. 3. To filter alerts by type, select one or more options from Active Alerts View Filters or Alert History View Filters in the task pane as described below:
Active Alerts View Filters Item Show errors Show warnings Show information Description Lists error alerts for the selected view. Lists warning alerts for the selected view. Lists informational alerts for the selected view.
4. To view the properties of an alert, select the alert in the Active Alerts of Alert History list. Properties are displayed in the Alert Properties pane. To clear alerts: 1. On the DLO navigation bar, click Alerts. 2. If desired, filter the Alerts view as described in To view DLO alerts: on page 1205. 3. From the alert list, select one or more alerts that you want to clear. 4. Under Alert Tasks in the task pane, select Respond to clear only the selected alerts, or to change the status of all alerts to cleared, select Respond OK to all.
1205
DLO Reports
DLO Reports
DLO provides 12 standard reports that show detailed information about your DLO operations. When you generate a report, you can specify filter parameters or a time range for the data that you want to include in the report. You can also view general properties for each report. Reports are generated using Crystal Reports. If Adobe Acrobat is detected, reports are displayed in Adobe Portable Document Format (PDF). If Adobe Acrobat is not detected, the reports are displayed using HTML. Both PDF and HTML reports can be saved and printed. To view the list of available reports: 1. On the navigation bar, click Reports. 2. The Reports pane lists the report name, a description, and a category for each report. You can sort the reports in alphabetical or reverse alphabetical order by clicking Name.
DLO Reports Report Name Active Alerts by Machine Active Alerts by Time Description Lists all active alerts sorted by machine. Lists all active alerts chronologically, displaying the most recent alerts first. Lists all alerts sorted alphabetically by machine. Lists the alert history by computer. The most recent alerts are shown first. Lists the alert history in chronological order. The most recent alerts are shown first. Lists the alert history sorted by the user of the computer that generated the alert. Lists all machines running the Desktop Agent that failed the last backup. The list is sorted by desktop computer name. Note Only the last backup result is stored in the DLO database, so it is only possible to report the last backup result for each desktop computer and not a complete history of failed jobs. 1206 Administrators Guide
Failed Backup Jobs by Time Lists all machines running the Desktop Agent that failed the last backup. The list is sorted by time. Note Only the last backup result is stored in the DLO database, so it is only possible to report the last backup result for each desktop computer and not a complete history of failed jobs. Failed Backup Jobs by User Lists all machines running the Desktop Agent that failed the last backup. The list is sorted by Desktop Agent user name. Note Only the last backup result is stored in the DLO database, so it is only possible to report the last backup result for each desktop computer and not a complete history of failed jobs. Last Backup Status by Machine Lists all computers running the Desktop Agent and their last backup status. The list is sorted by desktop computer name.
Last Backup Status by Time Lists all the machines and their last backup status. The list is sorted by last backup time. Last Backup Status by User Lists all the machines and their last backup status. The list is sorted by Desktop Agent user.
Related Topics: Viewing Report Properties on page 1208 Running a Report on page 1209
1207
DLO Reports
Describes the type of data that is included in the report. Classification for the report. Available report categories include:
Author Subject
The version of the product for which the report was created.
The primary information used to categorize the report.
The location of the report template. The size of the report template. The date the report was installed on the system.
1208
Administrators Guide
DLO Reports
Running a Report
When you run a report, you can specify filtering criteria to determine which items will be included in the report. After the report is generated, only the items that match the entered criteria appear in the report. If no criteria are entered, all available entries are included in the report. To run a report: 1. On the navigation bar, click Reports. 2. On the Reports pane, select the report you want to run. 3. Under Report Tasks in the task pane, click Run report now. 4. Select the appropriate parameters for the data you want to include in the report from the following available parameters:
Report Filters Item Computer Description Check this box and enter a desktop computer name to generate a report for the specified desktop computer only. Check this box and enter a user name to generate a report for the specified Desktop Agent user only. Check this box and enter the number of days you would like the report to reflect.
User
Days
5. Click OK to run the report. The report can be printed or saved before it is closed. 6. Click OK to close the report.
1209
1210
Administrators Guide
To move a Storage Location in a DLO cluster environment: Note These steps must be performed before you take DLO out of the cluster. 1. If the Storage Location is on a shared drive or virtual server, you must move the user data for all of the Storage Location users. Move the user data to a Storage Location on the local node. 2. Modify all automated user assignments that are configured to use the Storage Location on the shared drive or virtual server so that they use another Storage Location on the local node. 3. Verify that all user data was moved off the Storage Location on the shared drive or virtual server and then delete it from the shared drive or virtual server. To upgrade an existing Backup Exec 9.x cluster and add DLO to the cluster: 1. Install Backup Exec 9.x on the active Backup Exec cluster node. Do not select the DLO option. 2. Install Backup Exec 9.x on each failover node. Do not select the DLO option. Note Install Backup Exec when the node has access to the shared Backup Exec cluster disk. 3. Use the Cluster Configuration Wizard on the active Backup Exec cluster node to uncluster all nodes. Click No when you are prompted to remove data on the shared drive. Click Yes when you are prompted to make the data available to the local node. 4. Install DLO on all cluster nodes. All nodes must have DLO before you can recluster them. 5. From the server you used in step 3, use the Cluster Configuration Wizard to reconfigure cluster-aware Backup Exec with the same virtual server name. 6. Add all cluster nodes that were upgraded. The DLO services are added to the Cluster Administrator.
1211
To upgrade an existing Backup Exec 8.x cluster and add DLO to the cluster: 1. Uninstall Backup Exec 8.x and the Remote Agent for Windows from all failover nodes. 2. Uninstall the Remote Agent for Windows from the active Backup Exec cluster node. 3. Reboot the active Backup Exec cluster node. 4. Install Backup Exec 9.x on the active Backup Exec cluster node. Do not select the DLO option. When the upgrade completes, the server is the only node in the Backup Exec 9.x cluster configuration. See also: Using Symantec Backup Exec with Server Clusters on page 657 Installing the Backup Exec Desktop and Laptop Option on page 1130 Installing Backup Exec on a Microsoft Cluster Server on page 660
1212
Administrators Guide
W <password>
1213
Commands in Detail
See the following topics for detailed information on available commands:
-AssignSL Command on page 1214 -EnableUser Command on page 1216 -ChangeServer Command on page 1217 -KeyTest Command on page 1218 -ListProfile Command on page 1218 -ListSL Command on page 1219 -ListUser Command on page 1220 -LogFile Command on page 1221 -Update Command on page 1222 -EmergencyRestore Command on page 1224 -SetRecoveryPwd Command on page 1225 -DisableNCOM Command on page 1225 -RenameUser Command on page 1225 -NotifyClients Command on page 1227 -InactiveAccounts Command on page 1227 -CreateRecoveryKeys Command on page 1228
-AssignSL Command
The AssignSL command is used to assign a new Storage Location to existing users when the existing Storage Location is no longer available. Caution The Move User command should be used to move users to new Storage Locations if the existing Storage Location is accessible. See Moving a Desktop Agent User on page 1182 for additional information. Desktop Agent Users can be assigned to new Storage Locations based on User account name, Profile name, Profile ID, Storage Location, Storage Location ID, and File server. The Desktop Agent that is being moved will be disabled until the media server is notified that the move is complete.
1214
Administrators Guide
Backup data is not moved from the old Storage Location to the new Storage Location with this command. Syntax: DLOCommandu assignsl NI [A | F | P | PI | S | SI | U ] Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
Command Options:
AssignSL Options Option NI <newSLID> A F <file server> Description New storage location ID Assigns new storage location to all users Assigns new storage location to users with storage locations on the named file server Assigns new storage location to users with named profile Assigns new storage location to users with given profile id Assigns new storage location to users with named storage location Assigns new storage location to users with given storage location id Assigns new storage location to named user account only
SI <SL id>
U <user>
1215
-EnableUser Command
The -EnableUser command is used to enable or disable a user. User(s) can be enabled or disabled by All, file server (all storage locations), profile name, profile ID, storage location name, storage location ID or username. Use this command if you want to force the desktop computer to refresh from the media server. Syntax: DLOCommandu -enableuser [ E | D ] [ A | F | P | PI | S | SI | U ] Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
Command Options:
EnableUser Command Options Option A E | D Description Enables or disables all user on your media server Enables or disables a user account. The default value is to enable a user (i.e. E). Enables or disables users with storage locations on the named file server Enables or disables users with named profile Enables or disables users with given profile id Enables or disables users with named storage location Enables or disables users with given storage location id Enables or disables named user account only
F <file server>
1216
Administrators Guide
-ChangeServer Command
The -ChangeServer command is used to switch users to another media server. Syntax: DLOCommandu ChangeServer M <media server> [ A | F <file server> | P <profile name> | PI <profile id> | S <SL name> | SI <SL id> | SP <SL path> | U <user> ] Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
Command Options:
ChangeServer Command Options Option A F <file server> M <media server> P <profile name> PI <profile id> S <SL name> SI <SL id> SP <SL path> U <user> Description Switches all user (default) Switches users with storage locations on the named file server The new media server name Switches users based on profile name Switches users based on profile id Switches users based on storage location name Switches users based on storage location id Switches users based on storage location path Switches users based on user name
-KeyTest Command
The -KeyTest command scans network user data to identify encrypted data that cannot be restored with the current encryption key. Syntax: DLOCommandu KeyTest <quarantinepath> Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
Command Options:
KeyTest Command Options Option <quarantinepath> Description If specified, unrestorable data is quarantined to this path. Once the unrestorable files are quarantined, the DLOAgent will back up the original files again with the new encryption key. The quarantine folder will be created if it does not exist, and should not specify an existing storage location. If not specified, the data is scanned without being quarantined, and a report will be generated.
-ListProfile Command
The -ListProfile command is used to list profiles of DLO users. Syntax: DLOCommandu listprofile [ A | P ]
1218
Administrators Guide
Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
Command Options:
ListProfile Command Options Option A P <profile name> Description Lists settings for all profiles (default) Lists settings for only named profile
-ListSL Command
The -ListSL command is used to list the DLO storage locations. Syntax: DLOCommandu listsl [ A | F | S ] Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
1219
Command Options:
ListSL Command Options Option A F <file server> S <SL name> Description Lists all storage locations (default) Lists storage locations for the named server Lists only the named storage location
-ListUser Command
The -ListUser command is used to list by All, file server, profile name, profile ID, storage location name, storage location ID or username. Syntax: DLOCommandu listuser [ A | F | P | PI | S | SI | U ] Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
1220
Administrators Guide
Command Options:
ListUser Command Options Option A F <file server> Description Lists settings for all users (default) Lists settings for users with storage locations on the named file server Lists settings for users by profile name Lists settings for users by profile id Lists settings for users by storage location name Lists settings for users by storage location id Lists settings for users by user name
Examples: DLOCommandu listuser A DLOCommandu listuser P yourprofile DLOCommandu listuser U mmouse DLOCommandu listuser U m*
-LogFile Command
The LogFile option allows administrators to change the path or name of the LogFile. And, since every command overwrites the LogFile, in order to track all events (logs), you must change the path\name of the next LogFile in order to retain older versions. The default path is the \Logs folder under the installed path: C:\Program Files\VERITAS\Backup Exec\NT\DLO\Logs Syntax: LogFile <path\file>
1221
Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
Command Options:
LogFile Command Options Option <path> <file> Description Specifies the path to the new LogFile Specifies the filename for the new LogFile
-Update Command
The -Update command is used to list, add, remove and publish client updates. See Updating DLO on page 1131 for additional information on updating DLO. Syntax: DLOCommandu update [ list | add | remove | publish ]
1222
Administrators Guide
Subcommands:
Update SubCommands SubCommand List [-A|UI <update id>] Add F <file name> Description Lists settings for previously used updates. Adds an update definition file to the updates list and assigns it a unique UI. Removes a file or files from the list. Makes updates specified by the update definition file available to the users, and specified by P | PI | U.
Remove [-UI <update id>|A] Publish [-R] UI <update id> [P <profile name>|PI <profile id>|U <user>]
Note Wildcard matches (*) are permitted in Profile, Storage Location and user names. Quotations are required around names if the name contains a space or colon.
1223
Command Options:
Update Command and Sub-Command Options Option A F <file name> U <user name> Description Updates all Specifies a text file that contains update records Specifies a fully qualified user name, such as Enterprise\JFord Specifies a profile name Specifies a profile record id Designates to unpublish Specifies an update record id
Examples: DLOCommandu -update -add -f cntlfile.txt DLOCommandu -update -list DLOCommandu -update -remove -UI 3 DLOCommandu -update -publish -UI 63 -P yourprofile DLOCommandu -update -publish -R -UI 33
-EmergencyRestore Command
The -Emergency Restore command uses the DLO administrators recovery password to restore user data that would otherwise be unavailable if the DLO database is damaged or corrupted. The recovery password must be known to execute this command. The data will be restored to the specified location in the original data structure, but it will no longer be encrypted. See Setting a Recovery Password on page 1135 for more information. Syntax: DLOCommandu EmergencyRestore <usersharepath> -W <recovery password> -AP <destination path>
1224
Administrators Guide
Command Options:
Update Command and Sub-Command Options Option <usersharepath> -W <recovery password> -AP <destination path> Description Specifies the full path to the user share directory Specifies the recovery password
-SetRecoveryPwd Command
The -SetRecoveryPwd command is used to change the recovery password. The -CreateRecoveryKeys command is automatically executed when -SetRecoveryPwd is run. See Setting a Recovery Password on page 1135 for more information. Syntax: DLOCommandu SetRecoveryPwd <password>
-DisableNCOM Command
The -DisableNCOM command prevents data, logs or alerts from being transferred to the Network User Data Folder when connected via modem. By default, DLO will transfer data even when connected by modem. Syntax: To disable transfers to the Network User Data Folder when connected via modem: DLOCommandu -DisableNCOM -on To allow file transfer while connected via modem (default): DLOCommandu -DisableNCOM -off
-RenameUser Command
The RenameUser command is used when a user account was renamed in a domain or on a local machine.
1225
Caution This command should only be used when an account is renamed in the specific scenarios described below. It cannot be used to change from one user account to another and does not rename users in the domain. Scenario 1 A domain account has been renamed. This change needs to be reflected in DLO. Syntax: dlocommandu -renameuser -oun domain\olddomainusername -nun domain\newdomainusername dlocommandu -renameuser -oun machinename\localusername -nun newdomainusername Note -oun specifies the old user name and -nun specifies the new user name. Example 1: The domain user name has changed from mydomain\ johndoe to mydomain\ janedoe. The user logs in using the domain account. dlocommandu -renameuser -oun mydomain\ johndoe -nun mydomain\ janedoe Example 2: The domain user name has changed from mydomain\ johndoe to mydomain\ janedoe. The user logs in to a local account named my account on a machine named mymachine. dlocommandu -renameuser -oun mymachine\myaccount -nun janedoe Scenario 2 The desktop user logs into the local machine using a local account and authenticates to DLO using a domain account. The local account is renamed. Syntax: dlocommandu -renameuser -oun machinename\oldusername -nun machinename\newusername To rename an account: 1. Have the Desktop User log off of the account that is to be renamed. This will exit the Desktop Agent. 2. Rename the account.
1226 Administrators Guide
3. Run the -RenameUser command 4. Have the Desktop User log back on under the new username. The Desktop Agent will automatically start. Note If a user is renamed in a domain and logs on to the desktop computer before the DLO administrator runs the -RenameUser command, a new account is automatically created for the new username. To correct this error, the administrator should first delete the new user in the DLO administration console and then run -RenameUser to rename the account.
-NotifyClients Command
The -NotifyClients command forces the Desktop Agents to refresh the Profile settings immediately, or the next time the Desktop Agent connects if it is offline. Syntax: dlocommandu -notifyclients
-InactiveAccounts Command
The -InactiveAccounts command is used to list and delete accounts that have not been used in a specified number of days. To list inactive accounts: dlocommandu -inactiveaccounts -list -days <#days> This command returns a list of inactive accounts that includes the following information which is used to delete specific accounts:
To delete specific inactive accounts: dlocommandu inactiveaccounts -delete U <domain\username> -M <machine name> -days <#days>
1227
dlocommandu inactiveaccounts -delete UI <userID> -MI <machine ID> -days <#days> Where U and -M are used to delete the user and machine by name and UI and -MI are used to delete the user and machine by ID. To delete ALL accounts inactive for a specified number of days: dlocommandu -inactiveaccounts -delete -a <#days>
-CreateRecoveryKeys Command
The -CreateRecoveryKeys command is now obsolete. Recovery keys are now managed automatically by the Desktop Agent. Related Topics: Setting a Recovery Password on page 1135 Data Integrity Scanner on page 1135
1228
Administrators Guide
Data Protection. Selected files on the desktop are automatically copied to User Data Folders on the desktops local drive and on the network. The Desktop Agent can be configured so that no user interaction is required. Files are protected automatically when the desktop is online or offline. Backup Exec protects the data by backing up the Network User Data Folders on the DLO file server. Data Availability. A user can access data from multiple desktops in multiple locations if they are using the same login credentials. Users can also restore previous file revisions even when the desktop is offline if they are saving at least one file revision in the Desktop User Data Folder. Synchronization. A user that accesses multiple computers with the same login credentials can configure folders to be synchronized on each of the computers. When a synchronized file is changed on one computer, the updated file is copied to the Network User Data Folder and also to the Desktop User Data Folder on all other computers that are configured for synchronization.
1229
Disk Space
Other Hardware
1230
Administrators Guide
Display only the system tray icon. The desktop user sees only the Desktop Agent icon in the system tray in the lower right corner of the screen. Desktop users can right click on the system tray icon to exit the program. Do not display anything. The Desktop Agent runs in the background. The desktop user cannot view the Desktop Agent.
Desktop Agent Console Menu bar Tasks bar Views menu
Tasks menu
1231
Tasks bar
Views menu
Status
Enables you to configure the Desktop Agent to maintain a users selected files and folders on multiple computers so that the most recent backed up version is always available to the user. Enables the user to restore backed up data and search for backed up files. Displays Desktop Agent error, warning, and informational messages. Enables you to modify settings that determine how the Desktop Agent operates. Actions are initiated from the tasks menu. These actions vary with the selected view.
Restore
History Settings
Tasks menu
Note To ensure that you have the latest status and settings at any time while using the Desktop Agent, from the Tasks menu, click Refresh.
1232
Administrators Guide
1233
To install the Desktop Agent: 1. From the desktop on which you want to install the Desktop Agent, browse to the network server where the installation files for the Desktop Agent are stored. The default location is \\<Backup Exec media server name>\DLOAgent. If you are unsure of the location, contact the administrator. 2. Double-click the file setup.exe. 3. On the Welcome screen, click Next. 4. Read the license agreement, and then click I accept the terms in the license agreement. 5. Click Next. 6. Select either Typical or Custom, and then click Next. Use the Typical option to install all of the Desktop Agent features in the default location C:\Program Files\VERITAS\Backup Exec\NT\DLO. Use the Custom option to change the location on the desktops local drive where the Desktop Agent will be installed, or to select the installation set for a language other than English. The Custom option is recommended for advanced users only. 7. If you selected Typical, go to step 9. If you selected Custom, select from the following:
Click the Installable Languages icon to install the install set in languages other than English. Click Change to change the location on the desktops local drive where the Desktop Agent will be installed. The default location for the Desktop User Data Folder is C:\Documents and Settings\UserName\Local Settings\Application Data\VERITAS\DLO\.dlo\.lm\ Browse to the folder or type the path in the Folder name field and then click OK.
8. Click Next after making your selections. 9. Click Install. 10. Click Finish. The Desktop Agent is installed on the desktop.
1234
Administrators Guide
You can only use a set of domain credentials with one local account. If you use more than one local account on a desktop or laptop computer, you should either disable DLO for other accounts or have unique domain credentials for each account. See To log on with alternate credentials or to disable accounts: on page 1237 for additional information. Example If you usually log on to the desktop computer as myusername, you should have a domain account to use for DLO with this account. If you also occasionally log on as administrator, DLO can be disabled when you are logged on to this account. Alternately, you can provide a unique set of domain credentials to use for DLO when you are logged on as administrator.
Multiple users of the same desktop computer can all use DLO, but must provide unique credentials for the desktop computer and unique domain credentials for authentication with DLO.
1235
Agent operations so that the Desktop Agent will not run when you are logged on with the account currently being used. This dialog allows you to save this account info for future connections. Note If you have a previously established network connection to the media server and it does not match the account the Desktop Agent is using, the Desktop Agent will attempt to reconnect as the Desktop Agent user. If this fails, the following error displays: Multiple connections to a server or shared resource by the same user, using more than one user name, are not allowed. Disconnect all previous connections to the server or shared resource and try again. The account used by the Desktop Agent is the logon account by default, but could be an alternate account if one has been specified; for example, to connect across domains. Using alternate credentials to work across domains In a cross-domain configuration where there is no trust relationship, if multiple users are running the same Desktop Agent, each user must provide a unique user name and password in the media server domain. If different users use the same credentials, DLO displays an error message stating that the user is already connected to the media server. Note For information on resetting accounts that have been disabled for Desktop Agent operation, see To reset dialogs and account information: on page 1233.
1236
Administrators Guide
To log on with alternate credentials or to disable accounts: 1. When you are logged on to the desktop computer with an account that is not recognized by the Desktop Agent, the Alternate Credential dialog box will appear.
Alternate Credential Dialog Box
Password
3. Click OK.
Appendix L, Backup Exec Desktop and Laptop Option 1237
A folder or list of folders Criteria for the files to be included or excluded from the backup Limits on the number of file revisions to retain Settings for compression, backup file deletion, and encryption
Managing Revisions
Revisions are versions of a file at a specific point in time. When a file is changed and backed up, DLO stores a new revision. DLO stores and maintains a specific number of revisions for all files in a backup selection. Because each backup selection is configured separately, the number of revisions retained can vary for different backup selections. When the number of revisions is exceeded, DLO removes the oldest revision, maintaining only the specified number of revisions in the desktop and Network User Data Folders.
1238
Administrators Guide
You can limit the number of revisions DLO retains in a given period of time. If you are working on a document and backing it up frequently, all of your revisions could potentially be just a few minutes apart. By specifying that you want to retain only 2 revisions every 24 hours, at least 120 minutes apart, you can retain older revisions for a longer period of time. While some intermediate versions will not be retained, it does support situations in which returning to an older revision is needed. Another consideration in determining the number of revisions to retain is the amount of storage space required to store the data. The amount of space required for backups can be estimated by multiplying the number of revisions retained by the amount of data protected. Example If you are retaining three revisions of each file and have 10 MB to back up, approximately 30 MB of disk space will be required. Although compression can improve the space utilization, it varies significantly with file type and other factors. Related Topics: Modifying Backup Selections in the Standard View on page 1239 Adding Backup Selections in the Advanced View on page 1241 Backing up Outlook PST files on page 1247 Restoring Microsoft Outlook Personal Folder Files on page 1268
File Grooming
The Desktop Agent grooms revisions based on backup selection settings and does this as new revisions are created. The oldest revision is deleted when a new revision is created that exceeds the limit. Maintenance grooming is the grooming off of deleted files. It occurs at most once every 24 hours. Maintenance grooming occurs during the first backup that runs after 24 hours have passed since the last maintenance grooming.
boxes. They can be modified in the advanced view if the administrator has granted you sufficient rights. See Modifying Backup Selections in the Advanced View on page 1245 for additional information. When you create new backup selections in the standard view, the default backup selection settings are used. When you add new subfolders and files to the backup selection using the standard view, these new backup selections will have the same settings as the main folders.
Standard View
To modify backup selections in the Backup Selections Standard view: 1. Under Views in the Tasks Bar, click Backup Selections. 2. Click Standard view. 3. Select the folders and files you want to back up. Expand selections by clicking the plus sign (+) and collapse selections by clicking the minus sign (-). Note To return to the last saved settings at any time, click Undo changes.
1240
Administrators Guide
4. Click Save changes to save the new settings or Undo changes to return to the last saved settings. After clicking Save, previously backed-up selections that were unchecked are treated like deleted backup selections and will no longer be backed up. The backup files for this selection will be deleted after the number of days specified in the backup selection settings. The source files for the deleted backup selection will not be deleted by the Desktop Agent. Checked folders that were not previously checked are added to the backup selections for this desktop.
1241
4. From the General tab in the Backup Selection dialog box, select the appropriate options as follows:
Backup Selection General Dialog Box Item Name Description Description Type a descriptive name for the backup selection. Type a description of the backup selection. This description may include, for example, the folder selected, or the purpose for creating the backup selection.
Folder to back up Type a folder name Select this option to add a specific folder to the backup selection, and then type the path to the folder, including the folder name. For example, to add a folder named MyData on drive C:, type C:\MyData. Select this option to choose a pre-defined folder from the list provided. Select this option to also back up all subfolders in the specified directory.
Include and exclude only Select this option to include or exclude only specific files or file the items listed below types.
6. Click Add Include or Add Exclude to add a filter to the Include/Exclude list.
1242
Administrators Guide
Select this option to add common file types to your include or exclude list. To select multiple file types, click one item and press <Ctrl> or <Shift> while clicking the other items. Select this option to add a custom file or file type to your include or exclude list. Select Files to apply this filter to files or Folders to apply this filter to folders. Type the name of the file or the folder, or a wildcard description of the file or folder that you want to include or exclude from backup selections. Type a description of the custom filter.
Apply to
Filter
Description
1243
8. From the Revision Control tab, select the appropriate options for the desktop and Network User Data Folders as follows:
Backup Selection Revision Control Dialog Box Item Description
Specify the number of revisions to keep in the desktop and Network User Data Folders Desktop User Data Folder Type the number of revisions to keep in the Desktop User Data Folder for each file in the backup selection. Note When Outlook PST files are backed up incrementally, only one revision is maintained regardless of the number of revisions set in the backup selection. Limit to Check this option to limit the number of revisions retained in a given amount of time, and specify the following:
Versions. Select the number of versions to retain. Within the last x hours. Select the time period during which you want to retain the versions. At least x minutes apart. Select the minimum amount of time that must elapse between backups in this backup selection.
Note The oldest revision is deleted when a new revision is created that exceeds one of these limits. Network User Data Folder Limit to Select the number of revisions to keep in the Network User Data Folder for each file in the backup selection. Check this option to limit the number of revisions retained in a given amount of time, and specify the following:
Versions. Select the number of versions to retain. Within the last x hours. Select the time period during which you want to retain the versions. At least x minutes apart. Select the minimum amount of time that must elapse between backups in this backup selection.
Note The oldest revision is deleted when a new revision is created that exceeds one of these limits.
1244
Administrators Guide
4. Profile backup selections are those set by the DLO administrator. If the backup selection is a Profile backup selection, and if the user has been granted sufficient rights, it can be modified by selecting Use custom selection in the drop down menu. Once this option is selected, your backup selection will no longer be updated when the administrator updates the Profile backup selection. You can return to the Profile backup selection settings at any time by selecting Use Profile selection in the drop down menu. Once you make this selection, your Profile will be updated if the DLO administrator modifies the Profile backup selection.
Use Custom Selection
5. Modify the backup selection properties as needed. For detailed information on backup selection settings, review the instructions for setting up a backup selection beginning with step 4 on page 1242. 6. Click OK.
1246
Administrators Guide
Both DLO and Outlook access PSTs via the MAPI process. MAPI opens a PST upon request from the application. MAPI may or may not, depending on the version in use, close a PST in response to the following:
An application such as DLO or Microsoft Outlook detaches from the PST, such as when Outlook is closed DLO startup After 30 minutes of inactivity in the PST
When the PST is closed DLO does one of the following. If the PST is being handled incrementally via MAPI (see section on incremental PSTs) DLO determines if the PST has been backed up in its entirety. If it has already been backed up then the entry is simply removed from the Desktop Agent pending queue because DLO knows the PST is in sync. If the PST is not being handled incrementally, the PST will be backed up in its entirety at this time. Related Topics: Restoring Microsoft Outlook Personal Folder Files on page 1268
1248
Administrators Guide
Backup job schedule options Desktop User Data Folder location Desktop User Data Folder disk space limits Log file disk space limits Logging level Bandwidth usage
The Desktop Agent will continue to use settings specified in the Profile until you specifically elect to use customized schedules or options as described in Changing Backup Job Schedule Options on page 1250 and Setting Customized Options on page 1252. Settings cannot be changed when the Desktop Agent is offline, or when the media server is not available. The Desktop Agent periodically contacts the server to check for setting changes. If you attempt to change settings after the Desktop Agent has attempted to contact the server and is aware that it is not available, you will be told that settings cannot be changed until the server is available. If the server has recently gone down and the Desktop Agent is not aware that it is unavailable, you will be able to select new settings, but will receive an error message when you try to save the new settings. This message will indicate that configuration settings failed to load because the media server is unavailable. Note Changing settings on one Desktop Agent causes settings to be loaded on other Desktop Agents that use the same authentication. This will cancel and restart any running jobs. When the DLO administrator changes Profile settings, the Desktop Agent scans all files selected for backup on each desktop computers assigned to the Profile.
1249
1250
Administrators Guide
Using the Desktop Agent Job Schedule Options (continued) Item Options: Automatically run jobs when logging on Select this option to start the backup jobs when you log on. Note This option is only applicable when backing up according to a schedule or manually. Select this option to start the backup jobs when you log off. Note This option is only applicable when backing up according to a schedule or manually. Description
To change the location of the Desktop User Data Folder: 1. Under Views in the Tasks Bar, click Settings. 2. Click the Backup Folders tab. 3. Click Move.
1251
Using the Desktop Agent Settings Dialog Box, Backup Folders tab
4. In the Browse for folder dialog box, choose a new location for the Desktop User Data Folder. 5. Click OK twice.
1252
Administrators Guide
1253
Using the Desktop Agent Options Dialog Box (continued) Item Log warning messages Description Check to create logs for all operations that generate warnings.
Enable incremental Check to enable incremental backups of Microsoft Outlook backups of Outlook PST Personal Folder (PST) files. Incremental backups must be enabled files to allow PST files to be backed up while they are open. If this option is not checked, PST files that are configured in Outlook will be fully backed up each time the PST file is saved, which generally occurs when Outlook is closed. When Outlook PST files are backed up incrementally, only one revision is maintained regardless of the number of revisions set in the backup selection. Note DLO is unable to perform incremental backups of Outlook PST files unless Outlook is your default mail application. When you restore Microsoft Outlook PST files, the restored PST file will differ from the original PST file as explained in Restoring Microsoft Outlook Personal Folder Files on page 1268. Synchronized files cannot be backed up incrementally. For additional information, see Backing up Outlook PST files on page 1247.
1254
Administrators Guide
By synchronizing backed-up data, you can work on a file on any of your desktops with the assurance that you are working on the most recent version. The Synchronized Selections view displays folders backed up on your other desktops that are available for synchronization. Select any of these folders that you want to synchronize with the current desktop computer.
Synchronized Selections View
Note If you customize NTFS permissions or folder attributes for compression or encryption, you must reapply these settings after restoration or synchronization.
Backs up files that changed on the desktop. Makes synchronized files available to the other computers with which the desktop is synchronized. Downloads synchronized files that were changed on another computer and uploaded since the last DLO job ran. Retains all conflicting versions of files. You can then choose which version to use.
1255
When you back up files, you can set various filters, such as which types of files to include, exclude, compress or encrypt. When you synchronize files between computers, the filters are combined. For example, if one of the synchronized files is compressed and encrypted, all synchronized files will be compressed and encrypted automatically. If the number of files backed up on different computers varies, DLO synchronizes the largest number of files. For example, if you back up three files on computer A and back up five files on computer B, DLO synchronizes five files. You can manage synchronization using the following options:
Standard view: Enables you to create new synchronization sets. Advanced view: Enables you to modify settings for each synchronization set.
Note In order to use the synchronization feature, the clocks on all of the users computers must be synchronized. To synchronize a folder across multiple desktops: 1. Under Views in the Desktop Agent Tasks Bar, click Synchronized Selections. 2. Click Standard view. Desktops available for synchronization appear in the Remote Computers pane. Note A desktop must have the same owner and must be backed up with the Desktop Agent to appear in the Synchronized Selections view. Only backed up folders are available for synchronization. 3. Select the folders that you want to synchronize. 4. When the Choose Local Folder dialog box appears, type or browse to the location where the synchronized files are to be stored. 5. Click OK. 6. Click Save changes to save the selections or Undo changes to return to the last saved settings. To view or change a synchronized folder: 1. Under Views in the Tasks Bar, click Synchronized Selections. 2. Select the Advanced view radio button.
1256
Administrators Guide
3. Click on the folder to be viewed or modified. 4. Click Modify. The General tab in the Synchronized Folder dialog box identifies the location where synchronized files from this selection will be stored, and also lists other computers synchronizing with the selected folder. 5. Configure the synchronization folder settings as described for backup selection configuration, beginning with step 5 on page 1242. 6. Click OK. To remove a synchronized folder: Note When a synchronized selection is deleted, the backup files are deleted in the same manner as when source files are deleted. They will be groomed away after the number of days specified in the backup selection. 1. Under Views in the Tasks Bar, click Synchronized Selections. 2. Click the Advanced View radio button. 3. Click the synchronization selection to be deleted. 4. Click Remove. 5. When prompted, if you want to delete the backup selection, click Yes to continue or No to cancel.
1257
2. Click the Resolve conflicts button to open the Resolve Conflicts wizard. 3. Click Next. 4. Select the file you wish to resolve. 5. Click the Open Folder button. 6. Manage the revisions as desired. For example, to keep an older revision, you can delete the newer revision and rename the conflicting revision back to it's original name. 7. Click Finish.
1258
Administrators Guide
Details
Show/Hide Pending Files Hides or displays pending files. This selection toggles between Hide pending files and Show pending files when you click on the link. Usage Summary Network Usage Displays the total amount of data stored in the Network User Data Folder for this computer. Displays the total amount of data stored in the Desktop User Data Folder on this computer. This link is located just below the status summary and provides detailed information on folder usage for user data. For additional information, see Viewing Usage Details on page 1260.
Local Usage
Details
1259
Total disk space currently used on the network and desktop computer to store your backup data. Quotas, or maximum allowed storage space which can be used to store your data on the network and desktop computers. The disk space available on the network and desktop computer for storing your data.
Administrators Guide
1260
An option to immediately delete old revisions and deleted files. Links to additional information and help.
Note The link to usage details is only available when the Desktop Agent is idle. It will not be shown when a job is running. To view usage details and groom files: 1. Under Views in the Tasks Bar, click Status. 2. Under Usage Summary in the Status pane, click Details to open the Usage Details dialog.
Usage Details
1261
3. Review the usage information and take the appropriate actions as described below:
Usage Details Item User Data Folder Usage Local Summarizes disk space usage on the desktop computer for storing your data. The following information is provided: Using - The total disk space on the desktop computer currently being utilized to store your backup data. Quota - The maximum amount of disk space you can use to store your backup data on the desktop computer. The quota limit is set by the administrator in the Profile, but can be modified from the Desktop Agent Settings view if you have been given rights to modify settings. For additional information, see Modifying Desktop Agent Settings on page 1249. Available - The amount of free disk space available on the desktop computer for storing your data without exceeding a quota. If there is no quota, the Desktop Agent will reserve a small amount of disk space so the drive will not fill completely with backup data. Network Summarizes disk space usage on the network for storing your data. The following information is provided: Using - The total disk space on the network currently being utilized to store your backup data. Quota - The maximum amount of disk space you can use to store your backup data on the network. Available - The amount of free disk space available on the network for storing backup data for the current user without exceeding a quota. Description
1262
Administrators Guide
Using the Desktop Agent Usage Details (continued) Item Remove deleted files Description Select to immediately and permanently delete all files that are marked as deleted in your Network and Desktop User Data Folders. The periodic maintenance cycle will otherwise delete these files after the amount of time specified in your assigned Profile. Clicking this button will open the Remove Deleted Files dialog. Choose from the following options:
Remove only the deleted files that currently meet the backup selection deleted files criteria. Remove all deleted files.
Check the Remove files from the network user data folder checkbox to additionally groom deleted files from the Network User Data Folder. Additional information Click here to close this dialog and view your backup selections Some backup selections may have different revision and compression settings, which could contribute to the differences between local and network usage statistics. Click this link to view your backup selections. Click here to view last job log Click here to open the Log File Viewer. For additional information on the log file viewer, see Monitoring Job History in the Desktop Agent on page 1269.
1263
Caution If you attempt to connect to a server using characters in the share name that do not exist on the code page for the local system, the connection will fail. Code pages map character codes to individual characters, and are typically specific to a language or group of languages. If you customize NTFS permissions or directory attributes, such as compression or encryption for files or folders, you must reapply these settings after restoration. To restore files that are locked after the computer reboots, you must have local administrator rights.
1264
Administrators Guide
If you disconnect from the network while the Desktop Agent is running, you may encounter a slow response when browsing the Restore view. From the Tasks menu, select Refresh to fix this problem. To restore data: 1. Under Views in the Tasks Bar, click Restore. 2. In Show, select one of the following revision display options:
Restore File Version Display Options Item All revisions Description All file revisions will be displayed and available as restore selections. Only the latest file revision will be displayed and available as a restore selection. If selected, enter a date and time after which revisions will be displayed and available as restore selections, then click OK.
Latest revision
3. Select the items you want to restore. In some cases the Restore Search view may contain duplicate entries for the same file. If this occurs, you can select either file to restore and receive the same outcome. Note When you delete a file, the backup files are retained until they are deleted by the file grooming process. If an original file has been deleted, but backup files are still available, the icon for the file in the restore view will have a small red x to indicate the deletion of the original file. See File Grooming on page 1239 for additional information. 4. Click Restore.
1265
Restore to the original Select this option to restore files and folders to their original folders on this computer location. Redirect the restore to an alternate folder on this computer Preserve folder structure Select this option to restore files and folders to an alternate folder on the same computer.
Select to restore the data with its original directory structure. If you clear this option, all data (including the data in subdirectories) is restored to the path you specify.
Select this option if you want to restore files even though the source file has been deleted.
1266
Administrators Guide
Today
1267
Using the Desktop Agent Search Dialog Box Options (continued) Item Within the past week Description Select this option to search for files modified in the last calendar week. Select this option to search between calendar dates.
Between
Select this check box to select a file type from the list provided. Select this check box and then enter information as follows:
Select from equal to, at least or at most in the first drop-down menu Type a file size. Select KB, MB, or GB.
The file size will be different. Any rule that points to a folder inside a PST file will no longer work. You must edit the rule to point to the correct folder. Restored PST files will have Inbox, Outbox, and Sent Items folders, even if the original files did not have them. If you use a password for your PST file, you must reset the password after restoring your PST file.
1268
Administrators Guide
Errors
1269
1270
Administrators Guide
Using the Desktop Agent History View Filtering Options (continued) Item Logs filtered by date Description All logs generated after a specified date and time are displayed. Enter the date and time after which logs are to be displayed in the Filter by date dialog box and click OK.
4. Click the job history entry for which you want to view the history log. 5. Click View log to open the log file viewer. 6. If desired, click Save As to save the log file as a text file. 7. Click Close to exit the log file viewer.
1271
Using the Desktop Agent Log File Viewer Filtering Options (continued) Item With timestamp Description Check the With Timestamp box to search only those log entries within a specified time period. The options include: Today - Show only log files that were created today. Within the last week - Show all log files created in the last week. Between dates - Show all log files created between the dates entered. With Type Check the With Type checkbox to show only logs of the indicated type. You may select one of the following types:
Check the With Filename like checkbox and enter a filename, or file type. Wildcard entries are supported. Example: *gold.doc Note When using wildcards you must use the * wildcard. For example, *.tmp will return all results with the .tmp extension while .tmp will return only files explicitly named .tmp.
Filter All entries All entries except maintenance Failed entries only Warning entries only Maintenance entries only Display all matching log entries regardless of type. Select this option to display all entries other than those for maintenance operations, such as the grooming of deleted files. Select this option to display only entries for failed operations. Select this option to display only entries for warnings. Select this option to show only logs that reflect maintenance operations, such as the grooming of deleted files.
Local data folder entries Select this option to display all log entries for Desktop User Data only Folders.
1272
Administrators Guide
Using the Desktop Agent Log File Viewer Filtering Options (continued) Item Failed local data folder entries only Network data folder entries only Failed network data folder entries only Debug entries only Description Select this option to display only entries for failed Desktop User Data Folder operations. Select this option to display all log entries for Network User Data Folders. Select this option to only display entries for failed Network User Data Folder operations. Only debug entries are displayed.
4. Click Search. 5. To view detailed information for a log file entry, expand the tree view for the entry by clicking on the + checkbox.
Expanding a log file entry
6. If desired, click Save As to save the log file as a text file. 7. Click Close when finished.
1273
Troubleshooting
Troubleshooting
This section addresses problems or questions that may be encountered while running the DLO Administration Console or the Desktop Agent, and provides solutions for these problems. It is divided into the following two sections:
1274
Administrators Guide
Troubleshooting
Setting up a DLO Profile on page 1146 Moving a Desktop Agent User on page 1182 A desktop user ran the Desktop Agent and received an error indicating Unable to configure the Desktop Agent. No settings found for the current user and no automatic user assignments match. What does this mean? This message means that DLO could not find the user or an Automated User Assignment that matched the user's domain and group. Users are added to DLO in one of two ways: 1. An Automated User Assignment that matches the users domain and group assigns a Profile and Storage Location to the Desktop Agent and adds the user to DLO. Check that you have created Automated User Assignments that match the Domain and Group to which the user running the Desktop Agent belongs. You can also create an Automated User Assignment that will cover all domains and all groups in order to catch any users who might not match a more specific Automated User Assignment. Such a catchall Automated User Assignment would typically be set to the lowest priority. 2. Users are manually added to DLO. This process requires that you assign a Profile and either a Storage Location or User Data Folder to the new user. Be sure that the user has a matching Automated User Assignment, or is added manually before running the Desktop Agent. Related Topics: Setting up Automated User Assignments on page 1168 When do I need a Network User Data Folder, and when do I need a Storage Location? Every Desktop Agent user must have a Network User Data Folder, which is used to store backup data. Storage Locations are locations on the network where Network User Data Folders are automatically created and maintained. They are not required if existing network shares are used to store user data. If you want DLO to automatically create Network User Data Folders, use a Storage Location. When new users are added to a Storage Location, Network User Data Folders are automatically created for them within the Storage Location. Alternately, if you would like to use existing network shares as Network User Data Folders, or if you want to create Network User Data Folders manually, then do not use Storage Locations.
1275
Troubleshooting
Related Topics: Setting Up DLO on page 1145 I'm trying to create a Storage Location on a remote file server, and I am receiving an error indicating the MSDE Database Instance for the Desktop and Laptop Option needs to have access to the remote file server. What do I need to do? In order to create Storage Locations on a remote file server, you must use an account that has administrative rights on the remote file server. To change the account credentials used to create the Storage Location: 1. On the Tools menu, select Manage Service Credentials. 2. Select Change Service Account Information.er 3. Enter account credentials as follows:
Service Account Information Item Description
Change service account Check to change the service account information information User name Domain name Password Confirm password Enter the user name for the account to be used. Enter the domain for this account. Enter the password for this account. Enter the password again to confirm.
Using a Domain Administrator account is recommended. In order to create Storage Locations in another Domain, there must be appropriate trust relationships in effect. I manually added a new user and assigned the user to an existing Storage Location. I don't see a new User Data Folder for the new user in this Storage Location. Isn't it supposed to create one? User Data Folders are created only after the Desktop Agent is both installed on the desktop and run by the new user.
1276
Administrators Guide
Troubleshooting
How do I prevent a user from backing up data? 1. On the navigation bar, click Setup. In the Settings pane, click Users. 2. Select the user you do not want to be able to perform backups. 3. Under General Tasks in the Tasks pane, select Properties. 4. Clear the Enable user check box. 5. Select OK. The user's status will display as Disabled. In a Backup Selection, I selected to encrypt or compress my user's data. However, data that has already been backed up is not encrypted or compressed. Why is this? DLO does not retroactively apply changes to encryption and compression settings to user data that is already backed up. Any data backed up after these settings have changed will use the new settings. I would like to prevent files of specific types from being backed up. How can I set up DLO to always exclude files like *.mp3 or *.gho? On the Tools menu, select Global Excludes. In this dialog box, you can add specific file types that will be excluded in all Backup Selections for all Profiles. Backups do not seem to be running for all users, or specific files are not being backed up. If backup jobs are not running for a group of users, check the Profile for these users to verify that backups are scheduled. If specific files are not being backed up, review the Backup Selections in the Profile to verify that the files are selected for backup. I just tried to restore a file, but it doesnt appear to have been restored. When restoring existing files to their original location, verify that you have selected Prompt or Overwrite in the Restore dialog box to replace the file. If you select Do not overwrite, the file will not be restored. In a Profile, I configured backup selections to encrypt files. Now I need to recover files for a user. Do I need an encryption key in order to restore this data? As an Administrator running the DLO Administration Console, you can redirect a restore of encrypted user data to an alternate computer or location, and it will be decrypted during the restore.
1277
Troubleshooting
I would like to restore data to a user's computer, but that user is out of the office. Do I have to wait until that user returns to the office before I can start the restore? DLO can queue restore jobs to desktops. If the user is offline now, you can queue a restore job through the Restore view in the DLO Administration console. Another option is to restore the data to an alternate location, such as the administration computer or a network drive. How can I protect open files? DLO does not protect open files. It will attempt to back up files when they are closed or saved. If a file cannot be backed up because it is open (for example, a Word document you are editing) it will remain in the Desktop Agent's pending list. The Desktop Agent will attempt to back up the file at the next backup time. This also means that certain files opened by the operating system will not be backed up, they never close when the operating system is running. The exception to this is protection of open PST files. The Desktop Agent is designed to protect open PST files if they are part of the Profile or user's backup selections. Incremental backups must be enabled for open file backups of PST files. Related Topics: Excluding Files that are Always Open on page 1127 The History view in the DLO Administration Console doesnt show the most recent backup for all users. The DLO Administration Console is automatically updated when a job runs, but not more than once per hour.
Troubleshooting
The Desktop Agent installation program is located in a share where you installed DLO. This share will have a name in the following format: \\<Server>\DLOAgent. Using Windows Explorer, browse to this share from the desktop that you want to protect with the Desktop Agent. Run Setup.exe from this share. You must be an administrator on the desktop in order to install the Desktop Agent software. Symantec recommends that DLO administrators run the Configuration Wizard to familiarize themselves with the application. Can I install the Desktop Agent on Windows Servers or media servers? Because the Desktop Agent is designed to protect user data rather than critical server data, it cannot be installed on Windows Servers or media servers. I am receiving the following error while authenticating through the Desktop Agent to the media server: Failed to Initialize database. 0x800A0E7D You attempted to connect to the media server with an account that is not in the same domain, or a trusted domain, as the media server. For DLO to function properly, the media server must be in a Windows Domain. I have a desktop and a laptop computer protected by the Desktop Agent. Why can't I move my laptop to a new Storage Location? When a user has multiple computers running the Desktop Agent, all backup data is stored in the same Network User Data Folder. If you want to move your data to a new Storage Location, you must move the entire Network User Data Folder for all of your computers to that new location. I am trying to synchronize files between my desktop and laptop computers, but I cannot see my other computer in the Synchronization View in the Desktop Agent. In order to synchronize data between two computers, the same user account must be used when running the Desktop Agent on each computer. For example, the user Domain\MyUser must have backed up data on Computer A and Computer B in order for synchronization to take place between these two computers. If you are sure you have backed up data while running the Desktop Agent under the same user account on both of your computers, select Refresh in the Desktop Agent's Synchronization View to make the synchronization selections available. If this is not successful, Exit from the File menu and restart the Desktop Agent application. What files or folders can I synchronize between my computers? Any data backed up by a backup selection are eligible for synchronization. These backup selections may be defined by the DLO Administrator in the Profile or in a Backup Selection created with the Desktop Agent.
1279
Troubleshooting
I would like to share my synchronized data with my co-workers. How can I do this? The Desktop and Laptop Option does not provide functionality for sharing files between users. Synchronization is designed to share files between a single user's computers.
1280
Administrators Guide
Troubleshooting
1281
Troubleshooting DLO Administration Console Error Codes (continued) Error Code 0xCC00038E Error Message and Description Error Message: Access is denied. Explanation: You do not have permissions to access the required resources. Typical Cause: This is reported when trying to enumerate files and folders in the restore view, but the database service does not have permissions to read the files. Solution: Verify that the DLO Administration Console has the Automatically grant DLO administrators access to network user data folders option checked and a valid group is specified. If not, ask Administrator to manually grant read permissions to files and folders. 0xCC0003B6 Error Message: Failed to execute the create group share stored procedure. Explanation: Failed to execute the stored procedure that creates network storage location. Typical Cause: Database is down, or installation is corrupt Solution: Make sure the logon account of the database service and DLO administration service is a domain user account that has admin rights on the machine where you are trying to create a Storage Location. Verify that XPDLOShareu.dll and its dependent DLLs are properly installed in either in <DLO database install>\BINN or <DLO install>directory. Restart the database service and the DLO admin service.
1282
Administrators Guide
Troubleshooting DLO Administration Console Error Codes (continued) Error Code 0xCC00C404 Error Message and Description Error Message: Workgroups are not supported in this release. A domain is required. Explanation: Workgroups are not supported in this release of DLO. You must be in a domain. Typical Cause: Attempting to operate DLO in a workgroup. Solution: Operate DLO in a domain, not a workgroup.
1283
Troubleshooting
Log off and then log back on. Unmap a drive that is mapped to the server. Right click on My Computer. Choose Manage and then navigate through System Tools > Shared Folders > Sessions and then disconnect.
0xCC000064
Error Message: Unable to connect to media server. Explanation: You may be disconnected from the network or, the media server is unavailable. Typical Cause: This error is shown if you were previously working online and attempted to refresh or change a setting just after the media server went offline. Solution: Verify that your computer is connected to the network and attempt to connect again. If the problem persists, contact your administrator. The server may be temporarily unavailable.
1284
Administrators Guide
Troubleshooting Desktop Agent Errors (continued) Error Code 0xCC00C422 Error Message and Description Error Message: The user 'domain1/username1' is already using the credentials 'domain2/username2' to log into server. Explanation: DLO requires unique authentication credentials for each computer in order to uniquely identify computer owners. Typical Cause: Multiple users on the same client computer are trying to use the same authentication credentials to the server. Solution: Provide unique authentication credentials for each user on a multi-user computer. 0xE0140007 Error Message: Unable to configure the Desktop Agent. Explanation: No settings or matching Automated User Assignments were found for the current user. Typical Cause: DLO may not have been configured correctly. Solution: Desktop user should contact their administrator to insure they are either pre-configured or have matching Automated User Assignments. For additional information, see Setting Up DLO on page 1145. 0xCC007671L Error Message: Desktop user data folder storage limit has been reached. Explanation: The storage limit that was set by the administrator for the Desktop User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Desktop User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator.
1285
Troubleshooting Desktop Agent Errors (continued) Error Code 0xCC00765DL Error Message and Description Error Message: Network user data folder storage limit has been reached. Explanation: The storage limit that was set by the administrator for the Network User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Network User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator. 0xCC00764AL Error Message: An attempt to copy a file to the desktop user data folder failed due to insufficient disk space. DLO stops copying files to the desktop user data folder when copying an additional file would result in less than x% disk space remaining. Explanation: The storage limit that was set by the administrator for the Desktop User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Desktop User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator.
1286
Administrators Guide
Troubleshooting Desktop Agent Errors (continued) Error Code 0xCC007636L Error Message and Description Error Message: An attempt to copy a file to the network user data folder failed due to insufficient disk space. Explanation: The storage limit that was set by the administrator for the Network User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Network User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator. 0x8C007666L Error Message: The volume containing the desktop user data folder is approaching its storage limit. There is less than x% of the allotted space remaining. Explanation: The storage limit that was set by the administrator for the Desktop User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Desktop User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator.
1287
Troubleshooting Desktop Agent Errors (continued) Error Code 0x8C007544L Error Message and Description Error Message: Approaching network user data folder storage limit. Explanation: The storage limit that was set by the administrator for the Network User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Network User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator. 0x8C00763EL Error Message: The volume containing the desktop user data folder is running low. There is less than x% disk space remaining. Explanation: The storage limit that was set by the administrator for the Desktop User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Desktop User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator.
1288
Administrators Guide
Troubleshooting Desktop Agent Errors (continued) Error Code 0x8C00762AL Error Message and Description Error Message: The volume containing the network user data folder is running low. There is less than x% disk space remaining. Explanation: The storage limit that was set by the administrator for the Network User Data Folder has been reached. Typical Cause: You are backing up more data than will fit in the Network User Data Folder. Solution: Reduce the scope of your backups, remove unnecessary data, reduce the number of revisions you are retaining, or talk to your administrator.
1289
Troubleshooting
1290
Administrators Guide
Troubleshooting History Log Errors (continued) Error Code 0xE0140009 Error Message and Description Error Message: Out of disk space Explanation: The destination volume is out of disk space. Solution: Free disk space on the destination volume or increase the quota. 0xE014000D Error Message: Object is locked by another process Explanation: The source file is in use by another process. Typical Cause: A running application is using the file. Solution: Close the application that is using the file. 0xE0140093 Error Message: Network resource unreachable Explanation: The Network User Data Folder cannot be accessed. Typical Cause: The network is disconnected or misconfigured or the file server is offline. Solution: Reconnect to the network, and if the problem persists, contact your administrator. 0xE0140095 Error Message: Bad network path Explanation: The Network User Data Folder is unreachable. Typical Cause: The network is disconnected or misconfigured or the file server is offline. Solution: Reconnect to the network, and if the problem persists, contact your administrator.
1291
Troubleshooting History Log Errors (continued) Error Code 0x80040401 Error Message and Description Error Message: The Outlook PST handler has timed out. Please confirm that Outlook is configured. Explanation: The Outlook PST handler is unable to initialize. Typical Cause: Outlook is installed on the system, but not configured for the logged in user. Solution: Configure Outlook. 0x8007007B Error Message: The filename, directory name, or volume label syntax is incorrect. Explanation: DLO is unable to create the destination file. Typical Cause: 1. The filename contains characters which are not supported on the destination volume. 2. The maximum filename length supported by DLO is 235 characters when using NTFS on Windows XP and prior. 3. The destination volume is unreachable. The volume is corrupt or disconnected from the network. Solution: 1. Simplify the filename. 2. Shorten the filename. 3. Check that the destination volume is available and intact.
1292
Administrators Guide
Glossary of Terms
Glossary of Terms
Administrator The user that configures DLO using the Backup Exec DLO Administration Console. This user must have administrative rights to operate the console. Authentication The process of validating a users credentials. Automated User Assignments Rules that assign Profiles and Storage Locations to a specified group of desktop users. Settings are applied the first time a user runs the Desktop Agent. Backup Exec Administration Console The administrators interface with Backup Exec. Compression A method of reducing data to expedite transmission time or storage volume. DLO Administration Console The administrators interface with the Desktop and Laptop Option. DLO backup selection The files and folders on a desktop or laptop that are selected for backup by the DLO Administrator or desktop user. DLO database The location where policy settings and status information are stored. DLO file server The computer that hosts DLO Storage Locations. This computer can be the Backup Exec media server or another server. Desktop Agent install share The network share where the Desktop Agent install files are located. This folder is set up on the Backup Exec media server when DLO is installed, and facilitates the installation of the Desktop Agent on desktops.
1293
Glossary of Terms
DLO Storage Location A shared location on the network in which Network User Data Folders and backup files are stored. Desktop Agent The DLO software that runs on desktop and laptop computers. Desktop Agent console The user interface for the Desktop Agent software. Encryption A process used to ensure data security of files and folders on disk and during data transfer. Open file handling The process by which files currently in use can be backed up. Optimization The process of reducing network traffic and file storage through technologies such as compression. Profile DLO settings configured by the administrator and that apply to users or groups of users. Revision A version of a file at a specific point in time. Synchronization The process that maintains the most recent version of selected files and folders belonging to the same user on multiple desktops. Synchronization is available for files and folders that are backed up by DLO. Task An accessible program function that varies with the view selected in the DLO administration console or Desktop Agent console. User The person who operates the desktop or laptop computer on which the Desktop Agent is run.
1294 Administrators Guide
Glossary of Terms
User data folder The folder in which user backup data is stored. There is a User Data Folder on each desktop that is protected by the Desktop Agent, and one User Data Folder on the network for each Desktop Agent user. User name The user name used for Windows authentication. View The main navigational interface in the DLO Administration Console.
1295
Glossary of Terms
1296
Administrators Guide
Appendix
Note The Oracle Agent takes advantage of the Oracle Database Services ability to create a copy of a databases control file while the database is online. Using this feature, the agent can back up the copy of the databases control file while the database is actually being backed up online.
Windows 2000, Windows XP, or Windows Server 2003. Backup Exec for Windows Servers 9.x or later. One of the following supported databases: Oracle Database Server Version 8.0.5, 8i, 9i, or 10g, and Oracle Application Server 9i.
1298
Administrators Guide
Oracle database data types you can protect Item Tablespace Data Description Tablespaces appear as subdirectories within the listed database instances. Data files that comprise the tablespace appear as files within the appropriate tablespace directory entry. The data file path is stored as part of the file name, so Backup Exec changes the display of the file names so that backslashes (\) display as forward slashes (/) and colons (:) display as vertical bars (|). For Oracle 8.1.x and above, do not select a temporary tablespace with local extent management for backup. There is no need to back up temporary tablespaces with local extent management because they are used by Oracle only for the duration of a session and are not recognized during media recovery. Archived Logfiles The Oracle Agent creates a directory entry named {Archived Logfiles} in the root directory of the agent device. During a backup operation the Backup Exec administration console does not display any files within this directory. However, the Backup Exec job server has access to the actual Oracle archived redo logfiles when a backup operation takes place.
1299
Requirements for Configuring the Oracle Agent Oracle database data types you can protect (continued) Item Control File Backup Description The Oracle Agent creates a directory named {Database Control File} in the root directory of the agent device. The Backup Exec Administration Console does not display any files within this directory, but the media server backs up the Becf<Sid_Name>.bak file from this directory. When this file is restored from the storage media, it is automatically placed in the Oracle data file directory on the database server. By default, it is \Orant\Database.
The Backup Exec Oracle Agent has an Oracle user account assigned to it that it can be used to log on to the Oracle database. The Oracle Servers Database Log Mode is set to ARCHIVELOG. The Oracle Servers Automatic Archival is enabled in the Oracle parameter initialization file (default name: Init<SID>.ora, where <SID> is the name of the instance). There is a directory on the Oracle Server where Oracle will generate the Archived Logfiles. If Oracle Database Server version 10g, the Archive Log Location must be configured as a single directory. (Oracle 10g by default creates a Flash Recovery tree of directories. The Backup Exec Oracle Agent only protects a single directory, therefore Oracle Enterprise Manager must be used to create a single directory for storing the Archived Logfiles.)
Related Topics: Creating a New Oracle User Account for the Oracle Agent on page 1301 Verifying ARCHIVELOG Mode and Automatic Archival Settings on page 1302
1300
Administrators Guide
1301
9. If these privileges are not displayed, repeat the GRANT commands in step 2 through step 4. to establish the privileges associated with this account. After all of the commands have been entered, the assigned user will have the appropriate rights needed to protect the database.
5. Enable ARCHIVELOG mode by typing the command: alter database archivelog; 6. Open the database and mount it for general use. Type the following command: alter database open; 7. IMPORTANT: To enable Automatic Archival, you must edit the Oracle instance initialization parameter file (default Init<SID>.ora where <SID> is the name of the instance). The following item must be specified: log_archive_start = true Note If you cannot enable Automatic Archival in the Oracle instance initialization parameter file, you can enable it using the Oracle Servers Enterprise Manager. Log on as SYSDBA, and then right-click the Instance Configuration. Select the Recovery tab, and then select Automatic Archival. 8. You may also specify the directory where Oracle will create the Archived log files (LOG_ARCHIVE_DEST). If this parameter is not specified in the Oracle parameter initialization file, Oracle will use the default value of $Oracle_Home\RDBMSxx. You can specify the archive redo logfile location by setting LOG_ARCHIVE_DEST to the appropriate path. log_archive_dest = \orant\database\logs Note Each time a tablespace is backed up, an archive redo logfile is created and backed up. Over time, you may want to delete older archived redo logfiles to help save hard drive space. By default the Oracle installation maintains three instances of redo logs. Please see the Oracle documentation for more information.
A user with appropriate rights exists for the Oracle Agent. The Database Log Mode is set to ARCHIVELOG. Automatic Archival is enabled in the Oracle initialization file. A directory has been created (or already exists) for the archive redo log files.
1303
To shut down and start up the Oracle databases: 1. Type the following command from the Server Manager prompt: shutdown; 2. After each database has been shut down, type the following command to bring each of them back online: startup; 3. Verify that Automatic Archival is enabled and the database log is in ARCHIVELOG mode by typing the following command: archive log list; You should see: Database Log Mode ARCHIVE LOG Automatic Archival ENABLED If either parameter is not set correctly, shut down the database and set it correctly.
1304
Administrators Guide
1305
The Oracle database has been shut down. The Oracle database has not finished starting up. An invalid Oracle user account was specified in the agents configuration utility. The Oracle database server has not been installed on the system.
When the agent is unable to log on to Oracle in order to access the Oracle tablespace information, the Backup Exec Backup Source view will display only the {Archived Logfiles} and {Database Control File} directories in the root of the Oracle database server. Note If you have multiple Oracle SIDs (databases) on an Oracle database server, and you want to protect them all, you must run the Oracle Agent Configuration Utility and add a configuration definition for each Oracle SID that resides on the Oracle database server. Oracle SIDs are limited to four characters in length in Oracle 8.0.x and to eight characters in Oracle 8i and 9i.
1306
Administrators Guide
3. Follow the instructions on the screen. When the installation is complete, the Readme file is displayed along with the Backup Exec Oracle Agent Configuration Utility. You can now configure the Oracle Agent. Related Topics: Installing the Remote Agent to Remote Windows Computers on page 793
1308
Administrators Guide
Configured Media Servers Lists the Backup Exec media servers on your network that will have access to this Oracle Agent. At least one media server should be listed. All Backup Exec media servers that appear in this list can be used to process backup and restore jobs from the Oracle database server running the Oracle Agent.
When entering a media server, click Add and then type either a media servers host name or its TCP/IP address. To remove a media server from the list, click the host name or the address of the machine you want to remove, and then click Remove.
2. Click Database. 3. Click Add to add the Oracle SID (unique identifier) of the databases residing on your Oracle database server.
1309
User
5. Click OK.
1310
Administrators Guide
1311
An entire online database. This includes the databasess tablespace data files and the database control file. It also includes all of the Oracle archived log files. Individual online tablespaces. Use this to protect individual, online tablespaces within an Oracle database. A closed database. This type of backup takes place while a database is shut down, so all data files and control files comprising the database are available for backup by a file system backup operation. This type of backup is recommended after making structural changes to the database.
Related Topics: Backing Up an Entire Online Database on page 1312 Backing Up Individual Online Tablespaces on page 1314 Backing Up a Closed Database on page 1315
1312
Administrators Guide
5. Expand the Oracle database server that you want to back up. If you have previously password-protected the Oracle Agent, the Logon Account Selection dialog box appears. 6. Select the logon account to use, then click OK. 7. In the Results pane, click the check box preceding the Oracle database you want to back up.
Oracle Database Selection
A check mark appears in the box, indicating that the complete database, including all tablespaces, control files, and archived logfile data will be backed up. 8. Complete the backup settings as normal. For more information, see Creating a Backup Job on page 261.
1313
A check mark appears in the box, indicating that only the specified tablespaces, along with the Archived Logfile data, will be backed up. 9. Complete the backup settings as normal.
1315
1316
Administrators Guide
The Oracle Database Server is operational. Database administration can be performed. All the tablespaces that you want to restore have been defined. The Oracle Agent has been started on the database server.
Restoring an online database requires you to run two separate restore jobs. First, restore the databases Archived Logfiles directory. Second, restore each of the databases tablespaces, which completes the database recovery. After each tablespace is restored, the Oracle Agent automatically attempts to perform media recovery for the tablespace. If the media recovery is unsuccessful, the agent creates an application event log entry with the specific Oracle error code. Note A databases system tablespace cannot be restored while the database is online. The system tablespace can only be restored to a closed database. Restoring the Archived Logfiles data (1st restore operation): 1. Make sure that the Backup Exec Oracle Agent has been loaded and is running on the Oracle database server. 2. At the media sever, start Backup Exec. 3. On the navigation bar, click Restore. 4. Expand the All Resources icon. A list of previously backed up systems appears. 5. Determine which system you want to restore and expand the view to reveal backup sets that contain either tablespaces and/or logfiles. 6. Click the box preceding the {Archived Logfiles} directory from the appropriate backup set. 7. Submit the restore job to restore the {Archived Logfiles} data.
1317
Restoring the databases tablespaces (2nd restore operation): 1. After restoring the {Archived Logfiles} directory, on the navigation bar, click Restore. 2. Expand the All Resources icon. A list of previously backed up systems appears. 3. Determine which system you want to restore and expand the view to reveal backup sets that contain either tablespaces and/or logfiles. Clicking a backup set in the left pane reveals the sets contents in the right pane. 4. Click the backup set from which you restored the {Archived Logfile} directory. 5. Select each tablespace by clicking the preceding box. A check mark appears within each box. Do not select the {Archived Logfiles} directory. 6. Submit the restore job to restore the tablespaces. After each tablespace is restored, the Oracle Agent automatically attempts to perform media recovery for the tablespace. If the media recovery is unsuccessful, the agent creates an application event log entry with the specific Oracle error code.
1318
Administrators Guide
4. Determine which system you want to restore and expand the view to reveal backup sets that contain either tablespaces and/or logfiles. Clicking a backup set in the restore selections pane reveals the sets contents in the results pane. 5. Determine which backup set contains the entire Oracle database you want to restore. 6. Create a restore job by clicking the check box preceding the backup set you want to restore. 7. Submit the restore job to restore the entire Oracle database.
An empty copy of the missing data file cannot be created because the original file was created after the logfiles had been reset. An old version of the data file cannot be found and restored using a closed database restore procedure.
To restore individual tablespaces: 1. At the Oracle database server, start the Oracle Server Manager. For logon information, type the following: Username = System Password = The password assigned to the System account Service (if applicable) = The name of the non-default database Connect as = sysdba 2. Make sure the database is mounted using an exclusive mount, but is not open.
Appendix M, Symantec Backup Exec - Agent for Oracle Server 1319
3. Move to the media server and start Backup Exec. 4. On the navigation bar, click Restore. 5. Expand the All Resources icon. 6. Click the database backup set from which you want to restore. 7. Select the tablespaces you want to restore. 8. Restore as normal. 9. When the restore job completes, move back to the Oracle database server. 10. Start the Oracle Server Manager and connect as System, as a SYSDBA. 11. Type Recover. 12. After the recovery of the database completes, shut down and restart the database.
1320
Administrators Guide
Have at least one closed database backup of your database. Make a backup of the Windows directory on the Oracle database server, making sure that you also include the Windows Registry. Perform a full closed database backup if the structure of the database is altered. For example, if you create a new tablespace or drop an old one, a complete closed database backup is recommended. Schedule regular full online backups of your Oracle database server.
Related Topics: Recovering a Remote Oracle Database Server from a Disaster on page 1322 Recovering a Combination Oracle Database Server/Media Server on page 1323
Make a full Oracle database server file system backup using Backup Exec. When making this backup, include both the Oracle database directory and the Windows system directory. However, do not include the Oracle database tablespace data files in this backup.
Using the Oracle Agent, make a second backup containing the Oracle database tablespace data files.
After creating these backups, you can now recover your Oracle database server in case a disaster occurs. Related Topics: Backing Up Individual Online Tablespaces on page 1314
1321
1322
Administrators Guide
Related Topics: Restoring an Online Oracle Database on page 1317 Restoring Individual Tablespaces on page 1319
1323
The Oracle Agent is unable to access the named data file. Verify that the data file was defined using a fully specified path.
1324
Administrators Guide
Oracle Agent Error Message Chart Oracle Agent Error messages Application Log Error Message (continued) Unable to logon to the Oracle server. Oracle user account name %1 Solution (continued) Make sure that the Oracle user name and password are valid for this Oracle account. This event will also occur if another instance of Backup Exec for Windows Servers attempts to access the Oracle Agent when the Oracle database instance is shut down. Unable to resolve the Oracle service name for SID = %1 Verify that the Oracle SQL Net configuration (Tnsnames.ora) has been set up properly for the named SID. In order to backup online tablespaces and archive logs, Oracle database must be in ARCHIVELOG mode. See Verifying ARCHIVELOG Mode and Automatic Archival Settings on page 1302.
The Oracle database %s has not been started in ARCHIVELOG mode. Please check that ARCHIVELOG is enabled for the database and then try again.
1325
1326
Administrators Guide
Appendix
Full, incremental, and differential online backups of Lotus Domino databases and transaction logs using Lotus Domino APIs. Restores of Lotus Domino databases and transaction logs and point in time restores. Recycling of Lotus Domino transaction logs after a successful backup. Flexible scheduling capabilities. Backup and restore of partitioned and clustered Lotus Domino servers.
Related Topics: Installing the Lotus Domino Agent on the Media Server on page 1329
1327
Backup Exec for Windows Servers An Intel-compatible processor The Lotus Domino data directory on the Lotus Domino server
If the Lotus Domino files you want to back up are on a remote computer, the remote computer must have:
Windows operating system Backup Exec Remote Agent for Windows Servers An Intel-compatible processor Corresponding Windows Administrative Share for each volume that contains Lotus Domino databases The Lotus Domino data directory on the Lotus Domino server Transaction logging must be enabled to perform differential and incremental backups and to perform point in time recovery. The Lotus Domino logging style must be set to archive if you want to back up the transaction logs.
Related Topics: Viewing and Selecting Lotus Domino Databases on page 1330
1328
Administrators Guide
1329
On the navigation bar, click Backup, and then in the selections pane, expand Lotus Domino Databases. All of the Lotus Domino data found on the local server is listed by volume under the Lotus Domino Databases icon.
Lotus Domino Databases
Note Lotus Domino transaction logs do not appear under the Lotus Domino Databases; however, when the database is selected for backup, the transaction logs will automatically be included. To select Lotus Domino databases:
Select the check box next to the volume to choose all of the databases in a volume, or expand the volume and select specific folders and databases. When selecting databases to back up, the databases must be local to the Lotus Domino server.
1330
Administrators Guide
Viewing and Selecting Lotus Domino Databases Lotus Domino Database Selection
The following file types appear in the view for the Lotus Domino server:
filename.nsf - Lotus Domino database files filename.ntf - Lotus Domino template files filename.box - shared mail database filename.dsk - cache files You must back up all of these files in order to properly recover Lotus Domino Databases. Only database files appear under the Lotus Domino Databases view. Domino Program files and other files such as.id and notes.ini appear in the volume in which the Lotus Domino Program directory is located. They must be backed up separately as part of a system backup.
To view Lotus Domino databases on remote computers: 1. On the navigation bar, click Backup. 2. On the Properties pane, under Source, click Selections. 3. Click Remote Selections, and then click Microsoft Windows Network. 4. If necessary, click the domain that contains the Lotus Domino installations, and then click the computer in which the Lotus Domino database is located. A list of shared network directories appears, along with an icon that represents the Lotus Domino Databases. Related Topics: Backing Up Lotus Domino Databases on page 1332 Restoring Lotus Domino Databases on page 1337 Preparing for Disaster Recovery on a Lotus Domino Server on page 1343
1331
.ntf - Lotus Notes Template Files .nsf - Lotus Notes Database Files .box - Lotus Mailbox Files .dsk - Cache Files
You must back up .nsf, .ntf, and .box files to properly recover Lotus Domino databases. If you want to back up .njf, .ncf, .id, .dic, or notes.ini files, you must select them for backup from the volume in which the Lotus Domino Program directory is located.
1332
Administrators Guide
Related Topics: Lotus Domino Transaction Logs on page 1333 Backup Options for Lotus Domino Databases on page 1335 Restore Options for Lotus Domino Databases on page 1340
Domino Server Databases. Domino Server databases can be Logged or Unlogged. They are located in a folder in the Domino data directory, typically Lotus\Domino\Data, but may also be linked to the Domino data directory using Lotus Linked Databases.
Logged Domino Server Databases. A logged Domino Server database logs transactions for one or more Lotus databases. If transaction logging is enabled on the server, all database transactions go into a single transaction log. Unlogged Domino Server Databases. An unlogged Domino Server database does not have transaction logging enabled, or the transaction logging has been disabled for specific server databases. Unlogged Domino Server databases will be backed up in their entirety when a full, differential, or incremental backup is performed, but the database can only be restored to the point of the latest database backup.
Local Databases. Lotus databases are considered Local when they cannot be found in the Domino data directory, cannot be shared, and cannot be logged. This type of database requires a backup of the database itself when using any of the Lotus Domino R5 backup methods. The database can be restored only to the point of the latest database backup.
new DBIID for the database. To prevent data loss, it is recommended that a full backup be performed when a database receives a new DBIID since transactions with the old DBIID cannot be restored to the database. A full backup includes all current transactions on the database and ensures that only the transactions with the new DBIID are needed to restore the database. You can select only one logging style when transaction logging is enabled on the server. Following are the two styles of logging for Lotus Domino databases:
Archive logging. This logging style produces a transaction log that is limited only by the capacity of your mass storage. Archive logging is the recommended logging style to be used with the Lotus Domino Agent since all the transaction logs can be backed up and marked for recycling. When the transaction logs are recycled the Lotus Domino server reuses the existing transaction logs after they are backed up to create space for new transaction logs. Circular logging. This logging style reuses the log file after a specific log file size is reached. By reusing the log file you are saving resources; however, you are also limiting your recovery options because the database can only be recovered to the point of the last full backup. If the incremental or differential backup method is selected for a backup job, a full backup of the changed databases is performed since transaction logs cannot be backed up.
Caution When circular logging is enabled, the circular transaction log cannot be backed up, which could result in the loss of changes made to the database since the last backup was performed.
1334
Administrators Guide
Full - Back up Database and Logs - Reset Archive Bit. Select this to back up all the selected databases. To properly back up your Lotus Domino data, you should perform regular full backups of the database. This backup method should also be used when the DBIID for the database has changed since prior transactions cannot be applied to the new database. Differential - Changed Database and Logs. Select this to back up files that were modified since the last Full backup. This backup method is smaller and faster than a Full backup because only archived transaction logs, unlogged databases, and logged databases with DBIIDs that have changed will be backed up. Incremental - Changed Database and Logs - Reset Archive Bit. Select this to back up files that were modified since the last Full or Incremental backup. This backup method is smaller and faster than a Full backup because only archived transaction logs, unlogged databases, and logged databases with DBIIDs that have changed will be backed up.
1335
Restoring Lotus Domino Databases Backup job properties for Lotus Domino databases (continued) Item Mark archive logs for recycling Description Select this check box to reuse the transaction log after it has been backed up. Backup Exec will not delete the transaction log. Selecting this option only indicates that the transaction log is ready to be reused after it has been backed up successfully; the Lotus Domino server actually deletes the transaction logs. This option is selected automatically when you select the full backup method. You cannot clear this option when you are using the full backup method. If the option is selected when you perform a differential or incremental backup job, transaction logs that are needed to maintain the differential backups will be reused. However, it should be selected regularly to create space for new transaction logs. Note This option may not work for Lotus Domino versions prior to 5.0.7. For more information about this limitation of Lotus Domino, go to the Lotus Domino web site.
4. Start the backup job or select other backup options from the Properties pane. Related Topics: Backing Up Data on page 259
1336
Administrators Guide
The recovery process begins automatically after the last database is copied to the server. The database is restored to a point in time using transactions from the required transaction logs. Required transaction logs that were backed up and recycled are also included in the recovery process. After the recovery process completes, the Lotus Domino database is brought online. If you back up your Lotus Domino databases regularly, then restoring the most recent backup set containing the Lotus Domino data is all that is required to restore the most recent backups of your Lotus Domino databases. Note If circular logging is enabled and both the databases and the Domino transaction log are lost, the database can only be recovered to the point of the last full backup.
1337
Lotus Domino data is usually contained in the most recent backup set. However, some subsequent differential or incremental backup jobs run after a full backup job may not contain data in the backup set because only the transaction log was backed up. If the data you want to restore is not located in the most recent backup set, check the previous backup sets until you find the data. Note If a new DBIID has been assigned to databases and you run a differential or incremental backup, the data will be contained in the most recent backup set since transactions with the new DBIID will not match the old DBIID. For example, LD Server has a Full Backup 0001 and a Differential Backup 0002. If you decide you want to restore data from Differential Backup 0002, you may select the Data directory and find that it is empty.
1338
Administrators Guide
Restoring Lotus Domino Databases Empty data directory for Differential Backup 0002.
The data backed up for Differential Backup 0002 is actually contained in the transaction log backup set. To restore the data, you must select it from the previous Full Backup 0001. The transaction logs from Differential Backup 0002 will be used to bring the database up to date.
Transaction Logs backup set for Differential Backup 0002.
1339
Database Identification Retain original IDs Assign new database ID Assign new database ID and replica ID Select this option to restore the original database IDs. Select this option to assign new IDs to the database. Select this option to assign new IDs to the database. A replica ID is used to synchronize two or more databases that are being replicated in the Lotus Domino environment. You can assign a new replica ID during a restore to prevent other databases under replication from overwriting the restored database files.
1340
Administrators Guide
Restore Options for Lotus Domino Databases Restore job properties for Lotus Domino databases (continued) Option Point in time restore Description Select this option to enter a date and time in which to restore the database. The option is only available for logged databases when the archive logging style is set. Backup Exec will restore the Lotus Domino database you selected in the Restore selections dialog box and then automatically restore the necessary transaction logs required to bring the databases up to the date and time specified. If a point in time is not specified, the databases will be restored up to the last committed transactions in the log file.
Caution If your Lotus Domino database is replicated, the databases on each machine must have identical database and replica IDs. If you want to ensure that the databases continue to be replicated after the restore, select the Retain original IDs option. 4. Start the restore job or select other options from the Properties pane. Related Topics: Restoring Data on page 451 Lotus Domino Transaction Logs on page 1333
1341
4. After selecting options on the Restore Job Properties dialog box, on the Properties pane, under Destination, click File Redirection. 5. Select Redirect file sets. 6. Select the drive to which you are restoring in Restore to drive. You cannot enter the name of the drive, you must make a selection. 7. Enter the logon account for the server in Server logon account. 8. Enter the path to which you are restoring in Restore to path. 9. Enter the logon account for the path in Path logon account. 10. Start the redirection job or select other restore options from the Properties pane. Related Topics: Restoring Data on page 451 Configuring Logon Accounts on page 386
1342
Administrators Guide
If you have linked databases, it is best to keep them on one volume. This allows Backup Exec to synchronize the databases before they are backed up. Back up active databases often. This reduces the amount of effort required to update the databases to the point following the most recent backup. Ensure that the notes.ini, cert.id, and server.id files are protected and available if a disaster occurs.
1343
4. Start the Lotus Domino Server. Related Topics: Disaster Recovery of a Lotus Domino Server Using Circular Logging on page 1345 Disaster Preparation of the Windows Computer on page 607 Restoring Data on page 451 Restore Options for Lotus Domino Databases on page 1340
1344
Administrators Guide
6. To have Lotus Domino create the control file when the server starts, set the following parameter in the Notes.ini file: translog_recreate_logctrl=1 Note If you enter the translog_recreate_logctrl=1 parameter on the last line in the Notes.ini file, you must press ENTER after the parameter. 7. Use the Lotus Domino Agent to restore the databases to the Domino data directory. 8. Start the Lotus Domino server. After the Lotus Domino server is restarted, run a full backup of the server since new DBIIDs have been assigned. Related Topics: Restore Options for Lotus Domino Databases on page 1340 Restoring Data on page 451
1345
4. To have Lotus Domino create the circular log file in the log directory (created in step 2) when the server starts, set the following parameter in the notes.ini file: translog_path=logdir 5. Use the Lotus Domino Agent to restore the databases to the Domino data directory. Related Topics: Restoring Data on page 451 Restore Options for Lotus Domino Databases on page 1340
1346
Administrators Guide
Appendix
1347
When the job is complete, the Backup Exec server writes a standard job log, as it does for any submitted job. You can view this job log using the standard Backup Exec administration console (remote or local). The BACKINT executable also sends the results of the operations to the SAP R/3 tools. When a job is initiated by SAPDBA or CCMS, a job log with an eight-character name is created to represent that job. The R/3 system stores that job log in a directory:
<x>:\Oracle\<SID>\sapbackup
where <x> is the database installation drive and <SID> represents the system ID of the Oracle instance. This file is a plain ASCII text file that you can view with any text editor. A file called Backint.mdb that correlates the R/3 catalog with the Backup Exec catalog is maintained in the Usr\<SID>\sys\exe\run directory. You must be able to restore this file in order to restore data to the R/3 server using the Backup Exec R/3 Agent. The Backup Exec R/3 Agent is capable of supporting multiple media servers running on the same network. Related Topics: Backup Exec R/3 Agent Security on page 1348
Access to selections in jobs submitted by the BACKINT interface Rights to the volumes on which the selections are contained
1348
Administrators Guide
Unattended mode. In this mode, any alert that requires a response from you causes the job to fail. If such an alert occurs, it appears on the R/3 system console. Any alerts that contain only informative text also appear on the R/3 system console. You can start the operation in attended mode by setting Confirm backup parameters to Yes on the Backup Database screen of SAPDBA.
Interactive mode. In this mode, all alerts appear on the R/3 console. You must respond to these alerts as prompted for the job to continue.
Microsoft Windows 2000, Windows XP, or Windows Server 2003. Oracle Enterprise Server version 7.3.x, 8.1.x, and 9i. SAP R/3 version 3.1h, 4.08, 4.6c and 4.6d. All R/3 databases to be backed up must be placed in the ARCHIVE_LOG mode and Automatic Archival must be enabled using the database administration tools. For more information on how to check or perform this operation, consult the R/3 User Manual or your R/3 Database Administrator's Guide. All Oracle databases to be protected must be managed by the R/3 system. To protect Oracle databases not managed by R/3, purchase the Symantec Backup Exec for Windows Servers Agent for Oracle Server.
Note The Backup Exec R/3 Agent does not support data stored on RAW partition types. Related Topics: Installing the Backup Exec R/3 Agent on page 1350 Backup Exec R/3 Agent Security on page 1348
Appendix O, Symantec Backup Exec - Agent for R/3 for Oracle Server
1349
Have at least one closed database backup of your database (see your R/3 Database Administrators Guide for details). Do this by using Backup Exec to make a full R/3 database server file system backup. If the structure of the database is altered, you should perform a full closed database backup. When you perform your full file system backups, make sure the R/3 database control and data files are excluded from the backup set. Because these database files are both locked and unreadable when the database is open, they will appear as Skipped in the Backup Exec Job History job log if you attempt to back them up during your full file system backup jobs. Create a backup of the Windows directory on the R/3 database server, making sure that you also include the Windows registry. Always include the Backint.mdb file (in the Usr\<SID>\sys\exe\run directory) in your regular backups of the R/3 database server. This file correlates the R/3 catalog with the Backup Exec catalog. You must have this file in order to restore data. Use the Backup Exec R/3 Agent to perform regularly-scheduled offline and online backups of the R/3 database server. Create regular backups of the rest of the data that resides on the server.
1350
Administrators Guide
Note All scheduled jobs must be handled by the R/3 database management system. Any attempt to schedule jobs not using the R/3 database management system can potentially damage your database. For more information on how to check or perform this operation, consult the R/3 User Manual or your Oracle Server Administrator's Guide.
Using the R/3 Agent to Back Up the R/3 Database Options in the Biparam.ini file (continued) Use this option: Device=<device name> For this operation: To specify a device, by name, for use in backup operations. The default is the first available device. Note The device name must match the name of the device exactly as it appears in Backup Exec for Windows Servers. Media=<media set name> To specify a name of an existing media set. Description=<backup set name> To specify a name for the next backup set description. The default is a backup set description automatically specified by Backup Exec, which is an incremental number of the backup sets created since the installation of Backup Exec; for example, Backup 0020. To specify the backup compression mode. Allowable values are:
Best - Use hardware compression; if not available, then use software compression. Hardware - Use hardware compression; if not available, then use no compression. Software - Use software compression. None - Use no compression.
The default is Hardware. Auto Verify=<> To toggle the Verify after backup option. Note Because Verify after backup is not directly supported by the R/3 tools, the results are not sent back to the R/3 system. This option is available for user information only when the backup job is viewed through the Backup Exec administration console. The default is on. Print Log=<> To toggle the printing of job history job log information after a backup job completes. The default is off.
Related Topics: Backing Up the R/3 Database on page 1353 Restoring the R/3 Database on page 1354 Backup Exec Alerts and the BACKINT Interface on page 1349
1352
Administrators Guide
Enter configuration information for your Backup Exec server in the Biparam.ini file found in your Usr\<SID>\sys\exe\run directory. Place all SAP R/3 databases to be backed up in the ARCHIVE_LOG mode and enable Automatic Archival using the SAPDBA or CCMS console. For more information on how to check or perform this operation, consult the R/3 User Manual or your Oracle Server Administrator's Guide.
Note The Backup Exec R/3 Agent does not support concurrent backup or restore operations. Attempting to back up or restore the same R/3 database from more than one media server at a time causes the operations to fail. To submit a backup job to Backup Exec: Note If the BACKINT interface is in unattended mode, any alert that requires a response from you causes the backup job to fail. You can start the backup job in attended mode by setting Confirm backup parameters to Yes in the Backup Database screen of SAPDBA. 1. From the SAPDBA console, select the appropriate backup option (database or archive logs). 2. Select Backup Device Type, and then select util_file for an offline database backup or select util_file_online for an online database backup. 3. Select Backup utility parameter file, and then enter the full path to the Biparam.ini file (or any other .ini file you created), including the file name. 4. Press <Enter>. 5. Verify that you have selected the correct backup type for the utility file type you specified (online, offline, etc.). 6. Start the job.
Appendix O, Symantec Backup Exec - Agent for R/3 for Oracle Server
1353
Have at least one flat file database backup of your database and make regular offline backups using SAPDBA or CCMS (see your R/3 Database Administrators Guide for details) Back up the Windows directory on the R/3 database server, making sure that you also include the Windows registry If the structure of the database is altered, perform a full offline database backup For example, if you create a new tablespace or remove an old one, a complete offline database backup is recommended
Always include the Backint.mdb file (in the Usr\<SID>\sys\exe\run directory) in your regular flat file backups of the R/3 database server. This file correlates the R/3 catalog with the Backup Exec catalog. You must have this file in order to restore data. Schedule full online backups of your R/3 database server regularly.
Administrators Guide
1354
Related Topics: Disaster Recovery Prerequisites on page 1355 Recovering a Remote R/3 Database Server from a Disaster on page 1355 Recovering a Combination R/3 Database Server/Media Server on page 1356
Create a FULL R/3 database server file system backup using Backup Exec. When creating this backup, include both the R/3 database directory and the Windows system directory. However, if the database must remain open, do not include the R/3 database tablespace data files in this backup.
Create a second backup containing the R/3 database tablespace data files (see your R/3 Database Administrators Guide for details).
After creating these backups, you can now recover your R/3 database server in case a disaster occurs. Related Topics: Backing Up Data on page 259 Recovering a Remote R/3 Database Server from a Disaster on page 1355 Recovering a Combination R/3 Database Server/Media Server on page 1356
Appendix O, Symantec Backup Exec - Agent for R/3 for Oracle Server
1355
Because the full system backup was restored, your computer should now boot using its original version of Windows. The system should now contain the original version of Windows, the Backup Exec R/3 Agent, the R/3 database minus the tablespaces, and any other files contained on the full backup media. 4. If you have a full offline R/3 database backup, restore your last full offline R/3 database backup and start your database. If you do not have a full offline database backup, skip this step and proceed to step 5. Your database is now operational. 5. Restore the Backint.mdb file from the latest full server backup. This file correlates the R/3 catalog with the Backup Exec catalog. 6. To bring your database up-to-date, restore your most recent online or offline R/3 database backup. 7. At the media server, run another restore operation. This time, use the Backup Exec R/3 Agent to restore the storage media containing all of the R/3 tablespace data files. 8. When the restore operation completes, open the SAPDBA or CCMS console, and select Check and Repair Database. 9. Select Automatic Recovery, and then follow the online prompts. Disaster recovery of the R/3 database server is now complete. Related Topics: Disaster Recovery Prerequisites on page 1355 Recovering a Combination R/3 Database Server/Media Server on page 1356
1356
Administrators Guide
4. Restore the entire contents of the media containing the full flat file server file system backup. This restores your original Windows system, along with any services required to run your R/3 database. 5. Reboot the computer after the restore operation completes. Because the full system backup was restored, your computer now boots using its original version of Windows. The system now contains the original version of Windows, the Backup Exec R/3 Agent, the R/3 database minus the tablespaces, and any other files contained on the full backup media. 6. Restore the Backint.mdb file from the latest full server backup. This file correlates the R/3 catalog with the Backup Exec catalog. 7. Run another restore operation. This time, use the Backup Exec R/3 Agent to restore the media containing all of the R/3 tablespace data files. 8. When the restore operation completes, open the SAPDBA or CCMS console, and select Check and Repair Database. 9. Select Automatic Recovery, and then follow the online prompts. Disaster recovery of the R/3 database server is now complete. Related Topics: Disaster Recovery Prerequisites on page 1355 Recovering a Remote R/3 Database Server from a Disaster on page 1355
Appendix O, Symantec Backup Exec - Agent for R/3 for Oracle Server
1357
1358
Administrators Guide
Appendix
The SharePoint Agent must be installed on the media server. The Backup Exec Remote Agent for Windows Servers (Remote Agent) must be installed on each remote SharePoint Portal Server that will be protected. In addition, for SharePoint Portal Server 2003, the Remote Agent must be installed on each SQL server in the server farm. The credentials specified by the logon account used for backing up and restoring SharePoint Portal Server data must have local administrative rights on the servers where SharePoint components are installed. Additionally, to back up and restore
1359
individual documents in workspaces or backward-compatible document libraries, the account must be granted the Coordinator role in SharePoint on all folders to be accessed in the workspace or document library. For more information on granting permissions on folders in the workspace or backward-compatible document libraries, see your SharePoint Portal Server documentation.
The credentials specified by the logon account used for backing up and restoring the Single Sign-on database must be either the account name or a member of the group that is specified in the "Account name" field in the Single Sign-on Settings section of the Manage Settings for Single Sign-on administration page in SharePoint Portal Server. Internet Information Services (IIS) rights can affect database backups and restores. Ensure that the logon account used for backup and restore has rights to access the IIS sites. Integrated Windows Security should be enabled within the IIS rights.
Microsoft Web Storage System files Microsoft Search Service (MSSearch) system resources, which include the property store, subscriptions store, full-text index files, and propagated indexes
1360
Administrators Guide
SharePoint Portal Server configuration information, including Web Storage System configuration information, content source information, server properties, and access accounts The Applications folder, which contains a subfolder for each workspace on the server Shortcuts or content sources that reference the local file system Individual documents that are contained in the workspaces Content source crawls (a content source is a URL that SharePoint Portal Server uses as a starting point to search, or crawl, for content in documents stored outside the workspace) scheduled using Microsoft Windows 2000 Scheduled Tasks Scheduled tasks for processing subscriptions Gatherer logs Lotus Notes configuration information
For more information about the various types of data stored on SharePoint Portal Server, see your Microsoft SharePoint Portal Server documentation. Note SharePoint Portal Server is available only for Windows 2000. Related Topics: Requirements for the SharePoint Agent on page 1359 Installing the SharePoint Agent on page 1360 Backing Up SharePoint Portal Server 2001 on page 1362 About Restoring SharePoint Portal Servers and SharePoint Portal Workspaces on page 1364 Redirecting SharePoint Portal Server Restore Jobs on page 1366 Disaster Recovery of a SharePoint Portal Server on page 1370
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1361
1362
Administrators Guide
Using the SharePoint Agent with SharePoint Portal Server 2001 Backup Job Properties dialog box
4. Start the backup job or select other backup options from the Properties pane.
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1363
1364
Administrators Guide
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1365
To restore previous versions of documents from workspace backups: 1. On the navigation bar, click Restore. 2. Navigate to the backup sets that contain the workspace data from which you want to restore. 3. Under the backup set, expand the SHADOW folder and then navigate to the folder that contains the documents you want to restore. 4. Proceed with the steps in Redirecting Restored Workspace Data to a File Path on page 1369.
1366
Administrators Guide
Using the SharePoint Agent with SharePoint Portal Server 2001 Restore Job Properties -Sharepoint Redirection
7. Use the default logon account as indicated, or click Change to select a different one. 8. On the Properties pane, select other job properties that might be appropriate for your environment. 9. Start the restore job. After the restore completes, it is recommended that you perform a full backup of the restored SharePoint Portal Server databases. Related Topics: Backing Up SharePoint Portal Server 2001 on page 1362 Restoring a SharePoint Portal Server on page 1364
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1367
1368
Administrators Guide
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1369
A copy of Backup Exec for Windows Servers with the SharePoint Agent installed The latest backup of the SharePoint Portal Server you want to recover The SharePoint Portal Server CD Any SharePoint Portal Server service packs that were applied to the original installation
Caution You cannot completely recover a SharePoint Portal Server database using backups of individual workspaces. You must use a backup of the SharePoint Portal Server database to complete the disaster recovery.
1370
Administrators Guide
Perform full backups of Microsoft SharePoint Portal Server 2001, in addition to individual workspace backups. Even though workspace backups may be more useful for granular recovery of individual documents on a day-to-day basis, you must have a full backup to complete a disaster recovery. Keep a record of all service packs and hotfixes that are installed on the SharePoint server when you perform backups. SharePoint restores may not complete successfully if the databases were backed up at a different patch level. Ensure that the SHADOW folder is included in your selections when you back up workspace data. This folder contains previous versions of the current documents that exist in the workspace at the time of backup. While these previous versions cannot be restored directly into that workspace, it is possible to restore them to an alternate location, provided that the SHADOW folder is protected.
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1371
Content database User Profile database Services database Index databases Team databases
Windows SharePoint Services sites and their associated databases Single Sign-on database Document Library Store (Web Storage System-based) Document Libraries (Web Storage System-based)
Individual documents can be backed up from and restored to Web Storage System-based document libraries, or redirected to file paths.
Under Local Selections, a node titled Microsoft SharePoint Resources displays for any server that has locally installed SharePoint resources. For single-server SharePoint deployments, all of the SharePoint resources are listed and are selectable for backup. For SharePoint server farm deployments, this node lists only the SharePoint resources that reside locally on this server and that can be selected for backup from this node. On front-end Web servers, this node lists the entire farm topology, but only the resources that reside locally can be selected for backup. Under Remote Selections, a node titled Microsoft SharePoint Server Farms displays a logical view of the topology of each SharePoint server farm on your network. Symantec recommends that you select SharePoint resources for backup from this node. Backup Exec automatically discovers SharePoint farms when you browse to a SharePoint front-end Web server and adds the farms to this node. Additionally, you can add farms manually using the Add Server Farm menu option.
Administrators Guide
1372
4. In the Web server name field, type the name of a Web server that belongs to the farm you want to add.
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1373
5. In the Server farm name field, type a name for the farm or use the default name. The name you type here will display under the Microsoft SharePoint Server Farms node. Backup Exec lists the names of discovered Web servers in parentheses after the server farm name in the Selection tree. Note The following characters cannot be used in farm names: ` ~ ^ * ( ) { } \ ; : " , < > / ? 6. Click OK. Backup Exec adds the new server farm to the Microsoft SharePoint Server Farms node under Remote Selections and contacts the specified Web server to retrieve the remainder of the farm topology. When you create jobs to protect the SharePoint resources for the server farm, make backup selections from this server farm node. In addition, back up the default Microsoft SQL databases (master, model, msdb, pubs) for each Microsoft SQL instance that hosts SharePoint databases. Please note that after a server farm is added to Microsoft SharePoint Server Farms, the SharePoint databases hosted on Microsoft SQL instances can no longer be selected for backup directly from the Microsoft SQL Server resource nodes. If you change the SharePoint server farm topology after it has been added to Microsoft SharePoint Server Farms, you must browse the server farm node so that Backup Exec can recognize and save the changes.
1374
Administrators Guide
4. To prevent Backup Exec from communicating with a Web server, clear the check box next to that Web servers name. If the Web server is now available to communicate with Backup Exec, select the check box next to the Web servers name. Note When you disable communication with a Web server, Backup Exec removes the name of that Web server from the server farm name under the Microsoft SharePoint Server Farms node. 5. Click OK, and then click Close.
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1375
Deleting a SharePoint Portal Farm from the Microsoft SharePoint Server Farms Node
If a server farm is no longer in use or is no longer valid, you can remove it from the Microsoft SharePoint Server Farms node. Note If Backup Exec is installed on the same server that is used as a Web server in a farm, you cannot delete that farm. To delete a SharePoint Portal farm from the Microsoft SharePoint Server Farms node: 1. On the navigation bar, click Backup. 2. In the Selection tree, under Remote Selections, right-click Microsoft SharePoint Server Farms, and then click Manage Server Farms. 3. Select the farm you want to delete, and then click Delete.
1376
Administrators Guide
Full - Back up entire database. Select this to back up the entire database. Differential - Back up database changes only. Select this to back up only the changes made to the database since the last full backup.
Note The differential backup method cannot be used to back up Index databases or Document Libraries. The Full backup method will be used to back up these resources. Perform consistency Select this option to run a full consistency check (including check before backup of indexes) of the Microsoft SQL databases used by Microsoft Microsoft SQL databases SharePoint before backing up the databases. used by Microsoft SharePoint Continue with backup if consistency check fails Select this to continue with the backup operation even if the consistency check fails.
5. Start the backup job or select other backup options from the Properties pane.
Server Farm node. This node represents a logical view of the topology for the SharePoint resources that have been backed up from the farm. The name that displays for this node matches the name you defined for the server farm in Backup Selections under the Microsoft SharePoint Server Farms node. If you expand the nodes for each SharePoint component that appears in this view, the backup sets for that component are displayed and can be selected for restore. Individual Server nodes. Each server from which SharePoint components were backed up contains a Microsoft SharePoint Resources node. This node will display the SharePoint components that resided locally on the server when they were backed up. If you expand the nodes for each SharePoint component that appears in this view, the backup sets for that component are displayed and can be selected for restore.
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1377
Restoring SharePoint Portal Sites, Services Sites, Document Library Stores, Configuration Databases, and Single Sign-on Databases
Follow these steps to restore SharePoint resources the servers from which they were originally backed up. To redirect a restore job to a different server, see Redirecting a Restore Job for SharePoint Portal Server 2003 on page 1381. Each portal site will have a minimum of three databases: Content databases, Services databases, and User Profile databases. Symantec recommends that you restore these databases together. Caution The Configuration database contains all of the configuration information for the entire SharePoint Server farm. Use caution when restoring this database because any changes made to the farm topology after the backup from which you are restoring will be lost. For more information, refer to the Microsoft SharePoint Portal Server 2003 documentation. Note You can restore Document Library Stores, Configuration databases, and Single Sign-on databases back to the original location only. To restore SharePoint Portal Server 2003 resources: 1. On the navigation bar, click Restore. 2. Select the full and differential backup sets that correspond to the SharePoint data you want to restore. Note If you restore the SharePoint resources for a portal site in one job, the Index database is restored last. If you are restoring in separate jobs, you must restore the Index database last. 3. On the Properties pane, under Settings, select Microsoft SharePoint. 4. To bring the databases online, verify that the Bring restored databases online and reconnect previous database links option is selected. When restoring portal sites or Windows SharePoint Services sites, this option also re-establishes the link between the restored databases and their corresponding sites.
1378
Administrators Guide
Note If you are restoring full or differential backup sets in separate restore jobs, clear this option for all jobs except the last job. You should select the option for the last restore job in the sequence. Also, you may be prompted to insert media that you have already used. 5. Set additional restore options on the Properties pane or start the restore job.
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1379
To restore previous versions of documents from Document Library backups: 1. On the navigation bar, click Restore. 2. Navigate to the SharePoint Document Library that contains the documents you want to restore. 3. Under the backup set, expand the SHADOW folder and then select the documents you want to restore. 4. Proceed to Redirecting Restored Document Library Data to a File Path on page 1383".
1380
Administrators Guide
1382
Administrators Guide
Appendix P, Symantec Backup Exec - Agent for Microsoft SharePoint Portal Server
1383
Description
Full - Back up entire database. Select this to back up the entire database. Differential - Back up database changes only. Select this to back up only the changes made to the database since the last full backup.
Note The differential backup method cannot be used to back up Index databases or Document Libraries. The Full backup method will be used to back up these resources. Perform consistency Select this option to run a full consistency check (including check before backup of indexes) of the Microsoft SQL databases used by Microsoft Microsoft SQL databases SharePoint before backing up the database. used by Microsoft SharePoint Continue with backup if consistency check fails Restore Bring restored databases online and reconnect previous database links Select this option to bring the databases online after a restore job. When restoring portal sites or Windows SharePoint Services sites, this option also re-establishes the link between the restored databases and their corresponding sites. Select this to continue with the backup operation even if the consistency check fails.
1384
Administrators Guide
Appendix
Depending on the kind of DPM data backed up, Backup Exec can restore the data to the DPM server, a file server in the DPM protection group, or an alternate destination to which you have rights. The DPM Agent enables you to use Backup Exec to:
Navigate to or browse for available DPM databases, protected file servers, and shadow copies to back up. Perform backup and restore jobs between a DPM server and Backup Exec. Discover information about the DPM servers and start the DPM writer.
Related Topics: Requirements for the Agent for Microsoft Data Protection Manager on page 1386 Backup Job with DPM Data on page 1386 Restore Job with DPM Data on page 1389 Monitoring Jobs on page 405 Viewing and Filtering Alerts on page 502 Responding to Active Alerts on page 507
1385
The Backup Exec Agent for Microsoft Data Protection Manager must be installed on the Backup Exec server. The Backup Exec Remote Agent for Windows Servers must be installed on the DPM server. The Backup Exec Remote Agent for Windows Servers should be installed on all file servers in the DPM protection group. Installing the Remote Agent for Windows Servers on DPM file servers is an optional step that enables you to restore from Backup Exec to the DPM file servers.
Related Topics: Installing Backup Exec Options to the Local Computer on page 71 Installing Backup Exec Agents to Remote Computers on page 77
1386
Administrators Guide
Backup Job with DPM Data Backup Job Properties Selections screen
DPM Database Backup Job - The DPM Databases node contains information about the entire DPM environment as it pertains to the DPM installation, such as DPM protection groups and schedules. Select this node to protect the DPM environment settings at the same frequency as your other data, such as nightly, weekly, or monthly. Backing up the DPM databases provides you with a copy of the DPM server and installation data, which you can recover in the event of a network failure or disaster. When the DPM Databases node is selected for a backup job, Backup Exec performs a consistency check of the databases before the backup job starts. If the consistency check fails, the backup continues or stops depending on your Backup Exec database settings.
Protected Servers Backup Job - The Protected Servers node displays each DPM file server of the DPM protection group by name. Within each file server node, replica sets of the data sources (shares, volumes, folders, and files) appear as volumes. Backup Exec can back up any file server or data source protected by DPM. For example, if a DPM protection group has three file servers, the three file servers can be selected for backup. Alternatively, you can select only part of the data, such as the replica set of volume C on file server PHDPM2.
1387
Appendix Q, Symantec Backup Exec - Agent for Microsoft Data Protection Manager
To keep critical business data only, selectively choose information from specific replicas. If necessary, you can use the replica set backups to rebuild server data. Along with backups of the databases, the replica sets can be used to restore your DPM environment in the event of a disaster.
Shadow Copy Backup Job - The Shadow Copies node displays a list of the available shadow copies on the DPM server. Shadow copies are created by Volume Shadow Copy Service (VSS) and consist of a static picture of DPM replicas. It is not necessary to back up shadow copies regularly. Most of the data captured from shadow copy to shadow copy is redundant because, typically, the majority of the data on the server does not change between snapshots. Backup Exec displays the DPM shadow copies by the date and time the DPM shadow copy was created. Each initial shadow copy of your DPM file servers should be backed up. From that point forward, you can back up shadow copies as needed. For example, if you intend to take a server offline, it might be helpful to back up the most recent shadow copy before doing so. Caution Back up DPM shadow copies on an ad-hoc basis due to the quantity of redundant data that shadow copies typically contain.
Related Topics: Using Backup Execs Windows Explorer Interface on page 305 Creating a Backup Job on page 261
1388
Administrators Guide
DPM Database Restore Job - By default, Backup Exec restores the full database back to the DPM server from which it originated. The DPM Databases node displays the list of DPM database backup sets from which you can restore. Protected Servers Restore Job - By default, DPM replica sets are restored back to the DPM server from which they were backed up. You can use Backup Exec to redirect the data to an alternate destination.
Appendix Q, Symantec Backup Exec - Agent for Microsoft Data Protection Manager
1389
You can restore all or part of the backed up data. For example, if you back up a DPM file server, you can restore the entire server, individual folders, or individual files. Any data not backed up cannot be selected, so the accompanying check box is grayed out.
Shadow Copy Data Restore Job - The DPM file server nodes are listed by name in the Resource view. By default the shadow copy data is restored to the file server from which it originated. Using Backup Exec, you can redirect the data to any file server in the DPM protection group or an alternate destination to which you have rights. In Media view, you can locate the DPM shadow copies by process of elimination. The databases are labeled with a path that includes the phrase DPM Databases. The DPM replica sets are labeled with a path that includes the phrase Protected Servers. The DPM shadow copies are labeled with the DPM file server name and volume, such as PHDPM2\C:. Backup Exec enables you to restore data from within the DPM shadow copy. For example, if you used Backup Exec to back up a DPM shadow copy that was created on Monday at 10:00 A.M., and someone lost a file named financial.doc on Monday at 11:00 A.M., you can restore the file financial.doc from the DPM shadow copy created at 10:00 A.M. to the DPM file server from which the data originated. Before restoring DPM shadow copy data, you can verify the DPM shadow copy date and time by viewing the properties of the files that were originally backed up. Verifying the date and time can be useful if your user knows the approximate time a file was lost.
Related Topics: Restore Operations and the Catalog on page 452 Redirecting a Restore Operation on page 487 Using the Resource View on page 479 Using the Media View on page 479
1390
Administrators Guide
Appendix
1391
The BEWS media server must have network access via the TCP/IP protocol to the remote NetWare server. The computer from which the installation program is running must be able to access the NetWare server. You must have administrative privileges on the NetWare server on which the agent is being installed.
A directory called BKUPEXEC is created in the SYS: volume, and the latest tested versions of the NLMs needed by Backup Exec to process NetWare-specific requests are copied to the BKUPEXEC/NLMS directory. The BESTART.NCF and BESTOP.NCF files are created and placed in the SYS:SYSTEM directory. These files contain commands to load the appropriate NLMs that allow the NetWare server to be backed up.
Note The Remote Agent is installed remotely from the Windows media server. If you have previously installed the Remote Agent on NetWare servers, run BESTOP from each NetWare console before installing the Remote Agent on those servers again. For instructions on installing the Remote Agent on NetWare Servers, see Installing Backup Exec Agents to Remote Computers on page 77. When Backup Exec is installed, both the TCP/IP and NetWare IPX/SPX protocols are selected for use by default. You can change the default settings through the Options-Set Application Defaults dialog box. For more information, see Default Settings for the Remote Agent on page 1402. Related Topics: Installing Backup Exec Agents to Remote Computers on page 77 Adding BESTART to the AUTOEXEC.NCF File on the NetWare Server on page 1393
1392
Administrators Guide
1393
1394
Administrators Guide
About Backing Up NetWare Servers Necessary rights for NFS backup To do this: Archive You need these rights: Read files File scan Modify file attributes Erase files
To back up, and restore when necessary, the NDS Tree, you must have a user account on the NetWare server that has the following rights to the [Root] object of the NDS Tree:
Necessary rights for NDS backup To do this: Backup/ Restore You need these rights: Object rights Supervisor Browse Create Delete Rename Inheritable Property rights, All properties Supervisor Compare Read Write Add Self Inheritable
Note White check boxes for these rights will display with black check marks in the Trustees of [Root] dialog box. With default rights only, these check boxes will be gray with gray check marks.
1395
Single-server strategy. NDS installations that consist of a single network server must rely completely on Backup Exec for Windows Servers to provide protection for the directory database, since the built-in replication feature cannot be used. You should back up the entire NDS database whenever any type of backup (either full or modified) is performed. If the NDS database rarely changes, that is, if the objects stored within and/or their properties and values are seldom modified, then less frequent backups may be performed. As with file system backups, the administrator must consider what might be lost if a disaster occurs on the day the next full backup is to be performed. Be sure to figure in the time it will take to rebuild the changes to the directory manually, if just such a disaster were to occur.
Single administrator - multiple servers strategy. NDS installations that have a single network administrator (a single object with supervisor rights to the entire directory database), and multiple servers should rely almost entirely on the built-in replication features of NDS for fault tolerance. If a disaster occurs on a specific server, NDS remains intact and available from replicas stored on other servers. When the failed server is repaired, NDS is reinstalled using Novells INSTALL NLM on NetWare 4.1 and NWCONFIG.NLM on NetWare 5.x and later. Replicas are then placed back onto the server, if required. The NDS database should still be backed up regularly in case it is needed to replace objects that have been accidentally deleted.
Multiple administrator strategy. NDS installations that have multiple network administrators, each with access to only a portion of the directory tree, are faced with additional challenges when designing a backup strategy. Within this type of installation, it is rare that an object has full rights to the entire directory tree, as is the case with many smaller- to medium-sized networks.
1396
Administrators Guide
Instead, the tree is logically broken into smaller components. For example, partitions with specific administrators assigned the responsibility to manage each component. While this type of installation offers the highest level of network security, it brings with it the most complicated level of disaster recovery. The best method for implementing fault tolerance should remain partition replication. Because it is likely that Inherited Rights Filters (IRFs) will be applied at the container level, a properly replicated directory offers a much quicker restoration in the event of a disaster. If possible, you should create an object that has full rights as a trustee of the root of the NDS tree, and perform full backups on the NDS tree, instead of partial backups. Doing so reduces the complexity of rebuilding NDS in the event of a disaster. You should refer to your Novell documentation for more information on configuring and managing NDS replicas and partitions.
1397
2. Double-click Remote Selections. 3. Doubleclick NetWare Agents. 4. Double-click the NetWare computer icon for the NetWare server you want to back up. When logging on to the NetWare server, you may need to provide a fully distinguished and typeless name, such as .admin.novell. A fully distinguished, or complete, name consists of different object types, such as common name (CN), Organizational Unit (OU) objects, and Organization (O) objects. When the abbreviations for these objects are not included as part of the objects complete name, the naming is referred to as a typeless name. For more information about complete, partial, typeful, or typeless names, refer to your Novell NetWare documentation.
1398 Administrators Guide
5. Click the checkbox preceding the volume icon to select the directories that you want to back up, or double-click the volume to select directories. NetWare File System and NetWare Directory Services (Novell Directory) are listed separately. Each directory that you want to back up must be selected. The following screen shows a NetWare server (BOBG_NW5) that has both the file system and the NetWare Directory Services selected for backup:
Backup Selections for NetWare server
6. If you want to change the Backup default, on the Properties pane, under Settings, click NetWare SMS. 7. Select or clear the Backup compressed files in decompressed form option. If you select this option, Backup Exec decompresses, or expands, compressed files as they are backed up. If you select this option, the server may run out of memory or disk space. Also, the backup job will take longer due to the extra time involved in file decompression. 8. Continue creating the job by following the procedures in Creating a Manual Backup Job by Configuring Job Properties on page 262.
1399
Only data can be included in a redirected restore operation; NDS objects cannot be redirected.
Administrators Guide
1400
Data backed up from a Novell server can be restored to a Windows volume; again, NDS objects cannot be redirected.
6. Complete the restore job by following the procedures described in Creating a Manual Restore Job by Configuring Job Properties on page 458. Note If you clear the Preserve tree option on the General Restore Job Properties and the target directory is the volume root, Backup Exec will still use the Preserve tree option and data will still be restored with its original directory intact.
1401
To change backup and restore defaults for the NetWare server: 1. On the Tools menu, click Options. 2. On the Properties pane, under Job Defaults, click NetWare SMS.
1402
Administrators Guide
1403
a.
Click Add.
b. Type the name of the server you want to add, and then click OK. 5. To delete a server from the server list: a. Select the server you want to delete.
b. Click Delete. 6. After all servers have been added or deleted, and the NetWare SMS default options have been selected, click OK.
The contents of your CONFIG.SYS and AUTOEXEC.BAT files. Contents of the STARTUP.NCF file. The amount of memory available. The contents of your AUTOEXEC.NCF file.
1404
Administrators Guide
A listing of the NLMs that are currently loaded on your server, including the version numbers and the date stamp. Configuration settings for your server, including volumes and individual namespace support.
3. On the print-out of the BEDIAG.FAX, write the Supervisor user and password. Note Keep this print-out locked in a safe place.
Reinstall NetWare. Reinstall the Remote Agent. Use the information from BEDIAG.FAX to restore your server configuration. Restore your latest backups. Intelligent Disaster Recovery for NetWare is available as a separate add-on option to Backup Exec for NetWare Servers. For more information, see the Symantec Backup Exec for NetWare Servers Administrators Guide.
Tip
1405
1406
Administrators Guide
Appendix
Symantec products meet federal accessibility requirements for software as defined in Section 508 of the Rehabilitation Act:
http://www.access-board.gov/508.htm
Keyboard shortcuts are available for all graphical user interface (GUI) operations and menu items. Symantec products are compatible with operating system accessibility settings as well as a variety of assistive technologies. All manuals also are provided as accessible PDF files, and the online help is provided as HTML displayed in a compliant viewer. The following topics detail accessibility features and compliance in Backup Exec:
Keyboard Navigation and Shortcuts in Backup Exec on page 1408 General Keyboard Navigation Within the GUI on page 1408 Keyboard Navigation Within Dialog Boxes on page 1409 Keyboard Shortcuts on page 1410 Support for Accessibility Settings on page 1414
1407
The TAB key moves the focus to the next active area, field, or control, following a preset sequence. SHIFT+TAB moves the focus in the reverse direction through the sequence. CTRL+TAB exits any Console area that you internally navigate with the TAB key. UP and DOWN ARROW keys move focus up and down the items of a list. The ALT key in combination with the underlined mnemonic letter for a field or command button shifts the focus to that field or button. Either ENTER or the SPACEBAR activates your selection. For example, after pressing the TAB key to select Next in a wizard panel, press the SPACEBAR to display the next screen. SHIFT+F10 provides access to context menus.
1408
Administrators Guide
The TAB key moves focus between controls within the dialog box along a preset sequence. Controls displaying a mnemonic (an underlined letter) can be selected regardless of focus by typing ALT and the underlined letter. A dark border indicates the default command button. Press ENTER at any time to choose the button with a dark border. ESC chooses the Cancel button if one exists. SPACEBAR chooses a control you select with the TAB key. SPACEBAR changes the state of a checkbox that has focus. Typing a mnemonic (if one is available) will move the focus to the checkbox and change its state. Arrow keys move focus within radio buttons, list boxes, sliders, groups of option controls, or groups of page tabs. Items that cannot be changed are not visited by the TAB key sequence. Options that are unavailable are grayed-out and can neither be selected nor given focus.
While the controls described here are typically found in dialog boxes, they also can occur in other contexts. The same navigation standards will apply.
1409
Keyboard Navigation and Shortcuts in Backup Exec Keyboard Navigation within Tabbed Dialog Boxes (continued) Keyboard input RIGHT ARROR or LEFT ARROW Result When the focus is on a tab selector, chooses the next or previous tab in the current row and displays the page.
List Boxes
List boxes display a column of available choices. There are different kinds of list boxes with additional navigation conventions:
Drop-down list boxes by default show only the selected item. A small button to the right of the control shows a downward-pointing arrow. Select the arrow to display more items from the list box. If there are more choices than can fit in the preset list box area, a slider appears along the side of the list box. Show or hide the list using ALT+DOWN ARROW, ALT+UP ARROW, or F4. The TAB key selects an item. Extended selection list boxes support selecting single items, blocks of items, or combinations of the two. After selecting an item, hold down CTRL+navigation keys to select or clear additional items or blocks of items.
Keyboard Shortcuts
All menu items can be selected by using accelerator or mnemonic keyboard shortcuts. An accelerator is a key combination that provides shortcut access to a GUI function. A mnemonic (sometimes referred to as a hot key) is a single-key equivalent (used in combination with the ALT key) for selecting GUI components such as menu items. The mnemonic hot key letter is underlined in the GUI. Routine functions such as opening, saving, and printing files can be performed using the standard Microsoft keyboard shortcuts. Other menu items are unique to Backup Exec. The following table lists the keyboard shortcuts unique to Backup Exec:
Keyboard Shortcuts Unique to Backup Exec Backup Exec Accelerator ALT Backup Exec Mnemonic F Result
The File menu expands. From the File menu, you can create
new jobs, devices and media, print selected items, view properties, or exit Backup Exec.
1410
Administrators Guide
Keyboard Navigation and Shortcuts in Backup Exec Keyboard Shortcuts Unique to Backup Exec (continued) Backup Exec Accelerator ALT Backup Exec Mnemonic E Result
The Edit menu expands. From the Edit menu, you can
rename, delete, copy, and select items. In addition, you can work with selection lists and search catalogs.
ALT
The View menu expands. From the View menu, you can change the information that displays on the screen. The options on the View menu change according to which
ALT
work with Backup Exec logon accounts, connect to media servers on the network, or to reconnect to a local media server.
ALT
important options for working with Backup Exec, including starting and stopping services, using device and media operations, using Wizards, and setting default options.
ALT
ALT
Select secondary menu items by opening the main menu and using the UP or DOWN ARROW key until the desired item is highlighted. Press the RIGHT ARROW key to open a submenu, and ENTER to select your choice. Keyboard shortcuts are not case-sensitive. Mnemonic keystrokes may be pressed either sequentially or simultaneously. All menu items have mnemonics, but not all menu items have accelerators.
1411
The following table lists the shortcut keys in Backup Exec Utility.:
Keyboard Shortcuts Unique to Backup Exec Utility Backup Exec Accelerator ALT Backup Exec Mnemonic F Result
The File menu expands. From the File menu, you can create
new media servers and media server groups, view properties, or exit Backup Exec Utility.
ALT
The Edit menu expands. From the Edit menu, you can
ALT
The View menu expands. From the View menu, you can change the information that displays on the screen. The Help menu expands. Use the Help menu to access
ALT
The following table lists the shortcut keys in the Backup Exec Desktop and Laptop Option Administration Console:
Keyboard Shortcuts Unique to Backup Exec Desktop and Laptop Option Administration Console Backup Exec Accelerator ALT Backup Exec Mnemonic F Result
The File menu expands. From the File menu, you can create new Profiles and Storage Locations, and add users. The Edit menu expands. From the Edit menu, you can restore files, search for files to restore, manage alerts, and delete items. The View menu expands. From the View menu, you can change the information that displays on the screen. The Network menu expands. Use the Network menu to
ALT
ALT
ALT
work with administrator accounts, connect to media servers on the network, or to reconnect to a local media server.
1412
Administrators Guide
Keyboard Navigation and Shortcuts in Backup Exec Keyboard Shortcuts Unique to Backup Exec Desktop and Laptop Option Administration Console Backup Exec Accelerator ALT Backup Exec Mnemonic T Result
The Tools menu expands. Use the Tools menu to set global excludes, access all DLO wizards, and manage service credentials. The Window menu expands. Use the Window menu to
ALT
ALT
The following table lists the shortcut keys in the Backup Exec Desktop and Laptop Option Desktop Agent:
Keyboard Shortcuts Unique to Backup Exec Desktop and Laptop Option Desktop Agent Backup Exec Accelerator ALT Backup Exec Mnemonic F Result
The File menu expands. From the File menu, you can
ALT
ALT
ALT
The Help menu expands. Use the Help menu to access the
1413
1414
Administrators Guide
Glossary
ADAMM Advanced Device and Media Management, the Backup Exec database that automates the tracking of media and storage devices and ensuring that backups are written to the appropriate media. Administration Console The user interface that allows you to run Backup Exec operations. The user interface can be run from the media server or a remote computer. Agent A component that allows workstations or other computers, for example, Microsoft SQL Server, to interact with the Backup Exec media server. Alert An event that usually requires some form of user interaction or acknowledgment. Alert category A group used by Backup Exec to contain similar alert. Examples of alert categories include job success, install warning, and database maintenance failure. Alert source A source that can generate an alert. Alert sources include job, media, device, and system. Alert type Determined by the severity of the alert, an alert type has a corresponding colored icon. Alert types include Error, Warnings, Information, and Attention Required. Allocated media Media that belong to a user media set, and that have current append and overwrite protection periods. Append period The length of time that data may be added to the media. The append period starts when the first backup job is written to this media.
1415
Archive bit A file attribute that is set whenever a file is modified. For full and incremental backups that use archive bits, this bit is turned off after the backup completes, indicating to the system that the file has been backed up. If the file is changed again before the next incremental or full backup, the bit will be turned on and Backup Exec will back up the file. Audit log A running history of all actions performed in the Backup Exec system. An entry into the log is created each time an action that is configured to display in the audit log occurs. Backup A process where selected files on a computer drive are copied and stored on a reliable form of media. Backup Exec Service Account A user account configured for the Backup Exec system services that contains a user name and password and provides the rights to log on as a service and act as a Backup Exec administrator. Backup folder A virtual device that Backup Exec treats as any real storage device. Backup folders can be part of drive pools, but not cascaded drive pools, and are created using Backup Execs backup-to-disk feature. Backup method When you run a backup, you can specify how you want Backup Exec to use and set the files backup status. This is necessary when you incorporate a backup strategy. Backup Exec uses the following backup methods: Full - Back up files - Using archive bit (reset archive bit). Includes all of the files selected for backup and resets the archive bit to indicate that the files have been backed up. - Using modified time. Includes all of the files selected for backup and allows the use of incrementals and differentials using the modified date and time stamp. - Copy the files. Includes all selected data, and does not affect any media rotation scheme because the archive bit is not reset. - Archive the files (delete files after successful copy). Backs up the selected data, verifies the media, and then deletes the data from the volume. For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up, but not deleted.
1416
Administrators Guide
Differential - Back up changed files since last full - Using archive bit (does not reset archive bit). Includes all files that have changed (based on the archive bit) since the last full backup, and does not affect any media rotation scheme because the archive bit is not reset. - Using modified time. Includes all files changed since the last full backup, using the files last modified date and time stamp. Make sure that the same script or selection list is used for the differential backup that was used for the full backup. Incremenatal - Back up changed files since last full or incremental - Using archive bit (reset archive bit). Includes only the files that have changed (based on the archive bit) since the last full or incremental backup and resets the archive bit to indicate that the files have been backed up. - Using modified time. Includes all files that have changed since the last full or incremental backup, using the files last modified date and time stamp. Make sure that the same script or selection list is used for the incremental backup that was used for the full backup. Working Set - Back up files - Changed today. Backs up all files that were created or modified today. - Last accessed in (x) days. Includes all files that were created or modified since the last full or incremental backup. If you select this backup method, you can then indicate in the Files accessed in x days field that you want to include data that has been accessed in a specific number of days. Backup set When a backup job is run, the data selected from a single resource, such as a Microsoft Exchange dataset, is placed together on media in a backup set. Files selected from multiple resources create multiple backup sets. Backup strategy The procedures you implement for backing up your network. A good backup strategy requires minimal time to get a computer running in the event of a disaster. Baseline The first backup to run that is associated with the synthetic backup. The baseline backup runs one time only, and will always back up all of the files on the selected resources when it runs. This backup creates the baseline backup set that is used by the subsequent incremental backups.
Glossary 1417
Cascaded drive pool The grouping of drives of the same drive type so they appear logically as one drive. This grouping allows backups that exceed the capacity of media in one drive to automatically continue on the next drive defined in the group. Catalog A database for keeping track of the contents of media created during a backup or archive operation. You can only restore information from fully cataloged media. Central administration server A Backup Exec 10.0 media server with the Central Admin Server Option (CASO) installed. In a CASO environment, the central administration server becomes the centralized focal point of the Backup Exec enterprise. It is the media server where you make decisions on what data and servers are to be protected in your environment. It is also the media server where the building blocks of job creation take place - the creation of policies and the association of selection lists to those policies. Centralized catalogs Backup Exec catalogs that have been moved from a managed media server to a central administration server in order to facilitate centralized restore operations. Centralized catalogs are only available with the Central Admin Storage Option. Centralized restore Only available with the Central Admin Server Option, centralized restore is the process where you can centrally initiate, run and manage restore operations from a centralized location in your Backup Exec CASO environment. Cluster When two or four servers (called nodes) are linked in a network, and run cluster software that allows each node access to the shared disks. Custom error-handling rule An error-handling rule that you can define in Backup Exec for a specific error code in an error category. When a job fails with the error code that is associated with the custom error-handling rule, the retry options and the final job disposition are applied to it. Custom filter A filter that you can define in Backup Exec to display only the information that you specify in the Job Monitor.
1418
Administrators Guide
Database server In a shared storage environment, the server in which the shared Advanced Device and Media Management (ADAMM) database and the shared catalog resides. Differential - Back up changed files since last full One of the available backup methods. Includes all files that have been changed (based on archive bit) since the last full or incremental backup, and does not affect any media rotation scheme because the archive bit is not reset. Differential - Using modified time One of the available backup methods. Includes all files since the last full backup using the files last modified date and time stamp. Device In Backup Exec, device can refer to a robotic library drive, a stand-alone drive, a backup-to-disk folder, a backup-to-disk device, or a cascaded drive pool. Device pool A grouping of devices for Backup Exec operations. Jobs assigned to the device pool are run on the first available device. Duplicate Backup Data template A template that allows you to use a multi-stage backup strategy for backing up data to disk and then copying it to tape. Error-handling rule Default or custom rules that set retry options and final job disposition for failed or canceled jobs. Retry options let you specify how often to retry a job if it fails and the time to wait between retry attempts. The final job disposition lets you either place the job on hold until you can fix the error, or cancel the job and reschedule it. Event Action that occurs during a Backup Exec operation. For example, the canceling of a job. Failover When a node in a cluster becomes unavailable and cluster resources migrate to an available node.
Glossary
1419
Fibre channel A high speed storage network that can operate over copper wire or optical fiber and may support simultaneous transfer of many different data protocols, including SCSI, IPI, HiPPI, IP, and ATM. Fibre channel switch A networking device used to connect the components of a Fibre Channel Switched Fabric (FC-SW). Fibre Channel Switched Fabric (FC-SW) A fibre channel configuration in which the devices are connected in a network using a fibre channel switch. The full bandwidth of the fibre channel is available to all the devices. Fibre Channel Tape Controller Compaqs Fibre to SCSI Bridge. Fibre to SCSI bridge A device that connects a Fibre Channel and a SCSI bus. Full - Back Up Files - Using modified time One of the available backup methods. Includes all of the files selected for backup and allows the use of incrementals and differentials using the modified date and time stamp. Full - Back Up Files - Using archive bit (reset archive bit) One of the available backup methods. Backs up all of the files selected for backup and resets the archive bit to indicate that the files have been backed up. Full - Back Up Files - Copy the files One of the available backup methods. Includes all selected data, and does not affect any media rotation scheme because the archive bit is not reset. Full - Back Up Files - Archive the files (delete files after successful copy) One of the available backup methods. Backs up the selected data, verifies the media, and then deletes the data from the volume. For data to be deleted, rights to delete a file must be granted; otherwise data will be backed up, but not deleted. Hub A connecting device in a network that joins communication lines together.
1420
Administrators Guide
Imported media Media created by a product other than this installation of Backup Exec. Incremental - Back up changed files since last full or incremental - Using archive bit (reset archive bit) One of the available backup methods. Includes only the files that have changed (based on the archive bit) since the last full or incremental backup and resets the archive bit to indicate that the files have been backed up Incremental - Back up changed files since last full or incremental -Using modified time Includes all files that have changed since the last full or incremental backup using the files last modified date and time stamp. Job An operation that has been scheduled for processing by the media server. For example, if you make selections and submit a backup based on those selections, you have created a backup job. Jobs contain source or destination information, settings, and a schedule. Types of jobs include backup, restore, media rotation, resource discovery, report, test run, and utility jobs. Job delegation A feature of the Central Admin Server Option, job delegation is the process in which jobs are distributed using load-balancing technology to available storage devices by a central administration server in a Backup Exec environment. Job history A report of what happened during the processing of the job (statistics, errors, and so on). Job log Created when a job runs, the job log contains the results from the job. You can review the job log to review job errors and details. Junction point A physical location on a hard disk that points to data at another location on the hard disk or on another storage device. See Mount Point.
Glossary
1421
Load-balancing A feature of the Central Admin Server Option, load-balancing is a term used to describe the automatic distribution of multiple jobs from a central administration server for processing among the various storage devices across multiple managed media servers in the Backup Exec enterprise. Local device A disk or tape drive connected to a server and only available to the server to which it is attached. Logon account A Backup Exec logon account stores the credentials of a Windows user account. Logon accounts enable Backup Exec to manage user names and passwords, and can be used to browse resources or process jobs. Managed media server A feature of the Central Admin Server Option, a managed media server is a media server that is managed by a central administration server. Managed media servers are responsible for the actual processing of backup and restore jobs in a CASO environment. Media ID A unique internal label assigned by Backup Exec to individual media and used to keep statistics on each media. The media ID, unlike the media label, cannot be erased or changed. Media label Used to identify media, the label can be assigned automatically by Backup Exec or you can specify a label prefix and number to be assigned for a type of media. If the media was first used in a library with a bar code reader, the media label will consist of a pre-assigned bar code label. Media location Location of your media. In Backup Exec, there are three categories available for tracking media: Online location. The online location lists media that reside in a storage device, robotic library slot, or backup-to-disk folder. It is defined by Backup Exec, so you cannot delete or rename it. In addition, you cannot add media to it. Offline location. The offline location displays all media that are onsite but are not in drives or slots, or media vaults. Media are automatically moved to this location if you use Backup Exec to remove media from a device or slot.
1422 Administrators Guide
User-defined media vault. A logical representation of the actual physical location of media. Media overwrite protection level Set system-wide through the Media Overwrite dialog box, this option allows you to protect all, some, or no media from being automatically overwritten. Media rotation A strategy that determines when media can be reused, or rotated back into use, by Backup Exec. Media server The Microsoft Windows server where Backup Exec is installed and the Backup Exec services are running. Media server pools A feature of the Central Admin Server Option, media server pools enable you to restrict protected server backup jobs to a specific set of managed media servers and their attached storage devices. Media set A group of media on which a backup job is targeted. The media set controls the overwrite protection period, the length of time that data is retained on a specific media before being overwritten, and the append period, the length of time that data can be appended to a media assigned to a media set. Media vault A logical representation of the actual physical location of media. Mount point The directory under which a file system is accessible after being mounted. See also: Junction point Node Servers operating in a cluster environment. A node can also be a selection in a tree view on the administration console (see Using the Administration Console on page 110).
Glossary
1423
Offhost backup A feature of the Advanced Disk-based Backup Option that enables the backup operation to be processed on a Backup Exec media server instead of on the remote computer, or host computer. Moving the backup from the remote computer to a media server enables better backup performance and frees the remote computer as well. Overwrite protection period The length of time that data is retained on a specific media before being overwritten (unless the media is erased, formatted, moved to scratch media, or if the Media Overwrite Protection Level is set to None). The overwrite protection period is measured from the last time data was appended to the media. Partition A grouping of slots in a robotic library for use in Backup Exec operations. Policy A method for managing backup jobs and strategies. Policies contain templates, which provide settings for jobs. Protected server Any computer on the network that is being backed up by Backup Exec, including Backup Exec media servers. Recyclable media Media that is assigned to a media set but has expired data overwrite protection periods. Remote administrator The Backup Exec user interface (Administration Console) that is run on remote computers. Remote Agent A Backup Exec system service that runs on Microsoft Windows computers or NetWare remote servers and workstations and allows remote backup and restore of those computers and provides increased backup throughput. Resource Data files and databases, such as Windows shares and Microsoft SQL databases, that can be selected for backing up.
1424
Administrators Guide
Resource discovery A Backup Exec operation that allows detection of new backup resources within a Windows domain. Restore A process by which data that has been backed up to media is returned to disk. Retired media Media that has been taken out of service, usually because of an excessive number of errors. Media that is retired is available for restore but backups will not run to it. Media must be retired before it can be deleted. If you want to use media that has been deleted, Backup Exec will recognize it as imported media. It must be cataloged before you can restore from it. Robotic library A high-capacity data storage system for storing, retrieving, reading, and writing multiple magnetic tape cartridges. It contains storage racks for holding the cartridges and a robotic mechanism for moving the cartridge to the drive or drives. Scratch media Media that do not belong to a media set and can be overwritten, including new or blank media, erased media, and media moved from another group to scratch media. SCSI Small Computer System Interface. A processor-independent standard for system level interfacing between a computer and peripheral devices such as printers, hard drives, and CD-ROMs. Selection list The data selected to be backed up or restored. Selection lists can be save and used for multiple jobs. Shared device A disk or tape drive that can be accessed by multiple servers. Silent mode installation The process of installing Backup Exec from the command line using the setup.exe program on the Backup Exec installation CD.
Glossary
1425
Snapshot A consistent point-in-time view of a volume that is used as the reference point for the backup operation. After a snapshot is created, the primary data can continue being modified without affecting the backup operation. Synthetic backup A feature of the Advanced Disk-based Backup Option that enables a full backup to be assembled, or synthesized, from a baseline and subsequent incremental backups. The benefits of using a synthetic backup include a reduced backup window since the synthetic backup can be scheduled outside of the time critical backup window and reduced network traffic since the synthetic backup does not need to access the network. System media All media that has been introduced into the Backup Exec system, except those media that have been assigned to a media set. Template A required element of a policy that defines how and when Backup Exec processes a job. Templates specify the device, settings, and schedule options to be used for the job. Each policy must contain at least one template. Template rule A method of setting up relationships between templates in a policy. Unique Message Identifier (UMI) Errors that are reported in the job log each have a unique code, called a Unique Message Identifier (UMI). These codes contain hyperlinks that you can click to go to the Symantec Software Support Services web site and access technical notes and trouble-shooting steps that are related to a specific error. Unique Message Identifier (UMI) error code establishes unique error and message codes across all Symantec products. Wizard A series of instructional dialogs that guide you through the steps needed to accomplish a task, such as creating a backup job. Working Set - Back up files - Changed today One of the available backup methods. Backs up all files that were created or modified today.
1426
Administrators Guide
Working Set - Back up files - Last accessed in (x) days One of the available backup methods. Includes all files that were created or modified since the last full or incremental backup. If you select this backup method, you can then indicate in the Files accessed in x days field that you want to include data that has been accessed in a specific number of days.
Glossary
1427
1428
Administrators Guide
Index
Numerics 64-bit Remote Agent for Windows Servers installing using command script, 795 installing using installation program, 793 overview, 791 A accessibility dialog boxes, 1409 keyboard navigation, 1408 keyboard shortcuts, 1410 overview, 1407 settings, 1414 account, user for Oracle Agent, 1301 active alerts defined, 502 responding to, 507 viewing, 502 Active Alerts by Media Server Report, 559 Active Alerts report, 559 Active Directory Application Mode Writer, 347 Active Directory, backing up in Exchange 2000 and 2003, 1071 Active File Exclusion Exchange data, 1080 active jobs canceling, 418 removing hold, 419 viewing, 405 viewing properties, 415 AD/AM Writer, 347 ADAMM, defined, 1415 add users in DLO, CSV file to, 1179 administration console defined, 1415 Desktop Agent Console, 1230 Desktop and Laptop Option (DLO), 1134 overview, 110 role in backup process, 55 administrator accounts creating, 1137 deleting, 1141 modifying, 1140 Advanced Device and Media Management (ADAMM) database overview, 957 device management overview, 123 Devices view, 125 media operations overview, 251 Advanced Disk-based Backup Option baseline, setting, 876 best practices for offhost backup, 891 host computer, defined, 888 offhost backup overview, 888 offhost backup requirements, 889 offhost backup snapshot provider, choosing, 893 offhost backup, List Snapshot Providers option, 894 offhost backup, single volume snap, choosing, 894 synthetic backup policy, example, 882 synthetic backup template rules, 887 synthetic backup template rules, example, 882 synthetic backup template, requirements, 878 synthetic backup, collecting additional information for backups, 879 synthetic backup, creating, 882 transportable snapshots, defined, 888 VSFW FlashSnap option, using with offhost backup, 890 Advanced File Selection options described, 288 selecting files, 288 Advanced Open File Option cache file location, 1007 cache file size, setting, 1009 changing default settings for Symantec VSP, 1006 databases, backing up, 993 encrypted files, backing up, 995 installing using the command line, 997 minimum quiet time, setting, 1010 overview, 51, 991 requirements, 995 Snap Start for VSFW volumes, 1005 snapshot providers, 994 1429
Symantec Volume Snapshot Provider, 1001 uninstalling, 999 uninstalling using the command line, 998 using with Exchange Server Agent, 1074 wizard, 1008 Advanced options for backup, 277 for duplicate job, 316 for synthetic backup, 885 Advanced tab, 149 advertising to media servers, Remote Agent for Windows Servers, 800 agent for Microsoft Data Protection Manager backup job with DPM data, 1386 database backup job, 1387 database restore job, 1389 overview, 1385 protected servers backup job, 1387 protected servers restore job, 1389 requirements, 1386 restore job with DPM data, 1389 shadow copy backup job, 1388 shadow copy restore job, 1390 Agent for Microsoft SharePoint Portal Server about, 1372 about restoring a SharePoint Server or Workspace, 1364 adding a server farm, 1373 backing up SharePoint Portal Server 2003 resources, 1376 disaster recovery, 1370 installing, 1360 overview, 1359 redirecting a restore for SharePoint Portal Server 2003, 1381 redirecting restore jobs, 1366 restoring SharePoint Portal Server 2003 resources, 1378 selecting SharePoint Portal Server 2003 resources for backup, 1372 setting default options, 1384 system requirements, 1359 agent, defined, 1415 agent.cfg commands (Backup Exec 8.x and 1430
9.x Agent for Unix), 653 Agents, Backup Exec See also Exchange Server Agent, Lotus Domino Agent, NetWare Agent, Oracle Agent, R/3 for Oracle Server Agent, Remote Agent, SharePoint Agent, SQL Server Agent list of agents with descriptions, 51 See also Desktop and Laptop Option upgrading on remote computers, 105 alert category, defined, 1415 alert history defined, 502 viewing, 502 Alert History report, 561 alert notification, printers, 528, 530 alert source, defined, 1415 alert type, defined, 1415 alerts alert types, 501 assigning recipients, 533 clearing recipients, 534 configuring, 501 configuring default options, 121 defined, 501, 1415 defined for DLO, 1201 deleting in DLO, 1205 displaying in DLO, 1204 filters, 502 grooming, 1200 managing in DLO, 1205 modifying alert category properties, 534 monitoring in DLO, 1200 notification methods, 514 properties, 505 responding to, 501, 507 setting filter, 504 viewing, 502 viewing job log, 509 views, 502 all media, defined, 227 allocated media defined, 228, 1415 overwriting, 232 AOFO See Advanced Open File Option append options for media, 232 append period defined, 214, 219, 1415 Administrators Guide
setting for media set, 219 append to media option, 269 archive bit, defined, 357, 1416 archive logging Lotus Domino, 1334 recovery of Lotus Domino, 1344 archiving freeing disk space, 309 NTFS and VFAT file systems, 310 using disk grooming, 310 ARCserve media, restoring data from, 477 ASR files, in IDR copy to diskette or CD, 920 defined, 906 ASR See Automated System Recovery audit log viewing, 437 Audit Log report, 563 audit log, defined, 1416 AUTOEXEC.NCF file, Remote Agent for NetWare Servers, 1393 auto-inventory media after import job completes, 206 Automated System Recovery, 610 Automated User Assignment, 1168 creating, 1168 defined, 1122 deleting, 1173 modifying, 1171 priority, changing, 1171 properties, viewing, 1172 automatic exclusion of files during volume level backups, 1028, 1080 availability windows, 301 B back up on log on/off option in DLO, 1152 backing up desktop data, 1238 files and directories by following junction points, 277 media server using one-button backup, 308 Microsoft clusters database files, 683 local disks, 682 shared disks, 682 Windows 2000 and Windows Server 2003, 681 Index
Outlook PST files, 1247 R/3 database, 1353 remote storage, 278 VERITAS clusters database files, 695 local disks, 694 shared disks, 694 Windows 2000 and Windows Server 2003, 693 BACKINT alerts, 1349 implementation, 1347 overview, 1348 backup defined, 1416 overview, 259 Backup Exec accessibility, 1407 dialog boxes, 1409 keyboard shortcuts, 1410 installing command line installation, 81 installation requirements, 65 overview, 65 silent mode installation, 81 uninstalling, 93 upgrading, 104 using Repair option, 91 overview additional options, 51 how it works, 55 new features, 45 system requirements, 59 repairing, 91 starting after installing Library Expansion Option, 1117 upgrading options on remote computers, 105 overview, 104 Backup Exec 8.x and 9.x Agent for Unix, 653 advertise to media server, 655 back up symbolic links, 646, 652, 655 configuring, 653 loading, 656 system requirements, 649 Backup Exec 8.x and 9.x Agent for Unix commands agent.cfg commands, 653 exclude directories/files, 655 1431
identify exported paths, 654 include remote file systems, 654 password-protect published path, 654 password-protect workstation, 654 preserve ctime, 655 publish directory tree, 654 write-protect published path, 654 Backup Exec Assistant, using, 116 Backup Exec Environment Check, 63 Backup Exec for Windows Servers, described, 43 Backup Exec Server in SAN, 957 Backup Exec Service Account, defined, 66 Backup Exec services account, defined, 1416 Backup Exec Services Manager dialog box, 92 stopping and starting, 92 Backup Exec Utility CASO Tasks change catalog storage location, 750 Disable CASO job delegation on media server, 748 enable CASO job delegation on media server, 748 move central administration server, 749 overview, 745 Remove central administration server, 747 set central administration server, 746 Database Tasks, 756 aging the database, 757 change database access, 762 checking the database consistency, 757 compacting the media server database, 758 copy database, 764 dumping a media server database, 758 new Backup Exec database location, 763 rebuilding a media server database indices, 759 recovering a media server database, 760 repairing a media server 1432
database, 759 General Tasks adding new media servers, 722 deleting a media server, 724 deleting a media server group, 725 deleting media servers from the All Media Servers subnode, 724 running Backup Exec Diagnostics, 726 viewing media server properties, 729 Media Server Group Tasks adding a media server, 765 removing a media server, 766 set central administration server for a media server group, 766 SAN SSO Tasks configuring the SAN SSO, 753 moving the primary SAN SSO Server, 755 promotion to a primary SAN SSO Server, 754 removing the primary SAN SSO Server, 752 setting the primary SAN SSO Server, 752 Services Tasks applying copied media server configuration information, 743 changing service accounts, 736 copying media server configurations, 742 editing server configurations, 737 overview, 733 starting services, 734 stopping services, 734 updating configuration information for new media server name, 743 starting the Backup Exec Utility, 718 Backup Exec Web Administration Console accessing help, 712 alerts, 715 how it differs from Backup Exec for Windows Servers, 711 installing, 710 navigating, 712 requirements, 709 setting Internet Explorer properties, 710 Administrators Guide
starting, 710 Tools tab, 714 backup file defined, 176 deleting, 187 recreating a deleted file, 188 renaming, 187 viewing and changing properties, 189 backup folder adding, 177 changing the path, 180 creating for removable media, 179 creating more disk space, 267 defined, 176 deleting, 181 designating location for, 178 overview, 176 pausing and resuming, 182 recreating, 182 renaming, 180 viewing properties, 183 backup folder, defined, 1416 backup job Advanced options, 277 choices for creating, 259 copying to another server, 394 creating manually, 262 creating using the wizard, 262 Data Protection Manager, 1386 Device and Media options, 267 overview, 261 pre/post commands, 281 scheduling, 398 selecting devices and data, 284 Selections options, 265 tasks to do before, 260 Backup Job Properties dialog box Exchange options, 1075 SQL Agent, 1024 Backup Job Success Rate, 564 backup methods defined, 1416 selecting, 272 setting default, 324 using modified time, 358 backup mode, Oracle Agent, 1297 backup network changing for a backup job, 339 configuring, 336 Index
overview, 334 setting up, 336 backup options backing up data in remote storage, 278 contents of mounted local drives, 277 backup selections adding, 1157 Backup Selection dialog box, 1157, 1242 macros in, 1162 backup selections, changing order, 291 Backup Set Details by Resource report, 566 backup set, defined, 1417 Backup Sets by Media Set report, 567 Backup Size by Resource report, 568 backup strategies See also names of individual agents choosing devices to back up, 353 defined, 351, 1417 frequency of backups, 351 increasing throughput with Remote Agent for Windows Servers, 789 length of data retention, 352 multiple devices per job, 353 one job per device, 353 protecting against viruses, 352 Backup to Disk, See Backup-to-Disk, 176 backup types archive, 354 copy, 354 daily, 355 differential, 354 full, 354 incremental, 355 working set, 355 Backup Wizard, launching, 262 backups option, Configure desktop and laptop, 1134 backup-to-disk renaming file, 187 renaming folder, 180 viewing folder properties, 183 bandwidth settings DLO, for users in, 1147 bar code labels and media ID, 234 default, 235 mixed media libraries, 236 overview, 235 robotic library support, 235 1433
bar code rules changing, 237 deleting, 237 setting up, 236 baseline, defined, 1417 baseline, setting for synthetic backup, 876 BE Diagnostics, running from server properties, 147 bediag.fax file, 1404 bediag.nlm utility, saving configuration information, 1404 BEGather, 632 besernum.xml file, importing serial numbers with, 68 BESTART command, to start Remote Agent for NetWare Servers, 1393 BESTOP command, to stop Remote Agent for NetWare Servers, 1394 BEUtility.exe utility Microsoft clusters, using in, 669 BEWAC, See Backup Exec Web Administration Console biparam.ini options, 1351 specifying Backup Exec parameters, 1351 BKUPEXECDLO MSDE database instance, 1210 block size, setting for drives, 156 Boot managers, restoring in IDR, 939 bootable media for IDR CD image, creating, 920 comparing types, 905 floppy diskettes, creating, 917 tape image, creating, 924 types of media, 905 buffer count, setting for drives, 157 buffer size, setting for drives, 156 build and version information, displaying, 629 byte count, incorrect, 624 C cache file location, for AOFO, 1007 cache file size, setting for AOFO, 1009 calendar display filters, 414 view filters, 414 viewing, 413 1434
cascaded drive pools adding drives, 141 creating, 139 defined, 124, 1418 deleting, 142 deleting drives, 142 overview, 139 properties, 143 renaming, 143 requirements for using, 139 using hardware compression in, 139 CASO Backing up with, 857 Backup options default network interface for delegated jobs, 858 Centralized Restore How it works, 862 multiple storage devices, 863 requirements, 862 Changes to Backup Exec, 853 job monitor and job history, 856 media servers view, 853 media servers view columns, 853 Components, 820 central administration server, 820 managed media servers, 821 Configuration Alerts, 845 communication statuses, 840 configuring catalog storage locations, 840 configuring device pools, 840 configuring time thresholds, 840 Notification, 847 recovering failed jobs, 845 setting a central administration server, 837 setting job history options for managed media servers, 844 setting job log options for managed media servers, 844 Configuration overview, 840 Configuration scenarios, 822 Deleting a managed media server, 852 Device and Media Property, 865 Disabling and enabling communications, 849 Error codes, 872 Administrators Guide
Features, 825 centralized alerts, 827 centralized catalog storage, 826 centralized job logs and history details, 827 centralized reports, 826 centralized restore, 827 job delegation, 825 media server pools, 827 getting started, 829 How it works, 821 Icons, 856 Installation, 832 managed media servers, 832 requirements, 828 upgrading a media server to a central administration server, 836 Job History Options Setting, 844 Managed Media Server status messages, 854 Media Server Pools, 866 adding, 867 creating, 867 deleting, 869 removing a managed media server, 870 renaming, 869 using, 866 no communication status, 841 Overview, 819 Pausing and unpausing a managed media server, 848 Pausing storage devices from the central administration server, 873 Recovered jobs, 841 Recovering failed jobs, 871 Remotely connecting to a managed media server, 851 Restoring Data, 860 centralized catalogs, 861 Running managed media server operations from a central administration server, 848 Stalled managed media servers, 841 Stopping and starting Backup Exec services, 850 Uninstalling, 839 Using the Media View, 861 Index
Viewing managed media server properties, 852 catalog defined, 1418 levels, 455 media in drive, 452 removing unused after x days, 455 searching, 483 catalog database, in SAN Shared Storage Option, 971 catalog operation errors DLT tape drive hangs, 622 Catalogs Using Media View, 861 central administration server, defined, 1418 centralized catalogs, defined, 1418 centralized restore, defined, 1418 CHECKCATALOG utility, 1021 CHECKDB utility, 1021 CHECKFILEGROUP utility, 1021 checkpoint restart on Microsoft cluster failover enabling or disabling, 667 overview, 665 circular logging Exchange 2000 and 2003, reviewing in, 1081 Exchange 5.5, reviewing in, 1081 Lotus Domino, 1334 recovery of Lotus Domino server, 1345 cleaning jobs, submitting for robotic libraries, 204 Cleaning tab for drive properties, 161 cleanings number performed, 127 set maximum number of, 127 clone CD image creating, 98 overview, 69, 98 clrest command, 687 Cluster Failover error-handling rule, 440, 444 cluster, defined, 1418 clusters Desktop and Laptop Option, 1210 disaster recovery entire cluster manually, 700 nodes using IDR, 698 1435
using IDR to prepare, 698 installation Backup Exec on a VERITAS cluster server, 691 Microsoft adding or removing a failover node, 668 all drives pool, 664 backing up shared disks, 682 BEUtility, 669 changing the order in which nodes fail over, 668 configurations, 670, 671, 672, 673, 675 creating drive pools, 664 database files, 683 database server, designating new in SAN SSO, 669 disaster recovery, 702, 703, 705 disaster recovery of Backup Exec on a cluster using IDR, 700 failover restart, 658 installation, 660, 662 local disks, 682 Open File Option, and using, 662 overview, 680 Remote Agent, installing, 660 restoring, 684, 685, 686 system state, backing up, 682 uninstalling Backup Exec, 663 virtual servers, backing up, 683 Windows 2000 and Windows Server 2003, 681 restoring specifying a new drive letter for the Microsoft cluster quorum disk, 688 size, 625 troubleshooting, 705 using with Backup Exec, 657 VERITAS backing up, 693, 694, 695 disaster recovery, 697, 704 overview, 692 Remote Agent, installing, 691 restoring Windows 2000 and Windows 2003, 696 system state, backing up, 694 virtual servers, backing up, 695 1436
combination R/3 database server/media server recovery, 1356 command line installation of Backup Exec, 81 command line interface, 1213 -assignSL, 1214 -changeserver, 1217 -createrecoverykeys, 1228 -DisableNCOM, 1225 -emergencyrestore, 1224 -enableuser, 1216 general options, 1213 -inactiveaccounts, 1227 -keytest, 1218 -listprofile, 1218 -listsl, 1219 -listuser, 1220 -logfile, 1221 -notifyclients, 1227 remote server options, 1213 -renameuser, 1225 -setrecoverypwd, 1225 syntax, 1213 -update, 1222 commands See also names of individual commands Communication Statuses CASO, 840 completed jobs, job log overview, 433 compression Desktop Agent backup selections, setting, 1245 DLO backup selections, setting, 1161 enable hardware compression option, 155 in cascaded drive pools, 139 setting backup defaults, 327 configuration settings copying to another server, 396 Configuration Settings report, 569 Configuration tab for drive properties, 155 Configuration tab for robotic library, 169 Configuration Wizard for DLO, 1145 Configure Alerts dialog box, 1204 Configure desktop and laptop backups option, 1134 Configure Devices button, 109 Configure SAN SSO, See Backup Exec Utility, 753 Administrators Guide
configuring, 1308 drives, 154 holidays, 404 media servers to use with Oracle Agent, 1311 Oracle Agent, overview, 1306 robotic library, 165 consistency check options Exchange Server Agent, 1078 SQL Agent, 1019 continuing Exchange backup if consistency check fails, 1078 control file backup, Oracle Agent, 1300 copy jobs, selection lists, and policies, 394 creating more disk space for backup folder, 267 CSV file to add users in DLO, 1179 custom error-handling rule, defined, 1418 custom filter, defined, 1418 custom filters, managing, 407 D daily backups, defined, 355 Daily Network Device Utilization report, 571 Daily Usage by Policy report, 573 damaged media, removing, 233 database files, backing up in a Microsoft cluster, 683 database files, backing up in a VERITAS cluster, 695 database instance, BKUPEXECDLO MSDE, 1210 database log mode, Oracle Agent, 1300 database maintenance configuring, 447 overview, 447 database server defined, 957, 1419 in Microsoft clusters, 669 Date Modified tab, 486 debug logging, enable for remote Windows computers, 802 default options backup and restore for Exchange 2000 and 2003, 1102 IDR, setting, 909 overview, 55 restore, 490 Index
setting, 119 setting for backup jobs, 324 SQL Agent, backup and restore, 1052 default preferred configuration settings for drives, 157 deleting Automated User Assignment, 1173 DLO desktop computer, 1191 drive pools, 136 drives from pools, 136 media, 252 revisions in DLO, 1161 Storage Location in DLO, 1167 user entry from DLO, 1181 vault, 248 Desktop Agent advanced view option, 1241 backing up data, 1238 Backup Selection dialog box, 1242 backup selections compression, setting, 1245 encryption, setting, 1245 modifying, 1239 overview, 1238 compression, setting for backup selection, 1245 console, 1230 Desktop User Data Folder, moving, 1251 encryption, setting for backup selection, 1245 filter options, History view, 1270 glossary, 1293 History view, 1269 include/exclude, 1242 install set default location, 1234 installing, 1133 log files, overview, 1269 log on/log off option, 1251 menu bar, described, 1232 overview, 1229 Reset accounts option, 1233 Reset dialogs option, 1233 Restore dialog box, 1265 restoring files, 1264 Revision Control tab, 1244 revisions, deleting automatically, 1245 schedule, customized, 1250 scheduling backup jobs, 1250 1437
see also Desktop and Laptop Option (DLO) standard view option, 1240 Status view, 1259 storage limits for user data, 1253 synchronization create new sets, 1256 delete synchronized folder, 1257 Synchronized Selections view, 1255 tasks bar, described, 1232 views menu, described, 1232 Desktop Agent Users managing, 1177 desktop and laptop backups option, Configure, 1134 Desktop and Laptop Option clustering, 1210 Desktop and Laptop Option (DLO), 111, 1121 see also Desktop Agent access, disabling/enabling, 1181 adding user, 1178 administration console, 1134 administrators, creating, 1137 alerts categories, defined, 1201 Configure Alerts dialog box, 1204 deleting, 1205 displaying, 1204 managing, 1205 monitoring, 1200 Automated User Assignment creating, 1169 defined, 1122 deleting, 1173 modifying, 1171 priority, changing, 1171 properties, viewing, 1172 backup selection deleting, 1164 modifying, 1163 backup selections adding, 1155 BEUtility.exe utility, using, 1210 compression, setting for backup selection, 1161 Computer History pane, 1193 Configuration Wizard, 1145 configuring, 1145 1438
deleting entry from DLO database, 1191 encryption, setting for backup selection, 1161 filter options, History view, 1194 glossary, 1293 History view, 1192 import multiple users in CSV file, 1179 include/exclude, 1158, 1242 installing, 1130 Job History pane, 1194 Move priority down option, 1171 Move priority up option, 1171 MSDE database instance, maintaining, 1210 overview, 111, 1121 Profile creating, 1146 defined, 1122 edit schedule, 1152 log on/off option, 1152 logging options, 1153 Schedule tab, 1152 properties, changing user, 1180 removing user, 1181 reset dialogs and accounts, 1233 restoring, 1186 revisions defined, 1156 deleting automatically, 1161 setting number to keep in DLO, 1159, 1244 storage limits for user data, 1148 Storage Location defined, 1122 deleting, 1167 moving users, 1182 summary status, 1143 user bandwidth settings, 1147 User Data Folder, 1165 User Properties dialog box, 1180 View history log file option, 1196 viewing users, 1180 device allocation in a shared storage environment, 961 selecting for backup job, 267 Device and Media options for backup job, 267 Device Driver Installation Wizard, 129 Administrators Guide
device management, 123 device operations See also robotic library cataloging media, 452 ejecting media, 203 Enable Hardware Compression Option, 155 erasing media (quick or long), 195 formatting media, 199 inventorying a drive, 193 labeling media, 201 overview of utility jobs, 192 retensioning a tape, 198 using with SAN Shared Storage Option, 964 device pool, defined, 1419 Device Summary Report, 962 Device Summary report, 571 device, defined, 1419 devices configuring, 128 Device Driver Installation Wizard, 129 Hot-swappable Device Wizard, 128 pausing and resuming, 130 renaming, 130 troubleshooting, 976 viewing, 125 viewing with Library Expansion Option, 1119 Devices view, 125 Dfs See Distributed file system DHCP See Dynamic Host Configuration Protocol dialog box Backup Selection, 1157 New Automated User Assignments, 1170 Restore, 1188 dialog box, Move User, 1182 dialog boxes, overview, 113 differential - Back up changed files since last full defined, 1419 differential - Using modified time defined, 1419 differential backups advantages and disadvantages, 356 defined, 354 disable device for Backup Exec, 153, 168, Index
184 disaster preparation Disaster Preparation Plan (DPP), 606 emergency repair disk, 609 Exchange 2000 and 2003, 1108 hardware protection, 606 Lotus Domino Agent, 1343 off-site storage, 606 overview, 605 SQL 2000, 1057 disaster recovery See also names of individual agents clusters Backup Exec on a Microsoft cluster using IDR, 700 entire cluster manually, 700 nodes using IDR, 698 using IDR to prepare, 698 data protected by Backup Exec agents, 610 different types of computers, overview, 610 Exchange 2000 and 2003, 1108 Exchange 5.5, 1111 local Windows 2000 computers (non-authoritative), 611 Lotus Domino Agent, 1343 manual recovery of Windows system, 610 Microsoft clusters Backup Exec, 705 data files, 702 shared disks, 703 Oracle Agent, 1321 overview, 610 Remote Agent for NetWare Servers, 1405 remote Windows 2000 computers (non-authoritative), 615 VERITAS clusters overview, 697 shared disks, 704 disaster recovery alternate data path, in IDR, 911 disaster recovery data path, in IDR, 910 disaster recovery file (*.dr file) in IDR defined, 906 setting locations for, 909 Disaster Recovery Wizard 1439
requirements, 945 running, 945 disk grooming, using for archive job, 310 Disk Management, using in IDR, 948 Distributed file system (Dfs) backing up, 287 restoring, 476 DLO Configure Alerts dialog box in, 1204 User Properties dialog box in, 1180 DLO Administration Console, restoring from, 1186 DLO see also Desktop and Laptop Option (DLO), Desktop Agent DLO, back up on log on/off option in, 1152 DLO, Configuration Wizard for, 1145 DLO, CSV file to add users in, 1179 DLO, glossary for, 1293 DLO, Move priority options in, 1171 DLT tape, drive hangs when cataloging, 622 Domain Controller, using redirected restore to install from media, 488 domains, host and target, defined, 61 DPM Agent backup job with DPM data, 1386 database backup job, 1387 database restore job, 1389 overview, 1385 protected servers backup job, 1387 protected servers restore job, 1389 requirements, 1386 restore job with DPM data, 1389 shadow copy backup job, 1388 shadow copy data restore job, 1390 DPP See also Disaster Preparation Plan Drive Pool Properties dialog box, 138 drive pools See also cascaded drive pools adding drives, 134 creating, 133 creating in a Microsoft cluster, 664 default for SAN Shared Storage Option, 963 defined, 123 deleting, 136 deleting drives, 136 overview, 132 prioritizing drives, 135 properties, 138 1440
renaming, 137 SAN Shared Storage Option, 961 using the default drive pool, 132 viewing properties, 138 drive properties Cleaning tab, 161 Configuration tab, 154 General tab, 152 Media Types tab, 163 SCSI Information tab, 158 Statistics tab, 159 viewing, 151 drivers download latest, 621 drives block size, 156 buffer count, 157 buffer size, 156 configuring, 154 default settings, 157 high water count, 157 SCSI information, 158 specifying media types for, 163 statistics on usage, 159 statistics since cleaning, 161 using exclusively with Backup Exec, 191 duplicate backup data template defined, 1419 duplicate backup sets template overview, 381 duplicate backup sets templates adding to a policy, 382 duplicate job advanced settings, 316 duplicating backup data, 315 Dynamic Host Configuration Protocol (DHCP), 641 E editions of Backup Exec, listed and described, 43 See also names of individual editions eject media after job completes, 269 from a drive, 203 e-mail configuring MAPI notification, 515 configuring SMTP notification, 514 configuring VIM notification, 516 Administrators Guide
emergency repair disk, creating, 609 enabling bar code rules, 169 device for Backup Exec option, 153, 168, 184 hardware compression, 155 Removable Storage (RSM), 170 robotic library initialization on startup, 169 encrypted files, backing up with AOFO, 995 encryption, 1189, 1255, 1277 backup selections, in Desktop Agent, 1245 backup selections, in DLO, 1161 encryption, setting, 1245 Environment Check, running for Backup Exec, 63 erase media operation, quick or long, 195 error codes, Unique Message Identifier, viewing, 432 error-handling rule, defined, 1419 error-handling rules Cluster Failover rule, 440, 444 configuring, 440 custom rules, defined, 439 default rules, defined, 439 overview, 439 Recovered Jobs custom rule, 440 Evaluation version installing for Backup Exec options, 71 Evaluation version, installing Backup Exec, 68 Event Logs report, 575 Event Recipients report, 576 event, defined, 1419 example policies, 365 Exchange 2000 and 2003 agent features, 1065 agent requirements, 1066 disaster recovery, 1108 logon accounts, overview, 1068 protecting Exchange 2003 using VSS, 1074 resource discovery feature, using with, 1066 restoring Exchange 2003 with Recovery Storage Group, 1092 Exchange 2000 and 2003, backing up Active Directory, 1071 Index
backup methods, 1076, 1103 circular logging, reviewing, 1081 Exchange 2003 with VSS, 1074 Guide Me wizard, 1078 Internet Information Service (IIS) metabase, 1070 Key Management Service (KMS), 1070 mailbox backup methods, 1077 public folders, 1082 recommended selections, 1070 single instance backup for message attachments, 1077 Site Replication Services (SRS) database, 1070 storage groups, 1079 system state, 1070 Exchange 2000 and 2003, restoring, 1086 commit after restore completes option, 1088 mailboxes and user accounts, recreating, 1086 mount database after restore option, 1088 no loss restore option, 1087 redirecting storage groups and databases, 1098 requirements, 1089 restore defaults, 1102 Restore Job Properties dialog box, 1086 restoring data to server, 1086 temporary location for log and patch files, 1088 Exchange 2003, restoring redirecting database restores, 1099 Exchange 5.5 logon accounts, overview, 1068 resource discovery feature, using with, 1066 Exchange 5.5, backing up backup methods, 1076 circular logging, reviewing, 1081 Guide Me wizard, 1078 information store and Exchange directory, 1079 Key Management Service (KMS), 1071 mailbox backup methods, 1077 recommended selections, 1071 single instance backup for message attachments, 1077 1441
Exchange 5.5, restoring defaults, 1105 DS/IS consistency adjuster after restore, 1091, 1097 no loss restore option, 1087 redirecting database restores, 1098 requirements, 1089 restore private mailboxes option, 1087 restore public folder option, 1087 Exchange data, strategies for backing up, 1068 Exchange Server Agent backing up Guide Me wizard, 1076 Backup Job Properties dialog box, 1075 best practices, 1072 creating backup job, 1079 excluding files during volume level backups, 1080 installation, 1067 overview, 1065 redirecting data, 1096 requirements, 1066 using snapshot technology, 1074 Exchange Server Agent, restoring change password when recreating mailboxes, 1107 redirecting mailboxes, 1100 Redirection dialog box, 1096 executing a command after backup, 281 after restore, 469 before backup, 281 before restore, 468 export media template, 370 exporting media, 207 F failback, defined, 658 Failed Backup Jobs report, 576 failover defined, 657 Microsoft adding or removing a failover node, 668 changing the order in which nodes fail over, 668 restart, 658 failover, defined, 1419 1442
farms adding, 1373 changing the default farm name, 1375 deleting, 1376 FAT cluster size, 625 partition, 624 father/son media rotation strategy, 249 Fibre Channel Arbitrated Loop (FC-AL) defined, 1420 fibre channel switch, defined, 1420 Fibre Channel Switched Fabric (FC-SW), defined, 1420 fibre channel tape controller, defined, 1420 fibre channel, defined, 1420 fibre to SCSI bridge defined, 1420 file permissions, restoring, 471 file to add users in DLO, CSV, 1179 filegroups backing up SQL, 1031 displaying, 1031 restoring SQL Agent, 1044 restoring nonprimary SQL 2000, 1040 restoring primary SQL 2000, 1040 files, processing open, 279, 330 filters calendar, 414 History view filters, setting in Desktop Agent, 1270 History view filters, setting in DLO, 1194 job monitor, 405 jobs list, 405 filters for alerts, 502 filters, managing custom, 407 finding media in a location or vault, 244 format media, 199 frequently asked questions about using Backup Exec, 117 Full - Back Up Files - Archive the files defined, 1420 Full - Back Up Files - Copy the files defined, 1420 Full - Back Up Files - Using archive bit Administrators Guide
(Reset Archive Bit) defined, 1420 Full - Back Up Files - Using modified time defined, 1420 full backups advantages and disadvantages, 356 defined, 354 G General drive properties, 152 general job defaults, setting, 122 general media properties, viewing, 253 general options duplicate job, 316 restore jobs, 461 synthetic backup, 885 General tab robotic library, 166 General tab, media server properties, 145 global excludes adding, 1175 deleting, 1175 macros, 1176 using macros in, 1176 glossary for DLO, 1293 grandfather media rotation strategy, 250 grooming alerts, 1200 files, 1164 groups, configuring recipients, 530 H hardware compression in cascaded drive pools, 139 creating profile, 608 enable hardware compression option, 155 protection in case of disaster, 606 high water count, setting for drives, 157 holding jobs that back up selection lists, 296 host domain, defined, 61 hub defined, 1420 I IBM computers, recovering with IDR, 941 IDR Configuration Wizard, 906 imported media
defined, 227, 1421 labeled by Backup Exec, 235 overwriting, 232 importing media, 205 importing templates, 372 include/exclude Desktop Agent backup selections, 1242 DLO backup selections, 1158 Incremental - Back up changed files since last full or incremental - Using archive bit, defined, 1421 Incremental - Back up changed files since last full or incremental - Using modified time, defined, 1421 incremental backups advantages and disadvantages, 357 defined, 355 Information Desk, overview, 113 installation parameter file creating, 89 defined, 89 using, 89 installation requirements, Backup Exec, 65 See also names of individual agents and options installing additional Backup Exec options on a Microsoft cluster, 662 Backup Exec, 67 Backup Exec in a Microsoft cluster, 660 Backup Exec in a VERITAS cluster, 691 besernum.xml file, import serial numbers, 68 Desktop Agent, 1133 Desktop and Laptop Option, 1130 Domain Controllers from media, 488 Environment Check, running pre-install, 63 Evaluation version, 68 Evaluation version for Backup Exec options, 71 import serial numbers, 68 Library Expansion Option, 1117 locally additional options, 71 using clone CD image, 99 Microsoft Data Access Components (MDAC), 57 Microsoft SQL Server 2000 Desktop 1443
Index
Engine (MSDE 2000), 57 Open Database Connectivity (ODBC), 57 overview, 57 Remote Administrator, 95 remotely using clone CD image, 99 SharePoint Agent, 1360 storage devices, 57 to an existing Microsoft SQL Server 2000 instance, 58 using installation program on CD, 67 using Repair option, 91 using Terminal Services, 67 Windows Management Instrumentation performance counter, 540 Windows Management Instrumentation SNMP provider, 541 instance, BKUPEXECDLO MSDE database, 1210 Intelligent Disaster Recovery (IDR), 901 alternate data path on a remote computer, 911 ASR files, 906 boot managers, 939 catalog entries, added to *.dr file, 901 clusters recovering Backup Exec on a Microsoft Cluster, 700 recovering nodes, 698 disaster recovery diskettes, updating, 931 disaster recovery file (*.dr file), defined, 906 First Time Startup Configuration Wizard, 906 hard disk partitions, changing, 946 hard drive partition, altering sizes using IDR, 949 IBM computers, 941 installing, 903 Microsoft Exchange Server, recovering, 954 Microsoft SQL Server, recovering, 953 Options - Set Application Defaults dialog box, 909 OS/2 boot manager, restoring, 939 overview, 51 Recovery Wizard, running, 945 requirements, 902 1444
restoring remote media server, 948 Sharepoint Portal Server, recovering, 954 System Commander boot manager, restoring, 939 utility partitions, backing up, 914 virtual devices, using in, 176, 902 Windows Automated System Recovery (ASR) files, 906 Internet Information Services (IIS) metabase, backing up, 1070 inventory job creating, 194 setting job priority, 194 inventorying all drives on startup, 120 all drives when Backup Exec starts, 193 drives, 193 J job delegation, defined, 1421 Job Distribution by Device report, 577 job history defined, 56, 1421 deleting report, 552 History view filters, setting in DLO, 1194 saving report, 552 viewing, 428 viewing in Desktop Agent, 1269 viewing report, 551 job log configuring default options, 435 defined, 1421 status overview, 433 Job Log Options Setting, 844 job monitor DLO jobs, viewing, 1192 filters, 405 views, 405 job priority setting for cleaning jobs, 205 setting for eject job, 203 setting for erase job, 198 setting for export job, 207 setting for format job, 200 setting for import job, 206 setting for inventory job, 194 Administrators Guide
setting for label media job, 202 setting for retension job, 199 job progress indicators, displaying, 121 job status, and setting thresholds for, 445 jobs changing priority for scheduled, 425 configuring default Lotus Domino options, 1332 configuring default schedule, 403 configuring error-handling rules, 440 configuring new recipients, 535 configuring schedule, 398 creating from policies, 378 defined, 1421 deleting jobs created from policies, 380 deleting scheduled, 426 edit recipients, 535 editing schedule, 401 holiday scheduling, 404 Lotus Domino backup properties, 1335 removing hold active jobs, 419 scheduled jobs, 424 run report, 548 running scheduled job, 423 running scheduled test job, 426 scheduled, modifying, 420 scheduled, viewing, 420 scheduling, 398 selecting recipients for notifications, 534 setting general defaults, 122 viewing active, 405 viewing and filtering calendar, 413 jobs list, 405 viewing and scheduling in a SAN, 970 viewing completed, 427 jobs list view filters, 405 viewing, 405 Jobs Summary report, 578 junction point, defined, 1421 K Key Management Service (KMS) database, backing up, 1070, 1071 L labeling media Index
creating default labels, 241 imported media label, 235 in drive, 201 renaming, 238 using bar code labels, 235 laptop backups option, Configure desktop and, 1134 last known good menu, 607 Library Expansion Option overview, 51, 1115 SCSI addresses for hardware, 1115 setting up hardware, 1115 library sharing, configuring server for, 966 License Information tab, media server properties, 150 linked drives See cascaded drive pools load-balancing, defined, 1422 local device, defined, 1422 local media server, breaking connection with, 96 lock open files for backup, 279, 330 lock robotic library panel, 208 log on/off option in DLO, back up on, 1152 logon account, defined, 1422 logon accounts changing default, 392 changing for a resource being backed up, 292 default, defined, 386 deleting, 391 editing, 390 Exchange 2000 and 2003 resources, 1068 Exchange 5.5 resources, 1068 overview, 386 replacing, 391 SQL resources, 1015 system logon account, 387 testing, 292 logon information copying to another server, 396 Lotus Domino Agent APIs, 1332 archive logging, 1334 backup options, 1335 circular logging, 1334 configuring default options, 1332 database backup overview, 1332 database backup requirements, 1328 1445
disaster preparation, 1343 disaster recovery archive logging, 1344 circular logging, 1345 of server, 1343 overview, 52, 1327 redirecting restore, 1341 requirements, 1328 restore overview, 1337 selecting for restore, 1338 selecting restore options, 1340 supported configurations, 1333 viewing databases, 1330 M Machines Backed Up report, 579 Macintosh Agent, system requirements, 643 macros global excludes, 1176 mailboxes backup methods, 1077 best practices, 1082 change password when recreating, 1107 Exchange 2000 and 2003 overview of backing up, 1082 recreating mailboxes and user accounts, 1086 exclude specific folders, 1082 redirecting restores, 1100 restore overview, 1094 majority node in a cluster, 659 managed media server, defined, 1422 Managed Media Servers report, 579 manually update server list, for NetWare, 1403 MAPI e-mail notification method, 515 MAPI, configuring recipients, 520 master database backup, 1019 master database restore SQL Agent, 1036 media adding to the offline location or user-defined media vault, 245 all media, defined, 227 allocated, defined, 228 append backup to, 269 append options, 232 1446
creating default labels, 241 damaged, 233 deleting, 252 deleting vault, 248 displaying media ID, 253 finding in a location or vault, 244 general properties, 253 how Backup Exec searches for overwritable media, 229 imported, defined, 227 moving to a media set or vault, 252 moving to a new location, 247 overwrite for backup, 269 overwrite options, 228 overwriting allocated or imported, 232 properties, 253 recyclable, defined, 228 retired, defined, 227 scratch, defined, 227 setting default options, 239 sharing, 971 statistical properties, 255 system, defined, 227 testing integrity of, 318 using with Removable Storage, 190 with excessive errors, 233 media capacity, testing before backup runs, 323 media catalogs, 957 media categories, 227 media ID, defined, 234, 1422 media label bar code rule changing, 237 deleting, 237 in mixed media libraries, 236 bar codes, 235 defined, 1422 imported, 235 overview, 234 renaming, 238 media location, 243 media location, updating, 245 media name, specifying during backup job, 268 media operations deleting media, 252 moving media, 252 viewing media properties, 253 Administrators Guide
media overwrite protection levels, defined, 226, 1423 media overwrite protection, overview, 213 Media Required for Recovery report, 581 media rotation, 361 media rotation in SAN, 972 media rotation strategies father/son, 249 grandfather, 250 son, 249 media rotation, defined, 1423 media server backing up using one-button backup, 308 connecting, 96 connecting to, 1141 defined, 1423 running diagnostics on, 144 viewing properties, 144 media server pools, defined, 1423 media servers configuring for robotic library sharing, 966 media set creating, 218 default, 217 defined, 228, 1423 deleting, 221 overwrite and append properties, 223 renaming, 222 selecting for backup job, 268 shared storage environments, and, 971 vault rule properties, 225 wizard, running, 221 Media Set report, 582 media types, specifying for drives, 163 media vault defined, 243, 1423 deleting, 248 finding media in a vault, 244 media vault renaming, 244 user-defined creating, 244 defined, 243 Media Vault Contents report, 583 media vault, defined, 1423 Media View, 861 media view, 451 Index
menu bar, overview, 110 menus, described Help, 1413 Window, 1411 messages error, 623 Microsoft Cluster Server, using with Backup Exec, 658 Microsoft clusters clrest command, 687 Microsoft Data Access Components (MDAC), installing, 57 Microsoft Exchange Server See also Exchange Server Agent Microsoft SQL Server 2000 Desktop Engine (MSDE), installing, 57 Microsoft SQL Server See also SQL Server Agent Microsoft Terminal Services, and installing Backup Exec, 67 Microsoft Volume Shadow Copy Service (VSS), and AOFO, 1002 minimum quiet time, setting for AOFO, 1010 Missed Availability report, 584 mixed media library bar code labeling, 236 mount point, defined, 1423 mounted local drives, backing up files and directories, 277 Move Media to Vault report, 585 Move priority options in DLO, 1171 Move User dialog box, 1182 moving media from vault, 248 media to a media set or vault, 252 MSCS, using with Backup Exec, 658 MSDE 2000 components, installed with Backup Exec, 57 MSDE database instance, BKUPEXECDLO, 1210 MSDE database instance, DLO, 1210 multi-stage backup strategy, 381 N Name & Location dialog box, 485 named transaction include in restore, SQL 2000, 1039 restore up to, SQL 2000, 1039, 1043 navigation bar, overview, 111 1447
Net Send, configuring recipients, 526 NetWare SMS options, 1403 network changing a backup network for a job, 339 overview of backup networks, 334 setting up a backup network, 336 network options, restore job, 493 network protocols, IPX/SPX, 337 Network User Data Folder creating, 1177 New Automated User Assignments dialog box, 1170 New Backup-to-Folder dialog box, 178 node, defined, 1423 nodes configurations in a Microsoft cluster, 670 defined, 657 disaster recovery using IDR, 698 Microsoft adding or removing a failover node, 668 changing the order in which nodes fail over, 668 nonlogged operations occurring in SQL 7.0, 1034 notification assigning recipients to alerts, 533 defined, 502 notifications assigning alert categories, 533 clearing recipients, 534 configuring MAPI e-mail, 515 configuring pager, 517 configuring SMTP e-mail, 514 configuring SNMP, 536 configuring VIM e-mail, 516 methods defined, 514 modifying alert category properties, 534 modifying recipient properties, 531 scheduling recipients, 531 selecting recipients for jobs or selection lists, 534 NTFS cluster size, 625 partition, 624 1448
numbering, specify for media label, 241 O offhost backup best practices, 891 host computer, defined, 888 List Snapshot Providers option, 894 overview, 888 requirements, 889 single volume snap, choosing, 894 snapshot provider, choosing, 893 transportable snapshots, defined, 888 VSFW FlashSnap option, using with, 890 offhost backup, defined, 1424 offline media location adding media to, 245 defined, 243, 1422 offline, when devices display as, 153, 168, 184 off-site storage of backups, 606 on/off option in DLO, back up on log, 1152 one-button backup, 308 online media location, 243, 1422 Online Registration Wizard, using, 90 online, putting device back, 153, 168 Open Database Connectivity (ODBC), installing, 57 open files backing up, 279 backing up with AOFO, 992 setting default for backing up, 330 unable to back up, 624 Operations Overview report, 586 optimizing remote backups, 278 option in DLO, back up on log on/off, 1152 option, Configure desktop and laptop backups, 1134 options default for job log, 435 Options - Set Application Defaults General, 122 Preferences, 120 options in DLO, Move priority, 1171 options, additional Backup Exec options described, 51 Oracle Agent, 1308 account, creating user, 1301 adding media servers, 1311 Administrators Guide
archived redo logfiles, 1297 backup mode, described, 1302 backup strategies, 1298 error messages, 1324 fully specified paths, using, 1305 installing, 1307 overview, 52 renaming data files from a single tablespace, 1305 shutting down and restarting the Oracle database, 1303 system requirements, 1298 troubleshooting, 1324 types of data to protect, 1299 Oracle Agent, backing up closed database, 1315 online database, 1312 online tablespaces, 1314 Oracle Agent, configuring archived logfiles directory, 1306 ARCHIVELOG mode, 1302 automatic archival, 1300, 1302 BECF.BAK, 1300 control file backup, 1300 control file backup location, 1310 database control file, 1306 database log mode, 1300, 1302 Database tab, 1311 General tab, 1311 INIT.ORA, 1304 INITORCL.ORA, 1300 instance initialization parameter files, 1304 list of configured media servers, 1309 multiple database instances on a single database server, 1304 Oracle account username, 1310 Oracle Server using the Oracle Agent Configuration Utility, 1306 overview, 1306 removing configured media servers, 1309 requirements, 1300 server manager, 1302 SID, 1304 SID name, 1310 tablespace data, 1299 TCP/IP address, 1311 Oracle Agent, disaster recovery Index
file system backup, 1321 Oracle database server and media server combination, 1323 remote Oracle database server, 1322 requirements, 1321 tablespace data files, 1321 Oracle Agent, restoring closed database, 1318 database control file, 1320 individual tablespaces, 1319 online database, 1317 Oracle information manager, 1319 over existing files, 1316 Oracle server manager, 1320 Outlook PST files backing up, 1247 overview, 901 overview tab, using, 113 overwritable media, how Backup Exec searches for it, 229 overwrite default media label, 241 overwrite media option, specifying for backup job, 269 overwrite protection levels full, 239 none, 240 partial, 239 overwrite protection period defined, 214, 219, 1424 setting for media set, 219 overwrite protection, disabling, 240 P pager configuring recipients, 523 notification method, 517 parameter file, editing in R/3 Agent for Oracle Server, 1351 partial overwrite protection, 239 partition creating for robotic library, 172 defined, 1424 FAT, 624 NTFS, 624 redefining for robotic library, 174 password database, Remote Agent for NetWare Servers, 1394 pausing device, 130 performance, increasing during backups of 1449
remote Windows computers, 790 physical check, SQL 2000, 1027 physical only check, available with SQL 2000 only, 1019 PHYSICAL_ONLY utility, 1021 placing scheduled job on hold if test run fails, 323 point in time log restore option SQL Agent, 1039, 1042 policies copying to another server, 394 policy adding a backup template, 367 adding a duplicate backup sets template, 382 adding an export media template, 370 changing template rules, 377 creating jobs, 378 creating manually, 363 creating synthetic backup using the Policy Wizard, 881 creating using the Policy Wizard, 363 defined, 1424 deleting, 364 deleting a template, 373 deleting jobs created from policies, 380 deleting template rules, 377 duplicate backup sets template overview, 381 editing a template, 372 importing templates, 372 migrating templates, 367 overview, 361 setting template schedules, 369 template rules, 373 using an example policy, 365 using templates, 366 Policy Jobs by Resource report reports Policy Jobs by Resource, 589 Policy Jobs Summary report, 590 Policy Properties report, 591 Policy Protected Resources report, 592 portal support, 207 post-job command setting for backup job, 281 setting for restore job, 467 pre/post command options for jobs, 332 prefix, creating for media label, 241 1450
pre-job command setting for backup job, 281 setting for restore job, 467 preserve tree option for backup job, 273 for restores, 463 primary navigation bar, 712 primary server defined, 957 printer, configuring recipients, 528 priority Automated User Assignment, changing, 1171 changing for scheduled job, 425 setting for drives in pools, 135, 185 setting for restore job, 462 priority for selection lists, 301 priority options in DLO, Move, 1171 Problem Files Report, 593 Problem Files report, 593 Process logical volumes for backup one at a time, supported by Exchange Agent, 1074 Process logical volumes for offhost backup one at a time, supported by Exchange Agent, 1074 product updates, receiving, 101 Profile, 1146 back up on log on/off option, 1152 creating, 1146 defined, 1122 edit schedule, 1152 logging options, 1153 prompt before overwriting allocated or imported media, 240 properties active job, 415 alerts, 505 Lotus Domino, 1335 media general, 253 statistical, 255 report, 553 user, changing in DLO, 1180 protected server, defined, 1424 PST files backing up, 1247 public folders best practices, 1082 Exchange 2000 and 2003 Administrators Guide
backing up, 1082 Exchange 5.5 restore public folder option, 1087 Exchange Server Agent, restoring mailboxes and public folders, overview, 1094 exclude specific folders, 1082 published drives, defined, 635 Q Quick Start Edition of Backup Exec, described, 44 R R/3 Agent for Oracle Server backing up the R/3 database, 1353 BACKINT implementation, 1347 how it works, 1347 installing, 1350 requirements, 1349 security, 1348 R/3 Agent for Oracle Server, restoring disaster recovery requirements, 1355 submitting restore jobs, 1354 R/3 database server, restoring, remote recovery, 1355 RALUS Installation overview, 804 Making backup selections, 810 Manual install and uninstall, 814 Manually installing from a tar file, 814 Manually starting the RALUS daemon, 815 Manually stopping the RALUS daemon, 816 Manually uninstalling, 815 requirements, 803 Setting Linux/Unix properties, 812 Uninstalling, 813 Using, 810 Using the Installer, 805 Using with the Backup Exec 8.x and 9.x Agent for Unix, 816 RALUS.CFG About, 808 Editing, 808 Format components, 808 reassigning how slots appear, 170 Recently Written Media report, 594 recipients Index
assigning alert categories, 533 clearing recipients, 534 configuring, 522 configuring groups, 530 configuring MAPI e-mail, 520 configuring Net Send, 526 configuring new for jobs or selection lists, 535 configuring pager, 523, 528 configuring SMTP, 518 defined, 518 modifying alert category properties, 534 selecting for notifications, 534 Recovered Jobs custom error-handling rule, 440 recovering jobs, threshold for, 445 recovery completion state, SQL restore, 1035 recovery password setting, 1135 recovery requirements in IDR, 939 Recovery Storage Group, 1092 recyclable media, defined, 228, 1424 redirected restore See also names of individual agents using to install Domain Controllers from Media, 488 redirecting Exchange data, 1096 redirecting scheduled job, 137 registering Backup Exec, 90 registry restoring, 465 Remote Administrator defined, 1424 running, 95 system requirements, 95 Remote Agent installing on a Microsoft cluster, 660 installing on a VERITAS cluster server, 691 Remote Agent for NetWare Servers AUTOEXEC.NCF file, 1393 installing, 1392 overview, 52, 1391 system requirements, 1392 Remote Agent for NetWare Servers, backing up BEDIAG.NLM utility, 1404 1451
create BEDIAG.FAX, 1404 decompressed files, 1403 password database, 1394 rights for backup, 1394, 1395 single server backup strategies, 1396 strategies for multiple administrators, 1396 strategies for single administrator, 1396 Remote Agent for NetWare Servers, restoring, 1400 Remote Agent for Windows Servers 64-bit overview, 791 advertising to media servers, 800 described, 52 hardware requirements, 790 installing, 793 installing 64-bit using command script, 795 installing 64-bit using the installation program, 793 Installing using the command line, 794 Remote Agent Monitor, 797 remote backup and restore, 789 serial numbers, 791 stopping, 797 Uninstalling using the command line, 795 Remote Agent Monitor advertising the Remote Agent for Windows Servers, 800 enable debug logging, 802 Event Viewer, opening, 797 refresh interval, 799 Registry Editor, opening, 797 Services, opening, 797 starting on log on, 799 starting on remote Windows computers, 797 viewing status, 799 Remote Agent, defined, 1424 remote storage, back up data, 278 Removable Storage feature, Microsofts monitoring Backup Exec, 191 using with Backup Exec, 189 using with the SAN SSO, 189 Remove Primary SAN SSO Server, 752 renaming cascaded drive pools, 143 1452
drive pools, 137 media labels, 238 robotic library or drive, 130 vault, 244 renaming libraries and drives in shared environment, 964 reports, 1206 active alerts, 559 Active Alerts by Media Server, 559 alert history, 561 audit log, 563 available in Backup Exec, 555 Backup Job Success Rate report, 564 Backup Set Details by Resource, 566 backup sets by media set, 567 Backup Size by Resource, 568 configuration settings, 569 Daily Network Device Utilization, 571 Daily Usage by Policy, 573 deleting in job history, 552 device summary, 571 event logs, 575 Event Recipient, 576 Failed Backup Jobs, 576 Job Distribution by Device, 577 Jobs Summary, 578 list, 1206 Machines Backed Up, 579 Managed Media Servers, 579 Media Required for Recovery, 581 media set, 582 media vault contents, 583 Missed Availability, 584 Move Media to Vault, 585 operations overview, 586 overview, 543 Policy Jobs Summary, 590 Policy Properties, 591 Policy Protected Resources, 592 Problem Files, 593 Recently Written Media, 594 Resource Backup Policy Performance, 595 Resource Risk Assessment, 596 Restore Set Details by Resource, 597 Retrieve Media from Vault, 598 running, 545, 1209 running job, 548 saving, 552 Administrators Guide
Scheduled Server Workload, 600 scheduling report jobs, 553 Scratch Media Availability, 601 setting notification recipients, 553 test run results, 602 viewing, 544, 1206 viewing in job history, 551 viewing properties, 553 requirements Exchange Server Agent, 1066 installation, for Backup Exec, 65 Lotus Domino Agent, 1328 R/3 Agent for Oracle Server, 1349 SAN Shared Storage Option, 959 system, for Backup Exec, 59 TSM option, 771 Reset accounts option, in Desktop Agent, 1233 Reset Cleaning Statistics, 161 Reset dialogs option, in Desktop Agent, 1233 resource credentials, changing for restore job, 481 order, changing, 291 Resource Backup Policy Performance report, 595 resource discovery creating job, 311 defined, 1425 used with Exchange Agent, 1066 Resource Risk Assessment report, 596 resource, defined, 1424 responding to active alerts, 507 Restore dialog box, 1188 Desktop Agent, 1265 restore job Advanced File Selection, 482 advanced options, 464 canceling, 495 copying to another server, 394 creating through dialog boxes, 458 creating with wizard, 457 Data Protection Manager, 1389 file permissions, 471 general options, 461 Lotus Domino options, 1340 over existing files, 462 overview, 457 Index
pre/post commands, 467 preserve tree option, 463 R/3 Agent for Oracle Server, 1354 redirecting, 487 redirecting Lotus Domino, 1341 security, 463 Selections options, 460 setting defaults, 490 specifying network, 493 Restore Job Properties dialog box Exchange 2000 and 2003, 1086 Exchange Redirection page, 1096 SQL Agent, 1035 Restore Set Details by Resource report, 597 restore to named instance, 1051 restore, defined, 1425 restoring ARCserve tapes, 477 byte count does not match, 626 closed Oracle database, 1318 Distributed file system (Dfs), 476 Exchange 2000 and 2003, 1086 files, using Desktop Agent, 1264 files, using DLO Administration Console, 1186 individual Oracle tablespaces, 1319 Lotus Domino Agent, 1338 media view, 451 Microsoft clusters cluster quorum for Windows 2000 and Windows Server 2003, 685 cluster quorum on node running Active Directory, 686 Windows 2000 and Windows Server 2003, 684 online Oracle database, 1317 Oracle database control file, 1320 registry, 465 Remote Agent for NetWare Servers volume restrictions, 1403 resource view, 451 searching for files, 483 selecting data, 479 using the media view, 479 using the resource view, 479 VERITAS clusters Windows 2000 and Windows Server 2003, 696 restoring SQL master database, 1047 1453
resuming a drive, 130 retarget job, 137 retensioning a tape, 198 retired media defined, 227, 1425 moving damaged media, 233 Retrieve Media from Vault report, 598 returning to a previous configuration, 607 revisions defined, 1156 deleting automatically in Desktop Agent, 1245 deleting automatically in DLO, 1161 number to keep, setting in Desktop Agent, 1244 number to keep, setting in DLO, 1159, 1244 Revision Control tab, Desktop Agent, 1244 Revision Control tab, DLO, 1159 robotic library cleaning jobs, 204 configuring, 165 configuring partitions, 172 creating partitions, 172 defined, 1425 displaying storage devices, 1117 example configuration, 1116 exporting media, 207 importing media, 205 lock front panel, 208 portal support, 207 problem with not displaying, 621 redefining partitions, 174 setting up hardware, 1115 unlock front panel, 208 using with Backup Exec, 164 viewing, 1119 viewing properties, 166 robotic library properties Configuration tab, 169 General tab, 166 SCSI Information tab, 170 robotic library sharing between Windows and NetWare servers, 965 prerequisites, 965
S SAN Shared Storage Option (SSO) device allocation, 961 device operations, 964 installing, 960 overview, 52 requirements, 959 schedule, 404 scheduled jobs changing priority, 425 configuring, 398 configuring default options, 403 deleting, 426 editing, 401 modifying, 420 removing hold, 424 running immediately, 423 running test job, 426 viewing, 420 Scheduled Server Workload report, 600 schedules setting for templates, 369 scheduling backup jobs in Desktop Agent, 1250 backup jobs in DLO, 1152 notification recipients, 531 SAN SSO jobs, 970 scheduling report jobs, 553 scratch media creating, 232 defined, 227, 1425 Scratch Media Availability report, 601 SCSI address for devices, 1115 defined, 1425 information about drives, 158 information about robotic library, 170 setting address for robotic library drives, 1115 SCSI bus, configuring for tape devices in a Microsoft cluster, 673 SCSI pass-through mode, setting for drives, 158 search catalogs, 484 secondary navigation bar, 712 security changing for Windows systems, 61 R/3 Agent for Oracle Server, 1348 restoring, 463 Administrators Guide
1454
select into/bulk copy option, SQL 7.0, 1034 selecting devices and data to back up, 284 selection lists configuring new recipients, 535 copying to another server, 394 creating, 293 creating separate for each computer or resource, 303 defined, 293, 1425 deleting, 298 editing, 298 excludes, 299 holding jobs that back them up, 296 merging and replacing, 297 notification, 293 searching, 304 selecting recipients for notifications, 534 setting priority and availability, 301 using for backup job, 296 selections deleting, 298 Desktop Agent, backup, 1238 DLO, backup, 1155 editing, 299 user-defined, adding, 304 user-defined, using TCP/IP addresses, 305 selections list set up notification, 294 Selections options for backup job, 265 serial numbers Backup Exec, adding and removing, 68, 74, 833 Remote Agent for Windows Servers, 791 See also names of individual agents and options server clusters See also clusters server list adding and removing servers, 92 manually update for NetWare, 1403 server properties viewing, 145, 147, 149 viewing advanced properties, 149 viewing License Information tab, 150 viewing media server information, 145 viewing system properties, 147 ServerFree Option Index
installing, 986 overview, 53 service account changing, 92 described, 66 service state, 344 services starting and stopping, 92 starting and stopping on multiple servers, 975 Set Application Defaults, Preferences, 120 Set Primary SAN SSO Server, See also Backup Exec Utility Set Remote Agent Priority, 278 setting Internet Explorer properties for BEWAC, 710 setting notification recipients for reports, 553 Shadow Copy Components File System, 344 shared catalogs, using, 957 shared device, defined, 1425 SharePoint Agent about, 1359 adding a server farm, 1373 backing up folders and documents from a portal workspace, 1362 backing up SharePoint Portal Server 2003 resources, 1376 best practices for SharePoint Portal Server 2001, 1371 changing the default name of a farm, 1375 default backup and restore options, 1384 deleting a farm, 1376 disabling or enabling communication between Web servers and Backup Exec, 1374 disaster recovery, 1370 installing, 1360 overview, 53, 1359 redirecting restore jobs, 1366 redirecting restore jobs for SharePoint Portal Server 2003, 1381 redirecting workspace data to a file path, 1369 redirecting workspace data to another workspace, 1368 requirements, 1359 1455
restoring a SharePoint Portal Server, 1364 restoring a SharePoint Portal Workspace, 1365 restoring SharePoint Portal Server 2003 resources, 1378 restoring SharePoint Portal Servers and Workspaces, 1364 selecting SharePoint Portal Server 2003 resources for backup, 1372 system requirements, 1359 uninstalling and reinstalling the SharePoint Portal Server software, 1371 using with SharePoint Portal Server 2003, 1372 SharePoint Portal Server disaster recovery, 1370 redirecting restore jobs, 1366 SharePoint Services, 346 sharing media, 957, 971 silent mode installation, 65, 81, 1425 simple recovery model, SQL 2000, 1014 single block mode, setting for drives, 157 single instance backup for message attachments, 1077 single instance backup for NTFS, 277 Site Replication Services (SRS) database, backing up, 1070 size, cluster, 625 slot base configuration, 170, 1119 Small Business Server Edition of Backup Exec, described, 44 SMTP configuring e-mail recipients, 518 e-mail notification method, 514 Snap Start, for VSFW volumes, 1005 snapshot technology using with Exchange Server Agent, 1074 snapshot, used in Advanced Open File Option, 991 SNMP configuring notification, 536 configuring system service for Windows 2000, 540 installing WMI provider, 541 object identifier prefix, 536 traps, defined, 536 1456
WMI, 540 software license agreement, 67, 95 son media rotation strategy, 249 Specified Backup Network feature configuring, 336 described, 334 specify a date and time for restoring named transaction, 1039 splash screen, show at startup, 120 SQL 2000 64-bit Remote Agent, 1015 agent features, 1013 disaster recovery preparation, 1057 physical check after backup, 1019 restore to named instance, 1051 simple recovery models, 1014 standby database, 1013 SQL 2000, backing up disaster recovery preparation, 1057 Guide Me wizard, 1028 loading state, 1027 standby mode, 1027 SQL 2000, restoring disaster recovery, 1059 filegroups, 1044 Intelligent Disaster Recovery (IDR) option, 1057 named transaction, 1043 named transaction, include, 1039 named transaction, to a, 1039 primary and nonprimary filegroups, 1040 SQL 7.0 agent features, 1014 SQL 7.0, backing up nonlogged operations occurring, 1034 select into/bulk copy option, 1034 truncate log on checkpoint option, 1033 SQL Agent backing up backup methods, 1025 consistency check after backup, 1027 consistency check recommendations, 1019 databases, 1029 filegroups, 1031 strategies for, 1017 transaction logs, 1033, 1034 Administrators Guide
Windows registry, 1018 Backup Job Properties dialog box, 1024 consistency check, recommendations, 1019 Database Consistency Check (DBCC), recommendations, 1019 default options, 1052 excluding files during volume level backups, 1028 features, 1013 installation, 1015 logon accounts, 1015 overview, 1013 requirements, 1014 restoring automate master database restore, 1036 create standby database, 1035 database files to target instance, 1038 filegroups, 1044 from SQL database backups, 1041 Guide Me wizard, 1039 master database, 1047 point in time log restore option, 1042 recovery completion state, 1035 redirecting restores, 1049 Redirection dialog box, 1050 Restore Job Properties dialog box, 1035 specify date and time for named transaction, 1039 very large databases, 1041 SQL database backups, restoring from, 1041 staging data, 381 stalled job status, threshold for, 445 standby database creating SQL Agent, 1035 SQL 2000, 1013 starting Backup Exec, 108 Desktop and Laptop Option (DLO), 1134 services, 975 static volume, defined, 1426 statistical properties for media, 255 statistics Index
drive usage, 159 drives since cleaning, 161 Status tab for a robotic library, 171 stopping services, 975 storage devices installing, 57 storage limits for user data Desktop Agent, 1253 DLO, 1148 Storage Location, 1165 defined, 1122 deleting, 1167 Symantec Backup Exec for Windows Servers, described, 43 Symantec Volume Snapshot Provider changing defaults, 1008 Symantec Volume Snapshot Provider (VSP), changing defaults, 1006 Symantec Volume Snapshot Provider, and AOFO, 1001 synchronization create new sets, 1256 delete synchronized folder, 1257 overview, 1254 Synchronized Selections view, in Desktop Agent, 1255 synthetic backup advanced settings, 885 baseline, 876 collecting additional information for backups, 879 creating, 882 requirements, 878 template rules, 887 template rules, example, 882 synthetic backup, creating, 880 synthetic backup, defined, 1426 system logon account, 387 system media, defined, 227, 1426 system requirements See also names of individual agents and options Backup Exec, 59 System State backing up on remote Windows computers, 792 restoring, 472 System Summary, overview, 114 System tab, 147 1457
T tablespace data, Oracle Agent, 1299 tapeinst.exe, Device Driver Installation Wizard, 129 tapes See also media DLT tape drive, 622 target domain, defined, 61 task pane, overview, 111 TCP/IP adding for user-defined shares, 305 enabling protocol, 336 required for Backup Exec 8.x and 9.x Agent for Unix, 649 required for RALUS Agent, 804 template defined, 1426 template rule defined, 1426 templates adding a duplicate backup sets template to policies, 382 adding an export media template to a policy, 370 adding backup templates to a policy, 367 backup template file exclusions, 368 changing template rules, 377 deleting from a policy, 373 deleting template rules, 377 duplicate backup sets template overview, 381 editing in a policy, 372 importing into a policy, 372 migrating from previous versions, 367 setting template rules, 373 setting the schedule, 369 using in policies, 366 test run job creating, 320 defined, 320 running for scheduled job, 426 setting defaults, 323 Test Run Results report, 602 testing logon accounts, 292 transaction logs Lotus Domino DBIID, 1333 overview, Lotus Domino, 1333 recycling, Lotus Domino, 1336 1458
viewing Lotus Domino, 1330 transaction logs, backing up SQL Agent, 1033 troubleshooting clusters, 705 Oracle Agent, 1324 TSM option, 786 truncate log on checkpoint option, SQL 7.0, 1033 TSM Option Backup Exec as TSM client, 772 commands management classes created by bex.mac macro, 784 MC_PI management class created by bex.mac macro, 784 MC_VT management class created by bex.mac macro, 784 objects, default size, 784 objects, defined, 784 password for backupexec node, default, 785 policy domain VERITAS, default, 784 policy set bex_backup, default, 784 registering nodes, 785 time to retain only backup version, setting, 785 VERITAS policy domain, default, 784 components Backup Exec default node name, 785 Backup Exec default node registration, 785 backupexec_pi storage pool associated with bexpi.dsm file, 784 backupexec_pi storage pool, defined, 773 backuppool, 773, 784 bex.mac macro, command details, 784 bex.mac macro, defaults created by, 784 bex.mac macro, defined, 775, 783 bex.mac macro, errors while executing, 778 bex.mac macro, using with shared or individual nodes, 778 Administrators Guide
bex_backup policy set, default, 784 bexpi.dsm file, as used in bex.mac macro, 784 creating backupexec_pi storage pool, 775 creating the bexpi.dsm file, 776 diserror.log error log, 786 dsmfmt utility, defined, 775 dsmfmt utility, using to create a storage volume, 776 dsmrc.h file, 786 MC_PI management class, 773 MC_VT management class in theory of operation, 774 Position Information (PI) data stream, defined, 773 setting backup versions to keep, 785 storage volume, creating with dsmfmt utility, 776 theory of operation, 773 error logs, 786 individual nodes, 778 registering nodes, 779 registry keys, 779 changing default number of slots in robotic library, 781 changing default password, 783 communications timeout, changing default, 780 file space name, changing in Backup Exec, 781 MC_PI management class in Backup Exec, 782 MC_VT management class, changing default name, 782 node name for Backup Exec, 781 objects in Backup Exec, 782 shared nodes, 778 system requirements, 771 troubleshooting, 786 Virtual Tape (VT) data stream, defined, 774 U unattended backup jobs, 139 uninstalling Backup Exec, 93 Backup Exec from a Microsoft cluster, 663 Index
using command line, 88 Windows Management Instrumentation SNMP provider, 541 Unique Message Identifier (UMI) error code, viewing, 432 unlocking robotic library panel, 208 up on log on/off option in DLO, back, 1152 Update vault using wizard, 245 updating DLO, 1131 User Data Folder, defined, 1165 User Properties dialog box, 1180 user-defined media vault, 243, 1423 adding media to, 245 creating, 244 user-defined selections, adding, 304 Users access, disabling/enabling in DLO, 1181 adding in DLO, 1178 Desktop Agent access via Profile, 1229 import in CSV file in DLO, 1179 properties, changing in DLO, 1180 removing from DLO, 1181 viewing in DLO, 1180 users managing, 1177 users in DLO, CSV file to add, 1179 utility jobs, overview, 192 utility partitions backing up, 350 backing up in IDR, 914 restoring, 474 restoring in IDR, 917 selecting data for backup, 286 V vault rules for media sets, 225 vaults, moving media, 245 verify after backup completes, 274 after duplicate backup completes, 316, 885 verify job creating, 318 defined, 318 VERITAS update, 101 version and build information, displaying, 629 view filter, setting, 504 1459
view history, 293 viewing active alerts, 502 active job properties, 415 alert history, 502 alert job log, 509 alert properties, 505 alerts, 502 Automated User Assignment properties, 1172 calendar, 413 completed job, 428 job monitor, 405 jobs, 970 jobs list, 405 Lotus Domino databases, 1330 Lotus Domino transaction logs, 1330 scheduled jobs, 420 users in DLO, 1180 views, alerts, 502 VIM configuring recipients, 522 e-mail notification method, 516 virtual devices, using in IDR, 176, 902 virtual servers, backing up in a Microsoft cluster, 683 virtual servers, backing up in a VERITAS cluster, 695 virus, effect on data storage requirements, 352 volume level backups, automatic exclusion of files, 1028, 1080 volume restrictions, Remote Agent for NetWare Servers, 1403 VSS perform consistency check before Exchange backup, 1078 using to protect Exchange data, 1074 W Window menu, 1411 Windows 98/Me Agent installing, 637 password-protecting published folders, 640 publishing drives and directories, 639 set directories as read-only, 640 system requirements, 636 Windows 98/Me Agent, configuring 1460
allow registry restore, 639 current status, 639 disable and enable network backup, 638 overview, 637 publish directories, 639 set up network protocol, 641 set workstation password, 638 using DHCP, 641 Windows Automated System Recovery (ASR) files, in IDR, defined, 906 Windows Change Journal option to use for backup job, 273 using to determine backed up status, 359 Windows Explorer, backups creating, 305 enabling, 120 overview, 305 submitting, 306 Windows Management Instrumentation (WMI), adding WMI capability, 540 Windows registry, backing up with SQL Agent, 1018 Windows remote computers backing up with Backup Exec Remote Agent, 792 System State, backing up on remote computers, 792 Windows Server 2003 backing up, 344 disaster recovery, 610 protecting upgraded resources, 347 Windows XP, disaster recovery, 610 Wizard for DLO, Configuration, 1145 wizards accessing using the Assistant, 116 defined, 1426 WMI installing performance counter provider, 540 installing SNMP provider, 541 performance counters, 540 uninstalling SNMP provider, 541 working set back up files changed today, defined, 1426 working set back up files last accessed in (x) days, defined, 1427 working set backups, defined, 355
Administrators Guide