SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
TECHNICALWHITEPAPER:BACKUPEXECTM2014
BAREMETALANDDISSIMILARHARDWARERECOVERY
Backup ExecTM
2014 Technical White Paper
Technical White Papers are designed to introduce Symantec partners and end users
to key technologies and technical concepts that are associated with the Symantec
Backup and Recovery product family. The information within a Technical White
Paper will assist partners and end users as they design and implement data
protection solutions based on Symantec Backup and Recovery products.
Technical White Papers are authored and maintained by the Symantec Backup and
Recovery Technical Services group.
Bare Metal and Dissimilar
Hardware Recovery
2
3
Contents
Introduction.............................................................................................................................................. 4
Business Value .......................................................................................................................................... 5
Underlying Principles................................................................................................................................ 9
Recovery Disk.......................................................................................................................................... 14
Data Deduplication ................................................................................................................................. 22
Domain Controller Recovery Considerations ......................................................................................... 23
Encryption Considerations...................................................................................................................... 25
Licensing ................................................................................................................................................. 27
Notes and Best Practices ........................................................................................................................ 28
For More Information............................................................................................................................. 30
4
Introduction
This white paper is intended to assist technical personnel as they design and implement the bare metal and
dissimilar hardware recovery features of Backup Exec™ 2014 and make related decisions. The business value
of Backup Exec™ 2014’s bare metal and dissimilar hardware recovery technology will also be considered in this
white paper.
This white paper will explore the following topics related to the bare metal and dissimilar hardware recovery
technology found within Backup Exec™ 2014:
 Business Value
 Underlying Principles
 Recovery Disk
 Data Deduplication
 Domain Controller Recovery Considerations
 Encryption Considerations
 Licensing
 Notes and Best Practices
Note: For step-by-step instructions for installing and managing Backup Exec™ 2014’s bare metal and dissimilar
hardware recovery features, please refer to the Backup Exec™ 2014 Administrator’s Guide available here: TECH205797.
5
Business Value
Modern Business is Driven by Servers
Modern businesses are based upon an electronic foundation comprised of one or more servers. These servers
contain and manage critical applications and data that are the lifeblood of business, without which businesses
cannot function at a very basic level. Some examples of critical applications found on these servers might be
Exchange, SQL, SharePoint, or Active Directory.
Unfortunately, servers fail. It is not a matter of if a server will fail; it’s a matter of when. Without adequate
planning and preparation, server downtime can cause financial damage to organizations as the ability to
generate revenue is lost, and the company’s ability to meet regulatory compliance requirements is affected.
Planning for operational continuity and recovery from outages is rapidly becoming an urgent priority for all
types of businesses today.
Causes of Server Failure and Downtime
The danger of server failure is a reality for all IT professionals. There are a variety of events that can cause
server failure—and natural disasters are only one example. The list of possible causes of server failure includes
the following:
 User Error - The most common form of server failure is user error. Users are people, and people make
mistakes. Whether it’s the end user downloading and installing the wrong application or visiting the
wrong websites, or the IT administrator setting down a cup of coffee at the wrong place at the wrong
time, the human element consistently leads the way among causes of server failure.
 Planned Downtime - Planned downtime is another common cause of server downtime. Servers
require maintenance in order to perform at an optimal level over a long period of time. Sometimes
planned maintenance events can inadvertently lead to server failure when maintenance tasks, for
whatever reason, prevent a server from coming back online and operating correctly, or coming back
online at all.
 Hardware Failures - When it comes to hardware failures, it’s not a question of when, but how often.
Hardware failures happen on a frequent basis. This can be due to defective hardware, equipment
maintenance problems, power-related issues, accidents, and other causes. The risk of hardware failure
becomes greater as the size and complexity of a data center increases.
 Viruses and Malware - Other potential causes of system failure include malicious code designed
specifically to exploit security vulnerabilities in IT infrastructure. Both viruses and malware can put
servers at risk, even if security software is present and up to date. Some malicious code is designed to
destroy data, while others are designed to steal data, and still others are designed to secretly take
control of systems and compromise security over a long period of time.
 Natural Disasters - Natural disasters are also among the threats that can cause system failure,
although they are among the most unlikely. Hurricanes, floods, fires, tornados, and other natural
events can certainly bring servers down and cause them to fail, and perhaps even physically destroy
them.
Cost of Server Downtime
The cost of server downtime includes tangible, direct costs such as lost transaction revenue, lost wages, lost
inventory, remedial labor costs, marketing costs, bank fees and legal penalties from failing to meet regulatory
compliance requirements or from not delivering on service level agreements, and intangible, indirect costs
including lost business opportunities, loss of employees and/or employee morale, decrease in stock value, loss
of customer/partner goodwill, brand damage, driving business to competitors or even bad publicity.
6
Figure 1: Cost of Server Downtime
The cost of server downtime can be very significant to an organization, and perhaps even fatal. The longer the
server downtime persists, the greater the damage, and the more likely the IT “blow” suffered to the
organization becomes fatal. This is also true for partners and service providers with responsibility for the
business continuity of end user customers. The ability to recover quickly from server failure is a key element of
any service provider’s portfolio.
Server Recovery Problems and Obstacles
In light of the problem of server failure and downtime, it is critical that businesses equip themselves with tools
and solutions to recover from such an event. Solutions that enable quick server recovery in the event of a
disaster can mitigate both the server downtime itself as well as the associated costs.
Of course, there are obstacles and problems that make old server recovery methods, as well as new elements
of the server recovery problem, difficult to overcome. These include the complexity of manual server recovery
processes as well as the problem of recovering to dissimilar hardware configurations.
Complexity of Manual Server Recovery
Manual server recovery can be a time-consuming and tedious process. Typically, manual recovery includes
rebuilding a server by reinstalling the operating system, rebooting several times throughout the recovery
process, reconfiguring the system, loading backup software, and hoping that no errors have occurred along the
way. This process, which can take hours or even days, generally exceeds the capabilities of the average small
business.
Figure 2: Complexity of Manual Server Recovery
7
For larger organizations, the complexity of the server recovery problem can be exacerbated when an
organization has one or more remote sites at which servers are located.
The Dissimilar Hardware Problem
Recovering to dissimilar hardware is also essential to effective server protection. It is cost-prohibitive for
companies to maintain standby replicas of production server configurations for recovery purposes. Even in
situations where standby hardware is available, small variations in hardware builds can cause problems for full
server recovery solutions that are not equipped to deal with dissimilar hardware.
Bare Metal and Dissimilar Hardware Recovery with Backup Exec™ 2014
To help businesses prepare for and overcome the problem of server failure and downtime, Symantec has
introduced Backup Exec™ 2014 with integrated bare metal recovery and dissimilar hardware recovery – also
known as hardware discovery - capabilities. These features make full server recovery easy, and offer it as a
built-in element of Backup Exec™ 2014 data and application protection practices.
Now, using Backup Exec™ 2014, a single backup for a server can protect it against all types of disaster or failure
and enable all of the following types of recovery:
Server Recovery Features Supported by Backup Exec™ 2014
Bare Metal Server Recovery 
Bare Metal Server Recovery to Dissimilar Hardware Configurations 
Application Recovery (Agent for Applications and Databases required) 
Granular Application Recovery (Agent for Applications and Databases required) 
File and Folder Recovery 
All of these recovery capabilities are offered in a single product and solution, Backup Exec™ 2014.
Symantec Backup Exec
Symantec Backup Exec™ delivers powerful, flexible, and easy-to-use backup and recovery to protect your
entire infrastructure, whether built upon virtual, physical, or a combination of both. Using modern technology,
Backup Exec backs up local or remote data to virtually any storage device including tape, disk and cloud.
Recovery is fast and efficient. With a few simple clicks, you can quickly search and restore granular file or
application objects, applications, VMs, and servers directly from backup storage. Additionally, easily protect
more data while reducing storage costs through integrated deduplication and archiving technology.
 Powerful: Super charge the performance of your backup with Backup Exec. Get fast and reliable
backups that are up to 100% faster than prior releases, comprehensive and innovative virtualization
capabilities, and powerful built-in data deduplication and archiving. Avoid lengthy downtime and
missing a critical backup window with Backup Exec.
 Flexible: Not all backup solutions have the flexibility to protect your environment while also supporting
agile recovery. You should be able to recover what you need, when you need it - quickly and easily.
Whether you want to recover a single, critical file or an entire server, Backup Exec can quickly search
and restore without mounting or staging multiple backup jobs. Backup Exec protects hybrid
architectures with a single solution that backs up to virtually any storage device and achieves fast,
efficient, versatile recovery.
 Easy to use: Traditional, complex and point backup and recovery solutions can be inefficient, time
consuming, and expensive to manage. Through intuitive wizards and insightful dashboards, Backup
8
Exec is easy to implement, use and manage, whether you’re upgrading from a previous version or
switching from an alternative solution.
9
Underlying Principles
General
The bare metal and dissimilar hardware restore capabilities in Backup Exec™ 2014 represent the combination
of modern file-by-file protection technology in Backup Exec and recovery disk and dissimilar hardware restore
capabilities borrowed from the Symantec System Recovery product. It is important to note that Backup Exec™
2014 does not employ “imaging” technology in its bare metal and dissimilar hardware recovery features;
rather, these recovery capabilities are enabled by an optimized file-based technology in Backup Exec™ 2014
known as Simplified Disaster Recovery (SDR).
Simplified Disaster Recovery (SDR)
The core technology that enables the bare metal and dissimilar hardware restore capabilities within Backup
Exec™ 2014 is called Simplified Disaster Recovery (SDR). This technology ensures that key system-level
elements of a server are captured and stored as part of a backup operation. When a bare metal or dissimilar
hardware restore operation is performed, this system-level information is used to rebuild the failed server and
restore it to a functional state. Some of these critical system components include:
 System volume
 Boot volume
 Services volumes
 System state components
In Backup Exec™ 2014, the SDR feature is enabled by default for every new backup job that is created. It is
represented within the Backup Exec™ 2014 user interface as a part of the backup selections screen through a
ribbon titled “Simplified Disaster Recovery” as shown in the figure below:
Figure 3: Simplified Disaster Recovery Ribbon
If they want to, administrators can disable SDR by unselecting elements of the server that are required to
restore the server from a bare metal state, such as the “C:” volume, certain sub-elements of the “C:” volume,
or “System State” elements.
In addition to enabling bare metal recovery and dissimilar hardware recovery, SDR enables other recovery
features supported by Backup Exec™ 2014, such as:
10
 Online Server Recovery – The ability to perform a complete recovery of a protected server while it’s
online
 Physical-to-virtual Conversions (P2V) – Virtual conversion tasks which are processed in parallel with a
backup task
 Backup-to-virtual (B2V) - Virtual conversion tasks which are processed after a backup task
 Point-in-time conversions (PIT) - “Ad hoc” or on demand B2V conversions which can be run any time
after a backup
This technical white paper will focus exclusively on the bare metal recovery and dissimilar hardware recovery
features of Backup Exec™ 2014.
Whenever a backup job is modified such that the SDR feature is disabled, all corresponding recovery features
that rely upon SDR are not available from those backups.
Recovery Features Enabled by Simplified Disaster Recovery
Bare Metal Recovery 
Dissimilar Hardware Recovery 
Online Server Recovery 
Physical to Virtual Conversions (P2V) 
Backup to Virtual (B2V) 
Point in Time (Ad Hoc) Conversion 
Microsoft Volume Shadow Copy Service (VSS) Integration
In accordance with Microsoft best practices, the methods used by Backup Exec™ 2014 to capture SDR-enabled
backups integrate with the Microsoft Volume Shadow Copy Service (VSS) to ensure that backups are both
complete and consistent.
Complete Backups
Through integration with VSS, the backups captured by Backup Exec™ 2014 include all selected elements, even
if they are components of the active operating system or are considered to be in an “open” state. This includes
all selected operating system elements, such as the registry, and system state components.
Consistent Backups
This same integration also ensures that the backups captured are in a consistent state, and have been properly
placed into a “quiet” mode at the time the snapshot is captured. This ensures that the operating system will
boot and operate properly after a bare metal or dissimilar hardware restore operation.
DR File
Each backup set captured by a backup job that is enabled for SDR includes a disaster recovery or ‘DR’ file (file
with the .DR extension). This file contains key metadata leveraged during bare metal and dissimilar hardware
restore processes to recreate a physical server’s confiuration from bare metal.
Applicable Backup Methods
The Simplified Disaster Recovery feature of Backup Exec™ 2014 applies only to agent-based backups, meaning
backups captured through the Agent for Windows. This means that SDR backups, and therefore the bare metal
and dissimilar hardware restore recovery capabilities enabled by this feature, are generally limited to
11
standalone physical servers with a local install of the Agent for Windows, which backed up through the Agent
for Windows using the agent-based backup approach.
In most cases, VMware and Hyper-V virtual machines, even if they contain a local install of the Agent for
Windows, are not backed up through an agent-based process. In VMware and Hyper-V environments it is
usually optimal to protect virtual machines through host-based snapshot methods using the Agent for VMware
and Hyper-V, rather than through the locally installed Agent for Windows. In these situations, the SDR feature
does not apply, and as such the features enabled by the SDR feature are not available.
Although bare metal and dissimilar hardware recovery, as enabled by the SDR feature of Backup Exec™ 2014,
are not available when protecting virtual machines using host-based backups, equivalent restore capabilities
are achieved through built-in features of the Agent for VMware and Hyper-V. These include the following:
Virtual Machine Recovery Features of the Agent for VMware and Hyper-V
Full Virtual Machine Recovery 
Application Recovery 
Granular Application Recovery (requires Agent for Applications and Databases) 
Granular File and Folder Recovery (requires Agent for Applications and Databases) 
Redirected Recovery 
Note: For further details on the backup and recovery features available for VMware and Hyper-V virtual machines using
the Agent for VMware and Hyper-V, please refer to the Backup Exec™ 2014 Administrator’s Guide available here:
DOC5211.
Bare Metal and Dissimilar Hardware Recovery Overview
Performing a bare metal or dissimilar hardware recovery operation with Backup Exec™ 2014 is driven primarily
by the use of the recovery disk, which by default is on DVD media. The general process outline is as follows:
Server is online and operational, and protected by Backup Exec™ 2014.
Figure 4: Protected Server is Operational
12
Server failure event occurs.
Figure 5: Protected Server Experiences Failure Event
Administrator performs bare metal or dissimilar hardware restore using recovery disk.
Figure 6: Server is Recovered Using Recovery Disk
Server returns to normal operational state.
Figure 7: Server Returns to Operational State
Automated Server Recovery
During a bare metal or dissimilar hardware recovery operation, the server system is reconstructed using the
data contained in the selected backup set. This includes the process of formatting and partitioning the disk
13
system, restoring basic disk boot components such as the MBR or GPT, and recovering the file contents of the
server including the operating system and data files. The server is returned to a consistent point in time
associated with the selected backup set.
SDR technology automates, simplifies, and significantly speeds up the server recovery process when compared
to the legacy method of recovering a server using a manual rebuilding process.
Modern System and Volume Configuration Support
It’s important to note that the bare metal and dissimilar hardware recovery capabilities of Backup Exec™ 2014,
including the associated recovery disk, support both EFI/UEFI as well as legacy BIOS server configurations. As
such, the recovery of both MBR and GPT disks and their associated volumes is also supported. However cross
recovery, such as recovering a UEFI backup to a legacy BIOS system (and vice-versa), is not supported.
Dissimilar Hardware Restore
The Backup Exec™ 2014 dissimilar hardware feature enables administrators to perform a bare metal recovery
to a new server with a different hardware configuration. The process of configuring a recovered server for new
or dissimilar hardware is fully automated, leveraging the built-in driver database that comes with Backup
Exec™ 2014‘s SDR technology package. Administrators can add additional drivers to the driver database within
an SDR recovery disk using automated tools included with Backup Exec™, which is explained in greater detail
later on in this document as well as in the Backup Exec™ 2014 Administrator’s Guide.
Backup Data Locations
The bare metal and dissimilar hardware recovery process can utilize backup data stored on locally attached
media, such as a local tape or local USB drive, or it can utilize backup data hosted on a remote Backup Exec™
2014 server. This includes secondary Backup Exec™ 2014 servers that have received the backup data (and
associated DR files) through a set copy or offsite replication (optimized duplication) process.
14
Recovery Disk
The Backup Exec™ 2014 recovery disk is the tool used by administrators to perform bare metal and dissimilar
hardware recovery operations. The Backup Exec™ 2014 recovery disk is based on the powerful Microsoft
operating system components and includes a robust driver database leveraged for both runtime tasks and
dissimilar hardware recovery operations.
Recovery Disk Versions
Two basic versions of the Backup Exec™ 2014 recovery disk are available. They are:
 32-bit
 64-bit
Depending on the platform being restored, the correct version of the recovery disk should be used. Each
recovery disk boots and operates in an identical manner. When creating a custom version of the recovery disk,
the corresponding source version of the default recovery disk must be used.
Recovery Disk Language Support
The recovery disk supports all languages supported by Backup Exec™ 2014. During the recovery disk boot
process, a language selection screen is displayed from which the administrator can select a language version to
use:
Figure 8: Recovery Disk Language Menu
After a language has been selected, the recovery disk boot process continues and the corresponding language-
version of the recovery environment is loaded.
Recovery Disk User Interface
After entering the recovery environment, the administrator can navigate between three tabs:
 Recovery – “Home” screen of the recovery environment, used to launch recovery wizard and perform
bare metal and dissimilar hardware recovery operations
15
Figure 9: Recovery Tab
 Network – Used to manage the server’s network configuration while in the recovery environment,
such as IP address settings
Figure 10: Network Tab
 Utilities – Used for additional recovery environment operations, such as execution of the support tool,
dynamic loading of drivers, and accessing a command prompt
16
Figure 11: Utilities Tab
Recovery Process (Data on Remote Backup Exec Server)
The recovery wizard can be accessed by navigating to the Recovery tab and selecting the ‘Recover This
Computer’ option. The recover wizard is designed to be a guided process, stepping the administrator through
the process of performing a recovery operation, and can be used by administrators performing a bare metal
recovery operation for the first time, or by administrators already familiar with the process. The recovery
process includes the following steps:
 Remote or Local Recovery Selection – The administrator selects whether the backup data to be
restored is located on a remote Backup Exec server or on a locally attached storage device (the
remaining steps in this example are based upon the remote Backup Exec server selection).
Figure 12: Remote or Local Recovery Selection
17
 Identification of Remote Backup Exec Server – The administrator identification information for the
Backup Exec server as well as authentication credentials.
Figure 13: Remote Backup Server Identification
 Backup Data Selection – The administrator selects the server and point in time that is to be restored to
the local system.
Figure 14: Backup Set Selection
 Volume Layout Configuration – The administrator determines what the local system’s volume layout
will be after the recovery process has completed.
18
Figure 15: Volume Layout Configuration
 Advanced Disk Configuration – Administrators can access advanced disk configuration tools and
features if additional changes are required.
If the target local disk or disk array is not visible during this step, it may be necessary to load the
correct storage controller driver and rescan disks using the advanced disk configuration option.
Figure 16: Advanced Disk Configuration
 Recovery Process Start – After selections have been reviewed and confirmed, the administrator begins
the recovery process.
Recovery Process (Data on Local Device)
The recovery steps leveraging backup data stored on locally attached storage devices are very similar.
However, rather than selecting a remote Backup Exec™ 2014 server, the administrator selects the local device
containing the backup data, as well as the .DR file corresponding to the backup set that will be restored. All
other recovery steps are the same. It is important to note that backup data that resides in a deduplication disk
19
storage device can only be used in conjunction with a disaster recovery operation performed directly from a
Backup Exec server.
Customizing the Recovery Disk
Backup Exec™ 2014 includes the capability to create customized versions of the recovery disk. The primary
purpose of creating a customized version of the recovery disk is to enable administrators to add additional
storage and network drivers to the recovery disk’s driver database in order to fully support the servers in their
environment. The first step in creating a custom version of the recovery disk is to identify the source recovery
disk media (must be locally available to the Backup Exec™ 2014 server from which the custom recovery disk
wizard is being run) or image (.ISO) file that will be used as the source for the customized version of the
recovery disk.
The customized version of the recovery disk will be language specific and will not present choices for language
selection during boot-up. The customized recovery disk language can be selected during the customized
recovery disk creation wizard.
Once the source recovery disk media or image has been identified, drivers can be harvested remotely from
servers being protected by a Backup Exec™ 2014 server and injected into the database of the custom recovery
disk. Custom drivers can also be added manually to a custom recovery disk. The process of harvesting drivers
remotely includes two steps. The first is to identify the remote servers from which drivers need to be
harvested:
Figure 17: Select Remote Computers for Driver Harvesting
The next is to identify, from the list of identified drivers, those that should be added to the custom recovery
disk. Only drivers that are not already present in the driver database are listed and available for selection:
20
Figure 18: Select Drivers to Include
Once the needed drivers have been identified, the process of creating a custom version of the recovery disk
that includes those driver files can begin.
Figure 19: Customizable Recovery Disk Diagram
Custom 32-bit drivers can be added to a custom 32-bit recovery disk built from the default 32-bit recovery disk,
and custom 64-bit drivers can be added to a custom 64-bit recovery disk built from the default 64-bit recovery
disk. Custom 32-bit drivers can be added to a 64-bit customized recovery disk, and custom 64-bit drivers can be
added to a 32-bit customized recovery disk. These drivers are added to the driver database and used for
dissimilar hardware recovery.
Placing the Recovery Disk on USB Drives or USB Thumb Drives
It is possible to place the Backup Exec™ 2014 recovery disk on alternate types of boot media, such as a USB
drive or USB thumb drive. Using a USB drive or thumb drive instead of an optical DVD to perform a bare metal
or dissimilar hardware recovery operation on a server can offer several advantages, such as recovery media
boot speed.
21
Figure 20: Placing the Recovery Disk on USB Drives or Thumb Drives
Placing the Backup Exec™ 2014 recovery disk on a USB drive can offer several advantages, including a faster
recovery disk boot process and the ability to easily transfer data to and from the USB drive.
Note: Instructions for placing the recovery disk on a USB drive can be found here: TECH181347.
Important Notes Related to Placing the Recovery Disk on USB Devices
 Use caution when entering a disk number in step 4; these instructions will destroy/delete any existing
data on the USB drive or USB thumb drive being used; ensure that all data has been copied successfully
from the USB drive or USB thumb drive to an alternate location before using these instructions
 These instructions are offered as is, without technical support; placing the Backup Exec™ 2014
recovery disk on alternate media is not an out-of-the-box feature of Backup Exec™ 2014, and the
Backup Exec Technical Support team will not be able to assist or provide support in such scenarios
 After a USB drive or thumb drive has been enabled to boot the Backup Exec™ 2014 recovery disk,
other data can be stored on it, as long as the recovery disk files and folders are not modified or deleted
 In order for the Backup Exec™ 2014 recovery disk to boot successfully from a USB drive or USB thumb
drive, the USB drive itself must support boot functionality
 While most modern computer systems support booting to a USB device, it may be necessary to modify
the system’s boot sequence/order in order for the system to boot to the USB device
22
Data Deduplication
Integrated Data Deduplication
Backup Exec™ 2014 includes integrated, block-level deduplication technology that dramatically reduces backup
storage requirements. This technology also applies to the bare metal and dissimilar recovery features of
Backup Exec™ 2014. Critical system component data captured during a Simplified Disaster Recovery-enabled
backup operation can be deduplicated alongside other backup data captured from a server, offering the same
storage benefits. In order for backup data to be deduplicated, it must be stored to a deduplication-enabled
device, such as the Backup Exec Deduplication Storage Folder. It is important to note that backup data that
resides in a Deduplication Storage Folder can only be used in conjunction with a disaster recovery operation
performed directly from a Backup Exec server.
Data Deduplication Overview
As backup data is captured from protected servers and stored to the Deduplication Storage Folder on a Backup
Exec server, the data is scanned to determine which blocks are unique and need to be stored and which blocks
are non-unique and can be skipped. Only unique data blocks are stored to disk, while non-unique blocks are
skipped. Unique and non-unique blocks are identified through a process known as fingerprinting.
Figure 21: Data Deduplication Fingerprinting Process Diagram
The calculation of data block fingerprints can occur at the client level, the server level, or at the appliance level.
Which calculation method is most efficient for a given backup operation depends on the backup environment
topology, whether the client is physical or virtual, and other factors. Client-level, server-level, and appliance-
level deduplication methods can be mixed and matched according to the needs of an administrator.
23
Domain Controller Recovery Considerations
Backup Exec™ 2014 fully supports the bare metal and dissimilar hardware recovery of Windows Server
2003/R2 and Windows Server 2008/R2 Active Directory Domain Controllers in either standalone or domain
forest environments. Key supported recovery operations for Active Directory Domain Controllers include the
following:
• Bare metal recovery of domain controllers back to their original hardware configuration
• Bare metal recovery of domain controllers to dissimilar hardware configurations
Note: For detailed information on the specific Microsoft server platforms supported by Backup Exec™ 2014, please refer
to the Backup Exec compatibility lists available here: TECH175581.
Volume Shadow Copy Service (VSS) Integration
Backup Exec™ 2014 works in accordance with Microsoft best practices to protect Windows 2003/R2, Windows
2008/R2, and Windows 2012 servers, including Active Directory Domain Controllers. Through integration with
the Microsoft Volume Shadow Copy Service (VSS), Backup Exec™ 2014 ensures that Active Directory Domain
Controller databases are correctly prepared for backup, ensuring that the server can be recovered properly.
Resetting Domain Controller Invocation IDs and Preventing USN Rollbacks
An important element of properly backing up a domain controller is ensuring the backup process deals with
the resetting of the domain controller’s Invocation ID. Each domain controller in a forest has a different
Invocation ID, allowing each domain controller to be properly identified in the forest and allowing replication
processes to proceed correctly. If a domain controller is recovered in a forest environment and its Invocation
ID has not been reset, a USN rollback can occur causing replication problems and allowing old data to return to
the domain environment.
Backup Exec™ 2014 integrates with the Microsoft Volume Shadow Copy Service (VSS) to properly prepare
domain controllers for backup. During a backup operation, the VSS writer ensures that the backup being
created of the domain controller is flagged as a backup copy. If a domain controller is recovered from that
backup, either to original hardware or dissimilar hardware, it will request a new Invocation ID allowing it to
rejoin the domain properly and avoiding replication problems such as USN rollbacks. This process is fully
automated and requires no user intervention.
Best Practices When Protecting Active Directory Domain Controllers
Please consider the following recommendations and best practices when protecting Active Directory Domain
Controllers for bare metal and dissimilar hardware recovery with Backup Exec™ 2014:
• Tombstone Lifetime - Backups captured from domain controllers should not be older than the
tombstone lifetime for the Active Directory Domain. Restoring a recovery point older than the
tombstone lifetime could result in previously purged Active Directory objects being reintroduced into
the domain environment.
Note: The tombstone lifetime is the number of days before a deleted object is permanently purged
from the directory services database. For Windows Server 2003/R2, Windows Server2008/R2, and
Windows 2012 the default tombstone lifetime is 60 days.
• Computer Account Password Age – A recovery point of a domain controller should not be older than
two times the maximum computer account password age. A maximum password age determines the
number of days a password can be used before the system requires it to be changed. By default, this
24
setting is defined in the Default Domain Group Policy Object (GPO) and in the local security policy of
workstations and servers with a value of 30.
• Recently Recovered Domain Controllers – Newly-promoted or recovered domain controllers use a
default computer account for the first few hours while they establish a valid and unique computer
account. After performing a recover of an Active Directory Domain Controller, allow the domain
controller to run for at least 24 hours before you create the first recovery point. This ensures that the
domain controller has obtained a valid and unique computer account.
• Check for Consistency – Check a newly promoted or a restored Active Directory Domain Controller for
consistency before creating the first recovery point.
• Point-in-Time Consistency for Multi-volume Backups – A backup of all the active disk volumes on a
domain controller must be created and restored at the same time to preserve the synchronization of
the domain controller’s data. To do so, select all the domain controller’s volumes when you create the
schedule of the backup job. When multiple server volumes are included in the same backup job,
snapshots for all included volumes are captured at the same point in time.
• Top Down Restores – In a server forest environment, when you restore a tree or an entire forest, be
sure that you restore from the top down to maintain domain integrity.
Restoring an Active Directory Domain Controller to Dissimilar Hardware
Backup Exec™ 2014 can be used to restore Windows 2003/R2, Windows 2008/R2, and Windows 2012 Active
Directory Domain Controllers to dissimilar hardware configurations. As described above, Backup Exec™ 2014
interacts with the VSS service to prepare the domain controller and the Active Directory database for backup.
Running with VSS disabled is not supported and causes domain controller failures upon restoration.
Automatic Detection and Installation of Critical Hardware Drivers
During a dissimilar hardware recovery operation, Backup Exec™ 2014 automatically detects and installs the
following key driver elements of the new server hardware configuration to ensure the Active Directory Domain
Controller functions properly under the new hardware configuration:
Driver Components Automatically Configured During Dissimilar Hardware Restore
Mass storage controller 
Hardware Abstraction Layer (HAL) 
Network interface controller (NIC) 
Operating system kernel files 
As discussed in a previous section of this document, the Backup Exec™ 2014 recovery disk used to perform
dissimilar hardware recovery operations can be customized with additional hardware drivers to ensure support
for non-standard environments.
Note: Backup Exec™ 2014 does not support bare metal or dissimilar hardware recovery of Windows 2012 R2 servers or
Windows 2012 R2 domain controllers.
25
Encryption Considerations
Using Backup Exec™ 2014 with Microsoft BitLocker
Windows BitLocker Drive Encryption is a security feature that provides better data protection for your
computer, by encrypting all data stored on the Windows operating system volume.
Figure 22: Full Disk Encryption
Using Symantec Backup Exec™ 2014 alongside Microsoft BitLocker is fully supported by Symantec for Windows
2008 and Windows 2012 servers. Backup Exec™ 2014 can protect Windows 2008 servers running Microsoft
BitLocker and perform bare metal and dissimilar hardware recovery operations of these servers.
Please note the following considerations when using Backup Exec™ 2014 to protect Windows 2008 and
Windows 2012 servers also running Microsoft BitLocker:
Considerations for Bare Metal Recovery of Servers Protected with Microsoft BitLocker
Back Up All Volumes on the System Disk
If the system disk (the disk to which Windows is installed) contains multiple volumes, all volumes on that disk
should be backed up. When a restore is performed using the Symantec Recovery Disk (SRD), the target disk will
be encrypted and unintelligible. As such, when a restore operation from the SRD is performed to that disk, all
data on that disk is removed as a part of the restore operation. If only one volume on that disk was backed up,
then only one volume will be restored to that disk, potentially resulting in data loss if the disk contained more
than one volume originally.
Unlock Volumes before Backup
System and data volumes that are protected with Microsoft BitLocker will need to be unlocked before Backup
Exec™ 2014 can protect them.
Backup Exec™ 2014 will see the volumes protected by Microsoft BitLocker in unlocked mode in Windows, and
resulting backups are also stored in an unencrypted state. For this reason, it is recommended that Backup
Exec™ 2014’s own software AES encryption feature be used to encrypt recovery points to ensure data remains
securely protected while stored in backup format.
Non-bare Metal Recovery Operations (SDR Not Used) Unaffected by Encryption
Non-bare metal recovery operations performed by Backup Exec™ 2014, which do not require the use of the
recovery disk, are not affected by the presence of Microsoft BitLocker. Because these restore operations are
26
done within the Windows framework, the Microsoft BitLocker solution will be actively running and will be
transparent to the restore process.
Encryption Must Be Re-applied After Bare Metal, Dissimilar Hardware Recovery
After a bare-metal or dissimilar hardware recovery event, disk volumes will need to be re-encrypted. Because
the disk volumes are seen as unencrypted by Backup Exec when backups are captured, they are also restored
unencrypted. As a result, after a recovery operation volume encryption using BitLocker must be re-applied.
Using Backup Exec™ 2014 with Symantec Endpoint Encryption and Third-party Encryption Solutions
Using Backup Exec™ 2014 alongside Symantec Endpoint Encryption or other, third-party encryption solutions is
not currently supported.
Note: For further details on supported disk encryption solutions with Backup Exec™ 2014, please refer to the Backup
Exec compatibility lists available here: TECH175581.
27
Licensing
Bare Metal and Dissimilar Hardware Restore Features Included
The SDR technology within Backup Exec™ 2014 that enables bare metal recovery and dissimilar hardware
recovery capabilities is included in the core Backup Exec product license and is not purchased or licensed
separately. Any individual server that is licensed for protection by a Backup Exec server, such as a server that is
licensed for the Agent for Windows or the Agent for Applications and Databases, is eligible for backup policies
enabled for bare metal and dissimilar hardware recovery.
28
Notes and Best Practices
Bare Metal Recovery of Deduplicated Backup Sets
Bare metal and dissimilar hardware restore operations cannot be performed using deduplicated backups which
are stored on a locally attached device. In order to use deduplicated backups for bare metal and dissimilar
hardware restore operations, the recovery disk must connect to a Backup Exec server and ‘pull’ the
deduplicated backup data from that remote server. A Backup Exec server is necessary in the process in order to
‘rehydrate’ the deduplicated backup data.
System Type Affinity
Both EFI/UEFI and BIOS system types are supported by Backup Exec™ 2014 for bare metal and dissimilar
hardware recovery, as well as their respective GPT and MBR disk and volume types. However, backup sets
captured from an EFI/UEFI system can only be restored to an EFI/UEFI system, and backup sets captured from
a BIOS system can only be restored to a BIOS system.
Bare Metal Recovery Limited to Windows Servers
In Backup Exec™ 2014, bare metal and dissimilar hardware restore operations are only supported for Windows
servers. Non-Windows platforms are not supported.
Note: For a full list of Windows platforms supported for bare metal and dissimilar hardware restore operations, please
refer to the Backup Exec compatibility lists available here: TECH175581.
Local Recovery Disk Used for Bare Metal Restore
In Backup Exec™ 2014, bare metal and dissimilar hardware recovery operations can only be performed using a
local recover disk. Remote recovery operations instrumented from a central administration server are not
supported.
Application Data Restored Separately
For servers hosting applications, bare metal and dissimilar hardware recovery operations do not restore
application data. Rather, the bare metal and dissimilar hardware restore process recovers the core operating
system and data elements of the server, after which the application must be restored separately.
Applications can be restored to a server that has recently been recovered using a bare metal or dissimilar
hardware restore operation from the Backup Exec console.
Note: For instructions on performing an application-level recovery, please refer to the Backup Exec™ 2014
Administrator’s Guide available here: DOC5211.
Note: In order for application-level recovery to be available, the original server must be protected using the Agent for
Applications and Databases, and the application resource on that server must be protected by at least one backup
policy.
Migrated Jobs Are Not Enabled for Bare Metal Recovery
Jobs migrated from some earlier versions of Backup Exec, such as Backup Exec 2010 and earlier, are not
enabled for Simplified Disaster Recovery and are therefore not enabled for bare metal or dissimilar hardware
recovery.
Administrator Privileges Required
29
Local administrator privileges are required in order to protect a server for bare metal and dissimilar hardware
recovery.
Recommendation of One Simplified Disaster Recovery Backup per Server
For servers protected by multiple backup jobs, it is recommended to only have one of these jobs enabled for
Simplified Disaster Recovery.
Recovery Disk Network/PXE Boot
Because the Backup Exec™ 2014 recovery disk is built upon the Microsoft WinPE operating system, it is
possible to create network boot packages of the recovery disk and use these to network-boot servers into the
recovery environment. However, this is not a tested feature of Backup Exec™ 2014 and the Backup Exec
Technical Support team will not be able to assist or provide support in such scenarios. Symantec does not
provide tools or documentation for network-booting the recovery disk.
Windows 2012 and Windows 2012 R2 Servers and Domain Controllers
Backup Exec™ 2014 fully supports bare metal or dissimilar hardware recovery of Windows 2012 servers or
Windows 2012 domain controllers.
Backup Exec™ 2014 does not support bare metal or dissimilar hardware recovery of Windows 2012 R2 servers
or Windows 2012 R2 domain controllers. Support for this platform of Windows is planned for a future release
of Backup Exec.
30
For More Information
Link Description
http://www.symantec.com/connect/blogs/new-backup-exec-partner-toolkit-v10 Backup Exec Partner Toolkit
www.symantec.com/business/backup-exec-for-windows-servers BE Family Landing Page
www.symantec.com/business/products/whitepapers.jsp?pcid=pcat_business_cont&pvid=57_1 BE White Papers
www.symantec.com/business/products/datasheets.jsp?pcid=2244&pvid=57_1 BE Datasheets, Feature Briefs
TECH205797 BE Compatibility Docs
www.backupexec.com/configurator BE Product Configurator
www.backupexec.com/skugenerator BE SKU Generator and BEST Tool
31
32
About Symantec
Symantec is a global leader in providing security,
storage, and systems management solutions to help
consumers and organizations secure and manage
their information-driven world. Our software and
services protect against more risks at more points,
more completely and efficiently, enabling
confidence wherever information is used or stored.
Headquartered in Mountain View, Calif., Symantec
has operations in 40 countries. More information is
available at www.symantec.com.
For specific country offices
and contact numbers, please
visit our website.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Symantec helps organizations secure and manage their
information-driven world with data backup and recovery
software.
Copyright © 2014 Symantec Corporation. All rights
reserved. Symantec, the Symantec Logo, and the
Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Microsoft and Windows are
either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
Linux is a registered trademark of Linus Torvalds. Other
names may be trademarks of their respective owners.
8/2014

Weitere ähnliche Inhalte

Was ist angesagt?

TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
 
Microsoft OCSP LUNA SA PCI Integration Guide
Microsoft OCSP LUNA SA PCI Integration GuideMicrosoft OCSP LUNA SA PCI Integration Guide
Microsoft OCSP LUNA SA PCI Integration GuideChris x-MS
 
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015Symantec
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL ServerBob Roudebush
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15Symantec
 
Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server EMC
 
Microsoft System Center Essentials Overview
Microsoft System Center Essentials OverviewMicrosoft System Center Essentials Overview
Microsoft System Center Essentials Overviewbutest
 
Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)Brian Coles
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environmentajitambekar
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyjoepanora
 
Evolve automation v1.01 - White Paper
Evolve automation v1.01 - White PaperEvolve automation v1.01 - White Paper
Evolve automation v1.01 - White PaperNimit Shishodia
 
Microsoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility WhitepaperMicrosoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility WhitepaperMicrosoft Private Cloud
 

Was ist angesagt? (20)

TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
 
Microsoft OCSP LUNA SA PCI Integration Guide
Microsoft OCSP LUNA SA PCI Integration GuideMicrosoft OCSP LUNA SA PCI Integration Guide
Microsoft OCSP LUNA SA PCI Integration Guide
 
Maximizing Business Continuity and Minimizing Recovery Time Objectives in Win...
Maximizing Business Continuity and Minimizing Recovery Time Objectives in Win...Maximizing Business Continuity and Minimizing Recovery Time Objectives in Win...
Maximizing Business Continuity and Minimizing Recovery Time Objectives in Win...
 
Prabhakaran sekar
Prabhakaran sekarPrabhakaran sekar
Prabhakaran sekar
 
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
TECHNICAL PRESENTATION: Upgrading to Backup Exec 2015
 
Availability Considerations for SQL Server
Availability Considerations for SQL ServerAvailability Considerations for SQL Server
Availability Considerations for SQL Server
 
Liberatore_Resume
Liberatore_ResumeLiberatore_Resume
Liberatore_Resume
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
 
High Res CIO Review Article
High Res CIO Review ArticleHigh Res CIO Review Article
High Res CIO Review Article
 
Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server Configuration Compliance For Storage, Network & Server
Configuration Compliance For Storage, Network & Server
 
Icomm agentless-architecture
Icomm agentless-architectureIcomm agentless-architecture
Icomm agentless-architecture
 
Microsoft System Center Essentials Overview
Microsoft System Center Essentials OverviewMicrosoft System Center Essentials Overview
Microsoft System Center Essentials Overview
 
Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)Brian Coles USA JOBS 2016 (1)
Brian Coles USA JOBS 2016 (1)
 
Installation
InstallationInstallation
Installation
 
V mware vdi environment
V mware vdi environmentV mware vdi environment
V mware vdi environment
 
sreeram CV
sreeram CVsreeram CV
sreeram CV
 
V mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-studyV mware cdcr-11-q3-en-case-study
V mware cdcr-11-q3-en-case-study
 
Evolve automation v1.01 - White Paper
Evolve automation v1.01 - White PaperEvolve automation v1.01 - White Paper
Evolve automation v1.01 - White Paper
 
Resume ujjwal
Resume ujjwalResume ujjwal
Resume ujjwal
 
Microsoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility WhitepaperMicrosoft India - System Center Controlling Costs and Driving Agility Whitepaper
Microsoft India - System Center Controlling Costs and Driving Agility Whitepaper
 

Andere mochten auch

Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909
Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909
Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909Marcin Mazurek
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeRuchika Mehresh
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsHannes Tschofenig
 
Ic packaging :encapsulation
Ic packaging :encapsulationIc packaging :encapsulation
Ic packaging :encapsulationHoang Tien
 
Package fabrication technolog ynew
Package fabrication technolog ynewPackage fabrication technolog ynew
Package fabrication technolog ynewprashant singh
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardwaredheeraj87
 
SharePoint Backup And Disaster Recovery with Joel Oleson
SharePoint Backup And Disaster Recovery with Joel OlesonSharePoint Backup And Disaster Recovery with Joel Oleson
SharePoint Backup And Disaster Recovery with Joel OlesonJoel Oleson
 

Andere mochten auch (14)

Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909
Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909
Disaster Recovery in distant DC; people, hardware, latency - PLNOG 200909
 
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance SchemeSecure Proactive Recovery- a Hardware Based Mission Assurance Scheme
Secure Proactive Recovery- a Hardware Based Mission Assurance Scheme
 
Mobile Jammer_2
Mobile Jammer_2Mobile Jammer_2
Mobile Jammer_2
 
Switching regulators
Switching regulatorsSwitching regulators
Switching regulators
 
Crypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M ProcessorsCrypto Performance on ARM Cortex-M Processors
Crypto Performance on ARM Cortex-M Processors
 
packaging types
packaging typespackaging types
packaging types
 
DMRC SMPS
DMRC SMPSDMRC SMPS
DMRC SMPS
 
Ic packaging :encapsulation
Ic packaging :encapsulationIc packaging :encapsulation
Ic packaging :encapsulation
 
Package fabrication technolog ynew
Package fabrication technolog ynewPackage fabrication technolog ynew
Package fabrication technolog ynew
 
Computer Hardware
Computer HardwareComputer Hardware
Computer Hardware
 
SharePoint Backup And Disaster Recovery with Joel Oleson
SharePoint Backup And Disaster Recovery with Joel OlesonSharePoint Backup And Disaster Recovery with Joel Oleson
SharePoint Backup And Disaster Recovery with Joel Oleson
 
Mother Board
Mother BoardMother Board
Mother Board
 
Mother board
Mother boardMother board
Mother board
 
Pc Assembling
Pc AssemblingPc Assembling
Pc Assembling
 

Ähnlich wie TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup Exec

The virtues of backup disaster recovery
The virtues of backup disaster recoveryThe virtues of backup disaster recovery
The virtues of backup disaster recoveryZack Fabro
 
How SMB's benefit from cloud
How SMB's benefit from cloudHow SMB's benefit from cloud
How SMB's benefit from cloudAlessandro Guli
 
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revfActive directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revfsandeep updahayay
 
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revfActive directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revfBilguun Ganbat
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Toolstiresomerat7000
 
Tideway Software Identification
Tideway   Software IdentificationTideway   Software Identification
Tideway Software IdentificationPeter Grant
 
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Symantec
 
Maximizing Business Continuity Success
Maximizing Business Continuity SuccessMaximizing Business Continuity Success
Maximizing Business Continuity SuccessSymantec
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0Aladdin Dandis
 
SafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsSafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsVladi Vexler
 
Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecksbenscheerer
 
What is Onsite IT Support and Why it is Important
What is Onsite IT Support and Why it is ImportantWhat is Onsite IT Support and Why it is Important
What is Onsite IT Support and Why it is ImportantBluechip Gulf IT Services
 
IT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation SlidesIT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation SlidesSlideTeam
 
Analysis of a high availability and data integration solution of an electroni...
Analysis of a high availability and data integration solution of an electroni...Analysis of a high availability and data integration solution of an electroni...
Analysis of a high availability and data integration solution of an electroni...IvanZennaro
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backupRita Crawford
 
Whitepaper: Moving Towards a Virtual Data Center - Happiest Minds
Whitepaper: Moving Towards a Virtual Data Center - Happiest MindsWhitepaper: Moving Towards a Virtual Data Center - Happiest Minds
Whitepaper: Moving Towards a Virtual Data Center - Happiest MindsHappiest Minds Technologies
 

Ähnlich wie TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup Exec (20)

The virtues of backup disaster recovery
The virtues of backup disaster recoveryThe virtues of backup disaster recovery
The virtues of backup disaster recovery
 
How SMB's benefit from cloud
How SMB's benefit from cloudHow SMB's benefit from cloud
How SMB's benefit from cloud
 
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revfActive directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revf
 
Active directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revfActive directory rights_management_services_luna_sa_revf
Active directory rights_management_services_luna_sa_revf
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
Benefits of VMware Monitoring Tools
Benefits of VMware Monitoring ToolsBenefits of VMware Monitoring Tools
Benefits of VMware Monitoring Tools
 
Tideway Software Identification
Tideway   Software IdentificationTideway   Software Identification
Tideway Software Identification
 
Wizard intro
Wizard introWizard intro
Wizard intro
 
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...
 
Maximizing Business Continuity Success
Maximizing Business Continuity SuccessMaximizing Business Continuity Success
Maximizing Business Continuity Success
 
Downtime-Whitepaper
Downtime-WhitepaperDowntime-Whitepaper
Downtime-Whitepaper
 
FMEA Final Project
FMEA Final ProjectFMEA Final Project
FMEA Final Project
 
Module 4 disaster recovery student slides ver 1.0
Module 4 disaster recovery   student slides ver 1.0Module 4 disaster recovery   student slides ver 1.0
Module 4 disaster recovery student slides ver 1.0
 
SafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud AppsSafePeak whitepaper for Cloud Apps
SafePeak whitepaper for Cloud Apps
 
Destroying Perf Bottlenecks
Destroying Perf BottlenecksDestroying Perf Bottlenecks
Destroying Perf Bottlenecks
 
What is Onsite IT Support and Why it is Important
What is Onsite IT Support and Why it is ImportantWhat is Onsite IT Support and Why it is Important
What is Onsite IT Support and Why it is Important
 
IT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation SlidesIT Demonstration PowerPoint Presentation Slides
IT Demonstration PowerPoint Presentation Slides
 
Analysis of a high availability and data integration solution of an electroni...
Analysis of a high availability and data integration solution of an electroni...Analysis of a high availability and data integration solution of an electroni...
Analysis of a high availability and data integration solution of an electroni...
 
Not having a good backup
Not having a good backupNot having a good backup
Not having a good backup
 
Whitepaper: Moving Towards a Virtual Data Center - Happiest Minds
Whitepaper: Moving Towards a Virtual Data Center - Happiest MindsWhitepaper: Moving Towards a Virtual Data Center - Happiest Minds
Whitepaper: Moving Towards a Virtual Data Center - Happiest Minds
 

Mehr von Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

Mehr von Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Kürzlich hochgeladen

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Kürzlich hochgeladen (20)

Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup Exec

  • 1. TECHNICALWHITEPAPER:BACKUPEXECTM2014 BAREMETALANDDISSIMILARHARDWARERECOVERY Backup ExecTM 2014 Technical White Paper Technical White Papers are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the Symantec Backup and Recovery product family. The information within a Technical White Paper will assist partners and end users as they design and implement data protection solutions based on Symantec Backup and Recovery products. Technical White Papers are authored and maintained by the Symantec Backup and Recovery Technical Services group. Bare Metal and Dissimilar Hardware Recovery
  • 2. 2
  • 3. 3 Contents Introduction.............................................................................................................................................. 4 Business Value .......................................................................................................................................... 5 Underlying Principles................................................................................................................................ 9 Recovery Disk.......................................................................................................................................... 14 Data Deduplication ................................................................................................................................. 22 Domain Controller Recovery Considerations ......................................................................................... 23 Encryption Considerations...................................................................................................................... 25 Licensing ................................................................................................................................................. 27 Notes and Best Practices ........................................................................................................................ 28 For More Information............................................................................................................................. 30
  • 4. 4 Introduction This white paper is intended to assist technical personnel as they design and implement the bare metal and dissimilar hardware recovery features of Backup Exec™ 2014 and make related decisions. The business value of Backup Exec™ 2014’s bare metal and dissimilar hardware recovery technology will also be considered in this white paper. This white paper will explore the following topics related to the bare metal and dissimilar hardware recovery technology found within Backup Exec™ 2014:  Business Value  Underlying Principles  Recovery Disk  Data Deduplication  Domain Controller Recovery Considerations  Encryption Considerations  Licensing  Notes and Best Practices Note: For step-by-step instructions for installing and managing Backup Exec™ 2014’s bare metal and dissimilar hardware recovery features, please refer to the Backup Exec™ 2014 Administrator’s Guide available here: TECH205797.
  • 5. 5 Business Value Modern Business is Driven by Servers Modern businesses are based upon an electronic foundation comprised of one or more servers. These servers contain and manage critical applications and data that are the lifeblood of business, without which businesses cannot function at a very basic level. Some examples of critical applications found on these servers might be Exchange, SQL, SharePoint, or Active Directory. Unfortunately, servers fail. It is not a matter of if a server will fail; it’s a matter of when. Without adequate planning and preparation, server downtime can cause financial damage to organizations as the ability to generate revenue is lost, and the company’s ability to meet regulatory compliance requirements is affected. Planning for operational continuity and recovery from outages is rapidly becoming an urgent priority for all types of businesses today. Causes of Server Failure and Downtime The danger of server failure is a reality for all IT professionals. There are a variety of events that can cause server failure—and natural disasters are only one example. The list of possible causes of server failure includes the following:  User Error - The most common form of server failure is user error. Users are people, and people make mistakes. Whether it’s the end user downloading and installing the wrong application or visiting the wrong websites, or the IT administrator setting down a cup of coffee at the wrong place at the wrong time, the human element consistently leads the way among causes of server failure.  Planned Downtime - Planned downtime is another common cause of server downtime. Servers require maintenance in order to perform at an optimal level over a long period of time. Sometimes planned maintenance events can inadvertently lead to server failure when maintenance tasks, for whatever reason, prevent a server from coming back online and operating correctly, or coming back online at all.  Hardware Failures - When it comes to hardware failures, it’s not a question of when, but how often. Hardware failures happen on a frequent basis. This can be due to defective hardware, equipment maintenance problems, power-related issues, accidents, and other causes. The risk of hardware failure becomes greater as the size and complexity of a data center increases.  Viruses and Malware - Other potential causes of system failure include malicious code designed specifically to exploit security vulnerabilities in IT infrastructure. Both viruses and malware can put servers at risk, even if security software is present and up to date. Some malicious code is designed to destroy data, while others are designed to steal data, and still others are designed to secretly take control of systems and compromise security over a long period of time.  Natural Disasters - Natural disasters are also among the threats that can cause system failure, although they are among the most unlikely. Hurricanes, floods, fires, tornados, and other natural events can certainly bring servers down and cause them to fail, and perhaps even physically destroy them. Cost of Server Downtime The cost of server downtime includes tangible, direct costs such as lost transaction revenue, lost wages, lost inventory, remedial labor costs, marketing costs, bank fees and legal penalties from failing to meet regulatory compliance requirements or from not delivering on service level agreements, and intangible, indirect costs including lost business opportunities, loss of employees and/or employee morale, decrease in stock value, loss of customer/partner goodwill, brand damage, driving business to competitors or even bad publicity.
  • 6. 6 Figure 1: Cost of Server Downtime The cost of server downtime can be very significant to an organization, and perhaps even fatal. The longer the server downtime persists, the greater the damage, and the more likely the IT “blow” suffered to the organization becomes fatal. This is also true for partners and service providers with responsibility for the business continuity of end user customers. The ability to recover quickly from server failure is a key element of any service provider’s portfolio. Server Recovery Problems and Obstacles In light of the problem of server failure and downtime, it is critical that businesses equip themselves with tools and solutions to recover from such an event. Solutions that enable quick server recovery in the event of a disaster can mitigate both the server downtime itself as well as the associated costs. Of course, there are obstacles and problems that make old server recovery methods, as well as new elements of the server recovery problem, difficult to overcome. These include the complexity of manual server recovery processes as well as the problem of recovering to dissimilar hardware configurations. Complexity of Manual Server Recovery Manual server recovery can be a time-consuming and tedious process. Typically, manual recovery includes rebuilding a server by reinstalling the operating system, rebooting several times throughout the recovery process, reconfiguring the system, loading backup software, and hoping that no errors have occurred along the way. This process, which can take hours or even days, generally exceeds the capabilities of the average small business. Figure 2: Complexity of Manual Server Recovery
  • 7. 7 For larger organizations, the complexity of the server recovery problem can be exacerbated when an organization has one or more remote sites at which servers are located. The Dissimilar Hardware Problem Recovering to dissimilar hardware is also essential to effective server protection. It is cost-prohibitive for companies to maintain standby replicas of production server configurations for recovery purposes. Even in situations where standby hardware is available, small variations in hardware builds can cause problems for full server recovery solutions that are not equipped to deal with dissimilar hardware. Bare Metal and Dissimilar Hardware Recovery with Backup Exec™ 2014 To help businesses prepare for and overcome the problem of server failure and downtime, Symantec has introduced Backup Exec™ 2014 with integrated bare metal recovery and dissimilar hardware recovery – also known as hardware discovery - capabilities. These features make full server recovery easy, and offer it as a built-in element of Backup Exec™ 2014 data and application protection practices. Now, using Backup Exec™ 2014, a single backup for a server can protect it against all types of disaster or failure and enable all of the following types of recovery: Server Recovery Features Supported by Backup Exec™ 2014 Bare Metal Server Recovery  Bare Metal Server Recovery to Dissimilar Hardware Configurations  Application Recovery (Agent for Applications and Databases required)  Granular Application Recovery (Agent for Applications and Databases required)  File and Folder Recovery  All of these recovery capabilities are offered in a single product and solution, Backup Exec™ 2014. Symantec Backup Exec Symantec Backup Exec™ delivers powerful, flexible, and easy-to-use backup and recovery to protect your entire infrastructure, whether built upon virtual, physical, or a combination of both. Using modern technology, Backup Exec backs up local or remote data to virtually any storage device including tape, disk and cloud. Recovery is fast and efficient. With a few simple clicks, you can quickly search and restore granular file or application objects, applications, VMs, and servers directly from backup storage. Additionally, easily protect more data while reducing storage costs through integrated deduplication and archiving technology.  Powerful: Super charge the performance of your backup with Backup Exec. Get fast and reliable backups that are up to 100% faster than prior releases, comprehensive and innovative virtualization capabilities, and powerful built-in data deduplication and archiving. Avoid lengthy downtime and missing a critical backup window with Backup Exec.  Flexible: Not all backup solutions have the flexibility to protect your environment while also supporting agile recovery. You should be able to recover what you need, when you need it - quickly and easily. Whether you want to recover a single, critical file or an entire server, Backup Exec can quickly search and restore without mounting or staging multiple backup jobs. Backup Exec protects hybrid architectures with a single solution that backs up to virtually any storage device and achieves fast, efficient, versatile recovery.  Easy to use: Traditional, complex and point backup and recovery solutions can be inefficient, time consuming, and expensive to manage. Through intuitive wizards and insightful dashboards, Backup
  • 8. 8 Exec is easy to implement, use and manage, whether you’re upgrading from a previous version or switching from an alternative solution.
  • 9. 9 Underlying Principles General The bare metal and dissimilar hardware restore capabilities in Backup Exec™ 2014 represent the combination of modern file-by-file protection technology in Backup Exec and recovery disk and dissimilar hardware restore capabilities borrowed from the Symantec System Recovery product. It is important to note that Backup Exec™ 2014 does not employ “imaging” technology in its bare metal and dissimilar hardware recovery features; rather, these recovery capabilities are enabled by an optimized file-based technology in Backup Exec™ 2014 known as Simplified Disaster Recovery (SDR). Simplified Disaster Recovery (SDR) The core technology that enables the bare metal and dissimilar hardware restore capabilities within Backup Exec™ 2014 is called Simplified Disaster Recovery (SDR). This technology ensures that key system-level elements of a server are captured and stored as part of a backup operation. When a bare metal or dissimilar hardware restore operation is performed, this system-level information is used to rebuild the failed server and restore it to a functional state. Some of these critical system components include:  System volume  Boot volume  Services volumes  System state components In Backup Exec™ 2014, the SDR feature is enabled by default for every new backup job that is created. It is represented within the Backup Exec™ 2014 user interface as a part of the backup selections screen through a ribbon titled “Simplified Disaster Recovery” as shown in the figure below: Figure 3: Simplified Disaster Recovery Ribbon If they want to, administrators can disable SDR by unselecting elements of the server that are required to restore the server from a bare metal state, such as the “C:” volume, certain sub-elements of the “C:” volume, or “System State” elements. In addition to enabling bare metal recovery and dissimilar hardware recovery, SDR enables other recovery features supported by Backup Exec™ 2014, such as:
  • 10. 10  Online Server Recovery – The ability to perform a complete recovery of a protected server while it’s online  Physical-to-virtual Conversions (P2V) – Virtual conversion tasks which are processed in parallel with a backup task  Backup-to-virtual (B2V) - Virtual conversion tasks which are processed after a backup task  Point-in-time conversions (PIT) - “Ad hoc” or on demand B2V conversions which can be run any time after a backup This technical white paper will focus exclusively on the bare metal recovery and dissimilar hardware recovery features of Backup Exec™ 2014. Whenever a backup job is modified such that the SDR feature is disabled, all corresponding recovery features that rely upon SDR are not available from those backups. Recovery Features Enabled by Simplified Disaster Recovery Bare Metal Recovery  Dissimilar Hardware Recovery  Online Server Recovery  Physical to Virtual Conversions (P2V)  Backup to Virtual (B2V)  Point in Time (Ad Hoc) Conversion  Microsoft Volume Shadow Copy Service (VSS) Integration In accordance with Microsoft best practices, the methods used by Backup Exec™ 2014 to capture SDR-enabled backups integrate with the Microsoft Volume Shadow Copy Service (VSS) to ensure that backups are both complete and consistent. Complete Backups Through integration with VSS, the backups captured by Backup Exec™ 2014 include all selected elements, even if they are components of the active operating system or are considered to be in an “open” state. This includes all selected operating system elements, such as the registry, and system state components. Consistent Backups This same integration also ensures that the backups captured are in a consistent state, and have been properly placed into a “quiet” mode at the time the snapshot is captured. This ensures that the operating system will boot and operate properly after a bare metal or dissimilar hardware restore operation. DR File Each backup set captured by a backup job that is enabled for SDR includes a disaster recovery or ‘DR’ file (file with the .DR extension). This file contains key metadata leveraged during bare metal and dissimilar hardware restore processes to recreate a physical server’s confiuration from bare metal. Applicable Backup Methods The Simplified Disaster Recovery feature of Backup Exec™ 2014 applies only to agent-based backups, meaning backups captured through the Agent for Windows. This means that SDR backups, and therefore the bare metal and dissimilar hardware restore recovery capabilities enabled by this feature, are generally limited to
  • 11. 11 standalone physical servers with a local install of the Agent for Windows, which backed up through the Agent for Windows using the agent-based backup approach. In most cases, VMware and Hyper-V virtual machines, even if they contain a local install of the Agent for Windows, are not backed up through an agent-based process. In VMware and Hyper-V environments it is usually optimal to protect virtual machines through host-based snapshot methods using the Agent for VMware and Hyper-V, rather than through the locally installed Agent for Windows. In these situations, the SDR feature does not apply, and as such the features enabled by the SDR feature are not available. Although bare metal and dissimilar hardware recovery, as enabled by the SDR feature of Backup Exec™ 2014, are not available when protecting virtual machines using host-based backups, equivalent restore capabilities are achieved through built-in features of the Agent for VMware and Hyper-V. These include the following: Virtual Machine Recovery Features of the Agent for VMware and Hyper-V Full Virtual Machine Recovery  Application Recovery  Granular Application Recovery (requires Agent for Applications and Databases)  Granular File and Folder Recovery (requires Agent for Applications and Databases)  Redirected Recovery  Note: For further details on the backup and recovery features available for VMware and Hyper-V virtual machines using the Agent for VMware and Hyper-V, please refer to the Backup Exec™ 2014 Administrator’s Guide available here: DOC5211. Bare Metal and Dissimilar Hardware Recovery Overview Performing a bare metal or dissimilar hardware recovery operation with Backup Exec™ 2014 is driven primarily by the use of the recovery disk, which by default is on DVD media. The general process outline is as follows: Server is online and operational, and protected by Backup Exec™ 2014. Figure 4: Protected Server is Operational
  • 12. 12 Server failure event occurs. Figure 5: Protected Server Experiences Failure Event Administrator performs bare metal or dissimilar hardware restore using recovery disk. Figure 6: Server is Recovered Using Recovery Disk Server returns to normal operational state. Figure 7: Server Returns to Operational State Automated Server Recovery During a bare metal or dissimilar hardware recovery operation, the server system is reconstructed using the data contained in the selected backup set. This includes the process of formatting and partitioning the disk
  • 13. 13 system, restoring basic disk boot components such as the MBR or GPT, and recovering the file contents of the server including the operating system and data files. The server is returned to a consistent point in time associated with the selected backup set. SDR technology automates, simplifies, and significantly speeds up the server recovery process when compared to the legacy method of recovering a server using a manual rebuilding process. Modern System and Volume Configuration Support It’s important to note that the bare metal and dissimilar hardware recovery capabilities of Backup Exec™ 2014, including the associated recovery disk, support both EFI/UEFI as well as legacy BIOS server configurations. As such, the recovery of both MBR and GPT disks and their associated volumes is also supported. However cross recovery, such as recovering a UEFI backup to a legacy BIOS system (and vice-versa), is not supported. Dissimilar Hardware Restore The Backup Exec™ 2014 dissimilar hardware feature enables administrators to perform a bare metal recovery to a new server with a different hardware configuration. The process of configuring a recovered server for new or dissimilar hardware is fully automated, leveraging the built-in driver database that comes with Backup Exec™ 2014‘s SDR technology package. Administrators can add additional drivers to the driver database within an SDR recovery disk using automated tools included with Backup Exec™, which is explained in greater detail later on in this document as well as in the Backup Exec™ 2014 Administrator’s Guide. Backup Data Locations The bare metal and dissimilar hardware recovery process can utilize backup data stored on locally attached media, such as a local tape or local USB drive, or it can utilize backup data hosted on a remote Backup Exec™ 2014 server. This includes secondary Backup Exec™ 2014 servers that have received the backup data (and associated DR files) through a set copy or offsite replication (optimized duplication) process.
  • 14. 14 Recovery Disk The Backup Exec™ 2014 recovery disk is the tool used by administrators to perform bare metal and dissimilar hardware recovery operations. The Backup Exec™ 2014 recovery disk is based on the powerful Microsoft operating system components and includes a robust driver database leveraged for both runtime tasks and dissimilar hardware recovery operations. Recovery Disk Versions Two basic versions of the Backup Exec™ 2014 recovery disk are available. They are:  32-bit  64-bit Depending on the platform being restored, the correct version of the recovery disk should be used. Each recovery disk boots and operates in an identical manner. When creating a custom version of the recovery disk, the corresponding source version of the default recovery disk must be used. Recovery Disk Language Support The recovery disk supports all languages supported by Backup Exec™ 2014. During the recovery disk boot process, a language selection screen is displayed from which the administrator can select a language version to use: Figure 8: Recovery Disk Language Menu After a language has been selected, the recovery disk boot process continues and the corresponding language- version of the recovery environment is loaded. Recovery Disk User Interface After entering the recovery environment, the administrator can navigate between three tabs:  Recovery – “Home” screen of the recovery environment, used to launch recovery wizard and perform bare metal and dissimilar hardware recovery operations
  • 15. 15 Figure 9: Recovery Tab  Network – Used to manage the server’s network configuration while in the recovery environment, such as IP address settings Figure 10: Network Tab  Utilities – Used for additional recovery environment operations, such as execution of the support tool, dynamic loading of drivers, and accessing a command prompt
  • 16. 16 Figure 11: Utilities Tab Recovery Process (Data on Remote Backup Exec Server) The recovery wizard can be accessed by navigating to the Recovery tab and selecting the ‘Recover This Computer’ option. The recover wizard is designed to be a guided process, stepping the administrator through the process of performing a recovery operation, and can be used by administrators performing a bare metal recovery operation for the first time, or by administrators already familiar with the process. The recovery process includes the following steps:  Remote or Local Recovery Selection – The administrator selects whether the backup data to be restored is located on a remote Backup Exec server or on a locally attached storage device (the remaining steps in this example are based upon the remote Backup Exec server selection). Figure 12: Remote or Local Recovery Selection
  • 17. 17  Identification of Remote Backup Exec Server – The administrator identification information for the Backup Exec server as well as authentication credentials. Figure 13: Remote Backup Server Identification  Backup Data Selection – The administrator selects the server and point in time that is to be restored to the local system. Figure 14: Backup Set Selection  Volume Layout Configuration – The administrator determines what the local system’s volume layout will be after the recovery process has completed.
  • 18. 18 Figure 15: Volume Layout Configuration  Advanced Disk Configuration – Administrators can access advanced disk configuration tools and features if additional changes are required. If the target local disk or disk array is not visible during this step, it may be necessary to load the correct storage controller driver and rescan disks using the advanced disk configuration option. Figure 16: Advanced Disk Configuration  Recovery Process Start – After selections have been reviewed and confirmed, the administrator begins the recovery process. Recovery Process (Data on Local Device) The recovery steps leveraging backup data stored on locally attached storage devices are very similar. However, rather than selecting a remote Backup Exec™ 2014 server, the administrator selects the local device containing the backup data, as well as the .DR file corresponding to the backup set that will be restored. All other recovery steps are the same. It is important to note that backup data that resides in a deduplication disk
  • 19. 19 storage device can only be used in conjunction with a disaster recovery operation performed directly from a Backup Exec server. Customizing the Recovery Disk Backup Exec™ 2014 includes the capability to create customized versions of the recovery disk. The primary purpose of creating a customized version of the recovery disk is to enable administrators to add additional storage and network drivers to the recovery disk’s driver database in order to fully support the servers in their environment. The first step in creating a custom version of the recovery disk is to identify the source recovery disk media (must be locally available to the Backup Exec™ 2014 server from which the custom recovery disk wizard is being run) or image (.ISO) file that will be used as the source for the customized version of the recovery disk. The customized version of the recovery disk will be language specific and will not present choices for language selection during boot-up. The customized recovery disk language can be selected during the customized recovery disk creation wizard. Once the source recovery disk media or image has been identified, drivers can be harvested remotely from servers being protected by a Backup Exec™ 2014 server and injected into the database of the custom recovery disk. Custom drivers can also be added manually to a custom recovery disk. The process of harvesting drivers remotely includes two steps. The first is to identify the remote servers from which drivers need to be harvested: Figure 17: Select Remote Computers for Driver Harvesting The next is to identify, from the list of identified drivers, those that should be added to the custom recovery disk. Only drivers that are not already present in the driver database are listed and available for selection:
  • 20. 20 Figure 18: Select Drivers to Include Once the needed drivers have been identified, the process of creating a custom version of the recovery disk that includes those driver files can begin. Figure 19: Customizable Recovery Disk Diagram Custom 32-bit drivers can be added to a custom 32-bit recovery disk built from the default 32-bit recovery disk, and custom 64-bit drivers can be added to a custom 64-bit recovery disk built from the default 64-bit recovery disk. Custom 32-bit drivers can be added to a 64-bit customized recovery disk, and custom 64-bit drivers can be added to a 32-bit customized recovery disk. These drivers are added to the driver database and used for dissimilar hardware recovery. Placing the Recovery Disk on USB Drives or USB Thumb Drives It is possible to place the Backup Exec™ 2014 recovery disk on alternate types of boot media, such as a USB drive or USB thumb drive. Using a USB drive or thumb drive instead of an optical DVD to perform a bare metal or dissimilar hardware recovery operation on a server can offer several advantages, such as recovery media boot speed.
  • 21. 21 Figure 20: Placing the Recovery Disk on USB Drives or Thumb Drives Placing the Backup Exec™ 2014 recovery disk on a USB drive can offer several advantages, including a faster recovery disk boot process and the ability to easily transfer data to and from the USB drive. Note: Instructions for placing the recovery disk on a USB drive can be found here: TECH181347. Important Notes Related to Placing the Recovery Disk on USB Devices  Use caution when entering a disk number in step 4; these instructions will destroy/delete any existing data on the USB drive or USB thumb drive being used; ensure that all data has been copied successfully from the USB drive or USB thumb drive to an alternate location before using these instructions  These instructions are offered as is, without technical support; placing the Backup Exec™ 2014 recovery disk on alternate media is not an out-of-the-box feature of Backup Exec™ 2014, and the Backup Exec Technical Support team will not be able to assist or provide support in such scenarios  After a USB drive or thumb drive has been enabled to boot the Backup Exec™ 2014 recovery disk, other data can be stored on it, as long as the recovery disk files and folders are not modified or deleted  In order for the Backup Exec™ 2014 recovery disk to boot successfully from a USB drive or USB thumb drive, the USB drive itself must support boot functionality  While most modern computer systems support booting to a USB device, it may be necessary to modify the system’s boot sequence/order in order for the system to boot to the USB device
  • 22. 22 Data Deduplication Integrated Data Deduplication Backup Exec™ 2014 includes integrated, block-level deduplication technology that dramatically reduces backup storage requirements. This technology also applies to the bare metal and dissimilar recovery features of Backup Exec™ 2014. Critical system component data captured during a Simplified Disaster Recovery-enabled backup operation can be deduplicated alongside other backup data captured from a server, offering the same storage benefits. In order for backup data to be deduplicated, it must be stored to a deduplication-enabled device, such as the Backup Exec Deduplication Storage Folder. It is important to note that backup data that resides in a Deduplication Storage Folder can only be used in conjunction with a disaster recovery operation performed directly from a Backup Exec server. Data Deduplication Overview As backup data is captured from protected servers and stored to the Deduplication Storage Folder on a Backup Exec server, the data is scanned to determine which blocks are unique and need to be stored and which blocks are non-unique and can be skipped. Only unique data blocks are stored to disk, while non-unique blocks are skipped. Unique and non-unique blocks are identified through a process known as fingerprinting. Figure 21: Data Deduplication Fingerprinting Process Diagram The calculation of data block fingerprints can occur at the client level, the server level, or at the appliance level. Which calculation method is most efficient for a given backup operation depends on the backup environment topology, whether the client is physical or virtual, and other factors. Client-level, server-level, and appliance- level deduplication methods can be mixed and matched according to the needs of an administrator.
  • 23. 23 Domain Controller Recovery Considerations Backup Exec™ 2014 fully supports the bare metal and dissimilar hardware recovery of Windows Server 2003/R2 and Windows Server 2008/R2 Active Directory Domain Controllers in either standalone or domain forest environments. Key supported recovery operations for Active Directory Domain Controllers include the following: • Bare metal recovery of domain controllers back to their original hardware configuration • Bare metal recovery of domain controllers to dissimilar hardware configurations Note: For detailed information on the specific Microsoft server platforms supported by Backup Exec™ 2014, please refer to the Backup Exec compatibility lists available here: TECH175581. Volume Shadow Copy Service (VSS) Integration Backup Exec™ 2014 works in accordance with Microsoft best practices to protect Windows 2003/R2, Windows 2008/R2, and Windows 2012 servers, including Active Directory Domain Controllers. Through integration with the Microsoft Volume Shadow Copy Service (VSS), Backup Exec™ 2014 ensures that Active Directory Domain Controller databases are correctly prepared for backup, ensuring that the server can be recovered properly. Resetting Domain Controller Invocation IDs and Preventing USN Rollbacks An important element of properly backing up a domain controller is ensuring the backup process deals with the resetting of the domain controller’s Invocation ID. Each domain controller in a forest has a different Invocation ID, allowing each domain controller to be properly identified in the forest and allowing replication processes to proceed correctly. If a domain controller is recovered in a forest environment and its Invocation ID has not been reset, a USN rollback can occur causing replication problems and allowing old data to return to the domain environment. Backup Exec™ 2014 integrates with the Microsoft Volume Shadow Copy Service (VSS) to properly prepare domain controllers for backup. During a backup operation, the VSS writer ensures that the backup being created of the domain controller is flagged as a backup copy. If a domain controller is recovered from that backup, either to original hardware or dissimilar hardware, it will request a new Invocation ID allowing it to rejoin the domain properly and avoiding replication problems such as USN rollbacks. This process is fully automated and requires no user intervention. Best Practices When Protecting Active Directory Domain Controllers Please consider the following recommendations and best practices when protecting Active Directory Domain Controllers for bare metal and dissimilar hardware recovery with Backup Exec™ 2014: • Tombstone Lifetime - Backups captured from domain controllers should not be older than the tombstone lifetime for the Active Directory Domain. Restoring a recovery point older than the tombstone lifetime could result in previously purged Active Directory objects being reintroduced into the domain environment. Note: The tombstone lifetime is the number of days before a deleted object is permanently purged from the directory services database. For Windows Server 2003/R2, Windows Server2008/R2, and Windows 2012 the default tombstone lifetime is 60 days. • Computer Account Password Age – A recovery point of a domain controller should not be older than two times the maximum computer account password age. A maximum password age determines the number of days a password can be used before the system requires it to be changed. By default, this
  • 24. 24 setting is defined in the Default Domain Group Policy Object (GPO) and in the local security policy of workstations and servers with a value of 30. • Recently Recovered Domain Controllers – Newly-promoted or recovered domain controllers use a default computer account for the first few hours while they establish a valid and unique computer account. After performing a recover of an Active Directory Domain Controller, allow the domain controller to run for at least 24 hours before you create the first recovery point. This ensures that the domain controller has obtained a valid and unique computer account. • Check for Consistency – Check a newly promoted or a restored Active Directory Domain Controller for consistency before creating the first recovery point. • Point-in-Time Consistency for Multi-volume Backups – A backup of all the active disk volumes on a domain controller must be created and restored at the same time to preserve the synchronization of the domain controller’s data. To do so, select all the domain controller’s volumes when you create the schedule of the backup job. When multiple server volumes are included in the same backup job, snapshots for all included volumes are captured at the same point in time. • Top Down Restores – In a server forest environment, when you restore a tree or an entire forest, be sure that you restore from the top down to maintain domain integrity. Restoring an Active Directory Domain Controller to Dissimilar Hardware Backup Exec™ 2014 can be used to restore Windows 2003/R2, Windows 2008/R2, and Windows 2012 Active Directory Domain Controllers to dissimilar hardware configurations. As described above, Backup Exec™ 2014 interacts with the VSS service to prepare the domain controller and the Active Directory database for backup. Running with VSS disabled is not supported and causes domain controller failures upon restoration. Automatic Detection and Installation of Critical Hardware Drivers During a dissimilar hardware recovery operation, Backup Exec™ 2014 automatically detects and installs the following key driver elements of the new server hardware configuration to ensure the Active Directory Domain Controller functions properly under the new hardware configuration: Driver Components Automatically Configured During Dissimilar Hardware Restore Mass storage controller  Hardware Abstraction Layer (HAL)  Network interface controller (NIC)  Operating system kernel files  As discussed in a previous section of this document, the Backup Exec™ 2014 recovery disk used to perform dissimilar hardware recovery operations can be customized with additional hardware drivers to ensure support for non-standard environments. Note: Backup Exec™ 2014 does not support bare metal or dissimilar hardware recovery of Windows 2012 R2 servers or Windows 2012 R2 domain controllers.
  • 25. 25 Encryption Considerations Using Backup Exec™ 2014 with Microsoft BitLocker Windows BitLocker Drive Encryption is a security feature that provides better data protection for your computer, by encrypting all data stored on the Windows operating system volume. Figure 22: Full Disk Encryption Using Symantec Backup Exec™ 2014 alongside Microsoft BitLocker is fully supported by Symantec for Windows 2008 and Windows 2012 servers. Backup Exec™ 2014 can protect Windows 2008 servers running Microsoft BitLocker and perform bare metal and dissimilar hardware recovery operations of these servers. Please note the following considerations when using Backup Exec™ 2014 to protect Windows 2008 and Windows 2012 servers also running Microsoft BitLocker: Considerations for Bare Metal Recovery of Servers Protected with Microsoft BitLocker Back Up All Volumes on the System Disk If the system disk (the disk to which Windows is installed) contains multiple volumes, all volumes on that disk should be backed up. When a restore is performed using the Symantec Recovery Disk (SRD), the target disk will be encrypted and unintelligible. As such, when a restore operation from the SRD is performed to that disk, all data on that disk is removed as a part of the restore operation. If only one volume on that disk was backed up, then only one volume will be restored to that disk, potentially resulting in data loss if the disk contained more than one volume originally. Unlock Volumes before Backup System and data volumes that are protected with Microsoft BitLocker will need to be unlocked before Backup Exec™ 2014 can protect them. Backup Exec™ 2014 will see the volumes protected by Microsoft BitLocker in unlocked mode in Windows, and resulting backups are also stored in an unencrypted state. For this reason, it is recommended that Backup Exec™ 2014’s own software AES encryption feature be used to encrypt recovery points to ensure data remains securely protected while stored in backup format. Non-bare Metal Recovery Operations (SDR Not Used) Unaffected by Encryption Non-bare metal recovery operations performed by Backup Exec™ 2014, which do not require the use of the recovery disk, are not affected by the presence of Microsoft BitLocker. Because these restore operations are
  • 26. 26 done within the Windows framework, the Microsoft BitLocker solution will be actively running and will be transparent to the restore process. Encryption Must Be Re-applied After Bare Metal, Dissimilar Hardware Recovery After a bare-metal or dissimilar hardware recovery event, disk volumes will need to be re-encrypted. Because the disk volumes are seen as unencrypted by Backup Exec when backups are captured, they are also restored unencrypted. As a result, after a recovery operation volume encryption using BitLocker must be re-applied. Using Backup Exec™ 2014 with Symantec Endpoint Encryption and Third-party Encryption Solutions Using Backup Exec™ 2014 alongside Symantec Endpoint Encryption or other, third-party encryption solutions is not currently supported. Note: For further details on supported disk encryption solutions with Backup Exec™ 2014, please refer to the Backup Exec compatibility lists available here: TECH175581.
  • 27. 27 Licensing Bare Metal and Dissimilar Hardware Restore Features Included The SDR technology within Backup Exec™ 2014 that enables bare metal recovery and dissimilar hardware recovery capabilities is included in the core Backup Exec product license and is not purchased or licensed separately. Any individual server that is licensed for protection by a Backup Exec server, such as a server that is licensed for the Agent for Windows or the Agent for Applications and Databases, is eligible for backup policies enabled for bare metal and dissimilar hardware recovery.
  • 28. 28 Notes and Best Practices Bare Metal Recovery of Deduplicated Backup Sets Bare metal and dissimilar hardware restore operations cannot be performed using deduplicated backups which are stored on a locally attached device. In order to use deduplicated backups for bare metal and dissimilar hardware restore operations, the recovery disk must connect to a Backup Exec server and ‘pull’ the deduplicated backup data from that remote server. A Backup Exec server is necessary in the process in order to ‘rehydrate’ the deduplicated backup data. System Type Affinity Both EFI/UEFI and BIOS system types are supported by Backup Exec™ 2014 for bare metal and dissimilar hardware recovery, as well as their respective GPT and MBR disk and volume types. However, backup sets captured from an EFI/UEFI system can only be restored to an EFI/UEFI system, and backup sets captured from a BIOS system can only be restored to a BIOS system. Bare Metal Recovery Limited to Windows Servers In Backup Exec™ 2014, bare metal and dissimilar hardware restore operations are only supported for Windows servers. Non-Windows platforms are not supported. Note: For a full list of Windows platforms supported for bare metal and dissimilar hardware restore operations, please refer to the Backup Exec compatibility lists available here: TECH175581. Local Recovery Disk Used for Bare Metal Restore In Backup Exec™ 2014, bare metal and dissimilar hardware recovery operations can only be performed using a local recover disk. Remote recovery operations instrumented from a central administration server are not supported. Application Data Restored Separately For servers hosting applications, bare metal and dissimilar hardware recovery operations do not restore application data. Rather, the bare metal and dissimilar hardware restore process recovers the core operating system and data elements of the server, after which the application must be restored separately. Applications can be restored to a server that has recently been recovered using a bare metal or dissimilar hardware restore operation from the Backup Exec console. Note: For instructions on performing an application-level recovery, please refer to the Backup Exec™ 2014 Administrator’s Guide available here: DOC5211. Note: In order for application-level recovery to be available, the original server must be protected using the Agent for Applications and Databases, and the application resource on that server must be protected by at least one backup policy. Migrated Jobs Are Not Enabled for Bare Metal Recovery Jobs migrated from some earlier versions of Backup Exec, such as Backup Exec 2010 and earlier, are not enabled for Simplified Disaster Recovery and are therefore not enabled for bare metal or dissimilar hardware recovery. Administrator Privileges Required
  • 29. 29 Local administrator privileges are required in order to protect a server for bare metal and dissimilar hardware recovery. Recommendation of One Simplified Disaster Recovery Backup per Server For servers protected by multiple backup jobs, it is recommended to only have one of these jobs enabled for Simplified Disaster Recovery. Recovery Disk Network/PXE Boot Because the Backup Exec™ 2014 recovery disk is built upon the Microsoft WinPE operating system, it is possible to create network boot packages of the recovery disk and use these to network-boot servers into the recovery environment. However, this is not a tested feature of Backup Exec™ 2014 and the Backup Exec Technical Support team will not be able to assist or provide support in such scenarios. Symantec does not provide tools or documentation for network-booting the recovery disk. Windows 2012 and Windows 2012 R2 Servers and Domain Controllers Backup Exec™ 2014 fully supports bare metal or dissimilar hardware recovery of Windows 2012 servers or Windows 2012 domain controllers. Backup Exec™ 2014 does not support bare metal or dissimilar hardware recovery of Windows 2012 R2 servers or Windows 2012 R2 domain controllers. Support for this platform of Windows is planned for a future release of Backup Exec.
  • 30. 30 For More Information Link Description http://www.symantec.com/connect/blogs/new-backup-exec-partner-toolkit-v10 Backup Exec Partner Toolkit www.symantec.com/business/backup-exec-for-windows-servers BE Family Landing Page www.symantec.com/business/products/whitepapers.jsp?pcid=pcat_business_cont&pvid=57_1 BE White Papers www.symantec.com/business/products/datasheets.jsp?pcid=2244&pvid=57_1 BE Datasheets, Feature Briefs TECH205797 BE Compatibility Docs www.backupexec.com/configurator BE Product Configurator www.backupexec.com/skugenerator BE SKU Generator and BEST Tool
  • 31. 31
  • 32. 32 About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Symantec helps organizations secure and manage their information-driven world with data backup and recovery software. Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Linux is a registered trademark of Linus Torvalds. Other names may be trademarks of their respective owners. 8/2014