Backup Exec Admin Guide
Backup Exec Admin Guide
Administrator's Guide
Documentation version: Backup Exec 21
Legal Notice
Copyright © 2020 Veritas Technologies LLC. All rights reserved.
Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies
LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their
respective owners.
This product may contain third-party software for which Veritas is required to provide attribution
to the third party (“Third-party Programs”). Some of the Third-party Programs are available
under open source or free software licenses. The License Agreement accompanying the
Software does not alter any rights or obligations you may have under those open source or
free software licenses. Refer to the Third-party Legal Notices document accompanying this
Veritas product or available at:
https://www.veritas.com/about/legal/license-agreements
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Veritas Technologies
LLC and its licensors, if any.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
"Commercial Computer Software and Commercial Computer Software Documentation," as
applicable, and any successor regulations, whether delivered by Veritas as on premises or
hosted services. Any use, modification, reproduction release, performance, display or disclosure
of the Licensed Software and Documentation by the U.S. Government shall be solely in
accordance with the terms of this Agreement.
Veritas Technologies LLC
2625 Augustine Drive.
Santa Clara, CA 95054
http://www.veritas.com
Technical Support
Technical Support maintains support centers globally. Technical Support’s primary
role is to respond to specific queries about product features and functionality. The
Technical Support group also creates content for our online Knowledge Base. The
Technical Support group works collaboratively with the other functional areas within
the company to answer your questions in a timely fashion.
Our support offerings include the following:
■ A range of support options that give you the flexibility to select the right amount
of service for any size organization
■ Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers software upgrades
■ Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■ Premium service offerings that include Account Management Services
For information about our support offerings, you can visit our website at the following
URL:
www.veritas.com/support
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Customer service
Customer service information is available at the following URL:
www.veritas.com/support
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and support contracts
■ Advice about technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact us regarding an existing support agreement, please contact
the support agreement administration team for your region as follows:
Japan [email protected]
Contents
How to prepare for your first backup with Backup Exec ....................... 137
Improving backup performance in Backup Exec ................................ 138
Troubleshooting backup performance ............................................. 141
Required user rights for backup jobs ............................................... 145
About the list of servers on the Backup and Restore tab ..................... 146
Adding servers that you want to back up to the list of servers on the
Backup and Restore tab ......................................................... 147
Contents 9
Removing servers from the list of servers on the Backup and Restore
tab ..................................................................................... 148
Creating a server group ............................................................... 148
Hiding or viewing server groups on the Backup and Restore tab ........... 149
Adding servers to a server group ................................................... 150
Removing servers from a server group ............................................ 150
Editing a server group .................................................................. 151
Moving servers to the Retired Servers server group ........................... 151
Moving retired servers back to the All Servers server group ................. 152
Removing server groups from Backup Exec ..................................... 153
Backing up data ......................................................................... 153
How Backup Exec backs up and restores volumes that are enabled
for deduplication in Windows ............................................. 164
How Backup Exec backs up and restores Microsoft Virtual Hard
Disk (vhd) files ............................................................... 164
About selecting data to back up .................................................... 165
Changing the order in which backup sources are backed up ................ 171
Excluding files from backups ......................................................... 174
Including specific files with a backup job's backup selections ............... 177
About backing up critical system components ................................... 179
Backup Exec Shadow Copy Components file system ......................... 182
Backup methods in Backup Exec ................................................... 183
Configuring backup methods for backup jobs ................................... 191
How Backup Exec determines if a file has been backed up .................. 193
Configuring Backup Exec to automatically delete files after a backup
.......................................................................................... 197
Configuring network options for backup jobs ..................................... 198
Running the next scheduled backup job before its scheduled time
.......................................................................................... 199
Editing backup definitions ............................................................. 200
Testing credentials for backup sources ............................................ 206
Replacing the credentials for a backup source .................................. 207
Creating new credentials for a backup source ................................... 208
Deleting retired or unused backup sources from the Credentials pane
.......................................................................................... 210
How job scheduling works in Backup Exec ....................................... 210
Including a specific date in the schedule for a backup job .................... 212
Preventing backup jobs from running on a specific date ...................... 213
Viewing all scheduled backup jobs on a calendar .............................. 214
Adding a stage to a backup definition .............................................. 214
Editing a stage ........................................................................... 216
Duplicating backup sets or a job history manually .............................. 216
Running a test run job manually ..................................................... 221
Contents 10
Disabling email or text message alert notification for a recipient ............ 300
Editing recipient notification properties ............................................ 301
Deleting recipients ...................................................................... 301
Configuring alert categories .......................................................... 302
Assigning recipients to receive notifications for specific alert categories
.......................................................................................... 304
Sending a notification when a job completes .................................... 304
Notification options for jobs ..................................................... 305
Disabling notifications for a specific alert category ............................. 305
Configuring default alert settings .................................................... 306
Enabling or disabling pop-up alerts ................................................. 307
SNMP traps for Backup Exec alerts ................................................ 308
Installing and configuring the SNMP system service ..................... 310
Installing the Windows Management Instrumentation performance
counter provider ............................................................. 311
Installing the Windows Management Instrumentation provider for
SNMP .......................................................................... 311
Uninstalling the Windows Management Instrumentation
performance counter provider ........................................... 312
Uninstalling the Windows Management Instrumentation provider
for SNMP ...................................................................... 312
Viewing jobs, job histories, backup sets, and active alerts for storage
devices ............................................................................... 470
Cataloging a storage device .......................................................... 470
Scanning a storage device ........................................................... 471
Inventorying a storage device ........................................................ 472
Inventorying and cataloging a storage device ................................... 473
Pausing and unpausing a storage device ......................................... 473
Disabling and enabling a storage device .......................................... 474
Initializing a robotic library ............................................................ 474
Formatting a tape as a WORM tape ................................................ 475
Retensioning a tape .................................................................... 475
Formatting a tape in a tape drive .................................................... 475
Ejecting media from a disk cartridge or tape drive .............................. 476
Cleaning a robotic library drive ...................................................... 477
Importing media to Backup Exec ................................................... 478
Exporting media and expired media ................................................ 485
Locking and unlocking the robotic library’s front portal ........................ 488
Backup Exec server and storage device states ................................. 494
Viewing the disk storage lockdown status ........................................ 497
Configuring file and folder options for backup jobs ............................. 581
Setting default schedule options for rule-based jobs and run now jobs
.......................................................................................... 589
Excluding dates from the backup schedule for all backups .................. 592
Removing dates from the list of excluded dates ................................. 594
Exporting a list of dates that are excluded from all backups to another
server ................................................................................. 595
Changing the default preferences .................................................. 595
Configuring the default setting for backing up multiple servers or
applications ......................................................................... 597
Configuring database maintenance and security ............................... 597
Exporting the Backup Exec Database encryption key ......................... 601
Refreshing Backup Exec Database encryption keys ........................... 603
Configuring encryption for the connection to the Backup Exec Database
.......................................................................................... 604
Scheduling Backup Exec to check logon accounts ............................. 608
Configuring Backup Exec to discover data to back up ......................... 609
Adding discovered servers to the list of servers in Backup Exec ........... 611
Backup networks ........................................................................ 612
Changing network and security options for Backup Exec ..................... 614
Disabling disk storage lockdown .............................................. 619
Using Backup Exec with firewalls ................................................... 620
Backup Exec ports ................................................................ 621
Backup Exec listening ports .................................................... 623
About enabling a SQL instance behind a firewall ......................... 624
Using encryption with Backup Exec ................................................ 624
Encryption key management ......................................................... 627
Creating encryption keys .............................................................. 628
Replacing an encryption key ......................................................... 629
Deleting encryption keys .............................................................. 631
Granular Recovery Technology ...................................................... 632
Setting default Granular Recovery Technology (GRT) options .............. 639
DBA-initiated job templates ........................................................... 640
Creating DBA-initiated job templates ............................................... 641
Editing DBA-inititated job templates ................................................ 642
Deleting DBA-initiated job templates ............................................... 642
Storage options for DBA-initiated jobs ....................................... 643
General options for DBA-initiated jobs ....................................... 647
Network options for DBA-initiated jobs ...................................... 647
Duplicate job settings for DBA-initiated jobs ............................... 648
Configuring settings for Veritas™ Information Map ............................. 652
Backup Exec logon accounts ........................................................ 655
Creating a Backup Exec logon account ..................................... 658
Contents 18
Appendix O Backup Exec Remote Media Agent for Linux ........ 1391
About the Remote Media Agent for Linux ...................................... 1392
How the Remote Media Agent for Linux works ................................ 1393
Requirements for the Remote Media Agent for Linux ........................ 1394
About open files and the Remote Media Agent for Linux .................... 1395
About installing the Remote Media Agent for Linux ........................... 1395
Installing the Remote Media Agent for Linux ............................. 1396
Uninstalling the Remote Media Agent for Linux ............................... 1399
Starting the Remote Media Agent for Linux daemon ......................... 1400
Stopping the Remote Media Agent for Linux daemon ....................... 1400
About establishing trust for a Remote Media Agent for Linux computer
in the Backup Exec list of servers .......................................... 1401
Establishing trust and adding a Remote Media Agent for Linux
computer to the Backup Exec list of servers ........................ 1401
Adding additional Backup Exec servers to which Remote Media Agent
for Linux can publish ............................................................ 1401
Finding simulated tape library files ................................................ 1402
About the Backup Exec operators (beoper) group for the Remote Media
Agent for Linux ................................................................... 1403
Creating the Backup Exec operators (beoper) group manually for
the Remote Media Agent for Linux .................................... 1403
About adding a Linux server as a Remote Media Agent for Linux ....... 1404
Adding a Linux server as a Remote Media Agent for Linux .......... 1404
Remote Media Agent for Linux options .................................... 1405
Changing the port for communications between the Backup Exec server
and the Remote Media Agent for Linux .................................... 1407
Contents 35
About creating storage device pools for devices attached to the Remote
Media Agent for Linux ......................................................... 1407
Editing properties for the Remote Media Agent for Linux .................. 1408
Remote Media Agent for Linux properties ................................. 1408
Deleting a Remote Media Agent for Linux from the Backup Exec list
of servers .......................................................................... 1409
Sharing a Remote Media Agent for Linux between multiple Backup
Exec servers ...................................................................... 1409
About backing up data by using the Remote Media Agent for Linux
........................................................................................ 1410
About restoring data by using the Remote Media Agent for Linux ........ 1410
About the Tape Library Simulator Utility ......................................... 1411
Creating a simulated tape library .................................................. 1412
Simulated Tape Library options .............................................. 1413
Viewing simulated tape libraries properties ..................................... 1413
Simulated tape library properties ............................................ 1414
Deleting a simulated tape library .................................................. 1414
Managing simulated tape libraries from the command line ................. 1415
Command line switches for the Tape Library Simulator Utility ............. 1416
Troubleshooting the Remote Media Agent for Linux ......................... 1417
Backup Exec administrators can set up scheduled backups for Windows and
Linux computers across the network. Backup Exec's flexible calendar-based
administration lets you easily schedule backups for processing during off-peak
hours.
■ Complete system recovery
Backup Exec's Simplified Disaster Recovery takes all of the guesswork out of
recovering an entire system. While configuring a backup, you get a clear
indication that you have selected the data that is necessary to perform a
Simplified Disaster Recovery-enabled backup. After you back up a computer's
critical system components, use the Create Simplified Disaster Recovery
Disk Wizard to create a Simplified Disaster Recovery disk image. You can
then use the disk image to perform a disaster recovery of the computer.
■ Comprehensive monitoring and intuitive mechanisms for everyday tasks
The Job Monitor provides a single location to monitor and manage all of your
backup, restore, installation, and storage operation jobs. The Home tab lets you
view statistics for your entire Backup Exec environment. From the Servers view,
you can monitor the backup status for all of the computers on your network.
Interactive alerts display the situations that require your attention.
Backup results can be viewed from a backup's job history. The job history
contains statistics, errors, and other information pertaining to the backup. Backup
Exec’s catalog is a database of all backed-up data, and Backup Exec uses the
catalog to track restore selections.
Wizards guide you through most Backup Exec operations, including the creation
of backup and restore jobs, and the configuration of storage.
■ Automated data lifecycle management for disk-based and cloud storage
Backup Exec uses data lifecycle management to automatically delete expired
backup sets on disk storage, disk cartridge media, deduplication storage, storage
arrays, cloud storage, and virtual disks. You specify how long to keep backup
data when you create a backup job that is sent to a disk-based storage device.
When the amount of time to keep the backup data expires, the data lifecycle
management feature deletes the backup sets and reclaims the disk space for
use by new backup sets.
See “How data lifecycle management (DLM) deletes expired backup sets on
disk-based storage” on page 335.
■ Simplified device and media management
Backup Exec uses the Advanced Device and Media Management (ADAMM)
feature to manage data retention on tapes. ADAMM expires the backup sets
that are stored on media according to a set of rules that you apply to the media.
Chapter 2
Installation
This chapter includes the following topics:
■ Microsoft SQL Server Express Edition components installed with Backup Exec
■ Installing additional agents and features to the local Backup Exec server
■ Post-installation tasks
■ Uninstalling Backup Exec features from the local Backup Exec server
Note: You cannot install Backup Exec or the Agent for Windows on a volume that
has been enabled for data deduplication in Windows, on an ReFS volume, or on
Cluster Shared Volumes.
When you install Backup Exec, you can input a license in two ways:
Installation 40
About the Backup Exec installation process and licensing options
Item Description
Enter entitlement IDs manually You can enter the entitlement IDs that are
listed on your license certificate. Entitlement
IDs contain one letter and 10 numbers, such
as A0123456789. After you add your
entitlement IDs, enter the Veritas User
Account credentials to connect to the Veritas
Entitlement Management System. Backup
Exec connects to the Veritas Entitlement
Management System and downloads the
license files. An Internet connection is
required to enter entitlement IDs manually.
Note: Licenses from previous versions of
Backup Exec cannot activate the current
version of Backup Exec.
Import licenses from the License File You can import your License Files (.slf) from
a network share or from a local drive.
Install a 60-day trial version A 60-day trial version is available for Backup
Exec. If you do not enter any entitlement IDs
or license files during the installation process,
a trial version is installed.
After Backup Exec has been installed, you can install additional agents and features
if you have valid licenses for them. For more information about how to add agents
and features, refer to the Backup Exec Price and Licensing Guide. You can also
push-install Backup Exec or the Agent for Windows to remote computers.
Installation from a command line is also available. Command line installation is
called silent mode installation. The silent mode installation uses the Setup.exe
program on the Backup Exec installation media.
Installation 41
Backup Exec preinstallation checklist
Backup Exec may install the following additional products during the installation
process:
■ Microsoft Report Viewer 2010 SP1
■ Microsoft.NET Framework 4.8
■ Microsoft Visual C++ 2008 Service Pack 1 Redistributable Package MFC Security
Update
■ Microsoft Visual C++ 2010 Service Pack 1 Redistributable Package MFC Security
Update
■ Microsoft Visual C++ 2012 Redistributable Package
■ Microsoft Visual C++ 2015 Redistributable Package
■ Microsoft SQL Server 2014 Express with SP3
For information about the best practices to install Backup Exec, refer to Backup
Exec Best Practices.
See “Installing Backup Exec by using the Installation Wizard” on page 48.
See “Installing additional agents and features to the local Backup Exec server”
on page 58.
See “Push-installing Backup Exec to remote computers” on page 60.
See “Push-installing the Agent for Windows to remote computers” on page 68.
See “Installing Backup Exec using the command line (silent mode)” on page 89.
See “Backup Exec preinstallation checklist” on page 41.
■ Install the storage device hardware (controller, drives, robotic libraries) on the
Backup Exec server. Refer to the documentation that is included with your
storage device hardware for installation instructions. Use the appropriate
Windows hardware setup functions to configure your controller and storage
devices. Refer to your Microsoft Windows documentation for more information.
You can find a list of compatible types of storage in the Backup Exec Hardware
Compatibility List.
■ Check your Windows security settings to make sure that they work properly with
the Backup Exec service account.
See “Changing the credentials for a service account” on page 667.
■ Ensure that port 50104 is available for use by the Backup Exec Management
Service.
■ If the drive on which you want to install Backup Exec is encrypted or compressed,
and you want to use a default SQL Express database, verify that an unencrypted
and uncompressed drive is available for SQL Express installation
■ Check the computer name of the computer on which you want to install Backup
Exec. It should only use standard ANSI characters. You may receive errors if
you install Backup Exec on a computer with a name that uses non-standard
characters.
■ If you want to install Backup Exec to a non-English version of Windows, download
the Microsoft SQL Server 2014 Express with SP3 setup file for the language
that you want to install from the Microsoft website before you install Backup
Exec if all of the following are true:
■ You want to use a local Backup Exec SQL Express instance.
■ You have non-English SQL Server instances on the computer on which you
want to install Backup Exec.
■ If required components are installed, and if they are compatible with Backup
Exec.
■ If previous versions of Backup Exec and Backup Exec features are installed.
■ If storage device hardware and associated drivers are properly installed and
recognized by the Windows operating system.
■ If the volume that has the deduplication storage does not have more than 12%
free space available.
■ If the deduplication services are not started.
■ If the Windows Hotfix (Windows update) is not installed.
One of the following results is reported for each item:
Result Description
Warning An incompatibility with Backup Exec exists. Some of the issues may
be resolved during the Backup Exec installation. A warning does not
prevent Backup Exec from installing. However, if the issues are not
resolved during installation, jobs may fail.
Failed An incompatibility with Backup Exec exists, and it will cause the
installation to fail. Action is required before you can successfully install
Backup Exec.
Although the Environment Check runs automatically during installation, you may
want to run it manually before installing Backup Exec or before backing up data
with Backup Exec.
To check your environment before installing
1 From the installation media browser (Browser.exe), click Preinstallation, and
then click Backup Exec.
2 Click Next.
Installation 44
Running the Environment Check before installing or upgrading Backup Exec
4 Click Next.
5 If you checked Remote Environment Check in step 3, do one of the following,
and then click Next:
6 Review the results of the Environment Check, and then to save the results,
check Save Results To.
To change the location where the Environment Check results are saved, click
Change Path to browse to a new location.
7 Click Finish.
Installation 45
Microsoft SQL Server Express Edition components installed with Backup Exec
Note: SQL Express can be installed on a server that runs other instances of
SQL Express or full versions of SQL.
■ Select a Microsoft SQL Server 2008 R2 SP2 instance that already exists on the
network on which you want to run Backup Exec.
If you choose to install Backup Exec into an existing SQL Server 2008 R2 SP2
instance, ensure that the instance is installed before you continue with the
installation.
Caution: Backup Exec may not function properly if you install it into an existing
SQL Server instance that uses case-sensitive collation. It is recommended that you
avoid installing Backup Exec to a SQL Server instance that uses case-sensitive
collation.
When Backup Exec is installed into an existing instance, the automated master
database restore feature is not available. To recover the Master database, you
must replace it with the Master database copy that Backup Exec automatically
creates and updates when the Master database is backed up.
When Backup Exec applies updates, the SQL instance is stopped, which may cause
other databases in the same instance to lose connectivity. If a remote SQL instance
is used, ensure that Backup Exec has good network connectivity with the instance
to avoid errors. A default local instance of SQL Express is recommended.
You cannot install multiple Backup Exec Databases on the same SQL Server
instance.
Installation 46
System requirements for Backup Exec
Note: If you are installing a managed Backup Exec server, it is recommended that
you select a local Microsoft SQL Server 2008 R2 SP2 or later instance or later on
which to install the Backup Exec Database for this managed server. Do not select
the same SQL Server instance that is used by the central administration server.
Item Requirements
Operating system You can find a list of compatible operating systems, platforms, and
applications in the Backup Exec Software Compatibility List.
Note: Backup Exec supports the Backup Exec server installation on
64-bit operating systems only.
You cannot install a Backup Exec server on a computer that runs the
Windows Server Core installation option of Windows Server 2008 and
later. You can only install the Backup Exec Agent for Windows on Server
Core computers.
For Windows Server 2012 and later computers, you cannot install
Backup Exec or the Agent for Windows on a volume that has been
enabled for data deduplication in Windows, on an ReFS volume, or on
Cluster Shared Volumes.
Item Requirements
Memory Required: 1GB RAM above the operating system's requirements for
the exclusive use by Backup Exec.
User interface The Backup Exec user interface displays in the format that is configured
language in the Region and Language settings in the Control Panel. You can
change the Backup Exec display language so that you can view user
interface items in a different language.
If Backup Exec does not support a language, the user interface displays
in English. The user interface also displays in English if the menu and
dialog boxes option is set to a language other than the language you
want to display the user interface. If you do not use one of the supported
languages listed in Table 2-4, you must install the English language
pack in Windows.
Item Requirements
Storage Hardware You can use storage media drives, robotic libraries, removable storage
devices, and non-removable hard drives. You can find a list of
compatible types of storage in the Backup Exec Hardware Compatibility
List.
For more information about support for additional drives within a robotic
or virtual tape library, refer to the Backup Exec Price and Licensing
Guide.
Table 2-4 Supported languages for the Backup Exec user interface
Chinese (Simplified) ZH
Chinese (Traditional) CH
English EN
French FR
German DE
Italian IT
Japanese JP
Korean KO
Spanish ES
Russian RU
Portuguese (Brazilian ) PT
See “Installing Backup Exec by using the Installation Wizard” on page 48.
Note: Before you install, make sure that your licenses for the Backup Exec editions
that you want to install are available. You must enter a license in order to install
any edition of Backup Exec, but you can install the trial edition without a license.
6 On the Add Licenses panel, use one of the following methods to add licenses.
To import licenses from the License File Do the following in the order listed:
■ Click Next.
7 If you entered entitlement IDs, do one of the following on the Review Licenses
panel.
To install a licensed version of Backup Exec, perform the following in order:
■ In the Select a Backup Exec edition license to install on the computer
field, select the Backup Exec edition to install.
■ Check the check boxes for the agents or features you want to install.
Installation 51
Installing Backup Exec by using the Installation Wizard
■ Click the drop-down menu, and then select the number of licenses that you
want to install.
To install a trial edition of Backup Exec, in the Select a Backup Exec edition
license to install on the computer field, select Trial. This option is only
available when you have installed a license. If you have not installed a license,
a trial version will automatically be installed when you click Next.
When you are finished on the Review Licenses panel, click Next.
8 On the Service Account panel, provide a user name, password, and domain
for an Administrator account that the Backup Exec system services can use,
and then click Next.
You cannot install Backup Exec with an account that has a blank password on
a supported Windows Server unless Windows is configured to allow it. If you
try to do so, the following error message appears when Backup Exec services
are created: The account name and/or password supplied is not valid.
Re-enter the login information and try again.
You can, however, configure Windows to allow for blank passwords. For more
information, see your Windows documentation.
9 If you want to change the directory where Backup Exec files are installed, click
Change, and then select a new location.
If you change the directory to a new location, ensure that you select a secure
location where you can store sensitive data such as passwords.
If, during Backup Exec installation, the installer detects Backup Exec database
(BEDB) files from an earlier installation, the installer provides you the option
to use either the new database files or the existing database files. If you choose
to use the new database files, the old database files are copied to a different
location.
However, if you choose to use the existing database files, the installer warns
you that the installation might fail if the existing database files are of a different
version than the Backup Exec version you are trying to install.
Click Next.
10 If the SQL Express Setup panel appears, perform the following steps to identify
the location of the SQL Express setup file:
■ Click Browse.
■ Navigate to the location where you downloaded the SQL Express 2008 R2
SP2 setup file.
■ Click OK.
■ Click Next.
Installation 52
Installing Backup Exec by using the Installation Wizard
Note: This panel is displayed only when you upgrade Backup Exec.
13 Select the I have read and understood the information check box, and then
click Next.
14 Review the Backup Exec installation summary, and then click Install.
15 If you installed the Agent for Windows on remote computers, on the Remote
Installation dialog box, click Next.
16 When the installation is complete, you can choose to restart the system, view
the readme, or remove the Backup Exec shortcut from the desktop.
17 Click Next, and then click Finish to exit the wizard.
If you chose to restart the system, the computer will restart automatically.
The installation process creates an installation log named BKUPINST21.htm in the
following directory on the computer where Backup Exec is installed.
For Windows 2008 and later: %programdata%\Veritas\Backup Exec\Logs
See “About the installation log” on page 98.
7 On the Add Licenses panel, use one of the following methods to enter licenses:
Installation 55
Installing Backup Exec by using the Installation Wizard
To import licenses from the License File Do the following in the order listed:
8 If you entered entitlement IDs, do one of the following on the Review Licenses
panel:
To install a licensed version of Backup Exec, perform the following in order:
■ In the Select a Backup Exec edition license to install on the computer
field, select the Backup Exec edition to install.
■ Check the check boxes for the agents or features you want to install.
■ Click the drop-down menu, and then select the number of licenses that you
want to install.
■ If you do not make a selection, Backup Exec will select the license with the
largest feature set by default.
To install a trial version of Backup Exec, select Trial in the Select a Backup
Exec edition license to install on the computer field. This option is only
available when you have installed a license. If you have not installed a license,
a trial version will automatically be installed when you click Next.
The Review Licenses panel also allows you to view and customize the capacity
for each entitlement ID.
Installation 56
Installing Backup Exec by using the Installation Wizard
When you are finished on the Review Licenses panel, click Next.
9 On the Configure Features panel, the Select features to install panel displays
all of the features and agents included with the licenses for which you entered
entitlement IDs. Select the check box next to any feature or agent that you
want to install. You can deselect agents and features to prevent them from
being installed now. Features and agents are organized by edition, based on
the licenses that you have entered. Note that a Trial Edition will display features
for Backup Exec Bronze, Silver, and Gold editions on this screen.
Agents and features for which you have not entered a license will be displayed,
but will be unavailable. If you install a trial license, then install a license with
fewer agents or features than are included with the trial, those agents and
features will be removed.
When you are finished configuring agents and features, click Next.
10 If you want to install Backup Exec for any additional languages, select the
language on the Choose Languages panel, and then click Next.
11 On the Destination panel, review the disk space requirements for the items
that you selected to install. If you want to change the directory where the Backup
Exec files are installed, click Change, and then select a new directory or create
a new folder. It is recommended that you do not select a mount point as the
destination directory because if you delete the mount point, Backup Exec will
be uninstalled.
If the installer detects Backup Exec database (BEDB) files from an earlier
installation, the installer provides you the option to use either the new database
files or the existing database files. If you choose to use the new database files,
the old database files are copied to a different location.
However, if you choose to use the existing database files, the installer warns
you that the installation might fail if the existing database files are of a different
version than the Backup Exec version you are trying to install.
Click Next when you are finished reviewing the destination information.
Installation 57
Installing Backup Exec by using the Installation Wizard
12 On the Service Account panel, provide a user name, password, and domain
for an Administrator account that the Backup Exec system services can use,
and then click Next.
You cannot install Backup Exec with an account that has a blank password on
a supported Windows Server unless Windows is configured to allow it. If you
try to do so, the following error message appears when Backup Exec services
are created:
The account name and/or password supplied is not valid. Re-enter
the login information and try again.
You can, however, configure Windows to allow for blank passwords. For more
information, see your Windows documentation.
13 On the Choose SQL Server panel, do one of the following to select a location
to store the Backup Exec Database.
Note: The Choose SQL Server panel does not appear for upgrades. You
cannot change the database location during the upgrade process. If you want
to change the database location after the upgrade, use BE Utility.
To create a local Backup Exec SQL Express instance, do the following in the
order listed:
■ Click Create a local Backup Exec SQL Express instance to store the
Backup Exec database.
■ To change the location of the Backup Exec SQL Express instance, click
Browse.
■ Select the location, and then click OK.
To use an existing SQL Server 2008 R2 SP2 instance, do the following in the
order listed:
■ Click Use an existing instance of SQL Server 2008 R2 with Service
Pack 2 or a later SQL Server version.
■ Select the instance.
■ Note that when Backup Exec is installed into an existing instance, the
automated Master database restore feature is not available. To recover the
Master database, replace it with the Master database copy that Backup
Exec automatically creates and updates when the Master database is
backed up. For more information, See “Microsoft SQL Server Express
Edition components installed with Backup Exec” on page 45.
Click Next when you are finished.
Installation 58
Installing additional agents and features to the local Backup Exec server
16 If you are prompted, select how the Device Driver Installer should install
device drivers for the tape storage devices that are connected to the server,
and then click Next.
It is recommended that you select Use device drivers for all tape devices.
17 If you are prompted, enter information or choose settings for the additional
features that you want to install, and then click Next after each selection.
18 Review the Backup Exec installation summary, and then click Install.
The installation process takes several minutes to complete. During the process,
the progress bar may not move for several minutes.
19 When the installation is complete, you can choose to restart the system, view
the readme, or remove the Backup Exec shortcut from the desktop.
20 Click Next, and then click Finish to exit the wizard.
If you chose to restart the system, the computer will restart automatically.
Note: If the Central Admin Server feature is installed, and you want to install
additional features on a managed Backup Exec server, you can pause the managed
Backup Exec server. When a managed Backup Exec server is paused, the
administration server does not delegate jobs to it. When the installation is complete,
un-pause, or resume, the managed Backup Exec server.
To install a trial version Do not type a serial number or import a license file. Go
to step 5.
Installation 60
Push-installing Backup Exec to remote computers
6 Click Next.
7 If you are prompted, enter information or choose settings for the additional
features that you want to install. Click Next after each selection.
8 Review the Backup Exec installation summary, and then click Install.
The Backup Exec services are stopped while the additional features are
installed. If any active jobs are running, you are prompted to stop them, or to
wait for the jobs to finish.
When the installation is complete, the services are restarted.
9 Click Finish.
Note: Backup Exec installs the required version of Microsoft .NET Framework if it
is not already installed on the computer where you want to push-install Backup
Exec. The Backup Exec installation program uses the Microsoft .NET Framework
version 4.8. However, not all versions of Windows support .NET Framework 4.8. If
the Backup Exec installation program encounters an operating system that requires
the use of a different version of the .NET Framework, Backup Exec blocks the
installation and provides an error message that instructs you to install the required
version of .NET Framework.
Before you install Backup Exec to remote computers, you should review the special
considerations.
Item Consideration
Note: You can also use Microsoft’s Add or Remove Programs utility to install Backup
Exec to a remote computer. See your Microsoft documentation for more information.
Installation 62
Push-installing Backup Exec to remote computers
To push-install Backup Exec to remote Do the following steps in the order listed:
computers from the installation media
■ From the installation media browser,
click Install Products, and then click
Backup Exec.
■ On the Welcome panel, click Next.
■ Select I accept the terms of the
license agreement, and the click Next.
■ Select Custom installation.
■ Uncheck Local Installation, and then
check Remote Installation.
■ Click Next.
To push-install Backup Exec to remote Click the Backup Exec button, select
computers from the Backup Exec server Installation and Licensing, and then
select Install Agents and Backup Exec
Servers on Other Servers.
To install Backup Exec on one remote Do the following in the order listed:
computer
■ Click Add.
■ Select Add a Single Computer.
■ Select Backup Exec, and then click
Next.
■ Type the fully qualified name of the
remote computer or click Browse
Remote Computers to locate the
remote computer.
Installation 63
Push-installing Backup Exec to remote computers
3 Under Remote computer credentials, type the credentials that Backup Exec
can use to connect to the remote servers.
You must use Administrator credentials.
4 Click Next.
5 Select one of the following methods to enter licenses:
To install a trial Do not type a serial number or import a license file. Go to step 8.
version
7 Click Next.
8 On the Configure Features panel, select any additional features that you want
to install.
For example, you can select additional standard features, or you can select
the agents or the features that are available for a trial installation.
Note: When push installing Backup Exec from one server to another, the feature
mapping in the Configure Feature Window will display the server from which
the push install is being initiated, not the server to which the product is being
push installed.
9 In the Destination Folder field, enter the location where you want to install
Backup Exec.
Installation 65
Push-installing Backup Exec to remote computers
10 Click Next.
11 Complete the service account credentials options as follows:
User Name Type the user name for an Administrator account that the Backup
Exec services can use.
Password Type the password for an administrator account that the Backup
Exec services can use.
12 Click Next.
13 Do one of the following to select a location on which to store the Backup Exec
Database, and then click Next.
Note: You do not need to install tape device drivers if Backup Exec runs on
Windows Server 2012 and later. Kernel-mode drivers and tapeinst.exe are no
longer installed if Backup Exec runs on Windows Server 2012 and later.
See “Installing tape device drivers ” on page 382.
16 Click Next.
17 If you are prompted, enter information or choose settings for additional features
that are being installed, and then click Next or OK after each selection.
18 After Backup Exec validates the remote computers, you can change the list in
any of the following ways:
To manually add one remote computer Click Add, and then click Add a Single
Computer.
To manually add multiple remote Click Add, and then click Add Multiple
computers Computers with the Same Settings.
Installation 67
Push-installing Backup Exec to remote computers
To add multiple remote computers by Click Import and Export, and then select
importing an existing list of computers one of the following options:
To change the product that you selected Select the remote computer that you want
to install or to change other properties you to change, and then click Edit.
selected for this installation
To delete a remote computer from the list Select the remote computer that you want
to delete, and then click Delete.
To save this list of remote computers and Verify that Save the server list for future
the associated remote computer logon remote install sessions is checked.
credentials
This option enables the names and the
credentials of all of the remote computers
to be added automatically the next time
you install Backup Exec or features to
these remote computers.
To save the list of remote computers to an Click Import and Export, and then click
XML file Export to File.
To fix the errors that were located during Right-click the name of the computer, and
the validation then click Fix Error.
To enable Backup Exec to attempt to Right-click the name of the computer, and
re-validate an invalid remote computer then click Retry Validation.
19 After all of the computers in the list are validated and the list is complete, click
Next.
Installation 68
Methods for installing the Agent for Windows
20 Review the Backup Exec installation summary, and then click Install.
See “About the installation log” on page 98.
21 Click Next, and then click Finish to exit the wizard.
If you did not restart the remote computer, you may need to do it now in order
for the configuration to take effect.
Table 2-6 Special considerations for installing the Agent for Windows
Item Consideration
Server core option of Windows Server Backup Exec installs a command-line version
2008/2012 and later of the Agent for Windows on the computers
that run the Server Core installation option of
Windows Server 2008/2012 and later. The
Backup Exec Agent Utility command-line
applet is installed with the Agent for Windows.
This applet lets you monitor Backup Exec
operations on the remote computer.
Windows data deduplication, ReFS volumes, You cannot install the Agent for Windows on
and Cluster Shared Volumes a volume that has been enabled for data
deduplication in Windows, on an ReFS
volume, or on Cluster Shared Volumes.
Installation 70
Methods for installing the Agent for Windows
Table 2-6 Special considerations for installing the Agent for Windows
(continued)
Item Consideration
Trust the Backup Exec server and remote When you connect to a remote computer from
computer the Backup Exec server, you must establish
a trust between the Backup Exec server and
the remote computer to ensure secure
communication. To establish the trust, you
must add the remote computer to the list of
servers on the Backup and Restore tab.
If there are problems installing the Agent for Windows using this method, you can
try to manually install the Agent for Windows.
See “Using a command prompt to install the Agent for Windows on a remote
computer” on page 79.
To push-install the Agent for Windows to remote computers
1 Do one of the following:
To push-install the Agent for Windows to Do the following steps in the order listed:
remote computers from the installation
■ From the installation media browser,
media
click Installation, and then click
Backup Exec.
■ On the Welcome panel, select I accept
the terms of the license agreement,
and the click Next.
■ Click Custom installation.
■ Uncheck Local Installation, and then
check Remote Installation.
■ Click Next.
To push-install the Agent for Windows to Click the Backup Exec button, select
remote computers from the Backup Exec Installation and Licensing, and then
server select Install Agents and Backup Exec
Servers on Other Servers.
To install the Agent for Windows on one Do the following steps in the order listed:
remote computer
■ On the Remote Computers panel, click
Add.
■ Select Add a Single Computer.
■ Select Agent for Windows, and then
click Next.
■ Type the fully qualified name of the
remote computer or click Browse
Remote Computers to locate the
remote computer.
Installation 72
Methods for installing the Agent for Windows
To install the Agent for Windows on Do the following steps in the order listed:
multiple computers using the same settings
■ On the Remote Computers panel, click
Add.
■ Select Add Multiple Computers with
the Same Settings.
■ Select Agent for Windows, and then
click Next.
■ Type the fully qualified name of the
remote computer or click Browse to
locate the remote computer.
■ Click Add to List.
Type the fully qualified name and then
click Add to List for all of the remote
computers for which you want to push
install the features.
3 Under Remote computer credentials, type the credentials that Backup Exec
can use to connect to the remote servers.
You must use Administrator credentials.
4 Click Next.
5 In the Destination Folder field, enter the path where you want to install the
files.
6 Click Next.
7 After Backup Exec validates the remote computers, you can change the list in
any of the following ways:
To manually add one remote computer Click Add, and then click Add a Single
Computer.
To manually add multiple remote Click Add, and then click Add Multiple
computers Computers with the Same Settings.
Installation 73
Methods for installing the Agent for Windows
To add multiple remote computers by Click Import and Export, and then select
importing an existing list of computers one of the following options:
To change the product that you selected Select the remote computer that you want
to install or to change other properties you to change, and then click Edit.
selected for this installation
To delete a remote computer from the list Select the remote computer that you want
to delete, and then click Delete.
To save this list of remote computers and Verify that Save the server list for future
the associated remote computer logon remote install sessions is checked.
credentials
This option enables the names of all of the
remote computers and their credentials to
be added automatically the next time you
want to install Backup Exec or features to
these remote computers
To save the list of remote computers to an Click Import and Export, and then click
XML file Export to File.
To fix the errors that were located during Right-click the name of the computer, and
the validation then click Fix Errors.
To enable Backup Exec to attempt to Right-click the name of the computer, and
re-validate an invalid remote computer then click Retry Validation.
8 After all of the computers in the list are validated and the list is complete, click
Next.
Installation 74
Methods for installing the Agent for Windows
9 Review the Backup Exec installation summary, and then click Install.
See “About the installation log” on page 98.
10 Click Next, and then click Finish to exit the wizard.
If you did not restart the remote computer, you may need to do it now in order
for the configuration to take effect.
3 On the Install Updates dialog box, select the option for when you want to
install the updates.
Keep the job scheduled for x hours Specify the maximum amount of time after
before it is rescheduled the scheduled start time at which you want
Backup Exec to consider the job to be
missed and reschedule it.
Cancel the job if it is still running x Specify the amount of time after the job's
hours after its scheduled start time scheduled start time at which you want
Backup Exec to cancel the job if it is still
running.
Run now with no recurring schedule Select this option to run the job
immediately without scheduling any more
instances of it for the future.
Restart the computer automatically after Select this option to enable Backup Exec
installing the updates to the Backup to automatically restart the remote
Exec Agent for Windows when a restart computer, if required.
is required
4 Click OK.
Note: Review your organization’s deployment plans before you implement a rollout
of the Backup Exec Agent for Windows to client computers. You should also review
your Group Policy Desktop Management and Active Directory documentation.
Table 2-7 How to install the Agent for Windows in an Active Directory
Network
Action Description
Create a transform for the Agent for Windows. A transform contains the changes that you
want to make to the Windows Installer
See the section called “Creating a transform”
package for the Agent for Windows when a
on page 77.
computer starts, such as the installation path.
Requirements to create a transform are as
follows:
Table 2-7 How to install the Agent for Windows in an Active Directory
Network (continued)
Action Description
Create a distribution point (share) that You must copy the transform that you create,
contains the source file of the Agent for and the Backup Exec RAWS32 or RAWSX64
Windows that you want to install. directory, to the distribution point.
Configure a Group Policy Object to assign The software is installed automatically when
the transform and the RAWS32 or RAWSX64 the computers in the Organizational Unit are
directory in the distribution point to computers started.
in an Active Directory Organizational Unit.
Creating a transform
To create a transform
1 Do one of the following:
■ From the Backup Exec installation media browser, click Install Products,
and then click Agent for Windows.
■ From a Backup Exec server on which Backup Exec is installed, go to
<Backup Exec install path>\Backup Exec\Agents\RAWS32 or RAWSX64
and double-click Setup.exe.
Step Description
■ RAWS32 or RAWSX64
■ MSXML
■ VCRedist
■ DotNetFx
4 On the File Open dialog box, browse to the software distribution point by using
the Universal Naming Convention (UNC) name, for example, \\server
name\share name, select the package file, and then click Open.
5 Select the package file Veritas Backup Exec Agent for Windows.msi, and
then click Open.
6 When you are prompted, apply the Advanced Option.
7 After Active Directory checks the MSI package, on the General Properties
tab, make sure that the correct versions of the features are being installed.
8 On the Deployment tab, set up the configuration for your environment.
Make sure the option Make this 32-bit x86 application available to WIN64
machines is not selected.
If you want the Agent for Windows to be uninstalled if the computer is removed
from the Organization Unit, select the option Uninstall this application when
it falls out of the scope of management.
9 On the Modifications tab, click Add, browse to the share, and select the
transform that you created.
10 Select Open, and make any other changes that are necessary, and then click
OK.
11 Close all of the dialog boxes.
When a computer in the Organizational Unit that you specified is started, the
transform is processed and the features that you specified are installed.
12 View the installation log that is created on the destination computers to verify
the installation of the Agent for Windows.
2 Open a command prompt and type the drive letter that you mapped in step 1
and the following path:
To install the Agent for Windows to a 32-bit Run the following command:
computer without publishing enabled
setup.exe /RANT32: /S:
/DISADVRT:
To install the Agent for Windows to a 32-bit Run the following command:
computer with publishing enabled
setup.exe /RANT32: /S: /ADVRT:
Backup Exec server name 1 Backup
Exec server name 2
To install the Agent for Windows to a 32-bit Run the following command:
computer and restart the computer
setup.exe/RANT32: /S: /BOOT:
automatically
To install the Agent for Windows to a 64-bit Run the following command:
computer without publishing enabled
setup.exe /RAWSX64: /S:
/DISADVRT:
To install the Agent for Windows to a 64-bit Run the following command:
computer with publishing enabled
setup.exe /RAWSX64: /S: /ADVRT:
Backup Exec server name 1 Backup
Exec server name 2
To install the Agent for Windows to a 64-bit Run the following command:
computer and restart the computer
setup.exe /RAWSX64 /S: /BOOT:
automatically
The Agent for Windows is installed on the remote computer in the following
directory:
To use a command prompt to uninstall the Agent for Windows from a remote
computer
1 At the remote computer, map a drive letter to the Agent for Windows directory
using the following path:
2 Open a command prompt, and then type the drive letter that you mapped in
step 1.
3 Run the following command:
To uninstall the Agent for Windows from a setup.exe /RANT32: /S: /U:
32-bit computer:
The /S: parameter is used to run the
operation in silent mode, without the benefit
of a user interface. The /U: parameter
specifies an uninstall operation.
To uninstall the Agent for Windows from a setup.exe /RAWSX64: /S: /U:
64-bit computer:
See “Using a command prompt to install the Agent for Windows on a remote
computer” on page 79.
To uninstall the Agent for Windows from a In the RAWS32 directory, double-click
32-bit computer Uninstallaaofo.
To uninstall the Agent for Windows from a In the RAWSX64 directory, double-click
64-bit computer Uninstallaaofox64.
Note: Backup Exec does not support the Remote Administrator on 32-bit operating
systems.
You cannot use the Remote Administrator to administer the servers that have
different versions of Backup Exec installed. However, you can use side-by-side
installations of the Remote Administrator to manage different versions of Backup
Exec.
9 Click Next.
10 Review the Backup Exec installation summary, and then click Install.
11 Click Next, and then click Finish to exit the wizard.
See “Running the Remote Administrator” on page 87.
Installation 85
Installing the Remote Administrator
Note: Backup Exec does not support the Remote Administrator on 32-bit operating
systems.
You cannot use the Remote Administrator to administer the servers that have
different versions of Backup Exec installed. However, you can use side-by-side
installations of the Remote Administrator to manage different versions of Backup
Exec.
The command line switches used for silent mode installation of the Remote
Administrator are described in the following table.
Remember the following general rules for using these switches:
■ Substitute values appropriate for your environment for values in italics; for
example, substitute your password for password.
■ Enclose the value in quotation marks if it contains spaces, such as "<Backup
Exec install path>\Backup Exec".
Table 2-9 Command line switches for Remote Administrator silent mode
installation
Table 2-9 Command line switches for Remote Administrator silent mode
installation (continued)
See “Installing Backup Exec using the command line (silent mode)” on page 89.
Installation 87
Installing the Remote Administrator
Note: Backup Exec does not support the Remote Administrator on 32-bit operating
systems. You cannot use the Remote Administrator to administer the servers that
have different versions of Backup Exec installed. However, you can use side-by-side
installations of the Remote Administrator to manage different versions of Backup
Exec.
Connect with the logged on user's Select this check box to connect to the
credentials (also applicable for smart Remote Administration Console using the
card users) logged on Windows user's credentials.
This authentication can also be used if you
log on to Windows using different forms of
authentication, such as smart cards.
The status of the local services appears at the bottom of this dialog box. If you
try to connect to a server and the connection fails, this dialog box displays the
services status for the server you attempted to connect to.
4 Click OK.
If you have used the Lock Console feature to lock the Backup Exec console you
need to enter credentials to connect to the Backup Exec server.
See “Locking and unlocking the Backup Exec Console” on page 118.
See “Command line switches for silent mode installation of Backup Exec”
on page 90.
If you use the command line switches without the /S: switch, the Backup Exec
installation program launches with the command line parameters as defaults
for the installation options. For example, if /S: had been left in the above
example, the Backup Exec installation program launches with the user name,
domain, password, and license appearing on the installation dialog boxes.
5 Press Enter.
Table 2-10 Command line switches for silent mode installation of Backup
Exec
Table 2-10 Command line switches for silent mode installation of Backup
Exec (continued)
Table 2-10 Command line switches for silent mode installation of Backup
Exec (continued)
■ EN installs English.
■ DE installs German.
■ ES installs Spanish.
■ FR installs French.
■ IT installs Italian.
■ PT installs Portuguese.
■ RU installs Russian.
■ JP installs Japanese.
■ KO installs Korean.
■ ZH installs Simplified Chinese.
■ CH installs Traditional Chinese.
/BELANG:"EN DE ES"
Table 2-10 Command line switches for silent mode installation of Backup
Exec (continued)
/SLF:C:\path\slf1.slf
/SLF:C:\path\slf1.slf,C:\path\ slf2.slf,
C:\path\ slf3.slf
Note: If you install a license for an
feature or agent, you must also type a
switch that specifies the feature or
agent. The switches that specify an
feature or agent are included in this
table.
Table 2-10 Command line switches for silent mode installation of Backup
Exec (continued)
Table 2-10 Command line switches for silent mode installation of Backup
Exec (continued)
/ADVRT:Backup Exec server name Installs the Agent for Windows and
enables publishing.
Table 2-10 Command line switches for silent mode installation of Backup
Exec (continued)
■ /CASO:
Installs the Central Admin Server
feature.
■ /ADBO:
Installs the Advanced Disk-based
Backup feature.
Table 2-10 Command line switches for silent mode installation of Backup
Exec (continued)
The Backup Exec installation program is launched. The screens that let you enter
the logon credentials and the license will appear with the information you provided
on the command line.
You can also use the /CPF: command to create a parameter file that contains all
of the command line options you provided. This parameter file can then be used to
provide the options for installing either Backup Exec or the Remote Administrator.
Note that the file is not encrypted, which exposes parameters such as the password.
To create installation parameter files
1 Open a Windows command prompt.
2 Change to the drive containing the Backup Exec installation media.
Installation 98
About the installation log
4 Type setup /TS: and the appropriate switches, including /CPF: and the full
path name of the parameter file. For example, type:
setup /TS: /USER:user /DOM:domain /PASS:password /SLF:"C:\path
name\slf1.slf" /CPF:"A:\file name" /S:
Backup Exec will be installed on your server and a parameter file containing
the user name, domain, password, and license will be saved to a removable
device. You can use this parameter file to install to another computer.
To use installation parameter files
1 Open a Windows command prompt.
2 Change to the drive containing the Backup Exec installation media.
3 Change to the following directory:
BE\WINNT\INSTALL\Bex64
Note: The ProgramData folder is a hidden folder. If you do not see the ProgramData
folder, refer to the Microsoft Windows documentation for instructions on how to
display hidden folders.
To view the Installation Summary Report from Click the Backup Exec button, select
the Administration Console Installation and Licensing, and then select
Installation Summary Report.
To view the Installation Summary Report from On the Home tab, in the Installation and
the Home tab Upgrades group, click Installation
Summary Report.
Any changes that are made to Backup Exec program files and registry keys are
reset to the original settings.
To repair Backup Exec
1 Close the Backup Exec application.
2 From the Windows Control Panel, select the option to uninstall a program.
3 Select Backup Exec, and then click Change.
4 Select Local installation and Repair, and then click Next.
Ensure that the Remote installation option is not selected.
5 If you are prompted to enter credentials for the Backup Exec service account,
type the correct credentials, and then click Next.
6 Select Install.
You may be prompted to insert the installation media.
7 Click Finish.
■ To view updates which have been installed on the local RAC server, navigate
to the Windows “Programs and Features” control panel.
■ If you change the Veritas Update settings while using the Remote Administration
Console, those settings will be changed on the remote server.
For information about the best practices to use Veritas Update, refer to the Backup
Exec Best Practices.
Note: During the installation and update process, the Backup Exec services are
stopped and started one time during a Veritas Update session, regardless of the
number of updates that are being installed. All selected patches are installed in
order.
4 Enter a new time in the At: field to set the time of day at which Veritas Update
will run. By default, this field is set to 10:00 PM.
5 Select one of the following options to determine what Veritas Update should
do when it detects available updates:
■ If you select Send an alert notification when updates are available, but
do not download or install the update, Veritas Update will send you an
alert when it detects available updates, but will not download or install them.
■ If you select Download updates first, and then send an alert notification,
Veritas Update will download any available updates, then send you an alert
notifying you that updates are ready to be installed.
6 Click OK to close the settings window, or Click here to run Veritas Update
to launch Veritas Update.
Item Description
Check for updates Lets you schedule automatic updates, and then choose the
automatically according to frequency of the updates.
a schedule
Daily Enables Backup Exec to check for new updates every day.
In the At field, enter the time to check for new updates.
Weekly Enables Backup Exec to check for new updates once a week.
In the Every field, select the day of the week on which to
check for updates. In the At field, enter the time to check for
new updates.
Interval Lets you set the date and time that you want Backup Exec
to check for new updates.
Download and install all Enables Backup Exec to download and install all updates
available updates that are available without prompting you first.
automatically
Send an alert when updates Enables Backup Exec to alert you when updates are
are available; do not available. Updates are not downloaded or installed. This
download or install updates option is the default.
Item Description
Installed Updates Lists the hot fixes and the service packs that
are installed on the Backup Exec server.
Click here to run Veritas Update Lets you run Veritas Update to install hot fixes
and service packs.
Click here to view available updates Lets you view the hot fixes and service packs
that are available for download.
Note: You cannot use the Remote Administrator on a remote Windows server or
workstation to update license contracts.
Get an updated license file. Update your current entitlements with a new
date and a new service contract number.
Launch the installation wizard from the Use the option Install Features and
Backup Exec Administration Console. Licenses on this Backup Exec Server on
the Installation and Licensing menu, which
is accessed from the Backup Exec button.
Use the installation wizard to add the new After you select the expired entitlement IDs
entitlement IDs, and then remove the expired from the list, use the Remove option.
entitlement IDs.
3 Click Close.
Installation 107
About upgrading to Backup Exec
Note: Backup Exec supports the Backup Exec server installation on 64-bit operating
systems only. However, you can install the Agent for Windows on 32-bit operating
systems.
Most settings, all catalogs, and all data directories from previous versions of Backup
Exec are kept, unless you choose to remove them. This version of Backup Exec
can read and restore data from any previous version of Backup Exec or Backup
Exec for NetWare, except where end-of-life decisions have been made.
When you upgrade from previous versions, Backup Exec automatically converts
your existing definitions, configurations, and jobs to the current version and some
of your jobs may be combined or moved. After the migration completes, Backup
Exec displays the Migration Report that you must review and acknowledge before
Backup Exec continues the upgrade process. In this report, you can see how your
jobs were migrated.
See “Using the Migration Report to determine how existing jobs changed after an
upgrade from a previous version of Backup Exec” on page 110.
Backup Exec provides backward compatibility as follows:
■ Backup Exec can communicate with Backup Exec 2014 Remote Agent for
Windows Systems and later.
■ Backup Exec supports side-by-side installations of the Remote Administration
Console for Backup Exec 15 and later. For example, you can have a Remote
Administration Console for Backup Exec 15, Backup Exec 16, and the current
version.
The version of the Backup Exec server being remotely administered must be
same as the version of the Remote Administration Console. For example, for a
Backup Exec 16 server, the Remote Administration Console version must be
16 or its Feature Pack versions.
■ Backup Exec Central Admin Server feature server can communicate with Backup
Exec 16 Feature Pack 2 for the purpose of rolling upgrades.
Before you upgrade Backup Exec, do the following:
Installation 108
About upgrading to Backup Exec
■ Delete the job histories and the catalogs that you no longer need to shorten the
upgrade window.
■ Run a database maintenance job.
■ Verify that all available updates are installed for your current version of Backup
Exec.
■ Locate your license information and verify that your licenses are current. You
must enter license information for Backup Exec when you upgrade.
When you upgrade, on the Add Licenses panel, the existing licenses are listed.
You can also add new entitlement IDs. Click Next and enter the credentials of
the Veritas User Account that has permissions to the entitlements. Backup Exec
automatically downloads the new license files from the Veritas Entitlement
Management System. If you already have the license file, use the Import
License File button to import the license files.
You cannot change the configuration of your Backup Exec servers or the database
location during the upgrade process. For example, you cannot change an
administration server to a managed server. If you want to change the configuration
of your Backup Exec servers, do it either before or after you upgrade to the current
version. If you want to change the database location after the upgrade, use BEUtility.
Note: If you upgrade from a previous version of Backup Exec that uses a
non-English version of Windows, you must download the SQL Server 2014 Express
with SP3 setup file for that language from the Microsoft website.
See “Installing Backup Exec by using the Installation Wizard” on page 48.
remote agents immediately. This setting allows Backup Exec to continue using
TLS 1.0 when communicating with older remote agents, so that backups and
restore for these agents work. If you do not select this check box, jobs for the
servers fail until you upgrade the remote agents.
■ Scenario 2: If you are installing a patch for the Backup Exec when you have a
remote agent with a version earlier than Backup Exec 15 FP1:
When you are installing a patch for the Backup Exec, a dialog box is displayed.
Click No, if you cannot upgrade the remote agents immediately. Backup Exec
continues to use TLS 1.0 for communicating with older remote agents so that
backups and restore continue to work. Click Yes to use TLS 1.2. Jobs for the
servers fail until you upgrade the remote agents.
In both upgrade and patch install scenarios, if you do not fallback to TLS 1.0
communicating with older remote agents, the backup and restore jobs will fail until
the remote agents are upgraded.
During the patch or upgrade installation, the following registry value is set to 1 if
you allow fallback to TLS 1.0.
Registry location: HKEY_LOCAL_MACHINE\SOFTWARE\Veritas\Backup Exec For
Windows\Backup Exec\Engine\Backup
ValueName: AllowTLSFallback
After upgrading the Backup Exec remote agents, you can change the registry value
to always use TLS 1.2.
To use TLS 1.2, change the ValueName: AllowTLSFallback to 0.
If you continue to use TLS 1.0, the Backup Exec media server displays an alert
message every week. If you do not want Backup Exec to display the alert message,
upgrade the older agents to the latest version of Backup Exec. You can also disable
the alert message by editing the following registry key:
Registry Location: HKEY_LOCAL_MACHINE\Software\Veritas\Backup Exec For
Windows\Backup Exec\Server
ValueName = SupressTLSAlert
When you set the value as 1, the weekly alerts are disabled.
■ Ensure that your backups are up to date. It is recommended that you always
run full backups before and after you upgrade the applications or operating
systems on any backup sources.
■ Disable your antivirus software.
■ Check the Backup Exec Software Compatibility List (SCL) and the Hardware
Compatibility List (HCL) to verify that the applications that you want to back up
and your storage devices are supported with this version of Backup Exec.
■ Download all available upgrades and hot fixes for the version of Backup Exec
that you want to install.
■ Plan to perform the upgrade when system downtime won't affect users.
■ Ensure that your entitlement IDs or License Files are available. You must enter
new Backup Exec license information during the upgrade.
For details on updated licensing, see the Backup Exec Licensing Guide
■ Review the following topics in the Backup Exec Administrator's Guide:
■ System requirements for Backup Exec
See “System requirements for Backup Exec” on page 46.
■ How data lifecycle management (DLM) deletes expired backup sets on
disk-based storage
See “How data lifecycle management (DLM) deletes expired backup sets
on disk-based storage” on page 335.
■ About upgrading from previous versions of Backup Exec
See “About upgrading to Backup Exec” on page 107.
■ Review the document Best practices for installing Backup Exec on the Backup
Exec knowledge base.
Note: To view the Migration Report, JavaScript must be enabled in your web
browser. If the server on which you installed Backup Exec does not have a browser
with JavaScript enabled, you can copy the Migration Report to another server that
has JavaScript enabled.
To view the Migration Report from the Click the Backup Exec button, select
Administration Console Installation and Licensing, and then
select Migration Report.
To view the Migration Report from the On the Home tab, in the Installation and
Home tab Upgrades group, click Migration Report.
Post-installation tasks
For best results, do the following after installing Backup Exec:
■ Create disk storage so that Backup Exec can automatically manage the lifecycle
of your backup data.
See “Configuring disk storage” on page 317.
■ Make sure that your storage devices are connected and configured properly.
■ Decide what types of storage devices you want to use for your backup jobs.
You can configure storage devices when you prepare your Backup Exec
environment.
■ Understand how Backup Exec provides overwrite protection for your tape media.
See “Media overwrite protection levels for tape media” on page 416.
■ Understand the default media set for tape media and its four-week overwrite
protection period.
See “Default media sets” on page 402.
■ Understand Data Lifecycle Management.
Installation 112
Uninstalling Backup Exec
See “How data lifecycle management (DLM) deletes expired backup sets on
disk-based storage” on page 335.
■ Learn about creating new media sets with different retention periods.
See “Creating media sets for tapes” on page 410.
■ Decide which credentials you want your Backup Exec logon account to use
when browsing and making backup selections. You can use an existing Backup
Exec logon account, or create a new one.
See “Backup Exec logon accounts” on page 655.
■ Configure a secure connection to the Backup Exec Database
See “Configuring encryption for the connection to the Backup Exec Database”
on page 604.
4 To remove the Backup Exec program files but keep all of the Backup Exec
data, type:
SETUP /UNINSTALL:
To remove the Backup Exec program files and the Backup Exec data, type:
SETUP /REMOVEALL:
See “Installing Backup Exec using the command line (silent mode)” on page 89.
Note: License files remain on the server after features are uninstalled. Do not delete
the license files while Backup Exec is installed. Deleting the license files causes
the trial version to go into effect.
To uninstall Backup Exec features from the local Backup Exec server
1 Click the Backup Exec button, select Installation and Licensing, and then
select Install Features and licenses on this Backup Exec Server.
2 On the Add Licenses panel, click Next.
3 On the Configure Features panel, deselect the agents or features that you
want to uninstall, then click Next.
Installation 114
Uninstalling Backup Exec features from the local Backup Exec server
4 Uncheck the check box for the language that you want to remove.
5 On the Choose Languages panel, click Next.
6 If you are prompted to enter credentials for the Backup Exec service account,
type the correct credentials, and then click Next.
7 Read the installation summary, and then click Install to start the process.
8 When the Installation Wizard has completed, click Finish.
See “Uninstalling Backup Exec” on page 112.
Chapter 3
Getting Started
This chapter includes the following topics:
■ How to sort, filter, and copy information on the Backup Exec Administration
Console
Item Description
Backup Exec The Backup Exec button displays on the upper left side of the
button administration console. To display the options in the Backup Exec
button, click the Backup Exec button, select the menu name, and then
select an option. You can launch Backup Exec operations by clicking
options from a menu.
Getting Started 117
About the Backup Exec Administration Console
Item Description
Tabs Tabs at the top of the screen let you navigate Backup Exec.
You can access the following views from the navigation bar:
Groups Groups display on the tabs in the administration console, and contain
the commands that initiate actions such as creating a new backup job
or configuring storage. The commands in the groups are dynamic,
changing according to the selection. Some commands are unavailable
until you select an item on the console screen or until you run a
prerequisite task.
Selection pane Select items to work with, such as servers to back up or restore.
Getting Started 118
Displaying the version information for Backup Exec
Item Description
Details pane Additional details appear for the server that you select in the list of
servers. The Details pane lists the resources for the selected server
and the selection status, backup status, and logon account information
for each resource.
When you select a Hyper-V host or VMware host in the list of servers,
the Details pane includes the following details:
You can also restore data and filter the list of guest virtual machines
from this pane.
Status bar The status bar appears on the bottom of the administration console
and provides information about the Backup Exec server, jobs that are
running or are scheduled, alerts, and services.
See “Changing network and security options for Backup Exec” on page 614.
After you lock the Backup Exec user interface, you must enter the password to
connect to the Backup Exec console, Unless you unlock the Backup Exec console,
you cannot perform any tasks in the Backup Exec user interface.
Backup Exec has other utilities that can be launched from the console and have
separate user interfaces. If any of these utilities are open when you lock the console,
you can continue to use them. For example, Quick Assist, Install Options and
Licenses, Help, Backup Exec Services, Install Agents, create Disaster Recovery
Disk, and so on.
In case of rolling upgrade, if you have an earlier version of MMS and an updated
version of CAS, and you connect to MMS from CAS, this feature is available but in
disabled state (grayed out).
To lock and unlock the Backup Exec console
1 Click the Backup Exec button and select Configuration and Settings > Backup
Exec Settings > Network and Security.
2 Select the Secure the Backup Exec console check box.
3 Click the Backup Exec button, and then select Lock Console.
The Connect to Backup Exec server dialog box is displayed. The server
name and user name is disabled.
4 Enter the password for the user name that you used to log on to the Backup
Exec console.
5 Click Connect.
The state of the tasks before you locked the Backup Exec console resumes.
You can now continue using Backup Exec.
■ Specify a sort order for the columns that appear in the views.
■ Specify the values that you want to use to filter the information that Backup Exec
displays.
■ Specify the columns that you want to appear and the order in which they should
appear.
■ Create and save a configuration to use again.
■ Copy list items to the Clipboard and then copy them to any application that
supports copy-and-paste.
To sort or filter information on the Backup Exec Administration Console
1 Do one of the following:
To customize a view of the computers in On the Backup and Restore tab, in the
the list of servers Views group, click Sort and Filter.
To customize a view of the storage devices On the Storage tab, in the Views Group,
click List, and then click Sort and Filter.
To specify one or more columns to filter for Click Filter, choose the options as
specific values appropriate, and then click OK.
To specify the columns that you want to Click Columns, choose the options as
display and the order in which they should appropriate, and then click OK.
appear
To edit a configuration from the Backup On the Backup and Restore tab, in the
and Restore tab Views group, click Sort and Filter.
To edit a configuration from the Storage On the Storage tab, in the Views group,
tab click Sort and Filter.
2 Click Configurations.
3 Select the configuration that you want to edit, and then click the pencil icon.
To delete a configured view
1 Do one of the following:
To delete a configuration from the Backup On the Backup and Restore tab, in the
and Restore tab Views group, click Sort and Filter.
To delete a configuration from the Storage On the Storage tab, in the Views group,
tab click Sort and Filter.
2 Click Configurations.
3 Select the configuration that you want to delete, and then click the delete icon.
To copy information on the Backup Exec Administration Console
1 On any tab except the Home tab, right-click an item in the list view.
2 Click Copy.
3 Open any application that supports copy-and-paste, and then paste the
information.
View Description
View Description
Tree Displays the items in a hierarchical view. This view is disabled for
the list of servers on the Backup and Restore tab.
List Displays the items in a list that you can sort by columns. This view
is disabled for the list of servers on the Backup and Restore tab.
Note: The Tree and List view is disabled for the list of servers on the Backup and
Restore tab.
Layout group
You can select one of the following layout configurations to display the items on
the Home tab.
Item Description
Narrow/Wide Displays the Home tab items in two columns with a narrow
panel and a wide panel.
Reset Home Tab Restores the contents of the Home tab to the default
configuration.
Item Description
Active Alerts Lets you view all alerts that have not received
a response. You can filter the alerts to view
specific types of alerts, the source of the
alerts, and the amount of time that alerts
occurred.
You can display any or all of the following
types of alerts:
■ Error
■ Warning
■ Attention Required
■ Information
Getting Started 124
Configuring the Home tab
Item Description
Item Description
Virtual Machine Backups Lists the number of virtual machines that are
being backed up with the virtual-based
backup method and with the agent-based
backup method.
Item Description
Item Description
■ Protection
The pie graph displays the protection
status of the configured virtual machines
in the Azure Recovery Services Vault. You
can view the number of protected and
unprotected virtual machines. For
protected virtual machines, the status can
be one of the following:
■ Protected
■ Unprotected
■ Failover Readiness
The pie graph displays whether virtual
machines are ready for failover.
Failover readiness is displayed only for
virtual machines of an Azure Recovery
Services Vault that are protected. For
protected virtual machines, the status can
be one of the following:
■ Test Recommended: No successful
test failover of the virtual machine after
it was protected. Test failover
recommended.
■ Performed Successfully: One or
more successful test failovers.
■ Not Applicable: Virtual machine is not
eligible for a test failover.
■ Disaster Recovery Health (DR Health)
The pie graph displays the disaster
recovery status of virtual machines.
DR Health is displayed only for virtual
machines of an Azure Recovery Services
Vault that are protected. For protected
virtual machines, the status can be one
of the following:
■ Critical: One or more critical
replication errors are detected. These
errors indicate that replication is either
stuck, or not progressing as fast as the
Getting Started 128
Configuring the Home tab
Item Description
Support group
The items in the Support group provide technical support, documentation, licensing
contracts, and the RSS Reader resources. You can select the following items to
display on the Backup Exec Home tab.
Item Description
Item Description
■ View Readme
■ View Administrator's Guide (PDF)
■ View Administrator's Guide Addendum
(PDF)
RSS Reader Lets you view and add Backup Exec and RSS
feeds.
■ Migration report
■ Installation Summary report
Click here to see more RSS feeds Shows a list of RSS feeds that you can add
to the RSS Reader.
4 Click OK.
Getting Started 131
Creating a disaster preparation plan (DPP)
To remove a default Backup Exec RSS Clear the check box of the Backup Exec
feed RSS feed.
To remove an RSS feed that you added to Click the red X next to the name of the
the RSS Reader RSS feed.
Element Description
Hardware protection The hardware devices on your network (CPUs, drives, video)
are susceptible to damage from many disaster situations.
Uninterruptible power supplies (UPS), surge protectors, and
security monitoring devices are the equipment most often
used today to protect hardware. If you do not already have
these items in place, you should consider installing them.
The initial investment could be justified many times over in
the event of a disaster.
The ability to maintain Make sure that proper precautions are taken by everyone to
business operations during a implement plans for network interruptions. For example, the
disaster period phones in the sales department won’t stop ringing because
the server is down, so orders may have to be handwritten
until the server is up again. Each department should work
out strategies for such occurrences. If the proper precautions
are taken, the server can be rebuilt quickly and operations
can still continue.
A sound backup strategy. A well-designed backup strategy that includes a strong media
rotation scheme plays a key role in quickly restoring your file
server.
Off-site and duplicate stage It is imperative that you regularly move the backed-up data
backups. to an off-site storage facility. If you use disk as your storage
medium, consider adding a stage to duplicate backups to
other storage This ensures that if something happens to your
facility, all of your backups are not destroyed. Depending on
the importance of your data, you may choose to use several
off-site storage facilities.
Effective DPP management A person or group of people should constantly supervise your
organization’s disaster preparation efforts. This person or
group should install and maintain hardware protection
devices, make sure all departments have a plan if the server
goes down temporarily, and make sure that backups are
made and rotated off-site regularly. Document your Disaster
Preparation Plan for reference purposes.
Step Description
1. Configure storage You must have a configured storage device before you can run any
backup jobs.
To start the wizard, on the Storage tab, in the Configure group, click
Configure Storage. The wizard guides you through the rest of the
process.
2. Configure Backup You can use the default Backup Exec logon account, which is the
Exec logon system logon account for the Backup Exec server.
accounts
Backup Exec uses the system logon account by default for most
backups. The system logon account contains the credentials of the
Backup Exec service account. If the service account does not have
rights to access the data that you select for backup, you can use the
Logon Account Wizard. Use this wizard to create additional logon
accounts that do contain the necessary credentials for accessing that
data.
To start the Logon Account Wizard, click the Backup Exec button.
Select Configuration and Settings > Logon Accounts > Logon
Account Wizard.
Step Description
3. Run a backup job You can back up any of the computers on which you installed the
appropriate Backup Exec agent, such the Agent for Windows.
To start a backup job, on the Backup and Restore tab, select the
computer that you want to back up and then in the Backups group,
click Backup. Click a menu item, such as Back Up to Disk. You can
click Edit to change any of the defaults, or you can click OK to accept
all of the defaults and let Backup Exec schedule the job.
4. Create the By default, Backup Exec selects all the data on a computer for backup,
Simplified Disaster including the critical system components that you need to perform a
Recovery disk full system restore by using SDR. SDR-enabled backups are those
image backups for which all of the critical system components are selected
for backup. You must have SDR-enabled backups to use Backup Exec
to rebuild a computer and restore it to a functional state.
See “How to ensure that backups are enabled for Simplified Disaster
Recovery” on page 820.
After you have run SDR-enabled backups for all of the computers that
you want to protect, you should create a Simplified Disaster Recovery
(SDR) disk image.
On the Backup and Restore tab, in the Restores group, click Create
Disaster Recovery Disk. The wizard guides you through the rest of
the process.
■ Adding servers that you want to back up to the list of servers on the Backup and
Restore tab
■ Removing servers from the list of servers on the Backup and Restore tab
■ Backing up data
■ Running the next scheduled backup job before its scheduled time
■ Editing a stage
■ Copying data from a virtual tape library to a physical tape device using
DirectCopy to tape
Backups 137
How to prepare for your first backup with Backup Exec
Item Description
Confirm that the controller is rated for the tape backup hardware.
If it is not, you may experience unexpected performance
limitations.
Confirm that the SCSI BIOS Settings are set as follows:
System The capacity and speed of the media server performing the
backup, or the remote system being backed up, significantly affect
performance. System activity during the backup also affects
performance. Fragmented disks take a longer time to back up.
Heavily fragmented hard disks not only affect the rate at which
data is written to tape, but also affect overall system performance.
Fragmented files take longer to back up because each segment
of data is located at a different location on the disk. This
fragmentation increases the time that is required to access the
data. Make sure to defragment disks on a regular basis.
Item Description
Compression Successful compression can increase the tape drive's data transfer
rate up to twice the native rate. Compression can be highly
variable depending on the input data. Image files from a graphical
program might compress at 4.5:1 or more, while binary files might
compress at only 1.5:1. Data that has already been compressed
or encrypted may expand by about five percent if you attempt to
compress it further. This data expansion can reduce drive
throughput.
Files The total number of files on a disk and the relative size of each
file affects backup performance. Disks containing fewer files, but
where each file is large, run backups quickly. Backups run slower
if a disk contains many small files. A large number of files which
reside in the same directory path can be backed up more
efficiently than files in multiple directory locations.
Block size Larger block sizes can improve the compression ratio, which helps
the drive achieve better throughput and more tape capacity. Make
sure that the block sizes and buffer sizes are set properly.
Throughput increases in proportion to the compression achieved,
until you reach the drive's maximum throughput. Do not increase
the block size beyond the default settings.
Backups 140
Improving backup performance in Backup Exec
Item Description
Network The physical connection to a remote disk limits that disk's backup
speed. The rate at which a remote server's hard disks can be
backed up depends on the following factors:
Note: Both the switch and the network card must have matching
settings. For instance, if the switch port is set to 100 half, the NIC
for the server should also be set to 100 half.
Item Description
Backup Exec Database Installing the Backup Exec Database (BEDB) to an existing SQL
instance that other applications use can also degrade
performance. This is particularly relevant in a Central
Administration Server (CAS) environment. Other applications may
cause resource issues and use all the available resources within
the instance.
3. If a particular job still shows slow performance, split the job again to further
determine which part of the data most affects the job's performance.
A section of data with many small files and directories will negatively impact
performance. This performance impact is normal behavior.
Check whether the data is redirected somewhere else. Some file systems allow
a directory to remotely mount data. The files in these directories can be located
on remote servers, which may degrade performance for the entire backup.
4. Test backup-to-disk (B2D) throughput. Use Windows to copy at least 2 GB of
data in the backup job to the B2D disk. Compare the performance of the
Windows copy to the performance of the backup. If the performances of both
are comparable, the performance bottleneck is likely in the disk subsystem in
which the B2D folders reside. Move the B2D folders to a faster disk subsystem,
or continue troubleshooting.
5. Test system throughput. If your job is file-based, instead of based on an
Exchange, SQL, or other type of database backup, create a similar backup in
NTBackup (Windows Backup) and perform a backup to disk. Compare the
performance of the NTBackup job to the performance of the Backup Exec job.
If you need to back up an Exchange, SQL, or other database, create a
backup-to-disk job in Backup Exec that backs up 2 GB of data to wherever that
database agent resides. Perform the same test with NTBackup. Compare the
performance of both backups. If performance rates are similar, then Backup
Exec is performing at the capacity of the system.
Check whether the data is redirected somewhere else. Some file systems allow
a directory to remotely mount data. The files in these directories can be located
on remote servers, which may degrade performance for the entire backup.
4. Test network throughput. Copy between 500 MB and 1 GB of data from the
backup server to the remote server. Note how long the copy operation takes
to complete. You can perform this copy by creating a path to another server.
In the Windows command line, type <\\remote servername\c$>. When the
drive is displayed, copy the data.
Follow this same procedure to copy data from the remote server to the backup
server, and note how long the operation takes to complete.
Compare the speed of both of these network tests with Backup Exec's
performance. If Backup Exec performance is slower than the file copy tests,
the network is likely not the bottleneck.
If the network is not the bottleneck, consider performing the same test to a
different remote server, or between two different servers. This can help
determine if the performance issue is associated with the network in general,
or a particular server on the network. If you do not find any network performance
issues, continue to the next step.
5. Test system throughput. Try to back up the remote server with NTBackup
(Windows backup). If the remote server is not visible in NTBackup, create a
mapped drive to the server's drive and try to back up at least 2 GB of data.
Compare the NTBackup logs to the Backup Exec logs and identify any
performance differences.
Follow this same procedure to copy data from the remote server to the backup
server, and note how long the operation takes to complete.
Compare the speed of both of these network tests with Backup Exec's
performance. If Backup Exec performance is slower than the file copy tests,
the network is likely not the bottleneck.
If the network is not the bottleneck, you can perform the same test to a different
remote server, or between two different servers. This may help you determine
if the performance issue is associated with the network in general, or with a
particular server on the network. If you do not find any network performance
issues, continue to the next step.
3. Test system throughput. Try to back up the remote server with NTBackup
(Windows backup). If the remote server is not visible in NTBackup, create a
mapped drive to the server's drive and try to back up at least 2 GB of data.
Compare the NTBackup logs to the Backup Exec logs and identify any
performance differences.
Note: If remote backups are not possible with NTBackup, open NTBackup
locally on the remote server and run a local backup job there. Use Backup
Exec to back up the same data to disk, and compare the performance of both
backups. In most cases, Backup Exec jobs which back up to disk run faster
than those that back up to tape.
■ Elapsed time
■ Byte count
■ Average job rate
■ Description
Windows servers must have the Agent for Windows installed on them before you
can add them to the list of servers. When you add Windows servers to Backup
Exec, you have the option to install the Agent for Windows to them remotely.
If you no longer want to monitor or back up a server with Backup Exec, you can
remove it from the list of servers.
See “Adding servers that you want to back up to the list of servers on the Backup
and Restore tab” on page 147.
See “Removing servers from the list of servers on the Backup and Restore tab”
on page 148.
Note: If Backup Exec discovered servers using the Discover Data to Back
Up option, they display on the Browse dialog box under the heading Servers
without an Agent for Windows installed.
See “Adding discovered servers to the list of servers in Backup Exec”
on page 611.
See “About the list of servers on the Backup and Restore tab” on page 146.
Backups 148
Removing servers from the list of servers on the Backup and Restore tab
Note: If you remove a server from the list and it has scheduled jobs pending, the
jobs are deleted. The jobs do not run as scheduled. Do not remove a server from
the list of servers if you still want to back up that server.
You should not use this procedure to delete a managed Backup Exec server from
a CAS environment. You should remove managed Backup Exec servers using the
Storage tab.
See “Removing a managed Backup Exec server from a Backup Exec server pool”
on page 1307.
To filter servers by type In the Server type field, select the type of server for
which you want to search.
To filter servers by data type In the Data type field, select the type of data that the
server for which you want to search contains.
To filter servers by name In the Name contains field, type all or part of the server
name.
6 In the Servers group box, select the servers that you want to add to the server
group, and then click OK.
See “Hiding or viewing server groups on the Backup and Restore tab” on page 149.
See “Adding servers to a server group” on page 150.
See “Removing servers from a server group” on page 150.
See “Editing a server group” on page 151.
See “Moving servers to the Retired Servers server group” on page 151.
See “Removing server groups from Backup Exec” on page 153.
4 Click OK.
See “Creating a server group” on page 148.
You can use the following fields to filter the list of servers so that you can find
the server that you want to remove:
■ Server type
■ Data type
■ Name contains
4 Click OK.
See “Creating a server group” on page 148.
To change the server group's In the Group name field, type the new name for the
name server group.
To change the server group's In the Description field, type the new description for
description the server group.
4 Click OK.
See “Creating a server group” on page 148.
You cannot create new backup jobs for any servers that are in the Retired Servers
server group. However, any scheduled backup jobs still run on retired servers. You
can restore data from retired servers.
If you retire a server and then you decide that you want to move it back to the All
Servers server group, you can click on it and drag it from the Retired Servers server
group to the All Servers server group.
To retire servers from server groups
1 On the Backup and Restore tab, in the Groups pane, right-click Retired
Servers.
2 Click Edit.
3 (Optional) Do any of the following to filter the servers in your environment so
that you can find the servers that you want to retire:
To filter servers by type In the Server type field, select the type of server for
which you want to search.
To filter servers by data type In the Data type field, select the type of data that the
server for which you want to search contains.
To filter servers by name In the Name contains field, type all or part of the server
name.
4 In the Servers group box, select the servers that you want to retire and then
click OK.
See “Creating a server group” on page 148.
Backing up data
When you want to back up data, you create a container that is called the backup
definition.
Backup definitions contain backup selections, job templates, and stages.
Item Description
Backup selections Backup selections include any servers, volumes, or data that
you have selected to back up.
Backups 154
Backing up data
Item Description
Job templates Job templates are the collection of settings that Backup Exec
uses to create jobs. Backup job settings can include
scheduling options, storage device options, or backup
methods for selected types of data, for example. When you
want to run a backup, Backup Exec combines the job
template with the backup selections to create a backup job
that runs according to the options that you specified.
Stages Stages are optional tasks that you can run with backup jobs.
Backup definitions can contain one or more stages. You can
create stages that duplicate your backup data or create virtual
machines with your backup data.
Figure 4-1 Backup Definition (with backup selections, full and incremental
backup job templates, and a duplicate stage)
Backup Exec offers many choices for creating backup jobs to protect your data,
including the following:
Backups 155
Backing up data
Note: You cannot back up multiple servers with a synthetic backup job or a
conversion to virtual job.
Warning: Data lifecycle management deletes all expired backup sets that are
created by a one-time backup job. DLM does not keep the last backup set after
the retention date expires if the backup set is from a one-time backup. To prevent
the backup sets from being automatically deleted, you can manually retain
specific backup sets or you can change the expiration date of the backup set.
See “How data lifecycle management (DLM) deletes expired backup sets on
disk-based storage” on page 335.
■ Create a server group out of similar computers and back up the entire group at
once
Server groups are a way to organize and view server information in the list of
servers. You can create server groups based on any criteria. You may want to
group servers with a specific type of data or servers that reside in a specific
location.
You can also edit existing backup definitions to modify their schedules, backup
selections, or other settings.
To protect remote computers, you must install the Agent for Windows on the remote
computer. The Agent for Windows is a system service that runs on Windows servers
and workstations. It provides efficient backup processing by locally performing the
tasks that, in typical backup technologies, require extensive network interaction.
For information about the best practices to use backup jobs, refer to the Backup
Exec Best Practices.
See “Methods for installing the Agent for Windows” on page 68.
To back up data
1 Select one of the following methods to back up data:
Note: If you copied the backup settings from an existing backup definition or
if you do not want to change any of the existing or default settings, you can
skip to step 13
10 In the left pane, click Schedule, and then select when you want the backup
job or jobs to run.
11 In the left pane, click Storage, and then select the storage device that you
want to use for the backup job or jobs.
Backups 161
Backing up data
12 In the left pane, select any additional options that apply to the backup job or
jobs.
The remaining options in the left pane are optional. The options vary depending
on what you selected to back up.
For example, you might want to set up notifications so that users can receive
email or texts regarding this backup definition.
The test job can help you determine if there are any
problems that might keep the backup job from
completing successfully.
See “Configuring automatic test run jobs for backup
jobs” on page 562.
Instant GRT Select this option to configure the Instant GRT or the
full catalog operation for any GRT-enabled jobs. You
can choose to run a full catalog operation immediately
after the backup job finishes, schedule the full catalog
operation for another time, or run an Instant GRT
operation as part of the backup job.
Advanced Open File Select this option to configure the snapshot settings that
Backup Exec uses to process the backup job. Snapshot
technology lets Backup Exec capture any files that are
open when a backup job runs.
Pre/Post Commands Select this option to configure any commands that you
want to run either before the backup job begins or after
the backup job is completed.
Files and Folders Select this option to configure how Backup Exec
processes file system attributes such as junction points
and symbolic links.
Linux and Macintosh Select this option to configure options for any Linux or
Machintosh computers that are included in the backup
job.
Microsoft Active Directory Select this option to configure options for any Microsoft
Active Directory data that is included in the backup job.
Microsoft Exchange Select this option to configure options for any Microsoft
Exchange data that is included in the backup job.
Virtual Machines Select this option to configure options for any virtual
machines that are included in the backup job.
Microsoft SharePoint Select this option to configure options for any Microsoft
SharePoint data that is included in the backup job.
Microsoft SQL Select this option to configure options for any Microsoft
SQL data that is included in the backup job.
13 When you are finished selecting all applicable options for the backup definition,
click OK.
Backups 164
Backing up data
14 (Optional) You can add stages to this backup definition to duplicate your data
or create virtual machines with your backup data.
How Backup Exec backs up and restores volumes that are enabled
for deduplication in Windows
Windows Server 2012 introduced native file system deduplication. When a Windows
volume deduplicates data, the deduplicated data is considered to be optimized.
Data in its original, non-deduplicated format is considered to be non-optimized.
Backup Exec supports the backup of volumes that have Windows deduplication
enabled. If you back up optimized data, Backup Exec backs it up in its original,
non-optimized format. Ensure that you have enough space to back up the
non-optimized data on the backup target before you run the backup job. The
optimized files are not affected on the backup source itself.
When you restore the data that you backed up, Backup Exec restores the files as
non-optimized. Ensure that you have enough disk space to restore the non-optimized
data. You should free space on the volume on which you want to restore the files.
Run a Windows garbage collector to optimize the space on the volume before you
run the restore.
How Backup Exec backs up and restores Microsoft Virtual Hard Disk
(vhd) files
Microsoft Windows 2008 R2 gave users the ability to create native Virtual Hard
Disk (vhd) files. A vhd file is a virtual hard disk contained in a single file. For more
information about vhd files, see your Microsoft Windows documentation.
Backups 165
About selecting data to back up
Backup Exec gives you the ability to back up and restore native vhd files. If a native
vhd file is not mounted, you can back up and restore it with the volume on which it
resides.
If a native vhd file is mounted to a drive letter or to an empty folder path, the file is
skipped during backup jobs. You cannot include a mounted vhd as part of your
backup selections. To back up the data in a mounted vhd file, select its mount point
in the backup selections.
See “Backing up data” on page 153.
You can also redirect a restore job to a native vhd if you use Microsoft Windows
2008 R2 or later. When you redirect a restore job to a native vhd, Backup Exec
creates a vhd file that expands dynamically as you save data to it. The file expands
until it reaches 2040 GB, which is the maximum size for a native vhd file. You can
create one vhd file with data from all redirected backup sets or you can create a
vhd file for each backup set.
Backup Exec's Agent for Hyper-V supports Microsoft vhdx files:
See “Notes about using the Agent for Hyper-V ” on page 1016.
Figure 4-2 Selections box on the Backup Definition Properties dialog box
Note: During a rolling upgrade, the tag as business-critical feature is not applied
to jobs that are delegated to managed Backup Exec servers until the managed
servers are upgraded to the most recent version of Backup Exec.
■ The maximum number of characters for each label (the text between the dots)
is 63
■ The maximum total number of characters in the fully qualified name is 254,
including the dots, but excluding the \\
■ The name cannot include the following characters: * | < > ?
It is not recommended using both fully qualified domain names and non-qualified
domain names. It is recommended that you use fully qualified domain names.
For example, if you have a computer named Test_Computer, you can have two
selections for it. One selection is called Test_Computer. The fully qualified selection
is called Test_Computer.domain.company.com. In this case, Backup Exec treats
each selection as a separate computer, even though both selections are for the
same computer. For any backup jobs that use the short computer name, the catalog
contains the short computer name. For any backup jobs that use the fully qualified
name, the catalog contains the fully qualified name.
See “Changing the order in which backup sources are backed up” on page 171.
which the SQL instances are backed up. You cannot back up a SQL instance
and then the volume before backing up the other SQL instances, however.
■ All of the data that resides on a specific backup source is treated as a single
item. You can change the order in which the backup sources are backed up in
relation to one another. You can also change the order in which the data on a
backup source is backed up. However, you cannot reorder the data across
multiple backup sources.
For example, if you back up two volumes, you can select which volume should
be backed up first. You can also select the order in which the data on each
volume is backed up. However, you cannot back up some of the data from one
volume and then the other volume before backing up the rest of the data on the
first volume.
■ Some system resources cannot be reordered. For example, Shadow Copy
Components and System State backup sources must always be backed up last.
Backups 173
Changing the order in which backup sources are backed up
.
3 Do one of the following:
To reorder the servers in a In the left pane of the Backup Selections dialog box,
backup definition with multiple use the up and down arrows to configure the order of
servers the servers or applications.
4 Click OK.
See “Backing up data” on page 153.
See “About selecting data to back up ” on page 165.
When you exclude files from backup definitions, the exclusions do not affect
any of your other backup definitions. The exclusions apply only to any jobs in
that backup definition.
■ Exclude files globally from all backups
When you globally exclude files from all backups, the exclusions apply to all of
your backup definitions. Backup Exec automatically skips any global exclusions
when you run backup jobs.
To exclude files from backups
1 Do any of the following:
2 Complete any of the following fields to identify the files that you want to exclude:
Resource name Enter the name of the volume or drive that you want to
exclude from backups.
Name Enter the name of a specific file that you want to exclude
from the backup. You can use wildcard characters. Use
a question mark ( ? ) to represent any single character.
Use two asterisks ( ** ) to represent any number of
characters.
Apply to subdirectories Select this option to exclude the contents of all of the
subfolders when you select a directory.
Only modified files Select this option to exclude only the files that have
been modified in the directory that you specified.
Only read-only files Select this option to exclude only read-only files in the
directory that you specified.
Files dated Select this option to exclude the files that were created
or modified during a specific time period. You must
select the beginning and ending dates for the time
period.
Files not accessed in X Select this option to exclude any files that have not been
days accessed in a specific number of days. You must enter
the number of days.
4 Click OK.
See “About selecting data to back up ” on page 165.
See “Including specific files with a backup job's backup selections” on page 177.
4 Complete any of the following fields to identify the files that you want to include:
Resource name Enter the name of the volume or drive that you want to
include in the backup.
Name Enter the name of a specific file that you want to include
in the backup. You can use wildcard characters. Use a
question mark ( ? ) to represent any single character.
Use two asterisks ( ** ) to represent any number of
characters.
Apply to subdirectories Select this option to include the contents of all of the
subfolders when you select a directory.
Only modified files Select this option to include only the files that have been
modified in the directory that you specified.
Only read-only files Select this option to include only read-only files in the
directory that you specified.
Files dated Select this option to include the files that were created
or modified during a specific time period. You must
select the beginning and ending dates for the time
period.
Files not accessed in X Select this option to include any files that have not been
days accessed in a specific number of days. You must enter
the number of days.
Tag as business-critical Select this option to prioritize the backup of the selected
resource above other resources that are not tagged as
business-critical.
6 Click OK.
See “About selecting data to back up ” on page 165.
Backups 179
About backing up critical system components
You must include all critical system components in your backup selections if you
intend to use any of the following restore scenarios:
■ Simplified Disaster Recovery
See “About Simplified Disaster Recovery” on page 812.
■ Conversion to virtual machines
See “How conversion of physical computers to virtual machines works in Backup
Exec” on page 499.
■ Complete online restore of a Microsoft Windows computer
See “Performing a complete online restore of a Microsoft Windows computer”
on page 234.
Backups 180
About backing up critical system components
Some restore scenarios are only available for certain data types and Backup Exec
agents. Additionally, you must select a specific backup method for some data types
if you intend to use a physical-to-virtual conversion or a backup-to-virtual conversion.
Active Yes No No No No
Directory
Lightweight
Enterprise Yes No No No No
Vault
Hyper-V Yes No No No No
Agent
SharePoint Yes No No No No
Agent
VMware Yes No No No No
Agent
can exclude Microsoft Exchange data from your backup, for example, and still use
the backup sets to perform a disaster recovery.
The following system resources are considered critical and they must be included
in backups if you want to be able to use the backup sets to perform a full system
restore:
■ System volume (including EFI and utility partitions)
■ Boot volume (excluding operating system)
■ Services application volumes (boot, system, and automatic startup)
■ System State devices and volumes (including Active Directory, System Files,
etc.)
■ Windows Recovery Partition (WinRE) on any applicable versions of Windows
For information about the best practices to use Backup Exec to protect critical
system components, refer to Backup Exec Best Practices.
Note: You should perform a full backup of your server to establish a baseline for
disaster recovery.
Duplicate backups, which include all selected data, are a type of full backup.
Duplicate backups do not affect any tape media rotation strategy because the
archive bit is not reset.
It is recommended that you always run full backups before and after you upgrade,
update, or modify any backup sources. This recommendation applies to any
significant operating system and application configuration or modifications.
Table 4-3 Backup sources and scenarios for which a full backup is
recommended
Running full backups before and after each of these scenarios helps to ensure that
you can restore back to the previous configuration, if necessary.
Backups 185
Backup methods in Backup Exec
Note: In a backup definition that includes a differential task, all of the backup tasks
must use storage devices that the same Backup Exec server can access.
By default, Backup Exec uses the Windows Change Journal to determine if files
were previously backed up. You can also configure Backup Exec to use a file's
modified time or archive bit to determine if the file was backed up.
Note: You cannot use Backup Exec catalogs to determine if files were backed up
for any differential backups.
See “Configuring file and folder options for backup jobs” on page 581.
Differential backups allow much easier restoration of an entire device than
incremental backups since fewer backups are required. Using fewer media also
decreases the risk of having a restore job fail because of media errors.
Note: In a backup definition that includes an incremental task, all of the backup
tasks must use storage devices that the same Backup Exec server can access.
By default, Backup Exec uses the Windows Change Journal to determine if files
were previously backed up. You can also configure Backup Exec to use a file's
modified time, archive bit, or the Backup Exec catalogs to determine if the file was
backed up.
See “Configuring file and folder options for backup jobs” on page 581.
Backups 186
Backup methods in Backup Exec
Incremental backups take much less time than full or differential backups to
complete. They also require less storage space for backed up data since only any
files that have changed since the last backup are backed up.
You want to implement a backup strategy for the office file server. All backup
strategies begin with a full backup (the backup of an entire server using the full
backup method). So you create and submit a full backup job to run at the end of
the day on Friday.
Most files on the server, such as operating system files and application files seldom
change. Therefore, you decide that you can save time and storage by using
incremental backups or differential backups. You opt to use incremental backups.
You schedule a job to run at the end of each day, Monday through Thursday, with
the incremental backup method.
On Friday, your backup sets contain all of the data on the file server. Backup Exec
changes all of the files' statuses to backed up. At the end of the day on Monday,
the incremental job runs and only the files that were created or changed are backed
up. When the incremental job completes, Backup Exec turns off the archive bit,
showing that the files have been backed up. On Tuesday through Thursday, the
same events happen.
If your file server then crashed on Thursday, you would restore each backup in the
order in which it was created. You would begin with Friday's backup and proceed
through Wednesday's backup.
If you had decided to perform differential backups on Monday through Thursday,
you would have only needed Friday's and Wednesday's backup sets. Friday's
backup sets would have included all of the data from the original backup.
Wednesday's backup sets would have included every file that had been created or
changed since Friday's backup.
Note: You can change the backup method to a data specific one for specific
agents and types of data later.
5 Type a name for each backup job that you want to configure a backup method
for in the Job template name field.
6 (Optional) To change any of the backup methods that you selected into a
data-specific backup method, complete the following steps:
Backups 193
How Backup Exec determines if a file has been backed up
■ In the left pane, select the agent or data type for which you want to configure
the data-specific backup method.
For example, if you want to select a data-specific backup method for SQL
data, select Microsoft SQL.
■ In the Backup method field, select the data-specific backup method for
each applicable backup job.
7 Click OK.
Modified time
When Backup Exec runs a full backup or incremental backup job, the time that the
backup job starts is recorded in the Backup Exec Database. Backup Exec adds the
time of the backup job to the Backup Exec Database only if the full backup job
completes successfully. The next time that you run an incremental backup job or
a differential backup job, Backup Exec compares the file system time to the backup
time. If the file system time is later than the time that is recorded in the database,
the file is backed up. If the file's modified time is older than the previous backup's
modified time, that file is not backed up. If the job does not complete successfully,
subsequent differential or incremental backup jobs back up all of the data instead
of only the data that has changed.
Note: A file's last modified date and timestamp do not change when the file is copied
or moved. To ensure that the files are protected, run a full backup after you copy
or move files.
When you run an incremental backup job, Backup Exec records a new time in the
Backup Exec Database. The database time is not updated for differential backup
jobs.
When you select the modified time method, Backup Exec uses the Windows change
journal to determine if a file has changed since the last time it was backed up. If
the change journal is not available, Backup Exec compares the file information to
the previous backup time to determine if the file has changed.
Using modified time lets Backup Exec run more accurate incremental backups or
differential backups even if other processes have modified files' archive bits.
Archive bit
Backup Exec uses the archive bit from the file system to determine if a file has
changed since the last time it was backed up.
When you use the archive bit, Backup Exec turns the archive bit off when a file is
backed up. Turning off the archive bit indicates to Backup Exec that the file has
Backups 195
How Backup Exec determines if a file has been backed up
been backed up. If the file changes again before the next backup job, the bit is
turned on again. Backup Exec backs up the file in the next backup.
If the next backup job is a full backup job or an incremental backup job, the bit is
turned off when the backup job completes. If the next backup job is a differential
backup job, the archive bit is left intact.
Catalogs
Backup Exec compares path names, modified time, deleted and renamed files and
folders, and other attributes. When you select the catalog method, Backup Exec
uses the Windows change journal to determine if a file has changed since the last
time it was backed up. If the change journal is not available, Backup Exec compares
the file information to previous catalogs to determine if it has changed.
The catalog method is only available if the Advanced Disk-based Backup feature
(ADBO) is installed.
Note: The off-host backup feature of ADBO does not support the catalog method.
See “Configuring file and folder options for backup jobs” on page 581.
Note: The Windows Boot Volume is preconfigured by Windows with default values.
Note: The off-host backup feature of ADBO does not support the catalog backup
method for files.
Backups 197
Configuring Backup Exec to automatically delete files after a backup
Note: You can select to delete files and folders only for full backups.
4 Click OK.
Network interface Select the name of the network interface card that
connects the Backup Exec server to the network that
you want to use for this backup job. The list includes all
available network interfaces on the Backup Exec server.
Protocol Select the protocol you want to use for this backup job.
The options are as follows:
Allow use of any available Select this option to let Backup Exec use any available
network interface, subnet, network if the remote system that you selected for
or protocol for Backup Exec backup or restore is not part of the specified backup
agents not bound to the network.
above network interface,
If you do not select this option and the remote system
subnet, or protocol
is not part of the specified backup network, the job fails.
Backup Exec cannot access the data from the remote
system.
Interface Details Click this option to view the Media Access Control
(MAC) address, adapter type, description, IP addresses,
and subnet prefixes for the interface that you selected
for the backup network.
Allow managed Backup Select this option to let a job use any network interface
Exec server to use any to access Backup Exec agents if the selected network
network interface to access interface is unavailable. Enabling this option lets the
Backup Exec agents managed Backup Exec server use an alternate network
interface to run any important backup jobs that would
otherwise fail.
5 Click OK.
See “Backup networks” on page 612.
■ To run the next scheduled backup for multiple servers' backup jobs, Shift
+ click or Ctrl + click the server names, and then right-click one of the
selected servers.
Note: You cannot edit a backup definition while one of its backup jobs is running.
5 Click OK.
6 When you are finished editing the backup definition, click OK on the Backup
Properties dialog box.
To edit a backup definition's job settings
1 Do one of the following:
3 In the left pane, select the backup job setting that you want to modify.
The options vary depending on what you selected to back up.
4 Make any necessary changes.
5 When you are finished modifying any applicable options for the backup, click
OK.
6 When you are finished editing the backup definition, click OK on the Backup
Properties dialog box.
See “Backing up data” on page 153.
Note: You cannot test credentials for virtual machines, but the job runs if you provide
the correct credentials. If the job fails, you may need to retry the job with different
credentials.
Complete any of the following procedures to test credentials for backup sources:
To test the credentials that are associated with a backup source
To test the credentials for all of the backup sources in a specific backup definition
To test the credentials for a specific backup source in a specific backup definition
To test the credentials that are associated with a backup source
1 On the Backup and Restore tab, double-click the server whose credentials
you want to test.
2 In the left pane, click Credentials.
Backups 207
Replacing the credentials for a backup source
2 In the Logon Account field next to the backup source, select <new logon
account>.
3 In the User name field, type the user name for the new logon account.
4 In the Password field, type the password for the new logon account.
5 In the Confirm password field, type the password again to confirm it.
6 In the Account name field, type a unique name for the new logon account.
7 In the Notes field, type any optional notes to explain how the Backup Exec
logon account is used.
8 Select This is a restricted logon account if you want the Backup Exec logon
account to be used only by the owner of the logon account and those who
know the password.
If this option is not selected, the Backup Exec logon account is created as a
common account. Common accounts are the shared accounts that all users
can access.
9 Select This is my default account to make this account your default Backup
Exec logon account, which is used to browse, make selections, or restore data
on your local computers and remote computers
10 Click OK.
See “Testing credentials for backup sources” on page 206.
See “Replacing the credentials for a backup source” on page 207.
See “Deleting retired or unused backup sources from the Credentials pane”
on page 210.
Backups 210
Deleting retired or unused backup sources from the Credentials pane
Note: If you try to delete a backup source that is used in a backup definition,
Backup Exec does not delete that backup source. When you delete a backup
source that still exists in your environment, Backup Exec repopulates the list
with the backup source the next time it browses your environment.
Availability window
Backup Exec has additional scheduling options that you can use to ensure that the
job does not run outside of your availability window. The availability window is the
time range when your backup sources are available to be backed up. You can
configure how long you want an incomplete job to remain scheduled before Backup
Exec reschedules the job and changes its completion status to Missed. You can
also configure the job to automatically be canceled if it is running for too long after
its scheduled start time. These options help ensure that backup jobs do not affect
your system resources during critical hours.
See “Configuring schedules for backup jobs” on page 549.
Scheduling conflicts
Backup Exec resolves scheduling conflicts between two backup jobs by running
the less common job and skipping the more common job. If a full backup job and
an incremental or differential backup job are scheduled to run at the same time,
Backup Exec runs the full backup. The incremental backup or differential backup
is skipped and it runs again at its next scheduled time. Full backup jobs always
supersede incremental and differential backup jobs. If two backup jobs of the same
type are scheduled to run at the same time, Backup Exec runs the less frequently
scheduled job. The more frequently scheduled job is skipped. The skipped backup
job runs again at its next scheduled time. For example, if a monthly job and a daily
job are scheduled to run at the same time, Backup Exec runs the monthly job. The
daily job is skipped and it runs on the following day per its normal schedule.
Note: Included dates are applied to the job schedule before excluded dates. When
any excluded dates are applied, they may overwrite the included dates if there are
any conflicts. Therefore, if you select the same date as both an included date and
an excluded date, Backup Exec excludes the date from your backup schedule.
See “Preventing backup jobs from running on a specific date” on page 213.
■ In the Select Date field, type the date that you want
to include with the backup schedule.
■ Click Add.
Note: You can add only one date at a time.
Backups 213
Preventing backup jobs from running on a specific date
To select the date from the Click the date that you want to include with the backup
calendar schedule.
7 Click OK.
See “How job scheduling works in Backup Exec” on page 210.
Note: Included dates are applied to the job schedule before excluded dates. When
any excluded dates are applied, they may overwrite the included dates if there are
any conflicts. Therefore, if you select the same date as both an included date and
an excluded date, Backup Exec excludes the date from your backup schedule.
See “Including a specific date in the schedule for a backup job” on page 212.
■ In the Select Date field, type the date that you want
to exclude from the backup schedule.
■ Click Add.
Note: You can add only one date at a time.
To select the date from the Click the date that you want to exclude.
calendar
The calendar displays 3 months at a time. You can
navigate forward and backward to view additional
months by clicking the arrows.
Note: You can select only one date at a time.
7 Click OK.
See “How job scheduling works in Backup Exec” on page 210.
storage when the backup job is complete. Then you can take the tape off-site to
ensure that your data is safe.
Stage Description
Duplicate to Disk Creates a duplicate copy of your backup and sends it to disk
storage.
Duplicate to Tape Creates a duplicate copy of your backup and sends it to tape
storage.
Duplicate to Cloud Creates a duplicate copy of your backup and sends it to the
cloud storage.
Convert to Virtual Machine Creates a virtual machine from your backup sets after the
After Backup backup job is complete.
Convert to Virtual Machine Creates a virtual machine from your backup sets while the
Simultaneously with Backups backup job is running.
Editing a stage
You can edit a stage that is part of a backup definition.
To edit a stage
1 Do one of the following:
2 Click Edit in the box that contains the stage that you want to edit.
3 Make any necessary changes.
4 When you are finished making changes to the stage, click OK on the Backup
Properties dialog box.
See “Adding a stage to a backup definition” on page 214.
4 Select Duplicate.
5 In the Schedule group box, select when you want Backup Exec to run the
duplicate job:
To schedule the job for a later Select Run on, and then enter the date and time.
time
6 In the Storage field, select the storage device to which you want to copy the
backup sets.
7 In the Keep for field, select the amount of time that you want Backup Exec to
keep the backup sets.
The media is protected from being overwritten for the amount of time that you
specify.
Select Use source retention to keep the backup sets for the same amount of
time as the source backup sets that you want to duplicate.
8 Do any of the following:
2 Click Duplicate.
Backups 220
Duplicating backup sets or a job history manually
3 In the Schedule group box, select when you want Backup Exec to run the
duplicate job:
To schedule the job for a later Select Run on, and then enter the date and time.
time
4 In the Storage field, select the storage device to which you want to copy the
job history.
5 In the Keep for field, select the amount of time that you want Backup Exec to
keep the job history.
The media is protected from being overwritten for the amount of time that you
specify.
Select Use source retention to keep the job history for the same amount of
time as the source job history that you want to duplicate.
6 Do any of the following:
7 On the Duplicate Job dialog box, click OK for each duplicate job that you
create.
Backups 221
Running a test run job manually
To run a test job from the Job Select the Job Monitor tab.
Monitor tab
2 Right-click the job that you want to test, and then click Test Run.
3 Click Yes to confirm that you want to run the test job now.
See “Configuring automatic test run jobs for backup jobs” on page 562.
■ To verify multiple backup sets, Shift + click or Ctrl + click the backup sets,
and then right-click one of the selected backup sets.
4 Click Verify.
5 In the Schedule group box, select when you want Backup Exec to run the
verify operation:
To schedule the operation for Select Run on, and then enter the date and time.
a later time
6 Click OK.
To verify a job history
1 Do one of the following:
To verify a job history from On the Job Monitor tab, do one of the following:
the Job Monitor tab
■ To verify a single job history, right-click the job
history.
■ To verify multiple job histories, Shift + click or Ctrl +
click the job histories, and then right-click one of the
selected job histories.
2 Click Verify.
Backups 224
Copying data from a virtual tape library to a physical tape device using DirectCopy to tape
3 In the Schedule group box, select when you want Backup Exec to run the
verify operation:
To schedule the operation for Select Run on, and then enter the date and time.
a later time
4 Click OK.
Note: If you select disk storage as the destination device for a duplicate job with
DirectCopy to tape enabled, Backup Exec performs a regular duplicate job.
Backups 225
Copying data from a virtual tape library to a physical tape device using DirectCopy to tape
Table 4-8 How to use DirectCopy to tape to copy data from a virtual tape
library to a physical device
Create a regular backup Select a virtual tape library as See “Backing up data”
job. the storage destination. on page 153.
■ Restoring data from a server, a backup set, a backup job, or a storage device
■ About restoring NetWare SMS volume backups to non-SMS volumes with Backup
Exec
Note: The Restore Wizard displays only up to 30,000 items. If you want to restore
data from a folder that contains more than 30,000 items, you should search for the
item that you want to restore. You can use search criteria such as the type of data
and the date of the original backup to help reduce the number of items that displays.
Method Description
Search Lets you select multiple servers on which to search for backup
sets. Then, you can choose to restore the data, or you can
copy and save the search criteria and the results to the
clipboard. You can then email the results to the person who
requested the restore to ensure that you have found the
correct data before you restore it.
Table 5-1 Guided methods to search for and restore data (continued)
Method Description
Restore Lets you browse the backup sets from a single server, and
then restore the data. You can restore file system data,
System State data, Backup Exec Shadow Copy Components,
utility partitions or UEFI system partitions, and more.
Simplified Disaster Lets you recover Windows computers after a hard drive
Recovery failure. The Simplified Disaster Recovery wizards guide you
in preparing for disaster recovery, and in recovering a local
computer or a remote computer to its pre-disaster state.
Note: You can search the backup sets for any data that was backed up from a
virtual machine if you have selected one of the full catalog options on the Instant
GRT and Full Catalog Options page and the full catalog job is complete. However,
the search option is available in the Restore Wizard only when you select an
application installed on the virtual machine for restore.
Search is not available if you have selected the Enable Instant GRT option on the
Instant GRT and Full Catalog Options page.
For files and folders, if you have blocked access to backed up files using the
Import-BEItemsToBlock BEMCLI command, the blocked files are not available
when you are browsing for files to be restored.
To search for data to restore
1 On the Backup and Restore tab, right-click the server or servers on which
you want to search for data, and then click Search.
2 Follow the Search Wizard prompts to search for and restore data.
You can also perform a complete online restore of a Windows computer if the
computer was fully selected for a backup. By default, backup jobs include all
necessary components that are required for a complete restore.
For the file and folders, if you have blocked access to backed up files using the
Import-BEItemsToBlock BEMCLI command, the blocked files are not displayed
in the search results.
See “Performing a complete online restore of a Microsoft Windows computer”
on page 234.
To restore from a completed backup job Restoring data from a completed backup job
To restore from storage device media Restoring data from storage device media
Note: If the File Server Resource Manager (FSRM) is running on the server that
you are restoring, the job may fail with an "out of disk space" error. If this occurs,
disable RSRM, and then run the job again.
Note: If you back up and then rename a server, the new server name and the old
server name both appear on the Backup and Restore tab. The status next to the
new server name indicates that it is backed up. However, you should select the
icon with the old server name to restore any data that you backed up before you
changed the server name.
To restore data from the ■ On the Backup and Restore tab, in the list of
Backup and Restore tab servers, double-click a server that has been backed
up.
■ In the Jobs view, expand a backup definition.
■ Under the backup definition, right-click the backup
job from which you want to restore data.
■ Select Restore backup sets created by this job.
To restore data from the Job ■ On the Job Monitor tab, in the Jobs pane, right-click
Monitor tab a server that has been backed up.
■ Select Restore backup sets created by this job.
When you restore from storage device media, you can restore multiple types of
data. Separate restore jobs are submitted for each type of data.
To restore data from storage device media
1 Select from the following:
■ Select the next type of data and the appropriate restore options for that
type of data. If you do not want to restore the other types of data, you can
click Cancel to exit the Restore Wizard without affecting any of the jobs
that you already submitted.
■ After you configure jobs for each type of data, the Continue button changes
to a Finish button. When you click Finish, Backup Exec submits the final
restore job, and then closes the Restore Wizard.
To restore file and folder backups from a Select File and folder backups from a
backup set backup set.
Note: When you restore file system data
from a backup set, you select a backup set
to restore. Backup Exec restores the file
system data exactly as it exists in the
backup set that you select. No dependent
backup sets are selected for the restore.
To search for files and folders Select Files and folders located through
Search.
4 Click Next.
If you have blocked access to backed up files using the
Import-BEItemsToBlock BEMCLI command, the blocked files are not available
when you are searching for files to be restored.
5 Follow the Restore Wizard prompts to restore the data.
Note: Online restore using the Agent for Windows does not restore the
WindowsApps folders on operating systems that run Windows 8 or later. However,
the restore job is successful. Microsoft recommends to restore the WindowsApps
folders using Device Reset on the Settings panel.
The WindowsApps folders that are ignored during restore could be the following:
The folder pointed by
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\PackageRoot
%SystemRoot%\InfusedApps
Note: To restore the Windows Internet Name Service (WINS), you must also restore
the registry. You cannot restore WINS by itself.
If the server is a certificate server, then System State includes the Certificate
Services database.
If the server is a domain controller, then System State includes the Active Directory
services database and the SYSVOL directory.
See “About the Agent for Microsoft Active Directory” on page 1253.
You must restart the computer after you restore System State data.
Warning: You should not cancel a System State restore job. Canceling this job
can leave the server unusable.
If you know which backup set, completed backup job, or storage device media
contains the data that you want to restore, you can start the Restore Wizard from
there. Otherwise, you can select a server and then start the Restore Wizard.
See “Restoring data from a server, a backup set, a backup job, or a storage device”
on page 229.
Restores 237
Restoring System State
Note: When you restore the System State, Backup Exec may create the following
temporary directory:
%SystemRoot%\F52E2DD5-CE7D-4e54-8766-EE08A709C28E
After the restore job finishes, you can delete the directory.
4 After the Backup Exec services have started, run the Restore Wizard to restore
System State.
See “Methods for restoring data in Backup Exec” on page 227.
5 In the Restore Wizard, enable the option Mark this server as the primary
arbitrator for replication when restoring SYSVOL in System State.
6 Restart the server before you restore more data.
Table 5-3 How to install a new Windows Server domain controller into an
existing domain by using a redirected restore
Step Description
Step 1 Back up the System State data of an active Windows Server domain
controller that is in the target domain. You should back up the data to
some type of removable storage, such as a disk cartridge device or a
tape.
Table 5-3 How to install a new Windows Server domain controller into an
existing domain by using a redirected restore (continued)
Step Description
Step 2 Attach the storage that contains the System State data to the computer
that you want to install into the destination domain.
Note: It is recommended that you encrypt the storage. Use caution
when transporting it to the location of the destination domain.
Step 4 Redirect the restore of the system state backup sets to a temporary
location on a volume or directory on the destination computer.
Step 5 Start the domain controller installation by doing the following in the
order listed:
Step 7 Restart the computer that has the new domain controller.
Step 8 Expire any remaining system state backup sets that you redirected to
the temporary location.
that the operating system creates. The UEFI system partitions contain the critical
system files, such as bootmgr and BOOT\BCD files.
Requirements for restoring utility partitions are as follows:
■ You must recreate the utility partitions before you restore any data.
■ You must have Administrator rights.
■ You cannot redirect the restore of a utility partition to another computer.
■ You can only restore the utility partitions that belong to the same vendor. For
example, you cannot restore Dell utility partitions to a Compaq utility partition.
■ The size of the utility partition to which you restore the data must be equal to or
greater in size than the utility partition that was backed up.
If you know which backup set, completed backup job, or storage device media
contains the data that you want to restore, you can start the Restore Wizard from
there. Otherwise, you can select a server and then start the Restore Wizard.
See “Restoring data from a server, a backup set, a backup job, or a storage device”
on page 229.
To restore utility partitions or UEFI system partitions
1 On the Backup and Restore tab, right-click the computer for which you want
to restore utility partitions or UEFI system partitions, and then click Restore.
2 Select one of the following, and then click Next:
■ Utility partition
■ Unified Extensible Firmware Interface system partition
To avoid canceling a restore job, you can redirect the restore to a noncritical
destination. Then, copy the data to a final destination when the job completes
successfully.
You should not cancel a System State restore job. Canceling a System State restore
job can leave the system unusable.
To cancel a restore job
1 On the Job Monitor, right-click the job that you want to cancel.
2 Click Yes when you are prompted if you are sure that you want to cancel the
job.
See “Canceling an active job” on page 253.
■ View information on all the directories and files that are contained in each backup
set.
■ Search for files to restore.
Backup Exec catalogs each backup job. However, if the catalogs are truncated,
only backup set information is listed. You cannot view files or file attributes. The
amount of information in the catalog is determined by whether you choose to truncate
the catalogs after a specific amount of time.
Catalogs reside on the Backup Exec server and on the storage device to which you
sent the backup job.
To restore the data that was backed up by another installation of Backup Exec, you
must first run a catalog operation on the storage device on the local Backup Exec
server. The catalog for a backup job that was run on one installation of Backup
Exec does not exist on another installation of Backup Exec.
When you enable Granular Recovery Technology (GRT) for Exchange, SharePoint,
or virtual machine backups, a catalog operation runs immediately after the backup
operation by default.
For Exchange and SharePoint agent-based backups, the full catalog operation runs
immediately after all full backups. It runs once every 24 hours for all incremental
backups and differential backups, even if you schedule more than one GRT-enabled
job to run in the 24-hour period.
For Hyper-V and VMware backups, the full catalog operation runs immediately after
all full, incremental, and differential backups by default. You can also schedule a
full catalog operation.
For information about the best practices to manage catalogs in Backup Exec, refer
to Backup Exec Best Practices.
See “Configuring default options for catalogs” on page 243.
See “Cataloging a storage device” on page 470.
See “About cataloging tape or disk cartridge media that contains encrypted backup
sets” on page 431.
See “Configuring Instant GRT and full catalog options to improve backup
performance for GRT-enabled jobs” on page 565.
Request all media in the Catalogs the media in tape drives and disk cartridges
sequence for catalog by starting with the lowest known tape number in the
operations tape family. For example, if you don’t have the first tape,
the catalog job starts with the second tape. If you
uncheck this option, the catalog job begins on the tape
that you specify.
Use storage-based catalogs Lets Backup Exec read the catalog information from the
storage device.
Truncate catalogs after Retains only the header information and removes all
file details and directory details after the specified
amount of time. This option reduces the size of the
catalogs considerably. After the catalogs have been
truncated, the files and directories cannot be restored
until you recatalog the storage.
Catalog path Designates a path on the volume for the catalog files.
If the path does not exist, you are prompted to create
the path.
4 Click OK.
Note: The directory must exist in Windows. Create the directory using Windows
Explorer before you type it in the Catalog path field.
4 Click OK.
5 Click the Backup Exec button, select Configuration and Settings, and then
click Backup Exec Services.
6 Click Stop all services.
7 Click OK.
After stopping all Backup Exec services, manually copy the catalog files from
the old folder to the new one.
8 Using Windows Explorer, navigate to the directory in which the catalogs are
currently stored.
9 Copy all of the items in the folder, including any subfolders and all files.
10 Using Windows Explorer, navigate to the directory to which you want to move
the catalogs.
11 Paste all of the items in the folder.
After any catalog files have been copied to the new directory, restart all Backup
Exec services.
12 Click the Backup Exec button, select Configuration and Settings, and then
click Backup Exec Services.
13 Click Start all services.
14 Click OK.
sets and about the storage device on which the backup sets are stored. However,
you can manually catalog backup sets at any time.
To catalog backup sets
1 On the Backup and Restore tab or the Storage tab, double-click the server
or the storage device that is related to the backup sets that you want to catalog.
2 In the left pane, click Backup Sets.
3 Do one of the following:
■ To catalog a single backup set, right-click the backup set.
■ To catalog multiple backup sets, Shift + click or Ctrl + click the backup sets,
and then right-click one of the selected backup sets.
4 Click Catalog.
Backup Exec runs the catalog operation.
See “Backup sets ” on page 341.
See “How Backup Exec catalogs work” on page 242.
Chapter 6
Job management and
monitoring
This chapter includes the following topics:
Job monitoring
You can monitor your active jobs and scheduled jobs from the Job Monitor tab or
from the Jobs list on the Backup and Restore tab or the Storage tab. You can
monitor the types of jobs that are active and scheduled, the state and status of the
jobs, the schedule, and other details. The status of reports can be monitored from
the Reports tab.
Job management and monitoring 250
How to monitor and manage jobs in Backup Exec
The Job Monitor tab The Job Monitor provides a single location
to monitor and manage all of your backup,
restore, installation, and storage operation
jobs. The Job Monitor is divided into two
panes. The Jobs pane displays the details
of all of your active jobs and scheduled jobs.
The Job Histories pane displays the details
about all of your jobs that ran recently. By
default, all recent jobs appear in the Job
Histories pane. You can change the default
by filtering the Job Histories view.
Note: Report jobs do not appear on the Job
Monitor. To monitor and manage report jobs,
go to the Reports tab.
The Backup and Restore tab When you double-click a server name on the
Backup and Restore tab, details for that
server become available. You can view the
backup and restore jobs that are scheduled
and active for the selected server. You can
also see the history of backup and restore
jobs that were processed on the selected
server.
The Reports tab On the Reports tab, you can see the
scheduled reports in the See Upcoming
report group, and you can see a list of reports
that completed in the See Completed report
group.
Job management
Backup Exec includes many features that enable you to manage backup jobs,
restore jobs, and storage operation jobs.
Job management and monitoring 251
About the Job Monitor
Note: Report jobs do not appear on the Job Monitor. To monitor and manage
report jobs, go to the Reports tab.
You can manage active and scheduled jobs in the Jobs pane on the Job Monitor
in the following ways:
■ Edit scheduled jobs.
■ Delete scheduled jobs.
■ Cancel active jobs.
■ Change the priority of scheduled jobs.
■ Run a scheduled job immediately.
■ Hold a job or the job queue.
■ Run a test backup job.
■ View the job activity details for an active job.
■ View the history of a job.
■ Retry only failed resources.
■ Run backup job with debugging enabled.
In the Job History pane of the Job Monitor, you can manage completed jobs in
the following ways:
■ Run the job again immediately.
■ View the job log.
■ Delete the job.
■ View the job history details.
■ Enable error-handling rules.
■ Duplicate job histories.
■ Run a verify backup job.
■ Edit the settings for a backup job.
■ Retry only failed resources.
■ Run backup job with debugging enabled.
From the Job Monitor, you can restore data from the backup sets of a completed
backup job. Additionally, you can view the backup calendar.
See “How to monitor and manage jobs in Backup Exec” on page 249.
Job management and monitoring 253
About the Job Monitor
To view job activity from the Job Monitor Select the Job Monitor tab.
tab
To cancel the job from the Job Monitor Select the Job Monitor tab.
tab
Job management and monitoring 254
About the Job Monitor
2 Right-click the active job that you want to cancel, and then click Cancel.
3 Click Yes to confirm the cancellation of the job.
See “List of job statuses in Backup Exec” on page 277.
Holding jobs
Active and scheduled jobs can be placed on hold. When you place an active job
on hold, the job continues to run until it is complete. However, the next scheduled
occurrence of that job is placed on hold. When you place a job on hold, the status
in the Job Status column changes to On Hold.
To hold jobs
1 Do one of the following:
To place a job on hold from the Job Select the Job Monitor tab.
Monitor tab
Job management and monitoring 255
About the Job Monitor
To hold a single job Select the job from the list of jobs, and then
in the Jobs group, click Hold. Then select
Hold Job.
To hold all active jobs In the Jobs group, click Hold, and then
click Hold All Active Jobs. You may need
to click Yes to confirm that you want to hold
all of the active jobs.
Note: This option is available only from
the Job Monitor.
To hold all scheduled jobs In the Jobs group, click Hold, and then
click Hold All Scheduled Jobs. You may
need to click Yes to confirm that you want
to hold all of the scheduled jobs.
Note: This option is available only from
the Job Monitor.
To remove the hold on jobs from the Job Select the Job Monitor tab.
Monitor tab
Job management and monitoring 256
About the Job Monitor
To remove the hold on a single job Select the job from the list of jobs, and then
in the Jobs group, click Hold. Then select
Hold Job to remove the check mark.
Note: If the job that you want to hold is part
of a backup definition, you may need to
double-click the job definition to view the job.
To remove the hold on all active jobs In the Jobs group, click Hold, and then click
Hold All Active Jobs to remove the check
mark. You may need to click Yes to confirm
that you want to remove the hold on all of the
active jobs.
Note: This option is available only from the
Job Monitor.
To remove the hold on all scheduled jobs In the Jobs group, click Hold, and then click
Hold All Scheduled Jobs to remove the
check mark. You may need to click Yes to
confirm that you want to remove the hold on
all of the scheduled jobs.
Note: This option is available only from the
Job Monitor.
To place the job queue on hold from the Select the Job Monitor tab.
Job Monitor tab
2 In the Jobs group, click Hold, and then click Hold Job Queue.
3 Click Yes.
4 If active jobs are running, select the active jobs that you want to cancel, and
then click OK.
See “Removing the hold on the job queue” on page 257.
To remove the hold on the job queue from Select the Job Monitor tab.
the Job Monitor tab
2 In the Jobs group, click Hold, and then click Hold Job Queue to remove the
check box.
See “Holding the job queue” on page 256.
Job management and monitoring 258
About the Job Monitor
To run the job from the Job Monitor tab Select the Job Monitor tab.
2 Right-click the scheduled job that you want to run, and then click Run Now.
Note: If the scheduled job is part of a backup definition, you may need to
double-click the job definition to view the scheduled job.
To change the job's priority from the Job Select the Job Monitor tab.
Monitor tab
Note: If the job is part of a backup definition, you may need to double-click the
job definition to view the job.
Note: If a backup definition includes more than one type of job, then you cannot
use the Delete option to delete an individual job from the definition. Instead, you
must edit the job definition to remove the scheduled job.
To delete a scheduled job from the Job Select the Job Monitor tab.
Monitor tab
Note: If the job is part of a backup definition, you may need to double-click the
job definition to view the job.
3 Click Yes.
See “How to monitor and manage jobs in Backup Exec” on page 249.
to run the job again. This time only the 2 virtual machines that failed during the
immediate previous run of that backup job are backed up. The 3 virtual machines
that were backed up successfully are not backed up again.
If a backup job is enabled for Simplified Disaster Recovery and failure occurs in
one or more of the critical resources, then when you retry the failed backup job, all
the critical resources are backed up again. Even the critical resources that may
have backed up successfully in the immediate previous run of that backup job.
In a CAS-MMS environment, for jobs delegated from the CAS server, the option to
run retry failed backup is only available from the CAS user interface. The option is
disabled for the delegated jobs on the MMS user interface.
To retry only failed resources
1 Do one of the following:
To retry the failed resource from the Job Select the Job Monitor tab.
Monitor tab
can then make changes to the jobs that have an issue. After the job is complete,
you have all debug logs that you need to share with technical support.
To run a job with debugging enabled
1 Do one of the following:
To run the job with debugging enabled from Select the Job Monitor tab.
the Job Monitor tab
■ Rerun a job.
■ Duplicate the data from a completed backup job.
■ Verify a backup job.
■ Enable error-handling rules for a failed job.
See “Running a job from the Job History” on page 264.
See “Viewing the job log ” on page 267.
See “Deleting a job from the Job History” on page 263.
See “Enabling an error-handling rule for a failed job” on page 275.
See “Duplicating backup sets or a job history manually” on page 216.
See “Verifying backed up data manually” on page 222.
To view the history of a job from the Job On the Job Monitor tab, locate the job in
Monitor tab the Job Histories pane.
To delete a job from the Job History on the On the Job Monitor tab, locate the job in
Job Monitor tab the Job Histories pane.
2 Right-click the job that you want to delete, and then click Delete.
You can select multiple jobs by selecting a job, and then pressing the <Ctrl>
or <Shift> keys while you click other jobs that you want to select. This lets you
perform tasks such as Delete on more than one job at a time, as long as the
jobs are of similar type.
You can delete up to 2500 jobs from the Job History. If you attempt to delete
more than 2500 jobs, you are prompted to continue with the deletion.
3 Click Yes.
See “About the Job History” on page 262.
See “Configuring database maintenance and security” on page 597.
To run a job from the Job History on the On the Job Monitor tab, locate the job in
Job Monitor tab the Job Histories pane.
To run a job from the Job History on the ■ On the Backup and Restore tab or the
Backup and Restore tab or the Storage Storage tab, double-click the server or
tab the storage device where the job ran.
■ In the left pane, click Job History.
2 Right-click the job that you want to run, and then click Run Now.
See “About the Job History” on page 262.
Job management and monitoring 265
About the Job History
To retry the failed resource from the Job On the Job Monitor tab, locate the job in
Monitor tab the Job Histories pane.
A dialog box is displayed stating that the job will run immediately and also run
as per the defined schedule.
3 Click Yes.
The job starts and only the resource that failed during the immediate previous
run of the job is backed up.
Run backup job with debugging enabled from the Job History
You can run a backup and restore job with automatic debugging enabled. When
you call technical support with an issue in your backup or restore job, technical
support asks you to gather the debug logs. With the help of the debug logs, support
can then make changes to the jobs that have an issue. After the job is complete,
you have all debug logs that you need to share with technical support.
To run a job with debugging enabled
1 Do one of the following:
To run the job with debugging enabled from On the Job Monitor tab, locate the job in
the Job Monitor tab the Job Histories pane.
To view the job log from the Job Monitor On the Job Monitor tab, locate the job in
tab the Job Histories pane.
To view the job log from the Backup and Do the following:
Restore tab or the Storage tab
■ On the Backup and Restore tab or the
Storage tab, double-click the server or
the storage device where the job ran.
■ In the left pane, click Job History.
To find text in the job log from the Job On the Job Monitor tab, in the Job
Monitor tab Histories pane, locate the job for which
you want to search the job log.
Job management and monitoring 268
Viewing the job log
To find text in the job log from the Backup Do the following:
and Restore tab or the Storage tab
■ On the Backup and Restore tab or the
Storage tab, double-click the server or
the storage device where the job ran.
■ In the left pane, click Job History.
Match whole word only Check this check box if you want Backup
Exec to search for the whole word you
typed. If you do not select this option,
Backup Exec finds the text that includes
part of the word. For example, if you search
for the word "file" and do not select this
option, Backup Exec finds all occurrences
of "file", "files", "filed", and any other words
that contain "file". If you do select this
option, Backup Exec finds only the
occurrences of "file".
Highlight all matches Check this check box if you want Backup
Exec to highlight the text that matches the
search criteria. The option is selected by
default.
To access the job log from the Job On the Job Monitor tab, locate the job in
Monitor tab the Job Histories pane.
To access the job log from the Job On the Job Monitor tab, locate the job in
Monitor tab the Job Histories pane.
Linking from the job log to the Veritas Technical Support website
Errors that are reported in the job log have a unique code, called a Unique Message
Identifier (UMI). These codes contain hyperlinks that you can click to go to the
Veritas Technical Support website. From the website, you can access technical
notes and troubleshooting tips that are related to a specific message. UMI codes
establish unique message codes across all Veritas products.
Some alerts also contain a UMI. For example, if a Warning alert appears when a
job fails, the alert includes the UMI code.
You can create or enable an error-handling rule for errors. These rules let you set
options to retry or stop a job when the error occurs.
See “Error-handling rules for failed or canceled jobs” on page 272.
To link from the job log to the Veritas Technical Support website
1 Do one of the following:
To link to the job log from the Job Monitor Select the Job Monitor tab.
tab
To link to the job log from the Backup and Do the following:
Restore tab or the Storage tab
■ On the Backup and Restore tab or the
Storage tab, double-click the server or
the storage device where the job ran.
■ In the left pane, click Job History.
■ Job name
■ Job type
■ Job log name
■ Backup Exec server name
■ Storage device
■ Starting date and time
■ Errors encountered
■ Ending date and time
■ Completion statistics
Prefix for the job log file name Enter a prefix to add to the job logs that
are processed. The default prefix is BEX.
The job log file name consists of
Prefix_ServerName_Count. Prefix is the
label that you enter in this field,
ServerName is the name of the Backup
Exec server that ran the job, and Count is
the number of job logs that this job has
produced
Attach job logs as HTML Select this option to attach the job logs in
an HTML format when an email notification
is sent.
Attach job logs as text Select this option to attach the job logs in
a text format when an email notification is
sent.
Job log path Shows the current location of the job log.
To change the path you can use BE Utility.
Each default error-handling rule applies to one category of errors, such as Network
Errors or Security Errors. Default error-handling rules are disabled by default, so
you must edit a rule and enable the rules that you want to use. You cannot delete
default error-handling rules, add specific error codes to a category, or add new error
categories. Before the error-handling rules will apply, the final error code must be
in an error category that is associated with a rule, and the rule must be enabled.
To apply an error-handling rule for a specific error code that is in an error category,
you can create a custom error-handling rule. You can select up to 28 error codes
in an error category that a custom error-handling rule can apply to. You can also
add an error code to an existing custom rule.
A custom error-handling rule named "Recovered Jobs" is created when Backup
Exec is installed and is enabled by default. This rule applies retry options and a
final job disposition to jobs that fail and that are not scheduled to run again.
See “Creating a custom error-handling rule” on page 273.
If both a custom error-handling rule and a default error-handling rule apply to a
failed job, the settings in the custom rule are applied to the job.
6 Under Available errors, check the check box of the error code that you want
this rule to apply to. You can select up to 28 error codes.
7 If you want Backup Exec to retry the job after it fails, check Retry job, and then
enter the number of times you want to retry the job and how often you want to
retry the job.
The maximum number of retries is 99. The maximum retry interval is 1440
minutes.
8 Under Final job disposition, select the way you want to handle the job after
the maximum number of retries.
If you choose the option to place the job on hold until the error condition is
cleared manually, you must manually remove the hold from the job after you
manually clear the error condition.
9 Click OK.
See “Custom error-handling rule for recovered jobs” on page 275.
See “About the cluster failover error-handling rule” on page 276.
4 Click OK.
See “Error-handling rules for failed or canceled jobs” on page 272.
To enable an error-handling rule from the Select the Job Monitor tab.
Job Monitor tab
To enable an error-handling rule from the On the Backup and Restore tab or the
Backup and Restore tab or the Storage Storage tab, in the left pane, select Job
tab History.
Table 6-2 Error codes for recovered jobs custom error-handling rule
Note: If the Central Admin Server feature is installed, additional error codes are
selected.
Status Description
Queued The job has been initiated, but Backup Exec is actively looking
for a suitable drive or media.
Cancel Pending Backup Exec cannot process the Cancel request immediately.
This status is displayed until the job is actually canceled. The
job is then displayed in the job history with a status of
Canceled.
Loading Media The media is being loaded and positioned on the target
device.
Device Paused The device that the job was sent to is paused.
Status Description
Media Request You must insert media for the job to continue.
Status Description
Completed with The job completed, but some files were in use, skipped, or
exceptions corrupted.
Job management and monitoring 279
List of job statuses in Backup Exec
Status Description
Failed over The job ran in a cluster environment and was active on one
computer, and then the cluster performed a failover and the job
was restarted on another computer in the cluster. Two separate
sets of job history are available when a job is failed over. The first
job history includes the failed over status and the second job history
includes the status that is appropriate for the completed job.
Resumed The status is the same as the failed over status, however the
Enable checkpoint restart option was selected.
Canceled, timed out The Cancel the job if it is still running x hours after its
scheduled start feature was enabled and the job was not
completed within the specified timeframe.
Failed The operation took place, but one or more significant errors
occurred. The job log should indicate what caused the errors so
that you can decide if you want to run the job again. For example,
if a job failure occurred due to a lost connection during job
processing, you could choose to resubmit the job when the
connection is restored.
A failed job has an error message in the Errors section of the job
log with a link to the Veritas Technical Support website.
A job may fail for the following reasons:
■ The storage device that was selected for the job was not
available when the job ran.
■ The logon account that was used in the backup job is incorrect.
Verify that the logon account information is valid for the resource
being backed up.
■ A problem occurred with the storage device when the job ran.
■ The computer being backed up was shut down before or during
the backup job.
Recovered The job was active when the status of the managed Backup Exec
server was changed from Communication Stalled to No
Communication. The custom error-handling rule for Recovered
Jobs was applied to the job.
Job management and monitoring 280
List of job statuses in Backup Exec
Status Description
Missed The job did not run during the scheduled time window. The job is
rescheduled to run based on the time window that you configured.
Status Description
Invalid Schedule The scheduled job will not run because of a scheduling
issue.
Not in time window The job was ready to be sent for processing, but the time
window for the job closed.
Status Description
Ready The job is ready to run, but cannot for one of the following
reasons:
Status Description
Server Paused The job is ready, but the Backup Exec server has been
paused. No jobs are dispatched while the Backup Exec
server is paused.
Rule Blocked The job cannot run because one or more of the settings in
the backup definition cannot be satisfied.
The Rule Blocked status may appear for any of the
following reasons:
By lowering the amount of time before Backup Exec reaches the threshold for
changing a job’s status to stalled, you can receive an earlier notification that jobs
have stalled. A shorter time between the stalled and recovered thresholds also
allows Backup Exec to fail and then recover the stalled jobs earlier. However, setting
the thresholds too low may force a job to be recovered when it is not necessary.
Backup Exec recovers the jobs by using the custom error-handling rule named
Recovered Jobs. This custom error-handling rule is created and enabled when
Backup Exec is installed, and specifies that stalled, failed, and recovered jobs are
retried two times, with an interval of five minutes between the retries.
Jobs that are stalled and then failed and recovered by Backup Exec because of
unresponsive Backup Exec services are displayed differently in Backup Exec than
the jobs that fail because of errors in normal daily activities. The
stalled/failed/recovered jobs are not indicated in red text in the job history as other
failed jobs are. Instead, these jobs are displayed in gray text with a job status of
Recovered.
In the job history, the error category is listed as Job Errors. The job history indicates
the type of internal communication error that occurred and that the job was
recovered. Based on the type of error that occurred, a log file may or may not be
associated with the recovered job.
To set job status and recovery options
1 Click the Backup Exec button, click Configuration and Settings, and then
click Backup Exec Settings.
2 In the left pane, click Job Status and Recovery.
3 Set the thresholds for stalled and recovered jobs.
4 Click OK.
Job management and monitoring 284
Setting job status and recovery options
■ Enabling active alerts and alert history to display on the Home tab
■ Filtering alerts
■ Deleting recipients
Item Description
By default, most alerts are enabled, which means that they appear in the Active
Alerts pane when they occur. You can disable warning alerts and informational
alerts by editing alert category properties. However, error alerts and attention
Alerts and notifications 287
Where to find alerts in Backup Exec
required alerts cannot be disabled. You can filter the alerts so that only specific
alerts appear.
See “Configuring alert categories” on page 302.
From the Home tab, you can view all active alerts or filter the alerts to view only
specific alert severities or only the alerts that occurred on certain dates. On the
Backup and Restore tab, when you double-click a server, you can see the active
alerts that are specific to that server. Similarly, on the Storage tab, when you
double-click a type of storage, you can see the active alerts that are specific to that
storage device.
Alerts remain in the Active Alerts pane until they receive a response. You can
respond to an alert manually or you can configure Backup Exec to respond to some
alerts automatically after a specified length of time. Depending on the alert severity,
a response might not be required, such as with informational alerts. After you
respond to an alert, Backup Exec moves it to the alert history. Alert history is
available on the Home tab, the Backup and Restore tab, and the Storage tab. In
addition, an Alert History report is available from the Reports tab.
See “Alert History report” on page 702.
See “Responding to active alerts” on page 293.
You can configure notifications to inform recipients when alerts occur. For example,
you can notify a backup administrator by email or cell phone text message when a
critical alert occurs.
See “Setting up notification for alerts” on page 294.
To assist with hardware troubleshooting, Backup Exec displays alerts for SCSI
event ID 9 (storage timeout), ID 11 (controller error), and ID 15 (storage not ready).
Table 7-2 Where alerts appear on the Backup Exec Administration Console
Backup and Restore tab On the Backup and Restore tab, active
alerts are listed for each server on the list of
servers. Also, when you double-click a server,
you can select Active Alerts in the left pane
to display all of the active alerts for that
server. When you select Active Alerts in the
left pane, the Show Alert History option also
becomes available in the Alerts group at the
top of the dialog box.
Table 7-2 Where alerts appear on the Backup Exec Administration Console
(continued)
Backup Exec status bar The Backup Exec status bar shows the
number of active alerts for each type of alert.
Double-click in the Alerts section of the
Backup Exec status bar to see a list of all the
active alerts and the alert history, along with
details of those alerts.
■ Check the Active Alerts check box to see a list of active alerts.
■ Check the Alert History check box to see a list of all alerts that occurred
on the server.
See “Active alerts properties ” on page 290.
Item Description
Severity Indicates the severity of the alert. The severity helps you determine
how quickly you want to respond.
The following alert severity levels may appear:
■ Error
■ Warning
■ Information
■ Attention Required
Category Indicates the condition that caused the alert. Categories include
Database Maintenance, General Information, Device Error, or Job
Failed.
Date and Time Shows the date and time when the alert was received.
Job Name Indicates the name of the job that triggered the alert. This column
is blank if a job triggered the alert, such as for general information
alerts.
Storage Shows the name of the storage device on which the alert occurred.
Server Shows the name of the server on which the alert occurred.
Alerts and notifications 291
Viewing the alert history for a server or a storage device
Item Description
■ System
■ Job
■ Storage
■ Media
2 On the Alerts dialog box, select either the Active Alerts tab or the Alert
History tab, depending on whether the alert you want to copy is active or in
the alert history.
3 Right-click the alert that you want to copy, and then click Copy.
Note: You can also select an alert, and then press Ctrl + C as a shortcut to
copy the alert text. In addition, you can copy multiple alerts by using Shift +
Click or Ctrl + Click.
4 Open the document or email to which you want to copy the alert text, right-click
in the document or email, and then select Paste.
Filtering alerts
You can filter the alerts that appear in the Active Alerts pane on the Home tab.
Filters are useful when you have many alerts and you want to only view specific
alert types. Alerts can be filtered by severity, time, and source. For example, you
can choose to view only the error alerts that occurred during the last 12 hours for
jobs.
Alerts and notifications 293
Viewing the job log from an alert
To filter alerts
1 On the Home tab, locate the Active Alerts pane.
If the Active Alerts pane does not appear, you must enable the alert details.
See “Enabling active alerts and alert history to display on the Home tab”
on page 289.
2 Use any combination of the following options to filter the alerts list:
■ In the Source field, select the source of the alerts that you want to view.
■ In the Time field, select the time frame for which you want to view alerts.
■ In the Severity field, select the severity levels of the alerts that you want
to view, such as Error or Warning.
alerts that require a response. If you have set filters, only those alerts that are
selected appear in addition to any alerts that require a response.
If you click Close on the alert response dialog box, the dialog box closes, but the
alert remains active. To clear the alert, you must select a response such as OK,
Yes, No, or Cancel. You can configure automatic responses for some alert
categories.
See “Configuring alert categories” on page 302.
Some alerts provide a Unique Message Identifier (UMI) code. This code is a
hyperlink to the Veritas Technical Support website. You can access the technical
notes that are related to the alert.
To respond to an active alert
1 Access the Active Alerts pane on the Home tab, the Backup and Restore
tab, or the Storage tab.
2 Right-click the alert that you want to respond to, and then click Respond or
Respond OK.
3 Click a response for the alert, such as Respond OK or Respond.
Step Action
Step 1 Configure the method you want to use to notify the recipient. The notification
methods are text message or email.
See “Configuring email or text message notification for alerts” on page 295.
Step 2 Add the contact information for the people or groups that you want to
receive notifications.
Step 3 Assign each recipient to the receive notifications for specific alert
categories.
After the sender's email information has been entered, then information about
recipients can be set up.
Note: After you configure email or text message notification, you cannot remove
the configuration to disable notifications. However, you can disable notification for
individual recipients.
4 Click OK.
You can now add information about the recipients who need to receive alert
notifications.
See “Adding recipients for notification” on page 297.
group receives notifications by the method that is indicated for the individual; email,
text message, or both.
Note: Information about the notification sender must be configured before recipients
can be configured.
See “Configuring email or text message notification for alerts” on page 295.
To add recipients for email or text message notification
1 Click the Backup Exec button, and then select Configuration and Settings.
2 Select Alerts and Notifications, and then select Notification Recipients.
3 On the Manage Recipients dialog box, click Add a recipient.
4 In the Name field, type the name of the recipient.
5 Select the method of notification for this recipient:
6 Click OK.
You can now assign the recipients to the alert categories for which they should
receive notifications.
See “Assigning recipients to receive notifications for specific alert categories”
on page 304.
Note: Instead of disabling notifications completely, you can also change the alert
categories for which a recipient receives notifications.
See “Disabling notifications for a specific alert category” on page 305.
5 Click OK.
Deleting recipients
You can delete the recipients that do not want to receive notification messages.
The recipient is permanently removed upon deletion. Alternatively, you can disable
notification for recipients.
Alerts and notifications 302
Configuring alert categories
Enable alerts for this category Enables or disables the alert. You cannot
disable error and attention required alerts.
Include the job log with email Sends the job log to the recipient that is
notifications configured for notification. If you select this
option, be sure to select at least one
recipient from the Send notification to the
following recipients area at the bottom
of the dialog box.
Record event in the Windows Event Log Enters the alert into the Windows Event
Viewer. The Windows Event log displays
all the property information for the alert.
Send notification to the following Lets you select the name of a recipient to
recipients notify when this type of alert occurs. You
must have recipients configured to use this
option.
3 Select the check box for each recipient that you want to notify when each type
of job completes.
4 To send the job log with the notification to an email address, check Include
job log in email notifications.
5 You can continue selecting other options from the Options dialog box or click
OK.
Item Description
Include job log in email notifications Enables Backup Exec to include a copy of
the job log with the notification. This option
applies only to email recipients. The
maximum attachment size, in kilobytes, can
be configured in the following registry key:
5 In the Display pop-up alerts for the following alert types group box, check
the check boxes for the types of alerts that you want to see in a pop-up alert.
Clear the check boxes for the types of alerts that you do not want to see in a
pop-up alert.
6 In the Number of seconds to display pop-up alerts field, enter the amount
of time you want pop-up alerts to remain on the screen.
7 Click OK.
3 In the Display pop-up alerts for the following alert types group box, check
the check boxes for the types of alerts that you want to see in a pop-up alert.
Clear the check boxes for the types of alerts that you do not want to see in a
pop-up alert.
4 Click OK.
Job Canceled 1302.3.1.2.8.2 Backup Exec: Job machine name job name local or remote
canceled by Operator name
Operator
Job Failed 1302.3.1.2.8.1 Backup Exec: Job machine name job name detail message
failed
Storage device 1302.3.2.5.3.3 Backup Exec: machine name job name detail message
requires human Storage device
intervention requires attention
Alerts and notifications 309
SNMP traps for Backup Exec alerts
Robotic library 1302.3.2.4.3.3 Backup Exec: machine name job name detail message
requires human robotic library
intervention device requires
attention
Simplified Disaster 1302.3.1.4.2.1.2 SDR full backup machine name job name detail message
Recovery Message success
Backup Exec 1302.3.1.1.9.3 The application machine name job name detail message
system error has encountered
an error
Backup Exec 1302.3.1.1.9.4 Information on machine name job name detail message
general information normal events
Job Success 1302.3.1.2.8.3 The job machine name job name detail message
succeeded
Job Success with 1302.3.1.2.8.4 The job machine name job name detail message
exceptions succeeded, but
there was a
problem
Job Started 1302.3.1.2.8.5 The job has machine name job name detail message
started
Job Completed 1302.3.1.2.8.6 The job machine name job name detail message
with no data succeeded, but
there was no data
Job Warning 1302.3.1.2.8.7 The job has a machine name job name detail message
warning
PVL Device Error 1302.3.1.5.1.1.1 The device has machine name job name detail message
encountered an
error
PVL Device 1302.3.1.5.1.1.2 The device has machine name job name detail message
Warning encountered a
warning
PVL Device 1302.3.1.5.1.1.3 Normal device machine name job name detail message
Information information
PVL Device 1302.3.1.5.1.1.4 Device requires machine name job name detail message
Intervention attention
Alerts and notifications 310
SNMP traps for Backup Exec alerts
PVL Media Error 1302.3.1.5.2.1.1 There is an error machine name job name detail message
with the media
PVL Media 1302.3.1.5.2.1.2 There may be a machine name job name detail message
Warning problem with the
media
PVL Media 1302.3.1.5.2.1.3 Normal media machine name job name detail message
Information information
PVL Media 1302.3.1.5.2.1.4 Media requires machine name job name detail message
Intervention attention
Catalog Error 1302.3.1.5.3.1.1 There is an error machine name job name detail message
with the catalog
Tape Alert Error 1302.3.1.5.4.1.1 There is a machine name job name detail message
TapeAlert error
Tape Alert Warning 1302.3.1.5.4.1.2 There is a machine name job name detail message
TapeAlert warning
Tape Alert 1302.3.1.5.4.1.3 Normal TapeAlert machine name job name detail message
Information information
Database 1302.3.1.5.5.1.2 Normal database machine name job name detail message
Maintenance maintenance
Information information
Install Update 1302.3.1.5.7.1.1 There is an install machine name job name detail message
Warning warning
Install Update 1302.3.1.5.7.1.2 Normal Install machine name job name detail message
Information information
See “Installing and configuring the SNMP system service” on page 310.
Smi2smir /d Backup_Exec_MIB
Chapter 8
Disk-based and
network-based storage
This chapter includes the following topics:
■ Backup sets
NDMP servers NDMP servers are network-attached storage (NAS) that supports the
Network Data Management Protocol (NDMP) to allow the use of devices
that are attached to the servers.
Cloud storage Cloud storage devices are the storage devices that are configured on
devices the cloud hosted by the cloud storage service provider.
Remote Media The Remote Media Agent for Linux lets you back up data from remote
Agent for Linux computers to the storage devices that are directly attached to a Linux
server.
See “About the Remote Media Agent for Linux ” on page 1392.
For information about the best practices to manage disk-based storage in Backup
Exec, refer to Backup Exec Best Practices.
See “Storage trending statuses for disk storage and virtual disks” on page 315.
See “How data lifecycle management (DLM) deletes expired backup sets on
disk-based storage” on page 335.
See “Viewing jobs, job histories, backup sets, and active alerts for storage devices”
on page 470.
See “Backup sets ” on page 341.
History of used space is still being This status may appear for any of the
gathered following reasons:
Not enough statistical information is Backup Exec has not collected enough
available sample data for statistical analysis.
Note: After you create disk storage, Backup
Exec may take approximately one month to
gather enough information to provide a
storage estimate.
sends an alert, and the data lifecycle management feature immediately searches
the device for expired backup sets that it can delete.
Data lifecycle management also runs on a disk cartridge if the cartridge reaches
capacity during a backup job. The backup may not need to span to another cartridge
if data lifecycle management deletes enough expired backup sets. If a job does
span and you insert a new disk cartridge that is full, data lifecycle management
deletes expired backup sets on the new cartridge.
To set low disk space thresholds on disk-based storage
1 On the Storage tab, double-click the storage on which you want to change the
low disk space thresholds.
2 In the left pane, click Properties.
3 Change the value on any or all of the following properties:
■ Low disk space.
The first low disk space threshold at which you want Backup Exec to send
an alert. The default value is 25%.
■ Low disk space - Warning.
The second low disk space threshold at which you want Backup Exec to
send an alert. The default value is 15%. This threshold must be less than
the Low disk space threshold.
■ Low disk space - Critical.
The third low disk space threshold at which you want Backup Exec to send
an alert. The default value is 5%. This threshold must be less than the
Warning threshold.
4 Click Apply.
See “How data lifecycle management (DLM) deletes expired backup sets on
disk-based storage” on page 335.
can also keep the backup sets from automatically expiring by retaining the backup
sets. Backup Exec then retains all dependent backup sets as well.
To be eligible for configuration as disk storage, a disk must have at least 1 GB of
disk space and cannot be configured as deduplication disk storage. Although you
can configure disk storage and deduplication disk storage on the same disk, it is
not recommended.
When you create disk storage on a disk that is attached to the network, you must
specify the path to an existing share. You should use the server name in the UNC
path rather than an IP address.
Note: Before you create the disk storage on a network share, you must give read
and write permissions to the Backup Exec service account. The Backup Exec
service account is on the Backup Exec server that you want to access the network
share.
For information about the best practices to use hot-pluggable devices in Backup
Exec, refer to Backup Exec Best Practices.
When you create disk storage on a local disk, Backup Exec lets you specify any of
the following locations:
■ Volumes with or without drive letters.
You can create only one disk storage on a volume.
■ Unformatted partitions.
Backup Exec formats and partitions the drive for you, if necessary.
■ Drives that do not have partitions.
Backup Exec creates a folder named BEControl on the root of the volume. Do not
delete or edit the contents of the BEControl folder, and do not copy it to other
volumes or drive letters.
In Windows Explorer, the backup files that the disk storage device contains display
with a .bkf file extension. Each disk storage device also contains a file named
changer.cfg and a file named folder.cfg, which store information about the backup
files. Do not delete or edit the changer.cfg or folder.cfg files.
A subfolder with a prefix of IMG in the name may display in a disk storage device.
This subfolder appears if the option to enable Granular Recovery Technology (GRT)
was selected for backup, or if you select the disk storage device as storage for
backup data.
You must use the Configure Storage wizard to create disk storage. In the
Configure Storage wizard, Backup Exec provides a list of disks on which you can
create disk storage. The disks do not appear in the list in the alphabetical order of
Disk-based and network-based storage 319
Configuring disk storage
the drive letter. Instead, the disk that appears first in the list has the most amount
of disk space. You can select any disk that you want, but the disk that Backup Exec
recommends for use appears at the top of the list. The disk that you use as the
system drive always appears last in the list. It is recommended that you do not
configure disk storage on the system drive.
Note: If Windows data deduplication is enabled on the disk storage volume, Backup
Exec excludes the backup data in the folder \BEData from deduplication, unless
the \BEData folder already exists. Backup Exec must exclude backup data from
deduplication for you to use Simplified Disaster Recovery (SDR) to perform a local
recovery of the Backup Exec server.
If Windows data deduplication is enabled on the disk storage volume, local disaster
recovery using SDR fails. The Windows Preinstallation Environment (Windows PE)
that SDR uses cannot read the files that Windows data deduplication processes.
If the Central Admin Server feature is not Click Disk-based storage, and then click
installed Next.
If the Central Admin Server feature is Do the following in the order listed:
installed
■ Select the Backup Exec server on
which you want to configure storage,
and then click Next.
■ Click Disk-based storage, and then
click Next.
Note: When you copy files from the original disk storage device to the new location,
do not copy .cfg files.
7 In Windows Explorer, copy and paste the following files from the \BEData folder
on the original volume to the \BEData folder on the new volume:
■ .Bkf files
■ Any subfolders with a prefix of IMG in the name
8 In Windows Explorer, delete all of the files from the original disk storage device.
9 On the Backup Exec Administration Console, on the Storage tab, right-click
the original disk storage device, and then click Delete.
10 Rename the new disk storage device with the name of the original disk storage
device.
11 Right-click the new disk storage device, and then click Inventory and Catalog.
See “Inventorying and cataloging a storage device” on page 473.
See “Configuring disk storage” on page 317.
Maximum file size Displays the maximum file size on the disk
storage. The data from the backup job is
contained in a file on the disk.
Preallocate disk space incrementally up Creates the file when the backup job starts
to the maximum file size by preallocating space incrementally,
according to the size of the increment that
you set in Preallocation increment. As
the job uses the disk space, more disk
space is preallocated up to the maximum
file size. When the job completes, the file
size is then reduced to the amount of disk
space that the job used.
Auto detect block and buffer size Indicates if Backup Exec automatically
detects the preferred settings for the block
size and buffer size for the disk storage.
Low disk space - Critical Displays the critically low disk space
threshold at which you want Backup Exec
to send an alert. The color of the capacity
bar on the Storage tab turns red to indicate
critically low available space. Backup Exec
sends alerts when the amount of free disk
space drops below the low disk space
threshold, and again if it drops below the
warning threshold. The amount of free disk
space does not include the disk space that
is reserved for non-Backup Exec
operations.
Low disk space - Warning Displays the low disk space threshold at
which you want Backup Exec to send an
alert. The color of the capacity bar on the
Storage tab turns orange to indicate a low
disk space condition. If free disk space
drops below the warning threshold to the
critical threshold, another alert is sent. The
amount of free disk space does not include
the disk space that is reserved for
non-Backup Exec operations.
You can change the value of the threshold.
This threshold must be less than the low
disk space threshold.
Disk space to reserve for non-Backup Displays the amount of disk space to set
Exec operations aside for applications other than Backup
Exec.
The default value is 10 MB.
4 Click Apply.
See “Configuring disk storage” on page 317.
If the Central Admin Server feature is not Click Disk-based storage, and then click
installed Next.
If the Central Admin Server feature is Do the following in the order listed:
installed
■ Select the Backup Exec server that you
want to configure storage for, and then
click Next.
■ Click Disk-based storage , and then
click Next.
Maximum file size Displays the maximum file size on the disk
cartridge. The data from the job is
contained in a file on the disk cartridge.
Preallocate disk space incrementally up Creates the file when the job starts by
to the maximum file size preallocating space incrementally,
according to the size of the increment that
you set in Preallocation increment. As
the job uses the disk space, more disk
space is preallocated up to the maximum
file size. When the job completes, the file
size is then reduced to the amount of disk
space that the job used.
Auto detect block and buffer size Indicates if Backup Exec automatically
detects the preferred settings for the block
size and buffer size for the disk storage.
Low disk space - Critical Displays the disk space threshold at which
the color of the capacity bar on the
Storage tab turns red to indicate critically
low available space. Backup Exec does
not send low disk space alerts for disk
cartridge devices.
Low disk space - Warning Displays the disk space threshold at which
the color of the capacity bar on the
Storage tab turns orange to indicate a low
disk space condition. Backup Exec does
not send low disk space alerts for disk
cartridge devices.
4 Click Apply.
4 Click Apply.
the backup set is displayed as expired, the data is available until all dependent
backup sets expire as well.
For example, you create a backup definition that contains a full backup and an
incremental backup for the C: volume on a server. The first full backup runs, followed
by the first incremental backup, and then the second incremental backup. The
second full backup runs, followed by the third incremental backup, and then the
fourth incremental backup. No more backups are run. All of the backup sets created
by these backups eventually expire and are deleted by DLM. However, the backup
sets that resulted from the second full backup and the third and fourth incremental
backups are kept.
Backup Exec keeps these related backup sets because they are the most recent
backup sets that you need to restore the C: volume. By keeping the last related
backup sets, you have the data to restore the volume.
Warning: DLM deletes all expired backup sets that are created by a one-time
backup job. DLM does not keep the last backup set after the retention date expires
if the backup set is from a one-time backup.
To prevent the backup sets from being automatically deleted, you can manually
retain specific backup sets or you can change the expiration date of the backup
set. If you retain a backup set, Backup Exec then retains all dependent backup sets
as well.
See “Retaining backup sets on disk-based storage to prevent them from expiring”
on page 345.
See “Changing the expiration date of backup sets on disk-based storage”
on page 344.
DLM searches for expired backup sets to delete from disk-based storage at the
following times:
■ Every hour.
DLM starts for the first time 1 hour after you install Backup Exec and the Backup
Exec service starts, and then runs every hour after that. If you restart the Backup
Exec service, the hourly DLM cycle also restarts.
■ When the low disk space threshold for disk-based storage is reached.
The low disk space threshold is a storage device property. When the storage
device's used capacity reaches this threshold, DLM immediately searches the
device for the expired backup sets that it can delete.
■ When you manually expire a backup set.
When you manually expire a backup set on a standalone Backup Exec server,
DLM runs immediately on the storage device on which the backup set is located.
Disk-based and network-based storage 337
How data lifecycle management (DLM) deletes expired backup sets on disk-based storage
Table 8-4 Storage options in Backup Exec that affect data lifecycle
management
Allow Backup Exec to delete all expired This global setting lets Backup Exec delete
backup sets expired backup sets, even if they are the last
remaining backup sets that you need to
restore a server. Use this option when you
want to delete backup data after a period of
time. Alternatively, you can manually delete
backup sets.
Warning: If you enable this option, the data
that you need to restore a server may not be
available.
Table 8-4 Storage options in Backup Exec that affect data lifecycle
management (continued)
Limit Backup Exec to read-only operations This global setting prevents Backup Exec
on a disk-based storage device if it has from deleting expired backup sets on any
been detached for x number of days disk-based storage device as soon as you
reattach it. When you limit Backup Exec to
read-only operations, you have time to review
any expired backup sets and determine if you
want to keep them before data lifecycle
management deletes them. To keep expired
backup sets, you can retain them or change
the expiration date.
Table 8-4 Storage options in Backup Exec that affect data lifecycle
management (continued)
Limit Backup Exec to read-only operations This global setting prevents Backup Exec
on a disk cartridge if it has not been from deleting expired backup sets on any disk
inserted for x number of days cartridge as soon as you insert it into a disk
cartridge device. When you limit Backup Exec
to read-only operations, you have time to
review any expired backup sets and
determine if you want to keep them before
data lifecycle management deletes them. To
keep expired backup sets, you can retain
them or change the expiration date.
Limit Backup Exec to read-only operations This device property prevents data lifecycle
management from running on a specific
disk-based or disk cartridge storage device
that you reattach or reinsert it. This option
applies only when the storage device has
been absent from the Backup Exec server for
the number of days that you specify in either
of the two previous global settings described
in this table.
Table 8-4 Storage options in Backup Exec that affect data lifecycle
management (continued)
Low disk space This device property is the first of three low
disk space conditions. When the storage
device's used capacity reaches this threshold,
the data lifecycle management feature
immediately searches the device for expired
backup sets that it can delete.
For information about the best practices of Backup Exec data lifecycle management
(DLM) feature, refer to Backup Exec Best Practices.
Backup sets
A backup set is a collection of the data that you back up from a single source of
content. A single source of content can be a server or a Microsoft Exchange data
set, for example. If you select multiple sources of content, Backup Exec creates
multiple backup sets. When you run a backup job, Backup Exec creates the backup
sets and writes them on storage. To restore data, you select the backup sets that
contain the data that you want to restore.
Backup Exec keeps the backup sets that are stored on disk storage and disk
cartridge media for as long as you specify in the backup job properties. By default,
the amount of time that backup sets are stored is based on the type of backup job
and its schedule.
For example, you can specify to keep the backup sets from a full backup for two
weeks on a disk-based storage device. After two weeks, the backup sets expire
Disk-based and network-based storage 342
Backup sets
and Backup Exec uses the data lifecycle management feature to delete the backup
sets and reclaim that disk space. If you later create an incremental backup job,
Backup Exec keeps the full backup sets for two weeks, plus the amount of time
that it keeps the incremental backup sets. If you keep the incremental backup sets
for four weeks, then Backup Exec keeps the full backup sets for six weeks. The
data from a full backup job is kept as long as the data from its associated incremental
backup jobs. Backup Exec does not reclaim the disk space for backup sets from a
job that depends on another job until the data retention expires for all of the
associated jobs. Even if the backup set is displayed as expired, the data is available
until all dependent backup sets expire as well.
Backup Exec manages the retention of backup sets differently depending on the
type of storage to which you back up the data.
Disk storage, disk cartridge Backup Exec uses data lifecycle management to
devices, deduplication disk automatically delete expired backup sets from disk-based
storage, storage arrays, cloud storage. By default, Backup Exec keeps the most recent
storage, and virtual disks backup sets that are necessary to restore any backed-up
component of a server, even if the backup sets expire. Even
if the backup set is displayed as expired, the data is available
until all dependent backup sets expire as well.
Tape cartridge media Backup Exec uses the Advanced Device and Media
Management (ADAMM) feature to manage data retention on
tape cartridge media. ADAMM expires the backup sets that
are stored on media according to a set of rules that you apply
to the media. Backup sets are not automatically deleted from
tape cartridge media, but they can be overwritten, depending
on the rules that you specify. The set of rules that manages
tape cartridge media is called a media set. You create media
sets that specify append periods, overwrite protection periods,
and vaulting periods.
You can perform the following actions on backup sets that are on disk-based storage:
■ Change the expiration date of backup sets to keep them longer or expire them
immediately.
■ Extend the amount of time that you keep backup sets by retaining them.
■ Release any backup sets that are retained to let them expire automatically.
For all backup sets, including those on tape cartridge media, you can perform the
following actions:
■ Catalog backup sets so that you can view the data that is contained in the backup
sets and search for files to restore.
■ View the contents of backup sets and browse the backed up data that is
contained in them.
■ View the system properties and job properties of backup sets.
See “Changing the expiration date of backup sets on disk-based storage”
on page 344.
See “Retaining backup sets on disk-based storage to prevent them from expiring”
on page 345.
See “Releasing retained backup sets on disk-based storage” on page 346.
See “Cataloging backup sets” on page 247.
See “Viewing the contents or properties of backup sets” on page 347.
Disk-based and network-based storage 344
Backup sets
4 Click Retain.
Disk-based and network-based storage 346
Backup sets
5 In the Reason to retain backup sets field, select the reason that you want to
retain the backup sets. You can choose from the following options:
Legal Select this option if the reason for retaining the backup
sets is a legal one. You may have to retain backup sets
to comply with corporate or regulatory data retention
policies.
User defined Select this option if the reason for retaining the backup
sets is something other than a legal one.
System defined This option is used by Backup Exec when a backup set
needs to be retained for some future operations to run.
This option is grayed out and cannot be selected.
6 In the Explanation field, type any additional information about why you retained
the backup sets. Entering an explanation in this field can help remind you why
you retained the backup sets or for how long they should be retained.
7 Click OK.
See “Backup sets ” on page 341.
See “Releasing retained backup sets on disk-based storage” on page 346.
■ To release multiple backup sets, Shift + click or Ctrl + click the backup sets,
and then right-click one of the selected backup sets.
4 Click Retain.
5 Select Do not retain.
6 Click OK.
See “Backup sets ” on page 341.
See “Retaining backup sets on disk-based storage to prevent them from expiring”
on page 345.
See “How data lifecycle management (DLM) deletes expired backup sets on
disk-based storage” on page 335.
Note: On the Backup and Restore tab, you must expand the backup source
to see the backup set.
For the list of supported public and private cloud providers, refer to the Backup
Exec hardware compatibility list.
For information about the best practices to manage Backup Exec Cloud Connector,
refer to Backup Exec Best Practices.
The following notes apply to cloud-based storage devices:
■ If you use Backup Exec Central Admin Server feature, you can share a public
cloud storage device between multiple managed Backup Exec servers. You can
enable the sharing when you add a public cloud storage device. You can select
new managed Backup Exec servers to share a public cloud storage device. You
can remove the sharing ability for any managed Backup Exec servers at any
time.
■ Data lifecycle management automatically expires the backup sets that are on
cloud storage.
■ Some cloud storage providers require encryption.
See “Using encryption with Backup Exec” on page 624.
■ Ensure that you have already created the buckets. Buckets represent a logical
unit of storage on the cloud-based storage device.
Note: As a best practice, you should create specific buckets to use exclusively
with Backup Exec.
Each cloud storage device must use a different bucket. Do not use the same
bucket for multiple cloud storage devices even if these devices are configured
on different Backup Exec servers.
■ Ensure that the bucket names meet the following Backup Exec requirements:
■ Bucket names can contain lowercase letters, numbers, and dashes (or
hyphens)
■ Bucket names cannot begin with a dash (or a hyphen)
The buckets are not available for use in Backup Exec if the bucket name does
not comply with the bucket naming convention or if you have created a bucket
for a region that Backup Exec does not support.
To review the list of supported regions, refer to the Backup Exec hardware
compatibility list.
See “Configuring storage for Amazon cloud storage” on page 351.
Note: For cloud-based storage devices, by default, the Do not verify data for this
job option is now selected in the Backup Options. Cloud vendors charge for
operations that read data from and write data to the cloud. To avoid charges for
reading data during the verify operation of a backup or duplicate job, this option is
selected by default.
See “Configuring automatic verify operations for backup jobs” on page 563.
Note: To restore from Glacier and Deep Archive storage device is a time
consuming activity. Refer to the Amazon documentation for more information
about retrieval time delay.
6 In the Logon account field, select an account from the drop-down list or click
Add/Edit to add an account.
7 On the Logon account selection dialog box, click Add.
8 On the Add Logon Credentials dialog box, do the following:
■ In the User name field, type the Amazon account access key ID.
■ In the Password field, type the Amazon account secret access key.
■ In the Confirm password field, type the Amazon account secret access
key again.
■ In the Account name field, type a name for this logon account.
The Backup Exec user interface displays this name as the cloud storage
device name in all storage device options lists.
9 Click OK twice.
10 Select the Amazon logon account that you created in step 7, and then click
Next.
11 Select a bucket from the list of buckets that are associated with the server
name and then click Next.
Cloud-based storage devices 353
Google cloud-based storage
12 Specify how many concurrent operations can run at the same time on this
cloud storage device, and then click Next.
This setting determines the number of jobs that can run at the same time on
this device. The suitable value for this setting may vary depending on your
environment and the bandwidth to the cloud storage. You may choose the
default value.
13 Review the configuration summary, and then click Finish.
Backup Exec creates a cloud storage device. You must restart Backup Exec
services to bring the new device online.
14 In the window that prompts you to restart the Backup Exec services, click Yes.
After services restart, Backup Exec displays the new cloud storage location in
the All Storage list.
Ensure that you have already created the buckets. Buckets represent a logical
unit of storage on the cloud-based storage device.
■ Ensure that the bucket names meet the following Backup Exec requirements:
■ Bucket names can contain lowercase letters, numbers, and dashes (or
hyphens)
■ Bucket names cannot begin with a dash (or a hyphen)
The buckets are not available for use in Backup Exec if the bucket name does
not comply with the bucket naming convention or if you have created a bucket
for a region that Backup Exec does not support.
To review the list of supported regions, refer to the Backup Exec hardware
compatibility list.
See “Configuring storage for Google cloud storage” on page 354.
Note: For cloud-based storage devices, by default, the Do not verify data for this
job option is now selected in the Backup Options. Cloud vendors charge for
operations that read data from and write data to the cloud. To avoid charges for
reading data during the verify operation of a backup or duplicate job, this option is
selected by default.
See “Configuring automatic verify operations for backup jobs” on page 563.
See “Adding a stage to a backup definition” on page 214.
See “Requirements for configuring a Google cloud-based storage device”
on page 353.
To configure storage for Google cloud storage in Backup Exec
1 On the Backup and Restore tab, click the Back Up > Backup to Cloud option
and then click OK.
Or, on the Storage tab, in the Configure Storage group, click Cloud Storage
and then click Next.
Or, on the Storage tab, click Configure Cloud Storage.
2 Enter a name and description for the cloud storage device, and then click Next.
3 From the list of cloud storage providers, select S3, and then click Next.
Cloud-based storage devices 355
Google cloud-based storage
4 In the Cloud storage field, select the Google server name from the drop-down
list.
5 In the Logon account field, select an account from the drop-down list or click
Add/Edit to add an account.
6 On the Logon Account Selection dialog box, click Add.
7 On the Add Logon Credentials dialog box, do the following:
■ In the User name field, type the Google account access key ID.
■ In the Password field, type the Google account secret access key.
■ In the Confirm password field, type the Google account secret access key
again.
■ In the Account name field, type a name for this logon account.
The Backup Exec user interface displays this name as the cloud storage device
name in all storage device options lists.
8 Click OK twice.
9 Select the Google logon account that you created in step 7, and then click
Next.
10 Select a bucket from the list of buckets that are associated with the server
name and then click Next.
11 Specify how many concurrent operations can run at the same time on this
cloud storage device, and then click Next.
This setting determines the number of jobs that can run at the same time on
this device. The suitable value for this setting may vary depending on your
environment and the bandwidth to the cloud storage. You may choose the
default value.
12 Review the configuration summary, and then click Finish.
Backup Exec creates a cloud storage device. You must restart Backup Exec
services to bring the new device online.
13 In the window that prompts you to restart the Backup Exec services, click Yes.
After services restart, Backup Exec displays the new cloud storage location in
the All Storage list.
Cloud-based storage devices 356
Microsoft Azure cloud-based storage
Note: As a best practice, you should create specific containers to use exclusively
with Backup Exec.
Each cloud storage device must use a different container. Do not use the same
container for multiple cloud storage devices even if these devices are configured
on different Backup Exec servers.
■ Ensure that the container names meet the following Backup Exec requirements:
■ Container names can contain lowercase letters, numbers, and dashes (or
hyphens)
■ Containers names cannot begin with a dash (or a hyphen)
The containers are not available for use in Backup Exec if the container name
does not comply with the container naming convention.
To review the list of supported regions, refer to the Backup Exec hardware
compatibility list.
See “Configuring storage for Microsoft Azure cloud storage” on page 357.
Cloud-based storage devices 357
Microsoft Azure cloud-based storage
Note: For cloud-based storage devices, by default, the Do not verify data for this
job option is now selected in the Backup Options. Cloud vendors charge for
operations that read data from and write data to the cloud. To avoid charges for
reading data during the verify operation of a backup or duplicate job, this option is
selected by default.
See “Configuring automatic verify operations for backup jobs” on page 563.
See “Requirements for configuring a Microsoft Azure cloud-based storage device”
on page 356.
To configure storage for Microsoft Azure cloud storage in Backup Exec
1 On the Backup and Restore tab, click the Back Up > Backup to Cloud option
and then click OK.
Or, on the Storage tab, in the Configure Storage group, click Cloud Storage
and then click Next.
Or, on the Storage tab, click Configure Cloud Storage.
2 Enter a name and description for the cloud storage device, and then click Next.
3 From the list of cloud storage providers, select Azure, and then click Next.
4 In the Cloud storage field, select the Microsoft Azure server name from the
drop-down list.
5 In the Logon account field, select an account from the drop-down list or click
Add/Edit to add an account.
6 On the Logon Account Selection dialog box, click Add.
7 On the Add Logon Credentials dialog box, do the following:
■ In the User name field, type the Microsoft Azure storage user name.
■ In the Password field, type the Microsoft Azure storage account access
key. You can enter the primary access key or the secondary access key.
■ In the Confirm password field, type the Microsoft Azure storage account
access key again.
■ In the Account name field, type a name for this logon account.
The Backup Exec user interface displays this name as the cloud storage
device name in all storage device options lists.
Cloud-based storage devices 358
Private cloud-based storage
8 Click OK twice.
9 Select the Microsoft Azure logon account that you created in step 7, and then
click Next.
10 Select a container from the list of containers that are associated with the server
name and then click Next.
11 Specify how many concurrent operations can run at the same time on this
cloud storage device, and then click Next.
This setting determines the number of jobs that can run at the same time on
this device. The suitable value for this setting may vary depending on your
environment and the bandwidth to the cloud storage. You may choose the
default value.
12 Review the configuration summary, and then click Finish.
Backup Exec creates a cloud storage device. You must restart Backup Exec
services to bring the new device online.
13 In the window that prompts you to restart the Backup Exec services, click Yes.
After services restart, Backup Exec displays the new cloud storage location in
the All Storage list.
Note: As a best practice, you should create specific buckets to use exclusively
with Backup Exec.
Each cloud storage device must use a different bucket. Do not use the same
bucket for multiple cloud storage devices even if these devices are configured
on different Backup Exec servers.
■ Ensure that the bucket names meet the following Backup Exec requirements:
■ Bucket names can contain lowercase letters, numbers, and dashes (or
hyphens)
■ Bucket names cannot begin with a dash (or a hyphen)
Note: The buckets are not available for use in Backup Exec if the bucket
name does not comply with the bucket naming convention.
Before you create a storage device for a private cloud, you must run this command.
Ensure that the cloud instance name meets the following Backup Exec requirements:
■ It can contain letters, numbers, and dashes (or hyphens).
■ It cannot begin with a dash (or a hyphen).
Note: You must create only one cloud instance on a Backup Exec server for a
private cloud storage server. You can create another cloud instance on a different
Backup Exec server for the same private cloud storage server.
For more information on how to use the Backup Exec Management Command Line
Interface and the commands, view the help file named BEMCLI, located in the
default installation location:
C:<Backup Exec install path>\Backup Exec
See “Configuring storage for a private cloud-based storage device” on page 360.
See “Requirements for configuring a private cloud-based storage device”
on page 358.
Note: For cloud-based storage devices, by default, the Do not verify data for this
job option is now selected in the Backup Options. Cloud vendors charge for
operations that read data from and write data to the cloud. To avoid charges for
reading data during the verify operation of a backup or duplicate job, this option is
selected by default.
See “Configuring automatic verify operations for backup jobs” on page 563.
See “Creating a cloud instance for a private cloud” on page 360.
Cloud-based storage devices 361
Private cloud-based storage
11 Specify how many concurrent operations can run at the same time on this
cloud storage device, and then click Next.
This setting determines the number of jobs that can run at the same time on
this device. The suitable value for this setting may vary depending on your
environment and the bandwidth to the cloud storage. You may choose the
default value.
12 Review the configuration summary, and then click Finish.
Backup Exec creates a cloud storage device. You must restart Backup Exec
services to bring the new device online.
13 In the window that prompts you to restart the Backup Exec services, click Yes.
After services restart, Backup Exec displays the new cloud storage location in
the All Storage list.
Note: You cannot edit the cloud instance name and cloud provider of a custom
cloud instance.
You must create only one cloud instance on a Backup Exec server for a private
cloud storage server. You can create another cloud instance on a different Backup
Exec server for the same private cloud storage server.
For more information on how to use the Backup Exec Management Command Line
Interface and the commands, view the help file named BEMCLI, located in the
default installation location:
C:<Backup Exec install path>\Backup Exec
See “Creating a cloud instance for a private cloud” on page 360.
See “Deleting a cloud instance for a private cloud” on page 362.
Note: Before deleting a cloud instance, delete the private cloud storage devices
that are attached to that cloud instance.
See “Deleting a storage device” on page 468.
For more information on how to use the Backup Exec Management Command Line
Interface and the commands, view the help file named BEMCLI, located in the
default installation location:
C:<Backup Exec install path>\Backup Exec
See “Creating a cloud instance for a private cloud” on page 360.
Backup Exec server with device Indicates the Backup Exec server that has
proximity physical or logical proximity to the storage
device to run operations for that device.
Backup data written Shows only the amount of the space used
for the backed-up data.
Backup Exec service restart needed Indicates if the Backup Exec services must
be restarted to apply any changes that are
made to this device.
Data encryption when Some public cloud storage providers require encryption to be
backing up data to a enabled when backup jobs or duplicate jobs are targeted to cloud
public cloud storage storage.
device
All data is secured using SSL during data transfer from Backup
Exec to a public cloud-based storage device. However, Backup
Exec jobs must have encryption enabled to encrypt the data
at-rest in the public cloud storage.
Network usage and During data transfer, a cloud-based storage device consumes
backups to a cloud high bandwidth. This might affect the functioning of any other
storage device critical applications running at that time. Therefore, it is
recommended that you schedule the backup jobs or duplicate
backup jobs to a cloud storage device at a time when the
bandwidth consumption by other applications is relatively less.
Cloud-based storage devices 369
Changing default cloud storage settings
suggests the number of write connections suitable for a backup job in your
environment.
The Backup Exec CloudConnect Optimizer displays a job log with the suggested
Write Connections value for the specific cloud server type. This value is updated
to the Backup Exec settings if you select the Use the suggested number of Write
Connections for the upcoming jobs check box in the Backup Exec CloudConnect
Optimizer.
See “Configuring the Backup Exec™ CloudConnect Optimizer” on page 371.
You can change the read and write connection values for each type of cloud storage
server that is supported by Backup Exec. For backup or restore jobs running on
cloud devices, it is recommended that you change the read and write connection
values only during network and bandwidth issues. For more information, refer to
the Backup Exec Best Practices document.
To change the default storage settings
1 Click the Backup Exec button, click Configuration and Settings, and then
click Backup Exec Settings.
2 In the left pane, click Cloud Storage.
3 Edit any of the following options:
Connection range Displays the connection range for each type of cloud server.
Read connections Lets you select the number of read connections for each type
of cloud server. The default value for each cloud server is
already selected.
The default values are set as per the best practices suggested
by Backup Exec.
Write connections Lets you select the number of write connections for each type
of cloud server. The default value for each cloud server is
already selected.
The default values are set as per the best practices suggested
by Backup Exec.
is completed, the log gives you the results of the job and the suggested write
connections value.
See “Changing default cloud storage settings” on page 369.
After you run the CloudConnect Optimizer job for any cloud storage device, the job
log displays the suggested Write Connections value for the specific cloud server
type. This value is updated to the Backup Exec settings if you select the Use the
suggested number of Write Connections for the upcoming jobs check box in
the CloudConnect Optimizer.
The Write Connections value is specific to a cloud server type. There can be multiple
cloud devices with the same cloud server type and the value suggested by the
CloudConnect Optimizer would be the same for all the cloud devices of that specific
cloud server type. If you select multiple devices that have different cloud providers,
you need to need to run the CloudConnect Optimizer job for each device.
It is recommended that you run the CloudConnect Optimizer job close to the backup
window and do not run any other backup jobs to the cloud at the same time.
See “Configuring the Backup Exec™ CloudConnect Optimizer” on page 371.
See “Editing the CloudConnect Optimizer job” on page 372.
See “Deleting the CloudConnect Optimizer job” on page 373.
Use the suggested number of Select the check box to update the suggested value
Write Connections for the in the Backup Exec settings.
upcoming jobs
5 Click OK.
The CloudConnect Optimizer job runs based on whether you have scheduled
for it to run immediately or scheduled for a later date.
In case of CAS-MMS scenario, from the Central Admin Server (CAS), you can
create a CloudConnect Optimizer job only for the devices that are local to the
CAS server or the one shared with the CAS server. For devices that are local
to the Managed Media Server (MMS), a CloudConnect Optimizer job can only
be created from that particular MMS. If a cloud storage device is shared
between CAS and MMS, and you want job to run on MMS, you must to create
job from MMS only. The CloudConnect Optimizer job runs on the media server
where the job is created.
The CloudConnect Optimizer job is displayed on the Job Monitor and Storage
tab. If the CloudConnect Optimizer job is scheduled for a later date, the job
status displays the Scheduled status. After the job completes successfully,
the Job Monitor > Job Histories section and Storage > Job History section
displays the job details and the job status.
After the CloudConnect Optimizer job completes, the job log displays the
suggested Write Connections value. If you have selected the check box to
update the suggested value in the Backup Exec settings, this value is updated
and used for the upcoming jobs. A confirmation message is displayed that the
value is successfully updated in the Backup Exec settings.
See “Changing default cloud storage settings” on page 369.
See “About the Backup Exec™ CloudConnect Optimizer” on page 370.
See “Editing the CloudConnect Optimizer job” on page 372.
See “Deleting the CloudConnect Optimizer job” on page 373.
A subfolder with a prefix of IMG in the name may display under a backup-to-disk
folder.
In previous versions, Backup Exec created this subfolder when the following
conditions were met in a backup job:
■ The option to enable Granular Recovery Technology (GRT) was selected.
■ A backup-to-disk folder was selected as storage for the backup data.
Legacy backup-to-disk folders 375
Legacy backup-to-disk folders
4 Click Apply.
4 Click Apply.
4 In Windows Explorer, delete all of the files from the original backup-to-disk
folder.
5 On the Backup Exec Administration Console, on the Storage tab, in the
Configure operation group, click Configure Storage.
Legacy backup-to-disk folders 377
Legacy backup-to-disk folders
6 Follow the prompts to import the legacy backup-to-disk folder from the new
location.
See “Restoring data from a legacy backup-to-disk folder” on page 377.
7 Right-click the backup-to-disk folder, and then click Inventory and Catalog.
Note: When you import a legacy backup-to-disk folder, all of the backup data on
that folder is set to expire one year from the data that the folder is imported. You
can keep the data longer, or expire the data earlier.
See “Changing the expiration date of backup sets on disk-based storage”
on page 344.
See “Retaining backup sets on disk-based storage to prevent them from expiring”
on page 345.
Legacy backup-to-disk folders 378
Legacy backup-to-disk folders
If the Central Admin Server feature is not Select Disk-based Storage, and then click
installed Next.
If the Central Admin Server feature is Do the following in the order listed:
installed
■ Select the Backup Exec server on
which you want to import a legacy
backup-to-disk folder, and then click
Next.
■ Select Disk-based Storage, and then
click Next.
7 When the legacy backup-to-disk folder appears on the Storage view, right-click
the folder, and then click Inventory and Catalog.
Note: Depending on the number of backup sets involved, this operation may
take a long time to complete. Consider running this operation during off-peak
hours.
Legacy backup-to-disk folders 379
Legacy backup-to-disk folders
8 On the Storage tab, in the All Storage view, navigate to the legacy
backup-to-disk folder from which you want to restore.
9 Right-click the legacy backup-to-disk folder, and then click Restore.
Chapter 11
Tape storage
This chapter includes the following topics:
■ Managing tapes
■ About cataloging tape or disk cartridge media that contains encrypted backup
sets
Note: You do not need to install tape device drivers if Backup Exec runs on
Windows Server 2012 and later. Kernel-mode drivers and tapeinste.exe are no
longer installed if Backup Exec runs on Windows Server 2012 and later.
See “Installing tape device drivers ” on page 382.
After you start the Hot-swappable Device Wizard, you are prompted to close the
Backup Exec Administration Console. The Hot-swappable Device Wizard waits
until any jobs that were processing are completed. The wizard pauses the Backup
Exec server and stops the Backup Exec services. You can then add or replace any
storage devices. The wizard detects the new device or replaced device, and adds
information about the device to the Backup Exec database. The wizard is then
completed, and you can reopen the Backup Exec Administration Console.
Any new storage appears in the Storage tab, and usage statistics for the storage
begin accumulating. You can enable the new storage in a storage device pool.
Any replaced storage appears in the Storage tab, in the All Storage view with a
status of Offline.
Note: Start the Hot-swappable Device Wizard before you add or replace storage.
For iSCSI-attached storage: In the iSCSI control panel applet, add the
storage to the Persistent Targets list.
For any other hot-swappable storage: Continue with the next step.
You can find a list of compatible types of storage in the Backup Exec hardware
compatibility list.
■ Run the Windows Device Manager to ensure that it lists the tape device.
■ Get the latest Backup Exec device drivers.
To get the latest device drivers installed to the Backup Exec installation folder
1 Click the Backup Exec button, select Technical Support, and then click Latest
Backup Exec Device Drivers.
2 Run the Device Driver Installation Wizard, in the following procedure.
To install tape device drivers by using the Configure Storage wizard
1 On the Storage tab, in the Configure group, click Configure Storage.
2 On the wizard panel, select Tape Storage, and then click Next.
3 Select Install tape device drivers, and then click Next.
4 On the Device Driver Installation Wizard, follow the on-screen prompts.
To install tape device drivers on a Backup Exec server that run on Windows
Server 2008 R2 or earlier by running tapeinst.exe
1 From the Backup Exec installation directory, double-click the tapeinst.exe file.
The default installation directory is C:<Backup Exec install path>\Backup Exec
2 On the Device Driver Installation Wizard, follow the on-screen prompts.
Read single block mode Indicates if this tape drive reads only one
block of data at a time, regardless of the
size of the buffer block.
Write single block mode Indicates if this tape drive writes only one
block of data at a time. This option provides
greater control over the handling of data
write errors.
Read SCSI pass-through mode Indicates if this tape drive reads data
without going through a Microsoft tape
device API. This option allows the data to
pass directly through the tape drive and
allows more detailed information if device
errors occur.
Write SCSI pass-through mode Indicates if this tape drive writes data
without going through the Microsoft tape
device API. This option allows data to pass
directly through the device driver and
allows more detailed information if device
errors occur.
Servers that share this device Displays the servers that can also use this
device.
Can Read From Indicates if this tape drive can read from
the media type.
See “Configuring barcode rules for a
robotic library ” on page 391.
Tape storage 389
Viewing tape drive statistics
4 Click Apply.
does not find the media that is required for the restore job in the robotic library, an
alert is generated that requests the media that is necessary to complete the job.
See “Requirements for setting up robotic library hardware” on page 390.
See “Creating robotic library partitions” on page 397.
■ Determine which drive is the first drive in the robotic library, and then arrange
the SCSI IDs to match the sequence of the drive element addresses. Refer to
your robotic library documentation to determine the drive element address for
each storage device.
■ Ensure that the SCSI ID of the robotic arm precedes the SCSI IDs of the drives
in the robotic library. Do not use 0 or 1 because these SCSI IDs are typically
reserved for boot devices.
In the following example, if your robotic library has two drives, the drive with the
lowest drive element address should be assigned the lower SCSI ID.
See the section called “Enabling or disabling barcode rules by using robotic library
properties” on page 393.
If the Central Admin Server feature is not Click Tape storage, and then click Next.
installed
If the Central Admin Server feature is Do the following in the order listed:
installed
■ Select the Backup Exec server on
which you want to configure storage,
and then click Next.
■ Click Tape storage, and then click
Next.
3 Click Configure barcode rules for a robotic library, and then click Next.
4 Select the robotic library that you want to configure barcode rules for, and then
click Next.
5 To change the available barcode rules in the list, click any of the following:
■ Click New.
■ Click the drop-down menu, and then
select a media type
■ Type the vendor name, and the
barcode prefix and/or suffix.
■ Click OK.
6 Click Next.
Tape storage 393
Robotic libraries in Backup Exec
7 Select a tape drive, and then for any of the listed media types, select a check
box to specify if the tape drive can read from and write to that media type.
Cick Next.
8 Review the summary, and then do one of the following:
9 Ensure that barcode rules are enabled for the appropriate robotic libraries.
4 Click OK.
To add, edit, or delete a barcode rule by using the Backup Exec global settings
1 Click the Backup Exec button, click Configuration and Settings, and then
click Backup Exec Settings.
2 In the left pane, click Bar Code Rules.
3 Do one of the following:
To add new barcode rule Click New, and then continue with the next
step.
To edit an existing barcode rule Select the barcode rule that you want to
edit, click Edit, and then continue with the
next step.
5 Click OK.
Note: Defined cleaning slots are not inventoried when an inventory job runs.
First slot number Displays the starting slot for this robotic
library. Backup Exec determines what the
starting slot should be for this type of
library. Some robotic libraries have slots
that start at 0. Other libraries start at 1. You
can change the starting slot if necessary.
4 Click OK.
To view all of the robotic libraries that you Do the following in the order listed:
can configure partitions for
■ On the Storage tab, in the Configure
group, click Configure Storage.
■ Select Tape storage, and then click
Next.
■ Select Configure robotic library
partitions, and then click Next.
■ Select the robotic library to configure
partitions for, and then click Next.
To configure partitions for a specific robotic Do the following in the order listed:
library
■ On the Storage tab, right-click the
robotic library for which you want to
create partitions.
■ Click Configure partitions.
2 Specify the number of partitions to create, enter the number of slots for each
partition, and then click Next.
3 Review the storage configuration summary, and then do one of the following:
To add a tape drive to the robotic library Do the following in the order listed:
partition
■ Click Add.
■ In the devices list that appears, select
the tape drive that you want to add, and
then click OK.
To remove a tape drive from the robotic Select the tape drive that you want to
library partition remove, and then click Remove.
4 Click Apply.
6 Click Apply.
■ Click Finish.
See “Reassigning a slot base number for robotic libraries” on page 399.
Tape storage 402
Managing tapes
Managing tapes
For tape media, you can perform the following actions:
■ Protect data from being overwritten.
■ Set up media rotation strategies.
■ Track the location of media.
■ Label media automatically.
■ Read and track the media labels that have barcodes.
■ Collect and report media statistics.
The Advanced Device and Media Management (ADAMM) feature in Backup Exec
automatically selects the tape media for jobs. Backup Exec keeps track of all tape
media that is loaded into the attached storage device. Backup Exec also keeps
track of the media that is offline and the media that has been placed in media vaults.
For data that is kept on tapes, Backup Exec uses media sets to apply overwrite
protection periods and append periods to manage the expiration of backup sets.
A media set consists of the following rules that apply to tape media:
■ How long to protect the data on the media from overwrite. This is called the
overwrite protection period.
■ How long to append data to a media. This is called the append period.
■ When and where to send media for vaulting.
Media that are associated with a media set are allocated media. Allocated media
have current append and overwrite protection periods. Media that are associated
with a media set but have expired overwrite protection periods are recyclable media.
For information about the best practices to manage tapes in Backup Exec, refer to
Backup Exec Best Practices.
See “Default media sets” on page 402.
See “Tape media rotation strategies” on page 434.
See “Creating media sets for tapes” on page 410.
Note: You should not associate scratch media with a media set that you create.
When a backup job runs, Backup Exec automatically moves the media from the
Scratch Media set to the required media set as needed.
Name Description
Backup Exec and Windows NT Displays all media that is imported from another
Backup Media installation of Backup Exec.
Name Description
Retired Media Displays all media that you have taken out of
service, usually because of an excessive number
of errors. After you associate a media with the
retired media set, Backup Exec does not select it
for backup jobs. The media is still available for
restore operations, if it has not been damaged.
Retired Media protects media from being used
(overwritten).
Name Description
Keep Data for 4 Weeks Displays all tape media that you associate with this media
set. If you use the backup job defaults that are set when you
install Backup Exec, the media set Keep Data for 4 Weeks
is the default media set for all backup jobs that you send to
tape storage. This media set protects data from being
overwritten for four weeks and allows the media to be
appended to for six days.
You can edit and rename Keep Data for 4 Weeks after
installation. Therefore, it may not continue to appear in the
Media view or in the backup job defaults as Keep Data for
4 Weeks.
Keep Data Infinitely - Do Displays all tape media that you associate with this media
Not Allow Overwrite set.
When you associate media with this media set, data is not
overwritten unless you perform any of the following actions
on the media:
■ Erase
■ Label
■ Format
■ Associate the media with the scratch media set
You can append data to this media for an infinite period (until
the media is full).
You can edit and rename Keep Data Infinitely - Do Not
Allow Overwrite after installation. Therefore, it may not
continue to appear in the Media view or in the backup job
defaults as Keep Data Infinitely - Do Not Allow Overwrite.
You can change the default media set for backup jobs by doing one of the following:
■ Create new media sets that have the append and overwrite protection periods
set to the time intervals that accommodate your data retention strategy. Then,
specify the media set that is most appropriate when you create a backup job.
For example, you can create a media set that keeps data for 60 days, and a
media set that keeps data for 90 days.
■ Select the other default media set Keep Data Infinitely - Do Not Allow
Overwrite when you create a backup job. The risk that is associated with the
media set Keep Data Infinitely - Do Not Allow Overwrite is that you can use
all of your scratch media. You must continually add new tape or disk cartridge
media to Backup Exec.
Tape storage 406
Managing tapes
Note: It is recommended that if you need to keep data longer than four weeks, you
should duplicate it. You can duplicate the backup data from the original storage
device to tape, which you can then send for long-term or off-site storage.
Rule Description
Append period The amount of time that data can be appended to tape media.
It is measured from the time the media was first allocated. It
can be specified in hours, days, weeks, or years.
Tape storage 407
Managing tapes
Rule Description
Overwrite protection period The amount of time that tape media is protected from being
overwritten. The period is measured from the time of the last
write to the media, that is, at the end of the last append or
overwrite job. It can be specified in hours, days, weeks, or
years. When the overwrite protection period is over, the media
becomes recyclable and can be overwritten.
For example, you set the overwrite protection period for seven
days. You also set the append period for four days to ensure
that data is not overwritten for at least seven days. The data
can be appended to the media for the next four days. The
last data that is appended to this media is retained for at least
seven days.
Note: Any media can be overwritten if the overwrite
protection level is set to None.
Your tape media rotation strategy must balance between the need to save data as
long as possible, and the fact that tape media are not in infinite supply. The media
set rules allow Backup Exec to identify which tape media can be written to and
which tape media are overwrite-protected. You should consider the use of disk
storage for backup data.
See “Configuring disk storage” on page 317.
The following graphic shows the relationship between the append period and the
overwrite protection period.
Tape storage 408
Managing tapes
already on the
media is protected
against loss.
New
data
After the overwrite protection
period expires, the media
becomes recyclable. This
means that new data can be
TIME
The append and overwrite protection periods that you specify apply to all the data
on the media.
Tape storage 409
Managing tapes
Each time data is written to a media, the time remaining in the overwrite protection
period is reset, and the countdown is restarted.
The amount of time that is required to complete the job affects when the media can
be overwritten.
For example, suppose that you create a media set named Weekly with an overwrite
protection period of seven days. You also specify an append period of zero days,
and you schedule a full backup job to run each Friday at 20:00. When it is time for
the full backup to run at 20:00 the following Friday, the job cannot run. The first
backup job that ran the previous Friday did not complete until 21:10. The overwrite
protection period for the Weekly media set still has 70 minutes remaining.
To prevent this situation, you can shorten the overwrite protection period to account
for the amount of time a job may run. For this example, the scheduled job recurring
at 20:00 can run if the overwrite protection period is set to six days instead of seven
days.
Tape storage 410
Managing tapes
Note: You must have already created a media vault before you are prompted to
add media vault rules in a media set.
■ Erase
■ Label
■ Associate it with the Scratch Media
Set
■ Set the Media Overwrite Protection
Level to None
■ Format
Media vault to use with this media set Displays the media vault that stores the
media that is associated with this media
set.
Move media to this vault after Displays the time period after which this
media is reported as ready to be moved to
this vault.
Return media from this vault after Displays the time period after which this
media is reported as ready to be returned
from this vault.
6 Click Apply.
■ Erase
■ Label
■ Associate it with the Scratch Media
Set
■ Set the Media Overwrite Protection
Level to None
■ Format
6 Click Apply.
Tape storage 415
Managing tapes
Media vault to use with this media set Displays the media vault that stores the
media that is associated with this media
set.
Move media to this vault after Displays the time period after which this
media is reported as ready to be moved to
this vault.
Return media from this vault after Displays the time period after which this
media is reported as ready to be returned
from this vault.
6 Click Apply.
Tape storage 416
Managing tapes
Caution: Ensure that the media set that you associate the jobs with has the
appropriate overwrite protection and append periods.
Use the media overwrite protection level to specify the type of media that you want
to be available for overwrite backup jobs.
See “Overwrite protection periods and append periods in media sets” on page 406.
If you choose to overwrite scratch media before recyclable media, more media
may be required for the same number of jobs. However, the recyclable media
may be preserved longer for possible recovery.
■ Overwrite recyclable media that is contained in the destination media set before
overwriting scratch media.
If you choose to overwrite recyclable media before scratch media, the same
media is re-used more frequently than if you overwrite scratch media before
recyclable media.
In a storage device pool for tape drives, Backup Exec selects the oldest recyclable
media in the storage device pool to use first.
In a robotic library, Backup Exec selects the oldest recyclable media in the library
to use first. If the robotic library is partitioned, Backup Exec searches for the oldest
recyclable media in the targeted partition only.
The following table describes the order in which Backup Exec searches for media
to use for an overwrite job.
Table 11-5 How Backup Exec searches for overwritable media in tape drives
Full + Overwrite recyclable media 1 Recyclable media in the destination media set
first
2 Scratch media
Table 11-5 How Backup Exec searches for overwritable media in tape drives
(continued)
Partial + Overwrite recyclable media 1 Recyclable media in the destination media set
first
2 Scratch media
In addition to setting overwrite protection levels, you must set overwrite options,
which set the order in which Backup Exec searches for overwritable media.
The most obvious candidates for backup jobs that require overwritable media are
scratch media and recyclable media. Recyclable media have expired overwrite
protection periods. Backup Exec searches for these types of media first when a
backup requires tape media to overwrite. The search pattern is different according
to whether you have selected Full, Partial, or None. The media indicate that a type
of media set is examined for availability.
See “Editing global settings for storage” on page 458.
See “Default media vaults” on page 424.
Tape storage 420
Labeling tape media
To view the job log from the Job Monitor Select the Job Monitor tab.
tab
To view the job log from the Backup and Do the following in the order listed:
Restore tab or the Storage tab
■ On the Backup and Restore tab or the
Storage tab, double-click the server or
the storage device where the job ran.
■ In the left pane, click Job History.
Write the media label on an external label that is fixed to the outside of the physical
tape cartridge. Whenever you change the media label, you should also change the
external label to match.
The following methods are available in Backup Exec to change a tape media label:
■ Write a new media label on the tape media. The Label operation destroys any
data on the media.
■ Rename the media. Renaming the tape media changes the name of the media
in the display, but does not write the new label to the media until an overwrite
operation occurs. The data on the media is viable until the media is overwritten.
■ Edit the label. Editing the label changes the name of the tape media in the
display, but does not write the new label to the media until an overwrite operation
occurs. The data on the media is viable until the media is overwritten.
Note: Media that use barcode labels cannot be renamed. When you try to label the
media that use barcode labels, the job logs report successfully completed jobs.
However, the media label names do not change.
To label media
1 On the Storage tab, do either of the following:
■ Right-click the drive that contains the tape that you want to label.
■ Double-click Slots, and then right-click the slot that contains the tape that
you want to label.
2 Click Label.
The following warning appears:
This operation is performed on the current media in the drive or slot. If the
media has changed since the last inventory ran, the media label in the next
dialog may not match the media in the selected device.
3 Click OK.
4 Type the name that you want to use as the media label for this media.
5 To erase all data on the media and re-label the media, click OK.
6 Write this same media label on an external label that is fixed to the outside of
the physical media.
7 (Optional) View the job history for details about the job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
Tape storage 422
Labeling tape media
Note: If a barcode label is the media label, then you cannot change the media label
in Backup Exec.
You can format a tape as a WORM tape if the tape drive supports the operation.
See “Formatting a tape as a WORM tape” on page 475.
When you select the option to use WORM media, Backup Exec verifies that the
destination device is or contains a WORM-compatible drive. Backup Exec also
verifies that the WORM media is available in the drive. If WORM media or a
WORM-compatible drive is not found, an alert is sent and the backup job may fail.
See “Configuring storage options for backup jobs” on page 556.
Online Tape Media Displays the media that are available in tape
drives or robotic libraries. You cannot add or
move media to the online media vault. Backup
Exec does that automatically. If you move
media from the online media vault to another
media vault, the media's overwrite protection
period and append period remain in effect.
Tape storage 425
Default media vaults
Offline Tape Media Displays the media that are on-site but are
not in tape drives or robotic libraries, and are
not in media vaults. Media appear in the
offline media vault if you use Backup Exec to
remove media from a tape drive or robotic
library. You can add media to the offline
media vault from another media vault. An
inventory operation or a catalog operation
moves the offline media back to the online
media vault. You cannot delete or rename
the offline media vault.
Vaulted Tape Media Displays the media that are not in tape drives
or robotic libraries, and have been moved to
a media vault.
All Media Vaults Displays the media that are in media vaults
that you create.
Item Description
Creating media vault rules to move tape media to and from media
vaults
Create media vault rules to do the following:
■ Associate a media vault with the media set to which you want to send media.
■ Specify the amount of time to wait between when the media is allocated and
when it is sent to the vault.
■ Specify the amount of time to wait between returning the media from the vault
and when it was last written to.
See “Default media vaults” on page 424.
Backup Exec does not update the vault automatically. You must use the Configure
Storage wizard to update the location of the tape media. You can also print or view
the reports that contain details on which media are ready to be moved to and from
the vault.
See “Updating the tape media location in media vaults” on page 427.
Tape storage 427
Default media vaults
To create media vault rules to move tape media to and from media vaults
1 On the Storage tab, expand All Media Sets.
2 Right-click Keep Data for 4 Weeks, Keep Data Infinitely - Do Not Allow
Overwrite, or a media set that you created, and then click Details.
3 In the left pane, click Properties.
4 Select the media vault that you want to use with the media set.
5 Specify when to move the media to the vault and when to return the media to
the media set.
Warning: The erase operation is run on whatever media is in the drive or slot at
the time when the operation runs. If the media has been changed since the last
inventory operation was run, the media label that appears on the Backup Exec
Administration Console may not match the media in the selected drive or slot. If
media is moved unexpectedly, data loss can occur. Check any scheduled erase
jobs carefully.
Tape storage 430
Erasing tape or disk cartridge media
Long erase media now Instructs the drive to physically erase the
entire media. If you have sensitive information
on the media and you want to dispose of it,
use the Long erase media now operation.
A long erase operation on a media will take
several hours to complete depending on the
drive and the media capacity.
The erase operation does not change the media label. To change a tape media
label, either run a Label operation or rename the media before you run an Erase
operation.
You cannot cancel an Erase operation after it has started. You can cancel an Erase
operation that is scheduled or queued.
When you schedule an erase operation, you can configure the time and frequency
that you want to run the job.
To erase tape or disk cartridge media now
1 On the Storage tab, right-click the drive or the robotic library slot that contains
the media that you want to erase.
2 Click Erase media now, and then do one of the following:
To run a long erase operation immediately Click Long erase media now.
5 To schedule the job, in the left pane, click Schedule and select the appropriate
options.
See “Scheduling a storage operation job” on page 451.
6 Click OK.
■ Append periods
■ Overwrite protection periods
■ Media vaults
■ Amount of time to move media to and from the media vault.
Note: You should not associate scratch or imported media with a media set. Backup
Exec automatically associates scratch or imported media with a media set when a
backup job requires it.
4 Click Apply.
Tape storage 434
Tape media rotation strategies
Item Description
Week 1
Full Backup
Although the Son strategy is easy to administer, backing up with a single media is
not an effective method of backup. Magnetic media eventually wears out after many
uses and the data you can restore only spans back to your last backup.
Tape storage 435
Tape media rotation strategies
Item Description
The Father/Son media rotation strategy uses a combination of full and differential
or incremental backups for a two-week schedule.
In the Father/Son scenario, four media are used Monday through Thursday for
differential or incremental backups. The other two media containing full backups
are rotated out and stored off-site every Friday.
The Father/Son strategy is easy to administer and lets you keep data longer than
the Son strategy. The Father/Son strategy is not suitable for the stringent data
protection needs of most network environments.
When this backup strategy is first implemented, you must start with a full backup.
Week 1
Week 2
Item Description
The Grandfather method is one of the most common media rotation strategies. The
Grandfather method is easy to administer and comprehensive enough to allow easy
location of files when they need to be restored.
In the Grandfather scenario, four tapes are used Monday through Thursday for
incremental or differential backups; another three tapes are used every Friday for
full backups.
The remaining 12 media are used for monthly full backups and are kept off-site.
Tape storage 437
Tape media rotation strategies
Week 1
Week 2
Week 3
Week 4
■ Viewing jobs, job histories, and active alerts for a storage device pool
■ A storage device with the most amount of free space. This setting is beneficial
for a backup that has Granular Recovery Technology (GRT) enabled, and is
sent to a disk storage device pool. GRT jobs that are sent to disk storage devices
cannot span.
Note: You must use the Backup Exec Management Command Line Interface to
change the default to specify whether jobs are sent to a device that has the most
or least free space.
See “Specifying a default selection method for a device in a storage device pool”
on page 441.
Backup Exec creates and maintains system-defined storage device pools for disk
storage, tape drives, disk cartridges, and virtual disks. Any storage devices that
you configure or that you attach are automatically added to the appropriate
system-defined storage device pool. You can select these storage device pools
when you select the storage for a backup job. You cannot edit a system-defined
storage device pool. Before you can view the default storage device pools on the
Storage tab, under All Storage Pools, you must create a storage device pool. If
you have the Central Admin Server feature installed, you can create managed
Backup Exec server pools.
Any disk cartridge Contains the disk cartridges that you have
configured to use as storage. Backup Exec
creates this pool the first time that you
configure disk cartridge storage.
For storage device pools that you create, you must edit the properties of the pool
and check the check box next to the device before jobs can use that device in the
pool.
Use the Configure Storage wizard to create storage device pools.
Storage device pools 440
Creating storage device pools
If the Central Admin Server feature is not Select Storage pools, and then click Next.
installed
If the Central Admin Server feature is Do the following in the order listed:
installed
■ Select the Backup Exec server that you
want to configure storage for, and then
click Next.
■ Select Storage pools, and then click
Next.
To view jobs, job histories, and active alerts for a storage device pool
1 On the Storage tab, expand All Storage Pools.
2 Right-click the storage device pool for which you want to view the jobs, and
then click Details.
3 In the left pane, click Jobs, Job Histories, or Active Alerts.
Note: To view or change the default device selection method for a storage device
pool, you must use the Backup Exec Management Command Line Interface.
See “Specifying a default selection method for a device in a storage device pool”
on page 441.
To add a storage device to the pool Do the following in the order listed:
■ Click Add.
■ Select the devices that you want to add,
and then click OK.
To remove a storage device from a pool Select the device that you want to remove,
and then click Remove.
5 Click Apply.
Chapter 13
Storage operations
This chapter includes the following topics:
■ Viewing jobs, job histories, backup sets, and active alerts for storage devices
■ Retensioning a tape
Item Description
This column only appears if you select the List view from the
Views group at the top of the window.
Backup Exec Server Identifies the Backup Exec server on which you configured
the storage device. If you share the device between multiple
Backup Exec servers, the device displays for each Backup
Exec server.
This column only appears if you select the List view from the
Views group at the top of the window.
Storage operations 446
Storage tab overview in Backup Exec
Item Description
Storage Type Displays the type of storage that is associated with the device.
The storage type can include tape drives, robotic libraries,
disk storage, media sets, media vaults, cloud storage, and
so on.
This column only appears if you select the List view from the
Views group at the top of the window.
Storage Trending Indicates the estimate for the number of days of storage that
is left for disk storage and virtual disk storage.
Item Description
For disk storage and disk cartridge storage, you can set the
thresholds for low disk space on the device property pages.
Total Capacity Displays the total amount of storage space that is available
on the device.
For disk storage, this column indicates the size of the volume
on which the disk storage is located.
For tapes, this column indicates the used native capacity and
total native capacity of the media.
Used Space Displays the amount of space that is used as storage, after
any compression or deduplication operations have occurred.
Storage operations 448
Using the Configure Storage wizard
Item Description
Backup Data Written Displays how much raw backup data is backed up, before
compression or deduplication have occurred. For example,
if you back up 100 MB of data ten times to a deduplication
disk folder, the used space is 100 MB but the amount of the
backup data written is 1 GB.
Available Space Displays the difference between Total Capacity and Used
Space.
Active and Scheduled Jobs Displays the number of storage operation jobs, backup jobs,
and restore jobs that are running on this device. Click the
text in this column to see more details of all jobs that are
running or that are scheduled to run.
Compression Ratio Displays the ratio of the uncompressed size of a file over its
compressed size.
Average job rate Disiplays the average speed of the jobs that run on this
device.
Table 13-2 Storage that you can configure in the Configure Storage wizard
Type of Description
storage
■ Disk storage
A location on a locally attached internal hard drive, a USB device, a
FireWire device, or a NAS (network-attached storage) device.
See “Configuring disk storage” on page 317.
■ Disk cartridge storage
Storage that usually remains attached to the server while you remove
the media. Disk cartridges use disk cartridge media such as an RDX
device, or devices that appear in Windows as removable storage.
See “Configuring disk cartridge storage” on page 328.
■ Deduplication disk storage
A location on a hard drive that reduces the size of backups by storing
only unique data.
See “Creating or importing deduplication disk storage” on page 937.
Table 13-2 Storage that you can configure in the Configure Storage wizard
(continued)
Type of Description
storage
Media sets Media sets and vaults are for tape media only, and include the following:
and vaults
■ Append period
■ Overwrite protection period
■ Vaulting rules
3 Select the check box for each recipient that you want to notify when each type
of storage operation job completes.
4 You can continue selecting other options, or click OK.
See “Scheduling a storage operation job” on page 451.
■ Every X hour/minute
Indicates the number of hours or
minutes between the start time of a job
and the start time of the next job
instance.
■ From
Designates the starting time for a job
to run.
■ Between
Restricts the job to certain hours and
days. For example, if you only want the
job to run during business hours, you
can select 9:00 AM to 5:00 PM on
Monday, Tuesday, Wednesday,
Thursday, and Friday.
The start time and end time can span
a maximum of 24 hours, however they
can cross over midnight into the
following day.
■ Every X day
Indicates the number of days between
the start time of a job and the start time
of the next job instance.
■ Every weekday
Specifies that the job should run on
Mondays, Tuesdays, Wednesdays,
Thursdays, and Fridays.
Storage operations 453
Scheduling a storage operation job
Months
Storage operations 455
Scheduling a storage operation job
■ Every X year
Specifies the number of years between
the start time of a job and the start time
of the next job instance.
■ On X
Specifies the date on which Backup
Exec runs the job. The date that you
select in this field corresponds to the
number of years that you selected in
the Every X year field. So if you
selected to run the job every 2 years
and you selected June 28th in this field,
the job runs every 2 years on June
28th.
■ On the X of X
Specifies the day and month on which
Backup Exec runs the job. The date
that you select in this field corresponds
to the number of years that you
selected in the Every X year field. So
if you selected to run the job every 2
years and you selected the fourth
Thursday of June in this field, the job
runs every 2 years on the fourth
Thursday of June.
Reschedule the job if it does not start x Specify the amount of time past the job's
hours after its scheduled start scheduled start time at which Backup Exec
changes the job completion status to
Missed. The job is rescheduled to run
based on the time window that you
configured.
Cancel the job if it is still running x Specify the amount of time after the job's
hours after it scheduled start time scheduled start time at which you want to
cancel the job if it is still running. Backup
Exec changes the job completion status to
Canceled, timed out.
Include dates with the schedule of this Specify dates to include with the job
job schedule. The job runs on all of the dates
that you select using this option, in addition
to the dates that are part of its normal
schedule recurrence. The job resumes its
normal schedule on the next day that it is
scheduled after an include date.
Exclude dates from the schedule for Specify dates to exclude from the job
this job schedule. The job does not run on any of
the dates that you select using this option.
It resumes its normal schedule on the next
day that a job is scheduled after an
excluded date.
Run now with no recurring schedule Run the job immediately without scheduling
any more instances of it for the future.
Run on Run the job at the time and date that you
specify.
Storage operations 458
Editing global settings for storage
5 Click OK.
Inventory robotic libraries when Backup Enable Backup Exec to inventory all of the
Exec services start slots in a robotic library when Backup Exec
services start. Depending on the number
of slots and robotic libraries, this process
may take a few minutes.
Full - protect allocated and imported Select this option to prevent Backup Exec
media from overwriting tape media that are in
media sets and the media that are imported
from another installation of Backup Exec
or from another product.
Partial - protect only allocated media Select this option to let Backup Exec
overwrite tape media that are imported
from another installation of Backup Exec
or from another product, or scratch media.
Media in a media set that has an overwrite
protection period that has not expired
(allocated media) cannot be overwritten.
Overwrite scratch media before Select this option to let Backup Exec
overwriting recyclable media contained overwrite scratch media first in a tape drive
in the targeted media set when an overwrite job occurs.
Overwrite recyclable media contained Select this option to let Backup Exec
in the targeted media set before overwrite recyclable media in a tape drive
overwriting scratch media in the selected media set first when an
overwrite job occurs.
Limit Backup Exec to read-only Select this option to prevent Backup Exec
operations on a disk-based storage from reclaiming disk space from expired
device if it has been detached for backup sets on any disk-based storage
device that is attached after being absent
for a number of days. Backup jobs that you
send to this device fail. You can change
this setting per disk-based storage device
in the device's properties.
Limit Backup Exec to read-only Prevents Backup Exec from reclaiming disk
operations on a disk cartridge if it has space from expired backup sets on any
not been inserted for disk cartridge that is inserted after being
absent for a number of days. Backup jobs
that you send to this device fail. You can
change this setting per disk cartridge in the
device's properties.
4 Click OK.
Note: The Enterprise Server feature must be installed before you can share storage
devices between Backup Exec servers.
server can use the storage device. However, if your environment does not allow
the central administration server to operate as a managed Backup Exec server,
then you can remove the sharing capability from the central administration server.
If you have multiple Backup Exec servers and multiple types of storage in your
environment, you can select a Backup Exec server and manage the storage for it.
To share a storage device
1 On the Storage tab, right-click the storage device that you want to share.
2 Click Share.
3 To share a disk storage device or a virtual disk, enter a UNC path by which
the servers can access the storage device that you want to share.
4 Check the Backup Exec servers or managed Backup Exec servers that you
want to share this storage device.
5 Click OK.
Note: If a media password was used from a previous release of Backup Exec,
Backup Exec catalogs the media as if it is not password-protected. It is
recommended that you encrypt data instead.
See “Using encryption with Backup Exec” on page 624.
To catalog storage
1 On the Storage tab, right-click the storage device for which you want to create
a catalog.
2 Click Catalog.
3 On the catalog dialog box, click General, and then enter a name for the job.
4 Click OK.
5 (Optional) View the job log or click the Job Monitor tab for details about the
job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
4 To schedule the job, in the left pane, click Schedule and select the appropriate
options.
See “Scheduling a storage operation job” on page 451.
5 (Optional) View the scan job log to see which barcoded media are in the slots,
drives, and portals of a robotic library, or click the Job Monitor tab for details
about the job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
3 To send notification when the job completes, in the left pane, click Notification
and select the appropriate options.
4 To schedule the job, in the left pane, click Schedule and select the appropriate
options.
See “Scheduling a storage operation job” on page 451.
5 Click OK.
6 (Optional) View the job history or click the Job Monitor tab for details about
the job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
See “Inventorying robotic libraries when Backup Exec services start” on page 391.
Retensioning a tape
Before you run a backup job to a tape, you can run the tape in the tape drive from
beginning to end at a fast speed. Retensioning helps the tape wind evenly and run
more smoothly past the tape drive heads. Refer to the documentation that came
with your tape drive to see how often to run this operation.
This operation is only available if the tape drive supports retensioning.
See “About storage operation jobs” on page 444.
To retension a tape
1 On the Storage tab, do either of the following:
■ Right-click the drive that contains the tape that you want to retension.
■ Double-click Slots, and then right-click the slot that contains the tape that
you want to retension.
2 Click Retension.
3 (Optional) View the job log or click the Job Monitor tab for details about the
job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
Caution: Formatting erases the tape. All data on the tape is destroyed.
The media label that is displayed was read during the last inventory operation. The
media label does not change until another inventory operation occurs. If you change
the tape that is in the device but do not inventory the device, the media label that
displays may not match the actual media that is in the device.
2 Click Format.
3 To format the tape that is displayed, click Yes.
4 (Optional) View the job log or click the Job Monitor tab for details about the
job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
3 To send notification when the job completes, in the left pane, click Notfication
and select the appropriate options.
4 To schedule the job, in the left pane, click Schedule and select the appropriate
options.
See “Scheduling a storage operation job” on page 451.
5 Click OK.
6 (Optional) View the job history or click the Job Monitor tab for details about
the job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
5 To schedule the job, in the left pane, click Schedule and select the options
that you want.
See “Scheduling a storage operation job” on page 451.
6 Click OK.
7 (Optional) View the job history or click the Job Monitor tab for details about
the job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
Note: You should not associate scratch media with a media set that you create.
Backup Exec automatically moves the media to the required media set as needed.
2 (Optional) View the job history or click the Job Monitor tab for details about
the job.
To schedule an import media job
1 On the Storage tab, do one of the following:
■ Expand the robotic library, right-click Slots, and then click Import media
now.
■ Right-click the robotic library, and then click Import media now, and then
click Schedule.
Inventory after import Mounts the media in the drive, reads the
media label, and updates the Backup Exec
database. This operation is necessary for
media that do not have barcodes.
4 To send a notification when the job completes, in the left pane, click Notification
and select the appropriate options:
5 To schedule the job, in the left pane, click Schedule and select the appropriate
options.
■ Every X hour/minute
Indicates the number of hours or minutes
between the start time of a job and the start
time of the next job instance.
■ From
Designates the starting time for a job to run.
■ Between
Restricts the job to certain hours and days.
For example, if you only want the job to run
during business hours, you can select 9:00
AM to 5:00 PM on Monday, Tuesday,
Wednesday, Thursday, and Friday.
The start time and end time can span a
maximum of 24 hours, however they can
cross over midnight into the following day.
■ Every X day
Indicates the number of days between the
start time of a job and the start time of the
next job instance.
■ Every weekday
Specifies that the job should run on Mondays,
Tuesdays, Wednesdays, Thursdays, and
Fridays.
Storage operations 481
Importing media to Backup Exec
Months
Storage operations 483
Importing media to Backup Exec
■ Every X year
Specifies the number of years between the
start time of a job and the start time of the
next job instance.
■ On X
Specifies the date on which Backup Exec runs
the job. The date that you select in this field
corresponds to the number of years that you
selected in the Every X year field. So if you
selected to run the job every 2 years and you
selected June 28th in this field, the job runs
every 2 years on June 28th.
■ On the X of X
Specifies the day and month on which Backup
Exec runs the job. The date that you select in
this field corresponds to the number of years
that you selected in the Every X year field.
So if you selected to run the job every 2 years
and you selected the fourth Thursday of June
in this field, the job runs every 2 years on the
fourth Thursday of June.
Reschedule the job if it does not Specify the amount of time past the job's
start x hours after its scheduled scheduled start time at which Backup Exec
start changes the job completion status to Missed. The
job is rescheduled to run based on the time
window that you configured.
Storage operations 485
Exporting media and expired media
Cancel the job if it is still running Specify the amount of time after the job's
x hours after it scheduled start scheduled start time at which you want to cancel
time the job if it is still running. Backup Exec changes
the job completion status to Canceled, timed out.
Include dates with the schedule Specify dates to include with the job schedule.
of this job The job runs on all of the dates that you select
using this option, in addition to the dates that are
part of its normal schedule recurrence. The job
resumes its normal schedule on the next day that
it is scheduled after an include date.
Exclude dates from the schedule Specify dates to exclude from the job schedule.
for this job The job does not run on any of the dates that you
select using this option. It resumes its normal
schedule on the next day that a job is scheduled
after an excluded date.
Run now with no recurring Run the job immediately without scheduling any
schedule more instances of it for the future.
Run on Run the job at the time and date that you specify.
Create without a schedule Create a job without scheduling it. When you use
this option, the job does not run at the time of
creation and it does not have a recurring
schedule. The job remains unscheduled until you
choose to run it. You can use a third-party job
automation or task scheduling tool to run the job
later.
6 Click OK
7 (Optional) View the job history or click the Job Monitor tab for details about
the job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
in the portals. If you select more media than there are portals, the robotic library
fills as many slots as possible. Then, you are prompted to remove the media from
the portal. This process continues until all of the selected media have been removed
from the robotic library. You can also export expired media from a robotic library.
The export expired media operation lets you automate media handling in robotic
libraries. This operation removes the media that Backup Exec cannot write to. You
can then use the Import after export operation to add scratch media to the robotic
library to prepare for the next backup.
After you export the expired media from the robotic library, the expired media
appears in Offline Tape. If the media is in a media set that has an applicable vault
media rule, then the media appears in the vault location.
You can export cleaning media with the export expired media storage operation.
You can include all cleaning media, or all cleaning media that has been used more
than a specified number of times.
See “Importing media to Backup Exec ” on page 478.
Note: Not all storage operations are available for all devices.
To immediately export only the media that Click Export expired media now.
Backup Exec cannot write to and place it
The operation runs. You can view the job
in the portal
history for details about the job.
3 (Optional) View the job history or click the Job Monitor tab for details about
the job.
See “Viewing jobs, job histories, backup sets, and active alerts for storage
devices” on page 470.
To schedule an export media or export expired media operation
1 On the Storage tab, do one of the following:
■ Expand the robotic library, right-click Slots, and then click Export media.
■ Right-click the robotic library, and then click Export.
2 Click Schedule.
3 In the left pane, click Storage operations.
Storage operations 488
Locking and unlocking the robotic library’s front portal
4 Click the drop-down menu and select one of the following storage operations
that you want to schedule:
Import media after export Adds the scratch media to the robotic
library to prepare for the next backup.
Export expired media Places the expired media into the robotic
library's portals.
5 To send notification when the job completes, in the left pane, click Notification
and select the appropriate options.
6 To schedule the job, in the left pane, click Schedule and select the appropriate
options.
7 Click OK.
8 (Optional) View the job history or click the Job Monitor tab for details about
the job.
5 To schedule the job, in the left pane, click Schedule and select the appropriate
options.
■ Every X hour/minute
Indicates the number of hours or minutes
between the start time of a job and the start
time of the next job instance.
■ From
Designates the starting time for a job to run.
■ Between
Restricts the job to certain hours and days.
For example, if you only want the job to run
during business hours, you can select 9:00
AM to 5:00 PM on Monday, Tuesday,
Wednesday, Thursday, and Friday.
The start time and end time can span a
maximum of 24 hours, however they can
cross over midnight into the following day.
■ Every X day
Indicates the number of days between the
start time of a job and the start time of the
next job instance.
■ Every weekday
Specifies that the job should run on Mondays,
Tuesdays, Wednesdays, Thursdays, and
Fridays.
Months
Storage operations 492
Locking and unlocking the robotic library’s front portal
■ Every X year
Specifies the number of years between the
start time of a job and the start time of the
next job instance.
■ On X
Specifies the date on which Backup Exec runs
the job. The date that you select in this field
corresponds to the number of years that you
selected in the Every X year field. So if you
selected to run the job every 2 years and you
selected June 28th in this field, the job runs
every 2 years on June 28th.
■ On the X of X
Specifies the day and month on which Backup
Exec runs the job. The date that you select in
this field corresponds to the number of years
that you selected in the Every X year field.
So if you selected to run the job every 2 years
and you selected the fourth Thursday of June
in this field, the job runs every 2 years on the
fourth Thursday of June.
Reschedule the job if it does not Specify the amount of time past the job's
start x hours after its scheduled scheduled start time at which Backup Exec
start changes the job completion status to Missed. The
job is rescheduled to run based on the time
window that you configured.
Storage operations 494
Backup Exec server and storage device states
Cancel the job if it is still running Specify the amount of time after the job's
x hours after it scheduled start scheduled start time at which you want to cancel
time the job if it is still running. Backup Exec changes
the job completion status to Canceled, timed out.
Include dates with the schedule Specify dates to include with the job schedule.
of this job The job runs on all of the dates that you select
using this option, in addition to the dates that are
part of its normal schedule recurrence. The job
resumes its normal schedule on the next day that
it is scheduled after an include date.
Exclude dates from the schedule Specify dates to exclude from the job schedule.
for this job The job does not run on any of the dates that you
select using this option. It resumes its normal
schedule on the next day that a job is scheduled
after an excluded date.
Run now with no recurring Run the job immediately without scheduling any
schedule more instances of it for the future.
Run on Run the job at the time and date that you specify.
Create without a schedule Create a job without scheduling it. When you use
this option, the job does not run at the time of
creation and it does not have a recurring
schedule. The job remains unscheduled until you
choose to run it. You can use a third-party job
automation or task scheduling tool to run the job
later.
6 Click OK.
See “Viewing jobs, job histories, backup sets, and active alerts for storage devices”
on page 470.
Table 13-3 Possible states for Backup Exec servers and storage devices
State Description
All the Backup Exec services need to be The Backup Exec services and the Backup
restarted on <Backup Exec server> Exec deduplication services must be
restarted.
An error occurred while discovering this The Backup Exec services must be restarted.
device. Cycle the services on <Backup Exec
See “Starting and stopping Backup Exec
server> to retry device discovery.
services” on page 667.
Low disk space; Active The storage device is in a low disk space
condition, but is currently in use by a job.
Low disk space The storage device has low disk space.
Table 13-3 Possible states for Backup Exec servers and storage devices
(continued)
State Description
Table 13-3 Possible states for Backup Exec servers and storage devices
(continued)
State Description
The Backup Exec deduplication services need The Backup Exec deduplication services
to be restarted on <Backup Exec server> should be restarted. The deduplication
services are separate from the Backup Exec
services so the Backup Exec services are not
affected.
The Backup Exec services on <Backup Exec The Backup Exec services must be restarted.
server> need to be restarted
See “Starting and stopping Backup Exec
services” on page 667.
This device has not been discovered A state that can occur after you add a new
correctly. Cycle the services on <Backup storage device to Backup Exec. You must
Exec server> to retry device discovery. restart the Backup Exec services so that the
device discovery process can run again.
Security > Disk storage lockdown settings > Disable and enter the System
Logon Account credentials.
To view the disk storage lockdown status
1 In the Backup Exec status bar, double-click Disk storage lockdown status.
The Disk storage lockdown status details dialog box is displayed. The Disk
storage lockdown status displays the status of the disk storage lockdown
setting. There can be four states of the disk lockdown.
Enabled with exception The disk storage setting is enabled but there are some disk
storage for which the lockdown cannot be enabled.
Unavailable Backup Exec cannot retrieve the status of the disk storage
lockdown setting.
2 Click OK.
See “Changing network and security options for Backup Exec” on page 614.
Chapter 14
Conversion to virtual
machines
This chapter includes the following topics:
Note: Conversion of a physical Hyper-V host into a virtual machine is not supported.
In addition, in a VMware environment, conversion of Windows Server 2012 physical
servers that have 4K disks is not supported.
The newly created virtual machine is bootable and is identical to the physical
computer from which the virtual machine was converted, with the exception of the
network cards and settings. Conversion to a virtual machine enables business
continuity for both Hyper-V and VMware environments.
This topic includes the following information:
Conversion to virtual machine options
How backup selections are processed during conversion to virtual jobs
How full, incremental, and differential backups work in conversion to virtual jobs
Conversion of disks or volumes larger than 2 terabytes
Notes about conversion to a virtual machine running on a Windows Server 2012
or later Hyper-V host
Notes about conversion of Exchange servers
Back Up to Disk and then Convert to These options let you schedule the
Virtual Machine conversion to run after the backup job. These
options require a smaller backup window than
Back Up to Deduplication Disk Storage
the simultaneous conversion options.
and then Convert to Virtual Machine
A conversion from a full backup creates the
new virtual machine. Incremental and
differential backups update the virtual
machine that was created from the full
backup.
Note: Incremental backups are preferred
over differential backups because the
differential backups are inefficient for
conversion as compared to incremental
backups.
Note: Regardless of the option that is used to initiate the conversion, Backup Exec
does not power on the virtual machine after creating it.
Backup Exec creates a snapshot of the virtual machine at the end of the conversion
process. The snapshot is removed before the next job runs as long as the virtual
machine is not powered on and the only snapshot on the virtual machine is the one
that Backup Exec created. If you want to start using the virtual machine, you must
manually remove the snapshot.
If the converted virtual machine's host fails and you bring the virtual machine online,
the existing conversion job continues to run and then fails. In this situation, you
must create a new conversion job.
Conversion to virtual machines 504
How conversion of physical computers to virtual machines works in Backup Exec
Note: If the boot volume or the system volume on the source physical computer is
larger than 2 TB and you are converting to a VMware or Hyper-V 2008 R2 virtual
machine, then Backup Exec cannot convert it. A boot volume cannot be split or
created as a dynamic spanned volume. This limitation also applies if the boot volume
on the source is larger than the destination datastore's maximum supported disk
size.
Backup Exec converts all disks and volumes on the destination to simple or spanned
dynamic volumes. Even if the source disk is a basic disk, the converted disks on
the destination will be dynamic. Since Backup Exec supports only simple and
spanned dynamic volumes, if the source volume type is striped, mirror, or raid5,
then Backup Exec converts that volume to either simple or spanned on the
destination.
The following additional information applies only to VMware:
■ Conversion of a volume that is larger than 2 TB is supported in the following
situations:
■ If the volume is not a boot or system volume
■ If the volume was created on a dynamic disk
■ If the volume is an MBR disk
■ Conversion of GPT disks is not supported, regardless of the size of the volume
on the disk. Conversions of GPT disks fail.
■ In situations where the VMware source disk size is larger than the destination
datastore's maximum supported size, the source disk is split into multiple disks.
Backup Exec splits the disk based on the destination datastore's maximum
allowed size.
■ The conversion of physical computers that have simple GPT disks is supported.
■ The conversion of physical computers that have dynamic disks is not supported.
■ Storage Spaces and Storage Pools are not supported.
■ Conversion to any previous versions of a Windows Hyper-V host is not supported,
so those jobs fail. For example, if the physical computer runs Windows Server
2012 with an ReFS volume, conversion to a Windows Server 2012 Hyper-V
host is supported.
■ If the physical computer runs Windows Server 2012 or later with one or more
Windows deduplication volumes, conversion to a Hyper-V host is possible, but
it may fail. The converted disk data is not deduplicated. In other words, an
unoptimized data transfer is performed. For this reason, the conversion may fail
if the amount of unoptimized data is greater than the capacity of the destination
volume.
■ MSExchangeServiceHost
■ MSExchangeThrottling
■ MSExchangeTransport
■ MSExchangeTransportLogSearch
■ MSExchangeUM
■ MSExchangeUMCR
See “Requirements for conversion to virtual machine jobs” on page 507.
Note: The Agent for VMware and Hyper-V is not required for conversion to
virtual machines.
■ Before running a conversion job that targets a Hyper-V host, disable the File
Server Resource Manager (FSRM). If you do not disable FSRM, then the
job may fail with an "out of disk space" error.
Note: If the backup fails, then the conversion fails also. However, if the conversion
fails, the backup continues to run. For a conversion failure, the job is marked as a
success with exceptions and the conversion process runs again during the next full
backup.
4 In the Conversion to Virtual box, click Edit to set the options for conversion.
5 In the Convert for field, select either Hyper-V or VMware ESX/vCenter server.
6 Configure the conversion options:
Conversion to virtual machines 510
Converting to a virtual machine simultaneously with a backup job
7 Click OK.
8 On the Backup Definition Properties dialog box, click OK to create the job.
See “How conversion of physical computers to virtual machines works in Backup
Exec” on page 499.
6 Optional: In the left pane, select Notification to notify selected recipients when
the job completes.
7 In the left pane, select Conversion Settings to set the options for the
conversion.
8 In the Convert for field, select either Hyper-V or VMware ESX/vCenter server.
9 Configure the conversion options:
Conversion to virtual machines 518
Converting to a virtual machine after a backup job
6 In the left pane, select Conversion Settings to set the options for the
conversion.
7 In the Convert for field, select either Hyper-V or VMware ESX/vCenter server.
8 Configure the conversion options:
Conversion to virtual machines 525
Adding a conversion to virtual machine stage to a backup job
The option to convert to a virtual machine from a point in time is useful in a disaster
recovery situation in which you want to quickly recover a failed server. The backup
sets contain all of the necessary components of the system. Additionally, you can
select application data or user data to include in the conversion.
Conversion to virtual machines 531
Converting to a virtual machine from a point in time
5 On the Options dialog box, in the Convert to Virtual box, click Edit
6 In the left pane, select Schedule to select when to run the conversion job:
To schedule the conversion to run at a Click Run on, and then enter the date and
specific time time to run the job.
To create the conversion job without Select Create without a schedule. When
scheduling it you use this option, the job does not run
at the time of creation and it does not have
a recurring schedule. The job remains in
a pending state until you choose to run it.
You can use a third-party job automation
or task scheduling tool to run the job later.
7 (Optional) In the left pane, select Notification if you want to notify a recipient
when the job completes.
8 In the left pane, select Conversion Settings to set the options for the
conversion
9 In the Point in time field, select the point in time that you want to use for the
conversion.
10 In the Name field, select all of the components for inclusion in the conversion.
11 In the Application data or non-system user data field, select additional data
to include in the conversion.
12 Click OK to save your selections.
13 On the Options dialog box, click OK.
Conversion to virtual machines 532
Creating a one-time conversion to a virtual machine
Note: Copy backups are not supported in Hyper-V 2008 or 2008 R2. A
crash-consistent conversion is created instead.
To schedule the conversion to run at a Click Run on, and then enter the date and
specific time time to run the job.
To create the conversion job without Select Create without a schedule. When
scheduling it you use this option, the job does not run
at the time of creation and it does not have
a recurring schedule. The job remains in
a pending state until you choose to run it.
You can use a third-party job automation
or task scheduling tool to run the job later.
5 (Optional) In the left pane, select Notification if you want to notify a recipient
when the job completes.
6 In the left pane, select Conversion Settings to set the options for the
conversion.
7 In the Convert for field, select either Hyper-V or VMware ESX/vCenter server.
Conversion to virtual machines 533
Creating a one-time conversion to a virtual machine
4 (Optional) In the left pane, select Notification, and then select the recipients
who should receive notifications about conversion to virtual jobs.
8 Click OK
Chapter 15
Configuration and settings
This chapter includes the following topics:
■ Configuring Instant GRT and full catalog options to improve backup performance
for GRT-enabled jobs
■ Setting default schedule options for rule-based jobs and run now jobs
■ Exporting a list of dates that are excluded from all backups to another server
■ Backup networks
Note: Backup Exec displays only the types of backup jobs for which your system
is configured. For example, if you do not have a tape drive, you do not see the Back
Up to Tape option in the list of backup job types.
3 In the left pane, select the setting for which you want to configure default
options.
The test job can help you determine if there are any
problems that might keep backup jobs from completing
successfully.
Instant GRT Select this option to configure Instant GRT or full catalog
operations for any GRT-enabled jobs. You can choose
to run a full catalog operation immediately after the
backup job finishes, schedule the full catalog operation
for another time, or run an Instant GRT operation as
part of the backup job.
Advanced Open File Select this option to configure the snapshot settings that
Backup Exec uses to process backup jobs. Snapshot
technology lets Backup Exec capture any files that are
open when a backup job runs.
Pre/Post Commands Select this option to configure any commands that you
want to run either before backup jobs begin or after
backup jobs are completed.
Files and Folders Select this option to configure how Backup Exec
processes file system attributes such as junction points
and symbolic links.
Linux and Macintosh Select this option to configure options for any Linux or
Macintosh computers that are included in backup jobs.
Microsoft Active Directory Select this option to configure options for any Microsoft
Active Directory data that is included in backup jobs.
Microsoft Exchange Select this option to configure options for any Microsoft
Exchange data that is included in backup jobs.
Virtual Machines Select this option to configure options for any virtual
machines that are included in backup jobs.
Microsoft SharePoint Select this option to configure options for any Microsoft
SharePoint data that is included in backup jobs.
Microsoft SQL Select this option to configure options for any Microsoft
SQL data that is included in backup jobs.
To configure default schedule ■ Click the Backup Exec button, and then select
settings for all backup jobs Configuration and Settings.
■ Select Job Defaults, and then select the type of
backup for which you want to configure schedule
settings.
4 In the Job name field, type the name of the job for which you want to configure
a schedule.
The unique job name helps you to identify backup jobs in Backup Exec. This
is only available to set per job, not as a default backup job setting.
5 For each job for which you want to configure a schedule, do one of the following:
■ Select Recurrence.
■ Proceed to step 6 to configure the recurrence
pattern.
When you use this option, the jobs do not run at the
time of creation and they do not have a recurring
schedule. The jobs remain unscheduled until you choose
to run them. You can use a third-party job automation
or task scheduling tool to run the jobs later.
■ Every X hour/minute
Indicate the number of hours or minutes between
the start time of a job and the start time of the next
job instance.
■ You must choose between the following options:
■ From
Designate the starting time for a job to run.
■ Between
Restrict the job to certain hours and days. For
example, if you only want the job to run during
business hours, you can select 9:00 AM to 5:00
PM on Monday, Tuesday, Wednesday, Thursday,
and Friday.
The start time and end time can span a maximum
of 24 hours. However, they can cross over
midnight into the following day.
■ Every X day
Indicate the number of days between the start time
of a job and the start time of the next job instance.
■ Every weekday
Select this option to enable the job to run on
Mondays, Tuesdays, Wednesdays, Thursdays, and
Fridays.
Months
Configuration and settings 553
Configuring schedules for backup jobs
If you select the 31st, the job runs on the last day of
the month in months that do not have 31 days. For
example, if you configure the job to run on the 31st,
in September the job runs on the 30th instead.
■ Every X year
Specify the number of years between the start time
of a job and the start time of the next job instance.
■ You must choose between the following options:
■ On X
Specify the date on which Backup Exec runs the
job. The date that you select in this field
corresponds to the number of years that you
selected in the Every X year field. So if you
selected to run the job every 2 years and you
selected June 28th in this field, the job runs every
2 years on June 28th.
■ On the X of X
Specify the day and month on which Backup
Exec runs the job. The date that you select in
this field corresponds to the number of years that
you selected in the Every X year field. So if you
selected to run the job every 2 years and you
selected the fourth Thursday of June in this field,
the job runs every 2 years on the fourth Thursday
of June.
at Enter the starting time for the first job in the recurrence
pattern.
Starting on Enter the date on which you want the recurrence pattern
to begin.
The date that you enter in this field is the date on which
the schedule goes into effect. You can select any date
in the past or the future. If you select a date that
occurred in the past, Backup Exec calculates the date
of the next upcoming job and begins running recurring
jobs on that date.
Run initial full backup now Select this option to run the initial full backup as soon
in addition to the selected as the job is created without affecting the schedule of
schedule future jobs.
Reschedule the job if it Specify the amount of time past the job's scheduled
does not start X hours after start time at which you want Backup Exec to change
its scheduled start time the job completion status to Missed. The job is
rescheduled to run based on the time window that you
configured.
Cancel the job if it is Specify the amount of time after the job's scheduled
running X hours after its start time at which you want to cancel the job if it is still
scheduled start time running. Backup Exec changes the job completion status
to Canceled, timed out.
7 To configure specific dates to include with the recurring job schedule, select
the Include/exclude dates tab, and then complete the following steps:
■ Click Include dates.
■ Select the dates that you want to include with the recurring job schedule.
■ Click OK.
The job runs on all of the dates that you select using this option, in addition to
the dates that are part of its normal schedule recurrence. The job resumes its
normal schedule on the next day that it is scheduled after an include date.
See “Including a specific date in the schedule for a backup job” on page 212.
8 To configure specific dates to exclude from the job schedule, select the
Include/exclude dates tab, and then complete the following steps:
■ Click Exclude dates.
■ Select the dates that you want to exclude from the recurring job schedule.
■ Click OK.
The job does not run on any of the dates that you select using this option. It
resumes its normal schedule on the next day that a job is scheduled after an
excluded date.
See “Preventing backup jobs from running on a specific date” on page 213.
Configuration and settings 556
Configuring storage options for backup jobs
Note: Some of these options display only in Central Admin Server feature
(CAS) environments.
Backup Exec server or Select whether you want a job to run on devices on a
Backup Exec server pool specific managed Backup Exec server or on devices
that are on a group of managed Backup Exec servers.
Enable the remote Select this option to enable a remote computer to send
computer to directly access data directly to an OpenStorage device or a
the storage device and to deduplication disk storage device, and to perform
perform client-side client-side deduplication if the device supports it. The
deduplication, if it is Backup Exec server is bypassed, which leaves the
supported Backup Exec server free to perform other operations.
If client-side deduplication cannot be performed, then
either Backup Exec server deduplication or Appliance
deduplication is performed.
Enable the remote Select this option to enable a remote computer to send
computer to access the data through the Backup Exec server to an OpenStorage
storage device through the device or a deduplication disk storage device, and to
Backup Exec server and to perform Backup Exec server-side deduplication if it it
perform Backup Exec supported. If the Backup Exec server does not support
server-side deduplication, deduplication, the data is deduplicated on an intelligent
if it is supported disk device, such as PureDisk or a device from a
third-party vendor.
5 In the Keep for field, enter the amount of time for which you want to keep the
backup sets or job history.
If you have selected Glacier or Deep Archive cloud storage devices in the
Storage field, when the backup sets are deleted, the storage provider still
incurs charges based on their pricing model.
See “Notes for cloud-based storage devices” on page 365.
6 If you selected to configure a tape device in the Storage field, complete the
following options as necessary:
Configuration and settings 559
Configuring storage options for backup jobs
Media set Select the media set to use for the backup job. The
media set specifies the overwrite protection period and
the append period for the backup data on the media.
■ Scratch media
■ Media for which the overwrite protection period has
expired
Append to media, overwrite Select this option to append the backed up data to the
if no appendable media is specified media set if an appendable media is available.
available Otherwise, Backup Exec searches for an overwritable
media and adds it to the media set.
Append to media, terminate Select this option to append the backed up data to the
job if no appendable media specified media set if an appendable media is available.
is available Otherwise, Backup Exec terminates the job.
Eject the media after job Select this option to eject the media from the drive or
completes slot when the operation completes. You can also
schedule a job to eject media.
Retension media before Select this option to run the tape in the drive from
backup beginning to end at a fast speed. Retensioning helps
the tape wind evenly and run more smoothly past the
tape drive heads. This option is available only if you
select a tape drive that supports retensioning.
Use Write once, read many Select this option to use WORM (write once, read many)
(WORM) media media for this backup job. Backup Exec confirms that
the destination device is or contains a
WORM-compatible drive, and that the WORM media is
available in the drive. If WORM media or a
WORM-compatible drive is not found, an alert is sent.
See “How WORM media is used in Backup Exec”
on page 423.
Configuration and settings 561
Configuring storage options for backup jobs
Export media to vault after Select this option to logically move the media from the
job completes robotic library to the specified media vault.
None Select this option to copy the data to the media in its
original form (uncompressed). Using some form of data
compression can help expedite backups and preserve
storage space.
Hardware (if available, Select this option to use hardware data compression if
otherwise none) the storage device supports it. If the drive does not
feature data compression, the data is backed up
uncompressed.
Hardware (if available, Select this option to use hardware data compression if
otherwise software) the storage device supports it. If the drive does not
feature hardware data compression, STAC software
compression is used.
Configuration and settings 562
Configuring automatic test run jobs for backup jobs
Encryption type Select the type of encryption that you want to use, if
any.
Encryption key Select the encryption key that you want to use, if you
selected to use encryption.
9 Click OK.
See “Changing default backup job settings” on page 545.
See “Backing up data” on page 153.
A test run job checks the media capacity that is available for the selected job.
However, you can check if there is enough available media for multiple test run
jobs in the Test Run Results Report.
See “Test Run Results report” on page 732.
You can manually run a test run job at any time.
See “Running a test run job manually” on page 221.
You can also configure test run jobs to run automatically before your scheduled
backup jobs as a default setting. If you do not want to run a test run job for a
particular backup job, you can override the default setting when you create the
backup job. You do not have to enable test run jobs as a default for all backup jobs,
however. If you want to run test run jobs only for specific backup jobs, you can
configure the test run job when you create those backup jobs.
To configure automatic test run jobs for backup jobs
1 Do one of the following:
backed up data to ensure the integrity of the collection of data and the media on
which it resides.
You can manually run a verify operation on a backup set or a job history at any
time. You can verify backup sets if you want to verify only the data that was backed
up in a specific backup job instance. If you want to verify a backup definition and
all of its dependent backup sets, you can verify a job history. For example, if you
want to verify a backup definition that used incremental backups, Backup Exec
verifies all incrementals dating back to, and including, the last full backup.
See “Verifying backed up data manually” on page 222.
By default, Backup Exec automatically verifies backed up data at the end of a
backup job. However, you can also schedule the automatic verify operation to take
place at a later time or disable the verify operation altogether. You can change
Backup Exec's verify options as part of the default backup settings or for individual
backup jobs.
To configure automatic verify operations for backup jobs
1 Do one of the following:
At the end of the job Select this option to run a verify operation automatically
when the backup job is completed.
After job finishes, as a Select this option to create a verify operation and
separate job schedule it to run as a separate job when the backup
job is completed.
You can use the Edit option to configure options for the
separate verify job.
You can use the Edit option to configure options for the
separate verify job.
Do not verify data for this Select this option to disable the verify operation for the
job backup job.
Note: This option is selected by default for the
cloud-based storage devices.
4 Click OK.
See “Changing default backup job settings” on page 545.
See “Backing up data” on page 153.
Note: The Instant GRT and Full Catalog Options are not supported for backup to
tape jobs. If you create a GRT-enabled backup to tape job for Microsoft Exchange,
Microsoft SharePoint, Microsoft Hyper-V, or VMware data, the catalog operation
runs as part of the backup job.
Full catalog
For GRT-enabled backup jobs, you can delay the catalog operation and run it as
a separate operation to have less effect on your backup window. Because the
catalog operation runs separately from the backup job, it does not prevent another
scheduled backup job from starting on time.
See “Granular Recovery Technology” on page 632.
When you enable GRT for Microsoft Exchange, Microsoft SharePoint, Microsoft
Hyper-V, or VMware backups, the full catalog operation runs immediately after the
backup job by default.
For Exchange and SharePoint agent-based backups, the full catalog operation runs
immediately after all full backups. It runs once every 24 hours for all incremental
backups and differential backups, even if you schedule more than one GRT-enabled
job to run in the 24-hour period.
For Hyper-V and VMware backups, the full catalog operation runs immediately after
all full, incremental, and differential backups by default.
You can also configure the full catalog operation to run on a schedule if you do not
want it to run immediately after the backup job.
You may want to schedule the full catalog operation to run outside of your backup
window so that it does not interfere with your system resources. If you schedule
the full catalog operation, it runs only for the most recent backup set since the last
catalog operation. In this situation, only the most recent backup set since the last
catalog operation can be used for granular recovery.
For example, if you schedule incremental backups to run every 11 hours and
schedule the full catalog operation to run at midnight, you would have the following
backup sets:
■ Full (11:00 A.M.)
Configuration and settings 567
Configuring Instant GRT and full catalog options to improve backup performance for GRT-enabled jobs
Instant GRT
An Instant GRT operation runs as part of the backup job and collects only the
minimum required catalog information. You cannot use the Search wizard to search
the backup sets for individual items. When you browse the backup sets for individual
items, Backup Exec reads and displays the granular information in the backup sets
as you browse for items that you want to restore. Depending on the backup set you
are browsing, full, incremental, or differential, it takes a few minutes or longer to
browse individual items.
Before you run an Instant GRT operation, review the following requirements:
■ In a CAS environment, ensure that the logon accounts used for backups are
added to the list of logon accounts on the central administration server and the
managed Backup Exec servers.
■ The storage that hosts the backup sets must be online when you browse for
individual items that you want to restore because Backup Exec mounts the
backup sets dynamically. For incremental and differential backup sets, all such
related backup sets should also be accessible during restore.
Configuration and settings 568
Configuring Instant GRT and full catalog options to improve backup performance for GRT-enabled jobs
■ If a CAS environment, if a Backup Exec server tries to browse the backup sets
of another Backup Exec server and if a firewall is configured between them, you
must open ports on the servers.
It is recommended that you browse backup sets either from the managed Backup
Exec server on which the backup jobs were run or from the central administrative
server.
See “Backup Exec ports” on page 621.
See “Backup Exec listening ports” on page 623.
Granular item search using Not available. You can search the backup
the Search wizard sets for granular data.
Backup sets browse You can dynamically browse You can search as well as
the backup sets to select the browse the backup sets to
individual items that you want select the individual items that
to restore. you want to restore.
Delay in catalog job No delay in the catalog job. It You can configure the catalog
runs as part of the backup job to run immediately after
job. the backup job or at a
scheduled time.
Catalog file size Smaller file size because only Large file size because the
the minimum required data is complete backup set is
cataloged. cataloged.
Configuration and settings 569
Configuring Instant GRT and full catalog options to improve backup performance for GRT-enabled jobs
Table 15-1 Differences between Instant GRT and full catalog (continued)
Time to browse granular data Slightly longer than the time Less than the time taken for
for granular restore taken for browsing data when browsing data when you do
you do a full catalog because an Instant GRT because the
Backup Exec dynamically GRT information is already
browses the backup set for available in the detailed
reading the GRT data when catalog collected during the
you expand backup sets to full catalog job.
restore granular items.
Device busy time The device is not busy for a The device is busy for a long
long time because the catalog time. First when the backup
is not detailed and it also runs happens, and then when the
as part of the backup job. full catalog operation runs as
a separate job.
You can configure these options as default settings for all GRT-enabled backup
jobs. If the default settings are not appropriate for a particular job, you can override
them when you create the job. You do not have to create default settings for Instant
GRT or full catalog options, however. If you want to configure these options only
for specific jobs, you can configure the settings when you create those jobs.
To configure an Instant GRT or a full catalog operation
1 Do one of the following:
Enable Instant GRT Select this option if you want to run an Instant GRT
operation for GRT-enabled backup jobs.
Run a full catalog operation Select this option to run the full catalog operation
as a separate job immediately after a backup job finishes. The catalog
immediately after the operation runs as a separate job.
backup job finishes
For Exchange and SharePoint agent-based backups,
the full catalog operation runs immediately after all full
backups. It runs once every 24 hours for all incremental
backups and differential backups.
Schedule a full catalog Select this option to run the full catalog operation as a
operation as a separate job separate, scheduled job. Then select the start time and
after the backup finishes the days of the week on which you want the full catalog
operation to run.
4 Click OK.
See “Changing default backup job settings” on page 545.
See “Backing up data” on page 153.
See “How cataloging works with Hyper-V virtual machine backups” on page 1037.
See “How cataloging works with VMware virtual machine backups” on page 983.
Configuration and settings 572
Configuring Advanced Open File options for backup jobs
Use snapshot technology Select this option to enable the use of snapshot
technology for backup jobs.
Configuration and settings 573
Configuring Advanced Open File options for backup jobs
Snapshot provider Select one of the following snapshot providers for jobs:
Process logical volumes for Select this option to enable the backup of multiple
backup one at a time volumes in one job, with only one logical volume being
snapped at a time. To ensure database integrity, or if a
volume contains mount points, multiple volumes may
need to be snapped one at a time. A volume with mount
points to other volumes is considered a logical volume
for snapshot purposes. Therefore, that volume and the
mount point volumes are snapped together
simultaneously.
Enable checkpoint restart Select this option to enable the checkpoint restart option.
Checkpoint restart enables Backup Exec to
automatically restart a job that is interrupted. The job
restarts from the point where it was interrupted instead
of starting over at the beginning. Backup Exec waits two
minutes after the job stops and then attempts to restart
the interrupted job one time. If the job cannot be
restarted automatically or if checkpoint restart is
disabled, you must restart it manually. A manual restart
starts the job at the beginning instead of at the point
where the job was interrupted.
4 Click OK.
See “Changing default backup job settings” on page 545.
See “Backing up data” on page 153.
Note: Checkpoint restart cannot restart a backup job until it has backed up at least
32 MB of data. If a backup job fails before it has backed up at least that much data,
you must run it again manually.
You can enable checkpoint restart for any jobs that are configured with the storage
option Overwrite media. However, if there is no available media to overwrite and
the job is interrupted, it may be placed on hold until overwritable media is available.
When the media is available, the job restarts from where it was interrupted.
Backup Exec automatically cancels any jobs that run for too long according to the
schedule settings that you selected when you created the job. If Backup Exec
automatically cancels a job, it is not eligible to be restarted. If you manually cancel
a job, Backup Exec does not automatically try to restart it.
Configuration and settings 575
Configuring checkpoint restart
Note: If you use the Central Admin Server feature (CAS), any jobs that are restarted
run on the same managed Backup Exec server on which the job failed. If the original
Backup Exec server is not available, Backup Exec selects a different Backup Exec
server on which to run the restarted job.
You can enable or disable checkpoint restart in the Advanced Open File options
when you create backup jobs or in the backup job defaults.
See “Configuring Advanced Open File options for backup jobs” on page 572.
This topic includes the following information:
Technologies supported for checkpoint restart
Things to consider before you use checkpoint restart
Changing the default checkpoint restart settings
■ Full backups that were interrupted and resumed from the point of failure do not
display in the Simplified Disaster Recovery Recover This Computer Wizard.
However, you can restore these backup sets manually after you make the initial
recovery by using the Recover This Computer Wizard.
■ You can enable the checkpoint restart option for a full backup job that uses the
Delete selected files and folders after successful backup option. If the job
fails and is resumed, the files are not deleted from the source volume after the
backup completes.
Maximum retries Enter the maximum number of times that you want
Backup Exec to retry a job that fails.
Retry interval Enter the interval of time in minutes that you want
Backup Exec to wait before it attempts to restart a job.
6 In the Final job disposition group box, select one of the following options:
Place job on hold until error Select this option to have Backup Exec place the job
condition has been on hold if the job cannot be completed successfully after
manually cleared the maximum number of retries. The job remains on
hold until the error condition has been manually cleared.
Reschedule job for its next Select this option to have Backup Exec reschedule the
scheduled service job for its next scheduled occurrence if the job cannot
be completed successfully after the maximum number
of retries.
Configuration and settings 577
Configuring pre/post commands for backup jobs
7 (Optional) In the Notes field, type any additional notes about the error-handling
rule.
8 Click OK.
You can configure pre-commands and post-commands as default settings for all
backup jobs. If the default settings are not appropriate for a particular job, you can
override them when you create the job. You do not have to create default settings
for pre-commands and post-commands, however. If you want to use pre-commands
and post-commands only for specific jobs, you can configure the settings when you
create those jobs.
To configure pre/post commands for backup jobs
1 Do one of the following:
Type a command to run Runs a command on the specified server before the
before the backup runs backup job runs. Use local paths, and make sure that
the paths exist on each server and are correct.
Run job only if Runs the backup job only if the pre-command is
pre-command is successful successful. If the pre-command fails, the job does not
run, and is marked as failed.
Type a command to run Runs a command on the specified server after the
after the backup runs backup job runs. Use local paths, and make sure that
the paths exist on each server and are correct.
Run post-command after Runs the post-command after the verification completes,
job verification completes if you configured a verify operation for the job.
See “Configuring automatic verify operations for backup
jobs” on page 563.
Run post-command even if Runs the post-command regardless of whether the job
job fails is successful or not.
Let Backup Exec check the Lets Backup Exec check the return codes of the pre-
exit codes of the and post-commands to determine if they completed
commands to determine if successfully.
the commands completed
Backup Exec interprets an exit code of zero from either
successfully
the pre- or post-command to mean that the command
completed successfully. Backup Exec interprets a
non-zero code to mean that the command ended with
an error.
On this Backup Exec server Runs the pre- and post-commands on this Backup Exec
server only.
On each server backed up Runs the pre- and post-commands one time on each
server that is backed up.
Cancel command if not Designates the number of minutes Backup Exec should
completed within x minutes wait before it cancels a pre- or post-command that did
not complete. The default timeout is 30 minutes.
4 Click OK.
See “Changing default backup job settings” on page 545.
See “Backing up data” on page 153.
Configuration and settings 581
Configuring file and folder options for backup jobs
■ By modified time
When Backup Exec runs a full backup job or an
incremental backup job, the time that the backup job
starts is recorded in the Backup Exec Database.
Backup Exec adds the time of the backup job to the
Backup Exec Database only if the full backup job
completes successfully. The next time that you run
an incremental backup job or a differential backup
job, Backup Exec compares the file system time to
the backup time. If the file system time is later than
the time that is recorded in the database, the file is
backed up. If the file's modified time is older than
the previous backup's modified time, that file is not
backed up. If the job does not complete successfully,
subsequent differential or incremental backup jobs
back up all of the data instead of only the data that
has changed.
Note: A file's last modified date and timestamp do
not change when the file is copied or moved. To
ensure that the files are protected, run a full backup
after you copy or move files.
When you run an incremental backup job, Backup
Exec records a new time in the Backup Exec
Database. The database time is not updated for
differential backup jobs.
When you select the modified time method, Backup
Exec uses the Windows change journal to determine
if a file has changed since the last time it was backed
up. If the change journal is not available, Backup
Exec compares the file information to the previous
backup time to determine if the file has changed.
Using modified time lets Backup Exec run more
accurate incremental backups or differential backups
even if other processes have modified files' archive
bits.
■ Using archive bit
Backup Exec uses the archive bit from the file
system to determine if a file has changed since the
last time it was backed up.
When you use the archive bit, Backup Exec turns
the archive bit off when a file is backed up. Turning
off the archive bit indicates to Backup Exec that the
file has been backed up. If the file changes again
Configuration and settings 584
Configuring file and folder options for backup jobs
Enable single instance Select this option if you want Backup Exec to check the
backup for NTFS volumes NTFS volume for identical files. If Backup Exec finds
multiple copies of a file, it backs up only one instance
of that file.
Back up files and Select this option to back up the information for the
directories by following junction points and the files and directories to which
junction points and mount they are linked. If this check box is not selected, then
points only the information for the junction points is backed up.
The files and directories to which the junction points are
linked are not backed up.
Back up files and Select this option to back up the information for any
directories by following symbolic links and the files and directories to which they
symbolic links are linked.
Back up data in Remote Select this option to back up any data that has been
Storage migrated from primary storage to secondary storage.
The data is not recalled to its original location. It is
backed up directly to the backup media.
Back up open files Select one of the following options to determine how
Backup Exec processes any open files for the backup
job.
The options are as follows:
■ Never
Backup Exec skips any open files that are
encountered during the backup job. A list of any files
that were skipped appears in the job log.
■ If closed within X seconds
Backup Exec waits the specified time interval for
files to close before it skips them and continues the
backup job.
If the file does not close during the specified interval,
it is skipped. A list of skipped files appears in the job
log.
If multiple files are open, Backup Exec waits the
specified time interval for each file. Depending on
the number of open files, the wait may significantly
increase the backup time.
■ With a lock
Backup Exec attempts to open any files that are in
use. If Backup Exec is able to open a file, the file is
locked while it is backed up. Locking the file prevents
other processes from writing to it.
Backing up open files is not as effective as closing
applications and allowing the files to be backed up
in a consistent state.
■ Without a lock
Backup Exec attempts to open any files that are in
use. If Backup Exec is able to open the file, the file
is not locked while it is backed up. Other applications
can write data to the file during the backup operation.
Warning: This option allows some files that contain
inconsistent data and possibly corrupt data to be
backed up.
Backup method Select the backup method that you want to use to back
up files and folders for each backup job in the backup
definition.
Delete selected files and Select this option if you want Backup Exec to delete the
folders after successful data you selected to back up after the backup job
backup completes successfully.
Preserve tree on back up Select this option to retain the file system's directory
and delete structure for the files that are backed up in a full backup
job. This option is available only when you select the
Delete selected files and folders after successful
backup option.
4 Click OK.
See “Changing default backup job settings” on page 545.
See “Backing up data” on page 153.
3 In the Recurrence Pattern group box, select the default frequency for backup
jobs:
To run jobs every X hours or Click Hours, and then enter the frequency in the Every
minutes X hour/minute field.
Choose between the following options:
■ From
Designate the starting time for a job to run.
■ Between
Restrict the job to certain hours and days. For
example, if you only want the job to run during
business hours, you can select 9:00 AM to 5:00 PM
on Monday, Tuesday, Wednesday, Thursday, and
Friday.
To run jobs every X days Click Days, and then choose between the following
options:
■ Every X day
Indicate the number of days between the start time
of a job and the start time of the next job instance.
■ Every weekeday
Specifies that the job should run on Mondays,
Tuesdays, Wednesdays, Thursdays, and Fridays.
To run jobs every X weeks Click Weeks, and then specify the number of weeks
between the start time of a job and the start time of the
next job instance in the Every X week on field.
To run jobs every X months Click Months, and then choose between the following
options:
To run jobs every X years Click Years, and then enter the frequency in the Every
X year field.
Choose between the following options:
■ On X
Specify the date on which Backup Exec should run
jobs.
■ On the X of X
Specify the day and month of the year on which
Backup Exec should run jobs.
After you create a list of dates to exclude, you can export a new text file with those
dates. Exporting the text file can be useful if you want to copy your exclude dates
from one Backup Exec server to another.
See “Exporting a list of dates that are excluded from all backups to another server”
on page 595.
You can exclude dates from all backups in the job default settings or by using the
backup calendar. Both features let you exclude dates from all backups. You can
only import dates using the default settings. However, you may prefer to use the
backup calendar because it gives you a visual representation of all of your scheduled
jobs.
This topic includes the following procedures:
To exclude dates from the backup schedule for all backups
To exclude dates from all backups using the backup calendar
To exclude dates from the backup schedule for all backups
1 Click the Backup Exec button, select Configuration and Settings, and then
select Job Defaults.
2 Select Exclude Dates.
3 Do any of the following:
■ In the Select Date field, type the date that you want
to exclude from the backup schedule.
■ Click Add.
Note: You can add only one date at a time.
To select the date from the Click the date that you want to exclude.
calendar
The calendar displays 3 months at a time. You can
navigate forward and backward to view additional
months by clicking the arrows.
Note: You can select only one date at a time.
■ Click Browse.
■ Select the text file that contains the exclude dates.
■ Click Open.
■ Click Import.
Configuration and settings 594
Removing dates from the list of excluded dates
Note: To remove the exclusion from a selected date, click Remove exclude
date for all backups.
5 Click Close.
Show splash screen at Clear this option to show the Backup Exec
startup Administration Console instead of the splash screen
when you start Backup Exec.
Display progress indicators Select this option to display the percentage complete
for backup jobs. This number while a backup job runs. These indicators
requires additional time to appear in the Job Activity dialog box, and they let you
pre-scan resource. monitor the progress of the active job. Backups might
take longer to complete when this option is selected
because the backup sources must be scanned to
determine the amount of data to be backed up.
Enable auto Enables you to use this option to auto synchronize the
synchronization of the licenses with Veritas Entitlement Management System.
licenses with Veritas Backup Exec periodically checks for a license update
Entitlement Management in Veritas Entitlement Management System. If an update
System. is available, Backup Exec downloads the updated
license file. This option is enabled by default.
Allow Backup Exec to Select this option to participate in the Backup Exec
report anonymous usage product improvement program.
information (No personally
General Backup Exec usage and statistical information
identifiable information will
is periodically collected and sent anonymously to help
be sent).
improve the Backup Exec customer experience.
Note: Although usage and statistical information is
collected, Backup Exec never collects specific user
information.
Use alternating row colors Select this option to display alternating row colors for
all lists in Backup Exec. Alternating row colors can make
it easier to distinguish between rows.
Re-enable Select this option to enable any messages that you have
disabled.
4 Click OK.
Configuration and settings 597
Configuring the default setting for backing up multiple servers or applications
4 If you want Backup Exec to prompt you each time you select to back up multiple
servers or applications, select Prompt each time I create a backup for
multiple servers.
If you disable the prompt, Backup Exec automatically uses the preference that
you selected in the When creating backups for mulitple servers field. You
can enable the prompt at any time.
See “Backing up data” on page 153.
Perform database Select the time that you want to perform database
maintenance daily at maintenance.
Delete aged data Select this option to delete expired job history, job logs,
alert history, and reports from the Backup Exec
Database after the specified number of days have
passed.
Keep job history for data on Select this option to keep all job history data for any
media that have current media to which an overwrite protection period is
overwrite protection currently assigned.
periods
After a media’s overwrite protection period expires, the
media’s job history data can be deleted.
Keep job history for Select this option to indicate the number of days to keep
specified number of days job history data in the database before it is deleted.
Job logs Indicate the number of days to keep job logs in the
database before they are deleted.
Alert history Indicate the number of days to keep alert history data
in the database before it is deleted.
Audit logs Indicate the number of days to keep audit log data in
the database before it is deleted.
Perform database Select this option to check the logical consistency and
consistency check physical consistency of the data in the database.
Save contents of database Select this option to save the data that is contained in
to the Backup Exec data the database to the Backup Exec data directory so that
directory the database backup file (BEDB.bak) can be backed
up.
Optimize database size Select this option to organize fragmented pages and
decrease the size of the physical database to 10 percent
above what is actually used.
Configuration and settings 601
Exporting the Backup Exec Database encryption key
Note: You should export the encryption key to a safe location to ensure that
you have a copy of it for later. You need the encryption key to perform disaster
recovery or migrate the Backup Exec server. The key is named with a unique
hash value. Backup Exec uses the name to identify the key later.
See “Exporting the Backup Exec Database encryption key” on page 601.
Remember the export path. Select this option to let Backup Exec remember the path
By clicking this check box, to which you exported the database encryption key.
you consent to let Backup
If you select this option, Backup Exec can attempt to
Exec retain and display the
automatically recover the database encryption key in
export path during import
the event that the key fails. If you do not select this
operations.
option, you must manually import the database
encryption key if it ever fails.
6 Click OK.
See “Configuring encryption for the connection to the Backup Exec Database”
on page 604.
Note: You must have a functioning database encryption key to complete the
procedure below.
Complete the following procedure to refresh the Backup Exec Database encryption
key.
To refresh Backup Exec Database encryption keys
1 In Windows, click Start and then click Run.
2 Type Regedit and then click OK.
Warning: Incorrect use of the Windows registry editor may prevent the
operating system from functioning properly. You should take great care when
you make changes to the Windows registry. Registry modifications should only
be carried out by persons who are experienced in the use of the registry editor
application. It is recommended that you make a complete backup of the registry
and computer before making any registry changes.
4 Click Modify.
5 In the Value data field, type 2.
6 Click OK.
7 Restart all Backup Exec services.
Backup Exec creates a new Backup Exec Database encryption key. It is
recommended that you export the new key to a secure location so that you
can access it later if it is needed.
See “Exporting the Backup Exec Database encryption key” on page 601.
Refer to the Microsoft knowledge base for more information about Secure Sockets
Layer (SSL) and encrypting connections to SQL Server.
For information about the best practices to manage the database encryption, refer
to the Backup Exec Best Practices.
■ If the SQL Server is running under a specific domain account, you must be
logged in using the same domain account to import the certificate. When you
log into the Microsoft Management Console, select the My user account option.
Selecting to manage certificates for the user account ensures that the certificate
is placed under the Personal store of the user who is also running the SQL
service account.
Configuration and settings 607
Configuring encryption for the connection to the Backup Exec Database
For clustered Backup Exec You must configure a secure SQL connection on each node
environments in the cluster.
If the cluster has not been created yet, configure the secure
SQL connection before you run the Cluster Configuration
Wizard in Backup Exec.
If the cluster has already been created:
For Central Admin Server You must configure a secure SQL connection on each
feature (CAS) environments computer in the CAS environment, including the central
administration server and any managed Backup Exec servers.
Use the SQL Server Configuration manager to edit the properties of the protocols
for the server that you want to configure. If you want to configure encryption for the
default, local database instance that Backup Exec installs, edit the Protocols for
BKUPEXEC. Select the certificate that you want to use, if you created a certificate.
Then select whether you want to force encryption for the database connection.
When you have finished, restart SQL Server and the Backup Exec services from
the Services Manager.
For more information or instructions for configuring encrypted connections for SQL,
refer to the Microsoft knowledge base.
Note: The default time is set to 2.00 pm only for fresh installations of Backup Exec
15 Feature Pack 3 and later. For earlier installations and servers upgraded to Backup
Exec 15 Feature Pack 3 and later, the default time will still be set to 1.00 am.
Configuration and settings 609
Configuring Backup Exec to discover data to back up
You can disable the test if you do not want Backup Exec to regularly check logon
accounts. You can also reschedule the test so that it occurs less frequently.
To schedule Backup Exec to check logon accounts
1 Click the Backup Exec button, select Configuration and Settings, and then
click Backup Exec Settings.
2 In the left pane, select Logon Accounts.
3 Configure any of the following options:
Check that the backup Select this option to test whether Backup Exec can
sources in jobs can be access the backup sources in your backup jobs with the
accessed with the logon logon accounts that you selected.
accounts you selected
Perform check every X days Enter the interval for Backup Exec to test logon
at X accounts. Backup Exec automatically tests the logon
accounts at the interval that you select in this field. You
can select the time at which you want Backup Exec to
run the test and the number of days between tests.
Check logon accounts only Select this option to limit the logon account test to the
at the server level server level. If you select this option, Backup Exec tests
only whether the logon accounts can access backup
sources at the server level. Any resources that reside
on the server are not tested. The logon account test
takes less time if you only check accounts at the server
level, however it is less thorough.
4 Click OK.
See “Backup Exec logon accounts” on page 655.
Discover servers that have Select this option to allow Backup Exec to discover any
data that has not been data that needs to be backed up.
backed up
When this option is selected, Backup Exec automatically
checks your network for any data that has not been
backed up.
You can select to let Backup Exec search for any data
that needs to be backed up daily, weekly, or monthly.
Cancel data discovery if not Lets you select the number of hours after which the data
completed within discovery process is canceled if it is not finished.
4 Click OK.
5 Expand Servers without an Agent for Windows installed to see the names
of the servers that the data discovery operation discovered.
6 Select the servers on which you want to install the Agent for Windows, and
then click OK.
7 In the Logon Account field, select the logon account that you want to use to
access each server.
8 Click Next.
9 Select any of the following options and then click Next.
Upgrade the Backup Exec Agent for Upgrades the Agent for Windows on the
Windows to the current version server that you are adding to the list of
automatically servers, if necessary.
Restart the remote computer Restarts the remote computer after the
automatically after installing the Backup Agent for Windows is installed.
Exec Agent for Windows when a restart
is required
10 Click Install.
See “Configuring Backup Exec to discover data to back up” on page 609.
Backup networks
The backup network feature lets you direct any primary backup traffic that Backup
Exec generates to a specific local network. Directing backup jobs to a specified
local network isolates the backup data so that other connected networks are not
affected when backup operations are performed. You also can use a backup network
when you restore data. The feature is enabled on the Backup Exec server and lets
you protect all the remote computers that reside on the specified local network.
When you specify a backup network and submit a job, Backup Exec verifies that
the remote computer is on the same subnet as the selected interface on the Backup
Exec server. If the remote computer is on the selected subnet, then the backup
operation is performed.
If the remote computer is not on the selected subnet, then the job fails. However,
you can set up Backup Exec to use any available network to back up remote
computers.
The following diagram shows an example of a backup network configuration.
Configuration and settings 613
Backup networks
IP address
IP address: IP address: 128.10.0.3
128.10.0.1 128.10.0.2
IP address: router A
IP address: IP address:
10.67.0.3
10.67.0.1 10.67.0.2
Database router B
Backup Exec server server Exchange server
corporate network
network ID: 128.20.0.0
subnet mask: 255.255.0.0
In the example, the database server and mail server are connected to both the
backup network and the corporate network.
When the Backup Exec server performs backup operations, the backup data uses
either the backup network or the corporate network to back up the database server.
If the backup data goes through the corporate network, the amount of time it takes
to back up the database server increases. The amount of time increases because
the network route between the two computers is longer. Users may experience
network latencies when they access the mail server since there is an increase in
network traffic.
In contrast, if you specify a backup network and you back up the database server,
the backup data traffic is isolated to the backup network. Any users accessing the
mail server are not affected. The backup network is used to perform all backup
operations, unless the remote computer is not connected to the backup network.
To back up any remote computers that are not connected to the backup network,
choose to use any available network route. Choosing any available network lets
you back up the remote computer even though it does not reside on the backup
network.
You can configure global network settings for all backup jobs on the Network and
Security pane in the Backup Exec settings. If you want to override the global settings
Configuration and settings 614
Changing network and security options for Backup Exec
for a particular backup job, you can configure network settings for individual jobs
on the Network pane when you create backups.
See “Changing network and security options for Backup Exec” on page 614.
See “Configuring network options for backup jobs” on page 198.
See “Using Backup Exec with firewalls” on page 620.
Network interface Select the name of the network interface card that
connects the Backup Exec server to the default network
that you want to use for backup jobs. The list includes
all available network interfaces on the Backup Exec
server.
Protocol Select the default protocol you want to use for backup
jobs.
The options are as follows:
Allow use of any available Select this option to let Backup Exec use any available
network interface, subnet, network if the remote system that you selected for
or protocol for Backup Exec backup or restore is not part of the specified backup
agents not bound to the network.
above network interface,
If you do not select this option and the remote system
subnet, or protocol
is not part of the specified backup network, the job fails.
Backup Exec cannot access the data from the remote
system.
Interface Details Click this option to view the Media Access Control
(MAC) address, adapter type, description, IP addresses,
and subnet prefixes for the interface that you selected
for the backup network.
Enable selection of user Select this option to include user-defined shares in jobs.
shares
If you do not select this option, you cannot select
user-defined shares when you create jobs.
Enable TCP dynamic port Lets Backup Exec agents use a range of ports for
range communication.
You enter the port range. If the first port that Backup
Exec attempts to use is not available, Backup Exec
attempts to use one of the other ports in the range. If
none of the ports in the range is available, Backup Exec
uses any available dynamic port. Default port ranges
are 1025 to 65535. It is recommended that you use a
range of 25 allocated ports for the remote system if you
use Backup Exec with a firewall.
Use a custom port to Lets you specify the port that Backup Exec uses for
receive operation requests communication between the Backup Exec server and
from the Oracle server the remote computer for both DBA and Backup Exec
server-initiated operations. By default, Backup Exec
uses port 5633.
Use FIPS 140-2 compliant Lets you enable software encryption that complies with
software encryption FIPS 140-2 standards. If you select this option, you must
use a 256-bit AES encryption key. This option is
available only for Windows computers.
Allow only Kerberos Allows Backup Exec to restrict clients, such as Remote
authentication from the Administration Console to use Kerberos only
Remote Administration authentication.
Console
If you select this check box to use only Kerberos
authentication, the Backup Exec Management Service
must be restarted. Any connections from Remote
Administration Console that fall back to use NTLM
authentication are disabled.
Secure the Backup Exec Lets you secure the Backup Exec console by providing
console the following features when you select the Secure the
Backup Exec Console check box:
■ Authentication
After you select the Secure the Backup Exec
Console check box, the authentication setting is
enabled and the next time that you launch Backup
Exec, you need to enter Backup Exec login
credentials to connect to the console.
If you do not enter the credentials you cannot
connect to the Backup Exec console.
■ Lock Console option
After you select the Secure the Backup Exec
Console check box, this feature is enabled. You can
lock the Backup Exec session that you are working
on and secure the Backup Exec console from
unauthorized access. Unless you unlock the Backup
Exec console, you cannot perform any tasks in the
Backup Exec user interface.
Disk storage lockdown The Ransomware Resilience feature lets you enable or
setting disable the lockdown setting on the disk storage.
4 Click OK.
If you selected the Allow only Kerberos authentication from the Remote
Administration Console check box, a confirmation message is displayed.
5 If you want to restart the Management Service, click Yes.
See “Backup networks” on page 612.
3 Click OK.
If the setting is successfully disabled, a confirmation message is displayed. If
the setting is not disabled, a message is displayed.
4 Click OK.
After the setting is disabled, the lockdown status displays Disabled on the
Network and Security pane. It is strongly recommended that you enable this
setting to protect your disk-based storage. Any changes to the disk-based
storage can only be done by Backup Exec.
See “Changing network and security options for Backup Exec” on page 614.
Configuration and settings 620
Using Backup Exec with firewalls
Note: The Agent for Windows is required to perform remote backups and restores.
Firewalls affect system communication between a Backup Exec server and any
remote systems that reside outside the firewall environment. You should consider
special port requirements for your firewall when you configure Backup Exec.
It is recommended that you open port 10000 and make sure that it is available on
the Backup Exec server and any remote systems. In addition, you must open the
dynamic port ranges that Backup Exec uses for communications between the
Backup Exec server and Backup Exec agents.
When a Backup Exec server connects to a remote system, it initially uses port
10000. The agent listens for connections on this predefined port. The Backup Exec
server is bound to an available port, but additional connections to the agent are
initiated on any available port.
When you back up data, up to two ports may be required on the computer on which
the agent is installed. To support simultaneous jobs, you must configure your firewall
to allow a range of ports large enough to support the number of simultaneous
operations desired.
If there is a conflict, you can change the default port to an alternate port number
by modifying the %systemroot%\System32\drivers\etc\services file. You can use a
text editor such as Notepad to modify your NDMP entry or add an NDMP entry with
a new port number. You should format the entry as follows:
Note: If you change the default port, you must change it on the Backup Exec server
and all remote systems that are backed up through the firewall.
Configuration and settings 621
Using Backup Exec with firewalls
When you set up TCP dynamic port ranges, It is recommended that you use a range
of 25 allocated ports for the remote computer. The number of ports that remote
computers require depends on the number of devices you protect and the number
of tape devices you use. You may need to increase these port ranges to maintain
the highest level of performance.
Unless you specify a range, Backup Exec uses the full range of dynamic ports
available. When performing remote backups through a firewall, you should select
a specific range on the Network and Security settings dialog box.
To browse systems through a firewall
1 Click the Backup Exec button, select Configuration and Settings, and then
select Backup Exec Settings.
2 In the left pane, select Network and Security.
3 Verify that a dynamic range of ports has been set for the Backup Exec server
and the Backup Exec agent and that the firewall is configured to pass these
port ranges and the 10000 port (which is used for the initial connection from
the Backup Exec server to the Backup Exec agent).
Port 6101 must be open to browse Windows systems in the backup selections
tree.
4 Click OK.
See “Backup Exec ports” on page 621.
See “Backup Exec listening ports” on page 623.
See “About enabling a SQL instance behind a firewall” on page 624.
10000
Kerberos 88 UDP
1434 UDP
When you run a duplicate backup job, any backup sets that are already encrypted,
will remain encrypted, regardless of the encryption option that you select. However,
you can encrypt any unencrypted backup sets.
For information about the best practices of Backup Exec software encryption, refer
to Backup Exec Best Practices.
This topic includes the following information:
Software encryption
Hardware encryption
Encryption keys
Restricted keys and common keys
Pass phrases
Software encryption
When you install Backup Exec, the installation program installs encryption software
on the Backup Exec server and on any remote computers that use a Backup Exec
agent. Backup Exec can encrypt data at a computer that uses a Backup Exec agent,
and then transfer the encrypted data to the Backup Exec server. Backup Exec then
writes the encrypted data on a set-by-set basis to tape or to disk storage.
Backup Exec encrypts the following types of data:
■ User data, such as files and Microsoft Exchange databases.
■ Metadata, such as file names, attributes, and operating system information.
■ On-tape catalog file and directory information.
Backup Exec does not encrypt Backup Exec metadata or on-disk catalog file and
directory information.
You can use software compression with encryption for a backup job. First Backup
Exec compresses the files, and then encrypts them. However, backup jobs take
longer to complete when you use both encryption compression and software
compression.
It is recommended that you avoid using hardware compression with software
encryption. Hardware compression is performed after encryption. Data becomes
randomized during the encryption process. Compression does not work effectively
on data that is randomized.
Hardware encryption
Backup Exec supports hardware encryption for any storage devices that use the
T10 encryption standard. When you use hardware encryption, the data is transmitted
from the host computer to the storage device and then encrypted on the device.
Configuration and settings 626
Using encryption with Backup Exec
Backup Exec manages the encryption keys that are used to access the encrypted
data.
Backup Exec only supports approved devices for T10 encryption.
Note: Hardware encryption that uses the T10 standard requires 256-bit AES. Backup
Exec does not let you enable hardware encryption for a job unless it uses at least
a 16-character pass phrase.
Encryption keys
You must create encryption keys to use encryption in Backup Exec. When a user
creates an encryption key, Backup Exec marks that key with an identifier based on
the logged-on user’s security identifier. The person who creates the key becomes
the owner of the key.
If you use encryption for synthetic backups, all of the associated backups must use
the same encryption key. Do not change the encryption key after the baseline is
created. The encryption key that you select for the baseline backup is automatically
applied to all associated backups.
When you select encrypted data for restore, Backup Exec verifies that encryption
keys for the data are available in the database. If any of the keys are not available,
Backup Exec prompts you to recreate the missing keys. If you delete the key after
you schedule the job to run, the job fails.
If Backup Exec cannot locate an encryption key while a catalog job is running,
Backup Exec sends an alert. You can then recreate the missing encryption key if
you know the pass phrase.
Simplified Disaster Recovery supports the recovery of computers with previously
encrypted backup sets. If you have Simplified Disaster Recovery backups that are
encrypted during backup, the Recover This Computer wizard prompts you for the
pass phrase of each encrypted backup set that is required to complete the recovery.
See “Encryption key management” on page 627.
Common Anyone can use the key to encrypt data during a backup job
and to restore encrypted data.
Configuration and settings 627
Encryption key management
Restricted Anyone can use the key to encrypt data during a backup job,
but users other than the key owner must know the pass
phrase. If a user other than the key owner tries to restore the
encrypted data, Backup Exec prompts the user for the pass
phrase. If you cannot supply the correct pass phrase for the
key, you cannot restore the data.
Pass phrases
Encryption keys require a pass phrase, which is similar to a password. Pass phrases
are usually longer than passwords and are comprised of several words or groups
of text. A good pass phrase is between 8 and 128 characters. The minimum number
of characters for 128-bit AES encryption is eight. The minimum number of characters
for 256-bit AES encryption is 16. It is recommended that you use more than the
minimum number of characters.
Note: Hardware encryption that uses the T10 standard requires 256-bit AES. Backup
Exec does not let you enable hardware encryption for a job unless it uses at least
a 16-character pass phrase.
Also, a good pass phrase contains a combination of upper and lower case letters,
numbers, and special characters. You should avoid using literary quotations in pass
phrases.
A pass phrase can include only printable ASCII characters, which are characters
32 through 126. ASCII character 32 is the space character, which is entered using
the space bar on the keyboard. ASCII characters 33 through 126 include the
following:
!"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ
[\]^_‘abcdefghijklmnopqrstuvwxyz{|}~
See “Encryption key management” on page 627.
Backup Exec stores the keys in the Backup Exec database. However, Backup Exec
does not store the pass phrases for the keys. The owner of each key is responsible
for remembering the pass phrase for the key.
To protect your keys, it is recommended that you do the following:
■ Maintain a written log of the pass phrases. Keep the log in a safe place in a
separate physical location from the encrypted backup sets.
■ Back up the Backup Exec database. The database keeps a record of the keys.
Caution: If you do not have a backup of the Backup Exec database and do not
remember your pass phrases, you cannot restore data from the encrypted media.
A key that is created on a Backup Exec server is specific to that Backup Exec
server. You cannot move keys between Backup Exec servers. However, you can
create new keys on a different Backup Exec server by using existing pass phrases.
A pass phrase always generates the same key. In addition, if you delete a key
accidentally, you can recreate it by using the pass phrase.
If a Backup Exec database becomes corrupted on a Backup Exec server and is
replaced by a new database, you must manually recreate all of the encryption keys
that were stored on the original database.
If you move a database from one Backup Exec server to another Backup Exec
server, the encryption keys remain intact as long as the new Backup Exec server
meets the following criteria:
■ Has the same user accounts as the original Backup Exec server.
■ Is in the same domain as the original Backup Exec server.
See “Creating encryption keys” on page 628.
See “Replacing an encryption key” on page 629.
See “Deleting encryption keys” on page 631.
4 Click New.
5 In the Key name field, type a unique name for this key. The name can include
up to 256 characters.
6 In the Encryption type field, select the encryption type to use for this key.
Your choices are 128-bit AES or 256-bit AES.
The default type is 256-bit AES. The 256-bit AES encryption provides a stronger
level of security than 128-bit AES encryption. However, backup jobs may
process more slowly with 256-bit AES encryption than with 128-bit AES
encryption. Hardware encryption that uses the T10 standard requires 256-bit
AES.
7 In the Pass phrase field, type a pass phrase for this key. You can use only
printable ASCII characters.
For 128-bit AES encryption, the pass phrase must be at least eight characters.
For 256-bit AES encryption, the pass phrase must be at least 16 characters.
It is recommended that you use more than the minimum number of characters.
8 In the Confirm pass phrase field, type the pass phrase again to confirm it.
9 In the Encryption key type group box, select whether you want to create a
common or restricted encryption key.
If a key is common, any user of this installation of Backup Exec can use the
key to back up and restore data. If a key is restricted, anyone can use the key
to back up data. But only the key owner or a user who knows the pass phrase
can use the restricted key to restore the encrypted data.
10 Click OK.
See “Encryption key management” on page 627.
See “Using encryption with Backup Exec” on page 624.
7 Click OK.
See “Encryption key management” on page 627.
See “Using encryption with Backup Exec” on page 624.
■ The encrypted data on the tape has expired or the tape is retired.
■ The encryption key is not the default key.
■ The encryption key is not being used in a job. If the key is being used, you must
select a new key for the job.
If you delete an encryption key that is being used in a scheduled restore job, you
cannot replace the key. Therefore, any scheduled restore job in which you delete
an encryption key fails.
To delete an encryption key
1 Click the Backup Exec button, select Configuration and Settings, and then
click Backup Exec Settings.
2 In the left pane, select Network and Security.
3 Click Manage Keys.
4 Select the key that you want to delete.
5 Click Delete.
6 Click Yes.
7 If the key is used in a job, do the following:
■ In the Select an encryption key to replace "key name" box, select the
new key for the job or click New to create a new key.
■ Click OK.
Table 15-5 Individual items that can be recovered for each agent
Agent for Microsoft Active You can restore the following individual items:
Directory
■ Active Directory objects and attributes
■ Active Directory Application Mode (ADAM) and Active
Directory Lightweight Directory Services (AD LDS) objects
and attributes
Agent for Microsoft Exchange You can restore the following individual items:
Server
■ Mailboxes
■ Mail messages and their attachments
■ Public folders
■ Calendar items
■ Contacts
■ Notes
■ Tasks
Agent for Microsoft The following are examples of the individual items that can
SharePoint be restored:
■ Site collections
■ Sites or subsites
■ Document or picture libraries
■ Lists
■ Individual list items
■ Documents, pictures, or other files that are stored in
libraries
Agent for VMware and You can restore drives, folders, and files from virtual
Hyper-V machines that run a Windows operating system.
When you run a GRT-enabled backup job, Backup Exec creates media with an
IMG prefix (for example, IMG00001). IMG media is a specific media type that Backup
Exec creates only for GRT-enabled backup operations. When you run a
GRT-enabled backup job, the IMG media stores the backup data.
Configuration and settings 635
Granular Recovery Technology
You should consider which device you use for GRT-enabled backups before you
begin. You should also consider any special requirements for the type of data you
back up.
Note: Backup Exec does not store the granular backup sets on disk in encrypted
form when you enable encryption for the GRT-enabled backup jobs that are sent
to disk, deduplication, and disk cartridge devices. Only the backup sets for the
backup sources that do not support GRT are stored in encrypted form. All the backup
sets for the backup jobs that are sent to cloud, OpenStorage, and tape devices are
stored in encrypted form.
If you must use a disk storage device on a volume with file size limitations, Backup
Exec requires a staging location. Backup Exec temporarily stores a small amount
of metadata in the staging location during the backup job. It deletes the data from
the staging location when the backup is finished. The staging location is not
necessary, however, if you use a disk storage device on a volume without file size
limitations as the destination.
The staging location's default path is C:\temp.
The volume that is used for a staging location for backup jobs should meet the
following requirements:
■ It is local to the Backup Exec server
■ It does not have any file size limitations
Additionally, to avoid disk space problems, it should meet these requirements:
■ It should not be a system volume
■ It should have at least 1 GB of available space
Configuration and settings 636
Granular Recovery Technology
Backup Exec also uses a staging location to restore GRT-enabled data from a tape
or from a disk storage device on volumes with file size limitations. The staging
location must be on a volume that does not have file size limitations and is local to
the Backup Exec server. The staging location is not necessary if you restore
GRT-enabled data from disk storage on a volume without file size limitations, such
as NTFS.
Backup Exec uses the staging area differently for the following types of restores:
Tape Backup Exec copies the entire backup set or sets to the
staging area. The staging area must have enough disk space
for the entire backup set or sets from which you want to
restore an individual item.
Backup Exec deletes the data from the staging area when
the restore job is complete.
Backup Exec deletes the data from the staging area when
the restore job is complete.
Disk storage device that is on Backup Exec must copy a small amount of metadata that is
a volume with file size associated with the backup set to the staging area to
limitations (such as FAT or complete the restore.
FAT32)
Backup Exec deletes the data from the staging area when
the restore job is complete.
The staging location's default path is C:\temp. You can change the default backup
and restore staging locations in the Backup Exec settings.
Configuration and settings 637
Granular Recovery Technology
Agent Restrictions
Agent for Microsoft Active You must use a Backup Exec server that is running Windows
Directory Server 2012 R2 to back up an Active Directory server that is
running Windows Server 2012 R2.
Agent Restrictions
Agent for Microsoft Exchange Backup Exec must have access to a uniquely named mailbox
Server within the Exchange organization for backup and restore of
the Information Store.
Backup Exec uses a disk storage device that does not have
file size limitations and is local to the Backup Exec server as
the default staging location for GRT-enabled backups of
Exchange. Backup Exec may use a staging location other
than the one that is configured in default backup options
because a disk that uses the same disk geometry as the
database logs is required to perform GRT operations.
However, the location does not affect the performance or the
amount of disk space that is required for the operations.
You can create a vhd file or vhdx file to use as the staging
area instead of a physical volume, if you want to minimize
the effect on your resources. Configure the vhd or the vhdx
file as a large-sector volume and make sure that it is at least
1GB in size. Then mount the vhd file or vhdx file to a directory.
Backup Exec automatically finds the virtual volume when it
needs a staging area to back up any data that resides on a
large-sector drive.
Agent for Microsoft You must have a current version of the Agent for Windows
SharePoint installed on all of the servers that participate in the SharePoint
farm.
Configuration and settings 639
Setting default Granular Recovery Technology (GRT) options
Agent Restrictions
Agent for VMware and You can recover only individual items to virtual machines that
Hyper-V run a Windows operating system.
See “Setting default Granular Recovery Technology (GRT) options” on page 639.
If Granular Recovery Lets you designate a location where Backup Exec can
Technology (GRT) is stage temporary data during GRT-enabled backup jobs.
enabled for backups, enter
Ensure that the location is an NTFS volume and that it
the path to an NTFS volume
is not a system volume. If the default path of C:\TEMP
of the local Backup Exec
does not meet these requirements, type a different path
server where Backup Exec
on the Backup Exec server where Backup Exec can
can stage temporary data
stage temporary data.
Enter the path to an NTFS Lets you designate a location where Backup Exec can
volume of the local Backup stage temporary data during GRT restore jobs.
Exec server where Backup This option is applicable only when you restore individual
Exec can store temporary items under the following conditions:
data (Microsoft Hyper-V,
Microsoft Exchange, ■ The backup of Microsoft Hyper-V, Microsoft
Microsoft SharePoint, Exchange, Microsoft SharePoint, Microsoft Active
Microsoft Active Directory, Directory, or VMware Virtual Infrastructure was
and VMware) enabled for Backup Exec GRT.
■ The backup is on a tape.
■ The backup is on disk storage on a volume that has
size limitations. FAT and FAT32 are examples of
types of volumes that have file size limitations.
4 Click OK.
See “Configuring the Oracle Agent on Windows computers and Linux servers”
on page 1167.
See “About performing a DBA-initiated backup job for Oracle” on page 1188.
Note the following about DBA-initiated jobs:
■ DBA-initiated jobs fail when the related job template is deleted. To stop
DBA-initiated jobs from running, delete the related DBA-initiated job template.
■ All DBA-initiated backup and restore jobs are deleted after the jobs have
completed.
■ You cannot set minimum device requirements for DBA-initiated jobs.
See “Creating DBA-initiated job templates” on page 641.
See “Editing DBA-inititated job templates” on page 642.
See “Deleting DBA-initiated job templates” on page 642.
Item Description
See “About the Remote Media Agent for Linux ” on page 1392.
Enable the remote Enables a remote computer to send data through the Backup
computer to access the Exec server to an OpenStorage device or a deduplication
storage device through the disk storage device, and to perform Backup Exec server-side
Backup Exec server and to deduplication if it it supported. If the Backup Exec server does
perform Backup Exec not support deduplication, the data is deduplicated on an
server-side deduplication, intelligent disk device, such as PureDisk or a device from a
if it is supported third-party vendor.
Keep for Designates the amount of time for which you want to keep
the backup sets or job history from the DBA-initiated jobs.
Configuration and settings 644
Deleting DBA-initiated job templates
Item Description
Media set Indicates the media set to use for the DBA-initiated jobs. The
media set specifies the overwrite protection period and the
append period for the backup data on the media.
If you want to create a new media set for this backup job,
click the icon to the right of the media set drop-down menu.
■ Scratch media
■ Media for which the overwrite protection period has
expired
Item Description
Append to media, overwrite Appends this backup job to the specified media set if an
if no appendable media is appendable media is available. Otherwise, Backup Exec
available searches for an overwritable media and adds it to the media
set.
Append to media, terminate Appends this backup job to the specified media set if an
job if no appendable media appendable media is available. Otherwise, Backup Exec
is available terminates the job.
Eject media after job Ejects the media from the drive or slot when the operation
completes completes. You can also schedule a job to eject media.
Retension media before Runs the tape in the drive from beginning to end at a fast
backup speed. Retensioning helps the tape wind evenly and run
more smoothly past the tape drive heads. This option is
available only if you select a tape drive that supports
retensioning.
Use Write once, read many Specifies the use of WORM (write once, read many) media
(WORM) media as the default for DBA-initiated jobs. Backup Exec confirms
that the destination device is or contains a WORM-compatible
drive, and that the WORM media is available in the drive. If
WORM media or a WORM-compatible drive is not found, an
alert is sent.
Item Description
■ None
Copies the data to the media in its original form
(uncompressed). Using some form of data compression
can help expedite backups and preserve storage space.
Hardware data compression should not be used in
environments where storage devices that support
hardware compression are used interchangeably with
devices that do not have that functionality. In this situation,
hardware compression is automatically disabled. You can
manually turn on hardware compression on the drives
that support it, but this results in media inconsistency. If
the drive that supports hardware compression fails, the
compressed media cannot be restored with the
non-compression drive.
■ Software
Uses STAC software data compression, which
compresses the data before it is sent to the storage
device.
■ Hardware (if available, otherwise none)
Uses hardware data compression if the storage device
supports it. If the drive does not feature data compression,
the data is backed up uncompressed.
■ Hardware (if available, otherwise software)
Uses hardware data compression if the storage device
supports it. If the drive does not feature hardware data
compression, STAC software compression is used.
Encryption type Specifies the type of encryption that you want to use, if any.
Encryption key Specifies the encryption key that you want to use, if you
selected to use encryption.
Item Description
Job name Specifies the name for this backup template. You can accept
the default name that appears or enter a name. The name
must be unique.
Backup set description Describes the information in the backup set for future
reference.
Verify after backup Performs a verify operation automatically to make sure that
completes the media can be read after the backup has been completed.
Verifying all backups is recommended.
Item Description
Network interface Specifies the name of the network interface card that
connects the Backup Exec server to the network that you
want to use for this backup job. The list includes all available
network interfaces on the Backup Exec server.
Protocol Specifies the protocol you want to use for this backup job.
The options are as follows:
Item Description
Allow use of any available Lets Backup Exec use any available network if the remote
network interface, subnet, system that you selected for backup or restore is not part of
or protocol for Backup the specified backup network.
Exec agents not bound to
If you do not select this option and the remote system is not
the above network
part of the specified backup network, the job fails. Backup
interface, subnet, or
Exec cannot access the data from the remote system.
protocol
Interface Details Displays the Media Access Control (MAC) address, adapter
type, description, IP addresses, and subnet prefixes for the
interface that you selected for the backup network.
Allow managed Backup Lets a job use any network interface to access Backup Exec
Exec server to use any agents if the selected network interface is unavailable.
network interface to access Enabling this option lets the managed Backup Exec server
Backup Exec agents use an alernate network interface to run any important backup
jobs that would otherwise fail.
Item Description
Enable settings to duplicate Enables the settings for a duplicate backup set template.
backup sets for this job
Keep for Designates the amount of time for which you want to keep
the backup sets or job history from the duplicate DBA-initiated
job.
Configuration and settings 649
Deleting DBA-initiated job templates
Item Description
Media set Indicates the media set to use for the duplicate DBA-initiated
job. The media set specifies the overwrite protection period
and the append period for the backup data on the media.
If you want to create a new media set for this backup job,
click the icon to the right of the media set drop-down menu.
■ Scratch media
■ Media for which the overwrite protection period has
expired
Append to media, overwrite Appends this backup job to the specified media set if an
if no appendable media is appendable media is available. Otherwise, Backup Exec
available searches for an overwritable media and adds it to the media
set.
Append to media, terminate Appends this backup job to the specified media set if an
job if no appendable media appendable media is available. Otherwise, Backup Exec
is available terminates the job.
Configuration and settings 650
Deleting DBA-initiated job templates
Item Description
Eject media after job Ejects the media from the drive or slot when the operation
completes completes. You can also schedule a job to eject media.
Retension media before Runs the tape in the drive from beginning to end at a fast
backup speed. Retensioning helps the tape wind evenly and run
more smoothly past the tape drive heads. This option is
available only if you select a tape drive that supports
retensioning.
Use Write once, read many Specifies the use of WORM (write once, read many) media
(WORM) media as the default for DBA-initiated jobs. Backup Exec confirms
that the destination device is or contains a WORM-compatible
drive, and that the WORM media is available in the drive. If
WORM media or a WORM-compatible drive is not found, an
alert is sent.
Enable DirectCopy to tape Enables Backup Exec to coordinate the movement of data
from virtual storage directly to a physical storage device.
Item Description
■ None
Copies the data to the media in its original form
(uncompressed). Using some form of data compression
can help expedite backups and preserve storage space.
Hardware data compression should not be used in
environments where storage devices that support
hardware compression are used interchangeably with
devices that do not have that functionality. In this situation,
hardware compression is automatically disabled. You can
manually turn on hardware compression on the drives
that support it, but this results in media inconsistency. If
the drive that supports hardware compression fails, the
compressed media cannot be restored with the
non-compression drive.
■ Software
Uses STAC software data compression, which
compresses the data before it is sent to the storage
device.
■ Hardware (if available, otherwise none)
Uses hardware data compression if the storage device
supports it. If the drive does not feature data compression,
the data is backed up uncompressed.
■ Hardware (if available, otherwise software)
Uses hardware data compression if the storage device
supports it. If the drive does not feature hardware data
compression, STAC software compression is used.
Encryption type Specifies the encryption key that you want to use, if any.
Encryption key Specifies the encryption key that you want to use, if you
selected to use encryption.
Item Description
Preferred source device Specifies the preferred source device that you want to use
as the storage for the duplicate job.
Verify after backup Performs a verify operation automatically to make sure that
completes the data can be read after the backup has been completed.
Verifying all backups is recommended.
Send Select this check box to send metadata about items in the backup sets
metadata to Veritas Information Map from Backup Exec to Veritas Information
about items Map.
in the
If you clear this check box, Backup Exec immediately stops sending
backup sets
metadata about items in the backup sets to Veritas Information Map. If
to Veritas
you want to start sending metadata to Information Map, select the check
Information
box again.
Map
Server Name Enter the server name where the Information Map Agent is installed.
Configuration and settings 653
Configuring settings for Veritas™ Information Map
Port Enter the port number for connecting to the Information Map Agent.
Specify the port that is used by the Information Map Connector service
(ConnectorService.exe). By default, the 8286 port number is used.
To know the port number that is used do the following in the order listed.
Logon Select the logon account of the server where the Information Map Agent
Account is installed.
If the logon account for the server is not in the list, click Add/Edit to
add it to the list.
Note: The logon account must be part of the local administrator's group
on the server where the agent is installed.
Agent Status Displays the registration status of Backup Exec with the Information
Map Agent.
4 Click Register.
Note: Information Map setup details are saved only after the connection is
registered successfully.
Note: This is the default path where the Information Map Agent is installed.
Note: Metadata is sent to Information Map for a specific resource at least once,
and subsequently Backup Exec finds no backups of that resource that is created
within the number of days configured with this setting. Backup Exec considers
the resource as not part of the live actively protected resources any longer,
and the metadata is deleted from Information Map.
9 Select the check box to send metadata about items in the backup sets that are
encrypted with a common encryption key to Information Map.
Note: The metadata about items in the backup sets that are encrypted with a
restricted key is not sent to Information Map.
10 (Optional) To update the Information Map Agent details, edit the required
settings and then click Update.
■ Run a full catalog operation as a separate job immediately after the backup
job finishes
■ Schedule a full catalog operation as a separate job after the backup finishes
See “Integration with Veritas™ Information Map” on page 878.
Your default Backup Exec logon account enables you to perform the following:
■ Browse data. Your default Backup Exec logon account enables you to browse
local and remote computers when you create backup jobs. To browse computers,
each user must have a default Backup Exec logon account that is associated
with their user account. The Backup Exec logon account does not have to be
the same user name as the user that is used to log on to Backup Exec.
For example, you are logged on to a Backup Exec server named
BACKUPSERVER as the local Windows administrator. When you start Backup
Exec, you are prompted to create a default Backup Exec logon account for the
local administrator because one does not exist. You can create a Backup Exec
logon account for the local administrator that has the credentials for a domain
administrator. The Backup Exec logon account has the following properties:
User name: DOMAIN\Administrator
Description: BACKUPSERVER\Administrator Default Account
Owner: BACKUPSERVER\Administrator
When you change your default Backup Exec logon account, you can use your
new default Backup Exec logon account to browse computers immediately. You
do not have to restart your system in order for the changes take effect.
See “Changing your default Backup Exec logon account” on page 664.
■ Make backup selections. You can select a different Backup Exec logon account
when you make selections for backup. If your default logon account does not
have rights, the Logon Account Selection dialog box appears and lets you
create or select a different Backup Exec logon account.
See “Requirements for using the SQL Agent” on page 1066.
See “Requirements for accessing Exchange mailboxes ” on page 1118.
■ Restore. You can assign Backup Exec logon accounts to computers when you
create restore jobs. The default Backup Exec logon account is used unless you
choose a different Backup Exec logon account when you create the restore job.
you delete the SLA, the jobs in which it is used may fail. If the SLA is deleted, you
can re-create it using the Logon Account Management dialog box.
The SLA is used for the following tasks and jobs:
■ Jobs that were migrated from a previous version of Backup Exec
■ Duplicate backup data jobs
■ Command Line Applet (bemcli.exe)
■ Account name
■ Password
■ User name
■ Notes
To edit a Backup Exec logon account
1 Click the Backup Exec button, select Configuration and Settings, and then
select Logon Accounts.
2 Select Manage Logon Accounts.
3 Select the Backup Exec logon account you want to change, and then click
Edit.
If you are not logged on to Backup Exec with the same user name as the
Backup Exec logon account owner, you must provide the password before you
can edit the account.
Configuration and settings 661
Backup Exec logon accounts
User name Type the fully qualified user name for the Backup Exec
logon account. For example, DOMAIN\Administrator.
Change Password Click this option to change the password for the account.
The password you enter is encrypted for security.
Account name Type a unique name for the Backup Exec logon account.
The user name is automatically added if you do not
enter information into the field.
Notes Type any optional notes indicating how the Backup Exec
logon account is used.
This is a restricted logon Select this option to make this Backup Exec logon
account account a restricted logon account. Restricted logon
accounts can be used only by the owner of the logon
account and those who know the password. If this option
is not selected, the Backup Exec logon account is a
common account. Common accounts are the shared
accounts that all users can access.
This is my default account Select this option to make this account your default
Backup Exec logon account. Your default account is
used to browse, make selections, or restore data on
your local computers and remote computers.
3 Select the Backup Exec logon account that you want to change, and then click
Edit.
If you are not logged on to Backup Exec with the same user name as the
Backup Exec logon account owner, you must provide the password before you
can edit the account.
4 Click Change Password.
5 In the Password field, type a new password.
6 In the Confirm field, re-type the password, and then click OK.
7 On the Edit Logon Credentials dialog box, click OK.
8 On the Logon Account Management dialog box, click OK.
See “Backup Exec logon accounts” on page 655.
You cannot delete a Backup Exec logon account in the following situations:
■ It is referenced by a job.
■ It is owned by a user who is logged on to the Backup Exec server.
■ It is set as the default Backup Exec logon account of a user who is logged on
to the Backup Exec server.
If a logon account is used in any of these situations, you must replace it with a
different logon account before you can delete it.
To delete a Backup Exec logon account
1 Click the Backup Exec button, select Configuration and Settings, and then
select Logon Accounts.
2 Select Manage Logon Accounts.
3 Select the Backup Exec logon account you want to delete, and then click
Delete.
4 Do either of the following:
If the logon account is Complete the following steps to replace the logon
referenced by backup jobs account with a different logon account in any referenced
backup jobs.
■ On the Delete Logon Account dialog box, click
Replace.
■ On the Replace Logon Account dialog box, select
the Backup Exec logon account with which you want
to replace the selected Backup Exec logon account.
If the Backup Exec logon account is restricted and
you are not logged on to Backup Exec with the same
user name as the Backup Exec logon account owner,
you must provide the password before you can select
the account.
5 Click OK.
See “Backup Exec logon accounts” on page 655.
See “Replacing a Backup Exec logon account” on page 662.
Configuration and settings 664
Backup Exec logon accounts
4 Click OK.
See “Backup Exec logon accounts” on page 655.
User name Type the fully qualified user name for the Backup Exec
logon account. For example, DOMAIN\Administrator.
Change Password Click this option to change the password for the account.
The password you enter is encrypted for security.
Account name Type a unique name for the Backup Exec logon account.
The user name is automatically added if you do not
enter information into the field.
Notes Type any optional notes indicating how the Backup Exec
logon account is used.
This is a restricted logon Select this option to make this Backup Exec logon
account account a restricted logon account. Restricted logon
accounts can be used only by the owner of the logon
account and those who know the password. If this option
is not selected, the Backup Exec logon account is a
common account. Common accounts are the shared
accounts that all users can access.
This is my default account Select this option to make this account your default
Backup Exec logon account. Your default account is
used to browse, make selections, or restore data on
your local computers and remote computers.
4 If prompted, enter the password for the logon account that you selected.
5 Do one of the following:
■ To add invidual servers manually, in the Server Name field, enter the name
of the Backup Exec server that you want to copy the logon account
information to, and then click Add
■ To add several servers from a list, click Import List, and then browse to
the list of server names.
6 If you want to overwrite a logon account with the same name on the destination
Backup Exec server, check Overwrite logon account if one with this
description already exists on the destination server.
7 Click OK.
See “Backup Exec logon accounts” on page 655.
4 Cick OK.
See “Changing the credentials for a service account” on page 667.
See “Changing startup options for Backup Exec services” on page 669.
Note: The Backup Exec service account and the Backup Exec system logon account
are set to the same user name when Backup Exec is installed. If you need to change
the user name for the service account or if the service account is no longer used,
then you should also change the Backup Exec system logon account to use new
credentials.
Old user name Type the current user name for the service account that
you want to change.
Old password Type the current password for the service account that
you want to change.
New user name Type the new user name for the service account that
you want to change.
New password Type the new password for the service account that you
want to change.
Grant required rights to the Select this option to grant the service account the proper
service account system service rights.
6 Click OK.
7 Click Close.
See “Starting and stopping Backup Exec services” on page 667.
See “Changing startup options for Backup Exec services” on page 669.
6 Click OK.
7 Click Close.
See “Starting and stopping Backup Exec services” on page 667.
See “Changing the credentials for a service account” on page 667.
■ Server configuration
You can delete the audit logs as part of the Backup Exec database maintenance,
and you can save the audit log to a text file. Any changes that are made to the audit
log, such as when database maintenance occurs, can also be displayed in the audit
log.
To configure audit logs
1 Click the Backup Exec button, select Configuration and Settings, and then
select Audit Log.
2 Click Configure Logging.
3 On the Audit Log Configuration dialog box, select the check box of the
category that you want to display in the audit log.
Expand the category by clicking the arrow to the left of the category. Select
the operations that you want to display for the category.
Clear the check box of any item or operation that you do not want to display.
4 Click OK.
See “Viewing the audit log” on page 671.
See “Removing entries from the audit log” on page 672.
See “Saving an audit log to a text file” on page 672.
Note: To copy configuration settings and logon information to other Backup Exec
servers, you must install the Copy Server Configurations feature.
See “Installing additional agents and features to the local Backup Exec server”
on page 58.
Configuration and settings 673
Viewing server properties
Default schedule Select this option to copy the default schedule settings
from this Backup Exec server to another Backup Exec
server.
Error-handling rules Select this option to copy error-handling rules from this
Backup Exec server to another Backup Exec server.
Alert configuration Select this option to copy the alert configuration from
this Backup Exec server to another Backup Exec server.
3 Select the Backup Exec server or servers to which you want to copy the
selected settings.
If the destination server is not in the list, do one of the following:
■ To add a server manually, click Add, and then select the server or servers
that you want to add to the list.
■ To import a list of servers, click Import List, browse to select the list, and
then click Open.
4 Click OK.
See “About the Central Admin Server feature” on page 1263.
Additionally, you can view the following properties for any server that you monitor
with Backup Exec:
■ Server name
■ Server description
■ Operating system information
■ Backup Exec version and license information
If you have the Central Admin Server feature (CAS), you can also view information
about the Backup Exec database, device and media database, and catalog
database.
See “Viewing the settings for a central administration server” on page 1316.
To view server properties
◆ Complete either of the following as necessary:
To view the local Backup ■ Click the Backup Exec button, select Configuration
Exec server's properties and Settings, and then click Local server
properties.
■ When you are finished viewing the local server
properties, click OK.
To view any other server's ■ On the Backup and Restore tab, double-click the
properties server whose properties you want to view.
■ In the left pane, click Properties.
■ The standard processing method. This method reads the whole virtual disk and
identifies the changes that should be backed up. The changed blocks that are
identified are then backed up.
■ The faster processing method. This method is faster than the standard processing
method because it writes all changes to a new differencing disk and then backs
up only the differencing disk. This method saves time because the entire disk
does not have to be read.
Resilient Change Windows 2016 ■ Differential No extra space Does not impact
Tracking (RCT) and later. ■ incremental is required. performance
method
However, you
can use this
method if you
take frequent
backups and
disk space is not
a constraint.
Configuration and settings 677
Configuring default backup settings
3 Select the processing method that you want to use for all Hyper-V incremental
or differential backup jobs.
Use Resilient Change Tracking Select this option if you want to run both
wherever applicable incremental backups and differential backups. If
RCT is selected then it is used wherever applicable
and is the recommended method. If a virtual
machine does not support RCT, the standard or
faster processing method is used, based on your
selection.
Note: This option is available only for Hyper-V
servers that run Windows Server 2016 and later.
Registry Location:
HKEY_LOCAL_MACHINE\Software\Veritas\Backup
Exec For Windows\Backup Exec\Server
ValueName = SupressRCTAlert
Use the faster processing Select this method if you want incremental backups
method jobs to be processed as quickly as possible, and
do not want to perform any differential backups.
This option does not support differential backups.
If you select this option, all Hyper-V differential
backups are processed as incremental backups.
Note: This option is available only for Hyper-V
servers that run Windows 2012 and later. For all
supported previous versions of Windows, the
standard processing method must be used.
Use the standard processing Select this option if you want to run both
method incremental backups and differential backups.
Note: When you change to a different backup processing method, the next job
runs as a full backup instead of an incremental or a differential backup.
Configuration and settings 679
Configuring default backup settings
Note: In a CAS environment, if the processing method is not the same on the
central administration server and the managed Backup Exec server, the method
that is set for the managed Backup Exec server is used when a job is delegated
from the central administration server.
4 Click OK.
■ Scheduling a report
■ Saving a report
■ Editing a report
■ Deleting a report
Note: The See Completed report group only includes the scheduled reports that
have completed. Reports that were run immediately are deleted when you close
the report viewer.
For information about the best practices to use Backup Exec reports, refer to the
Backup Exec Best Practices.
Scheduling a report
You can schedule a report to run once at a specific time or multiple times on a
recurring schedule. Scheduled reports are listed in the See Upcoming report group
on the Reports tab. You can edit or delete scheduled reports.
To schedule a report
1 On the Reports tab, under Report Groups, click the report group that contains
the report that you want to schedule.
2 Right-click the report name, and then click Schedule Report.
Reports 683
Scheduling a report
5 (Optional) If you want to send an email to yourself or someone else when the
report is completed, do the following:
■ In the left pane, click Notification.
■ Select an existing recipient or click Manage Recipients to add a new
recipient.
■ If you want to include a copy of the report in the email notification, check
Include the report in email notifications.
Reports 684
Creating a custom report
6 In the left pane, click Schedule, and then select one of the following scheduling
options:
Run now with no recurring schedule Lets you run the job immediately.
Run on Lets you set the date and time to run the
report.
Create without a schedule Lets you create and save the report, but
not schedule or run the report at this time.
If you select this option, you can then use
an external scheduling tool to schedule the
job to run at a specific time, or you can
manually run the job when you are ready.
Even though the job is not scheduled, the
report is listed in the See Upcoming report
group on the Report tab.
7 Click OK.
The scheduled report is saved in the See Upcoming report group. After the
report runs, it is saved in the See Completed report group.
See “Viewing completed reports” on page 695.
Operator = (Equal)
Value Errors
If you want the report to include only the alerts for errors that occurred on a specific
day, add another filter expression for the date and time, as shown in the example
below:
Operator =(Equal)
Grouping fields creates sections on the report. For example, if you group by Backup
Exec server, Backup Exec creates a section for each Backup Exec server that
matches the filter criteria. Under each Backup Exec server’s section, the report
displays the data that corresponds to the remaining fields that you selected for the
report.
You can sort a custom report by up to three of the fields that you have chosen for
the report. When you sort on fields, Backup Exec arranges all of the data that
matches the sort criteria together in the report. For example, if you sort on the
Backup Exec server field in ascending order, all data for Backup Exec server A
displays first, followed by all data for Backup Exec server B, and so on.
To create a custom report
1 On the Reports tab, click New Custom Report.
2 On the Custom Report dialog box, type a name and description for the report.
3 If you do not want this report to include the default header and footer settings,
uncheck Use header and footer settings specified in Backup Exec Settings.
The default header and footer settings can include a customized logo, a custom
color for the banner, and text for the footer. These items are set in the default
Backup Exec settings.
See “Setting defaults for standard and custom reports” on page 696.
Reports 686
Creating a custom report
10 (Optional) If you want to filter the data on the report, do the following:
■ In the left pane, click Filters.
■ In the Field name list, select the field on which you want to filter data.
■ In the Operator list, select the operator that you want to use for this filter.
■ In the Value field, type or select the specific data that you want to include
on the report.
■ Click Add.
■ To combine sets of filter expressions, do any of the following:
Reports 687
Creating a custom report
■ Press and hold Ctrl while you click both Type = Backup and
Type = Restore.
■ Click ( ) -
11 (Optional) If you want to organize the report into sections, do the following:
■ In the left pane, click Grouping.
■ In the Group by list, select the field that you want to use as a group.
■ Click Ascending or Descending.
Ascending order lists numbers from smallest to largest and lists letters in
alphabetical order. Descending order lists numbers from largest to smallest
and lists letters in reverse alphabetical order.
■ If you want to further group the data, select the fields in the Then group
by lists, and then click Ascending or Descending for those fields.
A report must have at least one field that is not grouped. For example, if
you select three fields to include on the report, you can group only two of
the fields. If you group all of the fields, no data appears on the report
because all of the data is listed in the group section titles. In addition, you
must have at least four fields on the report to use all three grouping fields.
12 (Optional) If you want to sort the data on the report, do the following:
■ In the left pane, click Sort.
■ In the Sort on list, select the field on which you want to sort the data in the
report.
■ Select Ascending or Descending.
Ascending order lists numbers from smallest to largest and lists letters in
alphabetical order. Descending order lists numbers from largest to smallest
and lists letters in reverse alphabetical order.
■ If you want to further sort the data, select the fields on which you want to
sort in the Then sort on lists, and then click Ascending or Descending
for those fields.
Reports 689
Creating a custom report
13 (Optional) If you want to add a pie graph or bar graph to the report, do the
following:
■ In the left pane, click Graph Options.
■ In the Graph type list, select either Bar or Pie.
■ Select the types of data that you want to include on the graph.
14 (Optional) If you want to see what the report will look like before you save it,
in the left pane, click Preview.
15 Click OK to save the custom report.
To remove fields from the report Under Fields selected for the report, click
the field you want to remove, and then click
the left arrow (<<) button.
To add a new filter expression Select a field name and operator, and then
enter a value. Click Add.
■ Press and hold Ctrl while you click both Type = Backup and
Type = Restore.
■ Click ( ) -
6 Click OK.
To change the field that is used as a group ■ In the left pane, click Grouping.
■ On the Group by or Then group by
list that contains the field you want to
change, click the down arrow, and then
select the new field to use as a group.
To change the field that is used to sort the ■ In the left pane, click Sorting.
data ■ On the Sort on or Then sort on list that
contains the sorting option you want to
change, click the down arrow, and then
select the new field to use to sort the
data.
4 Click OK.
4 Change the graph title or select new fields to populate the graph.
5 Click OK.
Note: You cannot preview custom reports from the Backup Exec Remote
Administration Console.
Saving a report
Reports can be saved to any location that you choose on your hard drive or network
in any of the following formats:
■ HTML file (.htm)
■ Adobe PDF file (.pdf)
■ XML file (.xml)
■ Comma-separated value file (.csv)
■ Microsoft Office Excel workbook (.xls)
Reports 694
Printing a report from the Backup Exec Report Viewer
You can save a report that is currently displayed on the screen or that is in the See
Completed report group.
To save a report
1 On the report, in the Report Viewer, click Save As.
To save a report that is currently displayed On the report, in the Report Viewer, click
on the screen Save As.
To save a report that is in the See ■ On the Reports tab, under Report
Completed report group Groups, click See Completed.
■ Click Save As.
■ Double-click a completed report that
you want to save to a new location.
2 Enter the file name and location where you want to save the report.
3 In the Save as type box, select a format in which to save the report.
When you save a report in HTML format, both the HTML file and a .GIF image
file are saved.
4 Click Save.
Editing a report
Use the following steps to edit the properties of a scheduled standard report or a
custom report before it runs. If the report that you want to edit has been run in a
previous report job, the changes you make now may affect the appearance of the
reports in job history. It is recommended that you copy the report and then edit the
copy.
To edit a scheduled standard report or a custom report
1 On the Reports tab, under Report Groups, click See Upcoming.
Deleting a report
Reports that you create using the Run now option are automatically deleted after
you view the report. However, custom reports, completed reports, and scheduled
reports can be deleted at your convenience.
To delete a report
1 On the Reports tab, under Report Groups, do one of the following:
■ To delete a custom report, click Custom.
■ To delete a scheduled report, click See Upcoming.
■ To delete a completed report, click See Completed.
2 Right-click the report that you want to delete, and then click Delete.
3 Click Yes to confirm that you want to delete the report.
To select a default report format for Under Report format, select either HTML
standard and custom reports or PDF.
To limit the number of rows that can be Under Report content, in Maximum
included in standard and custom reports number of rows to include in a report,
type the appropriate number.
To enable standard and custom reports to Under Report content, click Show all
show all data that is generated, even if rows.
some of the data is duplicated
To enable standard and custom reports to Under Report content, click Show
show only unique data distinct rows.
To add a logo to the header section of Under Header, check Use custom image
custom reports file, and then enter the path to the image
that you want to use in the Image file path
field.
To customize the colors in the header Under Banner color, either enter the
section of custom reports numbers that correspond to the colors you
want to use, or click Colors to select a
color from a chart.
To include default text or the time in the Under Footer, in the Text field, type the
footer of custom reports default text that you want to appear on
every custom report. If you want the time
of the report to be included in the footer,
verify that Include time is checked.
4 Click OK.
Alert History by Backup Exec Lists all alerts in the alert history, grouped and filtered
server by Backup Exec server, displaying the most recent
alerts first.
Audit Log Lists the contents of the audit logs for selected servers
for the specified time period.
Backup Job Success Rate Lists the success rate for backup jobs run to back up
selected servers.
Backup Recommendations Lists any recommendations that can help you to better
manage your backups.
Backup Resource Success Rate Lists the success rate for backup jobs for specified
past number of days for resources on selected servers.
Backup Sets by Media Set Lists all backup sets by media set.
Backup Size by Resource Lists the backup size for each resource job for up to
seven previous runs and then computes the trailing
average for up to seven previous runs for each job
run.
Cloud Storage Summary Displays the summary of the size of cloud storage that
the backed up data uses on the Backup Exec server.
Daily Device Utilization Lists the percentage of the storage devices’ capacity
that the Backup Exec server uses.
Device Summary Lists the device usage and error summary for each
selected Backup Exec server.
Disk Storage Summary Displays disk-based usage statistics for Backup Exec
server disk storage.
Event Recipients Lists all events that were received by each notification
recipient.
Failed Backup Jobs Lists all the failed backup jobs, sorted by the resource
server and time frame.
Jobs Summary Lists all the jobs that ran within the last 72 hours in
chronological order.
Managed Backup Exec Servers Lists the status and configuration for all Backup Exec
servers that are managed by a central administration
server.
Media Errors Lists the number of errors that occur on all media.
Media Required for Recovery Lists the media that contain the backup sets for each
system that is backed up on selected servers for the
specified time period. This report can be inaccurate if
media overwrite settings allow the media to be
overwritten.
Media Summary Lists all the media sets and media that are used by
Backup Exec servers. The current location is given for
each media. Also lists usage statistics for media and
the location of media within Backup Exec media sets.
Media Vault Contents Lists the media that are located in each media vault.
Move Media to Vault Lists all media that can be moved to a media vault.
The listed media are not currently in a media vault and
the media’s append period has expired.
Operations Overview Lists past and future operations data for user-set
period.
Overnight Summary Lists the results of backup jobs for each resource
during the last 24 hours. This report includes backup
jobs that were scheduled to run but did not run. Jobs
are given a grace period of 24 hours before they are
marked as past due.
Problem Files Lists all the problem files that are reported for jobs.
The files are grouped by day and resource.
Recently Written Media Lists all media that have been modified in the last 24
hours.
Recovery Ready Validation Lists the backup sets for which the Validate Virtual
Summary Machine for Recovery jobs are run.
Resource Protected Recently Lists all job detail statistics and exceptions that
occurred on a Backup Exec server for which you run
this report.
Resource Risk Assessment Lists job information for resources on which the last
backup job run on the resource failed. The data is
filtered by resource server.
Restore Set Details by Resource Lists all restore sets that ran within the last 72 hours.
The sets are grouped by the server and resource.
Retrieve Media from Vault Lists all reusable media currently in the specified vault.
Robotic Library Inventory Lists the contents of slots in robotic libraries that are
attached to Backup Exec servers. Usage statistics are
provided for each piece of media.
Scheduled Server Workload Lists the estimated scheduled workload for the next
24-hour period by server.
Scratch Media Availability Lists the aging distribution of media. Shows how many
media are available for overwrite and when other
media will become available for overwrite.
Test Run Results Lists the results for the test run jobs that are set for
the selected time period and Backup Exec servers.
Item Description
Item Description
Job Name The name of the job that is associated with the alert.
Backup Exec server Name of the Backup Exec server on which the alert
occurred.
Item Description
Backup Exec Name of the Backup Exec server on which the alert occurred.
server
Job Name Name of the job that is associated with the alert.
Item Description
Category Category in which the change occurred, such as Logon Account, Alerts,
or Job.
Item Description
Total Jobs Total number of jobs that were processed by the Backup Exec server.
Successful Total number of jobs successfully performed by the Backup Exec server.
Success Rate Percentage of successful jobs that were processed by the Backup Exec
server.
Item Description
Backup Exec server Name of the Backup Exec server for which
the recommendation applies.
Start Time Date and time when the job that is associated
with the recommendation ran.
Item Description
Total Jobs Total number of jobs that were processed by the Backup Exec server.
Successful Total number of jobs successfully performed by the Backup Exec server.
Success Rate Percentage of successful jobs that were processed by the Backup Exec
server.
Item Description
Media Set Name of the media set on which the job ran.
Media Label Media label assigned by Backup Exec, assigned by the administrator,
or contained on a pre-assigned barcode label.
Business-Critical Indicates whether the backup set includes an item that was tagged as
a business-critical resource.
Date / Time Date and time the data was backed up.
Backup Set Describes the data that was backed up and the location of the data.
Description /
Source
Item Description
Server Name of the Backup Exec server where the data for the backup job
was located.
Item Description
Job Date and Date and time the backup job was processed.
Time Run
Trailing Avg Average amount of data that was backed up during the seven previous
runs.
Difference % Amount by which the data that was backed up in the current job differs
from the data that was backed up in the previous backup jobs.
Item Description
Cloud The fully qualified name of the server on which the device exists.
Storage
Server
Cloud The name of the storage location on the cloud storage device. These storage
Bucket units are called buckets..
Bytes Read The amount of data read from the cloud storage device.
Item Description
Drive Name Name of the storage device and the Backup Exec server where the
device is located.
■ Pause
The storage device is temporarily stopped.
■ Enable
The storage device is available for use with Backup Exec. If the
storage device is disabled, it is available for use with other
applications.
■ Online
The storage device is available for use.
■ Offline
Backup Exec cannot access the storage device.
Jobs Number of jobs that were processed by the Backup Exec server’s
storage device.
Size The amount of data that was processed by the Backup Exec server’s
storage device.
Item Description
Item Description
Item Description
Item Description
Target Address of the storage device that is connected to the Backup Exec
server.
Cleaned Date on which the last cleaning job was run on the drive.
Hours Hours the device has been in use since the last cleaning job.
Item Description
Size Amount of data that was read and written since the last cleaning job.
Size Amount of data that was read and written to the device.
Item Description
■ Online
■ Enabled
■ Offline
■ Paused
■ Disabled
Local Access Path Path on the disk where backup data is stored.
Item Description
Notes Information that was entered in the Notes section when the
error-handling rule was created.
■ Error
■ Canceled
Error Category Category of error for which the rule will be applied.
Available error categories include the following:
■ Device
■ Job
■ Media
■ Network
■ Other
■ Resource
■ Security
■ Server
■ System
Cancel Job Displays an X if this option is selected for the error-handling rule. The
option cancels all jobs after the maximum number of retries have been
attempted.
Pause Job Displays an X if this option is selected for the error-handling rule. The
option enables Backup Exec to pause the job until you can manually
clear the error.
Retry Job Displays an X if this option is selected for the error-handling rule. The
option enables Backup Exec to retry the job.
Reports 713
List of Backup Exec standard reports
Item Description
Retry Interval Number of minutes Backup Exec waits before trying to run the job again.
(minutes)
Item Description
Recipient type Designates to whom the Event Recipients report is sent, such as an
individual recipient or a group of recipients.
Item Description
Item Description
Business-Critical Indicates whether the job included items that were tagged as
business-critical resources.
Category Category for the failed job that may be generated by a system, job,
media, or device error.
Error Code Displays the error code that corresponds to the failure.
Item Description
Corrupt Files Number of corrupt files that were encountered during the operation.
Reports 715
List of Backup Exec standard reports
Item Description
Type Lists the type of job that Backup Exec ran within the specified time
range.
Table 16-22 Veritas SaaS Backup data in the Jobs Summary report
Item Description
Type Lists the type of job that Veritas SaaS Backup ran within
the specified time range, such as Backup, Restore, or
Item Restore.
Item Description
Stalled Time limit that was used for determining Stalled communications status.
No Comm Time limit that was used for determining No Comm communications
status.
Logs When job logs are uploaded from the managed server to the CAS
database.
Possible upload times are as follows:
Item Description
History When job history is uploaded from the managed server to the CAS
database.
Possible upload times are as follows:
Status When status is uploaded from the managed server to the CAS database.
Possible upload times are as follows:
Display Alert Displays Yes if you have configured an alert to be set if the time
difference between the central administration server's clock and a
managed Backup Exec server's clock exceeds a preset value (maximum
time difference tolerance).
Sec Maximum time difference tolerance in seconds that is set for server.
Item Description
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator,
or contained on a pre-assigned barcode label.
Business-Critical Indicates whether the media contains a backup set that has a
business-critical resource.
Total Mounts Total number of times this media has been mounted.
Total In Use Total number of hours that this media has been in use.
Hours
Total Errors Total number of error alerts for the system, jobs, media, and devices.
Item Description
Date Date and time the backup job set was created.
Media Location Name of the storage device where the media that was used for the
Name backup job is stored.
Business-Critical Indicates whether the media includes a backup set that has a
business-critical resource.
Recycle Time Displays the date and the time after which the media can be overwritten.
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator,
or contained on a pre-assigned barcode label.
Business-Critical Indicates whether the media includes a backup set that has a
business-critical resource.
Hours Total number of hours that the media has been in use.
Item Description
Write Size Amount of data that has been written to the media.
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator,
or contained on a pre-assigned barcode label.
■ The media has met or exceeded the vault move date that was specified for the
media containing the media.
■ The append period `has expired, but the overwrite protection period is still current
(allocated).
Item Description
Backup Exec Name of the Backup Exec server where the data for the backup job
server was located.
Media Label Media label assigned by Backup Exec, assigned by the administrator,
or contained on a pre-assigned barcode label.
Append Period Last date that data may be added to the media.
End Date
Item Description
Job summary for Details Backup Exec job activity for the specified time period.
jobs completed in
the past x Hours
Errors Total number of error alerts for the system, jobs, media, and devices.
Warnings Total number of warning alerts for of jobs, media, and devices.
Information Total number of informational alerts for the system, jobs, media, and
devices.
Attention Total number of alerts that require a response from the user.
Required
Exceptions Total number of jobs that completed successfully, but may contain one
or more skipped files, corrupt files, virus infected files or files in use.
Total Data Total amount of data that was backed up in kilobytes, megabytes, or
Backed Up gigabytes.
Total Media Used Total number of media that were used to back up the completed jobs.
Scheduled Jobs Displays those jobs whose scheduled start times begin within 72 hours
of the job being created. Jobs with recurring schedules also appear if
their start times begin within 72 hours of the job's last start time.
Item Description
Imported Number of imported media. Imported media is media that was created
by a product other than this installation of Backup Exec.
Media Overwrite Displays the level of overwrite protection (Full, Partial, None) that is
Protection Level assigned to the media.
Item Description
Item Description
Type Displays the type of job that Backup Exec runs to produce the Overnight
Summary report.
Because the Overnight Summary report lists the results of backup jobs
for each resource during the past 24 hours, Backup is always the type
of job that appears
Error Category Category for the job that may be generated by a system, job, media,
or device error.
Backup Exec Name of the Backup Exec server on which the job ran.
server
Total Tasks Total number of jobs that ran within the last 24 hours.
Uncorrected Number of the jobs that fail and were not run again with successful
Exceptions completion.
Item Description
Item Description
Type Lists the type of job that Backup Exec ran when problematic files were
detected.
Backup Exec Name of the Backup Exec server on which the file is located.
Server
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator,
or contained on a pre-assigned barcode label.
Location Location of the media, such as the storage vault name or drive name.
Date and Time Date and time media was last modified.
Modified
Item Description
Backup Set Displays the details of the backup set. name of the backup set, size of the
Details backup set, and name of the device
Backup Set Displays the status of the tests and checks run on the backup set.
Validation
■ Register VM: Status of the Register VM test.
■ Power ON: Status of the Power ON test.
■ Heartbeat Check: Status of the Heartbeat check.
The validation status and the range of the report that you selected are displayed in
the Recovery Ready Validation Summary report.
If you do not select the range, the report is displayed for last 30 days. If you run the
same validation job multiple times for the same backup set, the report displays
information for the latest run of the validation job.
Item Description
Item Description
Item Description
Error Text Describes the event that caused the job to fail.
Item Description
Error Category The category for the failed job that may be generated by a system, job,
media, or device error.
Backup Exec Name of the Backup Exec server on which the job ran.
Server
Item Description
Corrupt Files Number of corrupt files that were encountered during the operation.
Item Description
Cartridge Label Displays the name of the disk cartridge. Disk cartridge names cannot
exceed 128 characters.
Vault Name Displays the name of the vault where the media is located.
Offsite Return Displays the date that the media was returned to the off-site vault.
Date
Recycle Date Displays the date after which the media can be overwritten.
No Append Date Displays the date on which Backup Exec can no longer append data
to the media.
Rule Name Displays the name of vault media rule that is applied to the media.
Item Description
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator,
or contained on a pre-assigned barcode label.
Business-Critical Indicates whether the media includes a backup set that has a
business-critical resource.
Full Space available on a media; "1" indicates that media is full and "0"
indicates that there is space available on the media.
Item Description
Backup Exec Name of the Backup Exec server that will process the scheduled jobs.
server
Next Due Date Time and day the next job is scheduled to run.
Backup Size Estimated amount of data to be processed during the next 24 hours.
Reports 731
List of Backup Exec standard reports
Item Description
Total Size Total amount of data to be processed on the server during the next 24
hours.
Total Size Total amount of data to be processed on all Backup Exec servers.
Item Description
Cartridge Label Cartridge label that was assigned by Backup Exec, assigned by the
administrator, or contained on a pre-assigned barcode label
Media Location Name of the storage device that contains the actual media.
Name
Total Capacity Total native capacity of the scratch media without using compression.
Remaining Total amount of remaining native capacity of the scratch media without
Capacity compression.
Retention Hours The amount of time remaining to retain and protect the media from
Remaining being overwritten.
Item Description
Backup Exec Name of the Backup Exec server on which the job ran.
server
Job Date and Date and time the backup job was processed.
Time Run
Credential Check Indicates if the Backup Exec logon account was verified as correct for
the resources being backed up.
Device Name Name of the device, such as the name of the robotic library.
Max Needed Amount of space that is needed on the media to run the job.
Online Capacity of media available in the device to which data can be written.
See “Instant Cloud Recovery tab overview in Backup Exec” on page 735.
See “Requirements to configure Instant cloud recovery in Backup Exec” on page 737.
See “Preconfigurations to be completed in the Azure portal ” on page 738.
See “How to configure Azure resources” on page 738.
See “How to enable replication for virtual machines” on page 743.
See “How to manage failover for a virtual machine” on page 746.
See “How to manage replication for virtual machines” on page 745.
See “How to change the Subscription or Recovery Services Vault” on page 746.
See “How to view configuration details” on page 742.
Instant Cloud Recovery 735
Instant Cloud Recovery tab overview in Backup Exec
Manage Manage Failover Lets you manage failover only for a virtual machine that
is replicated or protected.
View Error Details Lets you view errors for a virtual machine. Before you
protect a virtual machine, you must resolve any validation
errors that are identified.
Refresh View Lets you manually refresh the view of the virtual
machines based on the Subscription and Recovery
Services Vault that you selected.
Renew Certificate Lets you renew the Backup Exec certificate that connects
you to the Azure portal.
View Configuration Lets you view the configured Azure resource details.
Details
See “How to view configuration details” on page 742.
Prepare New Lets you prepare new infrastructure for the configured
Infrastructure Recovery Services Vault on the Azure portal.
Remove Lets you delete the configured Azure resources and the
Configuration view of the virtual machines from Backup Exec.
Virtual Machine Lets you view details only for a protected virtual machine
Details in Backup Exec on the Azure portal.
■ Global administrator for the Active Directory tenant of the Azure subscription
or has the permissions to create apps in the tenant.
■ Owner or User Access Administrator for the Azure subscription.
Refer to the Required permissions section in the Microsoft documentation
for more information.
https://docs.microsoft.com/en-us/azure/azure-resource-manager/
resource-group-create-service-principal-portal
■ Ensure that you prepare the infrastructure in the Azure portal if you create a
Recovery Services Vault in Backup Exec.
See “Preconfigurations to be completed in the Azure portal ” on page 738.
4 Select the Azure Subscription that you want to use for the configuration.
2 Click Finish.
4 Click Finish.
5 Click OK.
Backup Exec retrieves information about the vault, the list of virtual machines based
on the infrastructure of the Recovery Services Vault, and displays the information
on the Backup Exec console.
The following information is displayed:
Instant Cloud Recovery 741
How to view error details
Name Displays the name of the virtual machine as displayed on the Azure
portal. For ESX or Hyper-V this is display name of the virtual machine.
Replication Displays the replication health; whether the virtual machine is replicated
Health successfully or if there are any errors or warnings. The most common
statuses for replication health are:
■ Warning
■ Healthy
■ Critical
■ Not replicated
Protection Status Displays the protection status; whether the virtual machine is protected.
The most common values for protection status are Protected and
Unprotected.
Configuration Displays if there are any configuration issues identified for a virtual
Issues machine by Azure and the number of issues.
To view the configuration issues, select the virtual machine, and click
View Error Details.
Last Successful Displays the date and time when the last successful failover was
Failover completed.
Displays the date and time when the last successful replication was
completed.
Validation Errors Displays if there are any validation errors identified for a virtual machine
and the number of such errors. To view the validation errors, select the
virtual machine, and click View Error Details.
The View Error Details dialog box is displayed giving information about the type
of errors for the virtual machine. There are three types of errors:
■ Validation Errors
■ Configuration Issues
■ Replication Health Issues
For any type of error, the error message is displayed along with the possible cause
of the error and recommended solution.
Item Description
You are redirected to the Azure portal, the Properties page for the selected virtual
machine.
See “About Instant Cloud Recovery” on page 734.
Note: You cannot enable replication for a virtual machine that has validation
errors.
Virtual VMware and Displays the name of the VMware or Hyper-V virtual
Machine Name Hyper-V machine for which you want to enable replication.
Target VMware and Type the name of the target VMware or Hyper-V virtual
Machine Name Hyper-V machine.
Run As VMware Select the account that target virtual machine uses.
Account
Replication VMware and Select the replication policy that you want to use for
Policy Hyper-V the VMware or Hyper-V virtual machine.
Instant Cloud Recovery 745
How to manage replication for virtual machines
Storage VMware and Select the storage account that the target machine will
Account Hyper-V use.
Storage VMware and Select the storage account for replication logs that the
account for Hyper-V target machine will use.
replication
If you select a Premium storage account, you must
logs
select a Standard storage account for replication logs.
Virtual VMware and Select the virtual network that the target machine
Network Hyper-V belongs to.
Resource VMware and Select the resource group that the target machine
Group Hyper-V belongs to.
On the Instant Cloud Recovery tab, select the virtual machine and in the Manage
group, click Manage Replication.
You are redirected to the Azure portal, the Replicated items page of the Recovery
Services Vault that you selected in Backup Exec.
You can now manage replication for the virtual machines in this Recovery Services
Vault from the Azure portal.
See “About Instant Cloud Recovery” on page 734.
3 Click Next.
Instant Cloud Recovery 747
How to prepare a new infrastructure
Note: Renew Certificate is enabled only 6 months before the certificate expires.
■ Backup Exec Management Command Line (BEMCLI) commands for import and
export
■ Best practices for blocking access to backed up items with GDPR Guard
You can export the content of all imported files into one CSV file using the
Export-BEItemsBlocked BEMCLI command.
After the blocked items are imported, the restore browse and search view do not
display the blocked items. When you run a restore job, the blocked items are not
available for restore. The blocked items continue to be part of backups and are not
deleted from the backup media.
Backup Exec ensures that information about blocked items is protected using
encryption and all operations that are related to blocked items are recorded in the
audit log for compliance requirements.
When you run a restore job, you can use the Allow restore of blocked items
option to restore blocked items. When you select this option, you must provide a
reason to restore the blocked items and that is recorded in the audit log. Backup
Exec allows only an SLA owner to restore the blocked items.
Following are the key features of GDPR Guard:
■ Blocked items cannot be viewed or restored from the Backup Exec console.
■ Backup Exec ensures integrity and protection of the blocked items data.
■ The file format that is used for blocked files operations (import and export) is
CSV, which is an accepted and easy to use format. A CSV file supports all types
of character encoding.
■ All operations that are related to blocked items are recorded in audit logs and
Windows event log, which can be used for compliance requirements.
■ The imported blocked items on Central Administration Server (CAS) are
auto-synced across all Managed Backup Exec Server (MBES)s that support
blocking of items, ensuring blocking in the CAS-MBES environment without
actually importing blocked items in each MBES.
Note: The import command cannot be run on MBES. The export command can
be run on CAS and MBES.
GDPR Guard 752
Backup Exec Management Command Line (BEMCLI) commands for import and export
Figure 18-1 Workflow for blocking access to backed up items with GDPR
Guard
See “ Backup Exec Management Command Line (BEMCLI) commands for import
and export” on page 752.
See “Supported types of backed up data” on page 754.
See “How to block access to backed up items” on page 755.
See “Restoring blocked items” on page 756.
See “Best practices for blocking access to backed up items with GDPR Guard”
on page 757.
See “Troubleshooting blocked access to backed up items with GDPR Guard”
on page 775.
■ Export-BEItemsBlocked
GDPR Guard 753
Backup Exec Management Command Line (BEMCLI) commands for import and export
For more information on how to use the Backup Exec Management Command Line
Interface and the commands, view the help file named BEMCLI, located in the
default installation location:
C:<Backup Exec install path>\Backup Exec
■ If an MBES is offline during the import operation, the blocked items' information
is shared with that MBES after it is online.
■ In case of a rolling upgrade, older MBES does not receive the blocked items.
After MBES is upgraded to the current version of Backup Exec, the blocked
items information is synced with MBES.
■ If a new MBES is added, the encryption key and blocked items information is
synced with the MBES.
■ If there is an update to the blocked items or reset operations, all information
including CSV data is synced with MBES.
The export command runs on both CAS and MBES.
See “About GDPR Guard” on page 750.
See “Supported types of backed up data” on page 754.
See “How to block access to backed up items” on page 755.
See “Restoring blocked items” on page 756.
See “Best practices for blocking access to backed up items with GDPR Guard”
on page 757.
See “Troubleshooting blocked access to backed up items with GDPR Guard”
on page 775.
■ Windows shares
■ File and folder data of virtual machine backups; both VMware and Hyper-V.
See “About GDPR Guard” on page 750.
See “ Backup Exec Management Command Line (BEMCLI) commands for import
and export” on page 752.
See “How to block access to backed up items” on page 755.
See “Restoring blocked items” on page 756.
GDPR Guard 755
How to block access to backed up items
See “Best practices for blocking access to backed up items with GDPR Guard”
on page 757.
See “Troubleshooting blocked access to backed up items with GDPR Guard”
on page 775.
4 Select File and folder backups to a point-in-time, File and folder backups
from a backup set, or Files and folders located through Search.
The list of blocked items that were imported are not available when you select
files and folders. When the blocked items have to be restored, Backup Exec
allows only the SLA owner to restore these items and reason for restore is
recorded in the audit log.
5 Follow the Restore Wizard prompts to restore the data.
See “Restoring file system data” on page 233.
See “About GDPR Guard” on page 750.
See “ Backup Exec Management Command Line (BEMCLI) commands for import
and export” on page 752.
See “Supported types of backed up data” on page 754.
See “Restoring blocked items” on page 756.
See “Best practices for blocking access to backed up items with GDPR Guard”
on page 757.
See “Troubleshooting blocked access to backed up items with GDPR Guard”
on page 775.
5 In the Restore Wizard, click Next to view the blocked files in the Restore view.
The restore view lists the blocked items that can be selected for restore.
6 Follow the Restore Wizard prompts to restore the data.
See “About GDPR Guard” on page 750.
See “ Backup Exec Management Command Line (BEMCLI) commands for import
and export” on page 752.
See “How to block access to backed up items” on page 755.
See “Supported types of backed up data” on page 754.
See “Best practices for blocking access to backed up items with GDPR Guard”
on page 757.
See “Troubleshooting blocked access to backed up items with GDPR Guard”
on page 775.
■ Run the import command again when a media is moved to a new media server
and this media has backup sets that contain blocked items. If you do not run
the import command again, the blocked items will be available for restore.
■ In a CASO environment, run CAS and all MBES with Backup Exec 20.3 or later
version for items to be blocked across all media servers. When you run the
import command on the CAS server, the information is automatically synced on
the MBES server.
■ Run the audit log report regularly to keep a record of all the operations related
to blocked items.
■ Ensure that the CSV used for specifying blocked items during import operation
is with one of the following character encodings:
■ Locale encoding which corresponds to the ANSI and the OEM code pages.
■ UTF-8 with Byte-Order-Mark (BOM).
■ UTF-16 Little-Endian with BOM.
■ UTF-16 Big-Endian with BOM.
The import command does not function properly if the input CSV file contains
strings from multiple locales.
■ If you are restoring a virtual machine or doing a local restore of your computer
using Simplified Disaster Recovery, ensure that you delete the blocked items
manually or using a post-processing script once the restore is complete.
Otherwise, blocked items are restored in such cases.
See “About GDPR Guard” on page 750.
See “ Backup Exec Management Command Line (BEMCLI) commands for import
and export” on page 752.
See “Supported types of backed up data” on page 754.
See “How to block access to backed up items” on page 755.
See “Restoring blocked items” on page 756.
See “Troubleshooting blocked access to backed up items with GDPR Guard”
on page 775.
Chapter 19
Troubleshooting Backup
Exec
This chapter includes the following topics:
Question Answer
How do I know if You can find a list of compatible devices at the Backup Exec Hardware
my storage Compatibility List.
device is
If your drive is listed on the hardware compatibility list, run the Configure
supported?
Storage wizard and install device drivers.
From the Configure Storage wizard, the Device Driver Installation Wizard
finds and installs the most suitable driver for your tape drive.
How can I The following sections provide tips for troubleshooting and configuring
troubleshoot tape device and robotic library hardware:
issues with a
See “Troubleshooting robotic libraries and tape drives” on page 762.
robotic library or
tape drive? See “Starting and stopping Backup Exec services” on page 667.
Question Answer
I’m getting an Many factors can cause the cyclic redundancy check (CRC) error.
error "Storage The following list contains the most common reasons for this error and
device [device] potential ways to resolve the problem:
reported an error
on a request to ■ Contaminated read and write heads of the tape device.
read or write data Check with the hardware manufacturer for proper cleaning techniques.
to or from media. ■ Bad media.
Error reported: Replace the media. Try a new tape that the hardware manufacturer
Data error (cyclic has certified.
redundancy ■ Tape driver.
check)." What Load the appropriate Backup Exec tape driver.
should I do? You can find a list of compatible devices in the Backup Exec Hardware
Compatibility List.
■ Wide negotiation for the SCSI controller is not configured properly.
If the device is a wide (68 pin) SCSI device, then wide negotiation
may and should be used. If the device is a narrow (50 pin) SCSI
device, disable wide negotiation. Use the manufacturer's SCSI
installation program to disable wide negotiation on the SCSI controller
card.
■ SCSI controller transfer rate is too fast.
Use the manufacturer's SCSI installation program to lower the SCSI
transfer rate. Check with the manufacturer of the controller and the
device for the proper configuration for the SCSI transfer rate.
■ SCSI controller synchronous negotiation enabled.
Use the manufacturer's SCSI installation program to disable
synchronous negotiation on the SCSI controller card. Check with the
manufacturer of the controller and the device for the proper
configuration for SCSI synchronous negotiation.
■ Incorrect termination or bad cables.
Verify that the SCSI cable is good and that it is configured to provide
proper SCSI termination. Do not mix passive and active termination.
■ Confirm that the tape drive functions properly.
Check with the tape drive manufacturer for diagnostic software to test
the condition of the tape drive hardware.
■ General SCSI problems.
Isolate the tape drive on its own controller card or try a different SCSI
card.
Troubleshooting Backup Exec 762
Troubleshooting robotic libraries and tape drives
Question Answer
Why does my The DLT tape drive maintains internal information about the tape on a
DLT tape drive tape directory track. The directory track is updated before the tape is
pause when it ejected from the drive. If the drive is turned off without ejecting the tape
catalogs some first, this information is lost.
tapes?
Re-generating the tape directory information takes several hours to
complete, which makes it seem like the drive is hung. Allow sufficient
time for the operation to complete and then eject the tape. Normal
operation resumes after the directory track is updated.
A backup to my The backup most likely fails to complete because the storage option
DLT tape drive is Eject the media after job completes is selected, and the tape drive
stuck at 99% does not support the operation. Some tape drives require you to manually
complete. What remove the tape, such as Digital Linear Tape (DLT), Linear Tape-Open
should I do? (LTO), Travon, and Onstream drives.
To remedy this situation, either uncheck the storage option Eject the
media after job completes, or configure an automatic response to the
active alert.
2. Verify that the account has the following basic rights and permissions:
■ Act as part of the operating system
■ Backup files and directories
■ Create a token object
■ Log on as a batch job
■ Log on as a service
■ Manage auditing and security log
■ Restore files and directories
■ Take ownership of files and other objects
2. Click Removal Storage Service, then click on Stop and Disable. If a Removal
Storage service error appears, disregard it. The error should not occur again
after you restart the server.
3. Restart the server.
Ensure that you have installed the latest device drivers for the tape device
1. Note: Backup Exec has only been tested for performance and compatibility
with the drivers that are listed on the hardware compatibility list.
If you have installed the latest version of Backup Exec, you should already
have the latest drivers. If your drivers are out of date, click Backup Exec tape
device drivers > Drivers for a list of tape device drivers available for download.
2. Use Tapeinst.exe to install the tape device driver. This program is copied to
your hard disk when you install Backup Exec.
3. Navigate to the Windows Device Manager to verify that the tape device drives
were installed for the tape drive.
■ For Windows 2008: Right-click on Computer > Manage, expand Server
Manager > Diagnostics, then select Device Manager.
■ For Windows 2003: Right-click on My Computer > Manager, expand
Computer Management, then select Device Manager.
4. In the Device Manager, locate the tape driver, and right-click on Properties.
5. Click the Driver tab and verify that the driver provider is Veritas.
Note: Do not uninstall tape diagnostic tools when Backup Exec services are
running. Remove tape diagnostic tools after the diagnostic tests are complete.
Ensure that Microsoft default drivers are installed for a medium changer
1. This procedure pertains to robotic library devices only. Navigate to the Windows
Device Manager using one of the following methods:
■ In Windows 2008: Right-click on Computer, then click Manage. Expand
Server Manager > Diagnostics, then select Device Manager.
■ In Windows 2003: Right-click on My Computer, then click Manager. Expand
Computer Management, then select Device Manager.
5. Navigate to your Backup Exec directory, and launch tracer.exe. The tracer
program begins capturing SCSI information.
6. Restart the Backup Exec Services. To restart the services, launch
Servicesmgr.exe from the Backup Exec directory.
7. After the services start, review the tracer log for any hardware errors or
reservation conflicts.
C:\WINDOWS>cd system32
C:\WINDOWS\system32>devmgmt.msc
C:\WINDOWS\system32>
2. In the Device Manager, click the View menu, then select Show Hidden
Devices. This option shows all device drivers, including those that are not
currently installed and running on the computer.
3. Expand the following devices. For any of these devices that are not shown in
bold, right-click them and click Uninstall:
■ Medium changer
■ Tape drives
■ SCSI cards
Devices that are not bold are not loaded and can be uninstalled.
Warning: Removing devices and drivers that are still required by the system
may result in the system becoming unstable and unable to start.
3. Right-click the device, and then select Delete. A prompt to move the backup
jobs to other devices or device pools may appear. For Backup Exec 2012, this
prompt appears as Retarget Jobs.
4. Note the jobs that are affected and move the jobs back to the original device
after resolving the issue with the device.
5. Stop the Backup Exec services.
6. Navigate to the Backup Exec directory and run Tapeinst.exe.
7. In the Backup Exec Device Driver Installed dialog, select the following
options:
■ Use tape drivers for all supported tape devices
■ Delete entries for tape devices that are unavailable, removed, or turned
off
■ Use Plug-and-Play drivers for Windows 2000 and later
Question Answer
Why does the Backup Exec Backup Exec is a client/server application that must always be
Administration Console available to process the jobs that are submitted from both local
continue to own a storage and remote administrative consoles.
device even when it's not
The Backup Exec services claim all of the storage devices that
running?
are attached to the Backup Exec server whenever the services
are running. Backup Exec requires constant control of the
storage devices to collect statistics on media and storage
device usage, and to provide media overwrite protection when
necessary.
Troubleshooting Backup Exec 769
Troubleshooting backup issues in Backup Exec
Question Answer
When I run a local backup, The type of partition for which the system is formatted may
the total number of bytes cause this problem.
backed up by Backup Exec
If you have a Windows NTFS compressed partition, Backup
does not match the number
Exec displays the uncompressed byte count of the files that
of bytes displayed by
are backed up. Meanwhile, Windows Explorer displays the
Windows. Why?
compressed byte count of the files on the hard drive. For
example, Windows compresses an NTFS partition that contains
1 GB of data to 500 MB. Backup Exec reports that 1 GB of
data was backed up, even though Windows Explorer displays
that only 500 MB of compressed data exists on the hard drive
How can I change my You can refresh a database encryption key at any time. Refer
existing database to the following topic for more information about refreshing
encryption key if I feel it has database encryption keys.
been compromised or to
See “Refreshing Backup Exec Database encryption keys”
comply with company
on page 603.
policies?
Troubleshooting Backup Exec 770
Troubleshooting failed components in the SAN
Question Answer
Why do I experience slow Local disk drives on the Backup Exec server can usually be
throughput when I back up backed up at a faster speed than backing up remote servers
remote disks? across a network.
The backup speed for a remote disk is limited by the speed of
the physical connection. The rate at which a remote server's
hard disks are able to be backed up depends on the following
items:
You can find a list of compatible operating systems, platforms, and applications in
the Backup Exec Software Compatibility List.
Also, verify that all hardware drivers are up to date and are started. If you find errors
with your hardware, contact your hardware vendor for specific instructions.
Step Action
Step Action
Step Action
Step Action
Step Action
Step Action
Table 19-6 How to bring a device online after an unsafe device removal event
Step Action
■ The BKUPINST21.htm file logs any errors that occur during the .NET installation.
However, detailed logs are available in .Net 4.8 setup logs, which are available
at %temp% folder and the file name are Microsoft .NET Framework 4.8
Setup_*.html, Microsoft .NET Framework 4.8 Setup_*.txt, and
dd_ndp48-x86-x64-allos-enu_decompression_log.txt.
■ If some blocked items are skipped during the import operation with the reason
displayed as invalid item path, check the following:
■ The full path for the skipped item does not start with the volume or share
name and starts with server name. For example: E:\folder1\a.txt and
TestShare\F1\b.txt are acceptable entries in the full path.
■ Only the file name in the item path contains '*' related wildcards. If the folder
path contains the wildcard, the entry is skipped. For example:
G:\Test2\*\CatTrans.xsl and G:\*\results.txt are invalid entries.
Troubleshooting Backup Exec 776
Troubleshooting blocked access to backed up items with GDPR Guard
■ If Import operations terminate with the following error: “An error occurred while
processing a blocked item. The internal list of blocked items does not exist”.
Check whether the input CSV file path is correct and does not point to an invalid
drive or network location.
■ If the export operation terminates with the following error: “An error occurred
while opening the internal list of blocked items”.
Ensure that the specified output folder path is valid and does not point to an
invalid drive or network location..
■ If some of the blocked items are displayed in the restore or search view that
may be due to the following reasons:
■ An import operation is running for the CSV file containing some blocked
items of the same resource.
■ The integrity check failed for the internal list of blocked items for that resource
or some problem occurred while reading from the internal list of blocked files
for the restore or search view.
If you run the restore job, the restore job log displays the exact reason of the
failure in reading from the internal list of blocked files.
■ If a soft or hard link path is specified in the CSV, only the link is blocked. To
block the folder that the link is pointing to, specify the actual path of the folder
in the CSV.
■ If you want to remove a blocked file entry from an already imported CSV file,
do the following in the order listed:
■ Run the export command.
■ Remove the entry from the generated CSV.
■ Delete the internal file containing the list of blocked items for the resource
whose entry is removed. Remove the internal file from te following location:
"data\BLFileInfo" folder under the Backup Exec installation directory.
■ Run the import command again with the ResetifCorrupted parameter.
Import-BEItemsToBlock - RESETifCorrupted - CsvFilePath <CVS
file path> - ColumnNameForServerName <Name of 1st column> -
ColumnNameForBlockedItemPath <Name of 2nd column>
■ If the restore and search view does not display results for a long time it can be
because a large number of blocked items are added for that resource. In such
a scenario, restore job can still be run at the folder or volume level to view the
items that are restored and viewed.
■ If a standalone media server that has blocked items needs to be converted into
an MBES server, perform the following steps in the order listed:
Troubleshooting Backup Exec 777
Troubleshooting Instant Cloud Recovery issues in Backup Exec
Item Description
Backup Exec Tech Center Provides the links to Backup Exec self-paced
training modules.
Note: You must have an active Internet connection to access the Veritas Knowledge
Base.
expression queries to provide search parameters. For best results, focus on a few
keywords that best represent your question.
When you search the knowledge base, a new browser window launches and displays
the search results.
To search the Veritas Knowledge Base
1 Do either of the following:
■ Click the Backup Exec button, select Technical Support, and then select
Search Knowledge Base.
■ On the Home tab, in the Support group, ensure that Technical Support
is checked. Then, in the Technical Support panel, click Veritas Technical
Support.
Item Description
Veritas QuickAssist (VQA) Help Tool Scans the local computer and generates a
report about common issues in your Backup
Exec environment.
Gather utility for Linux servers Creates and compiles a Packet file. The file
contains detailed information about
installation, diagnostics, and error reports.
Backup Exec Debug Monitor Captures the debug output from Backup Exec
and saves it into debug logs.
See “Using the Backup Exec Debug Monitor
for troubleshooting” on page 786.
Troubleshooting Backup Exec 781
Running the Veritas QuickAssist Help Tool
To generate a diagnostic file for a Backup From the directory <Backup Exec
Exec server install path>\Backup Exec\, type
bediag [switches] servername .
To generate a diagnostic file for a remote From the directory <Backup Exec
computer install path>\Backup Exec\, type
bediag [switches] workstationname.
3 Open the "Bediag.txt"from the directory that contains Bediag.exe (by default
<Backup Exec install path>\Backup Exec).
Switch Description
Switch Description
/bex Dumps only the Backup Exec entries that are in the Application Event
log.
/caso Dumps information about the central administration server and managed
Backup Exec servers.
/err Dumps only the error events from any event log.
Switch Description
/recs:n Dumps only the newest records from given event logs.
The bex, err, and recs switches must be used with the app switch and
the sys switches.
Switch Description
4 Note the location of the Packet file that is displayed on the screen.
Troubleshooting Backup Exec 786
Using the Backup Exec Debug Monitor for troubleshooting
■ Using the Central Admin Server feature with Microsoft clusters and a storage
area network
■ Troubleshooting clusters
Only one installed instance of Backup Exec can be installed into the remote
SQL Server instance on a clustered node. All other installed instances of Backup
Exec in the cluster must use the default Backup Exec MSDE database instance.
Note: You must run the Backup Exec cluster wizard on the cluster node that
uses the remote SQL Server instance.
■ For off-host backups that use the hardware provider in a Microsoft cluster (MSCS)
environment, the Backup Exec server and the remote computer must be in
different cluster groups. The cluster applications cannot support device logical
unit numbers (LUNs) that have duplicate signatures and partition layouts.
Therefore, the snapshots containing the LUNs must be transported to a host or
remote computer that is outside the cluster.
■ For Windows Server 2008 and later, you must use the same level of operating
system on the Backup Exec server and on the computer that hosts the remote
SQL Server instance in the following scenarios:
■ To use a remote clustered SQL Server instance to host the Backup Exec
Database
■ To use the Backup Exec Utility to reconfigure the clustered Backup Exec
installation or the remote clustered SQL Server instance
For Windows Server 2012 and later, Backup Exec supports parallel backups across
Cluster Shared Volumes (CSV) and cluster nodes.
Backup Exec does not support virtual machines that store data on both CSVFS
and NTFS volumes.
For specific operating system requirements, refer to the Backup Exec Software
Compatibility List.
See “Installing Backup Exec on a Microsoft Cluster Server ” on page 791.
See “About backing up Microsoft Cluster Servers” on page 805.
restarted by default. Backup Exec provides an additional rule for cluster failover
restart called checkpoint restart. A checkpoint restart option allows backup jobs to
continue from the point at which the jobs were interrupted rather than starting the
backup again. If you enable the rule to retry jobs on a cluster failover, then you can
specify an additional option to do a checkpoint restart when retrying the job.
Checkpoint restart is the only property available for the Cluster Failover Rule. You
can change the default so that jobs are not restarted.
When the failed server comes back online, the Microsoft cluster can automatically
rebalance the workload in a cluster, called failback, by moving cluster groups back
to the server that has rejoined the cluster. However, by design, Backup Exec does
not failback. The backup jobs will continue to run on the designated failover node.
By continuing to run backup jobs on the designated failover node, any further risk
of having to restart the jobs again when the failed server rejoins the cluster is
avoided. Then, when it is convenient, you can move the Backup Exec cluster group
back to the controlling node.
Specific details of how Backup Exec runs in a cluster vary depending on the
configuration you use in the cluster.
See “Configuring checkpoint restart” on page 574.
See “Configurations for Backup Exec and Microsoft Cluster Servers” on page 797.
See “Installing Backup Exec on a Microsoft Cluster Server ” on page 791.
■ During installation of a Backup Exec cluster, the node that runs the installation
should own the shared disk. If you use a physical disk resource that belongs to
another application, the Backup Exec Cluster Wizard will move all the resources
that belong to the other application into the Backup Exec group. It is
recommended that Backup Exec not be installed on the cluster quorum.
■ An individually licensed copy of Backup Exec, as well as any applicable agents
and options, is required for each active node in the cluster as defined in the End
User License Agreement. When installing a trial version of Backup Exec, a
cluster environment is automatically detected and licenses are not required.
■ When you install Backup Exec clusters in a Central Admin Server feature (CAS)
configuration, all Backup Exec installations must have the same server
configuration. Either all nodes should be database servers or all nodes should
be managed Backup Exec servers that connect to the central administration
server.
■ All Backup Exec installations into a cluster must either be part of a single cluster
group, or be locally installed on each node. If cluster-aware Backup Exec is
installed in a cluster as well as a locally installed version of Backup Exec (not
cluster-aware), then you cannot log on to the locally installed Backup Exec
server. You can only log on using the Backup Exec virtual server name. To be
able to log on to the locally installed Backup Exec server, you must first use the
Cluster Configuration Wizard to uninstall cluster-aware Backup Exec from all
the nodes in the cluster.
■ Use the same account for Backup Exec services on all nodes in the cluster. If
nodes in a cluster use Backup Exec and have different accounts, change the
services to use the same account.
See “Installing Backup Exec on a Microsoft Cluster Server ” on page 791.
See “Configurations for Backup Exec and Microsoft Cluster Servers” on page 797.
Note: By default, failover from the controlling node to a designated node occurs in
alphabetical order according to the machine name of each node. To change the
order in which failover will occur on the designated nodes, rename the machines.
The Backup Exec Agent for Windows is automatically installed on all the nodes in
the cluster. If this installation of Backup Exec is to be used to back up remote servers
outside the cluster, install the Agent for Windows on those remote servers as well.
To install Backup Exec on a Microsoft Cluster Server
1 Install Backup Exec on all the nodes that you want in the cluster. Use the same
installation path for each node.
2 From the node that you want to be the active node, start Backup Exec.
3 Click the Backup Exec button, select Configuration and Settings, and then
select Cluster Configuration Wizard.
4 Follow the instructions on the screen.
On the Virtual Server Information screen, Backup Exec automatically displays
a default name called BKUPEXECVRS for the virtual server. Type a new default
name if you do not want to use the default.
5 When the Cluster Configuration Wizard completes, create a storage device
pool that contains all the locally attached storage devices on each node to be
used when failover occurs. This ensures that jobs can be run on the storage
devices that are attached to the failover nodes.
See “Creating storage device pools for Microsoft Cluster Servers” on page 794.
6 Repeat step 5 for all nodes.
See “Configurations for Backup Exec and Microsoft Cluster Servers”
on page 797.
See “Specifying a different failover node” on page 795.
Step Action
Step Action
See “Installing additional agents and features to the local Backup Exec server”
on page 58.
Before you add a node to the Backup Exec cluster configuration, you must install
Backup Exec on it. Cluster services for a node should be online before you add or
remove it from the cluster.
If you are removing a node, do not run the cluster configuration wizard from the
node you want to remove.
Using Backup Exec in cluster environments 796
Designating a new central administration server in a Microsoft Cluster Server
4 Use BEUtility.exe to connect all Backup Exec servers to the new database
server and to start all Backup Exec services.
5 Stop and restart the Backup Exec Services on the new database server.
6 Using the Cluster Administrator, move the Backup Exec resource group to the
failover node and make sure services start on that node.
7 Use BEUtility.exe to stop and restart the Backup Exec Services on all the
member servers of the SAN in order for them to connect to the new database
server.
To change a Backup Exec cluster from a central administration server to a
managed Backup Exec server
1 Install the new server as a managed Backup Exec server.
Make sure connections to the Backup Exec cluster and other managed Backup
Exec servers are working properly.
2 Using the cluster administrator, shut down the Backup Exec cluster services.
Be sure to keep the Disk resource online.
3 Move the catalog files from the Backup Exec cluster installation path to the
respective installation paths on the new central administration server.
4 Use BEUtility.exe to connect all Backup Exec servers to the new central
administration server and to start all Backup Exec services.
5 Stop and restart the Backup Exec Services on the central administration server.
6 Using the Cluster Administrator, move the Backup Exec resource group to the
failover node and make sure services start on that node.
7 Use BEUtility.exe to stop and restart the Backup Exec Services on all the
managed Backup Exec servers in order for them to connect to the new central
administration server.
See “Multi-node clusters on a fibre channel SAN with the Central Admin Server
feature” on page 802.
Note: If you install the cluster on a private network, use the Cluster Administrator
to enable public communication if necessary.
If you are using a cluster on a fibre channel SAN or with storage devices on a shared
SCSI bus and failover occurs, depending on the capability of your various SAN
components, media might be orphaned in the tape drive until the failed node
becomes active again.
If end-of-job markers were not written to the media before the failover occurred,
the media may be marked as unappendable by the Backup Exec engine when the
next append backup job is run. The media remains unappendable until it is
overwritten (or erased, or the retention period expires, etc.).
If the storage device is a robotic library, you can review the Robotic Library Inventory
report to discover if the media was marked unappendable by the Backup Exec
engine. If the Full column reports a 3, the Backup Exec engine has marked the
media as unappendable.
To add or remove hot-swappable devices in a cluster, run the Hot-swap Device
Wizard on all Backup Exec Cluster nodes. If a server is not updated to recognize
a new device, any job that is targeted to that device may fail.
See “Adding or replacing devices with the Hot-swappable Device Wizard”
on page 381.
The following examples illustrate various cluster configurations:
■ See “Two-node cluster with locally attached storage devices” on page 798.
■ See “Two-node cluster with tape devices on a shared SCSI bus” on page 799.
■ See “Configuring a shared SCSI bus for tape devices” on page 800.
■ See “Multi-node clusters on a fibre channel SAN with the Central Admin Server
feature” on page 802.
See “Creating storage device pools for Microsoft Cluster Servers” on page 794.
To restore data in this configuration, move media to the failover node’s locally
attached storage device and reinventory the device before starting a restore
operation.
Controlling Failover
node node
Shared SCSI Bus
for disks
See “Multi-node clusters on a fibre channel SAN with the Central Admin Server
feature” on page 802.
Note: If you are using a serialized tape device in a shared SCSI cluster configuration,
media that is orphaned in a device because of a failover will be ejected from the
tape device. If you are using a tape device that is not serialized, you need to
manually eject the media from the device or reboot the device.
Figure 20-2 Two-node cluster with tape devices on a shared SCSI bus
Shared SCSI
Bus for Disks
Shared SCSI
Bus for Tape
Devices
Heartbeat
LAN
See “Multi-node clusters on a fibre channel SAN with the Central Admin Server
feature” on page 802.
Note: You must use a signal converter to connect single-ended and differential
devices in order to avoid hardware damage.
You must terminate the SCSI bus at both ends so that commands and data can be
transmitted to and from all devices on the bus. Each SCSI bus must have two
terminators and they must be at each end of the segment.
Using Backup Exec in cluster environments 801
Configurations for Backup Exec and Microsoft Cluster Servers
If a tape device is in the middle of the bus, remove any internal termination in that
device.
If the tape device is at the end of the bus, and the tape device has internal
termination, you can use the device’s internal termination to terminate the bus.
Figure 20-3 Example of a shared bus with tape devices at the end of the bus
Shared SCSI
bus for disks
Shared SCSI
bus for tape devices
Heartbeat
LAN
Note: To ensure termination if a power supply failure occurs, turn off the on-board
terminators on the SCSI controller (using the host adapter manufacturer’s
recommended method) and physically terminate the controller with a terminator.
■ Y cables. These can be used with some tape devices. If the tape device is at
the end of the bus, you can attach a terminator to one branch of a Y cable to
terminate the bus. The internal terminators in the tape device must be disabled.
This is a recommended method.
■ Trilink connectors. These can be used with some tape devices. If the tape device
is at the end of the bus, you can attach a terminator to one of the trilink
Using Backup Exec in cluster environments 802
Configurations for Backup Exec and Microsoft Cluster Servers
connectors to terminate the bus. The internal terminators in the tape device
must be disabled. This is a recommended method.
Besides terminating the bus, Y-cables and trilink connectors also allow you to isolate
the devices from the shared bus without affecting the bus termination. You can
maintain or remove that device without affecting the other devices on the shared
SCSI bus.
To configure a shared SCSI bus for tape devices
1 Install the SCSI controllers for the shared SCSI bus.
Make sure that the SCSI controllers for the shared SCSI bus are using different
SCSI IDs. For example, on the controlling node, set the SCSI controller ID to
6 and on the failover node, set the SCSI controller ID to 7.
2 Prepare the SCSI controllers for the shared SCSI bus. Refer to your SCSI host
adapter manufacturer’s documentation for details.
Do not have power on to both nodes while configuring the computers, or if both
nodes have power on, do not connect the shared SCSI buses to both nodes.
3 Connect the shared SCSI tape devices to the cable, connect the cable to both
nodes, and then terminate the bus segment using one of the methods discussed
in the previous section.
See “Two-node cluster with tape devices on a shared SCSI bus” on page 799.
See “Creating storage device pools for Microsoft Cluster Servers” on page 794.
This configuration offers increased performance since backups are performed locally
instead of over a network. Additionally, centralized media catalogs are available.
Because CAS uses a shared catalog database, a tape that has already been
cataloged can be physically moved from one device to another and not have to be
recataloged.
Note: The CAS feature must be installed on each failover node, with the same
settings that were used on the primary node. Either all nodes should be database
servers or all nodes should be managed Backup Exec servers.
Figure 20-4 Two 2-node Clusters on a Fibre Channel SAN with the Central
Admin Server feature
Fibre
Channel
SAN Secondary
Secondary server
Storage
Devices
Controlling Failover
node node
Shared Shared
SCSI Bus for disks
Failover SCSI Bus for disks
node
Heartbeat Controlling
node
Heartbeat
LAN
Note: For offhost backup jobs that use the hardware provider, the Backup Exec
server and the remote computer must be in different cluster groups. The cluster
applications cannot support device logical unit numbers (LUNs) that have duplicate
signatures and partition layouts, therefore, the snapshots containing the LUNs must
be transported to a host, or remote computer, that is outside the cluster.
The Backup Exec Management Command Line Interface (BEMCLI) can be used
with Backup Exec when Backup Exec is installed in a cluster. The only limitation is
that you cannot use the BEMCLI to specify a device for backup. You can use the
BEMCLI to target a storage pool, but not a specific device in that pool.
See “Backing up data” on page 153.
See “Editing backup definitions” on page 200.
See “Adding a stage to a backup definition” on page 214.
■ Cluster Groups
■ Group name
■ Preferred nodes
■ Failover/failback policies
■ Cluster Resources
■ Resource name
■ Resource type
■ Group membership
■ Possible owners
■ Resource dependencies
■ Restart and Looks Alive/Is Alive properties
■ Resource-related parameters
■ Application-specific configuration (SQL Database Character Set)
Note: After Windows has been installed, you cannot change the system drive’s
letter. You must restore the system to the same drive letter from which it was backed
up.
Using Backup Exec in cluster environments 808
Disaster recovery of a cluster
For versions of Windows prior to Windows Server 2008, if the Quorum disk is new,
you must restore the data files to the new Quorum disk. You should disable the
cluster disk driver before restoring the data files.
See “Methods for restoring data in Backup Exec” on page 227.
Troubleshooting clusters
If you experience problems with using Backup Exec in a cluster environment, review
the questions and answers in this section.
Question Answer
I used the checkpoint You received this error because failover occurred in the middle
restart option for my of backing up the resource, therefore the backup set was not
backups. During one of closed on the media. However, the objects that were partially
my backups, a Microsoft backed up in the first backup set were completely backed up
cluster failover occurred. again during restart, ensuring data integrity. Therefore, all of the
Multiple backup sets objects on the media for the given backup set should still be
were created. When I try restored and verified.
to verify or restore using
these backup sets, an
"Unexpected End of
Data" error occurs on the
set that contains the data
that was backed up prior
to the failover. Why does
this occur? Is my data
safe?
I clustered a central This occurs when the managed Backup Exec server becomes
administration server with the active node and attempts to connect to the Backup Exec
a managed Backup Exec database on the central administration server, which is no longer
server. Now the device available. To correct this, you must use the Backup Exec Utility
and media service on the (BEUTILITY.EXE) or reinstall the managed Backup Exec server
managed Backup Exec to become a central administration server.
server fails. Why?
■ How to ensure that backups are enabled for Simplified Disaster Recovery
■ Setting or changing the alternate location for the disaster recovery information
file
After a computer's critical system components are backed up, use the Create
Simplified Disaster Recovery Disk Wizard to create a Simplified Disaster Recovery
disk image. Use the recovery disk to perform disaster recovery of the computers
that are backed up.
When you use SDR to perform a recovery, Backup Exec uses the system-level
information from the SDR backup to rebuild the server and restore it to a functional
state. Recovery includes a bare metal or dissimilar hardware restore operation.
Through integration with the Microsoft Volume Shadow Copy Service (VSS), the
SDR backups include all selected elements, even if they are components of the
active operating system or are in an open state. VSS integration ensures that the
backups are in a consistent state and have been properly placed into a quiescent
state when the backup occurs.
Simplified Disaster Recovery is available only for servers on which the Agent for
Windows is installed and that are backed up through the Agent for Windows. You
must purchase the Agent for Windows separately, and then install it on the remote
computers that you want to protect.
The Simplified Disaster Recovery feature now requires the Microsoft Assessment
and Deployment Kit (ADK) to create a Simplified Disaster Recovery disk image
(.iso).
Note: After the Backup Exec upgrade, customers must customize the existing SDR
ISOs to make the ISO compatible with the Backup Exec release to which they have
upgraded.
For information about the best practices to use Backup Exec Simplified Disaster
Recovery (SDR), refer to Backup Exec Best Practices.
See “Preparing computers for use with Simplified Disaster Recovery” on page 816.
See “How to ensure that backups are enabled for Simplified Disaster Recovery”
on page 820.
See “Requirements for using Simplified Disaster Recovery ” on page 813.
See “Creating a Simplified Disaster Recovery disk image” on page 827.
See “Recovering a computer with Simplified Disaster Recovery” on page 853.
■ Backup Exec or the Backup Exec Agent for Windows must be installed on any
computers that you want to protect with SDR.
Note: The Create Simplified Disaster Recovery Wizard is not supported on any
32-bit operating system.
■ Encryption key files must exist for all volumes that you encrypt with Windows
BitLocker Drive Encryption.
■ A third-party ISO 9660-compliant CD or DVD burning application must be
available to burn the SDR-created bootable image to a CD or DVD.
■ A writable or rewritable CD or DVD device must be available.
■ An Internet connection so that you can download the Microsoft Assessment and
Deployment Kit.
■ The option Use storage-based catalogs must be enabled. If you disable this
option, the backup sets that you create for use with SDR cannot be restored
during an SDR recovery operation. As a result, SDR cannot recover the failed
computer. To ensure that this option is enabled, click the Backup Exec button,
click Configuration and Settings > Backup Settings > Catalog.
Note: If you use deduplication disk storage devices, be aware that there are
limitations in their use with SDR.
See “Recovery notes for using Simplified Disaster Recovery with Exchange, SQL,
SharePoint, CAS, Hyper-V hosts, and the Deduplication feature” on page 863.
Additional requirements exist when you create a Simplified Disaster Recovery disk
image and when you run the Recover This Computer Wizard, as described in the
following sections.
using ADK 10. For Windows Server 2019, you must use Windows ADK 1809
to create an SDR disk. If the Backup Exec server does not run on Windows
Server 2008 SP2 or later, or if the server does not have an Internet connection,
methods are provided to let you create the Simplified Recovery Disk.
Note: The recovery disk created with Windows ADK 8.1 does not detect the
Backup Exec storage folder (\BEData) if this folder is configured on the storage
pools and storage spaces on the Backup Exec Server. This problem happens
only when the Backup Exec server installed on Windows Server 2016 operating
system is not available and you want to perform an SDR local recovery from
the BEData folder.
The recovery disk created with Windows ADK 10 and ADK 8.1 does not detect
the Backup Exec Storage folder (\BEData) if this folder is configured on the
storage pools and storage spaces on the Backup Exec Server. This problem
happens only when the Backup Exec server installed on Windows Server 2019
operating system is not available and you want to perform an SDR Local recovery
from the BEData folder.
If you create the storage pools and spaces using the recovery disk created with
Windows ADK 10, then after system restore, the Windows Server 2012 and
Windows Server 2012 R2 operating systems does not detect the storage pools
and spaces.
If you create the storage pools and spaces using the recovery disk created with
Windows ADK 1809, then after system restore, all Windows 2016 and earlier
operating systems do not detect the storage pools and spaces.
Table 21-1 Preparing computers for use with Simplified Disaster Recovery
Step 1 Specify an alternate location where Backup Exec creates the disaster recovery
copies of the disaster recovery information file after a backup job that
information files are stored. includes all critical system components
completes successfully. Backup Exec then
stores the disaster recovery information file
in the default storage location with the
backup set on a disk storage or disk
cartridge device, and in the alternate
storage locations. Catalog entries from
subsequent backups are automatically
added to the disaster recovery information
file.
Warning: If you back up a computer to a
tape device, deduplication storage, or a
virtual disk, Backup Exec cannot store a
disaster recovery information file with the
backup set. You must have a disaster
recovery information file in an alternate
location to ensure that you can use SDR to
recover the computer.
Table 21-1 Preparing computers for use with Simplified Disaster Recovery
(continued)
Step 2 Run the backup jobs that include By default, Backup Exec selects all critical
all critical system components system components when you select a
(SDR-enabled backups) for the computer for backup. When all critical
computers that you want to protect. system components are included in the
These are the backups for which backup job selections, the Simplified
the Simplified Disaster Recovery Disaster Recovery indicator on the backup
indicator is ON. selections appears as ON.
Note: For environments running If you deselect one or more critical system
the Central Admin Server feature, component files, the indicator appears as
run a database maintenance job OFF. It is recommended that you select the
before you run SDR-enabled entire computer for backup; otherwise,
backups. Otherwise, the central Backup Exec cannot create the
administration server denies system-specific disaster recovery
communication attempts from the information file.
managed Backup Exec servers.
Critical system components include the
See “Configuring database following:
maintenance and security”
■ System volume (including EFI and utility
on page 597.
partitions)
■ Boot volume (executing operating
system)
■ Services application volumes (boot,
system, and automatic startup)
■ System State devices and volumes
(including Active Directory, system files,
and so on)
Table 21-1 Preparing computers for use with Simplified Disaster Recovery
(continued)
Step 3 Create additional copies of the Backup Exec stores the important disaster
disaster recovery information files recovery information files in the default path,
and store them in a safe place. the alternate location, and with the backup
set if disk storage or disk cartridge devices
are used as the destination storage. It is
recommended that you also make additional
copies of the files and store them in a safe
place. Without the disaster recovery
information files, you cannot recover Backup
Exec servers by using Simplified Disaster
Recovery (SDR). Having multiple copies of
the disaster recovery information files
ensures that you can successfully recover
Backup Exec servers with SDR.
Step 4 Use the Create Simplified Backup Exec generates alerts after each
Disaster Recovery Disk Wizard backup job until you create the Simplified
to create a disk image, and then a Disaster Recovery disk image. You can
bootable CD or DVD recovery disk. disable these alerts, but it is recommended
that you create the Simplified Disaster
Recovery disk image.
Note: If you hover the mouse over the icon, the text indicates whether the
Simplified Disaster Recovery is on or off.
3 If the icon is not green, or if the text indicates that Simplified Disaster Recovery
is off, click the icon and then select the option Select all necessary
components for disaster recovery.
Simplified Disaster Recovery 821
How to ensure that backups are enabled for Simplified Disaster Recovery
See “Preparing computers for use with Simplified Disaster Recovery” on page 816.
Note: Backup Exec by default supports the latest three full SDR backup chains
required for system recovery using SDR. Each backup chain includes one full
backup set, its dependent incremental and differential backups, and their duplicate
backup sets.
Simplified Disaster Recovery 823
How Simplified Disaster Recovery uses disaster recovery information files
A disaster recovery information file contains the following information for the
computer that is backed up:
■ Hardware-specific information, such as hard disk partition information, mass
storage controller information, and network interface card information.
■ A list of catalog entries that identify the backup sets and storage media that are
needed to recover the computer.
■ The Windows Automated System Recovery configuration information file (asr.xml)
required during the recovery process.
Backup Exec stores the disaster recovery information file in the following locations:
■ With the backup sets if the backup storage is disk storage or a disk cartridge
device.
■ On the Backup Exec server’s hard drive in the following path:
■ In an alternate location that you specify, on a different computer than the Backup
Exec server.
If the disaster recovery information file is stored with the backup sets, then SDR
automatically uses that file to perform the recovery. If the backup sets are stored
on a tape storage device, deduplication storage, or on a virtual disk, then SDR
cannot store the file with the backup sets. Instead, you must provide the path to
the default location or the alternate location of the disaster recovery file when the
Recover This Computer wizard prompts you.
See “Setting or changing the alternate location for the disaster recovery information
file” on page 824.
See “Changing the default path for the disaster recovery information files”
on page 825.
Simplified Disaster Recovery 824
Setting or changing the alternate location for the disaster recovery information file
Changing the default path for the disaster recovery information files
You can change the default path for the disaster recovery information files. However,
it is recommended that you do not change the default path.
Copies of the disaster recovery information files are necessary to automate the
recovery of a Backup Exec server.
Backup Exec automatically creates the disaster recovery information file during a
backup and stores a copy of it in the following path:
If you change the disaster recovery data path, ensure that you copy the existing
disaster recovery information files to the new path. The copies let you recover a
computer with the previous SDR backups.
See “How Simplified Disaster Recovery uses disaster recovery information files”
on page 822.
To change the default path for the disaster recovery information files
1 Click the Backup Exec button, select Configuration and Settings, and then
select Backup Exec Settings.
2 In the left pane, select Simplified Disaster Recovery.
3 In the Path field, change the path to the location where you want to store the
disaster recovery information file, or click Browse to navigate to a location.
4 Click OK.
See “Setting or changing the alternate location for the disaster recovery information
file” on page 824.
Table 21-2 Storage locations for the disaster recovery information file
Item Description
Warning: The ADK download may take few hours depending on your network
speed.
After you run Simplified Disaster Recovery-enabled backups of the computers that
you want to protect, run the Create Simplified Disaster Recovery Disk Wizard
to create the Simplified Disaster Recovery disk image. Simplified Disaster
Recovery-enabled backups are those backups that display the green indicator on
the backup properties pane that indicates the critical system components on the
computer are selected.
See “How to ensure that backups are enabled for Simplified Disaster Recovery”
on page 820.
For Windows Server 2008 SP2 to Windows Server 2016, the wizard installs the
ADK. For Windows Server 2019, you must manually download and install the ADK.
The wizard uses the required files and folders from the ADK to create a startup
recovery disk image in ISO format. You can then burn the image to a CD or DVD
by using a third-party image burning application. For disaster recovery of a computer,
you use the Simplified Disaster Recovery disk to start the computer, and then to
recover it.
When you create the recovery disk, you can add language and time zone selections.
You can also select the computers for which you want to add network and storage
drivers. You can further customize the recovery disk by adding new OEM drivers.
Simplified Disaster Recovery 828
Creating a Simplified Disaster Recovery disk image
Note: If you create the Simplified Disaster Recovery disk image before you run
backups, the drivers for the backed-up computers are not included on the recovery
disk. You must create a new recovery disk if you want the drivers of the backed-up
computers to be included on the recovery disk. You can then specify the existing
recovery disk as the source, and then select the computers for which you want to
add the drivers to the recovery disk.
Depending on your environment, different methods are available for you to create
the Simplified Disaster Recovery disk image.
Table 21-3 Methods for creating the Simplified Disaster Recovery disk image
Environment Method
If the Backup Exec server runs on Windows See the section called “Creating a Simplified
Server 2019 Disaster Recovery disk image if the Backup
Exec server runs on Windows Server 2019”
on page 828.
If the Backup Exec server runs on Windows See the section called “Creating a Simplified
Server 2008 R2 to Windows Server 2016 Disaster Recovery disk image if the Backup
Exec server runs on Windows Server 2008
R2 to Windows Server 2016” on page 831.
If the Backup Exec server runs on Windows See the section called “Creating a Simplified
Server 2008 SP2 Disaster Recovery disk image if the Backup
Exec server runs on Windows Server 2008
SP2” on page 834.
If the Backup Exec server is not available See the section called “Creating a Simplified
Disaster Recovery disk image if the Backup
Exec server is not available” on page 838.
If the Backup Exec server on which you want See the section called “Creating a Simplified
to create the Simplified Disaster Recovery Disaster Recovery disk image on a Backup
disk image does not have an Internet Exec server that does not have an internet
connection and does not have ADK installed connection and does not have ADK or
Windows Preinstallation Environment
installed” on page 841.
It is recommended that you download and install Windows ADK 1809 before you
launch the Create Simplified Disaster Recovery Disk Wizard.
If Windows ADK 1809 is already installed, the Create Simplified Disaster Recovery
Disk Wizard detects the ADK installed and proceeds to create the recovery disk.
To create a Simplified Disaster Recovery disk image if the Backup Exec server
runs on Windows Server 2019
1 Do any of the following:
■ On the Backup and Restore tab, in the Restores group, click Create
Disaster Recovery Disk.
■ Click the Backup Exec button, click Configuration and Settings, and then
click Create Disaster Recovery Disk.
■ On the Home tab, in the Simplified Disaster Recovery panel, click Create
Disaster Recovery Disk.
■ Click the Start button, and then click Create Disaster Recovery Disk.
4 Click Next.
Simplified Disaster Recovery 830
Creating a Simplified Disaster Recovery disk image
If the Windows The Simplified Disaster Recovery Disk Creation wizard detects the
ADK 1809 is installed version of ADK and the wizard continues with the recovery
already disk creation process.
installed on the
Note: If you have created an SDR using ADK 10.0, you can customize
computer
the SDR even if you have Windows ADK 1809 installed on a Windows
Server 2019 operating system.
If the Windows The Simplified Disaster Recovery Disk Creation wizard displays the
ADK 1809 is following link to manually download and install Windows ADK 1809.
not installed on
https://docs.microsoft.com/en-us/windows-hardware/get-started/adk-install?ocid=tia-235208000
the computer
On the Windows ADK 1809 page, install the Windows ADK Insider
and Windows Preinstallation Environment components.
If the ADK 10.0 The Simplified Disaster Recovery Disk Creation wizard detects that
is installed on ADK 10.0 version is installed and the ADK update screen is displayed.
the computer
The wizard informs you that this is not the latest available version of
ADK but you can proceed with the SDR disk creation. Confirm that
you want to continue using ADK 10. If you continue, it may not support
all the features of Windows Server 2019.
After you select the check box and click Next, the wizard continues
with the recovery disk creation process.
6 Specify the startup options that you want when you recover a computer, and
then click Next.
7 Do one of the following:
To add network drivers and Select the computers for which you want to add the
storage drivers for the drivers to the recovery disk, and then click Next.
computers for which you ran
SDR backups
Simplified Disaster Recovery 831
Creating a Simplified Disaster Recovery disk image
8 Type the volume label and the path for the image (.iso) file to specify the location
to store the startup image, and then click Next.
Note: If you use any non-English characters in the volume label, then those
characters are not properly displayed when you mount the .iso image.
Note: It is recommended that you store the image that you want to burn on
the computer where the CD image or DVD image burning application is installed.
By default, the location is as follows:C:<Backup Exec install path>\Backup
Exec\sdr\CustomSDRImage.iso
guides you through the download and installation of the ADK. The ADK installation
defaults are already selected. It is recommended that you use these defaults.
Note: Backup Exec supports only ADK 10 on Windows Server 2008 R2 to Windows
Server 2016. If Windows ADK is not installed on the system, the Create Simplified
Disaster Recovery wizard downloads and installs Windows ADK 10.
To create a Simplified Disaster Recovery disk image if the Backup Exec server
runs on Windows Server 2008 R2 or later
1 Do any of the following:
■ On the Backup and Restore tab, in the Restores group, click Create
Disaster Recovery Disk.
■ Click the Backup Exec button, click Configuration and Settings, and then
click Create Disaster Recovery Disk.
■ On the Home tab, in the Simplified Disaster Recovery panel, click Create
Disaster Recovery Disk.
■ Click the Start button, and then click Create Disaster Recovery Disk.
To select network and storage drivers from Do the following in the order listed:
an existing Simplified Disaster Recovery
■ Click From a previous CD or DVD, or
disk CD or DVD, or from a folder
from a folder.
■ Enter the location of the previous
recovery disk, or type the path to a
folder that contains the files that are
extracted from the recovery disk.
To select network and storage drivers from Do the following in the order listed:
an existing image (.iso) file
■ Click From an image (.iso) file.
■ Enter the location of the recovery image
file.
4 Click Next.
5 Do one of the following:
Simplified Disaster Recovery 833
Creating a Simplified Disaster Recovery disk image
If the ADK is already installed on the If an ADK version other than ADK 10 is
computer installed on the operating system, the
Create Simplified Disaster Recovery wizard
detects the Windows ADK version and
informs the user that a new SDR disk
cannot be created using the installed ADK
version.
If the ADK is not installed on the computer If Windows ADK is not installed on the
system, the Create Simplified Disaster
Recovery wizard downloads and installs
Windows ADK 10.
6 Specify the startup options that you want when you recover a computer, and
then click Next.
7 Do one of the following:
To add network drivers and storage drivers Select the computers for which you want
for the computers for which you ran SDR to add the drivers to the recovery disk, and
backups then click Next.
Simplified Disaster Recovery 834
Creating a Simplified Disaster Recovery disk image
To add network drivers and storage drivers Do the following in the order listed:
that were found on the computers for which
■ On the Select computers to use the
you ran SDR backups that are not already
drivers from panel, click Next.
included in the source image
■ On the Drivers to Include panel, select
the drivers that you want to include in
the custom recovery disk, and then
click Next.
To add network drivers and storage drivers Do the following in the order listed:
from OEM media
■ On the Select computers to use the
drivers from panel, click Next.
■ On the Drivers to Include panel, click
Add Driver, navigate to the location of
the media, select it, and then click
Open.
■ When the drivers display on the Select
computers to use the drivers from
panel, click Next.
8 Type the volume label and the path for the image (.iso) file to specify the location
to store the startup image, and then click Next.
Note: If you use any non-English characters in the volume label, then those
characters are not properly displayed when you mount the .iso image.
Note: It is recommended that you store the image that you want to burn on
the computer where the CD image or DVD image burning application is installed.
By default, the location is as follows:C:<Backup Exec install path>\Backup
Exec\sdr\CustomSDRImage.iso
guides you through the download and installation of the ADK. The ADK installation
defaults are already selected. It is recommended that you use these defaults.
Note: Backup Exec supports Windows ADK 8.1 on Windows 2008 SP2. If Windows
ADK is not installed on a Windows 2008 SP2 system, the Create Simplified
Disaster Recovery wizard downloads and installs Windows ADK 8.1.
To create a Simplified Disaster Recovery disk image if the Backup Exec server
runs on Windows Server 2008 SP2
1 Do any of the following:
■ On the Backup and Restore tab, in the Restores group, click Create
Disaster Recovery Disk.
■ Click the Backup Exec button, click Configuration and Settings, and then
click Create Disaster Recovery Disk.
■ On the Home tab, in the Simplified Disaster Recovery panel, click Create
Disaster Recovery Disk.
■ Click the Start button, and then click Create Disaster Recovery Disk.
To select network and storage drivers from Do the following in the order listed:
an existing Simplified Disaster Recovery
■ Click From a previous CD or DVD, or
disk CD or DVD, or from a folder
from a folder.
■ Enter the location of the previous
recovery disk, or type the path to a
folder that contains the files that are
extracted from the recovery disk.
To select network and storage drivers from Do the following in the order listed:
an existing image (.iso) file
■ Click From an image (.iso) file.
■ Enter the location of the recovery image
file.
4 Click Next.
5 Do one of the following:
Simplified Disaster Recovery 836
Creating a Simplified Disaster Recovery disk image
If the ADK is already installed on the If Windows ADK 8.0 is already installed,
computer the recovery disk wizard warns the user
that user cannot create a new SDR using
this ADK version; however, user can
customize the recovery disk. User can
either exit from the wizard or user can
download ADK 8.1, and customize the disk.
If the ADK is not installed on the computer If Windows ADK is not installed on the
system, the Create Simplified Disaster
Recovery wizard downloads and installs
Windows ADK 8.1.
Do the following in the order listed:
6 Specify the startup options that you want when you recover a computer, and
then click Next.
7 Do one of the following:
To add network drivers and storage drivers Select the computers for which you want
for the computers for which you ran SDR to add the drivers to the recovery disk, and
backups then click Next.
Simplified Disaster Recovery 837
Creating a Simplified Disaster Recovery disk image
To add network drivers and storage drivers Do the following in the order listed:
that were found on the computers for which
■ On the Select computers to use the
you ran SDR backups that are not already
drivers from panel, click Next.
included in the source image
■ On the Drivers to Include panel, select
the drivers that you want to include in
the custom recovery disk, and then
click Next.
To add network drivers and storage drivers Do the following in the order listed:
from OEM media
■ On the Select computers to use the
drivers from panel, click Next.
■ On the Drivers to Include panel, click
Add Driver, navigate to the location of
the media, select it, and then click
Open.
■ When the drivers display on the Select
computers to use the drivers from
panel, click Next.
8 Type the volume label and the path for the image (.iso) file to specify the location
to store the startup image, and then click Next.
Note: If you use any non-English characters in the volume label, then those
characters are not properly displayed when you mount the .iso image.
Note: It is recommended that you store the image that you want to burn on
the computer where the CD image or DVD image burning application is installed.
By default, the location is as follows:
C:<Backup Exec install path>\Backup Exec\sdr\CustomSDRImage.iso
Note: The Simplified Disaster Recovery Disk Creation Wizard and the
Backup Exec Remote Administration Console are installed.
4 Accept the terms of the license agreement, and then click Next.
5 Accept the default installation location, or specify a new location, and then click
Next.
6 By default, after the computer is restarted, the Create Simplified Disaster
Recovery Disk Wizard starts; if you unchecked the default, to start the wizard,
click Start > All Programs > Veritas Backup Exec >Create Disaster
Recovery Disk.
7 On the Welcome panel of the Simplified Disaster Recovery Disk Creation
wizard, click Connect to a Backup Exec server.
8 Specify a Backup Exec server machine name or IP address, enter your
credentials and the domain, and then click Next.
9 Do one of the following:
Simplified Disaster Recovery 839
Creating a Simplified Disaster Recovery disk image
To select network and storage drivers from Do the following in the order listed:
an existing Simplified Disaster Recovery
■ Click From a previous CD or DVD, or
disk CD or DVD, or from a folder
from a folder.
■ Enter the location of the previous
recovery disk, or type the path to a
folder that contains the files that are
extracted from the recovery disk.
To select network and storage drivers from Do the following in the order listed:
an existing image (.iso) file
■ Click From an image (.iso) file.
■ Enter the location of the recovery image
file.
10 Click Next.
11 Do one of the following:
If the ADK is not installed on this computer Do the following in the order listed:
12 Specify the startup options that you want when you recover a computer, and
then click Next.
13 Do one of the following:.
To add network drivers and storage drivers Select the computers for which you want
from the computers for which you ran SDR to add the drivers to the recovery disk, and
backups then click Next
Simplified Disaster Recovery 840
Creating a Simplified Disaster Recovery disk image
To add network drivers and storage drivers Do the following in the order listed:
that were found on the computers for which
■ On the Select computers to use the
you ran SDR backups that are not already
drivers from panel, click Next.
included in the source image
■ On the Drivers to Include panel, select
the drivers that you want to include on
the custom recovery disk, and then
click Next.
To add network drivers and storage drivers Do the following in the order listed:
from OEM media
■ On the Select computers to use the
drivers from panel, click Next.
■ On the Drivers to Include panel, click
Add Driver, navigate to the location of
the media, select it, and then click
Open.
■ When the drivers display on the Select
computers to use the drivers from
panel, click Next.
14 Type the volume label and the path for the image (.iso) file to specify the location
to store the startup image, and then click Next.
Note: It is recommended that you store the image that you want to burn in a
location on the computer where the CD image or DVD image burning application
is installed. By default, the location is as follows:
C:<Backup Exec install path>\Backup Exec\sdr\CustomSDRImage.iso
11 On the ADK Specify Location panel, click Install the Assessment and
Deployment Kit Windows Preinstallation Environment Add-ons to this
computer, enter the path to which you want to install the preinstallation
environment, and then click Next.
12 Click Accept to accept the terms of the license agreement.
13 On the preinstallation environment Select the features you want to install
panel, select Windows Preinstallation Environment (Windows PE), and
then click Install.
14 After the installation is complete, on the Backup Exec server to which you
installed the ADK and preinstallation environment, do any of the following:
■ On the Backup and Restore tab, in the Restores group, click Create
Disaster Recovery Disk.
■ Click the Backup Exec button, click Configuration and Settings, and then
click Create Disaster Recovery Disk.
■ On the Home tab, in the Simplified Disaster Recovery panel, click Create
Disaster Recovery Disk.
■ Click the Start button, and then click Create Disaster Recovery Disk.
17 Click Next.
18 Specify the startup options that you want when you recover a computer, and
then click Next.
Simplified Disaster Recovery 843
Creating a Simplified Disaster Recovery disk image
To add network drivers and Select the computers for which you want to add
storage drivers for the computers the drivers to the recovery disk, and then click
for which you ran SDR backups Next.
20 Type the volume label and the path for the image (.iso) file to specify the location
to store the startup image, and then click Next.
Note: It is recommended that you store the image that you want to burn on
the computer where the CD image or DVD image burning application is installed.
By default, the location is as follows: C:<Backup Exec install path>\Backup
Exec\sdr\CustomSDRImage.iso.
Note: ADK installation is supported only on Windows Server 2008 SP2 and
later.
■ On the Backup and Restore tab, in the Restores group, click Create
Disaster Recovery Disk.
■ Click the Backup Exec button, click Configuration and Settings, and then
click Create Disaster Recovery Disk.
■ On the Home tab, in the Simplified Disaster Recovery panel, click Create
Disaster Recovery Disk.
■ Click the Start button, and then click Create Disaster Recovery Disk.
To select network and storage drivers from Do the following in the order listed:
an existing Simplified Disaster Recovery
■ Click From a previous CD or DVD, or
disk CD or DVD, or from a folder
from a folder.
■ Enter the location of the previous
recovery disk, or type the path to a
folder that contains the files that are
extracted from the recovery disk.
To select network and storage drivers from Do the following in the order listed:
an existing image (.iso) file
■ Click From an image (.iso) file.
■ Enter the location of the recovery image
file.
15 Click Next.
16 Specify the startup options that you want when you recover a computer, and
then click Next.
17 Do one of the following:
To add network drivers and storage drivers Select the computers for which you want
for the computers for which you ran SDR to add the drivers to the recovery disk, and
backups then click Next.
Simplified Disaster Recovery 846
Creating a Simplified Disaster Recovery disk image
To add network drivers and storage drivers Do the following in the order listed:
that were found on the computers for which
■ On the Select computers to use the
you ran SDR backups that are not already
drivers from panel, click Next.
included in the source image
■ On the Drivers to Include panel, select
the drivers that you want to include in
the custom recovery disk, and then
click Next.
To add network drivers and storage drivers Do the following in the order listed:
from OEM media
■ On the Select computers to use the
drivers from panel, click Next.
■ On the Drivers to Include panel, click
Add Driver, navigate to the location of
the media, select it, and then click
Open.
■ When the drivers display on the panel,
click Next.
18 Type the volume label and the path for the image (.iso) file to specify the location
to store the startup image, and then click Next.
Note: It is recommended that you store the image that you want to burn on
the computer where the CD image or DVD image burning application is installed.
By default, the location is as follows: C:<Backup Exec install path>\Backup
Exec\sdr\CustomSDRImage.iso
User scenarios when a user starts the Create Recovery Disk Wizard
When a user starts the Create Simplified Disaster Recovery Disk Wizard, the
wizard first internally checks whether Windows ADK is already installed on the
system. Refer the table for a high-level sequence of events.
Table 21-4 User scenarios when a user starts the Create Recovery Disk
Wizard
Windows Server If Windows ADK is not installed, the If Windows ADK is installed, the
2008 SP2 Simplified Disaster Recovery Disk Simplified Disaster Recovery Disk
Creation wizard downloads Windows Creation wizard verifies if the
ADK 8.1 from the Microsoft Web site. Windows ADK version is 8.1. If
After Windows ADK 8.1 download ADK 8.1 is installed, the wizard
and install, the wizard starts creating informs the user that this is not the
the SDR disk. latest ADK version but the user
can proceed with the SDR disk
creation.
Table 21-4 User scenarios when a user starts the Create Recovery Disk
Wizard (continued)
Windows Server If Windows ADK is not installed, the If Windows ADK is installed, the
2008 R2 Simplified Disaster Recovery Disk Simplified Disaster Recovery Disk
Creation wizard downloads Windows Creation wizard verifies if the
ADK 10 from the Microsoft Web site. Windows ADK version is 10. If
After Windows ADK 10 download and ADK 10 is installed, the wizard
install, the wizard starts creating the informs the user that this is not the
SDR disk. latest ADK version but the user
can proceed with SDR disk
creation.
Table 21-4 User scenarios when a user starts the Create Recovery Disk
Wizard (continued)
Windows Server If Windows ADK 1809 is not installed, If Windows ADK 1809 is installed,
2019 the user must download and install the Simplified Disaster Recovery
Windows ADK 1809 manually. Disk Creation wizard detects the
installed version of ADK and the
When you install ADK 1809, the user
wizard continues with the recovery
must install the Windows ADK
disk creation process.
Insider and Windows
Preinstallation Environment If Windows ADK 10 is installed,
components. the Simplified Disaster Recovery
Disk Creation wizard detects that
After the components are installed,
ADK 10.0 version is installed and
launch the Simplified Disaster
the ADK update screen is
Recovery Disk Creation wizard again.
displayed. The wizard informs the
user that this is not the latest
available version of ADK but the
user can proceed with the SDR
disk creation. Confirm that the
user wants to continue using ADK
10. If the user continues, it may
not support all the features of
Windows Server 2019.
Step Description
Step Description
When you complete these steps, you can start the recovery process.
See “Recovering a computer with Simplified Disaster Recovery” on page 853.
Item Description
Step Description
Note: If the computer that you want to recover was backed up to a tape device,
to a deduplication storage, or to a virtual disk, then SDR was unable to store
the disaster recovery information file with the backup sets. You must provide
the path to the default location or to the alternate location for the disaster recovery
information file when the Recover This Computer Wizard prompts you. If you
cannot provide a disaster recovery information file, then you must perform a
manual disaster recovery. Refer to the following sections for more information
about how to perform manual disaster recovery:
See “Performing manual disaster recovery of a local Backup Exec server on a
Windows computer” on page 868.
See “Performing manual disaster recovery of a remote Backup Exec server or
remote agent on a Windows computer” on page 873.
Note: If you are restoring data on the same computer and if you do not select
the Erase hard disks and recreate the volume layout shown above option,
the recovery process does not restore the WindowsApps folders on operating
systems that run Windows 8 or later. However, the restore job is successful.
Microsoft recommends to restore the WindowsApps folders using Device Reset
on the Settings panel.
The WindowsApps folders that are ignored during restore could be the following:
The folder pointed by
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Appx\PackageRoot
%SystemRoot%\InfusedApps
You can perform a remote recovery if all of the following conditions are met:
■ You want to restore a Backup Exec server or a Windows computer.
■ The backup data for the computer is located on the devices that are attached
to a remote Backup Exec server
■ You have network access to the remote Backup Exec server.
Before you start, review the steps for preparing to recover.
See “Preparing to recover from a disaster by using Simplified Disaster Recovery”
on page 850.
During recovery operations, you can recover the computer from the most recent
backup. Or, you can recover to a previous point-in-time backup.
Simplified Disaster Recovery 855
Recovering a computer with Simplified Disaster Recovery
The Recover This Computer Wizard supports the recovery of computers with
encrypted backup sets. If the Simplified Disaster Recovery (SDR) backups are
encrypted during backup, the wizard prompts you for the pass phrase of each
encrypted backup set that is required to complete the recovery.
See “Encryption key management” on page 627.
To restore data by using the Recover This Computer Wizard, the following items
are required:
■ The Simplified Disaster Recovery disk image, which must be the same version
of Backup Exec as the Backup Exec server.
■ If the computer that you want to recover was backed up to a tape device,
deduplication storage, or to a virtual disk, then the disaster recovery information
file is not stored with the backup sets. Instead, you must provide the path to the
default location or to the alternate location when the Recover This Computer
Wizard prompts you. The default location is: C:<Backup Exec install
path>\Backup Exec\sdr\Data. If the file is unavailable, you cannot recover the
computer with SDR.
■ The backup set that contains all of the critical system components for the
computer that you want to restore.
■ The boot drive on the computer that you want to recover must have from 3 GB
to 5 GB of free space, depending on the operating system and configuration.
Note: If a blank screen appears and the computer does not restart after you run
SDR, ensure that the boot drive has the necessary amount of free space. Then,
restart the computer again.
■ The computer that you want to recover must have an amount of RAM that is
equal to or greater than the minimum that the restored operating system requires.
■ The computer that you want to recover must have disks with enough free space
to contain the data that you restore from the backup of critical volumes. A volume
is considered critical if it is required for the computer to start successfully.
■ If you recover a Windows computer that has BitLocker encryption enabled, you
must turn on BitLocker encryption after the restore. See your Microsoft
documentation for more information on BitLocker drive encryption.
■ If the computer that you want to recover contains a RAID setup, you may be
required to configure the RAID before you start it with the SDR disk. Use the
computer manufacturer's RAID software to configure the RAID system.
■ If appropriate, review the following recovery notes:
Simplified Disaster Recovery 856
Recovering a computer with Simplified Disaster Recovery
■ See “Recovery notes for using Simplified Disaster Recovery with storage
pools and storage spaces” on page 859.
■ See “Recovery notes for using Simplified Disaster Recovery with Exchange,
SQL, SharePoint, CAS, Hyper-V hosts, and the Deduplication feature”
on page 863.
Note: Boot managers, such as System Commander or the OS/2 Boot Manager,
cannot be restored with SDR. Boot managers are usually installed at a very low
level that Backup Exec cannot protect. For example, the OS/2 Boot Manager resides
in its own hard drive volume that Backup Exec cannot access. Because of the many
different boot managers available, you may not be able to restart the computer after
an SDR recovery, even though the operating system was restored. You can reinstall
the boot manager to resolve this issue.
If the backup data for this computer is Do the following in the order listed:
located on the devices that are attached
■ Click The data is located on devices
to a remote Backup Exec server (remote
attached to a remote Backup Exec
recovery)
server.
■ Enter the name and domain of the
remote Backup Exec server where the
backup data is located, and the
appropriate administrator or
administrator-equivalent credentials.
■ (Optional) To configure network adapter
settings, click Configure network
adapter settings, and then do one of
the following:
■ To assign a static IP address for
each detected network adapter,
select the appropriate options, and
then click OK.
■ To configure an IPv6 network
controller, click Configure IPv6,
select the appropriate options, and
then click OK.
■ (Optional) To load network adapter
drivers, click Load network adapter
drivers. Then, click Install Driver for
any inactive network controller that the
wizard detects. Navigate to the device
that contains the network controller
driver, and then click Open. Select the
driver, and then click Open again.
■ Click Next.
If the computer that you want to recover Do the following in the order listed:
was backed up to locally attached devices
■ Click The data is located on devices
such as tape drives, robotic libraries, disk
locally attached to this computer.
storage devices, or disk cartridge devices
■ Enter the appropriate administrator or
(local recovery)
administrator-equivalent credentials
when prompted, and then click Next.
Simplified Disaster Recovery 858
Recovering a computer with Simplified Disaster Recovery
7 Select the disaster recovery information file that you want to use, and then
click Next.
Note: Backup Exec by default supports the latest three full SDR backup chains
that are required for system recovery using SDR. Each backup chain includes
one full backup set, its dependent incremental and differential backups, and
their duplicate backup sets.
8 Select the backup sets that you want to use to recover the computer, and then
click Next.
9 Select the storage device that contains the backup data for the computer, and
then click Next.
10 Do any of the following:
To install required SCSI or RAID controller Do the following in the order listed:
drivers
■ Click Load Storage controller drivers.
■ Click Install Driver for any inactive
network controller that the wizard
detects.
■ Navigate to the device that contains the
network controller driver, and then click
Open.
■ Select the driver, and then click Open
again.
To automatically create a volume layout Select Erase hard disks and recreate the
on the available hard disks if mismatched volume layout shown above. Existing
volumes appear in the simplified volume data on these disks will be lost.
layout view
11 Review the Recovery Summary and click Back to make any changes, or click
Recovery to start the recovery process.
Simplified Disaster Recovery 859
Recovering a computer with Simplified Disaster Recovery
12 If you recover a Backup Exec server that runs Backup Exec 15 or later, select
the appropriate database encryption key and then click Next.
Note: Backup Exec 15 and later requires a database encryption key to access
the Backup Exec Database. If you proceed without entering the database
encryption key on this screen, you are prompted to enter the key when you
restart Backup Exec.
To troubleshoot any issues that occurred Click View Hardware Discovery log.
during the hardware discovery phase
To troubleshoot any issues that occurred Click View Recover This Computer log.
during the recovery process
To restart this computer after you click Select Restart this computer.
Finish
Note: If the recovered computer contains multiple hard disks, ensure that the
computer's BIOS is configured to start the computer from the hard disk that
contains the Windows operating system. On many computers, the BIOS menu
can be accessed by pressing F2 or DEL on the computer keyboard.
Table 21-8 Scenarios for SDR for storage pools and storage spaces
Scenario Description
Table 21-8 Scenarios for SDR for storage pools and storage spaces
(continued)
Scenario Description
Table 21-8 Scenarios for SDR for storage pools and storage spaces
(continued)
Scenario Description
http://technet.microsoft.com/library/hh848705.aspx
Restore a version of Windows that is before In this scenario, you restore to a computer
Windows 8/Windows Server 2012 to a that contains configured storage pools and
computer on which storage pools and storage storage spaces. However, the operating
spaces or virtual disks are already configured. system that you restore does not recognize
storage pools and storage spaces.
The Recover This Computer Wizard
prompts you to do either of the following:
The pre-disaster computer hardware contains a 40 GB hard drive with two 20-GB
volumes. You replace it with a 90-GB model. SDR then uses the disaster recovery
information file to rebuild the hard disk partition table by using the partition
information that is found on the original 40-GB hard drive. As a result, only 40 GB
of space is allocated on the new 90 GB hard drive, with a partition map that consists
of two 20-GB partitions.
You can access Advanced Disk Configuration from within the Recover This
Computer Wizard.
Note: You should be familiar with Microsoft Disk Management concepts before you
run Advanced Disk Configuration.
The following table provides details about the additional disk-related operations
that you can do with Advanced Disk Configuration.
Task Description
Shrink the size of a volume You can decrease the size of a volume by
shrinking the volume into the contiguous,
unallocated disk space that is on the same
disk.
Task Description
View volume properties You can view properties for each volume in
the Current Disk Layout view or in the Original
Disk Layout view.
Change an assigned drive letter You can change assigned drive letters for all
volumes if you want to organize your drive
letters in a certain way.
Convert a basic disk to a dynamic disk Converting basic disks to dynamic disks lets
you create the volumes that span multiple
disks. Dynamic disks also let you create
fault-tolerant volumes, such as mirrored
volumes and RAID-5 volumes. All volumes
on dynamic disks are referred to as dynamic
volumes.
Simplified Disaster Recovery 867
Performing manual disaster recovery
Task Description
Convert a Master Boot Record (MBR) disk MBR disks use the standard BIOS interface.
to a Guid Partition Table (GPT) disk GPT disks use extensible firmware interface
(EFI).
Convert a Guid Partition Table (GPT) disk GPT disks use extensible firmware interface
to a Master Boot Record (MBR) disk (EFI). Master boot record (MBR) disks use
the standard BIOS interface.
View the original disk layout geometry The original disk layout shows the actual hard
disk layout that existed during the backup job.
Within the simplified layout view, you can
accept the disk geometry as it originally
existed before the disaster, or you can alter
the geometry by changing the volume sizes.
Depending on the size of the existing disks,
you can alter volume sizes in megabytes,
gigabytes, or terabytes.
■ A storage device such as a tape drive, disk storage device, or a robotic library
must be attached to the computer that you want to recover.
■ If you want to perform an authoritative restore on a domain controller, you must
provide DSRM credentials.
Note: If you recover a Windows computer that has BitLocker encryption enabled,
you must enable BitLocker encryption again after the restore. See Microsoft's
documentation for more information on BitLocker drive encryption.
Always log on to Windows using the Administrator account or its equivalent during
this procedure.
2. Install Backup Exec to a directory other than where it was originally installed
(a temporary installation). Always log on to Windows using the Administrator
account or its equivalent during this procedure.
3. Start Backup Exec, and then add the required Storage device by selecting the
Storage tab and then Configure Storage.
This storage device is the tape where your backup set resides or the disk path
where your disk storage device backup files are located.
Note: If you use a disk storage device to recover the local Backup Exec server,
do not include the original disk storage device. If you cannot avoid restoring it,
you need to ensure that the disk storage device being used for the recovery
does not conflict with the original disk storage device location.
4. On the Storage tab, click Inventory and Catalog to both inventory and catalog
the media that contains the latest full, incremental, and differential backups of
the computer that you want to recover.
5. Select the Backup and Restore tab, and then click Restore.
6. Do one of the following:
■ If the restore method Complete online restore of a computer, or restore
system component is available, do the following in the order listed:
■ Click Complete online restore of a computer, or restore system
component, and then click Next.
■ Click A Microsoft Windows computer that was fully selected for
backup, and then click Next.
■ Select the backup sets that you want to restore, and then click Next.
■ Make sure that you deselect the location for restore where your disk
storage device backup files were located, or else the restore operation
will overwrite them. Applications and data drives can be restored later
once the server recovery is completed.
Simplified Disaster Recovery 871
Performing manual disaster recovery
■ Ensure that the option, Restore over existing files is selected, and
then accept the default selections on the How do you want to maintain
file integrity, hierarchy, and security for restore data panel.
■ Click Next.
■ On the How do you want to restore operating system features panel,
click Next.
■ For an authoritative restore of a domain controller, select the Mark this
server as the primary arbitrator for replication when restoring
SYSVOL in the System State option on the How do you want to
restore System State data? panel.
■ On the What additional tasks do you want to perform before and/or
after a restore panel, select any additional tasks that you want to run
before or after a restore, and then click Next.
■ Schedule the job to run, and then click Next.
■ On the Restore summary panel, click Finish.
■ Do not restart the computer after the restore job finishes.
Note: Make sure that the system is started into Directory Services Restore
Mode for the first restart after the restore. Failing to do so may replicate the
Active Directory once the Active Directory services are online. To prevent this
replication, you can isolate the system from the network temporarily.
■ Press F8 during startup. A menu appears that lets you diagnose and fix
system startup problems.
■ Select Directory Services Restore Mode.
■ Log on using your DSRM credentials.
■ Open a command prompt.
■ Type NTDSUTIL, and then press Enter. For more information about running
NTDSUTIL for Windows Server, see Microsoft's documentation.
■ Type Activate Instance NTDS, and then press Enter.
■ Type Authoritative Restore, and then press Enter.
■ Type the following command, and then press Enter:
restore subtree ou=OU_Name,dc=Domain_Name,dc=xxx
In this command, <ou_name> is the name of the organizational unit that you
want to restore, <domain_name> is the domain name that the OU resides
in, and <xxx> is the top-level domain name of the domain controller, such
as com, org, or net.
■ Repeat these steps as many times as necessary for the specific objects
that you need to restore.
■ After you have finished restoring Active Directory information, exit
NTDSUITIL.
■ Restart the computer.
Note: If you have copied disk storage device files to some other location
to restore them, they can be removed.
9. When you launch Backup Exec, the program prompts you for the database
encryption key file. Complete the following steps to import the database
encryption key file:
■ Locate the database encryption key from the secure location to which you
backed it up. Backup Exec indicates the name of the key that needs to be
restored.
Simplified Disaster Recovery 873
Performing manual disaster recovery
■ Copy the file and then paste it in the Data folder in the directory in which
you installed Backup Exec.
■ Log on to Backup Exec.
Note: If you recover a Windows computer that has BitLocker encryption enabled,
you must enable BitLocker encryption again following the restore. See Microsoft's
documentation for more information on BitLocker drive encryption.
Always log on to Window using the Administrator account or its equivalent during
this procedure.
Simplified Disaster Recovery 874
Performing manual disaster recovery
To run a manual disaster recovery of a remote Backup Exec server or remote agent
on a Windows computer
1. At the remote computer, install the original version of Windows. The same
Service Pack and patches need to be applied after Windows is installed. Note
the following scenarios:
■ If you recover from an entire hard disk failure, use Windows setup to partition
and format the new disk during installation. This Windows installation is
necessary to provide Backup Exec with a target to which it can restore the
system. The computer name, Windows directory, and the file system (such
as NTFS) must be the same as the previous Windows installation. This
basic installation is overwritten by the backed-up version, which restores
your system configuration, application settings, and security settings.
■ If the system was a domain controller, in a specific domain or workgroup,
do not join the domain or workgroup. Use the More... option on the
Computer Name Change dialog box to manually add a domain suffix to
the computer name that matches the system's original domain or workgroup
suffix.
Change the new system name to match the original system name by
performing the following steps in the order listed:
■ From System Properties, on the Computer Name tab, click Change.
2. At the Backup Exec server, install the Backup Exec Agent for Windows on the
remote computer.
Note: After recovery, the Backup Exec logon account needs to be updated
and the Backup Exec trust needs to be reestablished for the recovered remote
server.
3. On the Backup and Restore tab, select the computer name, and then click
Restore.
Simplified Disaster Recovery 875
Performing manual disaster recovery
Note: Make sure that the system is started into Directory Services Restore
Mode for the first restart after the restore. Failing to do so may replicate the
Active Directory once the Active Directory services are online. To prevent this
replication, you can isolate the system from the network temporarily.
■ Press F8 during startup. A menu appears that lets you diagnose and fix
system startup problems.
■ Select Directory Services Restore Mode.
■ Log on using your DSRM credentials.
■ Open a command prompt.
■ Type NTDSUTIL, and then press Enter. For more information about running
NTDSUTIL for Windows Server, see Microsoft's documentation.
■ Type Activate Instance NTDS, and then press Enter.
■ Type Authoritative Restore, and then press Enter.
■ Type the following command, and then press Enter:
restore subtree ou=OU_Name,dc=Domain_Name,dc=xxx
In this command, <ou_name> is the name of the organizational unit that you
want to restore, <domain_name> is the domain name that the OU resides
in, and <xxx> is the top-level domain name of the domain controller, such
as com, org, or net.
■ Repeat these steps as many times as necessary for the specific objects
that you need to restore.
■ After you have finished restoring Active Directory information, exit
NTDSUITIL.
■ Restart the computer.
7. When you launch Backup Exec, the program prompts you for the database
encryption key file.
Complete the following steps to import the database encryption key file:
■ Locate the database encryption key from the secure location to which you
backed it up. Backup Exec indicates the name of the key that needs to be
restored.
Simplified Disaster Recovery 877
Performing manual disaster recovery
■ Copy the file and then paste it in the Data folder in the directory in which
you installed Backup Exec.
■ For servers that are protected using CIFS backups (no remote agent is
installed on the server); for example, NAS box, ensure that the server is
added in Backup Exec using its FQDN name.
■ For servers that have the remote agent installed, Backup Exec can determine
its FQDN name irrespective of how the server is added in Backup Exec.
■ For CAS-MMS deployment, if the CAS server is registered with the Information
Map Agent, the encryption key for backup sets of MMS must to be available on
the CAS server to send metadata about such backup sets.
■ For information about operating system requirements when you install Information
Map, refer to the Information Map documentation.
http://veritashelpsupport.com/Welcome?locale=EN_US&context=INFOMAP1.0
■ For CAS-MMS deployment, you must register with the Information Map Agent
from the CAS server. Backup Exec sends item-level metadata from all servers
in the CAS-MMS deployment. There is no requirement to register with the
Information Map Agent from the MMS servers.
■ In CAS-MMS environment configured in distributed catalog mode, when the
backup set is on MMS and such backup set is being scanned from CAS then a
temporary file gets created on CAS server having scan task information.
Ensure that there is sufficient space on C: of CAS server. The required size is
dependent on number of items in the backup set. For example, for 6 million
items in backup set it needs ~100GB free space on CAS server’s C:
information about Information Map discovery or scan tasks, you can refer to
the Information Map alerts in the console. The alerts also give information
about how many servers were discovered and which backup sets were scanned
by Backup Exec.
For more information, refer to the Information Map documentation.
http://veritashelpsupport.com/Welcome?locale=EN_US&context=INFOMAP1.0
■ Ensure that the time duration that is selected in the Catalog panel is more than
the duration that you set for sending item-level metadata created within the
specified number of days to Information Map. To change the catalog setting, go
to Configuration and Settings > Backup Exec Settings > Catalog > Truncate
catalogs after.
For example, if 60 days is selected in the Truncate catalogs after option, in
the Send metadata about items in the backup sets created within the
specified number of days option, you need to select duration of less than 60
days.
■ It is recommended that you configure the scan schedule in the Veritas Connection
Center to be outside your backup window.
■ If you have a large number of servers for which you want to send item-level
metadata to Information Map, it is recommended that you not enable all servers
at the same time, and instead enable them in phases. Enable the servers after
taking a full backup. For example, if you have 10 servers, you can enable 3
servers first, then enable 3 more, and so on.
■ If Backup Exec is installed on a Windows 2008 server, you may see the following
error during registration with the Information Map Agent server:
Could not create SSL/TLS secure channel.
To resolve this error, enable TLS 1.2. Perform the steps given in the following
article.
https://support.microsoft.com/kb/4019276
■ Backup Exec is unable to communicate with Information Map Agent’s connector
service.
If a log, similar to the one given in the following example, is seen in the
Management service logs, it is because Backup Exec is unable to communicate
with Information Map Agents connector service. Ensure that the service is up
and running.
Error while sending HeartBeat:
MANAGEMENT: [10/26/17 23:07:02] [0029] 10/26
23:07:01.882[InfoMapConne] Sending HeartBeat to InfoMap agent on
10.217.193.169
MANAGEMENT: [10/26/17 23:07:02] [0029] 10/26
23:07:01.978[InfoMapConne] ERROR:Using password to authenticate
during first request
MANAGEMENT: [10/26/17 23:07:03] [0029] 10/26
23:07:03.109[InfoMapConne] ERROR:Exception during sending request.
MANAGEMENT: [10/26/17 23:07:03] [0029] 10/26
23:07:03.109[InfoMapConne] ERROR: Exception Message: Unable to
connect to the remote server
MANAGEMENT: [10/26/17 23:07:03] [0029] 10/26
23:07:03.109[InfoMapConne] ERROR: Exception Status: ConnectFailure
MANAGEMENT: [10/26/17 23:07:03] [0029] 10/26
23:07:03.109[InfoMapConne] ERROR:Retrying after 20000 ms.
MANAGEMENT: [10/26/17 23:07:23] [0029] 10/26
23:07:23.122[InfoMapConne] ERROR:Using password to authenticate
during retry
MANAGEMENT: [10/26/17 23:07:24] [0029] 10/26
23:07:24.134[InfoMapConne] ERROR:Exception during sending request.
MANAGEMENT: [10/26/17 23:07:24] [0029] 10/26
23:07:24.134[InfoMapConne] ERROR: Exception Message: Unable to
connect to the remote server
MANAGEMENT: [10/26/17 23:07:24] [0029] 10/26
23:07:24.134[InfoMapConne] ERROR: Exception Status: ConnectFailure
MANAGEMENT: [10/26/17 23:07:24] [0029] 10/26
23:07:24.134[InfoMapConne] ERROR:Retrying after 20000 ms.
Integration with Veritas™ Information Map 886
Troubleshooting tips for integration with Veritas™ Information Map
Account Identifier Displays the account identifier for the Veritas SaaS Backup
logon account that you added.
Region Displays the region for the Veritas SaaS Backup logon
account that you added.
3 Click OK.
Integration with Veritas SaaS Backup 891
Adding a new Veritas SaaS Backup account
■ US region
https://us.saasbackup.veritas.com/v-signin.html
■ Australia region
https://ap.saasbackup.veritas.com/v-signin.html
■ Europe region
https://eu.saasbackup.veritas.com/v-signin.html
Account identifier Enter a name you can use to identify the logon account in
Backup Exec.
4 Click OK.
Backup Exec adds a new account. The account information is sent to Veritas
SaaS Backup. Veritas SaaS Backup creates a token that is sent to Backup
Exec and stored in the Backup Exec database.
Table 24-1 Differences between the traditional and the forever incremental
backups of virtual machines
Supported backup Supports full, incremental, and Supports full, consolidate full, and
types differential backups. incremental backups.
Connection to the All backups from the source Only incremental backups from the
source virtual virtual machine. Connection source virtual machine. No
machine required. connection to the source virtual
machine is required for Consolidate
Full backups.
Load on the source Increases load as all backups Reduces the load as only
virtual machine are from the source virtual incremental backups are from the
machine. source virtual machine.
Table 24-2
Date Backup Date Backup
Supported storage
A forever incremental backup definition is supported on the following devices:
■ Disk storage
Forever Incremental Backup 899
How do forever incremental backups work
Note: The Duplicate stage can be targeted to all devices that are supported by
Backup Exec.
Default schedule
You can set a schedule for each job template.
■ Forever Incremental
The default schedule is set for 11:00 P.M. every day. An incremental backup is
taken from source virtual machine every day at 11 P.M.
■ Consolidate Full
The default schedule is set for every week on Friday at 11:00 A.M. The
consolidate operation runs on the Backup Exec server every Friday at 11:00
A.M.
■ Full
The default schedule is set for the fourth Friday of each month at 11:00 P.M. A
full backup runs on the source virtual machine on the fourth Friday of each month
at 11:00 P.M. You can change the schedule as per your requirements.
After the consolidate full or full backup from the source virtual machine is successfully
completed, the sets in the previous chain are no longer retained. Those sets can
be deleted depending on the retention period.
Considering the previous example, Backup Exec retains F1 to F1-I5. After F2 runs
and is successful, F2 is retained and Backup Exec no longer retains F1 to F1-I5.
In this backup chain, F2 to F2-I7 are retained till F3 runs and is successful. At any
point, only latest backup chain is retained.
In the Backup Exec user interface, all backup sets have the retention option set as
System defined and retain reason as Retained for Consolidate Full job.
3 On the Backup Definition Properties dialog box, in the Selections box, click
Edit to add or remove resources from the backup selection list.
Depending on whether you select a VMware ESX host or a Hyper-V host, the
virtual machines for the selected host are displayed.
4 On the Backup Definition Properties dialog box, in the Backup box, click
Edit, and select the backup options.
5 On the Backup Definition Properties dialog box, click OK.
Forever Incremental Backup 901
CAS-MBES scenarios in forever incremental backups
■ Consolidate backup is an I/O intensive operation. Ensure that you select the
proper backup storage for Forever Incremental backup definition.
■ It is recommended that a Consolidate Full backup runs after a maximum of 30
consecutive incremental backups. This ensures that restore operations complete
in a reasonable time.
■ It is recommended that you run a periodic full backup from the source virtual
machine. Compared to traditional backups, in a forever incremental backup
definition, a full backup from the source virtual machine can be run at a lesser
frequency. This is applicable when a virtual machine has significant configuration
changes.
For example, full backup from the source virtual machine - monthly, incremental
- daily, and consolidate full - weekly.
■ It is recommended that you schedule a consolidate full backup, outside the
regular backup window.
■ Keep the Verify option enabled for forever incremental backup definition.
■ If a consolidate full job fails, it is recommended that you run a full backup from
the source virtual machine.
■ Run the Validate VM job after a consolidate full set. You can run this job when
backup sets are hosted on a disk.
■ Establishing a trust between the Backup Exec server and a remote computer
You can find a list of compatible operating systems, platforms, and applications in
the Backup Exec Software Compatibility List.
You can install the Agent for Windows using many methods, depending on your
environment.
See “Methods for installing the Agent for Windows” on page 68.
remote computer is a trusted resource, you can establish the trust with the Backup
Exec server.
Backup Exec issues a security certificate for both the Backup Exec server and the
remote computer. The security certificate is valid for approximately one year and
is automatically renewed during normal operations. However, if the certificate expires
you must re-establish the trust.
You can establish a trust between the Backup Exec server and the remote computer
by adding the remote computer to the list of servers on the Backup and Restore
tab.
To establish a trust for a remote computer
1 On the Backup and Restore tab, in the Servers and Virtual Hosts group,
click Add.
2 Click Microsoft Windows computers and servers.
3 Follow the on-screen prompts.
See “Removing Backup Exec servers that the Agent for Windows can publish
to” on page 912.
To view the activity status of the remote computer in the Backup Exec Agent
Utility
1 On the computer on which the Agent for Windows is installed, on the taskbar,
click Start > All Programs > Veritas Backup Exec > Backup Exec Agent
Utility.
If the Backup Exec Agent Utility is already running, you can double-click its
icon in the system tray.
2 Click the Status tab.
You can view any of the following information about the remote Windows
computer:
Backup Exec server Displays the name of the Backup Exec server that is
processing the current operation.
Current file Displays the name of the current file that is being
processed.
3 Click OK.
See “About the Backup Exec Agent Utility for Windows” on page 906.
Viewing the activity status of the remote computer from the system
tray
You can view the activity status for a remote computer.
Possible statuses are as follows:
■ A backup job is running.
■ A restore job is running.
■ A backup and a restore job are running.
■ Snapshot in progress.
■ The Backup Exec client service named Beremote.exe is not running on the
computer.
■ Idle.
Backup Exec Agent for Windows 909
About the Backup Exec Agent Utility for Windows
Adding Backup Exec servers that the Agent for Windows can publish
to
You can use the Backup Exec Agent Utility to add a Backup Exec server that the
Agent for Windows can publish information.
See “About publishing the Agent for Windows to Backup Exec servers” on page 910.
See “Viewing the activity status of the remote computer from the system tray”
on page 908.
Backup Exec Agent for Windows 911
About the Backup Exec Agent Utility for Windows
To add Backup Exec servers that the Agent for Windows can publish to
1 On the computer on which the Agent for Windows is installed, on the taskbar,
click Start > All Programs > VeritasBackup Exec > Backup Exec Agent
Utility.
When the Backup Exec Agent Utility is running, an icon appears in the system
tray. You can double-click this icon to view the utility.
2 Click the Publishing tab.
3 (Optional) The first time that you start the Backup Exec Agent Utility, click
Change Settings to enable the options.
4 Click Add.
5 Enter the following information:
Backup Exec server name Type the Backup Exec server name or the IP address
or IP address of the Backup Exec server to which you want to publish
information.
User Name Type the user name for an account that has
administrative rights on the Backup Exec server.
6 Click OK.
Editing Backup Exec server information that the Agent for Windows
publishes to
You can use the Backup Exec Agent Utility to edit a Backup Exec server name or
IP address to which the Agent for Windows can publish information.
See “About publishing the Agent for Windows to Backup Exec servers” on page 910.
To edit Backup Exec server information
1 On the computer on which the Agent for Windows is installed, on the taskbar,
click Start > All Programs > Veritas Backup Exec > Backup Exec Agent
Utility.
When the Backup Exec Agent Utility is running, an icon appears in the system
tray. You can double-click this icon to view the utility.
2 Click the Publishing tab.
Backup Exec Agent for Windows 912
About the Backup Exec Agent Utility for Windows
3 (Optional) The first time that you are start the Backup Exec Agent Utility, click
Change Settings to enable the options.
4 Select the Backup Exec server that you want to edit from the list.
5 Click Edit.
6 Edit the Backup Exec server name or IP address.
7 Click OK.
Removing Backup Exec servers that the Agent for Windows can
publish to
You can use the Backup Exec Agent Utility to remove a Backup Exec server so
that the Agent for Windows no longer publishes information to it.
See “About publishing the Agent for Windows to Backup Exec servers” on page 910.
To remove Backup Exec servers that the Agent for Windows can publish to
1 On the computer on which the Agent for Windows is installed, on the taskbar,
click Start > All Programs > Veritas Backup Exec > Backup Exec Agent
Utility.
When the Backup Exec Agent Utility is running, an icon appears in the system
tray. You can double-click this icon to view the utility.
2 Click the Publishing tab.
3 (Optional) The first time that you are start the Backup Exec Agent Utility, click
Change Settings to enable the options.
4 Select the Backup Exec server that you want to remove from the list.
5 Click Remove.
6 Click OK.
Enable the Backup Exec Select this option to enable Oracle operations between
server to authenticate the Backup Exec server and this computer.
Oracle operations
Use a custom port to Select this option to change the port that is used for
connect to the Backup Exec communications between this computer and the Backup
server during Oracle Exec server during Oracle operations. By default, port
operations 5633 is used.
Port number Type the port number that you want to use for
communications between this computer and the Backup
Exec server.
Backup Exec Agent for Windows 915
Using the Backup Exec Agent Utility Command Line Applet
5 Click OK.
6 On the Backup Exec server, add the name of the Oracle server and the user
name that you entered on the Database Access tab to the Backup Exec
server's list of authentication credentials.
See “About the Backup Exec Agent Utility for Windows” on page 906.
Note: To run the Backup Exec Agent Utility Command Line Applet on a Microsoft
Windows computer, you must use Server Core.
Backup Exec Agent for Windows 916
Backup Exec Agent Utility Command Line Applet switches
You can run the following Backup Exec Agent Utility functions with the Backup Exec
Agent Utility Command Line Applet:
■ Set the publishing interval (in minutes).
■ List the published name for the agent.
■ List the Backup Exec server names to which the agent is publishing.
■ Add a Backup Exec server to the publishing list.
■ Remove a Backup Exec server from the publishing list.
■ View the following status information:
■ Activity status
■ Current source
■ Current folder
■ Current file
■ Currently attached Backup Exec server
Table A-1 Backup Exec Agent Utility Command Line Applet switches
Switch Description
ramcmd /status:[n]
When you use the /status switch without a time value, the
Agent for Windows status appears in the command window
and then the applet exits.
/publish:[on | off | add | remove Use the following parameters with the /publish switch:
| interval][/ms:<Backup Exec
■ No parameter specified- Displays the publishing status
server>] [/t:<x>]
and then exits.
■ [on] - Turns publishing on. Lets the Agent for Windows
send information about itself, such as its version and
IP address.
■ [off] - Turns publishing off.
■ [add], [remove] - Used with /ms. You can use this
parameter to add or remove Backup Exec servers from
the Agent for Windows publish list.
■ [interval] - Used with /t. Specifies the time interval that
the Agent for Windows sends information about itself
to the Backup Exec server.
You can set the time interval in minutes using the
/t:[<x>] parameter.
Note: The [interval] switch must be used with the /t: switch.
Using [interval] alone on the command line is not supported.
ramcmd /publish:[on|off|add|remove|interval]
[/ms<Backup Exec server>][/t:<x>]
Backup Exec Agent for Windows 918
Backup Exec Agent Utility Command Line Applet switches
Table A-1 Backup Exec Agent Utility Command Line Applet switches
(continued)
Switch Description
/oracle: [new | edit | delete] Use the following parameters with the /oracle switch:
Table A-1 Backup Exec Agent Utility Command Line Applet switches
(continued)
Switch Description
Backup Exec server-side On the Backup Exec server. Reduces the size of backups,
deduplication which reduces storage
requirements.
With a single Deduplication feature license key, you can use two types of
deduplication devices.
Backup Exec Deduplication Feature 922
About the Deduplication feature
Table B-2 Types of deduplication devices that work with the Deduplication
feature
Type of Description
device
You can find a list of compatible types of storage in the Backup Exec
Hardware Compatibility List.
Warning: It is strongly recommended that you exclude the deduplication disk storage
device from all antivirus scans. If an antivirus scanner deletes or quarantines the
files from the deduplication disk storage device, access to the device may be
disabled.
Backup Exec Deduplication Feature 926
Requirements for the Deduplication feature
Deduplication disk
storage devices
Backup Exec Deduplication Feature 927
Requirements for the Deduplication feature
Deduplication disk The following requirements are for the password credentials for a
storage credentials deduplication disk storage device:
Client-side On the server where the Agent for Windows is installed, 1.5 GB of
deduplication for memory is required.
Windows
Both 32-bit and 64-bit Windows operating systems are supported.
Client-side You can find a list of compatible operating systems for Linux client-side
deduplication for deduplication in the Backup Exec Software Compatibility List.
Linux
A 64-bit Linux operating system is required.
Note: When you delete or erase the media from an OpenStorage device, it may
take up to 48 hours for more space to become available. Backup Exec cannot
always calculate the amount of space that will be made available.
If you use Backup Exec Central Admin Server feature, you can share an
OpenStorage device between multiple Backup Exec servers. You can enable sharing
when you add an OpenStorage device. You can select new Backup Exec servers
to share an OpenStorage device or remove the sharing ability for Backup Exec
servers at any time. You can specify a different Backup Exec server on which to
run backup operations when the OpenStorage device is the source of a job, such
as a duplicate job, or a verify job.
See “Sharing a deduplication device between multiple Backup Exec servers”
on page 949.
Before you configure an OpenStorage device, have the following information
available:
■ What you want to name the OpenStorage device.
Backup Exec Deduplication Feature 933
Configuring an OpenStorage device
If the Central Admin Server feature is not Click Network storage, and then click
installed Next.
If the Central Admin Server feature is Do the following in the order listed:
installed
■ Select a Backup Exec server, and then
click Next.
■ Click Network storage, and then click
Next.
If the provider for the OpenStorage device Select the provider, and then click Next.
is listed
Backup Exec Deduplication Feature 934
Editing the properties of an OpenStorage device
If the provider for the OpenStorage device Do the following in the order listed:
is not listed
■ Select My provider is not listed here,
and then click Next.
■ Enter the provider name, and then click
Next.
6 Enter the name of the server and the logon account to use to access the
OpenStorage device, and then click Next.
7 Specify the number of concurrent operations that can run on the OpenStorage
device, and then click Next.
8 Review the summary, and then do one of the following:
See “Specifying a Backup Exec server that has proximity to a shared OpenStorage
device” on page 936.
Backup Exec server with device Indicates the server that you want to run
proximity backup operations when the OpenStorage
device is shared between servers in a
Central Admin Server feature environment.
You can specify a Backup Exec server that
has physical or logical proximity to the
OpenStorage device. Proximity of the
Backup Exec server to the device is an
advantage when the device is the source
of a job, such as a duplicate job or a verify
job, and you want to avoid running the job
over a WAN.
Split data stream every Indicates the size at which you want
Backup Exec to span to a new image. The
default size is 50 GB.
Disk space to reserve for non-Backup Displays the amount of disk space to set
Exec operations aside for applications other than Backup
Exec. The default amount is 5%.
■ The logon account to use to access the deduplication disk storage device. You
cannot use the System Logon Account. It is recommended that you select or
create a logon account that you use exclusively for the deduplication disk storage
device. You should not use this account for any other purpose. This account
should not contain credentials that are subject to password update policies.
The following requirements are for the password credentials for a deduplication
disk storage device:
■ The password cannot be blank
■ The password cannot contain the following characters: &, ", <, >, %, ^
■ The password cannot start with the hyphen character: -
■ The password cannot end with the backslash character: \
■ Whether you want to enable encryption while the data is transmitted to the
deduplication disk storage device and while the data is stored on it. You should
not use the Backup Exec encryption options for backup jobs that deduplicate
data.
■ The number of concurrent operations to run on the device. This setting
determines the number of jobs that can run at the same time on this device.
The number of jobs varies depending on your hardware and environment, so
you may need to adjust this setting more than once. It is recommended that you
set it low enough to avoid overloading your system, but high enough to process
your jobs in a timely manner.
To create or import deduplication disk storage
1 On the Storage tab, in the Configure group, click Configure Storage.
2 Do one of the following:
If the Central Admin Server feature is not Select Disk-based storage, and then click
installed Next.
If the Central Admin Server feature is Do the following in the order listed:
installed
■ Select the Backup Exec server that you
want to configure deduplication disk
storage for, and then click Next.
■ Select Disk-based storage, and then
click Next.
To create a new deduplication disk storage Click Next to accept the default location
device that appears in the field.
To import an existing deduplication disk Enter the path of the existing deduplication
storage device disk storage device, and then click Next.
6 Click the drop-down arrow and select the logon acount to use to access the
deduplication disk storage device, or click Add/Edit to create a logon acount,
and then click Next.
7 Specify if you want to enable encryption during transmission of data to the
deduplication disk storage device and while the data is stored on it, and then
click Next.
8 Specify the number of concurrent operations that can run on the deduplication
disk storage device, and then click Next.
9 Review the storage configuration summary, and do either of the following:
Percentage of disk space to reserve for Displays the amount of disk space to set
non-Backup Exec operations aside for applications other than Backup
Exec. The default amount is 5%
Low disk space - Critical Displays the critically low disk space
threshold at which you want Backup Exec
to send an alert. Backup Exec sends alerts
when the amount of free disk space drops
below the low disk space threshold, and
again if it drops below the warning
threshold. The amount of free disk space
does not include the disk space that is
reserved for non-Backup Exec operations.
Low disk space - Warning Displays the low disk space threshold at
which you want Backup Exec to send an
alert. If free disk space drops below the
warning threshold to the critical threshold,
another alert is sent. The amount of free
disk space does not include the disk space
that is reserved for non-Backup Exec
operations.
Changing the password for the logon account for deduplication disk
storage
When you specify a Backup Exec logon account for a deduplication disk storage
device, an additional user account is created for the deduplication components with
the same user name and password. However, if you change the credentials for the
Backup Exec logon account, the credentials for the additional user account are not
changed automatically. You must use the spauser.exe utility to update the password
for the additional user account. This account is known as the "User 1" account when
you use the spauser.exe utility to view a list of user names that are associated with
the deduplication disk storage.
To change the password for the logon account for deduplication disk storage
1 Click the Backup Exec button, and then select Configuration and Settings.
2 Select Logon Accounts, and then select Manage Logon Accounts.
3 Select the Backup Exec logon account that you want to change, and then click
Edit.
4 Type the current password for the logon account, and then click OK.
Backup Exec Deduplication Feature 945
Selecting storage devices for direct access sharing
The default Backup Exec program file directory is C:<Backup Exec install
path>\Backup Exec
The user name is case-sensitive. If you do not know the user name, type the
following command to find the user name that is associated with "User 1":
spauser.exe -l
You are prompted for the old password and a new password. Ensure that the
new password is the same as the password that you used in step 6.
Note: After you enable direct access sharing for a client, you must restart the Backup
Exec services on the Backup Exec server. Click the Backup Exec button, select
Configuration and Settings, and then select Backup Exec Services, and then
click Restart all services.
Use ICMP ping operations to detect the Lets the Backup Exec server use ICMP
server ping to locate the remote computer.
6 Click the Backup Exec button, select Configuration and Settings, select
Backup Exec Services, and then click Stop all services.
7 In Windows Explorer, copy the deduplication disk storage device to the new
path or volume.
Note: This step can take a long time as all of the data within the device is
copied to the new location.
8 On the Backup Exec Administration Console, click the Backup Exec button,
select Configuration and Settings, select Backup Exec Services, and then
click Restart all services.
9 On the Storage tab, click Configure Storage, click Disk-based storage, and
then click Next.
10 Click Deduplication disk storage, and then click Next.
11 Enter a name and description for the deduplication disk storage device, and
then click Next.
12 Do one of the following:
If the deduplication disk storage device Click Create a new deduplication disk
was created in Backup Exec 2012 and later storage device.
13 Click Next.
14 Specify the logon account that was used for the original deduplication disk
storage device, and then click Next.
15 Specify if you want to enable encryption, and then click Next.
16 Specify the number of concurrent operations to run on the deduplication disk
storage device, and then click Next.
17 Review the summary, and then click Finish.
18 When the deduplication disk storage device comes online, you can delete the
original files.
Backup Exec Deduplication Feature 949
Sharing a deduplication device between multiple Backup Exec servers
This type of sharing is not the same as direct access sharing. With direct access
sharing, a remote computer bypasses the Backup Exec server to directly access
storage devices that are hosted by the Backup Exec server.
See “Sharing storage devices” on page 467.
See “Selecting storage devices for direct access sharing” on page 945.
Note: Client-side deduplication may increase the CPU utilization on the remote
computer if your deduplication device supports client-side deduplication.
When you create a backup job with client-side deduplication, keep in mind the
following items:
■ The backup job can include resources from only one remote computer.
■ The Agent for Windows is required on the remote Windows computer to perform
Windows client-side deduplication. The Agent for Linux is required on the Linux
computer to perform Linux client-side deduplication.
Backup Exec Deduplication Feature 950
How to set up backup jobs for deduplication
Note: The OpenStorage devices must be from the same vendor. You cannot perform
optimized duplication between OpenStorage devices from different vendors. If you
attempt to copy deduplicated data between OpenStorage devices from different
vendors, regular duplication is performed instead of optimized duplication.
Backup Exec Deduplication Feature 952
Using optimized duplication to copy deduplicated data between OpenStorage devices or deduplication disk
storage devices
known as seeding the destination deduplication disk storage device. Seeding helps
avoid the time-consuming and bandwidth-intensive process of transmitting large
amounts of backup data over the low bandwidth WAN connection.
To seed a device, you can store a full backup to an external storage device such
as a USB drive. You can then transport the USB drive to the remote location where
the Backup Exec server and the destination deduplication disk storage device are
kept, and duplicate the backup data to the deduplication disk storage device.
If you are using CAS, do the following: See “Configuring an OpenStorage device”
on page 932.
■ Verify that you have one central
administration server and at least one See “Creating or importing deduplication disk
managed Backup Exec server. storage” on page 937.
■ Verify that the Backup Exec server from
which you want to copy the deduplicated
data has a deduplication disk storage
device (for client-side or Backup Exec
server-side deduplication) or an
OpenStorage device (for appliance
deduplication). Also verify that the Backup
Exec server to which you want to copy the
deduplicated data has a deduplication disk
storage device (for client or Backup Exec
server-side deduplication) or an
OpenStorage device (for appliance
deduplication).
■ Verify that the Backup Exec servers are
enabled for sharing.
Create a backup job that uses an See “Backing up data” on page 153.
OpenStorage device or a deduplication disk
storage device as the destination.
Backup Exec Deduplication Feature 954
Copying deduplicated data to tapes
Create a job to duplicate backup sets and See “Duplicating backup sets or a job history
select the appropriate OpenStorage device manually” on page 216.
or deduplication disk storage as the
destination.
Note: The destination device for the
duplicate job must be the same type of device
from the same vendor as the device that was
used in the source backup job.
Note: You cannot redirect the restore of a deduplication disk storage device. You
must restore a deduplication disk storage device to its original location.
To restore deduplicated data, you can create a regular restore job. No additional
settings are required.
See “Restoring data from a server, a backup set, a backup job, or a storage device”
on page 229.
To restore a deduplication disk storage device
1 On the Backup and Restore tab, right-click the computer for which you want
to restore the deduplication disk storage de