Documente Academic
Documente Profesional
Documente Cultură
Servers™
Administrator’s Guide
October 2002
N096948
Disclaimer
The information contained in this publication is subject to change without notice.
VERITAS Software Corporation makes no warranty of any kind with regard to this
manual, including, but not limited to, the implied warranties of merchantability and
fitness for a particular purpose. VERITAS Software Corporation shall not be liable for
errors contained herein or for incidental or consequential damages in connection with the
furnishing, performance, or use of this manual.
Copyright
Copyright © October 2002 VERITAS Software Corporation. All rights reserved. VERITAS,
VERITAS Software, the VERITAS logo, VERITAS Backup Exec for Windows Servers, and
all other VERITAS product names and slogans are trademarks or registered trademarks of
VERITAS Software Corporation in the USA and/or other countries. Other product names
mentioned herein may be trademarks or registered trademarks of their respective
companies.
October 2002
VERITAS Software Corporation
350 Ellis Street
Mountain View, CA 94043
USA
Phone 650–527–8000
Fax 650–527–2908
www.veritas.com
Administrator’s Guide - Table of Contents
Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
1
Chapter 3. Getting Started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Before Starting Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 73
Starting Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
First Time Startup Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74
Using the Administration Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
Using Backup Exec Dialog Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Using the Overview View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 79
Using the Backup Exec Assistant . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Frequently Asked Questions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
Backup Exec Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84
Changing Default Preferences . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
Changing General Job Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 87
2 Administrator’s Guide
Creating a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
Adding Drives to a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 108
Deleting Drives from a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 109
Deleting a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 110
Renaming a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Viewing Properties of a Cascaded Drive Pool . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
Viewing Server Properties and Running Server Diagnostics . . . . . . . . . . . . . . . . . . . . 112
Viewing and Using Drive Properties and Statistics . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
Viewing General Drive Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117
Viewing Drive Configuration Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 119
Viewing Drive SCSI Information Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
Viewing Drive Statistics Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
Viewing Drive Cleaning Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
Viewing and Specifying a Drive’s Media Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . 130
Using Robotic Libraries with Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
Configuring a Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
Viewing Properties of a Robotic Library . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
Creating Robotic Library Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
Redefining Robotic Library Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
Using Backup-to-Disk Folders and Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
Adding a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 144
Renaming a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Changing the Path of a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
Deleting a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 149
Recreating a Backup Folder and Its Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 150
Pausing and Resuming a Backup Folder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 151
Viewing Backup Folder Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152
Renaming a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 155
Deleting a Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 156
Recreating a Deleted Backup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
4 Administrator’s Guide
Setting Default Media Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
Media Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 209
Creating User-defined Media Vaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Finding Media in a Location or Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
Renaming a User-defined Media Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 211
Adding Media to the Offline Location or a User-Defined Vault . . . . . . . . . . . . . . . 211
Moving Media by Dragging and Dropping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
Deleting a User-defined Media Vault . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
Media Rotation Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Son Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
Father/Son Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 215
Grandfather Media Rotation Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 216
Running the Media Rotation Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
Media Operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Deleting Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
Moving Media . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 219
Viewing General Media Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
Viewing Media Management Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
Viewing Media Statistical Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 223
Viewing Media Cleaning Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
Media Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Running the Media Set Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 226
Creating Media Sets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 227
Deleting a Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229
Renaming a Media Set . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
Editing and Viewing Media Set Properties . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 230
6 Administrator’s Guide
General Options for Resource Discovery Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
Resources Options for a Resource Discovery Job . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
Duplicating Backed Up Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
General Options for a Duplicate Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
Advanced Options for a Duplicate Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
Verifying a Backup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
Creating a Test Run Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
General Options for Test Run Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
Setting Test Run Default Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 310
Setting Default Backup Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 312
Setting Default Pre/Post Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
Specifying Backup Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
Specifying the Default Backup Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
Changing the Backup Network for a Job . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
Using Backup Exec with Firewalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
Browsing Systems Through a Firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Protecting Windows.NET Systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 333
Backing Up Utility Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
Backing Up NetWare Network Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
About Backup Strategies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
Choosing a Backup Strategy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
Understanding Backup Methods and Their Advantages . . . . . . . . . . . . . . . . . . . . 340
Understanding the Archive Bit and Backup Methods . . . . . . . . . . . . . . . . . . . . . . . 344
Understanding Modified Time and Backup Methods . . . . . . . . . . . . . . . . . . . . . . . 345
8 Administrator’s Guide
Chapter 8. Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395
Restore Operations and the Catalog . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 396
Cataloging Media in a Drive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 397
Setting Catalog Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
Catalog Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
Restoring Data to a Server or Workstation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Using the Restore Wizard . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 403
Creating a Manual Restore Job by Configuring Job Properties . . . . . . . . . . . . . . . . 404
Restoring File Permissions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 420
Restoring System State . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 421
Restoring Utility Partitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 423
Restoring Distributed File System (Dfs) Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
Restoring Media Created With Other Backup Software . . . . . . . . . . . . . . . . . . . . . 425
Selecting Data to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Using the Resource View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Using the Media View . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 428
Changing Resource Credentials for Restore Jobs . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Using Advanced File Selection to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
Searching for Files to Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
Restore Operations and Media Libraries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Redirecting a Restore Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
Using Redirected Restore to Install Domain Controllers from Media . . . . . . . . . . 439
Setting Restore Defaults . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
Specifying the Restore Network . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 444
Canceling a Restore Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
Catalog Icon Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 446
10 Administrator’s Guide
Adding Windows Management Instrumentation Capability . . . . . . . . . . . . . . . . . . . . 499
Uninstalling WMI Providers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
12 Administrator’s Guide
Installing the Backup Exec UNIX Agent on the Workstation . . . . . . . . . . . . . . . . . 585
Configuring the Backup Exec UNIX Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 588
14 Administrator’s Guide
Recovering Backup Exec on a Cluster Using IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . 775
Recovering the Entire Cluster Using a Manual Disaster Recovery Procedure . . . 776
Recovering the Cluster Data Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 777
Recovering All Shared Disks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 778
Recovering Clustered Backup Exec . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 779
Troubleshooting Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 779
16 Administrator’s Guide
Appendix B. VERITAS Backup Exec - Admin Plus Pack Option . . . . . . . . . . . . . . . 827
Installing the Admin Plus Pack Option . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 827
Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 828
Creating a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 828
Installing Locally Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 829
Installing to a Remote System Using a Clone CD Image . . . . . . . . . . . . . . . . . . . . . 830
Copying Jobs, Selection Lists, and Job Templates Between Servers . . . . . . . . . . . . . . 831
Advanced Reporting Capabilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 832
Scheduling Report Jobs and Setting Notification Recipients . . . . . . . . . . . . . . . . . . 835
Active Alerts by Media Server Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 835
Alert History by Media Server Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 836
Backup Job Success Rate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 837
Backup Set Details by Resource Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 838
Backup Size By Resource Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 839
Backup Success Rate Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 840
Daily Job Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 841
Daily Network Device Utilization Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 842
Device Usage by Template . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Event Recipients Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 843
Failed Backup Jobs Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 844
Job Distribution by Device Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
Job Queue Status Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 845
Job Templates Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 846
Machines Backed Up Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 847
Media Required for Recovery Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 848
Move Media to Vault Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Overnight Summary Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 849
Problem Files Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 850
Recently Written Media Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 851
Resource Risk Assessment Report . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 852
18 Administrator’s Guide
Recovering Computers Requiring OEM-Specific SCSI Drivers . . . . . . . . . . . . . . . 904
Performing a Manual Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 905
Performing Remote IDR . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 906
Microsoft SQL Server Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909
Microsoft Exchange Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909
SharePoint Portal Server Recovery Notes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 909
20 Administrator’s Guide
Advanced Open File Option Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 970
Appendix G. VERITAS Backup Exec - Agent for Microsoft SQL Server . . . . . . . 975
Requirements for Using the SQL Agent with SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . 976
Installing the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 977
Using Backup Exec Logon Accounts for SQL 2000 Resources . . . . . . . . . . . . . . . . . . . 978
Backup Strategies for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 980
Consistency Checks for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 982
Using the Advanced Open File Option with SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . 983
Setting Backup Options for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 984
Backing Up SQL 2000 Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 988
Backing Up SQL 2000 Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 990
Backing Up SQL 2000 Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 992
Restore Options for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 994
About Restoring SQL 2000 Databases and Filegroups . . . . . . . . . . . . . . . . . . . . . . . . . . 999
Restoring from SQL 2000 Database Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1001
Restoring from SQL 2000 Transaction Logs Up to a Point in Time . . . . . . . . . . . 1002
Restoring from SQL 2000 Transaction Logs Up to a Named Transaction . . . . . . 1003
Restoring from SQL 2000 Filegroup Backups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1004
Restoring the SQL 2000 Master Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1007
Redirecting Restores for SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1009
Setting Default Backup and Restore Options for SQL 2000 . . . . . . . . . . . . . . . . . . . . . 1012
Preparing for Disaster Recovery of SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1018
Disaster Recovery of SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020
Manual Recovery of SQL 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1020
About the Agent for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1024
Requirements for Agent for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1025
Installing the SQL Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1026
Using Backup Exec Logon Accounts for SQL 7.0 Resources . . . . . . . . . . . . . . . . . . . . 1027
Backup Strategies for SQL 7.0 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1029
Appendix H. VERITAS Backup Exec - Agent for Microsoft Exchange Server . . 1067
Requirements for Using the Exchange Agent with Exchange 2000 . . . . . . . . . . . . . . 1068
Installing the Exchange Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1068
Using Backup Exec Logon Accounts with Exchange 2000 Resources . . . . . . . . . . . . 1069
Backup Strategies for Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1070
Recommended Configurations for Exchange 2000 Server . . . . . . . . . . . . . . . . . . 1073
Backup Options for Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1074
Backing Up Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1078
Reviewing Circular Logging for Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . 1079
Backing Up Exchange 2000 Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . 1080
Restore Options for Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1085
Restoring Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1088
Restoring Exchange 2000 Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . . 1089
22 Administrator’s Guide
Redirecting Exchange 2000 Storage Group and Database Restores . . . . . . . . . . . 1091
Redirecting Mailbox and Public Folder Restores in Exchange 2000 . . . . . . . . . . . 1093
Setting Default Backup and Restore Options for Exchange 2000 . . . . . . . . . . . . . . . . 1097
Preparing for Disaster Recovery of Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . 1101
Disaster Recovery for Exchange 2000 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1102
About Using the Exchange Agent with Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . 1105
Requirements for Using the Exchange Agent with Exchange 5.5 . . . . . . . . . . . . . . . 1105
Installing the Exchange Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1106
Using Backup Exec Logon Accounts with Exchange 5.5 Resources . . . . . . . . . . . . . . 1106
Backup Strategies for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1107
Recommended Configurations for Exchange 5.5 Server . . . . . . . . . . . . . . . . . . . . 1109
Backup Options for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1110
Backing Up Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1114
Reviewing Circular Logging for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1115
Backing Up Exchange 5.5 Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . . 1115
Restore Options for Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1119
Restoring Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1121
Restoring Exchange 5.5 Mailboxes and Public Folders . . . . . . . . . . . . . . . . . . . . . . . . 1123
Redirecting Exchange 5.5 Database Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1125
Redirecting Mailbox and Public Folder Restores in Exchange 5.5 . . . . . . . . . . . . 1127
Setting Default Backup and Restore Options for Exchange 5.5 . . . . . . . . . . . . . . . . . 1132
Preparing for Disaster Recovery of Exchange 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1137
Disaster Recovery for Exchange Server 5.5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1138
24 Administrator’s Guide
Appendix K. VERITAS Backup Exec - Agent for Lotus® Domino™ . . . . . . . . . . . 1179
Lotus Domino Agent Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1180
Installing the Lotus Domino Agent on the Media Server . . . . . . . . . . . . . . . . . . . . . . 1181
Viewing and Selecting Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1182
Configuring Default Lotus Domino Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1184
Backing Up Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1185
Supported Lotus Domino Database Configurations . . . . . . . . . . . . . . . . . . . . . . . . 1185
Lotus Domino Transaction Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1186
Backup Options for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1187
Restoring Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1189
Selecting Lotus Domino Databases for Restore . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1190
Restore Options for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1192
Redirecting Restore Jobs for Lotus Domino Databases . . . . . . . . . . . . . . . . . . . . . 1194
Preparing for Disaster Recovery on a Lotus Domino Server . . . . . . . . . . . . . . . . . . . 1195
Disaster Recovery of a Lotus Domino Server . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1196
Disaster Recovery of a Lotus Domino Server Using Archive Logging . . . . . . . . 1197
Disaster Recovery of a Lotus Domino Server Using Circular Logging . . . . . . . . 1198
Appendix L. VERITAS Backup Exec - Agent for R/3 for Oracle Server . . . . . . . . 1199
Backup Exec R/3 Agent Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1200
Backup Exec Alerts and the BACKINT Interface . . . . . . . . . . . . . . . . . . . . . . . . . . 1200
Requirements for Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201
Installing the Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1201
Using the R/3 Agent to Back Up the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . 1202
Specifying Backup Exec Parameters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1202
Backing Up the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1205
Restoring the R/3 Database . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1206
Disaster Recovery Using the Backup Exec R/3 Agent . . . . . . . . . . . . . . . . . . . . . . . . . 1206
Disaster Recovery Prerequisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1207
Recovering a Remote R/3 Database Server from a Disaster . . . . . . . . . . . . . . . . . 1208
26 Administrator’s Guide
Disaster Recovery of NetWare Servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1239
Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1269
Conventions
The following conventions are used in this manual:
Text that you type Text that you are required to type on the keyboard is preceded
by the word "Type" and may be followed by any keys that you
must press:
For example:
Type a:install and press <Enter>.
Text that you replace Text that you must replace is shown in an italic font. For
example:
JOB_PRIORITY=priority
Items on the interface Items that are on the Backup Exec interface are shown in a
bold font. For example:
On the Properties pane, under Settings, click Exchange
29
Conventions
30 Administrator’s Guide
Introduction
Introducing Backup Exec 1
Backup Exec is a high-performance data management solution for Windows® servers
networks. With its client/server design, Backup Exec provides fast, reliable backup and
restore capabilities for servers and workstations across the network.
Backup Exec is available in configurations that can accommodate multi-platform
networks of all sizes:
VERITAS Backup ExecTM Installs on and protects any supported version of Microsoft .NET,
for Windows® Servers Windows 2000, or Windows NT 4. Also includes Backup Exec agent
software to protect unlimited remote workstations running on
Windows XP Professional, Windows 2000 Professional, Windows NT
4 Workstation, Windows Me, Windows 98, UNIX, and Macintosh
platforms.
This edition supports unlimited stand-alone drives. Support for a
single robotic library drive for use with Backup Exec is provided
when you purchase Backup Exec. To enable support for additional
robotic library drives, you must purchase the Library Expansion
Option.
Support for protecting additional .NET, Windows 2000, or Windows
NT 4 servers, NetWare servers, databases, open files, and more can
be purchased separately.
31
Small Business Server Installs on and protects any supported version of Microsoft Small
Business Server for Windows NT 4 or Windows 2000. Also includes
Backup Exec agent software for workstations running on Windows
XP Professional, Windows 2000 Professional, Windows NT 4
Workstation, Windows Me, Windows 98, UNIX, and Macintosh
platforms.
This edition supports unlimited stand-alone drives. Support for a
single robotic library drive for use with Backup Exec is provided
when you purchase Backup Exec. To enable support for additional
robotic library drives, you must purchase the Library Expansion
Option.
The Small Business Server Edition includes an Exchange Agent, SQL
Agent, and IDR Option (IDR is not supported in SBS 2000
environments). Protecting additional Windows 2000, or Windows
NT 4 servers, NetWare servers, or databases is not supported and
would require an upgrade to the Backup Exec for Windows Servers
Edition.
See also:
“Backup Exec Options” on page 36
32 Administrator’s Guide
Introduction
What’s New in This Release
Updated graphical user Provides a more intuitive graphical user interface, featuring a task
interface pane that makes launching Backup Exec operations easier, and
incorporating a media server summary, which provides a quick
listing of recent Backup Exec activity on your server. Also offers an
Information Desk, a quick and convenient way of accessing detailed
information on how to use Backup Exec.
VERITAS Backup Exec Provides a web-based administration console for Microsoft Windows
Web Administration Powered and .NET servers displaying task-oriented features
Console designed to protect data on Windows servers.
Calendar-based job Allows you to quickly view and schedule jobs through a calendar
scheduler format similar to Microsoft’s Outlook.
.NET and Windows XP Fully supports installation on and protection of .NET and Windows
support XP Professional systems running in a domain and continues to
provide protection for Windows 2000 and Windows NT systems.
Duplication of backup data Allows duplication of existing backup sets or of backup sets that will
be created during a scheduled backup job. If you select to duplicate
existing backup sets, the backup sets you select from catalogs are
read from the source media and written to the selected destination,
such as a drive, drive pool, or backup folder. If you select to
duplicate backup sets following a job, you select a scheduled backup
job as the source. That backup job runs first, and then the backup sets
it created are copied to the destination you selected for the duplicate
job.
Test Run of backup jobs Determines if a scheduled job will complete successfully. If it appears
that there are problems that could prevent successful job completion,
the problems are identified. Notification of potential problems
appears on the Administration Console and can also be sent via
e-mail or pager.
Automatic discovery of Allows for creation of a job to automatically detect new backup
new resources resources, including local and remote databases or volumes.
Error handling rules Allows the setting up of rules, based on error categories, for how
Backup Exec will handle failed jobs.
Job history enhancements Provides color-coded HTML-formatted job logs and presents a
summary of errors in a history log. Also provides more details of job
history without requiring the viewing of the log.
Enhanced specify network Allows the use of a dedicated LAN to reduce network traffic on the
for backup and restore production LAN. A default LAN can be specified for all jobs, or a
jobs LAN can be specified on a per job basis for both backup and restore
jobs. A drop-down selection list of all available network interfaces on
the media server makes configuration easier for both setting the
default network and specifying network use on a per job basis.
Enhanced alert and Allows configuration of alerts and set up of recipients who will
notification setup receive e-mail or pager notification when alerts occur. Also provides
alert filtering to specify the types of alerts that will display on the
Administration Console. In addition to active alerts, allows viewing
of alert history.
Dynamic product update Checks the VERITAS web site at user-specified intervals for any
available Backup Exec updates and informs you when software
updates are available.
Cluster install and Automates installation and configuration of Backup Exec media
configuration wizard servers operating in a Windows cluster environment.
User accounts for Allows the creation and modification of user accounts with access to
protecting specific back up and restore specific systems.
systems
Job summary view Provides an optional summary of the backup job being submitted.
Reordering of job Allows editing of the order in which resources selected for backup
selections are processed.
Scheduling of utility jobs Utility jobs, such as cleaning, inventory, and erase, can be scheduled
to run as a once-only job or as a recurring job.
34 Administrator’s Guide
Introduction
What’s New in This Release
Enhanced reporting Provides additional reports for administrating media servers and
capabilities remote systems and allows report output to be saved. With the new
Admin Plus Pack, reports can be scheduled as jobs and e-mailed to
specified recipients.
Hot-swappable Device Now you can replace or add tape drives on a Backup Exec media
Wizard server without rebooting the server. The Hot-swappable Device
Wizard guides you through the process.
Advanced Open File Ensures all files are protected even if they are being used and allows
Option the use of VSP, VSS, and VM Flashsnap. Also includes Backup Exec
Remote Agent for Windows Servers.
ServerFree Option Enables the off-loading of the backup process onto a third-party data
mover within a SAN.
Admin Plus Pack Option Provides features designed for distributed data management of your
media and remote servers, including the ability to clone servers and
copy jobs, selection lists, and templates between media servers. This
option also provides advanced reporting capabilities, such as
scheduling a report and e-mailing report output.
Enhanced Agent for Allows granular backup and restore of an individual workspace and
Microsoft SharePoint document.
Portal Server
Lotus Domino Rnext The Backup Exec Agent for Lotus Domino now provides Rnext
Support support.
Enhanced Agent for The Backup Exec Agent for Microsoft Exchange allows single
Microsoft Exchange instance storage of attachments during mailbox level backups and
allows restores of individual public folders.
36 Administrator’s Guide
Introduction
Backup Exec Options
with truncation. Redirected restores allow you to easily restore SQL data to other SQL
servers on the network. Multi-pipe support along with SQL VDI provides users the
easiest and fastest way to complete SQL database protection. For more information,
see “VERITAS Backup Exec - Agent for Microsoft SQL Server” on page 975.
◆ VERITAS Backup Exec Remote Agent for NetWare Servers expands network-wide
data protection by providing a Client Access License (CAL), fully protecting all NDS
information across NetWare 4.2, 5.1, and 6.x environments. In addition to backing up
NetWare servers from your Windows media server, you get 100 percent SMS
compatibility supporting the current versions of NetWare. The exclusive Agent
Accelerator ™ technology maximizes backup performance and reduces network
traffic by using source level compression and distributed processing. For more
information, see “VERITAS Backup Exec - Remote Agent for NetWare” on page 1223.
◆ VERITAS Backup Exec Remote Agent for Windows® Servers provides a Client Access
License (CAL) to enable protection of remote Windows servers. With its exclusive
Agent Accelerator™ technology, the Remote Agent uses source compression and
distributed processing to optimize backup performance. For more information, see
“VERITAS Backup Exec - Remote Agent” on page 821.
◆ VERITAS Backup Exec Agent for Oracle® provides seamless online backup protection
for Oracle Database Server versions 8.0.5, 8i-8.1.6, 9i and Oracle Application Server 9i.
Integrating Oracle backup with the advanced features of Backup Exec provides data
protection of both individual table spaces as well as complete Oracle databases. You
can also include archived redo files and control files without taking them offline. For
more information, see “VERITAS Backup Exec - Agent for Oracle Server” on
page 1151.
◆ VERITAS Backup Exec Agent for R/3™ for Oracle® Server provides superior data
protection by allowing backups of critical data while the application is still online and
in use. The R/3 Agent, certified by SAP, is a reliable solution that allows Backup Exec
to provide both local and remote protection of the latest versions of SAP™R/3™
databases utilizing the SAP (BC-BRI BACKINT) interface while enabling you to
efficiently manage your data. For more information, see “VERITAS Backup Exec -
Agent for R/3 for Oracle Server” on page 1199.
◆ VERITAS Backup Exec Agent for Lotus® Domino™ provides seamless online backup
protection for versions 5 and 6. Using Lotus Domino APIs, the Agent for Lotus
Domino now fully supports transactional logging, providing users with
uncompromising data protection of the entire Lotus Domino server. For more
information, see “VERITAS Backup Exec - Agent for Lotus® Domino™” on
page 1179.
◆ VERITAS Backup Exec SAN Shared Storage Option (SAN SSO) allows Backup Exec to
operate in a Storage Area Network (SAN), providing a high performance LAN-free
backup solution. SAN SSO allows multiple distributed media servers to share
common, centralized storage devices connected over a SAN. This configuration
provides greater efficiency and fault tolerance. In addition to increasing performance
and backup speeds in the SAN environment, the Shared Storage Option load balances
backup activity across multiple Backup Exec media servers and centralizes
management tasks while lowering the total cost of hardware ownership. For more
information, see “VERITAS Backup Exec - SAN Shared Storage Option” on page 911.
◆ VERITAS Backup Exec - Tivoli Storage Manager (TSM) Option lets you combine the
speed and localized control of Backup Exec with the TSM policy-based system of
centralized storage management. This option allows the TSM server’s storage
resources to appear as a robotic library in the list of target devices on the Backup Exec
server. Backup Exec administrators can then direct the output of any Backup Exec job
to the TSM server simply by selecting the name of the TSM robotic library as the
destination when submitting the job. For more information, see “VERITAS Backup
Exec - Tivoli Storage Manager Option” on page 1241.
◆ VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server protects all of
the files and attributes associated with an installation of SharePoint Portal Server.
Backup Exec, which offered the first complete backup and recovery solution for
SharePoint Portal Server, now allows backup and restore of individual workspaces
and documents. Restores can be made to the original SPS information store or
redirected to another SPS information store without affecting other workspaces. For
more information, see “VERITAS Backup Exec - Agent for Microsoft SharePoint Portal
Server” on page 1211.
◆ VERITAS Backup Exec - Intelligent Image Option (IIO) provides fast backup
performance with less CPU processing. The IIO backs up all of the information about
the files themselves (meta data), and then separately backs up all the data in the files
as one image. The decrease in the overall volume of the backup increases the speed of
the backup. For more information, see “VERITAS Backup Exec for Windows Servers -
ServerFree Option and Intelligent Image Option” on page 939.
◆ VERITAS Backup Exec - ServerFree Option enables you to increase backup
performance by freeing up media server processor resources and moving the backup
processing operations to hardware solutions that may be installed in your storage
area network environment. Use of this option requires VERITAS Backup Exec
Advanced Open File Option and VERITAS Backup Exec SAN Shared Storage Option.
For more information, see “VERITAS Backup Exec for Windows Servers - ServerFree
Option and Intelligent Image Option” on page 939.
38 Administrator’s Guide
Introduction
How Backup Exec Works
Backup Exec
administration console
Through the Administration Console, you configure settings, called default options, that
you want Backup Exec to use for most jobs. However, you can select to override these
default options while setting up a specific jobs, such as a weekly backup of selected
workstations. You can create a once-only job, such as a restore of a particular file to a
server, or you can schedule recurring jobs, such as daily backup jobs.
Wizards guide you through most Backup Exec operations, including the creation of a
backup or restore job, setting up media rotation jobs, and setting media overwrite
protection.
You can monitor a job’s progress through the Job Monitor, or use Backup Exec’s Calendar
to quickly view all jobs scheduled to run for the day.
The media server contains media and device databases designed to simplify the process of
organizing and allocating storage devices attached to your media server and to aid in
preventing media from being accidentally overwritten. Through Backup Exec’s device
management functions, you can logically group storage devices together in drive pools.
Through the media management function, you can organize, track, and troubleshoot all of
the media in your library. You can define overwrite protection periods to ensure that
media is not accidentally overwritten, set up automatic media labeling, and view media
statistics such as the media’s age, hours of use, number of mounts, bytes written and read,
and errors encountered, which are automatically tracked by Backup Exec.
After a job has been processed, the job’s results are stored in a job history database. A
record of the data that was backed up is kept in Backup Exec’s catalog. The job history is a
report of what happened during the processing of the job (statistics, errors, and so on),
and the catalog file is the record from which restore selections are made.
40 Administrator’s Guide
Installation
Installing Backup Exec 2
Backup Exec installation on the media server includes:
◆ Installing the storage device hardware (controller, drives, robotic libraries) in the
media server. Refer to the documentation included with your storage device
hardware for installation instructions. Use the appropriate Windows hardware setup
functions to configure your controller and storage devices. (Refer to your Microsoft
Windows documentation for more information.)
◆ Installing Backup Exec software on the media server. All Backup Exec program files
are installed on the media server from the Backup Exec installation CD. During
installation, files required for workstation agent installation are also copied to the
media server.
◆ Rebooting the media server to initialize changes (when necessary).
The installation program installs Microsoft SQL Server 2000 Desktop Engine (MSDE 2000)
components required to run Backup Exec. These include SQL Server 2000 core
components, MDAC v2.62, and ODBC 3.0. With ODBC, the installation program installs
and configures the base 32-bit ODBC administrator v3.0, including runtime DLLs, and the
ODBC driver for the Backup Exec catalogs.
If you are running applications that use earlier versions of these components, problems
may occur due to the upgraded drivers. If problems occur, contact the vendor of the
incompatible software to obtain a version compatible with the MDAC.
41
System Requirements
If SQL Server 2000 is already installed on the server, you are prompted to do one of the
following:
◆ Install the required Microsoft SQL Server 2000 Desktop Engine (MSDE 2000)
components with Backup Exec and create a default Backup Exec instance.
◆ Select a SQL Server 2000 instance that already exists on which to run Backup Exec.
Note If you choose to install Backup Exec into an existing SQL 2000 instance, make sure
that SQL 2000 service pack 2 or later is installed before you continue with the
installation.
When Backup Exec is installed into an existing instance, the automated master
database restore feature is not available. To recover the Master database, you must
replace it with the Master database copy that Backup Exec automatically creates and
updates when the Master database is backed up.
After installing Backup Exec on the media server, Backup Exec Workstation Agent
software can be installed and configured on remote workstations on the network. --300.
System Requirements
The following are the minimum system requirements for running this version of Backup
Exec:
Internet Browser Internet Explorer 5.01 or later; however, version 5.5 is recommended.
42 Administrator’s Guide
System Requirements
Installation
Recommended: 256 MB (or more for better performance).
Virtual Memory Recommendations: 20 MB above Windows
recommended size for total paging file size (total for all disk
volumes). To view or set the paging file size:
On Windows NT, click the Start button, point to Settings, and
then click Control Panel. Double-click System, and then click the
Performance tab.
On Windows 2000 or .NET, click the Start button, point to
Settings, and then click Control Panel. Double-click System,
click the Advanced tab, and then click Performance Options.
Disk Space 550 MB hard disk space required after Microsoft Windows is
installed (typical installation).
Storage Hardware Backup Exec requires at least one storage media drive and/or robotic
library and the appropriate controller card. Removable storage
devices and non-removable hard drives can also be targeted for
backups. Refer to the Backup Exec hardware compatibility list for a
complete list of devices that are supported. Support for multi-drive
robotic libraries is available separately. Refer to the Windows
Hardware Compatibility list for a complete list of supported SCSI
controllers.
❖ When prompted for a user name in the Service Account window, add the name of an
existing or new Service Account (for example, Administrator) as a member of the
local Administrators group for the Domain. It is highly recommended that you also
enter a password.
1. Add the name of an existing or new Service Account (for example, Administrator) as
a member of the Global Domain Admins group.
2. Ensure that on each workstation in the domain you want to back up, the Global
Domain Admins group is a member of the workstation’s local Administrators group.
44 Administrator’s Guide
Changing Windows Security
1. Establish a One Way Trust Relationship between the Host Domain (the domain in
which the media server resides) and the Target Domains (the domains that are to be
Installation
backed up):
a. In the Host Domain, permit the Target Domains to trust the Host Domain.
2. In each Target Domain, add the Host Domain’s name of an existing or new Service
Account (for example, Administrator) in the local Administrators group.
▼ If You Are Backing Up Servers and Workstations in More Than One Domain:
1. Establish a One Way Trust Relationship between the Host and Target Domains:
a. In the Host Domain, permit the Target Domains to trust the Host Domain.
2. In each Target Domain, add the Host Domain’s name of an existing or new Service
Account (for example, Administrator) in the Local Administrators group.
3. On each workstation to back up, add the Host Domain’s name of an existing or new
Service Account (e.g., Administrator) in the Local Administrators group.
Hardware Make sure that storage device hardware and associated drivers are
properly installed and recognized by the Windows operating system.
The Backup Exec Service All Backup Exec services on the media server run in the context of a
Account user account configured for Backup Exec’s system services. This
account can be created during Backup Exec’s installation, or an
existing user account can be used. To create a service account for
Backup Exec during installation, supply a user name and password
when prompted. The account designated for Backup Exec’s services -
whether it is a new account or an existing user account - will be
assigned the following rights:
Authenticate as any user and gain access to resources under any
user identity.
Create a token object, which can then be used to access any local
resources.
Log on as a service.
Administrative rights (provides complete and unrestricted rights
to the computer).
Backup operator rights (provides rights to restore files and
directories).
Manage auditing and security log.
Due to security implementations in Microsoft Small Business Server,
the service account must be "Administrator."
46 Administrator’s Guide
Installing Backup Exec
See also:
“Installing Backup Exec Using the Installation Program” on page 47
“Installing Backup Exec from the Command Line (Silent Mode)” on page 56
Installation
Installing Backup Exec Using the Installation Program
The Backup Exec CD includes an installation program that guides you through the
installation process.
1. From the installation CD browser, select the option to install VERITAS Backup Exec.
The Welcome window appears.
3. Select I accept the terms of the license agreement, and then click Next.
5. If Backup Exec Setup detects an existing installation of MS SQL Server 2000, you can
allow the required Microsoft SQL Server 2000 Desktop Engine (MSDE 2000)
components to be installed with Backup Exec and create a default Backup Exec
instance, or you can choose to use a SQL Server 2000 instance that already exists on
which to run Backup Exec.
Select an option, and then click Next.
A dialog that requests your serial numbers appears.
6. You can manually enter the serial numbers for Backup Exec and any options, or you
can import an existing besernum.xml file to enter the serial numbers.
- To manually enter the serial numbers for Backup Exec and any additional options,
type the serial number into the field, and then click Add. When finished, click
Next.
- To import the serial numbers from a file, click Import, and then browse for and
select an existing besernum.xml file. When finished, click Next.
Note When you click Next, the serial numbers you entered are saved to the file
besernum.xml, located in the Windows directory.
If another installation of Backup Exec 9.0 for Windows Servers is found on the
computer, the serial number appears in the Existing Serial Numbers field. To
remove an older serial number, select the number and click Remove. A serial
number is not required for Backup Exec’s fully functional evaluation version.
- To install a 60-day evaluation copy of the software, click Next without entering
serial number information.
Installing an evaluation copy enables many options that must be purchased
separately and are not included as part of Backup Exec.
Note For information about clustering Backup Exec, see “Installing Backup Exec on a
Cluster” on page 742.
8. To accept the local features for installation, and to accept the default Destination
Folder for Backup Exec, click Next. To select another destination folder for Backup
Exec, click Change, and follow the prompts.
9. Provide a user name and password that the Backup Exec system services can use (see
“The Backup Exec Service Account” on page 46), and then click Next.
10. If prompted, select how to install device drivers for the tape storage devices that are
connected to the server, and then click Next.
It is recommended that you select Use VERITAS device drivers for all tape devices.
11. If you are prompted, enter information or choose settings for additional options being
installed. Click Next after each selection.
48 Administrator’s Guide
Installing Backup Exec
12. Read the Backup Exec installation review, and then click Install.
The MSDE 2000 (if selected), VERITAS Update, and Backup Exec program files are
installed.
Installation
13. When the installation is complete, you can choose to register Backup Exec online,
view the readme, create a shortcut to Backup Exec on the desktop, and restart the
computer.
If Restart System appears, restart the computer in order for the configuration to take
effect.
If the installation fails, an installation job log named bkupinst.log is created in the
Windows root directory on the computer where Backup Exec is installed; this file lists
any errors that may have occurred during installation. When prompted, click View
Installation Log.
See also:
“Getting Started” on page 73
Note You can also install Backup Exec options using Add/Remove Programs in the
Windows Control Panel.
4. Make sure Local Install and Additional Options are selected, and then click Next.
5. Type the option’s serial number and click Add, or click Import to import the serial
number from an existing besernum.xml file, and then click Next.
7. If you are prompted, enter information or choose settings for additional options being
installed. Click Next after each selection.
8. Read the Backup Exec installation review, and then click Install.
When the installation is complete, you can choose to register Backup Exec online,
view the readme, create a shortcut to Backup Exec on the desktop, and restart the
computer.
10. After the computer has rebooted, restart Backup Exec for Windows Servers.
50 Administrator’s Guide
Installing Backup Exec
Installation
following installed on the local media server:
◆ The Admin Plus Pack option
◆ An evaluation version of Backup Exec
◆ The Not For Resale (NFR) option
If you are installing Backup Exec through Terminal Services and the installation media is
on a shared drive (CD-ROM or network share) you must install using a UNC path.
Installation via mapped drives is not supported.
Note You can also use Microsoft’s Add/Remove Programs utility to install Backup Exec
to a remote computer. See your Microsoft documentation for more information.
2. To install Backup Exec media servers and options to remote computers, select
Remote Install, and then click Next.
Note If you do not need to install any Backup Exec options to the local computer, clear the
Local Install selection.
3. On the Backup Exec Remote Features dialog box, in the Destinations Systems pane,
right-click Windows Media Servers.
5. Enter the user name, password and domain credentials of an account that has
administrative rights on the remote computers, and then click OK.
Item Description
Remote install with Select this option to enter serial numbers for the remote computers.
serialized options During the install, you are prompted for the serial numbers for the
remote computers.
If you select this option to install a Backup Exec media server
(Windows Media Server) to a remote computer, then you are
prompted to select a destination folder.
You can accept the default destination folder on the remote
computer, or make changes.
After selecting this option, continue with step 7 on page 53.
Remote install with Select this option to install remotely using all of the installation
cloned local settings options installed on the local computer. When this option is used,
you cannot change any settings on the remote computer. For
example, if you have installed the Intelligent Disaster Recovery
option locally, this option will also be installed remotely.
After selecting this option, continue with step 13 on page 49.
Remote install from Select this option to install remotely using the clone file settings that
clone file settings may be contained on a clone CD image or that could also be
contained in a previously created parameter file (see “Creating and
Using Installation Parameter Files” on page 62). When this option is
selected, you can browse to a parameter file.
After selecting this option, continue with step 13 on page 49.
Note Each remote computer targeted for an option installation must have a unique
option serial number.
52 Administrator’s Guide
Installing Backup Exec
Installation
- Click Import, and then browse for and select an existing besernum.xml file. When
finished, click Next.
Note When you click Next, the serial numbers you entered are saved to the file
besernum.xml, located in the Windows directory.
8. Provide a user name and password that the Backup Exec system services can use (see
“The Backup Exec Service Account” on page 46), and then click Next.
9. If prompted, select how to install device drivers for the tape storage devices that are
connected to the server, and then click Next.
It is recommended that you select Use VERITAS device drivers for all tape devices.
10. If you are prompted, enter information or choose settings for additional options being
installed. Click Next after each selection.
12. Read the Backup Exec installation review, and then click Install.
13. When the installation is complete, click Next, and then click Finish. You may need to
restart the computer in order for the configuration to take affect.
If the installation fails, an installation job log named bkupinst.log is created in the
Windows root directory on the computer where Backup Exec is installed; this file lists
any errors that may have occurred during installation. If prompted, click View
Installation Log, and check this log.
Note You can also use Microsoft’s Add/Remove Programs utility to install Backup Exec
to a remote computer. See your Microsoft documentation for more information.
2. To install Backup Exec remote agents and options to remote computers, select
Remote Install, and then click Next.
Note If you do not need to install any Backup Exec options to the local computer, clear the
Local Install selection.
3. On the Backup Exec Remote Features dialog box, in the Destinations Systems pane,
right-click either of the following:
- Windows Agent/Options Computers. Enables you to install the Backup Exec
Remote Agent to a remote Windows computer, or to install the Advanced Open
File Options to a remote computer.
- NetWare Agent Server. Enables you to install the Backup Exec NetWare Agent to
a remote NetWare server.
54 Administrator’s Guide
Installing Backup Exec
Installation
- Select Add Remote Computer Manually, type the Domain and Computer Name,
and then click OK. This option is not available for NetWare servers.
5. Enter the user name, password and domain credentials of an account that has
administrative rights on the remote computers, and then click OK.
8. When the installation is complete, click Next, and then click Finish. You may need to
restart the computer in order for the configuration to take effect.
If the installation fails, an installation job log named bkupinst.log is created in the
Windows root directory on the computer where Backup Exec is installed; this file lists
any errors that may have occurred during installation. If prompted, click View
Installation Log, and check this log.
5. Press <Enter>.
An installation job log named bkupinst.log is created in the Windows root
directory on the computer where Backup Exec is installed; this file lists any errors that
may have occurred during installation, and is the only source of feedback when
running setup.exe. Check this job log to determine if you need to reboot the computer
to complete the installation.
56 Administrator’s Guide
Installing Backup Exec
Installation
◆ Substitute values appropriate for your environment for values shown in italics; for
example substitute your password for password.
◆ Enclose the value in quotation marks if it contains spaces, such as “Operations Weekly
Backup”.
Command Line Switches for Silent Mode Installation of Backup Exec (continued)
Note The following switches are designed for use with Not For Resale, Open Option, and
Evaluation versions of Backup Exec only.
58 Administrator’s Guide
Installing Backup Exec
Command Line Switches for Silent Mode Installation of Backup Exec (continued)
Installation
/SSO: Installs the SAN Shared Storage Option
with this server as the primary server.
See also:
“Installing Backup Exec Using the Installation Program” on page 47
“Uninstalling Backup Exec from the Command Line” on page 61
60 Administrator’s Guide
Installing Backup Exec
Command Line Switches for Remote Administrator Silent Mode Installation (continued)
Installation
without actually installing the Backup
Exec software. This option can be used
with the /CPF: or /XML: switches.
4. To remove the Backup Exec program files but keep all of the Backup Exec data, type:
SETUP /UNINSTALL:
To remove the Backup Exec program files and the Backup Exec data, type:
SETUP /REMOVEALL:
4. Type setup /TS: and the appropriate switches, including /CPF: and the full path
name of the parameter file. For example, type:
setup /TS: /USER:user /DOM:domain /PASS:password /SNO:serial
number /CPF:"A:\file name" -S
Backup Exec will be installed on your server and a parameter file containing the user
name, domain, password, and serial number will be saved to a floppy diskette. You
can use this parameter file to install to another computer.
4. Type:
SETUP /PARAMS:"A:\file name" -S
62 Administrator’s Guide
Registering Backup Exec Online
5. If you want to overwrite a parameter, specify the new parameter. For example, to
change the password, type:
SETUP /PARAMS:"A:\file name" /PASS:new password -S
Installation
Note To create an XML file containing all parameters, use the /XML: switch. The XML
file is not encrypted, which exposes parameters such as the password.
See also:
“Installing Backup Exec from the Command Line (Silent Mode)” on page 56
“Command Line Switches for Backup Exec Silent Mode Installation” on page 57
2. Click Start, point to Settings, click Control Panel, and then double-click
Add/Remove Programs.
4. Click Next.
6. Select Install.
7. Click Finish.
64 Administrator’s Guide
Starting and Stopping Backup Exec Services
Installation
1. On the Tools menu, click Backup Exec Services.
Item Description
Server Type the name of a server you want to add to the list, and then click
Add. To import a list of servers, click Import List and select the file
containing the server list.
Start all services Click this to start all Backup Exec services for the selected server.
Stop all services Click this to stop all Backup Exec services for the selected server.
Services credentials Click this to change service account information or to change startup
options.
Remove Server(s) Click this to remove a selected server or servers from the server list.
Note When using the Shared Storage Option, you must uninstall Backup Exec from the
secondary servers before uninstalling from the primary server.
2. Click Start, point to Settings, click Control Panel, and then double-click
Add/Remove Programs.
4. When prompted to confirm the deletion of Backup Exec from your computer, click
Yes.
5. When prompted to remove Backup Exec program files or all data, click Yes; click No
to retain user-created data such as catalogs and job information.
6. If the uninstall program fails, click the View Installation Log File button for
additional information.
66 Administrator’s Guide
Installing the Backup Exec Remote Administrator
Installation
To remotely administrate both Backup Exec 8.6 and 9.0 media servers, install the Remote
Administrator for both versions on the same computer but in different directories.
To support the Remote Administrator, the media server requires that the Backup Exec
system services must be running.
Note The Remote Administrator for Backup Exec 9.0 for Windows Servers is not
compatible with previous versions of Backup Exec. The Remote Administrator and
the media server to which it is connecting must be the same version.
2. Click Next.
The Software License Agreement appears.
3. Select I accept the terms of the license agreement, and then click Next.
4. Select Local Install and Install Administration Console only, and then click Next.
A dialog box appears requesting the destination directory for your Backup Exec
program files.
5. Click Next to install the Backup Exec program files in the default directory, or click
Change to select another directory for the installation, and then click Next.
6. Click Install.
The installation copies the Backup Exec program files to the computer.
7. Click Finish.
The Remote Administrator is installed. You can begin using Backup Exec. For more
information, see “Getting Started” on page 73.
1. Click Start.
2. Point to Programs, and then click VERITAS Backup Exec for Windows Servers.
Note If you are connecting to a remote administration console from a media server, from
the Network menu, click Connect to Local Media Server to break the connection.
Click Connect to Media Server to connect to another media server.
Item Description
Server Select the name of the media server from the Server drop-down
list box or type the name of the server if you are running the
Remote Administrator from a media server. The media server
should appear in the list if the Backup Exec naming services are
running on both machines.
Note Each Windows 2000 server in the domain that has Backup
Exec installed will automatically appear in the list box.
Low Speed Connection Select this option to minimize the amount of information initially
(RAS) retrieved from the media server to which you are connecting.
When this option is selected, views such as the device and media
views will not automatically be expanded when the
administration console is loaded. This reduces the time required
to connect to the remote media server. Information for each view
is updated when the view is selected.
This option is useful if you are connecting to the media server
over a modem line.
Login Information
User name Type an administrator user name for the server to which you are
connecting.
Domain From the drop-down list, select the domain to which the user
belongs, or type the appropriate domain name if it does not
appear in the list.
68 Administrator’s Guide
Installing the Backup Exec Remote Administrator
Item Description
Services Click this to access the Backup Exec Services Manager to stop and
Installation
start services or to set the logon credentials used to run the
services.
The status of the local services appear at the bottom of this dialog box. If you try to
connect to a server and the connection fails, this dialog box displays the services
status for the server you attempted to connect to.
4. Click OK.
The administration console will now connect to the services running on the media
server. You should now be able to operate the media server as though you were
running the administration console from there.
You may be prompted for a user name and password to browse some network shares
even if you are logged into the Remote Administrator computer under an account that is
valid for those shares. Provide a domain-qualified user name and password when
prompted (e.g., domain1\howard). This also applies to workgroup accounts (e.g.,
machinename\george).
4. Select the date and time for Backup Exec to start polling for updates.
7. Click Apply.
70 Administrator’s Guide
Upgrading from Previous Versions of Backup Exec
Installation
previous versions of Backup Exec (for example, when the TSM option adds registry
settings) are kept. At the end of the installation, the upgrade process is summarized. Only
Backup Exec version 8.0 and later can be migrated to this release.
When upgrading, only the Backup Exec for Windows Servers options for which you have
provided serial numbers are upgraded. Components that are already selected in the
Backup Exec Install Options dialog box in the install program must remain selected so
that all licensed components are upgraded. It is recommended that you add all previous
version serial numbers before installing the new version of Backup Exec so that these
options are automatically upgraded.
Note Evaluation versions of Backup Exec for Windows Servers will replace any current
installation. You cannot have separate installations of different versions on the same
server.
72 Administrator’s Guide
Getting Started 3
In Getting Started, you’ll find:
Getting Started
◆ A checklist that will help you prepare for the First Time Startup Wizard.
◆ Details on the Backup Exec Assistant, Administration Console, and the Information
Desk.
◆ Details of default options set when Backup Exec is installed.
◆ Layouts and descriptions of Backup Exec menus.
73
Starting Backup Exec
❏ Learn about creating new media sets with weekly, monthly, or quarterly retention
periods. For more information, see “Default Media Set” on page 189.
❏ Decide what Windows credential you want your Backup Exec logon account to use
when browsing and making backup selections. You can use an existing account, or
create a new one. You’ll be prompted for a default Backup Exec logon account during
the First Time Startup Wizard. For more information, see “Configuring Logon
Accounts” on page 347.
74 Administrator’s Guide
First Time Startup Wizard
If you do not see one or more of your attached storage devices in the Backup Devices
window, click the Configure Devices button. This will guide you through installing
the appropriate drivers for the storage hardware connected to your system.
- Detected Backup-to-Disk Folders. Click the Add Backup-to-Disk Folder button to
set up folders on your hard drive to target for backup jobs. For more information,
see “Using Backup-to-Disk Folders and Files” on page 143.
The backup folders you add here will be included in the All Drives drive pool,
which is Backup Exec’s default target for backup jobs. Backups submitted to the
All Drives drive pool may be processed on an attached media device or to one of
the backup folders on your hard disk.
Getting Started
- Drive Configuration. Verify that Backup Exec has configured all of your drives
correctly. If all of your drives do not display on the list, follow the instructions in
the wizard to install the VERITAS device drivers.
◆ Configure IDR Options. If you installed the Intelligent Disaster Recovery Option, you’ll
be prompted to configure IDR. For details, read “Getting Started with IDR” on
page 859.
◆ Logon Accounts. Use the Logon Account Wizard to set up Backup Exec logon accounts
to access resources such as servers, shares, and databases. For details, read about
logon accounts in “Configuring Logon Accounts” on page 347.
After you use the First Time Startup Wizard, you can access some of the wizards that
make up the First Time Wizard individually. To access the wizards individually, from the
Tools menu, select Wizards, and then select the wizard you want to use.
Note If you are using Backup Exec Web Administrative Console (BEWAC), the
Administration Console displays differently. For more information, see “Navigating
in BEWAC” on page 784.
Administration Console
Menu bar
Navigation bar
Columns
Task pane
Results pane
Preview pane
Selection pane
Status bar
76 Administrator’s Guide
Using the Administration Console
◆ Navigation bar. The navigation bar appears under the menu bar and allows you to
quickly create a backup or restore job or to navigate to Backup Exec’s seven views.
Click Backup or Restore to create a job. Change views by clicking the name of the
view you want. The seven views that can be accessed through the navigation bar
include:
- Overview. Use this view to access the Information Desk, view a summary of the
system you are logged on to, or launch and configure the connection settings for
ExecView.
- Job Setup. Use this view to perform tasks for new backup, restore, and media
rotation jobs, as well as to launch some utility jobs.
Getting Started
- Job Monitor. Use this view to monitor jobs and job history. Through this view, you
can also access the Outlook-like job calendar.
Note If you are using BEWAC, the Outlook-like calendar is not available.
- Alerts. Use this to view and respond to alerts, view alert history, apply alert filters,
and set up notification recipients to receive e-mail or pager communications when
alerts occur.
Note If you are using BEWAC, the Alerts view is not available. You can access alerts
through the Status area. For more information, see “Viewing, Clearing, and
Responding to Alerts” on page 786.
- Reports. Use this to view, print, save, and schedule reports about your media
server, its operations, and its device and media usage.
- Devices. Use this view to create drive pools, cascaded drive pools, and
backup-to-disk folders, and to perform device operations and access device
properties pages.
- Media. Use this view to manage your media, create media sets, and create media
locations.
◆ Task pane. The task pane displays on the left side of the Administration Console by
default, but can be hidden by selecting View, and then selecting Task Pane. Through
the task pane, you can initiate actions such as creating a new backup job or
responding to an alert. The contents of the task pane are dynamic, changing according
to the view selected from the navigation bar. Some options may be unavailable until
an item is selected from the console screen or a prerequisite task is performed. For
example, you cannot select Rename from the Devices task pane unless you have first
selected an item that can be renamed, such as a user-created drive pool.
◆ Selection pane. The Selection pane is where you select items to work with. For example,
it is where you select files to back up or restore.
◆ Results pane. The Results pane is the large pane on the right side of the screen that
usually contains a list or tree view of items that correspond to items that are selected
in the Selection pane. For example, if you select a Backup-to-Disk folder in the
Selection pane, the Backup-to-Disk files that are contained in the folder display in the
Results pane. This pane may be divided to display a preview pane.
◆ Preview pane. The preview pane displays on the bottom right of the Administration
Console. It displays information about the item selected in the list or tree view. This
pane can be hidden by selecting View, and then selecting Preview Pane.
Note If you are using BEWAC, the Preview pane is not available.
◆ Status bar. The status bar appears on the bottom of the Administration Console and
provides information about the media server, jobs running or scheduled to run on the
server, alerts, and services running.
◆ Columns. You can change the location of columns by dragging and dropping them. In
addition, you can change the order of the entries in a column by clicking the column
heading. For example, names of reports display in alphabetical order by default. To
display report names in reverse alphabetical order, click the Name column heading on
the Reports view.
78 Administrator’s Guide
Using the Administration Console
Dialog box
Nodes
Getting Started
Subnodes
Properties
pane
Most of Backup Exec’s dialog boxes contain a Properties pane on the left side. Options
that correspond to the selected subnode display on the right side of the dialog box.
❖ On the navigation bar, click Overview, and then under Views on the task pane, click
Information Desk.
Information Desk
The System Summary briefly details Backup Exec activity for the last 24, 48, or 72 hours,
such as the number of jobs that were run, the number of jobs that failed, the amount of
data backed up, and the number of media used.
You can also see the number and type of active alerts, the number of scratch media
available in the storage devices, a list of upcoming jobs, and the number of jobs that are
currently running.
80 Administrator’s Guide
Using the Administration Console
❖ On the navigation bar, click Overview, and then under Views on the task pane, click
System Summary.
System Summary
Getting Started
82 Administrator’s Guide
Frequently Asked Questions
◆ To quickly create a backup job to back up the media server, click the one-button
backup link on the Information Desk.
◆ Use Windows Explorer to create a backup job.
For details about the various ways to create a backup job, see “Creating a Backup Job” on
page 235.
Getting Started
◆ On the Tools menu, click Backup Exec Assistant, or further down the Tools menu,
click Wizards.
84 Administrator’s Guide
Backup Exec Defaults
Getting Started
3. Select the appropriate options as follows:.
Item Description
Show splash screen at Select this option to display the splash screen when you start
startup Backup Exec. If this option is cleared, the Backup Exec
Administration Console is the first thing to display on startup.
Inventory all drives on Select this option to have Backup Exec inventory all of the
Backup Exec services media in the storage devices when Backup Exec’s services are
startup starting. Depending on the number of storage devices attached
to your system, this process may take a few minutes. If you are
using a robotic library, all of the robotic library’s slots are
inventoried.
Enable backup from Select this option to create and submit backup jobs from
Windows Explorer Windows Explorer. For more information, see “Using Backup
Exec’s Windows Explorer Interface” on page 286. If this option
is cleared, you will not be able to submit backups using the
Backup Exec Windows Explorer interface.
Display the job Select this option to have Backup Exec display a summary of
summary dialog before the backup job options you selected before submitting the job
creating a backup job to the job queue.
Item Description
Display progress Select this option to display the percent completed number
indicators for backup while a backup job is processing. These indicators appear in
jobs (requires additional the Job Activity tab, and they allow you to monitor the
time to pre-scan progress of the job. Backups might take a little longer to
devices) complete when this option is selected because the target
resources must be scanned to determine the amount of data to
be backed up.
Note Due to the time required to scan the target resources,
selecting this option when backing up remote resources
is not recommended.
Alerts
Automatically display Select this option to have alerts automatically appear on the
new alerts desktop when they are sent. If you do not choose this option,
you are required to view and respond to alerts through the
Alerts view.
Play sound after Select this option to have Backup Exec send an audible tone
receiving alert when an alert is generated. Information about alerts can be
found in the Alerts view.
86 Administrator’s Guide
Backup Exec Defaults
Getting Started
Options-Set General Application Defaults
Item Description
Job priority Select the default priority that you want to assign to all jobs. The
choices are Highest, High, Medium, Low, and Lowest. You can
change this default for each job individually.
Device Select the device that you want to be used as the default device for
jobs. You can change this default for each job individually.
Media set Select the media set that you want to be used as the default media
set for jobs. You can change this default for each job individually.
88 Administrator’s Guide
Managing Devices 4
Device management in Backup Exec simplifies how you organize and allocate the storage
devices recognized by Backup Exec, including:
◆ Tape drives or robotic libraries physically attached to a media server.
◆ Virtual devices called Backup-to-Disk Folders created through Backup Exec’s
Backup-to-Disk feature.
◆ Shared devices used in a SAN environment.
◆ Removable storage devices shared by applications through the use of Microsoft’s
Removable Storage Feature.
Managing
Devices
With Backup Exec, you can maximize your hardware investment by organizing your
drives in one or both of the following methods:
◆ Drive pools. Drives are grouped so that jobs assigned to the drive pool are run on the
first available drive. Setting up drive pools offers the following benefits:
- Automatic job rescheduling. If a drive fails while a job is running on it, that job is
rescheduled and placed on hold. Other scheduled jobs are rerouted to working
devices in the drive pool.
- Concurrent processing. Drives in the drive pool run different jobs at the same time,
allowing maximum hardware efficiency.
- Dynamic load balancing. Jobs are more evenly distributed between all of the drives
included in the drive pool when running simultaneous jobs.
◆ Cascaded drive pools. Drives of the same type are linked together so that large backup
jobs that exceed the capacity of the media in one drive automatically continue on the
media in the next drive that is defined in the pool. The cascaded drives appear
logically as one device.
Or, you can use the storage devices as they are configured by Backup Exec at installation,
without making any changes. The default drive pool, All Drives (Server Name) is the
default destination device when you create a backup job. By default, the All Drives drive
pool contains all locally-attached drives, or if you are using the SAN Shared Storage
Option, both locally-attached and shared storage devices appear in All Drives (Server
Name).
89
Viewing Devices
In addition to drive pools and cascaded drive pools, Backup Exec provides other device
management capabilities. You can:
◆ Identify and monitor the current status of all storage devices.
◆ Change physical tape devices without rebooting the Backup Exec server.
◆ Monitor device usage statistics and track hardware errors. Backup Exec keeps track of
the device’s age, hours of use, mounts, number of bytes processed (written and read),
errors, when the device was last cleaned, and so on.
◆ Manage the physical drives attached to the media server and perform operations on
these devices and the media contained in them.
Note Most of the benefits derived from Backup Exec’s device management functionality
are realized when using more than one storage device. However, users with only
one drive can still take full advantage of Backup Exec’s device monitoring to help
make sure their drives are working properly.
See also:
“VERITAS Backup Exec - SAN Shared Storage Option” on page 911
Viewing Devices
When Backup Exec is installed, all storage devices connected to the media server are
automatically recognized as either robotic libraries or stand-alone drives.
Note Support for a single robotic library drive is included with Backup Exec for Windows
Servers. Licenses for additional robotic library drives are available for purchase.
If you group one or more robotic library slots into partitions, the partition drive pools
appear in the Devices view under the Drive Pools icon. For information about
partitioning robotic library slots, see “Creating Robotic Library Partitions” on page 140.
Click Devices on the navigation bar to see how devices are organized logically in drive
pools, and how drives are arranged physically on servers. All devices that are displayed
under All Devices are available, including drive pools, stand-alone drives, robotic
libraries, backup-to-disk folders, and cascaded drive pools. If the Shared Storage Option is
installed, you can also view available secondary storage devices on the storage area
network.
90 Administrator’s Guide
Viewing Devices
Devices view
Managing
Devices
All logical groupings of the physical drives are displayed under Drive Pools and
Cascaded Drive Pools. Cascaded drive pools are displayed under servers because they
only consist of drives from that server; they effectively act as a single device under that
server.
The default drive pool All Drives (Server Name) contains the server’s locally attached
drives as well as any Backup-to-Disk Folders created. Backup-to-Disk Folders are
destination devices for backups that are directed to your hard disk. The data from these
backups is saved on disk as backup files. If you are using the SAN Shared Storage Option,
each server on the SAN will have an All Drives (Server Name) node that contains both
local and shared devices available to the server. At installation, all storage devices are
automatically assigned to All Drives (Server Name).
See also:
“Viewing Media Information” on page 92
“Viewing Drive Pool Properties” on page 105
“Viewing Properties of a Cascaded Drive Pool” on page 111
“Viewing and Using Drive Properties and Statistics” on page 116
“About Devices in the Shared Storage Environment” on page 916
92 Administrator’s Guide
Configuring Devices
◆ Bytes Written. The amount of data that has been written into blocks on the media.
Bytes written may differ from Used capacity due to the effects of data compression
and media flaws. Data compression will tend to increase Bytes written when
compared to Used capacity. Media flaws will decrease Bytes written when compared
to Used capacity.
◆ Compression Ratio. The ratio of Bytes written to Used capacity. Compression ratio will
show the overall effect that data compression and media flaws are having on the
amount of data that is being stored on the media.
See also:
“VERITAS Backup Exec - Library Expansion Option” on page 1143
“About Devices in the Shared Storage Environment” on page 916
Configuring Devices
Backup Exec provides two wizards for configuring and adding storage devices to your
media server:
Managing
◆ The Device Configuration Wizard. This wizard, which appears when Backup Exec is first
Devices
started, allows you to verify that all of the storage devices attached to your system
appear, and to ensure that robotic libraries and storage devices are properly
configured. You can also use the Device Configuration Wizard to configure Backup
Folders on your hard disk. On the Tools menu, point to Wizards, and then select
Device Configuration Wizard to run this wizard at any time.
◆ The Hot-swappable Device Wizard. This wizard allows you to replace or add storage
devices without having to reboot the media server.
If you are using a robotic library, make sure the robotic library hardware is configured
properly.
See also:
“First Time Startup Wizard” on page 74
“Hot Swap for Storage Devices” on page 94
“Setting Up Robotic Library Hardware” on page 1143
Note Only tape drives are supported for hot swapping and adding. The tape drives must
be hot-swap capable. See the owner’s manual for your tape drive for more details.
1. On Tools menu, point to Wizards, and then click Hot-swappable Device Wizard.
94 Administrator’s Guide
Configuring Devices
Managing
Devices
1. On the navigation bar, click Devices.
4. On the Rename dialog box, type the new name, and then click OK.
See also:
“Renaming a Backup Folder” on page 148
“Pausing and Resuming a Backup Folder” on page 151
“Renaming a Drive Pool” on page 104
“Renaming a Cascaded Drive Pool” on page 111
96 Administrator’s Guide
Using Drive Pools
3. Under Drive Pool Tasks in the task pane, select New drive pool.
Managing
Devices
4. Select the appropriate options as follows:
Item Description
Drive Pool Name Type the name of the new drive pool that you want to create.
Select the drives to be Select the drives you want to include in the new drive pool.
included in this Drive
Pool
5. Click OK.
See also:
“Using Cascaded Drive Pools” on page 106
“Creating a Cascaded Drive Pool” on page 107
3. Under Drive Pool Tasks in the task pane, select Add device.
Item Description
Drive Pool Name Displays the name of the drive pool to which you want to add
drives.
Select the drives to be Select the drives you want to include in the drive pool.
included in this Drive
Pool
5. Click OK.
98 Administrator’s Guide
Using Drive Pools
Note Overwrite and append periods for media take precedence over drive priority.
The Priority option is only displayed when viewing drive properties under a drive pool
icon. Drives displayed under the Stand-alone Drives icon or Robotic Libraries icon do
not display a Priority option because the drive may belong to multiple drive pools and
have a different priority in each drive pool.
2. Under Drive Pools, select the drive pool containing the drive for which you want to
Managing
Devices
set a priority.
5. Click Configuration.
Configuration tab
6. In Priority, Type a number from 1 to 99, with 1 designating this drive as the first drive
to be used in the drive pool.
7. Click OK.
See also:
“Viewing Drive Configuration Properties” on page 119
2. Under Drive Pools, select the drive pool from which you want to delete a drive.
3. Select the drive you want to remove from the drive pool.
Make sure you select a drive under Drive Pools and not under the server icon; if you
delete a drive under the server icon, the drive is deleted from the database, not just
from the drive pool.
4. Under Drive Pool Tasks in the task pane, select Remove device.
Managing
Devices
Delete Drive From Drive Pool dialog box
2. Under Drive Pools, select the drive pool you want to delete.
4. Click Yes or Yes to All to delete the drive pool or pools that are displayed.
5. If there are scheduled jobs assigned to the deleted drive pool, you are prompted to
redirect the jobs to another drive pool or stand-alone device.
See also:
“Deleting Drives from a Drive Pool” on page 101
“Retargeting Jobs from a Deleted Drive Pool or Media Set” on page 103
The job to be redirected is displayed in the Retarget Job dialog box. If there are
scheduled jobs assigned to the deleted drive pool or media set, you are prompted to
redirect the jobs to another drive pool or media set.
Managing
Devices
2. Click the <Down arrow> to see more drive pools, and then select the new drive pool,
standalone drive, or media set to which you want to redirect the scheduled jobs.
3. Click Yes or Yes to All to redirect the job or jobs that are displayed to the new drive
pool, drive, or media set.
Note If you choose not to retarget a job, the job will fail. To later target the job to another
device, you will need to manually edit the job.
2. Under Drive Pools, select the drive pool you want to rename.
4. On the Rename dialog box, type the new name to assign to this drive pool, and then
click OK.
The drive pool is listed with the new name.
See also:
“Viewing Drive Pool Properties” on page 105
2. Under Drive Pools in the tree view, select the drive pool.
Managing
Devices
The Drive Pool Properties dialog box provides the following information:
Item Description
Name Displays the name of the drive pool. Rename the drive pool by
typing a new name in this field.
Creation date The date and time that this drive pool was created.
Caution If a drive that does not support hardware compression is added to a cascaded
drive pool, the hardware compression option on all other drives in that pool is
automatically disabled. You can enable the hardware compression option on the
other drives again, but the pool will then have mixed compression, which could
make restore operations difficult.
Note Overwrite and append periods for media take precedence over drive priority.
Managing
Devices
▼ To create a cascaded drive pool:
3. Under Drive Pool Tasks in the task pane, select New drive pool.
Item Description
Drive Pool Name Type the name of the new cascaded drive pool that you want to
create.
Drive Type Select the type of drive you want to use in this cascaded drive pool.
After you select a drive type, only drives of that same type are
displayed in the selection list.
Select the drives to be Add the drives you want to include in the new cascaded drive pool
included in the by selecting the drive.
Cascaded Drive Pool. Any drives moved to a cascaded drive pool will be removed from
any drive pools they are currently in.
5. Click OK.
The new cascaded drive pool is displayed in the Cascaded Drive Pool list in the
Devices view.
See also:
“Deleting Drives from a Cascaded Drive Pool” on page 109
“Deleting a Cascaded Drive Pool” on page 110
2. Select the cascaded drive pool to which you want to add a drive.
3. Under Drive Pool Tasks in the task pane, select Add device.
Item Description
Drive Pool Name Displays the name of the drive pool to which you want to add
drives.
Select the drives to be Select the drives you want to include in the drive pool.
included in this Drive
Pool
5. Click OK.
Managing
the mouse arrow icon displays a plus sign (+) in a box. The drive will still be in the Backup
Devices
Exec device database and will still be available for use in other drive pools. It is not
necessary to delete drives from a cascaded drive pool before you delete that pool; the
drives are automatically removed when the cascaded drive pool is deleted.
The following instructions describe the menu-driven method.
2. Select the cascaded drive pool from which you want to delete a drive.
3. Select the drive you want to delete from the cascaded drive pool.
4. Under Drive Pool Tasks in the task pane, select Remove device.
The name of the drive you want to remove from the cascaded drive pool is displayed.
5. Click Yes to remove this drive from the cascaded drive pool.
See also:
“Deleting a Cascaded Drive Pool” on page 110
“Erasing Media” on page 168
2. Under Cascaded Drive Pools, select the drive pool you want to delete.
4. Click Yes.
5. If there are scheduled jobs assigned to the deleted drive pool, you are prompted to
redirect the jobs to another drive pool or stand-alone device.
See also:
“Retargeting Jobs from a Deleted Drive Pool or Media Set” on page 103
2. Under Cascaded Drive Pools, select the drive pool you want to rename.
4. On the Rename dialog box, type the new name for the cascaded drive pool, and click
OK.
Managing
drive pool.
Devices
▼ To view properties of a cascaded drive pool:
2. Under Cascaded Drive Pools, select the drive pool for which you want to view
properties.
Item Description
Name Displays the name of the drive pool. Rename the drive pool by
typing a new name in this field.
Creation Date Displays the date and time that this drive pool was created.
4. After viewing the properties of the cascaded drive pool, click OK.
Note You can also run BE Diagnostics for a remote server (see “Running Diagnostics on
Remote Server” on page 556).
Server tab
Server tab
Item Description
Status The status of the media server. An active media server’s status
displays “Running”.
Serial # The serial number under which Backup Exec is installed. “Eval
Edition” is displayed if a serial number was not provided during
Backup Exec’s installation.
Server time
Managing
Devices
Start date and time The date and time Backup Exec was initially installed and launched
on this media server.
Statistics
Number of devices The number of storage devices connected to this media server. In
systems with multi-drive robotic libraries attached, each drive in the
robotic library represents a separate device.
Number of active jobs The number of jobs currently in progress on this media server.
Total number of alerts The total number of alerts generated on this media server since the
since server startup Backup Exec services were last started.
Total number of jobs The total number of jobs executed on this media server since the
completed since Backup Exec services were last started.
server startup
System tab
Item Description
Operating system
Processor
Item Description
Memory
Page file The size of the Windows NT virtual memory paging file.
Run diagnostics Note If you call Technical Support with a problem, they may request
that you run Diagnostics and provide them with the results.
Technical Support can use the results of this utility to pinpoint
your problem and quickly solve it.
Click to run the Diagnostics utility to a file
(bediag(machine_name).txt) that includes useful configuration
information for the server such as:
Managing
Devices
Account groups, account privileges, and environment settings.
Backup Exec Software version and registry information, Backup
Exec Agent listing, Windows NT version information, SCSI
hardware configuration, SQL Server information, Driver services
information, and NT Services information.
File Server information, supported shared directories, and
Windows sockets information.
Note Support for a single robotic library drive for use with Backup Exec is provided
when you purchase Backup Exec. To enable support for additional robotic library
drives, you must purchase the Library Expansion Option.
Most of the details presented in the drive properties tabbed pages are for information
only.
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a
robotic library, click Robotic Libraries.
Managing
Devices
The General tab for drive properties provides the following information:
Item Description
Name The name of the drive. You can also rename the device by typing a
new name in this field.
Item Description
Date in service The date this device was first detected by this installation of Backup
Exec.
See also:
“Viewing and Using Drive Properties and Statistics” on page 116
“Viewing Backup Folder Properties” on page 152
Caution Preferred Configuration settings are used to tune the performance of backup
and restore operations.
Managing
Devices
The Configuration tab for drive properties provides the following information:
Item Description
Enable device for Backup Select this check box in order for Backup Exec to use this device.
Exec Clear this check box to disable the device, and allow it to be available
for other applications. If the box is clear, the device is disabled, and
cannot be used by Backup Exec.
After changing the option, click OK.
Pause device Select this check box to pause the device, and then click OK. To
resume the device, clear the check box and click OK.
Device offline If the device is offline, this message is displayed. No operations are
allowed on the device until it is online again. When the device is
online, no message is displayed.
The device is displayed as offline if:
The device was turned off after Backup Exec was started.
The device was being used by another application (such as a
Windows backup utility) when Backup Exec was started.
The device is removed from the computer.
A tape drive failure occurred.
A tape is stuck in the drive.
The firmware of the drive was updated; Backup Exec will behave
as if the drive with its old name or identity no longer exists.
Item Description
Priority The Priority field is only available when the drive belongs to a drive
pool and is selected for viewing under the drive pool icon. Drive
properties displayed under the Robotic Libraries or Stand-alone
Managing
Devices
Drives icon do not display the Priority field. For more information,
see “Setting Priorities for Drives in a Drive Pool” on page 99.
Set a priority for a drive that determines the order in which the
drives in a drive pool are used. In the Priority box, type a number
from 1 to 99, with 1 designating this drive as the first drive to be used
in the drive pool, or click the arrows to select a value.
The default priority is 10 so all drives have the same priority initially.
The drive to which you assign the lowest number is the first drive to
be used in the drive pool; for example, a drive with a priority of 1 is
used before a drive with a priority of 5.
Note Overwrite and append periods for media take precedence over
drive priority.
Item Description
Preferred configuration
Note Preferred Configuration settings are used to tune the performance of backup and restore
operations.
Changing Preferred Configuration settings is not generally recommended and may have a
negative effect on your backup and system performance. Any changes should be thoroughly
tested to make sure system performance does not deteriorate before being put into general
use.
Block size (per device) The default is the preferred size of the blocks of data written to new
media in this device.
You can change the block size by selecting another size from the
scroll list, and then clicking OK.
Some devices (for example, DLT drives) provide better performance
when larger block sizes are used. The preferred block size can range
from 512 bytes to 64 kilobytes.
Backup Exec does not ensure that the requested block size is in fact
supported by that drive. You should check the drive specifications to
make sure that the block size is supported. If the drive does not
support a block size, it will default to its standard block size.
If the drive does not support block size configuration, this option is
unavailable.
Buffer size (per device) The default is the preferred amount of data sent to the drive on each
read or write request. The buffer size must be an even multiple of the
block size.
You can change the buffer size by selecting another size from the
scroll list, and then clicking OK. Depending on the amount of
memory in your system, increasing this value may improve drive
performance. Each type of drive requires a different buffer size to
achieve maximum throughput.
Buffer count The default is the preferred number of buffers allocated for this
device.
You can change the buffer count by selecting another count from the
scroll list, and then clicking OK.
Depending on the amount of memory in your system, increasing this
value may improve drive performance. Each type of drive requires a
different number of buffers to achieve maximum throughput.
If you change the buffer count, you may need to adjust the high
water count accordingly.
Item Description
High water count The default is the preferred number of buffers to be filled before data
is first sent to the drive, and any time after that if the drive
underruns.
You can change the high water count by selecting another count
from the scroll list, and then clicking OK.
The high water count cannot exceed the buffer count. A value of 0
disables the use of high water logic; that is, each buffer is sent to the
drive as it is filled.
The default setting provides satisfactory performance in most
instances; in some configurations, throughput performance may be
increased when other values are specified in this field. If you increase
or decrease the buffer count, the high water count should be adjusted
accordingly. If a drive has a high water count default of 0, it should
be left at 0.
Default Settings Click this button to return all the Preferred Configuration settings to
their defaults, and then click OK.
Managing
Devices
Read single block mode Select this check box to have this device read only one block of data
at a time. If this check box is selected, the drive will read a single
block of data at a time, regardless of the size of the buffer block.
VERITAS recommends selecting this option if the drive is a shared
storage device.
Write single block mode Select this check box to have this device write only one block of data
at a time. Selecting this check box provides greater control over the
handling of data write errors.
VERITAS recommends selecting this option if the drive is a shared
storage device.
Read SCSI pass-through Select this check box to have this device read data without going
mode through a Microsoft tape device API. Selecting this check box allows
the data to pass directly through the device driver and allows more
detailed information in the event device errors occur.
VERITAS recommends selecting this option if the drive is a shared
storage device.
Item Description
Write SCSI pass-through Select this check box to have this device write data without going
mode through the Microsoft tape device API. Selecting this check box
allows data to pass directly through the device driver and allows
more detailed information in the event device errors occur.
VERITAS recommends selecting this option if the drive is a shared
storage device.
See also:
“Viewing and Using Drive Properties and Statistics” on page 116
Managing
Devices
The Drive Properties SCSI Information tab provides the following information about the
Small Computer System Interface (SCSI):
Item Description
Port The identifying number of the port on the server to which the device
is attached.
Bus The identifying number of the bus to which the device is attached.
See also:
“Viewing and Using Drive Properties and Statistics” on page 116
Item Description
Last mount date Last date that media was mounted by this device.
Drive totals
Total Bytes written Number of bytes that have been written by this device.
Total Bytes read Number of bytes that have been read by this device.
Total mounts Number of times media has been mounted by this device.
Item Description
Total seeks The total number of seek operations (performed when a specific
piece of information is being located) that have been performed by
this device.
Total Hours in use The total number of hours that this drive has been in use (performing
read, write, mount, and seek operations).
Drive errors
Seek errors The number of errors encountered while trying to locate data.
Soft read errors The number of recoverable read errors encountered. If you receive
soft errors, it may indicate the beginning of a problem. If you receive
excessive errors for your environment, check the device and perform
maintenance on it, and check the media for damage.
Hard read errors The number of unrecoverable read errors encountered. If you receive
Managing
hard errors, check the device and perform maintenance on it, and
Devices
check the media for damage.
Soft write errors The number of recoverable write errors encountered. If you receive
soft errors, it may indicate the beginning of a problem. If you receive
excessive errors for your environment, check the device and perform
maintenance on it, and check the media for damage.
Hard write errors The number of unrecoverable write errors encountered. If you
receive hard errors, check the device and perform maintenance on it,
and check the media for damage.
See also:
“Viewing and Using Drive Properties and Statistics” on page 116
Item Description
Last cleaning date The last time a cleaning operation was performed on the drive.
Hours since last cleaning The number of hours that the drive has been in use since the last
cleaning.
Reset Cleaning Statistics Click this to reset all cleaning statistics to zero (stand-alone drives
only).
Item Description
Bytes written Number of bytes that have been written by this device since the last
cleaning.
Bytes read Number of bytes that have been read by this device since the last
cleaning.
Total mounts Number of times media has been mounted by this device since the
last cleaning.
Total seeks The total number of seek operations (performed when a specific
piece of information is being located) that have been performed by
this device since the last cleaning.
Hours in use The total number of hours that this drive has been in use (performing
read, write, mount, and seek operations) since the last cleaning.
Managing
Devices
Errors since last cleaning
Seek errors The number of errors encountered since the last cleaning while
trying to locate data.
Soft read errors The number of recoverable read errors encountered since the last
cleaning. If you receive soft errors, it may indicate the beginning of a
problem. If you receive excessive errors for your environment, check
the device and perform maintenance on it, and check the media for
damage.
Hard read errors The number of unrecoverable read errors encountered since the last
cleaning. If you receive hard errors, check the device and perform
maintenance on it, and check the media for damage.
Soft write errors The number of recoverable write errors encountered since the last
cleaning. If you receive soft errors, it may indicate the beginning of a
problem. If you receive excessive errors for your environment, check
the device and perform maintenance on it, and check the media for
damage.
Item Description
Hard write errors The number of unrecoverable write errors encountered since the last
cleaning. If you receive hard errors, check the device and perform
maintenance on it, and check the media for damage.
See also:
“Viewing and Using Drive Properties and Statistics” on page 116
Item Description
Media Type Type of media, such as 4mm, and any defined category of this media
type, such as CLN for cleaning tape. Media types that have numbers
appearing in brackets (for example, 4mm [6]) can be used to define
specific bar code rules.
Read Displays Yes if this media type can be read by the drive; otherwise,
displays No.
Write Displays Yes if this media type can be written to by the drive;
otherwise, displays No.
Backup Exec’s ADAMM database maintains a list of media types, such as 4MM, and then
further defines the subcategories or specifics of a media type. For example, a 4MM media
type can include 4MM DDS-1 with a length of 60m and the storage capacity of 1.3 GB.
Managing
Another 4MM tape might also be a 4MM DDS-1 but have a length of 90m and a storage
Devices
capacity of 2.0 GB.
By default, the Media Types tab for a drive lists all known media type categories and
allows all media types to be used for both read and write operations. If a number appears
in brackets behind the media type, that media entry is available for use when creating a
bar code rule. You can specify that the drive be limited to performing read and write
operations on specific media types. For example, if your drive’s documentation states that
the drive cannot perform write operations to a 4MM DDS-4 tape, you can select that
media type from this dialog box, clear the Write check box, and then click OK. This
information is then incorporated in the ADAMM database, allowing Backup Exec to
exclude this media type when searching for media to be used for an operation (such as a
backup job) requiring the writing of data to the media.
See also:
“Viewing and Using Drive Properties and Statistics” on page 116
“Bar Code Labeling in Mixed Media Libraries” on page 199
Backup Exec’s Advanced Device and Media Management (ADAMM) feature provides
powerful functionality for robotic libraries. With typical robotic library modules, you
divide slots in the robotic library into defined groups, and then target backups to those
groups. This arrangement works fine as long as there is enough media in the group to
process the jobs targeted there. Problems occur when the data exceeds the available media
in the group, because operations cannot continue until media is physically added. This
situation can take place even though slots in the robotic library assigned to other groups
contain usable media.
Backup Exec’s Device and Media Management feature solves the problems associated
with typical robotic library modules. Rather than targeting a backup job to a specific
group of slots with a finite number of media, Backup Exec accesses all of the media in the
robotic library and uses media that belongs to the job’s targeted media set. If the backup
job exceeds the capacity of one piece of media, Backup Exec searches all media contained
in the robotic library, finds a suitable media, and uses it for the job.
For example:
An operator has a robotic library with six slots. She puts in six blank tapes and targets
backup jobs to various media sets within the robotic library. Depending on whether
the backups are overwrite or append jobs, Backup Exec automatically allocates
available tapes in the robotic library. If a job exceeds the capacity of one tape and
another overwritable tape is available in the robotic library, the job will automatically
continue on that tape. When Backup Exec runs out of tapes, it prompts the operator to
add more Scratch media.
In a robotic library, Backup Exec selects the oldest recyclable media in the library to use
first. If more than one media meeting the requirements is found, Backup Exec then selects
the media in the lowest-numbered slot, that is, media in slot 2 would be chosen over
equivalent media in slot 4.
If a job requiring overwritable media is targeted to a robotic library and no overwritable
media is available, the job is skipped and the next job targeted to the robotic library is
queued. When overwritable media becomes available either by the addition of media to
the robotic library or the overwrite protection period expiring for a media currently in the
robotic library, the skipped job will run.
See also:
“VERITAS Backup Exec - Library Expansion Option” on page 1143
Managing
Devices
If your robotic library uses a zero-based slot configuration, be sure the Slot Base field on
the Configuration tab of the robot’s Properties dialog box displays 0.
After completing the configuration of your robotic library, you should perform an
Inventory operation to update Backup Exec’s media database.
During startup, Backup Exec expects the storage devices in the robotic library to be empty.
If there is media in the device, Backup Exec tries to return the media to its original
magazine slot. If, for any reason, it cannot return the media to the slot, an error message
appears requesting that the media be ejected from the storage device.
See also:
“Setting Up Robotic Library Hardware” on page 1143
“Installing Backup Exec” on page 46
“First Time Startup Wizard” on page 74
“Setting Up Cleaning Jobs for Robotic Library Drives” on page 178
2. Expand the server icon in the tree view, and then click Robotic Libraries.
Managing
Devices
The General tab provides the following information:
Item Description
Name The name of the robotic library. You can rename the device by typing a
new name in this field.
Robotic Library type The manufacturer and model number of the robotic library.
Date in service The date this device was first detected by Backup Exec.
Item Description
Full name Displays the robotic library name and server name; for example, robotic
library name(server name).
See also:
“Viewing Properties of a Robotic Library” on page 134
Item Description
Enable device for Select this check box to have Backup Exec use this device. Clear this
Backup Exec check box to disable the device, and allow it to be available for other
applications. If the check box is clear, the device is disabled, and cannot
be used by Backup Exec.
Enable startup Select this option to have Backup Exec initialize the robotic library
initialization when Backup Exec is started. Depending upon the robotic library,
initialization can include reading all bar code labels on media.
Enable bar code rules Select this check box to enable bar code rules (see “Bar Code Labeling in
Mixed Media Libraries” on page 199).
Enable Removable Select this option if you want to allow Removable Storage to share the
Storage (RSM) devices in robotic libraries between two or more applications. If the
device is enabled in Removable Storage, Backup Exec uses Removable
Managing
Devices
Storage for device and media operations; if the device is disabled in
Removable Storage, Backup Exec controls the device directly.
For more information about using Removable Storage with Backup
Exec’s Advanced Device and Media Management feature, see “Using
Microsoft’s Removable Storage Feature with Backup Exec” on page 161
Slot base Depicts the starting slot. Some robotic libraries have slots starting at "0";
others start at "1". If your robotic library uses a zero-based slot
configuration you can reassign how the slots are displayed by typing
the appropriate number in the Slot Base field.
See also:
“Viewing Properties of a Robotic Library” on page 134
The SCSI Information tab of a robotic library’s Properties dialog box displays the
following information:
Item Description
Port The identifying number of the port on the server to which the device is
attached.
Bus The identifying number of the bus to which the device is attached.
See also:
“Viewing Properties of a Robotic Library” on page 134
Managing
Devices
The Status tab of a robotic library’s Properties dialog box provides the following
information:
Item Description
Drive element count Number of drive elements contained in the robotic library.
Total mounts Number of times media has been mounted by this device.
See also:
“Viewing Properties of a Robotic Library” on page 134
▼ To create partitions:
3. Select the robotic library containing the slots that you want to partition.
4. Under Robotic Library Tasks in the task pane, select Configure partitions.
5. Select the robotic library slots to include in each partition by clicking the slots on
which each new partition should begin. A partition divider listing the range of slots
included in the partition is inserted wherever you click.
For example, if you want to create two, 5-slot partitions on a robotic library with 10
slots, click Slot 1 and Slot 6. In this example, Slots 1-5 will be included in the first
partition and Slots 6-10 will be included in the second.
Partitions can include any number of robotic library slots; however, the first partition
cannot be moved or deleted when other partitions exist.
Note Depending upon your robotic library configuration, the first slot could be
numbered 1 or 0. If your robotic library uses a zero-based slot configuration and
you assign the first partition to begin with slot 1, the Partition Utility will actually
use slot 0 as the first slot for partition 1 and adjust the starting slot accordingly for
all other partitions.
Managing
Devices
6. While defining your partitions, use the following buttons to help you make selections:
Item Description
Remove Partition Remove the selected partition. The slots contained in the partition
you are removing are added to the partition preceding it.
Item Description
Move Down Move the selected partition divider down to decrease the number
of slots in the partition. (The number of slots in the preceding
partition is increased.)
For example, if a robotic library that had been partitioned with partition 1 containing slots
1-2, partition 2 containing slots 3-4, and partition 3 containing slots 5-10 is repartitioned so
that partition 1 contains slots 1-4, partition 2 contains slots 5-6, and partition 3 contains
slots 7-10. Any jobs targeted to the old partition 2 (slots 3-4) will need to be retargeted.
Note If a job is targeted to a particular robotic library drive (or a drive pool that is not a
partition drive pool), the job defaults to the first partition in the robotic library.
See also:
“Creating Robotic Library Partitions” on page 140
“Retargeting Jobs from a Deleted Drive Pool or Media Set” on page 103
Managing
Devices
where you back up data to disk first and then transfer the data to a tape when more time is
available.
Before you can start using Backup-to-Disk, you need to create a backup folder, which is a
virtual device that Backup Exec treats as any real tape device. Backup folders can be part
of drive pools, but not cascaded drive pools. When you create a new backup folder,
Backup Exec automatically assigns a name and a path to it, but you can change both. You
can create as many backup folders as you need.
When you back up to disk, Backup Exec places the data in a backup file in the backup
folder you specify. Backup files are virtual media where backed up data is stored. Backup
files are like any other type of media, so you can inventory, catalog, erase, and restore
them.
Since Backup Exec recognizes the backup folders as devices, you can view them by
selecting Devices on the navigation bar. You can view the backup files from both the
Devices view and the Media view in Backup Exec. In Windows Explorer, the backup
folders display in the path you specified when you added the folders, and the backup files
display with a.bkf file extension. Each backup folder also contains a changer.cfg file
and a folder.cfg file, which store information about the backup files.
Note You should not delete or edit the changer.cfg or folder.cfg files.
If you use Backup Exec’s Intelligent Disaster Recovery (IDR) option, you must use remote
IDR to recover computers that include backup-to-disk files. The backup folders must be
available to the Backup Exec server you are using to restore the data.
See also:
“Viewing Devices” on page 90
You can use the following steps to manually add a new backup folder. You also can use
the Device Configuration Wizard to create a new backup folder.
Note If a Backup-to-Disk Warning appears, read it and then verify that the disk where
you want to create the backup folder has sufficient free space. If you do not want to
see this message every time you add a new folder, select Do not display this
message again. Then, click OK.
Managing
4. Select the appropriate options as follows: Devices
Item Description
Item Description
Path or Drive Enter the location where the folder is to reside. Path is required if the
option Backup-to-Disk folder is selected. Drive is specified if the
Removable Backup-to-Disk folder option is selected.
Note If you do not know the exact path, click the button next to the
Path field to select the correct path.
Backup-to-Disk folder Select this option if the folder is to exist on a device that has
non-removable media. This type of folder supports concurrent
operations from one or more media servers.
You can create a backup folder in any location where you can write a
file, such as:
NTFS partitions (local or remote)
Network Attached Storage (NAS) devices
DFS shares
FAT/FAT32 partitions (local or remote)
VERITAS Volume Manager partitions
RAID drives with any configuration
Mapped drives
NFS volumes
Note Backup Exec does not determine if the device is a
non-removable device; however, VERITAS recommends that
you do not select this option if you want to use removable
media, such as a zip drive.
Item Description
Removable Select this option if the folder is to exist on a device that has
Backup-to-Disk folder removable media. This type of folder supports spanning of backup
sets from one piece of media to another, but does not support
concurrent operations. This type of folder should not be shared
between media servers. When creating this type of folder, you must
specify only a device, not a path.
You can create removable backup-to-disk folders on any removable
device, provided the device appears as a drive letter and is
formatted with a file system. Removable devices can include:
CDR
CDR-W
DVD-R
DVD-RW
ZIP
JAZZ
Managing
Removable hard disk
Devices
For CDR, CDR-W, DVD-R, and DVD-RW, third-party software must
be used to format the media with a file system before it can be used
with Backup Exec.
Set Default Path Click this button if you want to set a default path for all future
backup folders. Then, type or select the default path.
5. Click OK.
The folder appears on the Devices tab below the Backup-to-Disk Folders icon and the All
Drives icon. It also appears in Windows Explorer as a folder. You can back up data to this
folder now.
See also:
“Viewing Devices” on page 90
5. On the Rename dialog box, type the new backup folder name, and then click OK.
6. If you want to rename the Windows folder in Windows Explorer, use the Windows
Rename option.
1. Add a new backup folder with a name and path that is different than the original
backup folder.
2. In Windows Explorer, copy and paste the backup files from the original backup folder
to the new backup folder.
4. Right-click the new backup folder, and then click Refresh on the shortcut menu, or
select the new backup folder and press <F5>.
5. Click the new backup folder and verify that the backup files appear in the right pane.
6. To rename the new backup folder to match the name of the original backup folder,
delete the original backup folder and then rename the new folder.
See also:
“Adding a Backup Folder” on page 144
“Renaming a Backup Folder” on page 148.
“Deleting a Backup File” on page 156
Managing
▼
Devices
To delete a backup folder:
5. Click Yes.
The backup folder is removed from Backup Exec, but the files and the folder still exist
on the disk. You can still recreate the backup folder at a later date if necessary. If you
do not want to delete the folder from the disk, you have completed this procedure.
6. If you want to delete the folder from the disk, use Windows Explorer to navigate to
the folder.
Caution If you delete the folder from the disk you cannot recreate it later. You lose all the
files from the folder.
7. Select the folder you want to delete, and then under General Tasks in the task bar,
select Delete.
8. Click Yes.
The folder is removed from the disk. You cannot recreate the folder or the files.
1. Add a new folder to Backup Exec using the same name and path as the deleted folder.
5. Under Media Tasks in the task pane, select Inventory and create and run an
inventory job.
When the inventory is complete, the files display on the results pane.
See also:
“Adding a Backup Folder” on page 144
“Inventorying Media in Devices” on page 165
2. Expand the icon for the workstation where the backup folder is located.
Managing
Devices
paused.
2. Expand the icon for the workstation where the backup folder is located.
Item Description
Name Name of the backup folder. You can type a new folder name here.
Path The path to the folder. You cannot change the path here.
Enable device for Select this check box to have Backup Exec use this device. Clear this
Backup Exec check box to disable the device, and allow it to be available for other
applications. If the check box is clear, the device is disabled, and
cannot be used by Backup Exec. After changing the option, click
OK.
Priority The Priority field is only available when the backup folder belongs
to a drive pool and is selected for viewing under the drive pool icon.
Backup folder properties displayed under the Backup-to-Disk
Folders and Removable Backup-to-Disk icons do not display the
Priority field. For more information, see “Setting Priorities for
Managing
Devices
Drives in a Drive Pool” on page 99.
Set a priority for a backup folder that determines the order in which
the devices in a drive pool are used. In the Priority box, type a
number from 1 to 99, with 1 designating this device as the first
device to be used in the drive pool, or click the arrows to select a
value.
The default priority is 10 so all devices have the same priority
initially. The device to which you assign the lowest number is the
first device to be used in the drive pool; for example, a device with a
priority of 1 is used before a device with a priority of 5.
Note Overwrite and append periods for media take precedence
over drive priority.
Pause device Select this check box to pause the device, and then click OK. To
resume the device, clear the box and click OK.
Item Description
Maximum size for Type the maximum size for each backup-to-disk file contained in
Backup-to-Disk files this folder and then select either MB or GB as the unit of size. The
file size can be as small as 1 MB or as large as 4096 GB. The default is
1 GB.
Maximum number of Type the maximum number of backup sets to be written to each
backup sets per backup-to-disk file in this folder. The maximum number can range
Backup-to-Disk file from 1 to 8192. The default is 100.
Item Description
Disk space reserve Type the minimum number of megabytes or gigabytes of disk space
that can remain before the backup-to-disk folder stops accepting
jobs. If the backup-to-disk folder is a removable storage folder, the
jobs will span to new media after the reserved disk space reaches
this minimum.
Device settings
Auto detect settings Clear this check box if you have a storage device for which you can
set buffer reads or writes. Otherwise, when this option is selected
Backup Exec will detect the preferred settings for your device.
Buffered reads Select this check box if you do not want Backup Exec to auto-detect
device settings and you know that your device allows buffered
reads which is, the reading of large blocks of data.
Managing
Devices
Buffered writes Select this check box if you do not want Backup Exec to auto-detect
device settings and you know that your device allows buffered
writes, which is the writing of large blocks of data.
Concurrent Operations
8. Click OK.
2. Double-click the icon for the workstation where the backup folder is located.
4. Click the folder that contains the file you want to rename.
7. Type a new name for the file, and then click OK.
3. Use the Windows drag-and-drop feature to move the backup file into the Retired
Media set.
4. On the results pane, select the backup file you want to delete.
6. Click Yes, or if you selected multiple backup files, click Yes to All.
The backup file is deleted from Backup Exec, but not from the disk. To delete the
backup file from the disk, continue to step 7. If you do not want to delete the backup
file from the disk, you have completed this procedure.
Caution If you perform step 7 to delete the backup file from the disk, you can no longer
restore the deleted file.
7. Using Windows Explorer, navigate to the location where the backup file is stored.
2. Expand the icon for the workstation where the backup folder is located.
4. Select the folder where the backup file was located before you deleted it.
5. Under Backup-to-Disk Tasks in the task pane, select Inventory and create and run an
inventory job.
The backup file appears on the results pane when the inventory job completes.
Managing
Devices
See also:
“Inventorying Media in Devices” on page 165
2. Expand the icon for the workstation where the backup folder is located.
4. Click the backup folder that contains the file you want to view or change.
5. On the results pane, select the file you want to view or change.
Item Description
Name Name of the backup file. You can change the name of the backup file
by entering a new file name.
7. Click Management.
Managing
Devices
The Management properties of a backup-to-disk file include:
Item Description
Creation date The date and time this backup-to-disk file was created.
Allocation date The date and time that the backup-to-disk file was allocated to a
media set.
Modification date The date and time when data was last written to the backup-to-disk
file.
8. If you want to view the statistics and errors for this file, select the Statistics tab.
Item Description
Totals
Total Bytes Written Number of bytes that have been written to this media.
Total Bytes Read Number of bytes that have been read from this media.
Total Seeks Total number of seek operations (performed when a specific piece of
information is being located) that have been performed on this
media.
Total Hours in Use Total number of hours that this media has been in use.
Errors
Seek Errors The number of errors encountered while trying to locate data.
Item Description
Managing
allows applications to share removable storage devices. Removable Storage performs
Devices
requests for device access from different applications on a first in, first out basis. It also
tracks media usage for online media (media currently mounted in a robotic library) and
for offline media that has been installed previously in a robotic library. Removable Storage
does not manage single-slot tape drives.
On the media server, you can allow Removable Storage to share the devices in robotic
libraries between two or more applications, or you can allow some or all devices in robotic
libraries to be controlled and used exclusively by Backup Exec’s Advanced Device and
Media Management (ADAMM). If the device is enabled for Removable Storage through
the robotic library’s Properties (see “Viewing Robotic Library Configuration Properties”
on page 136), Backup Exec uses Removable Storage for device and media operations; if
the Enable Removable Storage is cleared, Backup Exec controls the device directly.
Note In some situations, Removable Storage does not support a robotic library, but may
still support some drives in the robotic library. When this happens, Removable
Storage disables the robotic libraries but enables the supported drives in the robotic
libraries. You should use the Removable Storage snap-in in an MMC to disable all of
the drives in the robotic library. This allows Backup Exec to control the robotic
library and all of the drives.
If you do not need to share the devices, exclusive use by Backup Exec will allow faster
tape backups and restores. If you allow exclusive use by Backup Exec, you can still enable
or disable devices in Removable Storage while Backup Exec is running; Backup Exec will
respond by switching to other devices in the robotic libraries as appropriate.
Note You should not enable Removable Storage for devices used with the SAN Shared
Storage Option (SAN SSO). RSM does not appropriately manage devices and media
used by multiple servers.
The Removable Storage database is automatically backed up by Backup Exec, and can be
restored if necessary. For more information, see “Advanced options for restore” on
page 412.
Note The Backup Exec services account must have Administrator rights to protect the
Removable Storage database. If the account does not have Administrator rights, the
following error message is recorded in the job log: "An error occurred while
exporting the RSM Database files. The RSM Database could not be backed up."
Only Microsoft tape class drivers can be used if you plan on using Backup Exec and the
Removable Storage feature. If you want to use a third party tape class driver or a
VERITAS tape class driver, you must disable the device through Removable Storage
before installing the driver.
Media that is in the Removable Storage Free media pool or that is unrecognizable by
Removable Storage is marked as unknown media within Backup Exec. You must launch an
Inventory job to mount and read the media header. The media is imported into Backup
Exec and marked as "in use" by Backup Exec. If you do not want that media used by
Backup Exec, delete it from the ADAMM database. For more information, see “Deleting
Media” on page 218.
Backup Exec cannot append to media prepared initially by Removable Storage. To be able
to use this media, you must run an overwrite operation. If media is introduced for the first
time into Removable Storage, but it was previously possessed by Backup Exec or written
to by Backup Exec during a mount operation, even on another server, then that media is
allocated to Backup Exec for exclusive use.
Managing
Devices
VERITAS recommends enabling or disabling devices using Removable Storage only when
the device is not in use and the internal drives are empty.
Managing
Devices
not currently in the robotic library, you are prompted to insert the media for the
restore operation. In this case, you are not required to re-inventory the slot where the
restore source media is placed.
When media that is not requested by Backup Exec is added or removed from the
magazine, you should perform an inventory operation on the changed slots. This updates
the media database so Backup Exec doesn’t load and unload each media in the magazine
searching for the correct media on which to process jobs. You can select specific slots to
inventory. If you swap media often you may want Backup Exec to perform an inventory
on the robotic library magazine each time Backup Exec services are started.
▼ To have Backup Exec perform an inventory each time Backup Exec starts:
4. Click OK.
2. Expand the server icon, click Stand-alone Drives, or if the device resides in a robotic
library, click Robotic Libraries.
3. If you want to inventory a drive or slot, select the drive or slot containing the media
you want to inventory, or select Slots.
a. Double-click the icon for the workstation where the backup folder is located.
d. Click the backup folder that contains the file you want to inventory.
Managing
Devices
6. Select the appropriate options as follows:
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
7. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
8. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
There may be a delay (up to several minutes for some drives) as the media is mounted and
inventoried.
The inventory operation can be monitored or canceled through the Job Monitor.
See also:
“Media Labeling” on page 196
“Inventory all drives on Backup Exec services startup” on page 85
Erasing Media
You can choose to erase media using either Quick erase or Long erase. Not all devices
support a long erase; those that do not will always perform a quick erase.
Quick erase writes an indicator at the beginning of the media that makes the data
contained on the media inaccessible. For most uses, a Quick erase is sufficient.
Long erase instructs the drive to physically erase the entire media. If you have sensitive
information on the media and you want to dispose of it, use Long erase. Running Long
erase on media can take several minutes to several hours to complete (depending on the
drive and the media capacity).
Quick and Long erase do not change the media label. To change a media label, use Label
Media or Rename prior to the Erase operation.
▼ To erase media:
2. Expand the server icon, click Stand-alone Drives, or if the device resides in a robotic
library, click Robotic Libraries.
3. Select the drive or slot containing the media you want to erase.
4. Under Media Tasks in the task pane, select either Erase media, quick or Erase media,
long.
Note If the drive does not support a long erase, Erase media, long will not be available.
Caution This operation will be performed on the current media in the drive or slot. If the
media has been changed since the last inventory operation was performed, the
media label in the next dialog may not match the media in the drive or slot
selected.
5. Click OK to continue.
The media displayed was read during the last inventory operation; the display does
not change until another inventory operation occurs. Therefore, if you change media
in the slot or drive but did not run Inventory, the media label displayed may not
match the actual media in the slot or drive.
Managing
Devices
7. Select the appropriate options as follows:
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
8. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
You can monitor the Erase operation through the Job Monitor.
You cannot cancel an Erase operation after it has started; however, you can use Cancel to
stop a queued erase operation.
Caution You cannot restore the data that you erase. Before you erase files, be sure that
you no longer need them.
2. Expand the icon for the workstation where the backup folder is located.
3. Under Backup-to-Disk Folders, click the backup folder that contains the file you
want to erase.
5. Under Media Tasks in the task pane, select Erase media, quick.
6. Click OK to continue.
7. Click Yes, or if more than one file was selected, click Yes to All.
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
9. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
Managing
Devices
10. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
Retensioning a Tape
Use Retension media to run the tape in the tape drive from beginning to end at a fast
speed so that the tape winds evenly and runs more smoothly past the tape drive heads.
Refer to the documentation that came with your tape drive to see how often this utility
should be performed.
Retensioning is primarily for Mini Cartridge and quarter-inch cartridges and is not
supported on most other types of tape drives.
▼ To retension a tape:
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a
robotic library, click Robotic Libraries.
3. Select the drive or slot containing the media you want to retension.
Retension options
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
6. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification, and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
Caution Formatting erases the media. All data on the media is lost.
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a
robotic library, click Robotic Libraries.
3. Select the drive or slot containing the media you want to format.
Managing
Devices
The media label that is displayed was read during the last inventory operation. The
media label displayed does not change until another inventory operation occurs.
Therefore, if you changed media in the slot or drive but did not run Inventory, the
media label displayed may not match the actual media in the slot or drive.
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
7. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification, and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
Labeling Media
Use Label media to immediately write a new media label on the media in the selected
device; this operation destroys any data on the media. To change the media label without
destroying the data on the media (until an overwrite operation occurs), use Rename.
▼ To label media:
2. Expand the server icon, click Stand-alone Drives, or if the drive is attached to a
robotic library, click Robotic Libraries.
3. Select the drive or slot containing the media you want to label.
Caution This operation will be performed on the current media in the drive or slot. If the
media has been changed since the last inventory operation was performed, the
media label in the next dialog may not match the media in the drive or slot
selected.
5. Click OK.
6. Type the name you want to use as the recorded media label for this media.
7. Click OK to erase all data on the media and re-label the media.
Managing
Devices
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
9. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
11. Write this same media label on an external label fixed to the outside of the physical
media.
The job will be submitted as a Run now job, unless you submitted the job on hold. You
can monitor the Label media operation from the Job Monitor.
You cannot cancel a Label media operation after it has started; however, you can use
Cancel to stop a queued Label media operation.
See also:
“Renaming Media Labels” on page 202
Managing
Eject media options
Devices
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
6. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification, and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
2. Click Robotic Libraries, and then click the robotic library for which you are setting up
the cleaning.
2. Click Robotic Libraries, and then click the robotic library containing the drive.
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
6. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
Managing
Devices
7. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
You can monitor the cleaning job through the Job Monitor. You can view cleaning
statistics for the drive by right-clicking the drive and selecting Properties. For more
information, see “Viewing and Using Drive Properties and Statistics” on page 116.
Importing Media
Backup Exec fully supports robotic libraries with portals through its Import and Export
utility jobs. It is important to create Import and Export jobs when changing media in your
robotic library so that the Backup Exec database is updated. You can select any number of
slots to import and export.
When you use the Import utility, the slots you highlighted are checked for media. If media
is present, it is exported to the portals. After all the media has been exported, you are
prompted to insert new media into the portal so it can be imported. This process
continues until all of the requested media has been imported into the robotic library. If
your robotic library uses a media magazine, make sure no jobs are currently running and
that all media are ejected from the drive and are back in the magazine slots before
swapping the magazine.
3. Click Slots.
4. On the results pane, select the slots you want to import media to.
Import options
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
7. If you want Backup Exec to inventory the media after the job completes, double-click
Settings, click Options and select the following:
Auto-inventory option
Item Description
Auto-inventory after Select this option to have Backup Exec automatically create an
import is completed inventory job to run after the import job completes.
8. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
You can monitor the import job through the Job Monitor.
Managing
Devices
Exporting Media
The Import media and Export media utilities allow Backup Exec to fully support robotic
libraries with portals. When you use the Export media utility on one or more robotic
library slots, the exported media is placed in the portals. If you select more media than
there are portals, the robotic library will fill as many slots as possible, then you are
prompted to remove the media from the portal. This process continues until all of the
selected media has been removed from the robotic library.
▼ To export media:
3. Click Slots.
4. On the results pane, select the slots you want to export media from.
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
7. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
8. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
You can monitor the export job through the Job Monitor.
Lock options
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
5. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
Managing
Devices
6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
You can monitor the lock job through the Job Monitor.
Unlock options
Item Description
Job name Type a name for the job or accept the default name.
Job priority Select the priority for the job. Available options are:
Lowest
Low
Medium
High
Highest
5. If you want a person or group to be notified when the job completes, on the
Properties pane, under Settings, click Notification and select the options you want
(see “Selecting Recipients for Job Notification” on page 492).
6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
You can monitor the unlock job through the Job Monitor.
Management
With Backup Exec, you are not required to select media for jobs; it is done for you by the
Media
Advanced Device and Media Management (ADAMM) component. At any given time,
Backup Exec is aware of all media that is loaded into attached storage devices, media that
is offline, and media that has been placed in media vaults. Each media has a status that
allows Backup Exec to identify which media can be written to and which media is
overwrite-protected.
Your media rotation strategy must balance between your need to save useful data as long
as possible, and the fact that media are not in infinite supply. The trade-off between the
longevity of stored backup data and the cost of more media is controlled in Backup Exec
by restrictions placed on data that is written to media. A restriction is placed on how long
new jobs can be written to the media after the first job has been written (the append period),
and another restriction is placed on how long the data is preserved after it is written (the
overwrite protection period).
185
Media Overwrite Protection
These two restrictions, the append period and the overwrite protection period, combine to
form a policy that can be applied to groups of media. These policies are called media sets,
which are containers for media that have the same append period and the same overwrite
protection period. The append period and overwrite protection period are attributes of
the container.
Media Set
Append
Period 5 Days
Overwrite
Protection
Period 30 Days
The append period is the amount of time that data can be appended (added) to a media.
The append period is measured from the time the media was first allocated (assigned) to
the media set. It can be specified in hours, days, weeks, or years.
The overwrite protection period is the amount of time that media is protected from being
overwritten. It can be specified in hours, days, weeks, or years. The overwrite protection
period is measured from the time when the last append backup job completed. When the
overwrite protection period is over, the media becomes recyclable and can be overwritten.
OVERWRITE_PROTECTION_PERIOD
The Overwrite Protection Period
begins each time data is appended
to the media.
Management
New
Media
data After the Overwrite Protection
Period expires, the media
becomes “Recyclable.” This
means that new data can be
written to the beginning of the
TIME
Old
data
The append and overwrite protection periods that you specify apply to all the data on the
media. Therefore, each time data is appended to a media, the time remaining in the
overwrite protection period is reset and the countdown restarted.
Because the overwrite protection period does not begin until the job completes, the
amount of time that the job takes to complete affects the amount of time until the media
can be overwritten.
For example, suppose you create a media set named Weekly with an overwrite protection
period of seven days, and an append period of 0, and you schedule a full backup job to
run each Friday at 9 p.m. When it is time for the full backup to run at 9 p.m. the following
Friday, the job cannot run because the first backup job that ran the previous Friday did not
complete until 10:10 p.m. Therefore, the overwrite protection period for the Weekly media
set still has 70 minutes remaining.
Typically, to prevent this situation, you would shorten the overwrite protection period to
take into account the amount of time a job may run. For this example, the scheduled job
recurring at 9 p.m. can run if the overwrite protection period is set to 6 days instead of 7
days.
Management
current, the media are allocated to that media set. Backup Exec automatically allocates
Media
media. When the overwrite protection period expires, the media become recyclable. The
media are still displayed as being in that media set, but with a status of recyclable. You do
not need to move recyclable media to or from a media set; Backup Exec can overwrite the
recyclable media in any media set whenever more media are needed for other jobs.
See also:
“Creating Media Sets” on page 227
“Deleting a Media Set” on page 229
“Renaming a Media Set” on page 230
“Editing and Viewing Media Set Properties” on page 230
Caution The None option is not recommended because it does not protect data from being
overwritten.
Section 1 in the figure “Media Overwrite Protection” on page 194 illustrates the Media
Overwrite Protection level.
See also:
“Setting Default Media Options” on page 203
Media Categories
Backup Exec recognizes media that is inserted into storage devices and categorizes it as:
◆ All Media. All media that has been introduced into Backup Exec. Any media that is
available for overwriting in backup operations, such as scratch or recyclable media,
displays in blue. When you click the All Media icon, the Results pane displays
properties for the media in Backup Exec. For more information, see “Viewing Media
Information” on page 92.
◆ System Media. All media that has been introduced into Backup Exec, except those
media that have been allocated to a media set. System Media includes Scratch,
Retired, and Imported Media. Scratch media displays in blue in the Media and
Devices views.
- Scratch Media. Media that do not belong to a media set and can be overwritten,
including:
Management
◆ Media Sets. Media sets are groups of media that have the same overwrite protection
Media
period and append period. The overwrite protection period is the length of time that
data is retained on a specific media before becoming available for overwriting. The
append period is the length of time that data can be added to a media. You can create
different media sets, each with different data overwrite protection and append
periods. When a backup job is created, you target it to a specific media set that defines
the particular data overwrite protection and append periods you want applied to the
backup job. Use media sets to set up media rotation strategies. Media sets include:
- Allocated media. Media that belong to a media set. Allocated media are always
displayed in the allocated media set, even after the data overwrite protection date
expires.
- Recyclable media. Media that are allocated to a media set, but have expired
overwrite protection periods.
You can move recyclable media to Scratch Media, or you can let it remain in the
media set list. When a backup job runs, by default Backup Exec uses scratch
media first, and then selected recyclable media that is in the targeted media set for
overwriting if no scratch media are available. To change this default, on the Tools
menu, click Options, and then under Settings, click Media Management.
Recyclable media, along with scratch media, display in blue in the Media and
Devices views.
Note In a drive pool, Backup Exec selects the oldest recyclable media in all of the drives
in the drive pool to use first. In a robotic library, Backup Exec selects the oldest
recyclable media in the library to use first. If the robotic library is partitioned,
Backup Exec searches for the oldest recyclable media in the targeted partition only.
See also:
“Setting Default Media Options” on page 203
Full + Overwrite recyclable media first 1. Recyclable media in the targeted media set
2. Scratch media
3. Recyclable media in any media set
Partial + Overwrite recyclable media first 1. Recyclable media in the targeted media set
2. Scratch media
Management
3. Recyclable media in any media set
Media
4. Imported media
None - No overwrite protection + overwrite 1. Recyclable media in the targeted media set
recyclable media first 2. Scratch media
Caution This option is not recommended 3. Recyclable media in any media set
because it does not protect data from being
4. Imported media
overwritten.
5. Allocated media in any media set
1
1
1
Media Overwrite
Protection Level
2
Recyclable Media
(other media sets)
Allocated Media
Imported Media
The most obvious candidates for backup jobs requiring overwritable media are scratch
media and recyclable media (media with expired overwrite protection periods). These are
the first types of media for which Backup Exec searches when a backup requires media to
overwrite. The search pattern is different according to whether you have chosen Full,
Partial, or None. The media indicate that a type of media set is examined for availability.
In addition to setting overwrite protection levels, you must set overwrite options, which
set the order in which Backup Exec searches for overwritable media.
See also
“Media Overwrite Options” on page 192
Caution If an append job fills a media, the job continues on another piece of overwritable
media. Depending on your configuration, overwritable media is selected from
Scratch Media or Recyclable Media. If the media in the drive is not
overwritable, a message prompts you to insert overwritable media.
◆ Append to media, terminate job if no appendable media is available. When you are
performing an append backup operation and the backup job is set to this option,
Backup Exec searches for available media as follows:
1. Searches for appendable media in the media set targeted in the backup operation.
2. If no appendable media is found, the backup operation is terminated.
Management
See also:
Media
“Creating a Backup Job” on page 235
◆ Label the media. The Label Media operation immediately writes a new media label on
the media, which destroys any data contained on the media.
◆ Format the media. Formatting destroys any data contained on the media.
◆ Change the overwrite protection period for the media set so that it is expired. Select the media
set, and then under General Tasks, click Properties.
See also:
“Deleting Media” on page 218
“Editing and Viewing Media Set Properties” on page 230
“Media Overwrite Options” on page 192
Media Labeling
Media used in Backup Exec is identified by its media label. When new, blank, or unlabeled
media is used during a backup operation, Backup Exec automatically labels the media.
This label consists of a prefix that identifies the cartridge type, and an incrementing
number. For example, if the media is a 4mm tape, then the prefix would be 4M, followed
by 000001. The next media label generated for an unlabeled 4mm tape would be
4M000002, and so on.
You can allow the media label to be assigned automatically by Backup Exec, or you can
specify a label prefix and number to be assigned for a type of media. For example, you can
specify that all 4mm media that are entered for the first time into this installation of
Backup Exec are labeled with a prefix of ACCT, and with numbering starting from 1000.
You can specify another media type to be labeled with a prefix of FIN, and with
numbering starting at 10,000. Customizing labels in this manner can help you recognize
and organize media.
Another type of media label used by Backup Exec is the media ID, which is a unique label
assigned by Backup Exec to individual media used in Backup Exec. The media ID is used
internally by Backup Exec in order to keep statistics on each media. Because the media
label or bar code label for media can be changed, Backup Exec must use the media ID,
which cannot be changed or erased, to preserve continuity in record keeping for each
individual media. The media ID has no effect on the media label, or on your ability to
rename, label, or erase media.
At times, you may need to use the media ID to distinguish media that have duplicate
media labels. Duplicate labels can be automatically generated in instances when Backup
Exec is reinstalled or media from another Backup Exec installation is used. Use the media
ID to distinguish between duplicate labels. You can view the media ID in a media’s
property page.
Write the media label on an external label fixed to the outside of the physical media.
Whenever you change the media label, you should also change the external label to
match.
Three methods are available in Backup Exec to change a media label:
◆ Label Media operation. Writes a new media label on the media. This write operation
Management
destroys any data on the media. This option is available on the Devices view.
Media
◆ Rename operation. Changes the name of the media in the display, but does not write the
new label to the media until an overwrite operation occurs. The data on the media is
viable until the media is overwritten.
◆ Edit the label in the media’s property page. Editing the label changes the name of the
media in the display, but does not write the new label to the media until an overwrite
operation occurs. The data on the media is viable until the media is overwritten.
See also:
“Setting Default Media Options” on page 203
“Labeling Media” on page 174
“Bar Code Labeling” on page 198
“Renaming Media Labels” on page 202
“Viewing General Media Properties” on page 220
Management
Media
3. Click Add.
Item Description
Select a Media Select the media for which you want to add a bar code rule.
Type
Vendor Type the name of this library’s manufacturer. You can find the name of
the library manufacturer on the library’s property page. This is an
optional field. By typing a vendor name here, you restrict the bar code
rule to that vendor’s libraries. If you are creating a general bar code rule
that applies to libraries from different vendors, do not type anything in
this field. This field is not case-sensitive.
Barcode Prefix Type a code to be placed before the bar code. This code represents a
media type. The code can be up to 16 characters, and any combination of
letters and numbers. This field is not case-sensitive.
Barcode Suffix Type a code to be placed after the bar code. This code represents a media
type. The code can be up to 16 characters, and any combination of letters
and numbers. This field is not case-sensitive.
5. Click OK to save the bar code label rule for the media.
6. Verify that bar code rules are enabled for the robotic library. The bar code rules do not
go into effect until you enable them for the robotic library. For more information, see
Management
“Viewing Robotic Library Configuration Properties” on page 136.
Media
▼ To change a bar code rule:
3. Click Modify.
6. Click OK.
4. Click Delete.
6. Click OK.
5. Click OK.
6. Write this media label on an external label fixed to the outside of the physical media.
See also:
“Viewing General Media Properties” on page 220
Management
2. On the Properties pane, under Settings, click Media Management.
Media
Item Description
Full - protect allocated Select this option to protect media in media sets and imported
and imported media media from being overwritten.
This is the safest option to choose because the media being
protected cannot be overwritten until:
The overwrite protection period for the media expires.
You move media that belongs to an active media set to
Scratch Media.
You erase, format, or label the media.
You move media from Imported Media to Scratch Media.
Item Description
Partial - protect only Select this option to allow imported and scratch media to be
allocated media overwritten. Media in a media set that has an overwrite
protection period that has not expired (allocated media),
cannot be overwritten.
This option is recommended if you have media from an earlier
version of Backup Exec or another product (imported media)
that you want to reuse.
Management
Media
Item Description
Overwrite scratch media Select this option to have Backup Exec overwrite scratch
before overwriting media first when an overwrite job occurs.
recyclable media If no scratch media are found in any of the storage devices,
contained in the Backup Exec overwrites recyclable media in the targeted
targeted media set media set.
If no recyclable media are found, Backup Exec automatically
searches for other media to overwrite. The media that is
overwritten depends on the level of overwrite protection that
you set (Full, Partial, or None). See “How Backup Exec
searches for overwritable media” on page 193.
If you select this option, more media may be required for the
same number of jobs than if you choose to overwrite
recyclable media first.
Because this option affects the order in which Backup Exec
overwrites media, choosing to overwrite scratch media first
may allow the recyclable media to be preserved longer for
possible recovery.
Overwrite recyclable Select this option to have Backup Exec overwrite recyclable
media contained in the media in the targeted media set when an overwrite job occurs.
targeted media set If no recyclable media are found in any of the storage devices,
before overwriting Backup Exec overwrites scratch media.
scratch media
If no recyclable or scratch media are found, Backup Exec
automatically searches for media to overwrite. The media that
is overwritten depends on the level of overwrite protection
that you set (Full, Partial, or None). See “How Backup Exec
searches for overwritable media” on page 193.
If you choose to overwrite recyclable media in the targeted
media set first, you will re-use the same media more
frequently than if you choose to overwrite scratch media first.
Media type Select the type of media for which you want to create default
labels. For example, if you select 4mm, then all 4mm-type
media that are entered for the first time into this installation of
Backup Exec are assigned a label according to what you
specify in the following fields.
Item Description
Prefix Displays the current default prefix for the selected cartridge
type. To specify a new prefix on the label, type from one to
eight alpha-numeric characters.
Next value Displays the next number that will be included in the label of
the next media that matches the selected cartridge type when
that media is entered for the first time into this installation of
Backup Exec. This number is incremented by one each time a
media that matches the selected cartridge type is entered into
this installation of Backup Exec.
For example, if Cartridge type is set to 4mm, and Next value is
set to 1, the first time a 4mm media is entered into this
installation of Backup Exec, its label will include the number 1.
The label on the next 4mm media entered will include the
number 2.
To enter a new value, type from one to eight numeric
characters. This number must not exceed the number specified
in the Digits field.
Management
000003, and so on.
Media
If the Next value exceeds the entry in the Digits field, the extra
digit is added. Using the previous example, if label numbering
continued until 999,999, the next label would be 1,000,000 even
though the value specified in Digits is 6.
Rolling over the label numbering to 1,000,000 and 1,000,001
rather than 000,000 and 000,001 prevents the duplication of
labels.
The number entered in the Digits field must be in the range of
three to eight.
Item Description
Backup-to-Disk default Type the default path for new backup folders. This default
folder location path appears in the New Backup-to-Disk Folder dialog box
where you add a new backup folder. For more information,
see “Using Backup-to-Disk Folders and Files” on page 143.
When making selections for backups you are targeting to a
backup folder, avoid including that backup folder in the
selections for the job. For example, if you create a new backup
folder in c:\Backup Folders and then select the entire c:\
volume for backup, make sure you exclude c:\Backup Folders
from the selection list.
When adding backup folders, make sure there is sufficient
space on the disk for the data you are backing up. Backups
that exceed the size of available disk space will fail.
4. Click OK.
See also:
“Media Overwrite Options” on page 192
“Media Append Options” on page 195
“Media Labeling” on page 196
Media Location
Backup Exec helps you track the location of your media. There are three categories
available for tracking media:
◆ Online location. The online location lists media that reside in a storage device, robotic
library slot, or Backup-to-Disk folder. The online location is defined by Backup Exec,
so you cannot delete or rename it. In addition, you cannot add media to the online
location.
Note If you move media from an online location, its overwrite protection period and
append period remain in effect.
◆ Offline location. The offline location displays all media that are onsite but are not in
drives or slots, or media vaults. Media are automatically moved to this location if you
use Backup Exec to remove media from a device or slot. You can add media to the
offline location from another media location. To move offline media back to online,
you must run an inventory of the devices or slot, or you must catalog the media. You
cannot delete or rename the offline location.
◆ User-defined media vault. A media vault is a logical representation of the actual physical
location of media. You can create user-defined media vaults to keep track of where
media is physically stored, such as a special media room, a scratch bin, or an offsite
location. For example, you could create a media vault where media to be sent offsite
are moved. Then print the Media Vault Contents report, which lists the media
contained in that vault, to accompany the physical media to their offsite storage. You
can create as many user-defined media vaults as necessary.
Management
See also:
Media
“Finding Media in a Location or Vault” on page 210
“Renaming a User-defined Media Vault” on page 211
“Adding Media to the Offline Location or a User-Defined Vault” on page 211
“Moving Media by Dragging and Dropping” on page 212
“Deleting a User-defined Media Vault” on page 213
“Media Vault Contents Report” on page 524
2. Under Media Location Tasks on the task pane, click New media vault.
4. Click OK.
▼ To find media:
3. Under Media Location Tasks on the task pane, click Find media.
4. Type the name from the media label of the media you want to find.
5. Click OK.
Backup Exec highlights the location of the media and displays its properties in the
preview pane.
Note If you are using BEWAC, the preview pane is not available.
2. On the Media selections pane, click the media vault you want to rename.
5. Click OK.
Management
Media
2. In the Media selections pane, select the media location or vault to which you want to
add media.
3. Under Media Location Tasks in the task pane, click Add media to selected vault.
4. Type the media label or scan the bar code label for the media you want to add to this
vault.
5. Click Add.
6. Repeat steps 4 and 5 for all the media you want to add.
7. Click OK.
Note If you move media from an online location, its overwrite protection period and append
period remain in effect.
Offline No No Yes No No
location
2. On the Media selections pane, click the vault containing the media.
3. Select the media from the Results pane, and drag it to the new location.
2. On the Media selection pane, select the media vault you want to delete.
4. Click Yes to delete, or, if you are deleting multiple vaults, click Yes to All to delete
without prompting for each vault.
Management
Media
Full Backup
Week 2
Management
Note When this backup strategy is first implemented, you must start with a full backup.
Media
The Father/Son strategy is easy to administrate and allows you to keep data longer than
the Son strategy, but it is not suitable for the stringent data protection needs of most
network environments.
Incremental or
Full Backup Differential
Backup
1. From the Tools menu, point to Wizards, and then select Media Rotation Wizard.
Note You also can find the Media Rotation wizard on the Job Setup screen. On the
navigation bar, click Job Setup. Under Backup Strategy Tasks on the task pane,
click Set up media rotation.
Management
Media
Media Operations
You can perform several types of operations on media. You can delete media from the
Retired Media set, move media to a different media set, or create a new catalog for a piece
of media. In addition, you can view properties for the media, including the general,
management, statistical, and cleaning properties.
See also:
“Deleting Media” on page 218
“Moving Media” on page 219
“Cataloging Media in a Drive” on page 397
“Viewing General Media Properties” on page 220
“Viewing Media Management Properties” on page 222
“Viewing Media Statistical Properties” on page 223
“Viewing Media Cleaning Properties” on page 225
Deleting Media
You may want to delete media when:
◆ You have a lot of offsite media that you do not want to recycle.
◆ You throw away damaged or old media.
Media can only be deleted from Backup Exec when it is part of the Retired Media set.
When deleted media is reused in Backup Exec, it is recognized as imported media. Before
you can restore from the media it must be cataloged.
Note Deleting media from Backup Exec is not the same as erasing media.
▼ To delete media:
2. If the media is not already in Retired Media, you must move it there.
To look at the contents of Retired Media, expand the server icon, then expand System
Media, then expand Retired Media.
To move media to Retired Media, drag the media to the Retired Media icon.
5. Click Yes or Yes to All to delete the media that are displayed.
See also:
“Removing Damaged Media” on page 196
Moving Media
You may want to move media when:
◆ Media is reported as generating too many errors and needs to be retired.
◆ You no longer want to keep the data on imported media and want to reuse the media.
When you move media to a media set, the media takes the append and overwrite
protection period properties of the media set to which it was moved.
▼ To move media:
Management
2. Expand All Media to display a list of media, and then select the media you want to
move.
Media
3. You can drag the media to a media set, or under Media Tasks on the task pane, click
Move.
4. Click the Down arrow next to the Move this media to field to display the media set to
which you want to move this media, and then click OK.
2. Expand the All Media icon, and then select the media that you want to view.
Item Description
Media Label Media label that was assigned automatically by Backup Exec,
or that was assigned or changed by the administrator, or that
was a pre-assigned bar code label.
You can edit the media label, which is limited to 32 characters.
Editing the label changes the name of the media in the display,
but does not write the new label to the media until an
overwrite operation occurs. When you edit a media label, try
to make it a concise identifier that will remain constant even
when the media is reused. You should write this media label
on a label fixed to the outside of the physical media.
Duplicate labels can be automatically generated. For example,
reinstalling Backup Exec or bringing media from another
Backup Exec installation could cause duplication in labels.
Duplicate labels are allowed, but not recommended.
Note If a bar code is available, and a bar code-equipped
device is used, then the media label automatically
defaults to that bar code.
Media Description By default, displays the original media label if the media is
imported media.
You can edit the media description, which is limited to 128
characters, to make it a more descriptive label.
Media Type Media type and subtype (if available). Click the button next to
the field to change the media type or subtype.
Item Description
Used Capacity The amount of raw capacity on the media that has been used.
Used Capacity is calculated by subtracting Available Capacity
from Total Capacity.
Used Capacity may or may not equal Bytes Written.
Available Capacity The amount of expected raw capacity on the media that
remains unused. Some tape devices support the ability to read
the amount of remaining capacity of the media that is
currently loaded in the device. If a tape device supports
reading of the remaining capacity amount, then Available
Capacity is derived from the remaining capacity amount.
Otherwise, Available Capacity is calculated by subtracting
Bytes Written from Total Capacity.
Because Free Space is reported in terms of unused raw
capacity, review Bytes Written and Compression Ratio to
better estimate if there is enough free space to accommodate a
specific job.
Total Capacity The amount of expected total raw capacity of the media. Some
tape devices support the ability to read the amount of total
capacity of the media that is currently loaded in the device. If a
tape device supports reading of the total capacity amount,
then Total Capacity is derived from the total capacity amount.
Otherwise, Total Capacity is estimated based on past usage of
Management
the media.
Media
Bytes Written The amount of data that has been written into blocks on the
media. Bytes Written may differ from Used Capacity due to
the effects of data compression and media flaws. Data
compression will tend to increase Bytes Written when
compared to Used Capacity. Media flaws will decrease Bytes
Written when compared to Used Capacity.
Item Description
See also:
“Media Labeling” on page 196
“Creating a Test Run Job” on page 307
“Viewing Media Information” on page 92
“Viewing Media Statistical Properties” on page 223
“Viewing Media Cleaning Properties” on page 225
2. Expand the All Media icon, and then select the media that you want to view.
Item Description
Creation date Date and time when the media was first entered into Backup Exec.
Allocation date Date and time when the media was added to a media set as a result
of an overwrite operation.
Modification date Date and time when data was last written to the media.
Note In BEWAC, the server’s date and time format are used instead of the client’s date
and time format.
5. Click OK.
See also:
“Viewing General Media Properties” on page 220
“Viewing Media Cleaning Properties” on page 225
2. Expand the All Media icon, and then select the media that you want to view.
Management
Item Description
Media
Totals
Total bytes written Number of bytes that have been written to this media.
Total bytes read Number of bytes that have been read from this media.
Total seeks The total number of seek operations (performed when a specific
piece of information is being located) that have been performed on
this media.
Total hours in use The total number of hours that this media has been in use.
Errors
Item Description
Seek errors The number of errors encountered while trying to locate data.
Soft read errors The number of recoverable read errors encountered. If you receive
soft errors, it may indicate the beginning of a problem. If you receive
excessive errors for your environment, check the media for damage.
Hard read errors The number of unrecoverable read errors encountered. If you
receive hard errors, check the media for damage.
Soft write errors The number of recoverable write errors encountered. If you receive
soft errors, it may indicate the beginning of a problem. If you receive
excessive errors for your environment, check the media for damage.
Hard write errors The number of unrecoverable write errors encountered. If you
receive hard errors, check the media for damage.
5. Click OK.
See also:
“Editing and Viewing Media Set Properties” on page 230
“Creating Media Sets” on page 227
2. Expand the All Media icon, and then select the media that you want to view.
Item Description
Number of cleanings Displays the number of cleanings performed so far by this cleaning
media.
Maximum number of Type the maximum number of times you want to use this media for
cleanings cleaning. If the media contains Media Auxiliary Memory, the
maximum number of cleanings displays automatically.
Management
5. Click OK.
Media
Media Sets
A media set is a container for media. When you create a new media set, you must set an
append period and an overwrite protection period for the set. When media is placed into
the media set, that media takes on the attributes of the media set. Media sets can contain
allocated media and recyclable media.
When you create a backup job, you must identify a media set that will receive the backed
up files. You can create media sets manually or using the Media Set Wizard.
See also:
“Creating Media Sets” on page 227
“Deleting a Media Set” on page 229
“Renaming a Media Set” on page 230
“Editing and Viewing Media Set Properties” on page 230
2. Under Media Set Tasks in the task pane, click New Media Set.
Item Description
Creation date Date and time when the media set was created. Backup Exec
sets the date and time automatically. You cannot change them.
Management
Media
Item Description
Overwrite protection Enter the length of time in hours, days, weeks, or years to
period retain the data on the media before the media can be
overwritten (unless the media is erased, formatted, labeled,
moved to Scratch Media, or if the Media Overwrite Protection
Level is set to None).
The overwrite protection period begins when the backup job is
completed. If there is an append period, the overwrite
protection period begins again each time an append job
completes. Because the overwrite protection period does not
begin until the job completes, the amount of time that the job
takes to complete affects the amount of time until the media
can be overwritten. You may shorten the overwrite protection
period to take into account the amount of time a job may run.
For example, setting the overwrite protection period for seven
days and the append period for four days ensures that data
will not be overwritten for at least seven days, and that data
can be appended to the media for the next four days. The last
data appended to this media is retained for at least seven days.
Because of the method Backup Exec uses to compute time, the
unit of time that you enter may be converted. For example, if
you enter 14 days, the next time you view this property, it may
be displayed as two weeks.
The default is Infinite - Don’t Allow Overwrite, which
protects the media from being overwritten for 1,000 years,
unless the media is erased, formatted, labeled, moved to
Scratch Media, or if the media overwrite protection level is set
to None.
Append period Enter the length of time in hours, days, or weeks, that data can
be added to media. Because of the method Backup Exec uses
to compute time, the unit of time that you enter may be
converted. For example, if you enter 14 days, the next time you
view this property, it may be displayed as two weeks.
The append period starts when the first backup job is written
to this media.
The default is Infinite - Allow Append, which allows data to
be appended until the media capacity is reached.
4. Click OK.
Caution Make sure that the media set to which you move the media has the appropriate
overwrite protection and append periods.
2. In the Media selection pane, under Media Sets, select the media set that you want to
delete.
4. Click Yes to delete the media set, or if you selected multiple media sets to delete, click
Yes to All to delete all the selected media sets without further prompting.
5. If there are scheduled jobs allocated to the deleted media set, you are prompted to
redirect the jobs to another media set.
Management
Retarget Jobs dialog box
6. In the Media Set selection box, click the Down arrow to see more options, and then
select the new media set to which you want to redirect the scheduled jobs.
7. Click Yes to redirect the displayed job to the selected media set, or if there are multiple
scheduled jobs, click Yes to All to redirect all scheduled jobs to this media set without
further prompting.
The scheduled jobs are redirected.
2. In the Media selection pane, under Media Sets, select the media set you want to
rename.
4. In the Name field, type the new name you want to assign to this media set.
5. Click OK.
2. In the Media selection pane, under Media Sets, select a media set.
Item Description
Item Description
Overwrite protection Enter the length of time, in hours, days, weeks, or years to
period retain the data on the media before the media can be
overwritten (unless the media is erased, formatted, labeled,
moved to Scratch Media, or if the Media Overwrite Protection
Level is set to None).
The overwrite protection period is measured from the last time
data was appended to the media.
For example, setting the Overwrite protection period for seven
days and the Append period for four days ensures that data
will not be overwritten for at least seven days, and that data
can be appended to the media for the next four days. The last
data appended to this media is retained for seven days.
Because of the method Backup Exec uses to compute time, the
unit of time that you enter may be converted. For example, if
you enter 14 days, the next time you view this property, it may
be displayed as two weeks.
The default is Infinite - Don’t Allow Overwrite, which
protects the media from being overwritten for 1,000 years,
unless the media is erased, formatted, labeled, moved to
Scratch Media, or if the Media Overwrite Protection Level is
set to None.
Management
Append period Enter the length of time, in hours, days, or weeks, that data
Media
may be added to the media. Because of the method Backup
Exec uses to compute time, the unit of time that you enter may
be converted. For example, if you enter 14 days, the next time
you view this property, it may be displayed as two weeks.
The append period starts when the first backup job is written
to this media.
The default is Infinite - Allow Append which allows data to
be appended until the media capacity is reached.
5. Click OK.
Backing Up
◆ Using Backup Exec’s Windows Explorer interface. Select and back up files and folders
from Windows Explorer without having to launch the Backup Exec Administration
Data
Console.
◆ Running a one-button backup job. Select one-button backup from the Backup Exec
Assistant or the Information Desk to quickly back up the local media server.
One-button backups use the default backup settings.
233
Backup Exec allows you to set default options for backup jobs, but also gives you the
flexibility to override these options for specific jobs. You can direct all backup jobs to a
specified network segment, isolating the backup data so that other connected networks
are not affected when backup operations are performed, or you can specify a LAN for a
single job.
Backup Exec also provides the option of setting up backup jobs that take place on a
routine basis (scheduled jobs), or set up one-time backup jobs.
In addition to creating backup jobs to protect data, you can create:
◆ A test run of a scheduled backup job to determine whether or not it is likely to
complete successfully.
◆ A job that duplicates backup sets either from previously backed up data or data
scheduled to be backed up. If the backup sets are to be duplicated from a scheduled
job, the duplicate backup data job runs automatically after the backup job completes.
◆ Verify jobs to test the integrity of the media.
◆ Archive jobs to preserve storage space.
◆ Resource discovery jobs to find new resources that may need to be backed up on a
regular basis.
Before you begin backing up data, you should develop a backup strategy that includes the
method, frequency, and media rotation methods that are appropriate for your
organization. You may have different strategies for different areas of the organization.
You may also want to configure device and media management before creating backup
jobs. You can set up Backup Exec to use physical devices, such as stand-alone drives, or
virtual devices, such as backup-to-disk folders. Or, you can have Backup Exec use logical
groupings of devices, such as drive pools. Specifically, you might want to perform the
following tasks to help you manage storage hardware and media most effectively:
◆ Set up drive pools for systems with more than one storage device. For more
information, see “Creating Drive Pools” on page 97.
◆ Create media sets. For more information, see “Creating Media Sets” on page 227.
Caution To protect remote resources, you must install the Backup Exec Remote Agent
for Windows Servers on the remote computer. The Remote Agent is a system
service that runs on Windows servers and workstations and provides efficient
backup processing by locally performing tasks that, in typical backup
technologies, require extensive network interaction.
See also:
“Creating a Backup Job” on page 235
“Setting Default Backup Options” on page 312
“About Backup Strategies” on page 336
“VERITAS Backup Exec - Remote Agent” on page 821
2. Under Backup Tasks in the task pane, select New job using wizard.
2. From the backup selections pane, select the data you want to back up (see “Selecting
Data to Back Up” on page 259) or choose an existing selection list from the Selection
list name field (see “Using Selection Lists” on page 267). For more information about
the Selections options, see “Selections Options for Backup Jobs” on page 239.
3. On the Properties pane, under Destination, click Device and Media, and complete
the options as described in “Device and Media Options for Backup Jobs and
Templates” on page 241.
4. On the Properties pane, under Settings, click General and complete the options as
described in “General Options for Backup Jobs” on page 246.
You can select additional configuration options for your backup job if, before selecting
to run or submit the job, you select additional options on the Backup Job Properties
dialog box’s Properties pane:
- If you want to set advanced options for the backup job, on the Properties pane,
under Settings, click Advanced. Then, complete the options as described in
“Advanced Options for Backup Jobs” on page 251.
- If you want to set commands to run before or after a job, on the Properties pane,
under Settings, click Pre/Post Commands and complete the options as described
in “Pre/Post Commands for Backup or Restore Jobs” on page 255.
- If you are using the Advanced Open File Option, on the Properties pane, under
Settings, select Advanced Open File and complete the options as described in
“Selecting the Advanced Open File Option for a Single Backup Job” on page 964.
- If you are backing up other platform types or database agents, such as NetWare,
Exchange, or SQL, select the platform type or database agent from the Properties
pane. Refer to the chapter or appendix for that item for instructions on completing
the options.
- If you want to change the backup network for this job, on the Properties pane,
under Settings, click Network, and then set up the backup network for this job
(see “Changing the Backup Network for a Job” on page 328).
- If you want Backup Exec to notify someone when the backup job completes, on
the Properties pane, under Settings, click Notification (see “Selecting Recipients
for Job Notification” on page 492).
5. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358), and then click Submit.
Note If you are using Backup Exec Web Administration Console (BEWAC), click Next to
run the job or set the scheduling options.
Backing Up
Data
6. If the backup job summary appears, review it, and then click OK to run the job. If you
want to turn off the job summary for future backup jobs, from the Tools menu, select
Options, and then clear Display the job summary dialog before creating a backup
job (see “Backup Exec Defaults” on page 84).
Note If you are using BEWAC, click Finish to run the job. If you are not satisfied with the
settings you selected, click Back. However, you must reset all of the settings.
BEWAC does not save the settings when you click Back.
Note If a drive loses power during a backup operation, you should restart the backup job
using a different tape. You can restore the data written to the tape up to the point of
the power loss, but you should not reuse the tape for subsequent backup
operations.
See also:
“Using the Backup Wizard” on page 236
“Selecting Data to Back Up” on page 259
“Setting Default Backup Options” on page 312
“Creating a New Backup Template” on page 276
“Creating a New Backup Job from a Template” on page 283
Item Description
Selection list name If you are creating a job using an existing selection list, select the
selection list you want to use (see “Using Selection Lists” on page 267). Backing Up
Data
Otherwise, use the default Selection list name, which creates a new
selection list using this name.
Load Selections from Click this button if you want to use a previously created selection list or
Existing List merge existing selection lists (see “Using Selection Lists” on page 267).
Item Description
View Format
Show file details Select this option to display details about the files available for
selecting.
Text Select this option to view selections as a list of files and directories.
Advanced Click this button if you want to use the Advanced File Selection for
selecting files for backing up (see “Including or Excluding Files for
Backup Using Advanced File Selection” on page 262).
Include subdirectories Select this option if you want to select the contents of all the subfolders
when a directory is selected.
See also:
“Selecting Data to Back Up” on page 259
“Changing the Order for Processing Backup Selections” on page 265
“Changing Logon Accounts for Resources” on page 266
“Including or Excluding Files for Backup Using Advanced File Selection” on page 262
“Creating Selection Lists” on page 267
“Setting Up User-defined Selections” on page 275
Backing Up
Data
Item Description
Item Description
Media set Select the media set for the backup (see “Editing and Viewing Media
Set Properties” on page 230). If you select Overwrite, the media in
the drive is overwritten if the media is scratch, or if its overwrite
protection period has expired. If allocated or imported media are in
the drive, they may also be overwritten depending on the Media
Overwrite Protection Level that is set. For more information, see
“Setting Default Media Options” on page 203.
If you selected one of the append options, the backup will be added
to an appendable media (if one exists).
Family name Specify a name for the new or overwritable media. This name is used
to identify the media in the Restore Selections dialog boxes.
The family name defaults to “Media created date time”. To customize
the family name, you can use any combination of the following
variables in this field:
%s - includes the media server name
%j - includes the job name
%d - includes the date the media was created
%t - includes the time the media was created
Backing Up
Data
Item Description
Overwrite media Select this option to place this backup on an overwritable media.
Make sure that appropriate media is in the stand-alone drive or drive
pool you select in the Device field in this dialog box.
The media in the drive is overwritten if the media is scratch or
recyclable (its overwrite protection period has expired). If allocated
or imported media are in the drive, they may also be overwritten
depending on the Media Overwrite Protection Level that is set. For
more information, see “Setting Default Media Options” on page 203.
Depending on your configuration, overwritable media is selected
from scratch media or recyclable media. For more information, see
“Media Overwrite Options” on page 192.
If the media in the drive is not overwritable, an alert appears
requesting that you insert overwritable media.
Append to media, Select this option to append this backup to the media set listed in the
overwrite if no appendable Media Set field in this dialog box. The backup set is appended if an
media is available appendable media is available in the selected media set; if not, an
overwritable media is used and added to the media set.
Note If an append job fills a media, the job continues on another
piece of overwritable media.
If the media in the drive is not overwritable, an alert appears
requesting that you insert overwritable 0media.
Append to media, Select this option to append this backup to the media set listed in the
terminate job if no Media Set field in this dialog box. The backup set is appended if an
appendable media is appendable media is available in the selected media set; if not, the
available job is terminated.
Eject media after job Select this option to have Backup Exec automatically eject the media
completes in the drive when the operation completes.
Write checksums to media Select this option if checksums are to be calculated for each data
stream written to tape, and then written in a separate stream
immediately following the data stream. If this option is not selected,
backup performance may be improved, but there will be no way to
verify the integrity of the data on the tape.
Item Description
Retension media before Select this option to have Backup Exec run the tape in the drive from
backup beginning to end at a fast speed, which helps the tape wind evenly
and run more smoothly past the tape drive heads. Retensioning is
primarily for Mini Cartridge and quarter-inch cartridges and is not
supported on most other types of tape drives.
Media Protection
Password protect media Select this option if you are overwriting the media and you want to
protect it. When the Enter Password dialog box appears, enter a
media password. When a password-protected media is taken to
another location, such as another media server, the password is
required to catalog the tape.
Note Password protected media can be erased without requiring the
password.
Change password Click this button to change the password for the media.
Backing Up
Data
Item Description
Job name Enter the name for this backup job, or accept the default name that
appears. The job name must be unique.
Job priority Select the priority level for this job. If another job is scheduled to run
at the same time as this job, the priority you set determines which job
runs first. Your choices are:
Highest
High
Medium
Low
Lowest
Backup set description Type a description of the information you are backing up.
Backing Up
Data
Item Description
Backup method for files Select a backup method. Your choices are:
FULL - Back Up Files - Reset Archive Bit. Includes all of the
selected data on a volume and resets the archive bit to indicate
that the files have been backed up.
COPY - Back Up Files. Includes all selected data, and does not
affect any media rotation scheme because the archive bit is not
reset.
DIFFERENTIAL - Changed Files. Includes all files that have
changed (based on the archive bit) since the last full backup, and
does not affect any media rotation scheme because the archive bit
is not reset.
INCREMENTAL - Changed Files - Reset Archive Bit. Includes
only the files that have changed (based on the archive bit) since
the last full or incremental backup and resets the archive bit to
indicate that the files have been backed up.
FULL - Back Up Files - Allow incrementals and differentials
using modified time. Includes all of the selected data on a
volume and allows the use of incrementals and differentials
using the modified date and time stamp.
DIFFERENTIAL - Using modified time. Includes all files since
the last full backup using the files’ last modified date and time
stamp.
INCREMENTAL - Using modified time. Includes all files that
have changed since the last full or incremental backup using the
files’ last modified date and time stamp.
DAILY - Files that Changed Today. Backs up all files that were
created or modified today.
WORKING SET - All files last accessed in (x) days. Includes all
files that were created or modified since the last full or
incremental backup. If you select this backup method, you can
then indicate in the Files accessed in x days field that you want
to include data that has been accessed in a specific number of
days.
ARCHIVE - Delete files after successful copy backup. Backs up
the selected data, verifies the media, and then deletes the data
from the volume. For data to be deleted, rights to delete a file
must be granted; otherwise data will be backed up, but not
deleted.
Note Backup Exec does not delete data from Backup Exec Agent
workstations when using the archive feature.
For more information, see “Understanding Backup Methods and
Their Advantages” on page 340.
Item Description
Files accessed in x days If you selected the working set backup method in the Backup
method for files field, use this field to specify the number of days for
which to include accessed files.
Note VERITAS recommends that you specify at least 30 days in
order to include the data needed to make your system
operational if you have to restore a working set backup.
Use the Windows Change Select this option if you want to use Windows’ NTFS Change
Journal if available Journal to determine which files have been modified since the last
full backup. This option can only be used with NTFS volumes and
only when the backup method selected is FULL - Back Up Files -
Allows incrementals and differentials using modified time,
DIFFERENTIAL - Using modified time or INCREMENTAL - Using
modified time.
Preserve tree on archive Select this option to retain the directory structure on the hard drive of
the files backed up in an archive job. This option is only available
when Archive is selected as the backup method.
Verify after backup Select this option to have Backup Exec automatically perform a
completes verify operation to make sure the media can be read once the backup
has been completed. Verifying all backups is recommended.
Backing Up
Data
Item Description
See also:
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
Backing Up
Data
Item Description
Enable single instance This option is only available if single instance store is being used.
backup for NTFS This option ensures that only one instance of a file for NTFS volumes
will be backed up regardless of the number of single instance store
(SIS) links that point to it.
Back up files and Select this check box to back up the information for the junction
directories by following points and the files and directories to which they are linked. If this
junction points check box is not selected, then only the information for the junction
points is backed up; the files and directories to which they are linked
are not backed up.
Note Since Mounted Drives that do not have a drive letter assigned
to them cannot be selected, the files and directories to which
they are linked are backed up regardless of whether this option
is selected.
Item Description
Back up data in Remote Select this check box to back up data that has been migrated from
Storage primary storage to secondary storage. The data is not recalled to its
original location; it is backed up directly to the backup media.
If this option is selected, you should not run a backup of your entire
system because Backup Exec has to load the data that has been
migrated to secondary storage and additional time is required for
any set that includes migrated data.
If this check box is cleared, only the placeholder that stores the
location of the data on secondary storage will be backed up, not the
data itself.
Note This option should not be selected if the device used for
secondary storage and backups contains only one drive
because Remote Storage and Backup Exec will compete for use
of the drive.
Set Remote Agent priority This option allows you to select the number of CPU cycles the media
server will use to maintain optimal server performance while
Remote Agent backups are running. The higher the priority, the more
the protected server’s CPU processing power is used during backup
operations.
Note Allocating fewer CPU cycles to a backup job may result in
slower backup performance.
This field contains the following options:
Normal Priority. Select this option to allocate the default number
of CPU cycles the protected server will use during a Remote
Agent backup.
Below Normal Priority. Select this option to allocate fewer
server CPU cycles to the backup job.
Lowest Priority. Select this option to allocate the fewest number
of CPU cycles to the backup job.
Backing Up
Data
Item Description
Open file backup when Advanced Open File Option is not used
Never Select this option to have Backup Exec skip open files if they are
encountered during the backup operation. A listing of skipped files
appears in the job log for the backup.
If closed within x seconds Select this option to have Backup Exec wait the specified time
interval for files to close before skipping the open file and continuing
the backup operation.
If the file does not close during the specified interval, it is skipped. A
listing of skipped files appears in the job log for the backup.
Note If multiple files are open, Backup Exec waits the specified time
interval for each file; depending on the number of open files,
this may significantly increase the backup time.
With a lock Select this option to have Backup Exec attempt to open files that are
in use. If Backup Exec is able to open a file, the file is locked while it
is being backed up to prevent other processes from writing to it.
Backing up open files is not as effective as closing applications and
allowing the files to be backed up in a consistent state.
Without a lock Select this option to have Backup Exec attempt to open files that are
in use. If Backup Exec is able to open the file, the file is NOT locked
while it is being backed up. This allows other applications to write
data to the file during the backup operation.
WARNING: This option allows files that contain inconsistent data
and possibly corrupt data to be backed up.
Note To back up the Removable Storage database in the \Ntmsdata subdirectory, the
WMI repository in the wbem\Repository subdirectory, and the Terminal Services
database in the default \LServer subdirectory, select the <Systemroot>\System32
directory. Files that you place in the Systemroot\System32\Ntmsdata subdirectory,
the \wbem\Repository subdirectory, or the default \LServer subdirectory may not
be backed up; only system files are included in the backup. It is recommended that
you do not place user files in the Systemroot\System32 directory or subdirectories.
See also:
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
“Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on
page 966
Item Description
Pre-job command Specify a command to be run on the specified server before the
backup or restore job is run. Use local paths, and make sure the paths
exist on each server and are correct.
Note Commands that require user interaction, such as prompts, are
not supported.
Post-job command Specify a command to be run on the specified server after the backup
or restore job has run. Use local paths, and make sure the paths exist
on each server and are correct.
Note Commands that require user interaction, such as prompts, are
not supported.
Item Description
Run job only if pre-job Select this option to run the backup or restore job only if the pre-job
command is successful command is successful. If the pre-job command fails, the job does not
run, and is marked as failed.
If it is critical that the job does not run if the pre-job command fails,
then select Allow pre- and post-job commands to be successful
only if completed with a return code of zero. If a non-zero code is
returned, it is interpreted by Backup Exec to mean that the pre-job
command did not run successfully. The job is not run and the job
status is marked as Failed.
Run post-job command Select this option to run the post-job command only if the pre-job
only if pre-job command is command is successful.
successful If it is critical that the post-job command does not run if the pre-job
command fails, then select Allow pre- and post job commands to be
successful only if completed with a return code of zero. If a
non-zero code is returned for the pre-job command, it is interpreted
by Backup Exec to mean that the pre-job command did not run
successfully. The post-job command does not run.
If you also select Run job only if pre-job command is successful,
and both the pre-job command and the job are successful, but the
post-job command returns a non-zero code, the job log reports both
the job and the post-job command as failed.
Run post-job command Select this option if it is critical to run the post-job command
even if job fails regardless of whether the job is successful or not.
If you also select Allow pre- and post job commands to be
successful only if completed with a return code of zero and the
post-job command returns a non-zero code, the job log reports the
post-job command as failed.
Backing Up
Data
Item Description
Allow pre- and post-job Select this option to allow Backup Exec to check the return codes of
commands to be the pre- and post-job commands to determine if they completed
successful only if successfully.
completed with a return An exit code of zero returned to the operating system by the pre- or
code of zero post-job command is interpreted by Backup Exec to mean that the
command completed successfully. A non-zero exit code is
interpreted by Backup Exec to mean the command ended with an
error.
After checking the return codes, Backup Exec continues processing
according to selections you made for running the pre- and post-job
commands.
If this option is not selected, the success of the pre- and post-job
commands is not determined based on the return code.
Cancel command if not Select the number of minutes Backup Exec should wait before
completed within x canceling a pre-job or post-job command that did not complete. The
minutes default time-out is 30 minutes.
On this media server Select this option to run the pre- and post-job commands on this
media server only.
On each server backed up Select this option to run the pre- and post-job commands one time on
each server backed up.
The pre- and post-job command selections apply to each server
independently. If you select this option, the pre- and
post-commands are run and completed for each server before
processing begins on the next selected server.
See also:
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
“Setting Default Backup Options” on page 312
“Setting Default Pre/Post Commands” on page 319
Local drives
Workstation agents
User-defined selections
is installed on the remote computer. For more information about System State, refer to
your Microsoft Windows 2000 or .NET documentation.
◆ Utility Partition. Includes the utility partitions installed on the system and available
for backup. Individual utility partition objects are named Utility Partition on Disk
Disk_Number (for example, Utility Partition on Disk 0), and cannot be expanded.
Backing up utility partitions is recommended when a full system backup is done, such
Note If the account to which you are logged on does not have sufficient rights, you are
required to supply another logon account that can be used to view files for backup.
To expand the view for an item, click the plus sign (+) next to it or double-click the item
name. To collapse the view, click the minus sign (-) next to an item or double-click the item
name.
To view the contents of an item, double-click the item’s icon. The item’s contents appear in
the right frame of the backup selections view. For all items (except System State), you can
traverse file levels from either side of the window by clicking folders and subfolders as
they appear.
To select data, select the check box next to the drive or directory you want to back up. The
check box and check mark displayed are described in the following.
See also:
“Protecting Windows.NET Systems” on page 333
“Backing Up NetWare Network Volumes” on page 335
To back up Microsoft’s Distributed File System (Dfs), select the Dfs links on the Dfs server.
Only the Dfs links themselves are backed up; the data that the links lead to is not
included.
To back up the data in the Dfs links, back up the data on the server where the data resides.
See also:
“Setting Up User-defined Selections” on page 275
“Restoring Distributed File System (Dfs) Links” on page 424
2. Select the resource that contains the files you want to include or exclude from the
backup.
3. Select the path or file that contains the files you want to include or exclude.
4. Click Advanced.
Note If the data does not match all of the criteria specified in the Advanced Backup File
Selection dialog box, Backup Exec does not include or exclude it in the backup.
Field Description
File Selection
Path If you want to include or exclude a specific file, type the name of
the folder and/or subfolder on the selected drive that contains the
file.
You can use wildcard characters. Use a question mark (?) to
represent any single character. Use a single asterisk (*) to
represent any number of characters before the next backslash. Use
a double asterisk (**) to represent any number of characters,
irrespective of any backslashes.
For example, on your C: drive you have a My Documents folder
that contains a subfolder called Work Files. There are three Work
Files subfolders called 1999, 2000, and 2001. Each one of those
subfolders has a subfolder called Personnel. If you type the path
as \My Documents\**\Personnel, the backup will include or
exclude:
C:\My Documents\Work Files\2001\Personnel
C:\My Documents\Work Files\2000\Personnel
C:\My Documents\Work Files\1999\Personnel
In addition, every subfolder below the ** wildcard is included or Backing Up
Data
excluded. However, the only files from the subfolders that are
included or excluded are those that match the file name you type
in the File field. So in the example above, every subfolder of
C:\My Documents is included in or excluded from the backup,
and only the files that match the file name you type in the File
field are included or excluded.
After you type the path, type the file name in the File field.
Field Description
File Type the name of the file you want to include in or exclude from
the backup.
You can use wildcard characters. Use a question mark (?) to
represent any single character. Use a single asterisk (*) to
represent any number of characters.
For example, to include all files with the .exe extension, type *.exe.
You can use more than one asterisk if you know that a file name
has certain letters in it, but not the exact file name. For example, to
include or exclude any file that has the name Sam in it, type
*Sam*.*.
The default entry is *.*, which means every file name with every
extension is selected.
After you type the file name, indicate whether you want to
include or exclude it.
Type
Include (Default) Select this option to include the files in the job.
Exclude Select this option to exclude the files from the job.
Selection Criteria
Include subdirectories Select this option if you want to select the contents of all the
subfolders when a directory is selected.
Only modified Files Select this to include or exclude modified files in the path you
specify.
Only read-only Files Select this to include or exclude files that cannot be modified.
Files dated Select this to include or exclude the files created or modified
during a specific time period. Then select the beginning and
ending dates.
Files not accessed in x Select this to include or exclude files that have not been accessed
days in a specified number of days. This is useful when you need to
migrate older files from your system.
7. Submit the operation using the same procedures as required for other backups. For
more information, see “Creating a Manual Backup Job by Configuring Job Properties”
on page 236.
5. Then, click Move Up or Move Down until the item is in the correct order. Click Make
First to move an item to the top of the list or click Make Last to move an item to the
bottom of the list.
6. Process the backup job (see “Creating a Manual Backup Job by Configuring Job
Properties” on page 236).
Backing Up
Data
5. Click Change.
6. Select the Backup Exec logon account you want to use for this backup selection, or
click New and create a new Backup Exec logon account (see “Creating a Backup Exec
Logon Account” on page 350).
7. Click OK.
2. Under Backup Tasks in the task pane, select New selection list.
Backing Up
Data
3. Select the resources you want to back up from the backup selections pane. For more
information about selecting data, see “Selecting Data to Back Up” on page 259.
Item Description
Load Selections from Click this button if you want to load an existing selection list or
Existing List merge multiple selection lists (see “Merging and Replacing Selection
Lists” on page 271).
View format
Item Description
Show file details Select this option to display details about the files available for
selecting.
Text Select this option to view selections as a list of files and directories.
Advanced Click this button if you want to use the Advanced File Selection for
selecting files for backing up (see “Including or Excluding Files for
Backup Using Advanced File Selection” on page 262).
Include subdirectories Select this option if you want to select the contents of all the
subfolders when a directory is selected.
5. Click OK.
See also:
“Using Selection Lists” on page 267
“Using Selection Lists to Create a Backup Job” on page 270
“Deleting Selection Lists” on page 272
“Editing Selection Lists” on page 273
“About the Excludes Selection List” on page 273
Backing Up
Data
3. Click the check box next each selection list you want to use for this backup.
You can select multiple selection lists. A merged selection list will then be created and
used for the job. The merged selection list will be saved separately and can be used for
other jobs.
4. Submit the operation using the same procedures required for other backup operations
(see “Creating a Manual Backup Job by Configuring Job Properties” on page 236).
You can combine selection lists with a template to quickly create a new backup job.
See also:
“Using Selection Lists” on page 267
“Creating Selection Lists” on page 267
“Deleting Selection Lists” on page 272
“Editing Selection Lists” on page 273
“About the Excludes Selection List” on page 273
“Creating a New Backup Job from a Template” on page 283
2. Under Backup Tasks in the task pane, select New selection list.
a. On the New Backup Selection List dialog box, select resources to include in the
selection list.
c. On the Use Selections dialog box, select the selection lists you want to merge with
the previously selected items.
d. Click Merge.
b. On the Use Selections dialog box, select the selection lists you want to replace
with the previously selected.
c. Click Replace.
5. Click OK.
6. Complete the other options on the New Backup Selection List dialog box as described
in “Selections options for selection list” on page 268.
7. Click OK.
2. Click the selection list you want to delete, and then click Delete.
3. Click Yes to delete the Selection List; click No to cancel the delete operation.
If the selection list is being used by a job, you will not be able to delete it.
See also:
“Using Selection Lists” on page 267
“Creating Selection Lists” on page 267
“Using Selection Lists to Create a Backup Job” on page 270
“Editing Selection Lists” on page 273
“About the Excludes Selection List” on page 273
2. On the Backup Selection Lists pane, select the selection list you want to edit.
4. If the selection list is being used by jobs, you will be prompted to click Yes to continue.
5. Make the changes you want to Selections, Resource Order, and Resource
Credentials.
6. Click OK.
See also:
“Using Selection Lists” on page 267
“Creating Selection Lists” on page 267
“Using Selection Lists to Create a Backup Job” on page 270
“Deleting Selection Lists” on page 272
“About the Excludes Selection List” on page 273
You can delete the Excludes Selection List. However, if you want to create a new Excludes
Selection List, use “Excludes” as the Selection List name.
The Name and Type, such as backup or restore, of each selection list appears.
3. Click Edit.
4. If the Excludes list has been previously edited, you can select the Selection rule you
want to edit and click Edit (see “Including or Excluding Files for Backup Using
Advanced File Selection” on page 262), or select the Selection rule you want to remove
and click Delete.
5. If this is the first time the Excludes list is being edited, click Insert (see “Including or
Excluding Files for Backup Using Advanced File Selection” on page 262).
6. Click OK to save your changes and exit the Edit Selection List window.
See also:
“Deleting Selection Lists” on page 272
“Creating Selection Lists” on page 267
4. In the UNC Name field, type the server name and volume name
Example: \\Production\graphics
Note TCP/IP addresses can also be provided for user-defined selections. For example:
\\10.0.0.0. Or you can use the computer name.
5. Click Add.
The share appears in the Selections defined section of the dialog box. Repeat steps
4-5 to add additional user-defined selections.
2. Under Backup Tasks in the task pane, select New job template.
3. Set up the Device and Media options for this template. See “Device and Media
options for backup job” on page 242 for detailed information about these options.
4. On the Properties pane, under Settings, click General and select options as described
in “General Options for Backup Job Templates” on page 278.
5. Additional options can be set by selecting on the Properties pane additional Settings
options, such as Advanced (see “Advanced Options for Backup Jobs” on page 251)
and Pre/Post Commands (see “Pre/Post Commands for Backup or Restore Jobs” on
page 255).
6. On the Properties pane, under Frequency, click Schedule to set the schedule options
for this template (see “Scheduling Jobs” on page 358).
7. Click OK.
See also:
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
“Using Selection Lists to Create a Backup Job” on page 270
Backing Up
Data
Item Description
Template name Type the name for this backup job template.
Backup set description Type a description of the information you are backing up.
Item Description
Backup method for files Select a backup method. Your choices are:
FULL - Back Up Files - Reset Archive Bit. Includes all of the
selected data on a volume and resets the archive bit to indicate
that the files have been backed up.
COPY - Back Up Files. Includes all selected data, and does not
affect any media rotation scheme because the archive bit is not
reset.
DIFFERENTIAL - Changed Files. Includes all files since the last
full backup.
INCREMENTAL - Changed Files - Reset Archive Bit. Includes
only the files that have changed since the last full or incremental
backup and resets the archive bit to indicate that the files have
been backed up.
FULL - Back Up Files - Allow incrementals and differentials
using modified time. Includes all of the selected data on a
volume and allows the use of incrementals and differentials
using the modified date and time stamp.
DIFFERENTIAL - Using modified time. Includes all files since
last full backup using the files’ last modified date and time
stamp.
INCREMENTAL - Using modified time. Includes all files since
the last full or incremental backup using the files’ last modified
date and time stamp.
DAILY - Files that Changed Today. Backs up all files with
today’s date.
WORKING SET - All files last accessed in (x) days. Includes all
files that were created or modified since the last full or
incremental backup. If you select this backup method, you can
then indicate in the Files accessed in x days field that you want
to include data that has been accessed in a specific number of
days.
ARCHIVE - Delete files after successful copy backup. Backs up Backing Up
Data
the selected data, verifies the media, and then deletes the data
from the volume. For data to be deleted, rights to delete a file
must be granted; otherwise data will be backed up, but not
deleted.
Note Backup Exec does not delete data from Backup Exec Agent
workstations when using the archive feature.
For more information, see “Understanding Backup Methods and
Their Advantages” on page 340.
Item Description
Files accessed in x days If you selected the working set backup method in the Backup
method for files field, use this field to specify the number of days for
which to include accessed files.
Note VERITAS recommends that you specify at least 30 days in
order to include the data needed to make your system
operational if you have to restore a working set backup.
Use the Windows Change Select this option if you want to use Windows’ NTFS Change
Journal if available Journal to determine which files have been modified since the
last full backup. This option can only be used with NTFS
volumes and only when the backup method selected is FULL
- Back Up Files - Allows incrementals and differentials
using modified time, DIFFERENTIAL - Using modified
time or INCREMENTAL - Using modified time.
Preserve tree on archive Select this option to retain the directory structure of the files backed
up in an archive job.
Verify after backup Select this option to have Backup Exec automatically perform a
completes verify operation to make sure the media can be read once the backup
has been completed. Verifying all backups is recommended.
Item Description
Backing Up
Data
2. On the Backup Job Templates pane, select the template you want to edit.
2. In the Backup Job Templates pane, select the template you want to copy.
4. Enter the name of the new template, and then click OK.
Backing Up
Data
3. Select the template you want to use for this backup job. If you want to create a new
template for this backup job, click New. Then, refer to “Creating a New Backup
Template” on page 276.
5. Choose the selection list you want to use for this backup job. If you want to create a
new selection list for this backup job, click New. Then refer to “Creating Selection
Lists” on page 267.
6. On the Properties pane, under Settings, click General and set general options for this
job as described in “General Options for New Job from Template” on page 284.
7. If you want Backup Exec to notify someone when the backup job completes, on the
Properties pane, under Settings, click Notification (see “Selecting Recipients for Job
Notification” on page 492).
General options for a job created from a backup job template include:
Item Description
Job priority Select the priority level for this job. If another job is scheduled to run at
the same time as this job, the priority you set determines which job runs
first. Your choices are:
Highest
High
Medium
Low
Lowest
Submit job on hold Select this option if you want to submit the job on hold.
Enable automatic Select this item if you want Backup Exec to automatically cancel the
cancellation feature backup job if it does not complete within a specific amount of time after
the scheduled start time. Then, in the Cancel job if not completed
within fields, select the amount of time you want Backup Exec to wait
before canceling the job.
Cancel job if not Indicate the number of minutes or hours you want Backup Exec to wait
completed within x before it cancels the backup job.
Backing Up
Data
2. From the Backup Job Templates pane, select the template you want to reapply.
3. Under Backup Tasks in the task pane, select Reapply Templates to Jobs.
5. Click Yes.
4. Click OK.
The Back up with Backup Exec option will now appear on the Windows Explorer
shortcut menu.
See also:
“Backup Exec Defaults” on page 84
“Submitting a Backup Job from Windows Explorer” on page 290
“Archiving Data” on page 293
Note If you have already specified and saved backup job settings, the Backup dialog box
appears. You can change backup job settings from the Backup dialog box. For more
information, see “Submitting a Backup Job from Windows Explorer” on page 290.
Backing Up
Data
Name Description
Server Name Type the name of the media server on which Backup Exec is
installed.
User Name View or change the user name. The default is the name of the user
currently logged on to the machine. You can enter a different user
or administrator.
Note If you are logged on as part of a workgroup, the user
domain is your local machine name.
Name Description
Backup Options
Job Name View or change the job name. The utility generates a unique name
for the backup job in the format: Backup <local machine
name><numeric ID>. If the job name exceeds 25 characters, the
utility truncates the local machine name. For example:
For a backup run on a machine named ADMN-30PAYROLL, the
utility could generate the job name Backup ADMN-30P 960576233.
If you change the default job name, you must ensure it is a unique
job name.
Include subdirectories in Select this option to include all subfolders within the selected
backup folders in the backup job.
Save Settings Select this option to save the backup settings as defaults for
subsequent backup jobs.
Note You must submit a backup job to save the settings in the
Registry.
Clear this option if you want to change the settings for a single
backup job but keep the defaults saved in the Registry.
Job Status View the status of a job, confirmation and error messages, and the
job ID.
Backing Up
Data
1. From Windows Explorer, select the files or folders you want to back up.
2. Right-click the selected files or folders and select Back up with Backup Exec from the
shortcut menu.
Note If you have not yet saved backup job settings, the Backup Settings dialog box
appears. You must specify settings before submitting a backup job. For more
information, see “Specifying or Changing Backup Settings for Windows Explorer”
on page 287.
Backup options
Name Description
Job Name View or change the job name. The utility generates a unique name
for the backup job in the format: Backup local machine name
numeric ID. If the job name exceeds 25 characters, the utility
truncates the local machine name. For example:
For a backup run on a machine named ADMN-30PAYROLL, the
utility could generate the job name Backup ADMN-30P 960576233.
If you change the default job name, you must ensure it is a unique
job name.
Include Subdirectories in Select this option to include all subfolders within the selected
Backup folders in the backup job.
Job Status View the status of a job, confirmation and error messages, and the
job ID.
Note The backup job defaults to the options set in the Backup tab. For more information,
see “Setting Default Backup Options” on page 312.
Backing Up
Data
5. Click Close Dialog after the backup job has been submitted and confirmed.
Note To submit another backup job, you must close the Backup dialog box.
See also:
“Specifying or Changing Backup Settings for Windows Explorer” on page 287
“Submitting a Backup Job from Windows Explorer” on page 290
Note You can also run a one-button backup job from the Backup Exec Assistant. To
activate the Backup Exec Assistant, on the Tools menu, select Backup Exec
Assistant.
3. On the Information Desk, under Getting Started, click Back up this media server
now with One-button backup.
Backup Exec submits the job to the job queue.
Archiving Data
With Backup Exec’s archive feature, you can free valuable disk space and reduce clutter
on your server volume by migrating stagnant directories and files from the server to
media.
If you select archive as your backup method when creating a job, Backup Exec backs up
the selected data, verifies the media, and then deletes the data from the volume.
Note For data to be deleted, rights to delete a file must be granted; otherwise data will be
backed up, but not deleted.
Backup Exec does not delete data from Backup Exec Agent workstations when using
the archive feature.
During an archive job, Backup Exec automatically performs a verify operation after the
data is backed up. If the verify operation fails, the archive job stops and you are notified. If
you get a verification failure, investigate the problem by viewing the job log, try to correct
the problem, and then retry the archive operation.
After the data is backed up and verified, Backup Exec automatically deletes the data
Backing Up
Data
included in the archive job. The job log contains a list of the data that was deleted.
Note The NTFS file system supports the last access date capability as does the VFAT file
system under Windows NT. However, files accessed while the VFAT file system is
used under DOS are not selected.
2. Click Advanced.
b. Click Files not accessed in x days. Then, type or select the number of days (up to
999) to use as the criteria for selecting files.
At this time, you may specify other criteria for data you want to include in the
operation. For example, type *.doc in the File field to groom all of your document files
not accessed in the number of days specified in the Files not accessed in x days field.
c. Click OK.
4. On the Properties pane, under Settings, click General, and then select Archive as the
backup method.
5. Complete the backup job options following the procedures described in “Creating a
Manual Backup Job by Configuring Job Properties” on page 236.
See also:
“Including or Excluding Files for Backup Using Advanced File Selection” on page 262
“Archive Backups” on page 344
2. Under Backup Strategy Tasks in the task pane, select New job to automatically
discover resources.
Backing Up
Data
3. Select the domain you want Backup Exec to search for new resources.
4. If you need to change the logon account for the domain, click Change Logon Account
and enter or select the logon credentials to access this domain.
Note If you are using BEWAC, you can only choose a pre-defined logon account. You
cannot create or edit a logon account.
5. If you want to exclude computers from the search, see “Excluding Computers from a
Resource Search” on page 299.
6. On the Properties pane, under Settings, click General and complete the options
described in “General Options for Resource Discovery Job” on page 297.
7. On the Properties pane, under Settings, click Resources and complete the options
described in “Resources Options for a Resource Discovery Job” on page 298.
8. If you want Backup Exec to notify someone when this job completes, on the
Properties pane, under Settings, click Notification (see “Selecting Recipients for Job
Notification” on page 492).
9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
Item Description
Backing Up
Job priority Select the priority level for this job. If another job is scheduled to run at
the same time as this job, the priority you set determines which job runs
Data
Item Description
Network administrative Select this option if you want Backup Exec to search for new
shares administrative network shares or volumes.
Network user shares Select this option if you want Backup Exec to search for new
user-defined shares.
Microsoft SQL Select this option if you want Backup Exec to search for new Microsoft
databases SQL databases.
Item Description
Microsoft Exchange Select this option if you want Backup Exec to search for new Microsoft
servers Exchange servers. Backup Exec searches for Information Store,
Exchange Directory, or Storage Groups; it does not discover individual
databases under storage groups.
Lotus Domino Select this option if you want Backup Exec to search for new Lotus
databases Domino databases.
System State Select this option if you want Backup Exec to search for new System
State resources.
Send separate Select this option if you want Backup Exec to send separate
notification for each notifications when each new resource is found.
new resource found
Send one notification Select this option if you want Backup Exec to send out a single
for all new resources notification for all new resources found.
found
Include previously Select this option if you want Backup Exec to send a notification that
discovered resources includes all resources previously found during resource discovery jobs.
when sending
notification
1. After selecting the domains for Backup Exec to search for new resources (see “Using
Resource Discovery to Search for New Resources” on page 295), on the Properties
pane, under Target, click Exclude.
2. In the Domain field, select the domain that contains the servers you want to exclude.
3. From the list below the Domain field, select the server you want to exclude, and then
click Exclude.
To select consecutive servers, click the first item, press and hold <Shift>, and then
click the last item. To select servers that are not consecutive, press and hold <Ctrl>,
and then click each item.
Note Alternatively, you can type the name of the server in the Servers excluded field, and
then click Add. To exclude multiple servers at one time, type a space between the
name of each server.
Tip To remove a server from the list of excluded servers, select it and then click Include
to return it to the list of included servers. You can also select multiple servers
simultaneously.
4. If you want to duplicate backup sets created when a scheduled backup job runs:
a. Select Duplicate backup sets following a job, and then click OK.
5. On the Properties pane, under Destination, select Device and Media, and complete
these options as described in “Device and Media Options for Backup Jobs and
Templates” on page 241.
6. On the Properties pane, under Settings, click General, and complete these options as
described in “General Options for a Duplicate Job” on page 302.
7. On the Properties pane, under Settings, click Advanced, and complete these options
as described in “Advanced Options for a Duplicate Job” on page 303.
8. If you want Backup Exec to notify someone when the backup job completes, on the
Properties pane, under Settings, click Notification (see “Selecting Recipients for Job
Notification” on page 492).
9. If you are duplicating data from a scheduled backup job, click Run Now.
The duplicate job will launch immediately following the completion of the scheduled
backup job.
10. If you are duplicating data from an existing backup set, either click Run Now or
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
Backing Up
Data
Item Description
Job priority Select the priority level for this job. If another job is scheduled to run at
the same time as this job, the priority you set determines which job runs
first. Your choices are:
Highest
High
Medium
Low
Lowest
Backup set description Type a description of the information you are backing up.
Item Description
Preferred source device Select the device used as the destination device for the original backup
job.
Verify after backup Select this option to have Backup Exec automatically perform a verify
completes operation to make sure the media can be read after the backup has been
completed. Verifying all backups is recommended.
Item Description
Verifying a Backup
In addition to the verification of files that is done when a backup or archive job runs, you
can submit verify jobs to test the integrity of the media.
If the Write checksums to media option is selected as a default backup option, checksums
are calculated for each data stream written to tape, and then written in a separate stream
immediately following the data stream. If this option is not selected, backup performance
may be improved, but there will be no way to verify the integrity of the data on the tape.
Performing a verify operation when there are no checksums written for the set only
verifies that the set can be read without getting a translation error.
If you perform a verify operation and files fail to verify, the media may be bad. Details
about files that failed to verify are provided in the job log, which can be viewed from the
Job Monitor.
2. Under Backup Tasks in the task pane, select New job to verify backup data.
Note The default view is the Resource view, which lists data by the device from which it
was backed up. The Media view lists the data that is contained on a piece of media.
To switch views, under View by, select the view you want to use. In addition, you
can set Backup Exec to display the selections in a graphic format or a text format. To
switch the format, select either Graphical or Text from the View format section.
5. Select the device that contains the media you want to verify.
Item Description
Job Name Type a name that describes the data you are verifying.
Job priority Select the priority level for this job. If another job is scheduled to
run at the same time as this job, the priority you set determines
which job runs first. Your choices are:
Highest
High
Medium
Low
Lowest
8. If you want Backup Exec to notify someone when the backup job completes, on the
Properties pane, under Settings, click Notification (see “Selecting Recipients for Job
Notification” on page 492).
9. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
After verification has completed, you can check the results in the job log.
See also:
“Setting Default Backup Options” on page 312
“Verify after backup completes” on page 303
2. In the Jobs pane, select the job for which you want to create a test run.
4. Select General options as described in “General Options for Test Run Jobs” on
page 308.
5. If you want Backup Exec to notify a recipient when the backup job completes, on the
Properties pane, under Settings, click Notification (see “Selecting Recipients for Job
Notification” on page 492).
Backing Up
Data
6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
See also:
“Viewing General Media Properties” on page 220
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
“Test Run Results Report” on page 528
Item Description
Credentials check Select this check box to verify that the Backup Exec logon account is
correct for the resources being backed up.
Media capacity check to Select this check box to test if there is enough available capacity on the
complete individual job media to complete the job.
Note During the test run job, the number of scheduled jobs in the
queue is not checked; therefore, jobs that are scheduled before the
test run job may use the media that was available when the test
run job was performed.
Media check Select this check box to test whether the media is online and
overwritable.
Item Description
Use previous job Select this option to use past job histories to determine whether there is
history, if available enough media available to run the scheduled backup job. Checking the
previous job history is faster than performing a pre-scan.
Perform Pre-scan Select this option to enable Backup Exec to scan the scheduled backup
job to determine whether there is enough media available to run the job.
This is the most accurate method of determining media capacity and
should be selected if there is not an existing job history.
Upon any failure, place Select this option to have the scheduled job placed on hold if any
the scheduled job on failures are detected during the test run.
hold
Run at priority Select the priority level for the test job. If another job is scheduled to run
at the same time as this job, the priority you set determines which job
runs first. Your choices are:
Highest
High
Medium
Low
Lowest
See also:
“Viewing General Media Properties” on page 220
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
“Test Run Results Report” on page 528
Backing Up
Data
Item Description
Check credentials Select this check box to verify that the Backup Exec logon account is
correct for the resources being backed up.
Check media capacity Select this check box to test if there is enough available capacity on
to complete job the media to complete the job.
Note During the test run job, the number of scheduled jobs in the
queue is not checked; therefore, jobs that are scheduled before
the test run job may use the media that was available when the
test run job was performed.
Check media Select this check box to test whether the media is online and
availability overwritable.
Use previous job Select this option to use past job histories to determine whether
history, if available there is enough media available to run the scheduled backup job.
Checking the previous job history is faster than performing a
pre-scan.
Perform Pre-scan Select this option to enable Backup Exec to scan the scheduled
backup job to determine whether there is enough media available to
run the job. This is the most accurate method of determining media
capacity and should be selected if there is not an existing job history.
Place the job on hold if Select this option to have the scheduled job placed on hold if any
any failure occurs failures are detected during the test run.
4. Click OK.
Backing Up
Data
Item Definition
Backup method for files Select the default Backup method. FULL - Back Up Files - Reset
Archive Bit is the typical selection for this field. For more
information about backup methods, see “Understanding Backup
Methods and Their Advantages” on page 340.
Files accessed in x days When the Working Set backup method is selected, use this field to
specify the number of days for which to include accessed files.
Backing Up
Data
Item Definition
Item Definition
Verify after backup Select this option if you want backups to be verified after they are
completed. Verify operations make sure the media can be read
once the backup has been completed. Verifying all backups is
recommended.
Write checksums to Select this option if checksums are to be calculated for each data
media stream written to tape, and then written in a separate stream
immediately following the data stream. If this option is not
selected, backup performance may be improved, but there is no
way to verify the integrity of the data on the tape; Backup Exec
can only verify that the data can be read from the device.
Backing Up
Data
Item Definition
Back up files and Select this check box to back up the information for the junction
directories by following points and the files and directories to which they are linked. If this
junction points check box is not selected, then only the information for the
junction points is backed up; the files and directories to which
they are linked are not backed up.
Note Since Mounted Drives that do not have a drive letter
assigned to them cannot be selected, the files and directories
to which they are linked are backed up regardless of
whether this option is selected.
Back up data in Remote Select this check box to back up data that has been migrated from
Storage primary storage to secondary storage. The data will not be
recalled to its original location; it will be backed up directly to the
backup media.
If this option is selected, you should not run a backup of your
entire system because Backup Exec will have to load the data that
has been migrated to secondary storage and additional time will
be required for any set that includes migrated data.
If this check box is cleared, only the placeholder that stores the
location of the data on secondary storage will be backed up, not
the data itself.
Note This option should not be selected if the device used for
secondary storage and backups contains only one drive
because Remote Storage and Backup Exec will compete for
use of the drive.
Item Definition
Use Change Journal if Select this option if you want to use Windows’ NTFS Change
available Journal to determine which files have been modified since the last
full backup. This option can only be used with NTFS volumes and
only when the backup method selected is FULL - Back Up Files
- Allow incrementals and differentials using modified
time, DIFFERENTIAL - Using modified time or
INCREMENTAL - Using modified time.
Enable single instance Select this option if you want Backup Exec to protect Single
backup for NTFS Instance Store (SIS) volumes. SIS, which is used by Remote
volumes Installation Services to save disk space, maintains a single
physical copy of all identical files on a specified volume. If SIS
finds an identical file on the volume, a copy of the original file is
placed in the SIS and a link is made to the actual physical location.
By selecting this option, Backup Exec will back up the physical
file one time, no matter how many links have been created.
Backing Up
Data
Item Definition
Open file backup when Advanced Open File Option is not used
Never Select this option to have Backup Exec skip open files if they are
encountered during the backup operation. A listing of skipped
files appears in the job log for the backup.
If closed within x Select this option to have Backup Exec wait the specified time
seconds interval for files to close before skipping the open file and
continuing the backup operation.
If the file does not close during the specified interval, it is
skipped. A listing of skipped files appears in the job log for the
backup.
Note If multiple files are open, Backup Exec waits the specified
time interval for each file; depending on the number of
open files, this may significantly increase the backup time.
With a lock Select this option to have Backup Exec attempt to open files that
are in use. If Backup Exec is able to open a file, the file is locked
while it is being backed up to prevent other processes from
writing to it. Backing up open files is not as effective as closing
applications and allowing the files to be backed up in a consistent
state.
Without a lock Select this option to have Backup Exec attempt to open an in use.
If Backup Exec is able to open the file, the file is NOT locked while
it is being backed up. This allows other applications to write data
to the file during the backup operation.
WARNING: This option allows files to be backed up that contain
inconsistent data and possibly corrupt data.
Backing Up
and completed for each server before processing begins on the next selected server. Data
Item Description
Run job only if pre-job Select this option to run the backup or restore job only if the
command is successful pre-job command is successful. If the pre-job command fails, the
job does not run, and is marked as failed.
If it is critical that the job not run if the pre-job command fails,
then select Allow pre- and post-job commands to be successful
only if completed with a return code of zero. If a non-zero code
is returned, it is interpreted by Backup Exec to mean that the
pre-job command did not run successfully. The job is not run and
the job status is marked as Failed.
Item Description
Run post-job command Select this option to run the post-job command only if the pre-job
only if pre-job command command is successful.
is successful If it is critical that the post-job command fail if the pre-job
command fails, then select Allow pre- and post job commands to
be successful only if completed with a return code of zero. If a
non-zero code is returned for the pre-job command, it is
interpreted by Backup Exec to mean that the pre-job command
did not run successfully. The post-job command is not run.
If you also select Run job only if pre-job command is successful,
and both the pre-job command and the job are successful, but the
post-job command returns a non-zero code, the job log reports
both the job and the post-job command as failed.
Run post-job command Select this option if it is critical to run the post-job command
even if job fails regardless if the job is successful or not.
If you also select Allow pre- and post job commands to be
successful only if completed with a return code of zero and the
post-job command returns a non-zero code, the job log reports the
post-job command as failed.
Allow pre- and post-job Select this option to allow Backup Exec to check the return codes
commands to be of the pre- and post-job commands to determine if they
successful only if completed successfully.
completed with a return An exit code of zero returned to the operating system by the pre-
code of zero or post-job command is interpreted by Backup Exec to mean the
job completed successfully. A non-zero exit code is interpreted by
Backup Exec to mean the job ended with an error.
After checking the return codes, Backup Exec continues
processing according to selections you made for running the pre-
and post-job commands.
If this option is not selected, the success of the pre- and post-job
commands is not determined based on the return code.
Backing Up
Data
Cancel command if not Select the number of minutes Backup Exec should wait before
completed within x canceling a pre-job or post-job command that did not complete.
minutes The default time-out is 30 minutes.
On this media server Select this option to run the pre- and post-job commands on this
media server only.
Item Description
On each server backed Select this option to run the pre- and post-job commands one time
up on each server backed up.
The pre- and post-job command selections apply to each server
independently. If you select this option, the pre- and
post-commands are run and completed for each server before
processing begins on the next selected server.
4. Click OK.
See also:
“Pre/Post Commands for Backup or Restore Jobs” on page 255
Backup Exec
IP address: 128.10.0.1
media server
backup network
network ID: 128.10.0.0
subnet mask: 255.255.0.0
router A
IP address: 128.10.0.2 IP address:
128.10.0.3
IP address: 128.20.0.2 IP address: 128.20.0.3
router B
Backing Up
database server mail server
running Remote Agent running Remote Agent
Data
corporate network
network ID: 128.20.0.0
subnet mask: 255.255.0.0
In the example, the database server and mail server are connected to both the backup
network and the corporate network.
When backup operations are performed by the Backup Exec media server, the backup
data will use either the backup network or the corporate network to back up the database
server. If the backup data goes through the corporate network, the amount of time it takes
to back up the database server will increase because the network route between the two
computers is longer. This may cause users to experience network latencies when accessing
the mail server since there is an increase in network traffic.
In contrast, if the Specified Backup Network feature is enabled and you back up the
database server, the backup data traffic is isolated to the backup network and users
accessing the mail server are not affected. The backup network will be used to perform all
backup operations, unless the remote computer is not connected to the backup network.
If you want to back up remote computers that are not connected to the backup network,
such as the database user’s computer, then choose to use any available network route.
This allows you to back up the remote computer even though it does not reside on the
backup network.
See also:
“Using Backup Exec with Firewalls” on page 331
“Browsing Systems Through a Firewall” on page 332
Note The remote computers that you want to back up must have the most current version
of Backup Exec Remote Agent installed.
Backing Up
Data
Item Description
Enable selection of Select this option to enable selection of Windows default shares.
default shares
Enable selection of user Select this option to enable selection of Windows user shares.
selections
Default Network
Network Interface Select the name of the network interface card that connects the
media server to the network you want to use for the backup
network. The list includes all available network interface cards on
the media server.
IP address Displays the IP address of the network interface card you selected
for the backup network.
Subnet mask Displays the 32-bit number that determines the subnet to which
the network interface card belongs.
Network ID Displays the base network that Backup Exec calculated based on
the IP address and the subnet mask of the network interface card
you selected. This is the network that will be used to perform
remote backups and restores.
Physical address For Windows 2000 and later operating systems, this field displays
the Media Access Control (MAC) address for the network
identification card you selected. For Windows NT 4 and earlier
operating systems, this field lists the service entry name.
Use any available If a remote system that you selected for backup or restore is not
network route for remote part of the specified backup network, select this check box to
agents not bound to the ensure that the data from the remote system is backed up or
above Network ID restored over any available network.
If you do not select this check box and you selected data from a
remote system that is not part of the specified backup network,
the job fails because Backup Exec cannot back up or restore the
data from the remote system
Item Description
Enable agents using Select this option to use the TCP/IP network protocol to
TCP/IP protocol communicate with other devices on the network. If you select this
option, make sure that all agent workstations are configured to
advertise their IP addresses directly to the media server.
To set up this protocol, refer to your Windows documentation.
Enable agents using Select this option to use the IPX/SPX network protocol to
NetWare IPX/SPX communicate with other devices on the network.
protocol If you are using Backup Exec Agents that communicate using
SPX, you should ensure that you are using a consistent IPX frame
type on your network. If you do not, and Backup Exec is using a
different IPX frame type than the workstations running the
Backup Exec Agent software, all SPX packets must be routed
through a server that can translate the packets. This generates
excessive network traffic and, if the router does not properly
handle large SPX packets, some packets may be lost. One
symptom of this problem is a backup that times-out with a
“Device not responding” error message. Please note that the
Auto-Detect frame type will not work if there are any
combinations of 802.2 and 802.3 on the network.
To set up this protocol, refer to your Windows documentation.
Enable Media Server TCP Select this option if you want to allow the media server to use a
dynamic port range range of ports for communications, and then enter the port range.
If the first port Backup Exec attempts to use is not available,
communications will be attempted through one of the other ports
in the range. If none of the ports in the range are available,
Backup Exec will use any available dynamic port. Default port
ranges are 1025 to 65535. VERITAS recommends using a range of
50 allocated ports for the media server if using Backup Exec with
a firewall (“Using Backup Exec with Firewalls” on page 331).
Backing Up
Data
Item Description
Enable Remote Agent Select this option if you want to allow remote agents to use a
TCP dynamic port range range of ports for communications, and then enter the port range.
If the first port Backup Exec attempts to use is not available,
communications will be attempted through one of the other ports
in the range. If none of the ports in the range are available,
Backup Exec will use any available dynamic port. Default port
ranges are 1025 to 65535. VERITAS recommends using a range of
25 allocated ports for the remote systems if using Backup Exec
with a firewall (“Using Backup Exec with Firewalls” on page 331).
See also:
“Changing the Backup Network for a Job” on page 328
“Specifying the Restore Network” on page 444
2. Set up the backup job as usual by selecting data and setting General and Advanced
options (see “Creating a Manual Backup Job by Configuring Job Properties” on
page 236).
Item Description
Network Interface Select the name of the network interface card that connects the
media server to the network you want to use for the backup network
for this backup job. The list includes all available network interfaces
on the media server.
Backing Up
Data
IP address Displays the IP address of the network you selected as the backup
network.
Subnet mask Displays the 32-bit number that determines the subnet to which the
network interface card belongs.
Item Description
Physical address For Windows 2000 and later operating systems, this field displays
the Media Access Control (MAC) address for the network card you
selected. For Windows NT 4 and earlier operating systems, this field
lists the service entry name.
Use any available If a remote system that you selected for backup is not part of the
network route for specified backup network, select this check box to ensure that the
remote agents not data from the remote system is backed up over any available
bound to the above network.
Network ID If you do not select this check box and you selected data from a
remote system that is not part of the specified backup network, the
job fails because Backup Exec cannot back up the data from the
remote system.
5. If you want Backup Exec to notify someone when the backup job completes, on the
Properties pane, under Settings, click Notification (see “Selecting Recipients for Job
Notification” on page 492).
6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
See also:
“Specifying Backup Networks” on page 323
“Specifying the Default Backup Network” on page 325
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
Note The Remote Agent for Windows Servers is required to perform remote backups and
restores.
Because firewalls affect system communications between a media server and remote
systems that reside outside the firewall environment, special port requirements must be
considered when configuring Backup Exec for use with firewalls.
VERITAS recommends having port 10000 open and available on the Backup Exec media
server as well as on the remote systems. In addition, you must open the dynamic port
ranges specified for communications between the media server and remote agents. The
firewall must have a static Network Address Translation (NAT) configuration for these
two-way communications to work.
When a media server makes a connection with a remote system, the initial connection will
be initiated on the well known port 10000. The Remote Agent will be listening for
connections on this predefined port. The media server side of this connection will be
bound to an available port as specified in the Enable media server TCP dynamic port
range. Additional connections from the media server to the Remote Agent will be
initiated on an available port selected in the Enable remote agent TCP dynamic port
range option, and the media server side of these connections will be bound to an available
port as specified in the Enable media server TCP dynamic port range option.
Communication between the media server and the Remote Agent for Windows Servers
will usually require 2 ports on the media server side and up to 2 ports on the remote agent
Backing Up
side per operation. If you plan on supporting multiple backups and restores occurring
simultaneously, you must configure your firewall to allow a range of ports large enough
Data
Note If the default port is changed, it must be changed on the media server and all remote
systems being backed up through the firewall on this port.
When setting up TCP dynamic port ranges, VERITAS recommends using a range of 50
allocated ports for the media server (see “Enable Media Server TCP dynamic port range”
on page 327), and 25 allocated ports for the remote systems (see “Enable Remote Agent
TCP dynamic port range” on page 328). For optimum reliability, port ranges should not
overlap.
Note The number of dynamic ports used by the media server and remote systems can
change based on the number of devices being protected and the number of tape
devices in use. You may need to increase these port ranges to maintain the highest
level of performance. Backup Exec and the firewall need to have the ranges defined
(and port 10000).
Unless you specify a range, Backup Exec uses the full range of dynamic ports available.
When performing remote backups through a firewall, you should select a specific range
on the Network defaults dialog box.
Because the backup communications between the media server and the remote agent for
Windows servers will usually require multiple two-way connections on different port
numbers, you must configure your firewall to support this type of communications.
Note Firewalls using a many to one Network Address Translation (NAT), or Circuit-level
Gateways, may not accept incoming connections destined for a private address
behind the firewall. As a result, firewalls utilizing this technology may not be
compatible with Backup Exec for Windows Servers firewall backup methods. You
can make NAT work with port forwarding or putting Backup Exec on a DMZ host.
Please refer to your firewall documentation for more information on these and other
configurations.
3. Verify that a dynamic range of ports has been set for the media server and remote
agent and that the firewall is configured to pass these port ranges.
4. Click OK.
9. In UNC Name, after \\, type the name or IP address of the remote system, and then
click Add.
When expanded, the Shadow Copy Components include Service State, which
corresponds to application services that have writers. These services can be operating
system related, such as Windows Management Instrumentation, or they can be services
for third party applications, such as Microsoft SQL.
Some writers, such as Microsoft SQL writers, will not appear as resources unless you have
installed the Backup Exec Agents for the application or database. Some writers are greyed
out in the selection list because VERITAS has not tested Backup Exec’s compatibility with
those writers. The writers that are greyed out will not be backed up.
To protect your Windows.NET systems, you must select all shadow copy components,
your system state, and system drive for backup. You can only perform a full backup on
the shadow copy components and system state.
For more information about shadow copy technology, refer to your Microsoft
documentation.
See also:
“Snapshot Support” on page 956
You must have Administrator rights to browse and backup utility partitions. If there are
no utility partitions on the system, this resource is unavailable for backup.
You can only perform a full backup of utility partitions. You can select individual utility
partition resources, which appear as Utility Partition On Disk disk_number (such as
Utility Partition On Disk 0) when the Utility Partition node is expanded. VERITAS
recommends backing up utility partitions when a full system backup is performed, such
as during disaster recovery preparation.
See also:
“Restoring Utility Partitions” on page 423
“Disaster Preparation and Recovery” on page 531
Backing Up
Note If you use Backup Exec on an IntraNetWare client, there is no NDS node when
browsing for a server using Network Neighborhood.
Data
While looking at the backup selections pane, you may notice a selection called NetWare or
Compatible Networks. Although you can select NetWare files to back up from this node,
VERITAS does not recommend that you use it. When you select files from the NetWare or
Compatible Networks node, only the standard files are backed up. Special files, such as
security, bindery, and ACL, are not included in the backups.
In addition, VERITAS recommends that you use the Backup Exec Remote Agent for
NetWare. Because the Remote Agent for NetWare is also a Client Access License (CAL), it
enables you to fully protect your NetWare data and to perform accelerated backups of
NetWare data. You cannot select all data and special files on resources for a remote
NetWare server for backup until a Remote Agent has been installed.
See also:
“About Backing Up NetWare Servers” on page 1228
“Default Settings for the Remote Agent for NetWare” on page 1235
server configuration.
Backing Up
Data
Full Backups
Full backups include all of the data on a volume and use the full backup method (so
Backup Exec detects the device as having been backed up).
Backup Exec allows you to select to use either archive bit or modified time to determine if
a file has been backed up. The advantages and disadvantages described in this section
pertain to either type of full backup.
◆ Advantages
- Files are easy to find - Since full backups include all data contained on a device,
you don’t have to search through several media to find a file that you need to
restore.
- There is always a current backup of your entire system on one media or
media set - If you should need to restore your entire system, all of the most
current information is located on the last full backup.
◆ Disadvantages
- Redundant backups - since most of the files on your file server rarely change, each
full backup following the first is merely a copy of what has already been backed
up. This requires more media.
- Full backups take longer to perform - Full backups can be time consuming,
especially when you have other devices on the network that need to be backed up
(e.g., agent workstations, remote servers).
Note You will need to perform a full backup of your server (including the Windows NT
Registry) to establish a baseline for disaster recovery.
See also:
“Understanding the Archive Bit and Backup Methods” on page 344
“Understanding Modified Time and Backup Methods” on page 345
Differential Backups
Differential backups include backing up all files that have changed since the last full
backup. The difference between differential and incremental backups is that incremental
backups include only the files that have changed since the last full or incremental backup.
Backup Exec provides two differential backup methods, one that uses archive bit and one
that uses modified time to determine if the file was backed up. If you select to use the
FULL - Backs Up Files - Reset Archive Bit and want to run differential backups, you must
use the DIFFERENTIAL - Changed Files method. If you select to use the FULL - Backs
Up Files - Allows incrementals and differentials using modified time, you must use the
DIFFERENTIAL - Using modified time method. The advantages and disadvantages
described in this section pertain to either type of differential backup.
◆ Advantages
- Files are easy to find - Restoring a system backed up with a differential strategy
requires a maximum of two backups - the latest full backup and the latest
differential backup. This is less time consuming than backup strategies that
require the latest full backup and all incremental backups created since the full
backup.
- Less time required for backup and restore - Differential backups take less time to
restore than full backups. Faster recovery is possible in disaster situations because
you only need the latest full and differential backup media to fully restore a
device.
◆ Disadvantage
- Redundant backups - All of the files created or modified since the last Backing Up
Data
Incremental Backups
Incremental backups include only the files that have changed since the last full or
incremental backup.
Backup Exec provides two incremental backup methods, one that uses archive bit and one
that uses modified time to determine if the file was backed up. If you select to use the
FULL - Backs Up Files - Reset Archive Bit and want to run incremental backups, you
must use the INCREMENTAL - Changed Files method. If you select to use the FULL -
Backs Up Files - Allows incrementals and differentials using modified time, you must
use the INCREMENTAL - Using modified time method. The advantages and
disadvantages described in this section pertain to either type of differential backup.
◆ Advantages
- Better use of media - Only files that have changed since the last backup are
included, so there is much less data storage space required.
- Less time required for backup - Incremental backups take much less time than full
and differential backups to complete.
◆ Disadvantage
- Backups are spread across multiple media - Since multiple media is required in a
disaster situation, this can cause recovery of a device to take longer. In addition,
the media must be restored in the correct order to effectively bring the system up
to date.
Copy Backups
Copy backups include all selected data and do not affect any media rotation scheme
because the archive bit is not reset. Copy backups are useful when you need to:
◆ Back up data for a special purpose (for example, to send to another site).
◆ Back up specific data.
◆ Perform an additional backup to take off-site.
◆ Back up data that belongs to a media rotation job without affecting the rotation cycle.
Daily Backups
Daily Backups may be performed in addition to the media rotation scheme selected. The
Daily Backup method backs up all files with today’s date (created or changed today). The
Daily Backup method does not affect the files’ backup status because the archive bit is not
reset.
Backing Up
- This option is available only on platforms that support the last accessed date
(Windows, NetWare, and UNIX). Working set backups will work as differential
Data
Archive Backups
The archive backup option automatically deletes files from the volume after they have
been successfully backed up. This backup method is designed for migrating data from
disk to storage media and should not be incorporated in a regular backup schedule.
Using the archive backup method allows you to free valuable disk space and reduce
clutter on your server volume by migrating stagnant directories and files from the server
to media. An archive backup job backs up the selected data, verifies the media, and then
deletes the data from the volume.
Note For data to be deleted, rights to delete a file must be granted; otherwise data will be
backed up but not deleted.
Backup Exec will not delete data from Backup Exec Agent workstations when using
the archive feature.
Since most files on the server, such as operating system files and application files,
seldom change, Fred decides that he can save time and media by incorporating
incremental or differential backups in his media rotation scheme. Fred opts to use
incremental backups, so he schedules the script to run at the end of the day, Monday
through Thursday, with the incremental backup method.
Here’s what happens: Fred’s Friday tape contains all of the data on the fileserver and
Backup Exec changes all of the files’ statuses to backed up. At the end of the day on
Monday, the incremental job runs and only the files that were created or changed (had
the archive bit re-set by the operating system) are backed up. When the incremental
job completes, Backup Exec will turn the archive bit off, showing that the files have
been backed up. On Tuesday through Thursday, the same events happen.
If Fred’s fileserver crashed on Thursday morning, after he got it running, he would
restore each backup in the order in which it was created (for example, Friday, Monday,
Tuesday, and so forth).
If Fred had decided to perform differential backups on Monday through Thursday, he
would have only needed Friday’s and Wednesday’s tapes: Friday’s tape because it
included all of the data, and Wednesday’s tape because it included every file that had
been created or changed since Friday’s backup.
Backing Up
Using the modified time allows Backup Exec to run differential backups on file system,
such as Unix, which do not have an archive bit.
Data
If you use want Backup Exec to use modified time to determine if a file has been backed
up, the full and incremental (or full and differential) backups must use the same backup
selection list.
See also:
“Using Selection Lists” on page 267
347
Configuring Logon Accounts
You can view, create, delete, edit, and replace Backup Exec logon accounts using the
Logon Account Management dialog box. The dialog box displays property information
for each Backup Exec logon account you create. It also displays your default Backup Exec
logon account and the Windows user name that is currently logged on to the media server.
To view this information, select the Network menu, and then click Logon Accounts.
See also:
“Creating a Backup Exec Logon Account” on page 350
Note For more information on using Backup Exec logon accounts with Exchange mailbox
and SQL backups, see “Using Backup Exec Logon Accounts for SQL 2000
Resources” on page 978 and “Using Backup Exec Logon Accounts with Exchange
2000 Resources” on page 1069.
◆ Restore. You can assign Backup Exec logon accounts to resources when you create
restore jobs. The default Backup Exec logon account is used unless you choose a
different Backup Exec logon account when you create the restore job.
See also:
“Changing Your Default Backup Exec Logon Account” on page 355
Administrating
Backup Exec
❖ On the Tools menu, point to Wizards, and then click Logon Account Wizard.
The wizard will guide you through the process of creating a Backup Exec logon
account.
▼ To create a new Backup Exec logon account using the Logon Account Management
dialog:
2. Click New.
Item Description
User name Enter the fully qualified user name for the Backup Exec logon
account. For example, DOMAIN\Administrator. The user name is
provided when you attempt to connect to a resource. The user name
you enter is not case-sensitive for the resources that are accessed.
Password Enter the password for the account. The password you enter is
encrypted for security. You can leave this field blank if this Backup
Exec logon account does not need a password.
Confirm password Re-enter the password for confirmation. The password must match
the password you typed in the Password field.
Administrating
Backup Exec
Item Description
Description Enter the unique name for the Backup Exec logon account. The user
name is automatically added if you do not enter information into the
field.
Notes Enter any comments to describe how the Backup Exec logon account
will be used.
This is a restricted Select this check box to enable the Backup Exec logon account to be
logon account used only by the owner of the logon account and those who know
the password. If this is not selected, the Backup Exec logon account
will be a common account. Common accounts are shared accounts
that can be accessed by all users.
This is my default Select this check box to make this your default Backup Exec logon
logon account account used to browse, make selections, or restore data on your
local and remote resources.
2. Select the Backup Exec logon account you want to change, and then click Edit.
If you are not logged on to Backup Exec with the same user name as the Backup Exec
logon account owner, you must provide the password before you can edit the account.
d. Click OK.
5. Click OK.
▼ To replace a Backup Exec logon account with another Backup Exec logon account:
2. Select the Backup Exec logon account you want to replace, and then click Replace.
The Replace Logon Account dialog box appears.
Administrating
Backup Exec
3. Select the Backup Exec logon account with which you want to replace the selected
Backup Exec logon account.
If the Backup Exec logon account is restricted and you are not logged on to Backup
Exec with the same user name of the Backup Exec logon account owner, you must
provide the password before you can edit the account.
4. Click OK.
2. Select the Backup Exec logon account you want to delete, and then click Delete.
2. Select the Backup Exec logon account you want to use as your default Backup Exec
logon account, and then click Edit.
4. Click OK.
Item Description
User name Enter the fully qualified user name for the Backup Exec logon
account. For example, DOMAIN\Administrator. The user name is
provided when you attempt to connect to a resource. The user name
you enter is not case-sensitive for the resources that are accessed.
Change password Enables you to enter and confirm a new password for the account.
The password you enter is encrypted for security. You can leave this
field blank if this Backup Exec logon account does not need a
password.
Notes Enter any comments to describe how the Backup Exec logon account
will be used.
This is a restricted Select this check box to enable the Backup Exec logon account to be
logon account used only by the owner of the Backup Exec logon account and those
who know the password. If this is not selected, the Backup Exec
logon account will be a common account. Common accounts are
shared accounts that can be accessed by all users.
This is my default Select this check box to make this your default account used to
logon account browse, make selections, or restore data on your local and remote
resources.
The Logon Account Audit Log dialog box provides the following information:
Item Description
Date/Time The date and time the change was made to the Backup Exec logon
account.
User Name The user ID that made the change to the Backup Exec logon account.
Message The name of the Backup Exec logon account to which the change
was made.
5. Click Close.
Administrating
Backup Exec
Scheduling Jobs
The schedule option enables you to configure the time and the frequency you want to run
jobs. You can configure a schedule for all types of jobs such as backup, restore, inventory,
new catalog, etc. During the job setup, you can choose to run jobs immediately, run once
on a specific day and time, or run according to a schedule.
5. Click Submit job on hold if you want to submit the job with an on-hold status.
You should select this option if you want to submit the job, but do not want the job to
run until you change the job’s hold status.
6. Click Enable automatic cancellation, and then type the number of hours or minutes
in the Cancel job if not completed within option.
This option enables you to cancel the job if is not completed within the selected
number of hours or minutes. Backup Exec starts timing the length of time the job
takes to run when the job is queued, not when the job begins.
7. You can start the job after configuring the schedule or select other options from the
Properties pane.
Note If you are using Backup Exec for Web Administration Console (BEWAC), click Next
when you are ready to submit the job to the job queue. Click Finish to run the job
after you view the job summary. If you are not satisfied with the settings you
selected, click Back. However, you must reset all of the settings. BEWAC does not
save the settings when you click Back.
See also:
“Backing Up Data” on page 233
“Monitoring Jobs” on page 365
“Configuring Default Schedule Options” on page 363
Administrating
Schedule options
There are two types of options for configuring a schedule: General Options and Run Day
Options.
General options enable you to determine the date the schedule goes into effect, the time
the job can begin, and the time it can restart during the run day, and the date when the
schedule goes into effect. The selected options apply each day the job is scheduled to run.
Run day options enable you to select the days on which a job can run. Run days consist of
specific dates, a recurring pattern of days, or both. You can also exclude specific dates
from a schedule.
1. Under General Options or Run Day Options in the tree pane, select the appropriate
options as follows:
Schedule Options
Item Description
General Options
Effective Date Select this option to specify a date when the schedule begins.
On the right pane, select the Make the schedule go into effect
check box, and then enter the date.
Time Window Select this option to specify the time window on any scheduled
run day during which the job can begin.
On the right pane, select both the earliest and the latest time the
job can start. A job can run any time between 11:00:00PM and
10:59:59 PM.
The time window does not extend beyond 24 hours, or more
specifically, beyond 23 hours, 59 minutes, and 59 seconds. For
example, you cannot set a time window starting at 3:00 AM and
ending at 5:00 AM the following day.
Restart Time Interval Select this option to specify a time period during which the job
can be restarted on the run day.
On the right pane, select the Restart task every check box, and
then enter the repeat interval in hours, minutes, and second.
Week Days Select this option to schedule the job for specific days of the week,
weeks of each month, or days on specific weeks of the month.
On the right pane, select a check box to specify the day that the
job is scheduled to run. You can click Select All to select all the
days, and then click specific days to clear them. To select an entire
column or row, click the heading.
Day Interval Select this option to schedule a task to run every selected number
of days starting from a particular date. By default, the date from
which the interval is calculated is the current date.
Administrating
Backup Exec
On the right pane, select the Every x days check box, and enter
the number of days for the interval. To change the calculated date,
in the calculated from option, enter a new date.
Item Description
Days of the Month Select this option to schedule a task to run on specific days of each
month.
On the right pane, select the day or days you want the task to run.
You can also select Last to schedule a task to run on the last day of
the month, regardless of the actual date the month ends.
Specific Dates Select this option to schedule specific dates for a task.
On the right pane, select the dates you want from the calendar,
and then click << to move that date to the Include list. To delete a
date from the Include list, select the date and click Delete.
Exclude Dates Select this option to exclude specific dates, such as holidays, from
a run schedule.
On the right pane, select the dates you want to exclude from the
calendar, and then click << to move that date to the Exclude list.
To delete a date from the Exclude list, select the date and click
Delete.
Summary Enables you to verify your schedule. The dialog box includes the
Effective Date, Time Window, Restart Interval, and a calendar.
The calendar displays a six month period with the selected
scheduled run dates in bold.
3. You can start the job after editing the schedule or select other options from the
Properties pane.
See also:
“Configuring Holiday Scheduling for Jobs” on page 364
▼ To configure default schedule options for all new jobs that run according to a
schedule:
3. Click Edit Schedule Details and then select the appropriate options. For more
information, see “Schedule Options” on page 361.
6. Click Enable automatic cancellation, and then type the number of hours or minutes
in the Cancel job if not completed within option.
This option enables you to cancel the job if is not completed within the selected
number of hours or minutes. Backup Exec starts timing the length of time the job
takes to run when the job actually begins, not when the job is scheduled to begin.
7. Click OK to save the options or select other options from the Properties pane.
See also:
“Backup Exec Defaults” on page 84 Administrating
Backup Exec
2. On the Jobs pane, select the job for which you want to configure holiday scheduling.
6. Under Run Day Options in the tree pane, click Exclude Dates.
7. On the calendar, click the date of the holiday you want to exclude, and then click << to
move the date to the Exclude list.
9. You can start the job after configuring the schedule or select other options from the
Properties pane.
Monitoring Jobs
Backup Exec’s Job Monitor enables you to monitor and perform tasks on active,
scheduled, or completed jobs that have been submitted for processing. The Job Monitor
has two views for jobs: Jobs list and Job Calendar. You can select filters to limit the type of
jobs you want to appear in each view.
The Jobs list view displays active and scheduled jobs in the Current Jobs pane and
successful, completed, failed, and canceled jobs in the Job History pane. The Job
Calendar view displays scheduled, active, and completed jobs in either a day, week, or
monthly view.
❖ On the navigation bar, click Job Monitor and then under Views in the task pane, click
Jobs list.
Administrating
Backup Exec
The information that appears for each job includes the following:
- State
- Job Name
- Device Name
- Job Type
- Job Status
- Priority
- Percent Complete
- Start Time
- Elapsed Time
- Byte Count
3. Under Current Job View Filters or Job History View Filters, select or clear the
appropriate filters as follows:
Item Description
Show active jobs Lists jobs currently processing or in the job queue.
Show successful jobs Lists all jobs that completed without errors.
Show completed jobs Lists jobs that completed, but may contain one or more minor errors.
with exceptions
Show failed jobs Lists jobs that were processed, but one or more significant errors
occurred.
Show canceled jobs Lists jobs that were terminated as the operation was running.
Show last 24 hours Lists all the jobs that were processed in the last 24 hours.
Show last 7 days Lists all the jobs that were processed in the last 7 days.
See also:
“Viewing and Changing Active Job Status” on page 370
“Viewing and Modifying Scheduled Jobs” on page 374
“Viewing Completed Jobs” on page 378
Administrating
Backup Exec
1. On the navigation bar, click Job Monitor and then under Views in the task pane, click
Calendar.
Note Icons at the top of the Job Calendar enable you to select calendar views, navigation,
and display filters without using the task pane.
Calendar view
2. Under Calendar Views, select the appropriate view for the jobs as follows:
Calendar Views
Item Description
Day Lists all the jobs and information about each job for the selected day.
You can view jobs for a different day by selecting a day from the
calendars that appear. Click the arrows at the top of the calendars to
view the previous or subsequent months.
Week Lists all the jobs for the selected week. For recurring jobs, only the
next 24 occurrences for the job are listed for a day. You can view
previous or subsequent weeks using the scroll bar.
Month Lists all the jobs for the selected month. You can view previous or
subsequent weeks using the scroll bar.
3. If the current day is not selected for a calendar view, under Navigation, click Go To
Today.
The current day appears in the view.
▼ To set View Filters and Display Filters for the Job Calendar:
3. Under View Filters or Display Filters, select or clear the appropriate filters as follows:
Item Description
View Filters
Show active jobs Lists jobs currently processing or in the job queue.
Show scheduled job Lists all occurrences of a recurring job. If the Show scheduled jobs
recurrences filter is clear, this filter cannot be selected.
Administrating
Backup Exec
Show successful jobs Lists all jobs that completed without errors.
Item Description
Show completed jobs Lists jobs that completed, but may contain one or more minor errors.
with exceptions
Show failed jobs Lists jobs that were processed, but one or more significant errors
occurred.
Show canceled jobs Lists jobs that were terminated as the operation was running.
Display Filters
Show job state icon Displays the job status icon for the jobs.
Show job time Displays the time jobs are scheduled to run.
See also:
“Viewing and Changing Active Job Status” on page 370
“Viewing and Modifying Scheduled Jobs” on page 374
“Viewing Completed Jobs” on page 378
3. Select the active job you want to view from the Current Jobs pane or the Job
Calendar, and then under General Tasks in the task pane, click Properties.
The Job Activity dialog box appears. The Job Activity dialog contains two tabs: Job
Activity and Job History. The Job Activity tab only appears for active jobs and
provides detailed information about the job’s current status. The Job History tab
provides a summary of the job as it is being processed. For more information on the
job history, see “Viewing Completed Jobs” on page 378.
The Job Activity tab provides the following information:
Item Description
Job log The filename of the job log. The job log cannot be viewed until the
job has completed and is located in Program
Files\VERITAS\Backup Exec\NT\Data.
Status The status of the operation. Possible statuses for an active job
include:
Running. The operation is underway.
Queued. The job has been initiated, but Backup Exec is actively
looking for a suitable drive or media, waiting for the Open File
Option to initialize, or waiting for a pre- or post-job command to
complete.
Cancel Pending. The job has been canceled, but Backup Exec cannot
process the request immediately. This status is displayed until the
job is actually canceled. The job is then displayed in Job History with
a status of Canceled.
Loading Media. The media is being loaded and positioned on the
target device, or the job is waiting for the Open File Option to
initialize.
Pre-processing. Backup Exec is calculating the amount of data that
will be backed up.
Media Request. The job requires additional media because the media
is full or there is no available media in the device.
Device Paused. The device that the job was sent to is paused.
Server Paused. The Backup Exec server is paused.
Administrating
Item Description
Device name The name of the storage device processing the job.
Source The media or share being processed. The icon field to the left of the
field name displays either:
A disk drive icon when a backup or archive operation is
running, or
A tape drive icon when a restore or verify operation is running.
Destination Where the data is being written. The icon field to the left of the field
name displays either:
A tape device icon when a backup operation is running, or
A disk drive icon when a restore operation is running.
Current Directory Name of the current directory being processed. The icon field to the
left of the field displays either:
A folder if the active job is a backup or restore operation
No icon, if the active job is not a backup or restore operation, but
a job such as an Erase or Format operation.
Current File Name of the current file being processed. The icon field to the left of
the field name displays either:
A page, if the active job is a backup or restore operation
No icon, if the active job is not a backup or restore operation, but
a job such as an Erase or Format operation.
Statistics
Item Description
Elapsed Time Length of time that has elapsed since the operation started.
Percent complete Select percentage of the job that has completed. To display this
option, select Display progress indicators for backup jobs in
Preferences in the Tools - Options menu.
Estimated total bytes The total number of bytes for the backup job estimated during a
prescan. To display this option, select Display progress indicators
for backup jobs in Preferences in the Tools - Options menu.
Estimated time The estimated time it will take for the job to complete. To display
remaining this option, select Display progress indicators for backup jobs in
Preferences in the Tools - Options menu.
Cancel Job Cancels the processing of the job. If the job is scheduled, it will run
again at the next scheduled time. Canceling a job may take a
considerable amount of time depending on the tape drive selected
for the job.
Print Prints the Job Activity information. You must have a printer
attached to your system and configured in order to print the report.
3. Select the active job from the Current Jobs pane or the Job Calendar, and then under
Active Job Tasks in the task pane, click Cancel.
Confirm the cancellation of the job. If the job is scheduled, it will run again at the next
scheduled time.
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job,
and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want
to select. This allows you to perform tasks such as Cancel on more than one job at a
time, as long as the jobs are of similar type.
Administrating
Backup Exec
3. Select the active job from the Current Jobs pane or the Job Calendar, and then under
Active Job Tasks in the task pane, click Hold Schedule.
The active job continues and all scheduled occurrences of the job are placed on hold.
To remove the hold on future jobs, click Hold Schedule again.
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job,
and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want
to select. This allows you to perform tasks such as Hold Schedule on more than one
job at a time, as long as the jobs are of similar type.
See also:
“Viewing Completed Jobs” on page 378
3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then
under Scheduled Job Tasks in the task pane, click Run now.
The scheduled job is submitted to the job queue for processing.
3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then
under Scheduled Job Tasks in the task pane, click Hold Schedule.
The scheduled job is placed on hold. To remove the hold and run the job according to
the schedule, click Hold Schedule again.
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job,
and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want
to select. This allows you to perform tasks such as Hold Schedule on more than one
job at a time, as long as the jobs are of similar type.
Administrating
Backup Exec
3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then
under Scheduled Job Tasks in the task pane, click the priority you want to select for
the job.
Priorities include:
- Highest priority
- High priority
- Medium priority
- Low priority
- Lowest priority
The priority is changed for all occurrences of the scheduled job.
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job,
and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want
to select. This allows you to perform tasks such as setting priorities on more than one
job at a time, as long as the jobs are of similar type.
3. Select the active job from the Current Jobs pane or the Job Calendar, and then under
Scheduled Job Tasks in the task pane, click Run test job.
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job,
and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want
to select. This allows you to perform tasks such as Test Run on more than one job at a
time, as long as the jobs are of similar type.
4. Enter test run properties for the job. For more information, see “General settings
options for test run job” on page 308.
5. On the Properties pane, under Settings, click Notification and enter notification
information for the items. For more information, see “Selecting Recipients for Job
Notification” on page 492.
6. On the Properties pane, under Frequency, click Schedule and then click Submit job
on hold if you want to submit the job with an on-hold status.
Select this option if you want to submit the job, but do not want the job to run until
you change the job’s hold status.
3. Select the scheduled job from the Current Jobs pane or the Job Calendar, and then
under Scheduled Job Tasks in the task pane, click Delete.
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job,
and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want
to select. This allows you to perform tasks such as Delete on more than one job at a
time, as long as the jobs are of similar type.
4. After clicking Delete, you are prompted to delete backup selection lists that are no
longer in use by any other jobs. Click Yes to all to delete all of the unused backup
selection lists, or click No to all to leave the backup selection lists intact.
To delete selection lists later, on the Edit menu, click Delete Selection Lists.
5. Confirm the deletion of the scheduled job. If you are deleting the job from the Jobs list
view, all occurrences of the job will be deleted. If you are deleting the job from the
Calendar view, you can delete a single day’s occurrences or all occurrences of the job.
Administrating
Backup Exec
3. Select the completed job you want to view from the Job History pane or the Job
Calendar, and then under General Tasks in the task pane, click Properties.
The Job History dialog box appears. Click Expand All to view all the information
contained in the topics. Click Collapse All to hide the information in the topics.
The Job History tab provides the following job summary and set detail information:
Job History
Item Description
Job type The type of operation that was performed (Archive, Backup,
Catalog, Restore, Verify).
Device Name The name of the device that processed the job.
Target name The name of the device selected during job configuration.
Media set name The name of the media set that processed the job.
Job Summary
Original start time Time the job was submitted for processing.
Item Description
Set type The type of operation that was performed on the media set (Archive,
Backup, Catalog, Restore, Verify).
Resource name The name of the resource accessed during the operation.
Logon account The Backup Exec logon account used to access the resource.
Advanced Open File Displays if the Advanced Open File Option was used during the
Option used operation.
Image used Displays if the Intelligent image Option was used during the
operation.
Administrating
Item Description
Media used Name of the media used during the operation. If the job does not
require additional media, this option will not display.
File was skipped Lists the name of the file that was skipped. If the job does not
contain a skipped file, this option will not display.
File is in use Lists the name of the file in use. If the job does not encounter a file in
use, this option will not display.
File is corrupt Lists the name of the corrupt file. If the job does not contain a
corrupt file, this option will not display.
Job Log
Item Description
Job Information Displays the job server, job name, job start date and time, job type,
and job log name.
Device and Media Displays the robotic library name, drive name, slot number, media
Information label, media ID, media overwrite protection and append date and
time, and the targeted media set.
Item Description
Job Operation Displays the options selected during job configuration and agents
used during job processing.
Job Completion Status Displays the job end time, completion status, error codes, error
description, and error category. The job completion section is green,
orange, or red, depending on the job status.
5. Click Print if you want to print the job history or job log; however, you must have a
printer attached to your system and configured in order to print the report.
6. Click OK.
See also:
“Understanding Job Log Status” on page 382
“Configuring Default Job Log Options” on page 384
3. Select the job you want to delete from the Job History pane or the Job Calendar, and
then under General Tasks in the task pane, click Delete.
You can select multiple jobs in the Jobs list view in the Job Monitor by selecting a job,
and then pressing the <Ctrl> or <Shift> keys while you click other jobs that you want
to select. This allows you to perform tasks such as Delete on more than one job at a
time, as long as the jobs are of similar type.
4. After clicking Delete, you are prompted to delete backup selection lists that are no
longer in use by any other jobs. Click Yes to all to delete all of the unused backup
selection lists, or click No to all to leave the backup selection list intact.
To delete selection lists later, on the Edit menu, click Delete Selection Lists.
5. Confirm the deletion of the job history and associated job log.
See also:
“Configuring Database Maintenance” on page 389
◆ Failed. The operation took place, but one or more significant errors occurred. The job
log should indicate what caused the errors so that you can decide if you want to run
the job again. For example, if you get a job failure occurred due to a lost connection
during job processing, you could choose to resubmit the job when the connection
becomes intact.
Note If a drive loses power during a backup operation, you should restart the backup job
using a different tape. You can restore the data written to the tape up to the point of
the power loss, but you should not reuse the tape for subsequent backup
operations.
A failed job will have an error message in the Errors section of the job log. The most
common errors are searchable in the VERITAS Online Knowledge Base at
www.support.veritas.com
Some reasons a job may fail are:
- Devices specified by the job were not available when the job was run.
- Errors were found with the logon information associated with the job.
- There was a problem with the storage device when the job was run.
- The job information was corrupted.
- The user turned off the workstation.
Administrating
Backup Exec
Item Description
Summary information Select this option to include the job name, job type, job log name,
only media server name, storage device, the starting date and time, any
errors encountered, ending date and time, and completion statistics.
This option also includes the name of files that were skipped, the
media set name, the backup type and results of the verify operation
if one was performed.
Summary information Select this option to include summary information and a list of all
and directories processed subdirectories.
processed
Job log file base Enter the prefix to be used for the job logs that are processed.
See also:
“Backup Exec Defaults” on page 84
Administrating
Backup Exec
Error-Handling Rules
Backup Exec has predefined error-handling rules that determine how job errors are
handled. They apply to all backup jobs and are defined based on the cause of the failure.
The rules can be configured to automatically perform operations such as retry, pause, or
cancel a job after a failure occurs.
If Backup Exec is running in a cluster environment, you can also configure the cluster
failover error-handling rule. However, the rule only appears if the server on which
Backup Exec is installed is in a cluster environment. The cluster failover error-handling
rule and the Apply CheckPoint Restart option in Cluster Backup Job Properties work
together to enable you to resume jobs from the point of failover. The option is dependent
on the error-handling rule, so if you disable the rule, the option will automatically be
disabled to match the rule’s setting.
Error-handling rules are disabled by default, except for cluster failover, which is enabled
by default. Error-handling rules can be enabled or disabled for jobs that result in one of
the following types of errors:
◆ Resource Errors
◆ Server Errors
◆ Job Cancellation
◆ Job Errors
◆ System Errors
◆ Network Errors
◆ Backup Device Errors
◆ Security Errors
◆ Backup Media Errors
◆ Other Errors (errors that are not in any of the previous categories)
◆ Cluster Failover
See also:
“Enabling or Disabling Checkpoint Restart” on page 747
2. Select the error-handling rule you want to configure, and then click Settings.
3. Complete the items in the Error-Handling Rule Settings dialog box as follows:
Item Description
Final Job Status The status for the job that will activate the rule. The job status can be
viewed, but not modified. Available statuses include:
Error
Canceled
Failed
Administrating
Backup Exec
Item Description
Error Category The category of error for which the rule will be applied. The error
category can be viewed, but not modified. Available error categories
include:
Backup Device
Backup Media
Job
Network
Other
Resource
Security
Server
System
Retry Options
Retry Job Select this check box to enable Backup Exec to retry the job.
Maximum retries Enter the number of times you want to retry the job. The maximum
number of times the job can be retried is 99.
Retry Interval Enter the number of minutes to wait before the job is retried. The
maximum number of minutes is 1440.
Pause job until error Select this option to place the job on hold until you can manually
condition has been clear the error. After you clear the error, you must remove the hold
manually cleared for the job.
Cancel job and Select this option to cancel the current job after the selected number
reschedule for its next of retry options has been met. After the job is canceled, it will run at
scheduled service the next scheduled time.
Administrating
Backup Exec
Item Descriptions
Enable Backup Exec Select this check box to activate the database maintenance process.
database maintenance
Last time maintenance The date and time the last database maintenance was performed.
was performed
Perform database Enter the time you want to perform database maintenance. All the
maintenance at maintenance will occur once a day at the time you specify.
Delete expired data Select this check box to activate the deletion of expired job history,
job logs, alert history, and reports from the Backup Exec database
after the specified number of days have passed.
Number of days to keep data before deleting it from the Backup Exec database
Job history Enter the number of days to keep job history data in the database
before it is deleted. Job history data includes summary statistics for a
job and details about media, devices and backup sets used to
process the job.
Job logs Enter the number of days to keep job logs in the database before
they are deleted. Job logs includes detailed information about the
job.
Alert history Enter the number of days to keep alert history data in the database
before it is deleted. Alert history data includes property and
response information for the alert.
Reports Enter the number of days to keep report data in the database before
it is deleted. Report data includes property information about report
jobs that were generated. The report itself is not deleted.
Perform database Select this check box to check the logical and physical consistency of
consistency check the data in the database.
Note The option is not enabled by default, but it is recommended
that you run a consistency check periodically at a time when
there is minimal activity from Backup Exec.
Item Descriptions
Optimize database size Select this check box to reorganize fragmented pages and decrease
the size of the physical database to 10 percent above what is actually
used.
Save contents of Select this check box to dump the data contained in the database into
database to the the Backup Exec data directory so that the database backup file
Backup Exec data (BEDB.bak) can be backed up. The dump file will be maintained in
directory the data directory until the next database maintenance process is
performed and then this file will be overwritten. Selecting this
option enables you to recover the database in the event of failure.
For more information, see “Recover a Media Server Database” on
page 813.
4. Click OK.
Administrating
Backup Exec
Your ExecView Console, EIS, and ECM can run on three separate systems or you can have
any combination of these components residing on the same system. For example, your
ExecView Console and EIS can reside on the same Windows server.
ExecView Console
Windows servers
You can have multiple EIS and multiple media servers reporting through the same
ExecView Console, but the console can only report information about devices, jobs, and
alerts from one EIS at a time.
To monitor media servers from ExecView, you must first create a profile for the EIS, and
then create a server group, a group of media servers that report to the EIS.
Placing servers into groups allows you to:
◆ Control the size of the display in ExecView.
◆ Monitor your enterprise network more efficiently.
Servers can be grouped by any category, such as department or function, and can belong
to multiple server groups. You can create as many groups as you need, and each group
can contain as many servers as necessary.
A user can set preferences for how many scheduled and completed jobs are displayed for
each server, whether the time displayed on the ExecView Console’s screens will be the
local system’s time or the media server time, and set the refresh rate for the ExecView
Console. If multiple profiles are created, each profile can have different user preferences
set. You can log into to multiple ExecView Consoles using different profiles; however,
each ExecView Console only allows one user (profile) to be logged on at a time.
For more information about ExecView, see the ExecView documentation in the
ExecView\language\Docs directory on the Backup Exec CD.
Configuring ExecView
You can configure ExecView connection settings and then save them in Backup Exec. You
can also edit the settings at any time using the configuration method. Configuring the
connection settings enables you to quickly launch the ExecView console through Backup
Exec.
1. On the Tools menu, point to ExecView, and then click Connection Settings.
The ExecView Information Server Settings dialog box appears.
Item Description
Name of remote host Enter the host machine on which the ExecView Information Server
machine on which the (EIS) runs. EIS is a web server that resides on a Windows system. It
ExecView Information is the central server that the ExecView Communication Module
Server (EIS) is running (ECM) communicates with and sends data to.
Port number on which Enter the port number on which the EIS listens for console
the EIS web server is connections. The console communicates with the EIS using http
listening protocol on this port.
3. Click OK.
Administrating
Backup Exec
❖ On the Tools menu, point to ExecView, and then click ExecView Console.
If the ExecView Information Server settings are configured, the ExecView Console is
launched. If the settings are not configured, you must enter the ExecView Information
Server settings using the steps in the previous procedure.
395
Restore Operations and the Catalog
▼ To catalog media:
2. Select the device containing the media to be cataloged, and then select the media you
want to catalog.
4. Select the Device options as described in “Device Options for Catalog Jobs” on
page 398.
5. On the Properties pane, under Settings, click General, and select the options as
described in “General Options for a Catalog Jobs” on page 399.
6. If you want a person or group to be notified when the job completes, on the Properties
pane, under Settings, click Notification, and then select the options you want (see
“Selecting Recipients for Job Notification” on page 492).
7. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
The catalog operation can be monitored or canceled through the Job Monitor.
See also:
“Using Backup-to-Disk Folders and Files” on page 143
“Monitoring Jobs” on page 365
“Setting Catalog Defaults” on page 399
“Selecting Data to Restore” on page 428
“Canceling a Restore Operation” on page 446
Item Description
Confirm Password If this media is password protected and being cataloged by this
system for the first time, re-enter the password.
Item Description
Job name Enter a name for the job or accept the default name.
Job priority Select the priority level for this job. If another job is scheduled to run
at the same time as this job, the priority you set determines which job
runs first. Your choices are:
Highest
High
Medium
Low
Lowest
Item Description
Use storage media-based Select this option to allow Backup Exec to read the catalog
catalogs information from the media.
Media-based catalogs allow quick cataloging of tapes that are not
included in the disk-based catalog (for example, media that was
written by another installation of Backup Exec). This feature
allows tapes to be cataloged in minutes, rather than the hours
required with traditional file-by-file cataloging methods.
If you want to create a new catalog by having Backup Exec read
each file block, clear this option. Clearing this option is only
recommended if normal catalog methods are unsuccessful.
Item Description
Truncate catalogs after x Select this option to retain only the header information and to
days remove all file and directory details after the specified number of
days. This option reduces the size of the catalogs considerably.
After the catalogs have been truncated, the files and directories
cannot be restored unless the media is recataloged.
Note The last access date is not reset when catalogs are
truncated. Therefore, if you select to have catalogs
truncated after 20 days and then select Remove
unused catalogs after 30 days, the catalogs will be
truncated on the 20th day. On the 30th day, unless
the catalogs have been accessed, they will be
removed.
Remove unused catalogs This enables Backup Exec to automatically delete disk-stored
after x days catalogs that have not been accessed in the specified number of
days. Enabling this feature can help manage disk space used by
catalogs; however, after removing catalog information for media,
the media must then be re-cataloged before data can be selected
from it for a restore operation. The access date for disk-stored
catalogs is updated each time data is restored from, or appended
to the media.
Current path The path where the catalog files are located. This path defaults to
\Catalogs in the \Backup Exec\NT directory.
Catalog drive Select a volume where the catalog files are located. This is useful
if you have limited disk space on your media server.
Catalog path Specify a path on the volume for the catalog files. If the path you
provide does not exist, you will be prompted to create the path.
4. Click OK.
See also:
“Restore Operations and the Catalog” on page 396
“Catalog Levels” on page 402
Catalog Levels
The amount of information that can be viewed through the catalog for media is
determined by the media’s “catalog level”. Backup Exec fully catalogs each backup;
however, there may be instances where media does not appear as fully cataloged in the
Restore Job Properties dialog box. The following are possible catalog levels within the
Backup Exec system as show in the Media view and within Restore selections:
Item Description
Truncated Cataloged Truncated cataloged media lists only backup set information. No
Media files or file attributes can be viewed. This version of Backup Exec
writes only full catalogs. However, truncated cataloged media that
was migrated from earlier versions of Backup Exec, but not
cataloged by this version, will appear as truncated cataloged media.
Truncated cataloged media will not allow you to make restore
selections. You must catalog the media to view and select files to
restore.
Uncataloged Media There is no catalog information for the media. You must catalog the
media to view and select files to restore.
See also:
“Setting Catalog Defaults” on page 399
“Restore Operations and the Catalog” on page 396
2. Under Restore Tasks in the task pane, select New job using wizard.
2. Select the data to be restored (see “Selecting Data to Restore” on page 428), and
complete other Selections options as described in “Selections Options for Restore
Jobs” on page 407.
Note To protect remote resources, you must install the Backup Exec Remote Agent for
Windows Servers on the remote computer.
5. On the Properties pane, under Settings, click General, and select the options as
described in “General Options for Restore Jobs” on page 409.
You can select additional configuration options for the restore job before selecting to
run or schedule the job. Select additional options on the Restore Job Properties dialog
box’s Properties pane:
- If you want to redirect this job to another system other than the one from which
the data was backed up, on the Properties pane, under Destination, click one of
the following (see “Redirecting a Restore Operation” on page 436):
- File Redirection. Select this option to redirect file sets.
- SQL Redirection. Select this option to redirect SQL Server sets to another
SQL server.
- Exchange Redirection. Select this option to redirect Exchange sets to another
Exchange server.
- Sharepoint Redirection. Select this option to redirect Sharepoint Portal
Server sets to another Sharepoint server.
- If you want to set advanced options for the restore job, on the Properties pane,
under Settings, click Advanced. Then, complete the options as described in
“Advanced Options for Restore Jobs” on page 412.
- If you want to set commands to run before or after the job, on the Properties pane,
under Settings, click Pre/Post Commands and complete the options as described
in “Pre/Post Commands for Restore Jobs” on page 416.
- If you are restoring other platform types or database agents, such as SQL,
Exchange, or NetWare, select the platform type from the Properties pane, under
Settings, and then refer to the chapter or appendix for that item for instructions on
completing the options.
- If you want to specify a local network to be used for this restore job, on the
Properties pane, click Network, and then enter the network information (see
“Specifying the Restore Network” on page 444).
- If you want Backup Exec to notify recipients when this job completes, on the
Properties pane, under Settings, click Notification, and then select each recipient
to be notified when the job completes (see “Configuring E-mail and Pager
Notification Methods” on page 467).
Depending on how the default settings for your software are configured, some of the
options may or may not already be selected. You can override the default options by
selecting or clearing items in these dialog boxes.
6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
To monitor the job while it is processing, click Job Monitor, and ensure Show active jobs
is selected under Current Job View Filters. You can review results of the restore job in the
job’s log.
Caution When restoring System State, you must reboot your system before performing
subsequent restore operations.
Note Depending on your file system environment, byte counts for restored data may not
match the byte count recorded when the data was backed up. This is normal and
does not mean that files were excluded in the restore operation. For more
information, see “Restore Questions” on page 566.
See also:
“Selecting Data to Restore” on page 428
“VERITAS Backup Exec - Remote Agent” on page 821
“Redirecting a Restore Operation” on page 436
“Redirecting Restores for SQL 2000” on page 1009
“Restoring Exchange 2000” on page 1088
“Restore Options for Exchange 5.5” on page 1119
“Restoring NetWare Servers” on page 1233
“Restore Options for Lotus Domino Databases” on page 1192
“Viewing Completed Jobs” on page 378
“Restoring File Permissions” on page 420
Restore Selections
Item Description
Selection list If you are creating a job using an existing selection list, select the
selection list or lists you want to use. Otherwise, use the default
Selection list, which creates a new selection list using this name.
Load Selections from Click this button if you want to use a previously created selection list or
Existing List merge existing selection lists.
Item Description
View Format
Show file details Select this option to display details about the files available for
selecting.
Text Select this option to view selections as a list of files and directories.
Advanced Click this button if you want to use the Advanced File Selection for
selecting files for restoring (see “Using Advanced File Selection to
Restore” on page 430).
Include subdirectories Select this option if you want to select the contents of all the subfolders
when a directory is selected.
Item Description
Job name Enter a name that describes the data that you are restoring. This is
the name that is used to identify this operation in the job schedule.
Item Description
Job priority Select the priority level for this job. If another job is scheduled to run
at the same time as this job, the priority you set determines which job
runs first. Your choices are:
Highest
High
Medium
Low
Lowest
Restore over existing files Select this option to have Backup Exec overwrite files on the target
resource that have the same name as files that are being restored. Use
this option only when you are sure that you want to restore an older
version of a file.
Skip if file exists Select this option to prevent Backup Exec from overwriting files on
the target disk with files that have the same names that are included
in the restore operation.
Skip if existing file is more Select this option to prevent Backup Exec from restoring over files
recent that exist on the target resource if they are more recent than the files
included in the restore operation.
This option is useful if you are rebuilding a system. For example,
after installing the operating system on a crashed computer, you
could restore a previous full backup of the system without worrying
about overwriting later versions of operating system files.
Restore corrupt files Select this option only if you do not wish to have Backup Exec
automatically exclude corrupt files from the restore process.
This option is only recommended if a job has failed because a catalog
query could not determine the corrupt files on the tape. Normally,
when a restore job is run, Backup Exec queries the catalog to
determine if any corrupt files are on the tape and excludes them from
the restore job. If, during the query process, Backup Exec cannot
determine if a file is corrupt, the Restore job will not continue and
will be marked as Failed. In the unlikely event that the automatic
exclusion of corrupt files cannot be accomplished, you may
manually exclude corrupt files in the Restore selections window and
run the job with the Restore Corrupt File option enabled.
Item Description
Restore security Check this box to restore file-level security information on NTFS
partitions, if it exists in the data you selected.
Preserve tree (This option is on by default.) Check this box to restore the data with
its original directory structure intact. If you clear this option, all data
(including the data in subdirectories) is restored to the path you
specify in the Redirection dialog box.
Clearing the Preserve Tree option is useful when restoring several
subdirectories or individual files from media, but it should not be
cleared when restoring an entire drive.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
Item Function
Restore Removable Select this check box to restore the Removable Storage data. The
Storage data Removable Storage database is stored in the
Systemroot\System32\Ntsmsdata directory and is automatically
backed up when the system directory is selected for backup.
Removable Storage is a service used to manage removable media
and storage devices; it allows applications to access and share the
same media resources.
Item Function
Restore disk quota data Select this check box to restore disk quota data. Disk quota data is
automatically backed up when the root directory of a volume is
selected for a backup.
Disk quotas track and control disk usage on a per user, per volume
basis; the values can be restored to the limits that were set before the
backup.
Restore Terminal Services Select this check box to restore the Terminal Services database. The
database default location for the Terminal Services database, which contains
licensing data for client licenses, is the
Systemroot\System32\LServer directory and is automatically
backed up when the system directory is selected for backup.
Terminal Services allow client applications to be run on a server so
that client computers can function as terminals rather than
independent systems.
Restore Windows Select this check box to restore the Windows Management
Management Instrumentation (WMI) repository. The WMI repository is stored in
Instrumentation repository the Systemroot\System32\wbem\Repository directory and is
automatically backed up when the system directory is selected for
backup.
The Windows Management Instrumentation repository provides
support for monitoring and controlling system resources and
provides a consistent view of your managed environment.
Restore Cluster Quorum Select this check box to restore the cluster configuration. For more
information about restoring clusters, see “Restoring Data To
Clusters” on page 767.
Force the recovery of the Select this check box to restore the cluster configuration if you are not
cluster quorum even if able to take the other nodes in the cluster offline or if the disk that the
other nodes are online cluster quorum previously resided on has been changed.
and/or disk signatures do If this option is selected, the cluster service for any nodes that are
not match. online is stopped. This option also allows the drive letter of the disk
that the cluster quorum was on to remain the same, even if the
configuration has changed and the disk signatures contained in the
restore media do not match the disk signatures contained in the
cluster quorum.
Any changes made to the cluster quorum after the last backup will
be lost.
This option is only available if Restore Cluster Quorum is also
selected.
Item Function
Mark this server as the Select this check box to designate this server as the primary
primary arbitrator for replicator for all members in the set when restoring FRS-managed
replication when restoring folders or SYSVOL as part of System State.
folders managed by the If all members of a replica set are to be restored, then stop replication,
File Replication Service, or restore all the member servers, and then when restoring the last
when restoring SYSVOL in member server, select this option to designate the server as the
System State. primary replicator. If this option is not selected, replication may not
function.
Note In this version of Backup Exec, all restores of SYSVOL and
FRS-managed folders are non-authoritative. An authoritative
restore can only be performed by redirecting the restore and
then copying the files to the server. Refer to your Microsoft
documentation for details on performing an authoritative
restore.
Restore Windows NT 4.0 Select this check box to restore registry information if it exists in the
registry data you selected (applies to Windows NT v4.0 only).
Merge the existing Select this option if you want to merge the existing hardware and
hardware configuration registry services with the data you selected to be restored. This
and registry services with option should only be used for restoring System State or the NT
the data to be restored Registry.
Overwrite the existing Select this option if you want to overwrite hardware configuration
hardware configuration and registry services with the data you selected to be restored. This
and registry services with option should only be used for restoring System State or the NT
the data to be restored Registry and there have been no hardware changes.
Junction Points
Restore junction points, When this option is selected, the information for the junction points
directories, and files from and the files and directories to which they are linked is restored.
backup media Selecting this option overwrites existing junction points on your
system.
Note If a junction point was originally backed up without the Back
up files and directories by following junction points check
box selected (see “Back up files and directories by following
junction points” on page 316), then the files and directories to
which the junction point is linked will not be restored, unless
the junction point was linked to a mounted drive that did not
have an assigned drive letter.
Item Function
Preserve existing junction Select this option to restore files and directories backed up from
points and restore files junction point links while retaining the system's current junction
and directories from points. This option keeps current junction points from being
backup media overwritten with the junction point information restored from the
backup media.
When this option is selected and identical junction points or
directory names exist on both the target system and the media, the
files and directories are restored to the target system's junction point
or directory.
If a junction point or directory does not already exist in the same
location and with the same name as the junction point to be restored,
then the information for the junction point and the files and
directories to which they point will be restored.
Note If a junction point was originally backed up without the Back
up files and directories by following junction points check
box selected (see “Back up files and directories by following
junction points” on page 316), then the files and directories to
which the junction point is linked will not be restored, unless
the junction point was linked to a mounted drive that did not
have an assigned drive letter.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
Item Function
Pre-job command Specify a command to be run on the specified server before the
restore job is run. Use local paths, and make sure the paths exist on
each server and are correct.
Note Commands that require user interaction, such as prompts, are
not supported.
Post-job command Specify a command to be run on the specified server after the restore
job has run. Use local paths, and make sure the paths exist on each
server and are correct.
Note Commands that require user interaction, such as prompts, are
not supported.
Item Function
Run job only if pre-job Select this option to run the restore job only if the pre-job command
command is successful is successful. If the pre-job command fails, the job does not run, and
is marked as failed.
If it is critical that the job not run if the pre-job command fails, then
select Allow pre- and post-job commands to be successful only if
completed with a return code of zero. If a non-zero exit code is
returned, it is interpreted by Backup Exec to mean that the pre-job
command did not run successfully. The job is not run and the job
status is marked as Failed.
Run post-job command Select this option to run the post-job command only if the pre-job
only if pre-job command is command is successful.
successful If it is critical that the post-job command fail if the pre-job command
fails, then select Allow pre- and post job commands to be
successful only if completed with a return code of zero. If a
non-zero exit code is returned for the pre-job command, it is
interpreted by Backup Exec to mean that the pre-job command did
not run successfully. The post-job command is not run.
If you also select Run job only if pre-job command is successful,
and both the pre-job command and the job are successful, but the
post-job command returns a non-zero code, the job log reports both
the job and the post-job command as failed.
Run post-job command Select this option if it is critical to run the post-job command
even if job fails regardless if the job is successful or not.
If you also select Allow pre- and post job commands to be
successful only if completed with a return code of zero and the
post-job command returns a non-zero code, the job log reports the
post-job command as failed.
Item Function
Allow pre- and post-job Select this option to allow Backup Exec to check the return codes of
commands to be the pre- and post-job commands to determine if they completed
successful only if successfully.
completed with a return An exit code of zero returned to the operating system by the pre- or
code of zero post-job command is interpreted by Backup Exec to mean the
command completed successfully. A non-zero exit code is
interpreted by Backup Exec to mean the command ended with an
error.
After checking the return codes, Backup Exec continues processing
according to selections you made for running the pre- and post-job
commands.
If this option is not selected, the success of the pre- and post-job
commands is not determined based on the return code.
Cancel command if not Select the number of minutes Backup Exec should wait before
completed within x canceling a pre-job or post-job command that did not complete. The
minutes default time-out is 30 minutes.
On this media server Select this option to run the pre- and post-job commands on this
media server only.
On each server restored to Select this option to run the pre- and post-job commands one time on
each server backed up.
The pre- and post-job command selections apply to each server
independently. The pre- and post-job command selections apply to
each server independently. If you select this option, the pre- and
post-commands are run and completed for each server before
processing begins on the next selected server.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
“Setting Default Pre/Post Commands” on page 319
Note A System State backup is always a full backup. Therefore, when restoring, only the
most recent backup of the System State must be restored.
You should not cancel a System State restore operation. Canceling this operation
could leave the system unusable.
Caution Do not redirect System State restores. System State is computer-specific, and
restoring it to an alternate computer can cause severe software damage.
▼ To start the Backup Exec services and perform a local restore of System State data
on a domain controller:
1. Start the target server, press F8 when prompted for Startup Options, and then select
the Directory Services Restore Mode option.
4. Click Services.
b. Click the Log On tab, click This account, enter a user account with local
administrator’s rights, and then click OK.
c. Right-click the service, and then click Start on the shortcut menu.
6. After the Backup Exec services have started, run Backup Exec and perform a restore of
the System State.
Caution When restoring System State, you must reboot your system before performing
subsequent restore operations.
Note If you have more than one domain controller in the network and you want Active
Directory replicated to the other domain controllers, you must perform an
authoritative restore of the Active Directory.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
“Advanced options for restore” on page 412
Note The Dfs root must exist before the links can be restored.
See also:
“About Selecting Distributed File System (Dfs) Links for Backup” on page 261
Note Software-compressed data backed up with products other than Backup Exec for
Windows NT and Windows 2000 cannot be restored.
Note ARCserve supports the use of SMS to back up data. Data backed up using the SMS
option in ARCserve 4.x and 5.x cannot be restored. However, data backed up using
the SMS option in ARCserve 6.x and ARCserve 7.x can be fully restored.
Note Media containing ARCserve backups can be overwritten; however, backup append
operations are not supported. All Backup Exec media utility functions can be
performed on ARCserve media.
Note If the ARCserve backup spans multiple tapes, you must have all the tapes that were
included in the ARCserve backup available. Make sure you start both the catalog
and restore operations with the first tape used in the ARCserve backup.
Note Media-based catalogs are not supported on tapes created by other vendors’ backup
products. Because of this, cataloging ARCserve tapes takes considerably longer
than cataloging a tape made with Backup Exec.
Note Due to the naming conventions ARCserve uses for some systems, it may be
necessary to select a different location for the data using Backup Exec’s File
Redirection (see “Redirecting a Restore Operation” on page 436).
See also:
“Inventorying Media in Devices” on page 165
“Cataloging Media in a Drive” on page 397
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
“Redirecting a Restore Operation” on page 436
“Restoring Media Created With Other Backup Software” on page 425
Resource View
Local volume
Network volume
Backup type
Media View
To expand the view for a resource or piece of media, click the adjacent box that contains
the plus sign (+). To collapse the view, click the minus sign (-).
When the view is expanded, backup sets contained on the resource or media are
displayed. You can expand the backup set to view the data included in the backup. The
data that has been backed up from the resource appears in the right pane of the Restore
Job Properties - Selections dialog box. Remember that only media cataloged or backed up
at this server will be displayed in the views. If you want to restore data backed up at
another installation of Backup Exec, you will need to catalog the media first.
You can traverse file levels from either side of the window by clicking folders and
subfolders as they appear.
To select data, select the check box next to the drives, directory, or file you want to restore.
All files and directories at or below the selected directory level are included in the restore
operation (if the Include Subdirectories option is selected under the Edit menu). The
check box and check mark displayed vary depending on the item’s status.
Data Selections
A slash in a shaded check box means that
some items below the check box are selected,
but the item itself cannot be selected.
A slash in a check box means some items
below the directory or drive level are selected.
See also:
“Restore Operations and the Catalog” on page 396
“Cataloging Media in a Drive” on page 397
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
5. Click Change.
6. Select the logon account you want to use for this backup selection, or click New and
create a new logon account (see “Creating a Backup Exec Logon Account” on
page 350).
7. Click OK.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
“Redirecting a Restore Operation” on page 436
2. Click Advanced.
Item Description
Media Specification
Media Select the media that contains the files you want to restore.
File Specification
Backup Set Select the backup set for which you want to specify attributes.
Path Enter any available directory or subdirectory. Enter the full path
to the subdirectory.
Item Description
Include Subdirectories When this option is selected, all subdirectories (and their
contents) in the path you have entered are included in (or
excluded from) the operation. If you want to process only the
directory listed in the Path field, leave this option unchecked.
Type
Include (Default) Select this option to include the files in the operation.
Selection Criteria
Files Dated Include or exclude the files created or modified during the
specified time period.
4. If you expand the view for the resource from which you included (or excluded) files,
you will see check marks in the directories that contain files meeting the criteria you
specified.
5. Submit the operation using the same procedures required for other restore operations.
See also:
“Restoring Data to a Server or Workstation” on page 403
“Redirecting a Restore Operation” on page 436
4. Check the version of the file you want to restore and click Restore from the toolbar.
The Restore Job window opens.
5. Submit the job using the same procedures required for other restore jobs.
Backup Exec will prompt you to insert the correct media if it is not already located in a
drive.
See also:
“Restoring Data to a Server or Workstation” on page 403
Item Description
Location The server and share in which to search. If you do not want to limit
the search to a particular location, leave this field blank to search all
locations.
Path The directory in which to search. If you do not want to limit the
search to a particular directory, leave this field blank to search all
directories.
To search NetWare catalogs, use a forward slash (/).
File Name The name of the file to be searched. If you do not want to limit the
search to a particular file, leave this field blank to search all files.
Media The cataloged media to search. You can select All Cataloged Storage
Media to search the entire catalog, or you can select individual
media to narrow the search.
Find directories Select this option to search for directories listed in the Path or File
name fields.
Include subdirectories Select this option to search all subdirectories below the directory
listed under the Location field.
Item Description
All Files This option allows you to search for all files.
Find all files created or Select this option to search only for files that have been created or
modified modified in a specified time period.
Between x/x/x and x/x/x Click this option and enter specific dates by month, day, and year.
During the previous x Click this option if you want to restrict the search to the previous
month(s) month or months. You specify the number of months.
During the previous x Click this option if you want to restrict the search to the previous day
day(s) or days. You specify the number of days.
2. Select the data to be restored (see “Selecting Data to Restore” on page 428).
Item Description
Redirect file sets Click this option to specify target paths or resources other than
where the data was originally backed up.
Restore to drive Select the destination for the restored data. Click the Browse
button (...) to view local and network drives.
Item Description
Server logon account The current logon account being used by the server appears. If
you need to use another logon account, click Change, and then
select or create another account (see “Configuring Logon
Accounts” on page 347). Click Clear to clear this field.
Restore to path Specify the target path on the device listed in the Restore to Drive
field. If you want to retain the original directory structure, make
sure that the Preserve Tree option is selected in the Restore Job
Properties - Settings - General dialog box. If the Preserve tree
option is not selected, all of the data will be restored to the path
designated in this field.
Path logon account Enter the logon account required for the target path. If you need
to use another logon account, click Change, and then select or
create another account. Click Clear to clear this field.
Note If you are using BEWAC, you can only choose a pre-defined
logon account. You cannot create or edit a logon account.
Note Entering a name of an agent drive (Win98, Mac, UNIX) that does not appear in the
Restore to drive list box causes the agent restore operation to fail. To resolve this,
click Browse, and open the Remote Selections window. After Backup Exec detects
the agent, the agent shares will appear in the Restore to drive list and the restore
operation can be attempted again.
5. If you want to run the job now, click Run Now. Otherwise, in the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
See also:
“Preserve tree” on page 411
“Using Redirected Restore to Install Domain Controllers from Media” on page 439
“Redirecting Restores for SQL 2000” on page 1009
“Redirecting SharePoint Portal Server Restore Jobs” on page 1217
“Scheduling Jobs” on page 358
1. Perform a standard System State backup of an active .NET Server Domain Controller
that is in the target domain.
2. Transport the tape to the location of the system that will be installed into the target
Domain.
Caution The tape is not encrypted or protected. Use caution when transporting it to the
location of the target domain.
Note When you redirect restored data, Backup Exec creates a sub-directory for each type
of System State data being restored. Backup Exec creates the following
sub-directories: Active Directory, SYSVOL, Registry, Boot Files, COM+ Class
Registration Database, Certificate Server (if installed), and Cluster Quorum (if
installed).
6. To begin the Domain Controller installation, click Start on the target system, and then
click Run.
7. Type:
dcpromo /adv
8. Click OK.
12. Select From these restored backup files, and then enter the temporary location to
which you redirected the System State data in step 5.
14. Complete the Active Directory Installation Wizard by following the prompts on the
screen.
16. Reboot the system that has the new Domain Controller.
Item Description
Restore over existing Select this option to have Backup Exec overwrite files on the
files target resource that have the same name as files that are being
restored. Use this option only when you are sure that you want to
restore an older version of a file (or files).
Skip if file exists Select this option to prevent Backup Exec from overwriting files
on the target disk with files that have the same names that are
included in the restore operation.
Skip if existing file is Select this option to prevent Backup Exec from restoring over files
more recent that exist on the target resource if they are more recent than the
files included in the restore operation.
This option is useful if you are rebuilding a system. For example,
after installing the operating system on a crashed computer, you
could restore a previous full backup of the system without
worrying about overwriting later versions of operating system
files.
Restore corrupt files Backup Exec will automatically exclude corrupt files from the
restore process unless you select this option.
Item Description
Junction Points
Restore junction points, When this option is selected, the information for the junction
files and directories from points and the files and directories to which they are linked is
backup media restored. Selecting this option overwrites existing junction points
on your system.
If a junction point was originally backed up without the Back up
files and directories by following junction points check box
selected (see “Back up files and directories by following junction
points” on page 316), then the files and directories to which the
junction point is linked will not be restored, unless the junction
point was linked to a mounted drive that did not have an
assigned drive letter.
Preserve existing Select this option to restore files and directories backed up from
junction points and junction point links while retaining the system's current junction
restore files and points. This option keeps current junction points from being
directories from backup overwritten with the junction point information restored from the
media backup media.
When this option is selected and identical junction points or
directory names exist on both the target system and the media,
the files and directories are restored to the target system's junction
point or directory.
Note If a junction point or directory does not already exist in the
same location and with the same name as the junction point
to be restored, then the information for the junction point
and the files and directories to which they point will be
restored.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
2. Select the data to be restored (see “Selecting Data to Restore” on page 428).
Item Description
Restore Network
Network Interface Select the name of the network interface card that connects the
media server to the network you want to use for the backup
network. The list includes all available network interface cards on
the media server.
Subnet mask Displays the address of the network you selected as the restore
network.
Network ID Displays the 32-bit number that determines the subnet to which the
network interface card belongs.
Physical address Displays the network identification or subnet address that Backup
Exec calculated based on the network you selected as the restore
network.
Use any available Select this option if you want Backup Exec to attempt to connect
network route for using any available network route if a connection cannot be made
remote agents not using the specified network. If you do not select this option, and
bound to the above Backup Exec cannot connect using the specified network interface,
Network ID the restore job will fail.
6. If you want to run the job now, click Run Now. Otherwise, on the Properties pane,
under Frequency, click Schedule to set the scheduling options you want to use (see
“Scheduling Jobs” on page 358).
See also:
“Restoring Data to a Server or Workstation” on page 403
“Specifying Backup Networks” on page 323
You should not cancel a System State restore operation. Canceling this operation
could leave the system unusable.
2. Under Current Job View Filters, ensure Show active jobs is selected.
A set containing associated transaction logs for a SQL database that has
been partialized.
A set containing associated transaction logs for a SQL database that are
corrupt on the backup media.
An Exchange 2000 store transaction log set that has been partialized.
An Exchange 2000 store transaction log set that is corrupt on the backup
media.
An Exchange 2000 Directory store transaction log set that has been
partialized.
The backup set is incomplete because the backup job was aborted.
Review the backup job logs for additional information.
The backup set is incomplete because the backup job failed. Review the
backup job logs for additional information.
The Utility partition backup set is corrupt on the storage media. Review
the backup job logs for additional information.
453
Viewing and Filtering Alerts
❖ On the navigation bar, click Alerts and then under Views in the task pane, click the
type of alerts you want to view, either Active alerts or Alert history.
Alerts view
Notifications
Alerts and
The information that appears for each alert includes the following:
- Type of alert
- Category
- Message displayed by the alert
- Job Name
- Device Name
- Media server on which the alert occurred
- Source of the alert
- Time the alert was received
Values, properties, and alert messages for the selected alert also appear in the Active
Alert or Alert History Properties pane at the bottom of the view.
2. Under Views in the task pane, click the view for which you want to set filters, either
Active alerts or Alert history.
3. Under View Filters in the task pane, select or clear the filters for the alerts you want to
appear in the selected view.
The following types of alert filters can be selected for the Active alerts and Alert
history views.
Item Description
Show attention Lists alerts that require a response from the user.
required
Show errors Lists system, job, media, and device error alerts.
Show warnings Lists system, job, media, and device warning alerts.
Show information Lists system, job, media, and device information alerts.
Show system alerts Lists the alerts that originated from the system.
Show media alerts Lists the alerts that originated from media.
Show device alerts Lists the alerts that originated from devices.
Show job alerts Lists the alerts that originated from a job.
See also:
“Responding to Active Alerts” on page 459
Notifications
alert is in the alert history.
Alerts and
▼ To view alert properties:
2. Under Views in the task pane, click Active alerts or Alert history, depending on
where the alert for which you want to view properties is located.
3. Select the alert from either the Active Alerts or Alert History pane.
Alert Properties
Item Descriptions
Type The severity of the alert. The type helps you determine how quickly
you want to respond. Following are the alert types:
Errors
Warnings
Information
Attention Required
Job Name The name of the job associated with the alert.
Item Descriptions
Source The cause of the alert. Alerts can originate from one of the following
sources:
System
Job
Media
Device
SNMP trap The SNMP message from Backup Exec regarding status and error
Identification conditions.
Properties of Category
Send notifications Notifications are enabled or cleared for the alert. Recipients must be
configured in order to use this option.
Send SNMP SNMP notifications are enabled or cleared for the alert. SNMP must
notifications be installed to use this option.
Record in event log The alert is entered into the Windows Event Viewer. The Windows
Event log displays all the property information for the alert.
If a link appears in the Windows Event log you can search the
VERITAS Technical Support web site for information about the
Event ID.
Automatically clear Number of hours the alert remains active with no response
attempted before it is moved to the alert history.
Include job log Sends the job log to the recipient configured for notification. This
option can only be used for recipients that are configured for e-mail
or printer notification.
Response machine Name of the computer from which the user responded.
Time user responded Date and time the user responded to the alert.
Item Descriptions
Notifications
User response The response the user entered for the alert.
Alerts and
5. After you view the alert properties, click OK.
See also:
“Configuring Alert Category Properties” on page 463
“Configuring Recipients” on page 472
“Configuring SNMP Notification” on page 494
3. Select the alert to which you want to respond, and then under Alert Tasks in the task
pane, click Respond.
Note If you have more than one alert selected, click Respond OK to all to clear the
selected alerts to the alert history. The alerts must have an OK response available to
be automatically cleared.
Alert Options
Item Description
Message Describes the event that caused the alert and provides
suggestions for responding to the alert.
Server name The name of the computer on which the alert occurred.
Device name The name of the device on which the alert occurred.
Automatically display Select this check box to have alerts automatically appear in the
new alerts Backup Exec console when they are sent. If you do not select this
option, you must respond to alerts through the Active Alerts
pane. For more information, see “Changing Default Preferences”
on page 85.
2. Under Views in the task pane, click Active alerts or Alert history, depending on
where the alert for which you want to view the job log is located.
3. Select the alert for which you want to view the job log from either the Active Alerts or
Alert History pane.
Notifications
Alerts and
- If the alert is in Active alerts, under Alert Tasks in the task pane, click View job
log.
- If the alert is in the Alert history, under Alert History Tasks, click View job log.
6. After you have finished viewing the job log, click OK.
See also:
“Viewing Completed Jobs” on page 378
3. Under Alert Tasks in the task pane, click Clear all informational alerts.
All the informational alerts in the Active alerts pane are cleared to the Alert history.
3. On the Active Alerts pane, select the alert that you want to enable or disable.
4. Under Alert Tasks in the task pane, click Alert category enabled.
The alert will be enabled or disabled, depending on the current setting. The error and
attention required alert types cannot be disabled.
Notifications
configuration, it is recorded in the audit log. You can view the audit log at any time to
Alerts and
view the changes made to the alert category.
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Alert Tasks in the task pane, click Configure alert categories.
3. Under Alert Categories, click the alert for which you want to view or change
properties.
Tip You can change the options for more than one alert category simultaneously. To
select consecutive alert categories, click the first alert, press and hold down <Shift>,
and then click the last item. To select alert categories that are not consecutive, press
and hold down <Ctrl>, and then click each item.
Item Description
Category name The title of the alert. This property can be viewed, but not edited.
Enable alerts for this Select this check box to activate or disable the alert. You cannot
category disable alert types such as error and attention required.
You can also enable an alert category from the task pane. For
more information, see “Enabling or Disabling Alerts from the
Active Alerts Pane” on page 462.
Send notifications to Select this check box to send notifications when an alert occurs.
selected recipients You must have recipients configured to use this option.
To configure recipients to receive the notification, click
Recipients. For more information, see “Configuring Recipients”
on page 472.
Include job log with a Select this check box to send the job log to the recipient
notification to an e-mail configured for notification. The recipient must be configured to
or printer recipient receive e-mail or printer notifications.
Send SNMP Notifications Select this check box to enable SNMP notifications. SNMP must
be installed to use this option. For more information, see
“Configuring SNMP Notification” on page 494.
Record event in the Select this check box to enter the alert into the Windows Event
Windows Event Log Viewer. The Windows Event log displays all the property
information for the alert.
If a link appears in the Windows Event log you can search the
VERITAS Technical Support web site for information about the
Event ID.
Automatically clear after Select this check box to enter the number of minutes or hours you
x hours/minutes want the alert to remain active before it is moved to the Alert
history.
For attention required alerts, you can set a default response. For
more information, see “Edit Server Configurations” on page 801.
5. Click Apply to apply the properties to the alert and continue configuring additional
alerts.
Notifications
Alerts and
See also:
“Assigning Recipients to Alert Categories for Notification” on page 491
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Alert Tasks in the task pane, click Configure alert categories.
The Alerts Audit Log dialog box provides the following information:
Item Description
Date/Time The date and time the change was made to the alert’s category
properties.
User Name The user ID that made the change to the alert’s category properties.
Message The name of the alert category to which the change was made.
6. Click Close.
3. Select the alert you want to delete, and then under Alert History Tasks in the task
pane, click Delete.
Notifications
receive a notification.
Alerts and
You can configure notification methods for SMTP, MAPI, or Lotus Notes e-mail, and
native and alphanumeric pager configurations. Printer and Net Send are also methods of
notification, but they do not require you to configure them before creating and
configuring a recipient.
Configuring the notification method is the first step in assigning recipients to alert
categories for notification. After configuring the notification method, the next step is to
create recipients and assign a notification method by which the recipient will be notified
of an alert. The recipient can then be assigned to an alert category for notification when an
alert occurs.
See also:
“Configuring Recipients” on page 472
“Assigning Recipients to Alert Categories for Notification” on page 491
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Notification Tasks in the task pane, click Configure e-mail and pagers.
3. Click the SMTP Configuration tab and select the appropriate options as follows:
Item Description
SMTP mail server Type the name of an SMTP mail server on which you have a valid
user account. Backup Exec will not check the server name or the
e-mail address for validity.
SMTP port Defaults to a standard SMTP port. In most cases, the default
should not have to be changed.
Default sender Type the e-mail address of the user from whom the notification
message will be sent.
The e-mail address should contain a name that identifies the user
to the mail server, followed by an at sign (@) and the host name
and domain name of the mail server. For example,
john.smith@company.com.
4. Click OK.
See also:
“Configuring Recipients” on page 472
Notifications
Alerts and
▼ To configure MAPI alert notification:
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Notification Tasks in the task pane, click Configure e-mail and pagers.
3. Click the MAPI Configuration tab and select the appropriate options as follows:
Item Description
Mail server name Type the name of the Exchange server. You must use an Exchange
server to which the Backup Exec service account has access. For
more information, see “Changing Windows Security” on page 44.
Mailbox name to send Type the mailbox from whom the notification message will be
e-mail from sent, for example, John Smith. The name appears in the From field
in the message and does not require a full address.
4. Click OK.
See also:
“Configuring Recipients” on page 472
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Notification Tasks in the task pane, click Configure e-mail and pagers.
3. Click the VIM Configuration tab and select the appropriate options as follows:
Item Description
Notes client directory Type the path of the directory in which the Notes client is located.
Mail password Type the password that enables you to connect to the Notes client.
Item Description
Notifications
Confirm mail password Re-type the password that enables you to connect to the Notes
Alerts and
client.
4. Click OK.
See also:
“Configuring Recipients” on page 472
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Notification Tasks in the task pane, click Configure e-mail and pagers.
The Notification Configuration Properties dialog box appears.
3. Click the Pager Configuration tab and select Enable to activate this alert notification
method.
4. Select a modem from the Select a modem for sending pages option.
Only modems recognized in Windows appear in the list box.
5. Click OK.
Configuring Recipients
Recipients are individuals with a predefined notification method, computer consoles,
printers, or groups. Recipient configuration consists of selecting a notification method and
defining notification limits. After you create entries for the recipients, you can assign them
to alerts or jobs. The following types of recipients can be configured for notifications:
◆ Person. An individual that has a predefined method of notification such as SMTP,
MAPI, or VIM e-mail, or a pager. You must configure the notification method before
you can enable it for the recipient.
◆ Net Send. A computer that serves as a notification recipient.
◆ Printer. A specific printer to which notifications can be sent.
◆ Group. A group of one or more recipients, including person recipients, Net Send
recipients, and other groups.
See also:
“Configuring E-mail and Pager Notification Methods” on page 467
“Assigning Recipients to Alert Categories for Notification” on page 491
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Click New, click Person in the Recipient Type dialog box, and then click OK.
Notifications
Alerts and
4. In the Name field, type the name of the recipient that you want to configure.
5. Click the SMTP Mail tab and select the appropriate options as follows:
Item Description
Enable Select this check box to activate this notification method for the
recipient.
Address Type the e-mail address of the recipient to whom the notification
message will be sent. For example, john.smith@company.com.
Test Enables you to test the notification configuration for the recipient.
Item Description
Notify me a maximum of Type the total number of notifications you want sent to the
x times within x minutes recipient for all alerts generated within the specified number of
minutes. After the specified number of notifications have been
sent, additional notifications are not sent until the specified
minutes have been reached. The maximum number of minutes
that can be set is 1440, which is the number of minutes in a day.
Reset the notification Select this check box to enter the number of minutes that must be
limits after x minutes reached before the notification limits are reset. When the time
limit has been reached, the number of notifications sent is reset to
zero.
Enable Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule Enables you to select the days and times when notifications can
be sent to the recipient. For more information, see “Scheduling
Notification for Recipients” on page 488.
6. Click OK.
See also:
“Editing Recipient Notification Methods” on page 489
“Editing Recipient Notification Properties” on page 489
“Assigning Recipients to Alert Categories for Notification” on page 491
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Click New, click Person in the Recipient Type dialog box, and then click OK.
Notifications
Alerts and
4. In the Name field, type the name of the recipient that you want to configure.
5. Click the MAPI Mail tab and select the appropriate options as follows:
Item Description
Enable Select this check box to activate this notification method for the
recipient.
Test Enables you to test the notification configuration for the recipient.
Item Description
Notify me a maximum of Type the total number of notifications you want sent to the
x times within x minutes recipient for all alerts generated within the specified number of
minutes. After the specified number of notifications have been
sent, additional notifications are not sent until the specified
minutes have been reached. The maximum number of minutes
that can be set is 1440, which is the number of minutes in a day.
Reset the notification Select this check box to enter the number of minutes that must be
limits after x minutes reached before the notification limits are reset. When the time
limit has been reached, the number of notifications sent is reset to
zero.
Enable Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule Enables you to select the days and times when notifications can
be sent to the recipient. For more information, see “Scheduling
Notification for Recipients” on page 488.
6. Click OK.
See also:
“Editing Recipient Notification Methods” on page 489
“Editing Recipient Notification Properties” on page 489
“Assigning Recipients to Alert Categories for Notification” on page 491
Notifications
Alerts and
▼ To configure VIM mail for a person recipient:
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Click New, click Person in the Recipient Type dialog box, and then click OK.
4. In the Name field, type the name of the recipient that you want to configure.
5. Click the VIM Mail tab and select the appropriate options as follows:
Item Description
Enable Select this check box to activate this notification method for the
recipient.
Address Type the e-mail address of the recipient to whom the notification
message will be sent. For example, JohnSmith@company.com.
Test Enables you to test the notification configuration for the recipient.
Notify me a maximum of Type the total number of notifications you want sent to the
x times within x minutes recipient for all alerts generated within the specified number of
minutes. After the specified number of notifications have been
sent, additional notifications are not sent until the specified
minutes have been reached. The maximum number of minutes
that can be set is 1440, which is the number of minutes in a day.
Reset the notification Select this check box to enter the number of minutes that must be
limits after x minutes reached before the notification limits are reset. When the time
limit has been reached, the number of notifications sent is reset to
zero.
Enable Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule Enables you to select the days and times when notifications can
be sent to the recipient. For more information, see “Scheduling
Notification for Recipients” on page 488.
6. Click OK.
See also:
“Editing Recipient Notification Methods” on page 489
“Editing Recipient Notification Properties” on page 489
“Assigning Recipients to Alert Categories for Notification” on page 491
Notifications
Alerts and
▼ To configure a pager for a person recipient:
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Click New, click Person in the Recipient Type dialog box, and then click OK.
4. In the Name field, type the name of the recipient that you want to configure.
5. Click the Pager tab and select the appropriate options as follows:
Item Description
Enable Select this check box to activate this notification method for the
recipient.
Carrier Phone Type the area code and phone number to access the paging
service provider’s modem. The paging service number may be
different from the number you enter to manually enter a page.
Country/region name and Enter the country or region name and country code in which the
code pager is located.
Pager Pin Type the pager identification number provided by the paging
service provider. You will have a pin if you use TAP services and
in most cases, the number is the last seven digits of the pager’s
phone number.
Advanced Enables you to configure additional settings for the pager. For
more information about the options, see “Advanced Pager
Information dialog box” on page 481.
Test Enables you to test the notification configuration for the recipient.
Notify me a maximum of Type the total number of notifications you want sent to the
x times within x minutes recipient for all alerts generated within the specified number of
minutes. After the specified number of notifications have been
sent, additional notifications are not sent until the specified
minutes have been reached. The maximum number of minutes
that can be set is 1440, which is the number of minutes in a day.
Reset the notification Select this check box to enter the number of minutes that must be
limits after x minutes reached before the notification limits are reset. When the time
limit has been reached, the number of notifications sent is reset to
zero.
Item Description
Notifications
Limit when notifications can be sent
Alerts and
Enable Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule Enables you to select the days and times when notifications can
be sent to the recipient. For more information, see “Scheduling
Notification for Recipients” on page 488.
6. Click Advanced to configure advanced pager setup options and select the appropriate
options as follows:
Item Description
Pager Configuration
Message Length Type the maximum number of characters you want to use for
messages. The number is determined by the paging service
provider.
Retrys Type the number of times you want the paging service provider to
retry the page. The number is determined by the paging service
provider.
Pager type
Numeric Select this option if you are configuring a pager that accepts only
numbers.
Alpha-numeric Select this option if you are configuring a pager that accepts letters
and numbers.
Item Description
Modem Configuration
Modem Baud Rate Select the speed of the modem. The speeds that appear are limits set
by the paging service; select the appropriate speed regardless of the
modem speed rating.
Data bits, Parity, Stop Select the communication protocol. In most cases, you should use
bit the Windows default.
7. Click OK to save the settings in the Advanced Pager Information dialog box, and then
click OK to save the pager configuration settings.
See also:
“Editing Recipient Notification Methods” on page 489
“Editing Recipient Notification Properties” on page 489
“Assigning Recipients to Alert Categories for Notification” on page 491
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Click New, click Net Send in the Recipient Type dialog box, and then click OK.
Notifications
Alerts and
4. Select the appropriate options as follows:
Item Description
Name Type the recipient for whom you are configuring the notification.
Target Computer or User Type the name of the computer or user to whom you are sending
Name the notification. You should enter a computer rather than a user
because the Net Send message will fail if the user is logged off the
network.
All Computers Select the check box to send the notification to all the computers
in the network.
Test Enables you to test the notification configuration for the recipient.
Item Description
Notify me a maximum of Type the total number of notifications you want sent to the
x times within x minutes recipient for all alerts generated within the specified number of
minutes. After the specified number of notifications have been
sent, additional notifications are not sent until the specified
minutes have been reached. The maximum number of minutes
that can be set is 1440, which is the number of minutes in a day.
Reset the notification Select this check box to enter the number of minutes that must be
limits after x minutes reached before the notification limits are reset. When the time
limit has been reached, the number of notifications sent is reset to
zero.
Enable Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule Enables you to select the days and times when notifications can
be sent to the recipient. For more information, see “Scheduling
Notification for Recipients” on page 488.
5. Click OK.
See also:
“Editing Recipient Notification Methods” on page 489
“Editing Recipient Notification Properties” on page 489
“Assigning Recipients to Alert Categories for Notification” on page 491
Notifications
using the same username and password as the Backup Exec service account can be
Alerts and
selected.
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Click New, click Printer in the Recipient Type dialog box, and then click OK.
Item Description
Name Type the recipient for whom you are configuring the notification.
You cannot use a fax printer device to receive the notification.
Target Printer Select the name of the printer to which the notification message
will be sent.
Test Enables you to test the notification configuration for the recipient.
Notify me a maximum of Type the total number of notifications you want sent to the
x times within x minutes recipient for all alerts generated within the specified number of
minutes. After the specified number of notifications have been
sent, additional notifications are not sent until the specified
minutes have been reached. The maximum number of minutes
that can be set is 1440, which is the number of minutes in a day.
Reset the notification Select this check box to enter the number of minutes that must be
limits after x minutes reached before the notification limits are reset. When the time
limit has been reached, the number of notifications sent is reset to
zero.
Enable Select this check box to activate the option and configure the
length of time the recipient is available for notification.
Schedule Enables you to select the days and times when notifications can
be sent to the recipient. For more information, see “Scheduling
Notification for Recipients” on page 488.
6. Click OK.
See also:
“Editing Recipient Notification Methods” on page 489
“Editing Recipient Notification Properties” on page 489
“Assigning Recipients to Alert Categories for Notification” on page 491
Notifications
group can be a combination of individual persons, computers, printers, or other groups.
Alerts and
▼ To configure a group recipient:
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Click New, click Group in the Recipient Type dialog box, and then click OK.
4. In the Group Name field, type the group for whom you are configuring the
notification.
5. To add members to the group, select recipients from the All Recipients list, and then
click Add to move them to the Group Members list.
6. To remove members from the group, select recipients from the Group Members list,
and then click Remove to move them to the All Recipients list.
1. Under the Limit when notifications can be sent group box, click Enable to activate
the option.
2. Click Schedule.
3. Clear the Include work days check box to exclude Monday through Friday from 8
A.M. to 6 P.M.
4. Clear the Include weeknights check box to exclude Monday through Friday from 6
P.M. to 8 A.M.
5. Clear the Include weekends check box to exclude Saturday and Sunday, 24 hours a
day.
6. You can select any combination of Include work days, Include weeknights, or
Include weekends, or click any single hour of the chart to select or clear that hour.
7. After selecting the days and times you want, click OK.
Notifications
Alerts and
Editing Recipient Notification Properties
You can edit the recipient notification properties at any time and change the recipient
information, such as an e-mail address, telephone number or schedule.
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Select the recipient you want to edit, and then click Properties.
The Recipient Properties dialog box for the type of recipient you selected appears.
5. Click OK.
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Notification Tasks in the task pane, click Assign recipients to alert categories.
The Alert Notification Setup dialog box appears.
5. Click OK.
Removing Recipients
You can delete recipients that do not want to receive notification messages; however, the
recipient is permanently removed upon deletion. If you want to keep the recipient, but do
not want the recipient to receive notifications, clear the Enable check box in the recipient
properties.
▼ To remove a recipient:
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
3. Select the recipient you want to delete, and then click Remove.
Notifications
message. You can also clear a recipient from an alert category and edit properties for the
Alerts and
alert categories during the alert notification setup.
1. On the navigation bar, click Alerts and then under Views in the task pane, click
Active alerts.
2. Under Notification Tasks in the task pane, click Assign recipients to alert categories.
3. Under Alert Categories, select the alert category to which you want to assign
recipients.
4. Under Recipients, select the recipients you want to receive notification messages for
the alert category, or click Check All to select all the recipients in the list.
5. Click OK.
❖ Under Alert Categories, select the alert category from which you want to clear the
recipient and then under Recipients, click the check box for the recipient you want to
clear.
1. Under Alert Categories, select the alert category you want to modify.
You can select more than one alert category and the properties you modify will be
applied to all the selected alert categories.
2. Click Properties.
The Alert Category Properties dialog box appears.
4. Click OK.
See also:
“Configuring Alert Category Properties” on page 463
“Configuring E-mail and Pager Notification Methods” on page 467
“Configuring Recipients” on page 472
1. Determine the type of job for which you want to configure notifications.
The job dialog box appears that enables you to select properties for the job.
4. If the recipient is using an e-mail or printer notification method, click Include job log
with a notification to an e-mail or printer recipient.
5. You can start the job after configuring the notifications or select other options from
Notifications
the Properties pane.
Alerts and
▼ To configure new recipients or edit recipient properties when you set up a job:
1. Determine the type of job for which you want to configure new recipients or edit
recipient properties.
The job dialog box appears that enables you to select properties for the job.
a. In the Group Name field, type the group for whom you are configuring the
notification.
b. To add members to the group, select recipients from the All Recipients list, and
then click Add to move them to the Group Members list.
c. To remove members from the group, select recipients from the Group Members
list, and then click Remove to move them to the All Recipients list.
5. Click OK.
6. You can start the job after configuring the new recipients or edit recipient properties
or select other options from the Properties pane.
See also:
“Backing Up Data” on page 233
Job Canceled 1302.3.1.2.8.2 Backup Exec: machine name job name local or remote
Job canceled by Operator name
Operator
Job Failed 1302.3.1.2.8.1 Backup Exec: machine name job name detail message
Job failed
Storage device 1302.3.2.5.3.3 Backup Exec: machine name job name detail message
requires Storage device
human requires
intervention attention
Robotic library 1302.3.2.4.3.3 Backup Exec: machine name job name detail message
Notifications
requires robotic library
Alerts and
human device requires
intervention attention
Backup Exec 1302.3.1.1.9.3 The machine name job name detail message
system error application has
encountered an
error
Backup Exec 1302.3.1.1.9.4 Information on machine name job name detail message
general normal events
information
Job Success 1302.3.1.2.8.3 The job machine name job name detail message
succeeded
Job Success 1302.3.1.2.8.4 The job machine name job name detail message
with succeeded, but
exceptions there was a
problem
Job Started 1302.3.1.2.8.5 The job has machine name job name detail message
started
Job Completed 1302.3.1.2.8.6 The job machine name job name detail message
with no data succeeded, but
there was no
data
Job Warning 1302.3.1.2.8.7 The job has a machine name job name detail message
warning
PVL Device 1302.3.1.5.1.1.1 The device has machine name job name detail message
Error encountered an
error
PVL Device 1302.3.1.5.1.1.2 The device has machine name job name detail message
Warning encountered a
warning
PVL Device 1302.3.1.5.1.1.3 Normal device machine name job name detail message
Information information
PVL Device 1302.3.1.5.1.1.4 Device machine name job name detail message
Intervention requires
attention
PVL Media 1302.3.1.5.2.1.1 There is an machine name job name detail message
Error error with the
media
PVL Media 1302.3.1.5.2.1.2 There may be a machine name job name detail message
Warning problem with
the media
PVL Media 1302.3.1.5.2.1.3 Normal media machine name job name detail message
Information information
PVL Media 1302.3.1.5.2.1.4 Media requires machine name job name detail message
Intervention attention
Catalog Error 1302.3.1.5.3.1.1 There is an machine name job name detail message
error with the
catalog
Tape Alert 1302.3.1.5.4.1.1 There is a machine name job name detail message
Error TapeAlert error
Tape Alert 1302.3.1.5.4.1.2 There is a machine name job name detail message
Warning TapeAlert
warning
Tape Alert 1302.3.1.5.4.1.3 Normal machine name job name detail message
Information TapeAlert
information
Notifications
Maintenance database
Alerts and
Error maintenance
error
Install Update 1302.3.2.5.7.1.1 There is an machine name job name detail message
Warning install warning
Install Update 1302.3.2.5.7.1.2 Normal Install machine name job name detail message
Information information
In order to receive Backup Exec traps at the SNMP console, you must configure the SNMP
system service with the SNMP console's IP address.
▼ To install the SNMP system service and configure it to send traps to the SNMP
console for Windows NT:
4. From the Network Services list, select SNMP Service, and then click Properties.
7. In the Trap Destination field, add the IP address of the SNMP console. Multiple IP
addresses can be added.
8. Click OK.
9. Click Close.
▼ To install the SNMP system service and configure it to send traps to the SNMP
console for Windows 2000 and .NET:
1. Click Start, point to Settings, point to Control Panel, and then double-click
Add/Remove Programs.
5. Click Next.
SNMP starts automatically after installation. You must be logged on as an
Notifications
Alerts and
administrator or a member of the Administrators group in order to complete this
procedure. If your computer is connected to a network, network policy settings might
also prevent you from completing this procedure.
See also:
“Configuring Alert Category Properties” on page 463
Note If you are using Windows NT 4.0, you must install WMI before you install the
performance counter and SNMP providers.
Note Before you install the SNMP provider included with Backup Exec, you must have
the Microsoft SNMP provider installed on your system. For more information, refer
to your Microsoft documentation.
Note To use the WMI SNMP provider you must set up SNMP notification.
Reports
can then run and view the report immediately, or you can create a new job that saves the
report data in the Job History. You can also view general properties for each report.
The Backup Exec Admin Plus Pack Option provides an additional 24 reports and
advanced reporting capabilities such as scheduling and notification.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
“Available Reports” on page 513
“Advanced Reporting Capabilities” on page 832
501
Viewing Reports
Viewing Reports
Reports are generated using Crystal Reports and can be viewed and printed in an HTML
file format. If the Adobe Acrobat Reader is detected by Backup Exec, reports are displayed
in Adobe Portable Document Format (PDF). To go to a web site to download the Adobe
Acrobat Reader, on the Help menu, click Adobe® Acrobat® Web Site.
To properly format integrated Backup Exec reports, you must configure a default printer
using the Windows Control Panel Printers applet. This is required even if you do not have
a printer attached to your system.
Available Reports
See also:
“Running and Viewing a New Report Job” on page 506
“Viewing Report Properties” on page 512
“Available Reports” on page 513
Running a Report
When you run a report, you can specify the criteria that is used to determine the items that
will be included in the report. The parameters available for you to select depend on the
type of data that can be included in the report. After the report is generated, only the items
that match the criteria appear in the report.
▼ To run a report:
Reports
3. Under Report Tasks in the task pane, click Run report now.
4. In the Filters tab, select the appropriate filter parameters for the data you want to
include in the report.
If filter parameters are not available for a report, you will not be able to select the
parameter. Select the appropriate options as follows:
Report filters
Item Description
Media set Filters the report based on media set names. Media sets include all
the media that is inserted into the storage device. For more
information on media sets, see “Media Categories” on page 190.
Job priority Filters the report based on job priorities. If another job is scheduled
to run at the same time as this job, the priority you set determines
which job runs first. Available priorities include:
Highest
High
Medium
Low
Lowest
Media server Filters the report based on media server names. The media server is
the server on which Backup Exec is installed.
Protected server Filters the report based on specific protected server names. The
protected server is the server that is being backed up.
Item Description
Vault Filters the report based on specific vault names. A media vault is a
virtual representation of the actual physical location of media. For
more information on media vaults, see “Media Location” on
page 209.
5. Click the Ranges tab and select the appropriate range parameters for the data you
want to include in the report.
If range parameters are not available for a report, you will not be able to select the
parameter. Select the appropriate options as follows:
Report ranges
Item Description
Number of days before Type the number of days prior to the current day to begin the filter
day report runs process on the data to be included in the report. You can enter a
minimum of 0 and a maximum of 32,000 days.
Number of days after Type the number of days after the current day to begin the filter
day report runs process on the data to be included in the report. You can enter a
minimum of 0 and a maximum of 32,000 days.
Number of hours Type the number of hours either before or after the present hour to
within time report filter the data to be included in the report. The time frame depends
on the type of report. You can enter a minimum of 0 and a maximum
of 32,000 hours.
Event count Select this check box to enable the event count filter.
Maximum number of Enter the number of events to include in the report. Events generate
events to include alerts and originate from one of the following sources: system, job,
media, or device. You can enter a minimum of 0 and a maximum of
32,000 events.
Note Entering a value of zero for the range parameter does not limit the amount of data
included in the report; this can result in an extensive report.
7. To save the report, click Save As; for a report in PDF, click the Save a Copy icon.
When prompted, enter the file name and location where you want to save the report
and then click Save.
The report is saved in the location you specify. Backup Exec also creates a folder, with
the same name as the report, in the same location in which the report is saved. The
folder contains images and report pages that enable you to view the saved report.
8. To print the report, click Print; for a report in PDF, click the Print icon. You must have
Reports
a printer attached to the computer, and configured in order to print the report.
For reports in an HTML format, do the following:
- To ensure the reports print correctly, in the Layout tab of the Print dialog box,
under Orientation, select Landscape.
- To print all the pages in a multiple page report, in the Options tab of the Print
dialog box, select Print all linked documents.
Note If all the data does not print in an HTML-formatted report, you may need to edit the
page setup for the report. To edit the page setup, open Microsoft Internet Explorer,
and then on the File menu, click Page Setup. Under Header and Footers, delete the
Header and Footer and then under Margins, set the Left and Right margins to the
minimum setting that your printer will accept.
2. On the Reports pane, select the report for which you want to run a job.
3. Under Report Tasks in the task pane, click New report job.
4. On the Properties pane, under Settings, click General and then type the name for the
job in Job name and select the Job priority.
If another job is scheduled to run at the same time as this job, the priority you set
determines which job runs first.
5. On the Properties pane, under Settings, click Filters, and then select the appropriate
filter parameters for the data you want to include in the report.
If filter parameters are not available for a report, you will not be able to view the
parameters. Select the appropriate options as follows.
Report filters
Item Description
Media set Filters the report based on media set names. Media sets include all
the media that is inserted into the storage device. For more
information on media sets, see “Media Categories” on page 190.
Reports
Job priority Filters the report based on job priorities. The job priority determines
which job runs first. Available priorities include:
Highest
High
Medium
Low
Lowest
Media server Filters the report based on media server names. The media server is
the server on which Backup Exec is installed.
Protected server Filters the report based on specific protected server names. The
protected server is the server that is being backed up.
Vault Filters the report based on specific vault names. A media vault is a
virtual representation of the actual physical location of media. For
more information on media vaults, see “Media Location” on
page 209.
6. On the Properties pane, under Settings, click Ranges and select the appropriate range
parameters for the data you want to include in the report.
If range parameters are not available for a report, you will not be able to select the
parameter. Select the appropriate options as follows
Report ranges
Item Description
Number of days before Type the number of days prior to the current day to begin the filter
day report runs process on the data to be included in the report. You can enter a
minimum of 0 and a maximum of 32,000 days.
Number of days after Type the number of days after the current day to begin the filter
day report runs process on the data to be included in the report. You can enter a
minimum of 0 and a maximum of 32,000 days.
Number of hours Type the number of hours either before or after the present hour to
within time report filter the data to be included in the report. The time frame depends
on the type of report. You can enter a minimum of 0 and a maximum
of 32,000 hours.
Event count Select this check box to enable the event count filter.
Maximum number of Enter the number of events to include in the report. Events generate
events to include alerts and originate from one of the following sources: system, job,
media, or device. You can enter a minimum of 0 and a maximum of
32,000 events.
Note Entering a value of zero for the range parameter does not limit the amount of data
included in the report; this can result in an extensive report.
7. On the Properties pane, under Settings, click Notification and enter notification
information for the items. For more information, see “Selecting Recipients for Job
Notification” on page 492.
When the notification is sent to the recipient, the report is not included.
8. On the Properties pane, under Frequency, click Schedule and then click Submit job
on hold if you want to submit the job with an on-hold status.
Select this option if you want to submit the job, but do not want the job to run until
you change the job’s hold status.
9. Click Enable automatic cancellation, and then type the number of hours or minutes
in the Cancel job if not completed within option.
Select this option if you want to cancel the job if is not completed within the selected
number of hours or minutes. Backup Exec starts timing the length of time the job
takes to run when the job actually begins, not the scheduled time.
10. After you have completed all the items you want to set for the new report job, click
Reports
Run Now.
The report is submitted according to the options you selected.
Note If you are using BEWAC, click Next to submit the report to the job queue. After
viewing the job summary, click Finish.
2. On the Job History pane, select the report you want to view.
4. Click Job History to view detailed information about the job or Report to view the
contents of the report.
5. To print the report, click Print; for a report in PDF, click the Print icon. You must have
a printer attached to the computer, and configured in order to print the report.
For reports in an HTML format, do the following:
- To ensure the reports print correctly, in the Layout tab of the Print dialog box,
under Orientation, select Landscape.
- To print all the pages in a multiple page report, in the Options tab of the Print
dialog box, select Print all linked documents.
Note If all the data does not print in an HTML-formatted report, you may need to edit the
page setup for the report. To edit the page setup, open Microsoft Internet Explorer,
and then on the File menu, click Page Setup. Under Header and Footers, delete the
Header and Footer and then under Margins, set the Left and Right margins to the
minimum setting that your printer will accept.
2. On the Job History pane, right-click the report you want to save.
4. Enter the file name and location where you want to save the report and then click
Save.
The report is saved in the location you specify. Backup Exec also creates a folder, with
the same name as the report, in the same location in which the report is saved. The
folder contains images and report pages that enable you to view the saved report.
2. On the Job History pane, select the report you want to delete.
Reports
“Configuring Database Maintenance” on page 389
“Viewing Completed Jobs” on page 378
“Available Reports” on page 513
“Advanced Reporting Capabilities” on page 832
▼ To view a report:
2. On the Reports pane, select the report for which you want to view properties.
Report Properties
Item Description
Subject The version of the product for which the report was created.
Creation Date The date the report was installed on the system.
Available Reports
This section provides detailed information about each report available in Backup Exec.
The file name of the report, a description, and the information included in the report are
listed for each report. The data included in each report will vary depending on the criteria
you selected to include in the report.
Reports
The following reports are included in Backup Exec:
Active Alerts Lists all active alerts chronologically, displaying the most recent
alerts first (see “Active Alerts Report” on page 515).
Alert History Lists all alerts in the alert history chronologically, displaying the
most recent alerts first (see “Alert History Report” on page 515).
Audit Log Lists the contents of the audit logs for selected servers for the
specified time period (see “Audit Log Report” on page 517)
Backup Sets by Media Set Lists all backup sets by media set (see “Backup Sets by Media Sets
Report” on page 517).
Configuration Settings Lists the contents of the Backup Exec system configuration
parameters table (see “Configuration Settings Report” on page 518).
Device Summary Lists device usage and error summary for each selected media server
(see “Device Summary Report” on page 519).
Error Handling Rules Lists all the defined error-handling rules (see “Error-Handling Rules
Report” on page 521).
Event Logs Lists all Backup Exec and other system and application event logs
(see “Event Logs Report” on page 522).
Media Set Lists all the media sets and media used by Backup Exec servers. The
current location is given for each media (see “Media Set Report” on
page 523).
Media Vault Contents Lists the media located in each media vault (see “Media Vault
Contents Report” on page 524).
Operations Overview Lists past and future operations data for user-set period (see
“Operations Overview Report” on page 525).
Robotic Library Inventory Lists the contents of slots in robotic libraries attached to media
servers. Usage statistics are provided for each piece of media (see
“Robotic Library Inventory Report” on page 526).
Scratch Media Availability Lists the aging distribution of media. Shows how many media are
available for overwrite and when other media will become available
for overwrite (see “Scratch Media Availability Report” on page 527).
Test Run Results Lists the results for the test run jobs set for the selected time period
and media servers (see “Test Run Results Report” on page 528).
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
“Viewing Report Properties” on page 512
Item Description
Reports
Media Server Name of the media server on which the alert occurred.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Item Description
Job Name The name of the job associated with the alert.
Media Server Name of the media server on which the alert occurred.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Reports
Media Server Name of the media server on which the audit logs are located.
Category Category in which the change occurred, such as Logon Account, Alerts,
or Job.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Media Set Name of the media set on which the job ran.
Item Description
Method Specific type of backup. For more information on backup methods, see
“Understanding Backup Methods and Their Advantages” on page 340.
Date / Time Date and time the data was backed up.
Backup Set Description Describes the data that was backed up and the location of the data.
/ Source
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Class Parameters that are associated with the Backup Exec system.
Item Description
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Reports
Device Summary Report
The Device Summary report lists all the devices for each selected media server. You can
limit the amount of data that appears in the report by selecting filter parameters for the
Media server option.
Information displayed in the Device Summary report is described in the following table.
Item Description
Device Name Name of the device, such as the name of the robotic library. This field is
left blank for stand-alone drives.
Vendor/Product ID Name of the vendor of the drive, the product ID, and firmware from the
SCSI Inquiry string.
SCSI Target Address of the SCSI Card, SCSI Bus, Target Device ID, and LUN.
Item Description
Hours Hours the device has been in use since the last cleaning job.
Totals
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Reports
Name
Description Information entered in the Notes section when the error-handling rule
was created.
Job Status Final job status that activates the rule. Possible statuses are:
Error
Canceled
Error Code The category of error for which the rule will be applied. Available error
categories include:
Device
Job
Media
Network
Other
Resource
Security
Server
System
Hold Device Displays an X if this option is selected for the error-handling rule. The
option holds all jobs for the device after the maximum number of retries
have been attempted.
Pause Job Displays an X if this option is selected for the error-handling rule. The
option enables Backup Exec to pause the job until you can manually
clear the error.
Retry Job Displays an X if this option is selected for the error-handling rule. The
option enables Backup Exec to retry the job.
Item Description
Postpone Retries Number of minutes the job is to wait before being retried.
(minutes)
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Number The number assigned to the event in the Windows Event log.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Reports
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
Totals
Hours Total number of hours that this media has been in use.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Operations Overview
Item Description
Reports
Job summary for jobs Details Backup Exec job activity for the specified time period.
completed in the past x
Hours
Exceptions Total number of jobs that completed successfully, but may contain one
or more skipped files, corrupt files, virus infected files or files in use.
Media Total Total number of media used to back up the completed jobs.
Errors Total number of system, job, media, and device error alerts.
Information Total number of system, job, media, and device information alerts.
Attention Required Total number of alerts that require a response from the user.
Media Availability
Item Description
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
Item Description
Full Space available on a media; “1” indicates that media is full and “0”
indicates that there is space available on the media.
Reports
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
Item Description
Size (MB) Capacity of the scratch media available to which data can be written.
Group Total Total number and capacity of scratch media available to the system.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Media Server Name of the media server on which the job ran.
Job Date and Time Run Date and time the backup job was processed.
Max Needed Amount of space needed on the media to run the job.
Item Description
Available to Append, MB
Available to Overwrite, MB
Reports
Online Capacity of media available in the device to which data can be written.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Preparation
Disaster
◆ Manual recovery. This section provides procedures for manually recovering both local
and remote Windows .NET/XP/2000/NT computers.
◆ Automated recovery. Backup Exec’s Intelligent Disaster Recovery (IDR) option
automates the disaster recovery process for Windows .NET/XP/2000/NT computers.
IDR is an option you must purchase separately.
See also:
“VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 855
“Disaster Preparation of the Windows Computer” on page 533
“Manual Disaster Recovery of Windows Computers” on page 540
531
Key Elements of a Disaster Preparation Plan (DPP)
Preparation
includes procedures for each type of computers.
Disaster
Note Any changes made to the system since the last time the configuration was saved are
lost.
▼ To create a copy of the current hardware profile and make that the preferred boot
option:
3. Click Hardware.
6. Type the name for the new configuration in the To field, and then click OK.
7. To make the new profile the preferred boot option, select it, and then click the up
arrow next to the list box to move the new hardware profile to the top of the box.
8. Choose whether Windows is to use the new hardware profile automatically (after a
delay) during startup, or if the system should wait indefinitely until the hardware
profile is chosen by selecting the appropriate option.
9. Click OK.
The new configuration is saved, and the startup options are set.
See also:
“Returning to the Last Known Good Menu” on page 533
“Creating an Emergency Repair Disk” on page 535
“Creating and Using an Emergency Boot Diskette” on page 537
Preparation
to keep the ERD updated whenever system changes are made. The ERD is only useful if it
Disaster
is kept current.
For Windows XP or .NET, Emergency Repair Disk has been replaced with Automated
System Recovery (ASR).
Whenever a major change is made to the system, make a fresh copy of the ERD before and
after the change is made. Major changes include adding, removing, or otherwise
modifying hard drives or partitions, file systems, configurations, and so forth. As a
general rule, update the ERD before and after the hard drive configuration is changed.
The addition of a new component to the server, such as Microsoft Exchange Server or
Microsoft SQL Server, and changes from Control Panel, are also situations in which the
ERD should be refreshed both before and after the change.
Also remember to make a backup of the ERD; always keep an ERD from at least one
generation back. When creating a fresh ERD, use a floppy disk that can be reformatted,
because RDISK.EXE, the program that creates the ERD, always formats the floppy disk.
Note The Emergency Repair Disk is a useful and necessary tool; it is NOT a bootable disk.
There is not enough space on the disk for the boot files and the repair information
files.
3. Type rdisk, and then click OK to display the Repair Disk Utility dialog box.
To back up the user account and file security, add a /S parameter after the rdisk
command:
rdisk /s
This bypasses the initial screen and its confirmation step and directly updates the
repair directory information (steps 4 and 5). After the current configuration has been
saved, you are prompted to make the ERD (see step 6).
Note You must not change or delete the systemroot\repair folder because the repair
process relies on information saved in this folder.
Note The Also back up the registry to the repair directory option saves your current
registry files in a folder within the systemroot/repair folder. This option is
beneficial in the event your hard disk fails and you need to recover your system.
See also:
“Returning to the Last Known Good Menu” on page 533
“Creating a Hardware Profile Copy” on page 534
“Creating and Using an Emergency Boot Diskette” on page 537
Preparation
not work.
Disaster
Microsoft recommends using System Restore, which saves only incremental changes, or
shadow copies, and lets you start Windows XP Professional in normal or safe mode,
before resorting to ASR. For more information about ASR or System Restore, refer to your
Microsoft documentation.
Instructions are provided for creating Emergency boot diskettes on the following types of
systems:
◆ x86 systems (see “To create an Emergency boot diskette (x86 version):” on page 538)
◆ RISC-based systems (see “To create an Emergency boot diskette (RISC Version):” on
page 538)
◆ Mirrored boot partitions (see “To create an Emergency boot diskette (Mirrored boot
partition):” on page 539)
Note The boot diskette is NOT generic for every Windows machine. If there is a fairly
standard configuration across several machines, however, this disk will work. For
example, it will work for all systems that use the same partition and disk controller
as their Windows boot partition.
2. Copy the following files to the diskette from the root directory of the system partition:
- BOOT.INI
- NTBOOTDD.SYS (if present)
- NTDETECT.COM
- NTLDR
The file NTBOOTDD.SYS is present only if a SCSI controller exists that does not use its
BIOS to control the boot process. If NTBOOTDD.SYS is not on the boot partition, it is not
needed.
2. Copy the following files to the diskette from the root directory of the system partition:
- OSLOADER.EXE
- HAL.DLL
On RISC based systems, the information stored in nonvolatile RAM is the equivalent
of the information stored in the BOOT.INI file on an x86-based computer. You must
modify the boot selection menu to add an option that points to the floppy disk. The
Advanced RISC Computing (ARC) name used for the SYSTEM-PARTITION on the
floppy disk is:
scsi(0)disk(0)fdisk(0)
Set the necessary values for:
- OSLOADER: the pointer to the floppy drive that was just created.
- OSLOADPARTITION: the primary partition (unless there are mirrored boot
partitions, in which case point to the secondary mirror partition).
- OSLOADFILENAME: the path to the \SYSTEMROOT directory.
2. Copy the following files to the diskette from the root directory of the system partition:
- NTLDR
- NTDETECT.COM
- NTBOOTDD.SYS (if present)
- BOOT.INI
The file NTBOOTDD.SYS is present only if a SCSI controller exists that does not use
its BIOS to control the boot process. If NTBOOTDD.SYS is not on the boot partition, it
is not needed.
3. For an Intel x86 processor, edit the BOOT.INI file on the floppy disk to change the
ARC name on the boot partition so that it points to the secondary mirror partition
rather than to the primary boot partition.
For example, if there are a pair of Adaptec 2940 adapters and duplexes boot drives
Preparation
Disaster
using the SCSI BIOS to boot off the primary partition on the first hard disk, there
might be a line similar to this in the BOOT.INI:
multi(0)disk(0)rdisk(0)partition(1)\NTS40=”Windows NT Server”
Different types of computers require different disaster recovery procedures. This section
includes separate procedures for recovering the following types of computers:
◆ Local Windows NT computer (see “Disaster Recovery of a Local Windows NT
Computer” on page 541)
◆ Remote Windows NT computer (see “Disaster Recovery of a Remote Windows NT
Computer” on page 543)
◆ Local Windows 2000 computer - non-authoritative (see “Disaster Recovery of a Local
Windows 2000/XP/.NET Computer (includes non-authoritative restore of Active
Directory for a domain controller)” on page 546)
◆ Remote Windows 2000 computer - non-authoritative (see “Disaster Recovery of a
Remote Windows 2000/XP/.NET Computer (includes non-authoritative restore of
Active Directory for a domain controller)” on page 549)
These procedures will restore your computer’s operating system to its pre-disaster state
and will restore your data files, except those protected by one of the Backup Exec agents.
Use these disaster recovery procedures in the following situations:
◆ The Windows operating system has become corrupted and cannot be restored using
the Emergency Repair Disks.
◆ The hard drive containing the Windows operating system has encountered an
unrecoverable error that requires reformatting the disk.
◆ The hard drive containing the Windows operating system needs to be replaced.
This procedure will restore your computer’s operating system to its pre-disaster state and
will restore your data files, except those protected by one of the Backup Exec database
agents. If any of your data is protected by Backup Exec agents, see “Backup Exec Options”
on page 36 before beginning disaster recovery.
A media drive must be attached to the computer that is being recovered. You will also
need:
◆ A current full backup of the computer to be recovered and any subsequent
incremental/differential backups.
◆ The Windows NT installation media.
Preparation
◆ The Backup Exec for Windows Servers installation media.
Disaster
▼ To recover a local Windows NT computer:
This basic Windows NT installation is necessary to provide Backup Exec with a target
to which it can restore the system. This basic installation will later be overwritten by
the backed up version, which will restore your system configuration, application
settings, and security settings, including the Registry.
For this basic Windows NT installation:
- Use the same computer name.
- Use a workgroup (not a domain).
This will allow you to recover your original Security Information Descriptor (SID)
through Backup Exec, so you will not have to re-establish trust relationships with all
domains.
If you are recovering from an entire hard disk failure, use Windows NT setup to
partition and format the new disk during installation. Format the partitions with the
same file system as before the failure.
2. Install Backup Exec for Windows Servers to a directory other than where it was
originally installed (this is a temporary installation).
Note Always log on to Windows NT using the Administrator account or its equivalent
during this procedure.
3. Using the Device Driver Installation Wizard, install the appropriate device driver for
the attached media drive. For more information, see “First Time Startup Wizard” on
page 74.
7. Inventory the media containing the latest full backup of the computer to be recovered
(see “Inventorying Media in Devices” on page 165).
8. Catalog the media containing the latest full backup of the computer to be recovered
(see “Cataloging Media in a Drive” on page 397). If the subsequent
differential/incremental backups are on separate media, catalog those also.
10. On the Properties pane, under Source, click Selections, and then select all sets from
the full and incremental backups that contain logical drives on the hard disk. If
differential backup sets are to be restored, select only the last differential set.
11. On the Properties pane, under Settings, click General, and then select the following
options:
- Restore over existing files
- Restore security
- Preserve tree
12. On the Properties pane, under Settings, click Advanced, and then select the
following options:
- Restore Windows NT 4.0 registry
- Overwrite the existing hardware configuration and registry services with data
to be restored
Note If you use a different computer name, on the Properties pane, under Destination,
click File Redirection, and then redirect each restore job to the new destination.
Preparation
Disaster
Note If your system is protected by Backup Exec for Windows Servers Intelligent Disaster
Recovery (IDR), see “VERITAS Backup Exec - Intelligent Disaster Recovery Option”
on page 855 for information on automated disaster recovery. The procedure
described in the following section allows you to manually recover a computer not
protected by IDR.
You can perform disaster recovery on a remote computer attached to the media server.
This procedure will restore your computer’s operating system to its pre-disaster state and
will restore your data files, except those protected by one of the Backup Exec database
agents. If any of your data is protected by Backup Exec database agents, see “Backup Exec
Options” on page 36 before beginning disaster recovery.
You will need:
◆ A current full backup of the computer to be recovered and any subsequent
incremental/differential backups.
◆ The Windows NT installation media.
Note Always log on to Windows NT using the Administrator account or its equivalent
during this procedure.
This basic Windows NT installation is necessary to provide Backup Exec with a target
to which it can restore the system. The basic installation will later be overwritten by
the backed up version, which will restore your system configuration, application
settings, and security settings, including the Registry.
For this basic Windows NT installation:
- Use the same computer name.
- Use a workgroup (not a domain).
This will allow you to recover your original Security Information Descriptor (SID)
through Backup Exec, so you will not have to re-establish trust relationships with all
domains.
If you are recovering from an entire hard disk failure, use Windows NT setup to
partition and format the new disk during installation. Format the partitions with the
same file system as before the failure.
At the media server:
3. Inventory the media containing the latest full backup of the computer to be recovered
(see “Inventorying Media in Devices” on page 165).
4. Catalog the media containing the latest full backup of the computer to be recovered. If
the subsequent differential/incremental backups are on separate media, catalog those
also (see “Cataloging Media in a Drive” on page 397).
6. Select all sets from the full and incremental backups that contain logical drives on the
hard disk. If differential backup sets are to be restored, select only the last differential
set.
7. On the Properties pane, under Settings, click Advanced and make sure the Restore
Windows NT 4.0 registry option is cleared.
8. On the Properties pane, under Settings, click General, and select the following
options:
- Restore over existing files
- Restore security
- Preserve tree
Note If you use a different computer name, you must go to the File Redirection dialog
box and redirect each restore job to the new computer name and share (see
“Redirecting a Restore Operation” on page 436).
10. When the restore operation has completed, reboot the remote computer.
All files have now been restored. You must now restore the Windows NT Registry.
At the media server:
Preparation
Disaster
11. Start Backup Exec for Windows Servers.
14. On the Properties pane, under Settings, click General, and select the following
options:
- Restore over existing files
- Restore security
- Preserve tree
15. On the Properties pane, under Settings, click Advanced, and then select the
following options:
- Restore Windows NT 4.0 registry
- Overwrite the existing hardware configuration and registry services with data
to be restored
17. When the restore operation has completed, reboot the remote computer using the
restored Windows NT system.
Your computer’s operating system is now restored to its pre-disaster state. Your data files
have been restored, except those protected by Backup Exec database agents.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
“Disaster Recovery of a Local Windows NT Computer” on page 541
“Disaster Recovery of a Remote Windows 2000/XP/.NET Computer (includes
non-authoritative restore of Active Directory for a domain controller)” on page 549
“Disaster Recovery of a Local Windows 2000/XP/.NET Computer (includes
non-authoritative restore of Active Directory for a domain controller)” on page 546
“Manual Disaster Recovery of Windows Computers” on page 540
This procedure will restore your computer’s operating system to its pre-disaster state and
will restore your data files, except those protected by one of the Backup Exec database
agents. If any of your data is protected by Backup Exec agents, see “Backup Exec Options”
on page 36 before beginning disaster recovery.
A media drive must be attached to the computer that is being recovered. You will also
need:
◆ A current full backup of the computer to be recovered and any subsequent
incremental/differential backups.
◆ The Windows 2000/XP/.NET installation media.
◆ The Backup Exec for Windows Servers installation media.
2. Install Backup Exec for Windows Servers to a directory other than where it was
originally installed (this is a temporary installation).
Note Always log on to Windows using the Administrator account or its equivalent
Preparation
Disaster
during this procedure.
3. Using the Device Driver Installation Wizard, install the appropriate device driver for
the attached media drive. For more information, see “First Time Startup Wizard” on
page 74.
6. Inventory the media containing the latest full backup of the computer to be recovered
(see “Inventorying Media in Devices” on page 165).
7. Catalog the media containing the latest full backup of the computer to be recovered
(see “Cataloging Media in a Drive” on page 397). If the subsequent
differential/incremental backups are on separate media, catalog those also.
9. Select all sets from the full and incremental backups that contain logical drives on the
hard disk. If differential backup sets are to be restored, select only the last differential
set. Make sure you include System State as part of the restore selections.
10. On the Properties pane, under Settings, click General, and then select the following
options:
- Restore over existing files
- Restore security
- Preserve tree
11. On the Properties pane, under Settings, click Advanced, and then select the
appropriate options (see “Advanced options for restore” on page 412).
If you are restoring a computer that is the only domain controller in the domain or the
entire domain is being rebuilt and this is the first domain controller, select the option
Mark this server as the primary arbitrator for replication when restoring folders
managed by the File Replication Service, or when restoring SYSVOL in System
State.
13. If you are restoring a computer that is the only domain controller in the domain or the
entire domain is being rebuilt and this is the first domain controller, reboot the
computer after the restore job successfully completes.
Your computer’s operating system is now restored to its pre-disaster state. Your data files
have been restored, except those protected by Backup Exec database agents.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
“Disaster Recovery of a Local Windows NT Computer” on page 541
“Disaster Recovery of a Remote Windows NT Computer” on page 543
“Disaster Recovery of a Remote Windows 2000/XP/.NET Computer (includes
non-authoritative restore of Active Directory for a domain controller)” on page 549
“Manual Disaster Recovery of Windows Computers” on page 540
You can perform disaster recovery on a remote computer attached to the media server.
This procedure will restore your computer’s operating system to its pre-disaster state and
will restore your data files, except those protected by one of the Backup Exec agents. If any
of your data is protected by Backup Exec agents, see “Backup Exec Options” on page 36
before beginning disaster recovery.
You will need:
◆ A current full backup of the computer to be recovered and any subsequent
Preparation
incremental/differential backups.
Disaster
◆ The Windows 2000/XP/.NET installation media.
Note Always log on to Windows using the Administrator account or its equivalent
during this procedure.
2. Install the Backup Exec Remote Agent to the remote computer. For more information,
see “Installing the Remote Agent to Remote Windows Servers” on page 823.
4. From the navigation bar, click Devices, and then inventory the media containing the
latest full backup of the computer to be recovered (see “Inventorying Media in
Devices” on page 165).
5. Catalog the media containing the latest full backup of the computer to be recovered. If
the subsequent differential/incremental backups are on separate media, catalog those
also (see “Cataloging Media in a Drive” on page 397).
6. From the navigation bar, click Restore, and then select all sets from the full and
incremental backups that contain logical drives on the hard disk. If differential
backup sets are to be restored, select only the last differential set. Make sure you
include System State as part of the restore selections.
7. On the Properties pane, under Settings, click General, and then select the following
options:
- Restore over existing files
- Restore security
- Preserve tree
8. On the Properties pane, under Settings, click Advanced, and then select the
appropriate options (see “Advanced options for restore” on page 412).
If you are restoring a computer that is the only domain controller in the domain or the
entire domain is being rebuilt and this is the first domain controller, select the option
Mark this server as the primary arbitrator for replication when restoring folders
managed by the File Replication Service, or when restoring SYSVOL in System
State.
Preparation
Disaster
Note For more information, the VERITAS web site provides an updated list of Frequently
Asked Questions (FAQs), release notes, and a technical knowledge base for each
product.
General Questions
How can I determine version and build information for my Backup Exec installations?
Locally, the version and build information can be located by selecting the About Backup
Exec option from the Help menu. Using ExecView, the versions of remote installations of
Troubleshooting
Backup Exec can be determined by viewing the properties of each remote server.
I set up bar code rules through the Tools menu by selecting Options, and then selecting
Bar Code Rules. However, my bar code rules don’t seem to be working. Why not?
After setting up bar code rules, you must set up two more items in order for the bar code
rules to work. You must enable the bar code rules for the robotic library by selecting the
bar code rules option on the Configuration tab in the robotic library’s properties. In
addition to setting the bar code rules for each type of media you use, for each drive in
553
General Questions
your mixed media library you should indicate what type of media can be used and
whether that media can be used for read or write operations. For more information, see
“Bar Code Labeling in Mixed Media Libraries” on page 199.
Note You can also run BE Diagnostics for a remote server (see “Running Diagnostics on
Remote Server” on page 556)
Note You can also create a BEDIAG.TXT file from the Devices and Media views. On the
navigation bar, click Devices or Media. Select the backup server. On the Properties
pane, under General Tasks, click Properties. Then select the System tab.
3. Click Run Diagnostics. The file BEDIAG.TXT will be created in the directory
“...\Backup Exec\NT\Data”.
2. From the directory “...\Backup Exec\NT\Data”, type “bediag servername” (the server
can be the media server or remote or if you are running this from a workstation, type
“bediag workstationname”).
4. The following switches can be used with the command line option (bediag [switches]
servername):
Switch Meaning
/b:[server] Specify a Backup Exec server to poll for service account information
Troubleshooting
/bex Dump only Backup Exec entries in the Application Event log
***The bex, err and recs switches must be used in conjunction with the app
and/or sys switches
Switch Meaning
2. Click Select Server and select the remote system on which you want to run the
diagnostic utility.
4. Click OK.
Diagnostic information appears in a .TXT file.
6. After viewing this information, from the File menu, select Exit.
Troubleshooting
Hardware-related Questions
My drive is not listed in the drivers list for Windows NT/2000/XP/.NET. Which tape driver
should I use?
Some drives are repackaged and sold under various brand names. Following are various
drive types and recommendations for drivers you can try:
◆ For cartridge tape drives, 150 MB, 250 MB, 525 MB or larger, try using the Archive or
Wangtek drivers.
◆ For DAT drives, use the 4mm DAT driver for all drives except Sony. If you have a
Sony DAT drive, use the 4mm Sony driver.
◆ For 8mm tape drives (other than Sony), try the two Exabyte drivers.
Driver load failures can occur if Windows NT/2000/XP/.NET does not support the
device. Run the Device Configuration wizard on the Tools menu to see if the device is
recognized by the operating system.
Troubleshooting
Be sure that Windows NT/2000/XP/.NET properly recognizes the device. This can be
verified by checking the Tape Devices component in the control panel. For configuration
and setup instructions, see “VERITAS Backup Exec - Library Expansion Option” on
page 1143. You may also want to read “Using Microsoft’s Removable Storage Feature with
Backup Exec” on page 161.
Backup Exec does not display any storage devices for me to select. Why is that?
Windows NT/2000/XP/.NET may not recognize the device. Make sure the storage device
was powered on before Windows NT/2000/XP/.NET was loaded. If the drive was not on,
power down the server and power on the tape device before powering on the server.
Check the SCSI cable to make sure the cables are plugged in tightly. If the cable is loose,
re-attach it and reboot Windows NT.
Make sure each SCSI device (if you have more than one) has its own unique SCSI address
(0 - 7). SCSI address 0 is generally reserved for the system’s boot drive. Never change the
SCSI address of a device while it is powered on. While configuring your SCSI devices,
remember that the SCSI controller card uses a SCSI address (usually set to SCSI address 7).
The SCSI bus must be properly terminated in order for all of the devices on the chain to
operate properly. For more information, refer to the documentation that came with the
device.
Note It is recommended that the tape device be on its own SCSI controller.
If you have not installed the correct storage device driver, launch the Device
Configuration wizard from the Tools menu within the Backup Exec console.
Can I restore a hardware-compressed tape using a drive that does not support data
compression? Can the tape be reused?
A drive that supports hardware compression must be used to restore the data on the tape.
Preferably, the same drive type and firmware should be used to ensure compatibility.
Because different hardware uses different compression methods, a tape created with
hardware compression on one device may not be readable by another device. The tape can
only be reused in the non-compression drive if you first perform a quick erase operation
on the tape. If the drive supports compression, the media can simply be erased and
reused.
Note Make sure the tape can be bulk-erased without destroying the media. Some tape
manufacturers write a signature, such as DDS2 or DDS3, to the tape that is used for
identification. If the tape is bulk-erased, the signature is destroyed and the tape
cannot be used for backup operations.
Why does my DLT tape drive hang when cataloging some tapes?
The DLT tape drive maintains internal information about the tape on a tape directory
track. The directory track is updated before the tape is ejected from the drive. If the drive
is powered off without ejecting the tape first, this information is lost.
Re-generating the tape directory information takes several hours to complete, which
makes it seem like the drive is hung. Allow sufficient time for the operation to complete
and then eject the tape. Normal operation will resume after the directory track has been
updated.
Troubleshooting
Backup Questions
I am unable to back up certain files on my system that are being used by other
processes. Why is that?
When Backup Exec encounters a file that is in use by another process, it either skips the
file or waits for the file to become available, depending on the Backup open files setting.
When Backup Exec is configured to back up open files, it attempts to open the files in a
different mode. It locks these files while they are being backed up to prevent other
processes from writing to them. This mode should be a last resort to obtaining a backup of
open files; in most circumstances, it is more desirable to close applications that leave files
open so their files may be backed up in a consistent state.
If you want to back up open files on Windows NT servers and workstations, Backup
Exec’s Open File Option (sold separately) provides uninterrupted data protection for
network environments.
I can’t see any Windows 95/98 agents from Backup Exec; why is this?
Be sure the Enable Agents Using TCP/IP Protocol or Enable Agents Using NetWare
IPX/SPX Protocol options are selected in the Network tab of the Tools|Options menu. If
IPX/SPX is being used, try configuring the agent to use TCP/IP protocol (see
“Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent” on
page 576). You may also use the IP address of the media server rather than the actual
computer name in the Windows 95/98 Agent Configuration utility.
Why do Backup Exec’s services continue to own a storage device even when it's not
running?
Backup Exec is a true client/server application that must always be available to process
jobs submitted from both local and remote administrative consoles.
Because of the Advanced Device and Media Management functionality in v7.x and later,
all storage devices attached to the media server are claimed by Backup Exec whenever the
server is running. The Advanced Device and Media Management feature in Backup Exec
requires constant control of the storage devices in order to perform two important and
useful operations: collection of statistics on media and device usage, and media overwrite
protection.
How do I keep storage devices from being managed exclusively by Backup Exec?
If you must exclude a storage device from being managed by Backup Exec, there are two
methods to consider:
◆ Disabling the storage device for Backup Exec through the administration console.
◆ Including a BESTOP pre-job command and a BESTART post-job command in a script
executed by applications other than Backup Exec. The BESTOP and BESTART
commands must be copied from the utilities directory on the installation CD. Use this
method only if you want to release all drives.
Following are details on these methods.
▼ Disable storage devices for Backup Exec through the administration console:
You can change the storage device properties so that the device is not used by Backup
Exec. This is the best method to use if you want to:
◆ Permanently exclude a storage device from being managed by Backup Exec.
◆ Specify which storage devices to exclude from Backup Exec.
1. In the Backup Exec administration console, click the Job Monitor tab to view all
scheduled and active jobs, and make sure that the device you want to exclude is
inactive.
2. Click the Devices tab, and then right-click the device to display the shortcut menu.
Troubleshooting
4. On the Drive Properties window, click the Configuration tab.
If the field Enable Device for Backup Exec is checked, then Backup Exec has
exclusive access to this device.
5. Clear the Enable Device for Backup Exec check box to disable the device for Backup
Exec, and allow it to be available for other applications.
Note If the device is active, it is not released for use by other applications even if it is
marked as Disabled in this field.
Note When a storage device is excluded from Backup Exec, the Advanced Device and
Media Management services cannot collect statistics on usage for that device and
any media used in that device. Therefore, any thresholds set for device and media
usage, such as when cleaning jobs are to be performed, or when media should be
discarded, are no longer valid since statistics were not collected while the device
was excluded from Backup Exec management.
Additionally, the Advanced Device and Media Management services cannot provide
media overwrite protection for media inserted in a storage device that is excluded from
Backup Exec. Any media placed in a storage device that is not managed by Backup Exec
may be overwritten.
When performing a local backup, the total number of bytes backed up by Backup Exec
does not match the number of bytes displayed by Windows NT Explorer, File Manager, or
the DIR command. Why?
This problem may be caused by the type of partition for which the system is formatted.
If you have a Windows NTFS compressed partition, Backup Exec displays the
uncompressed byte count of the files being backed up while Windows NT Explorer
displays the compressed byte count of the files on the hard drive. For example, a NTFS
partition that contains 1 GB of data is compressed by Windows NT to 500 MB. Backup
Exec reports that 1 GB of data was backed up, even though Windows NT Explorer
displays that only 500 MB of compressed data exists on the hard drive.
If you have a FAT partition, Backup Exec reports the actual number of bytes of the files
being backed up while File Manager reports an inflated amount of disk space. For
example, a 2 GB FAT partition has a 32 K cluster size and File Manager displays 1.9 GB of
used space. Backup Exec reports that 1.4 GB of data was backed up. Assuming that a 50
MB pagefile.sys is excluded from the backup, there is a 450 MB difference in the number
of bytes.
Converting to NTFS will regain disk space since it is more efficient and the default cluster
size (automatically set by Windows NT) in NTFS is less than FAT. Windows NT allows
you to specify a cluster size other than the default; however system performance may
decrease. For more information, see the Windows NT documentation.
The following tables display the cluster sizes for NTFS partitions.
The following tables display the cluster sizes for FAT partitions.
<= 127 2
Troubleshooting
128 - 255 4
256 - 511 8
512 - 1023 16
512 - 1023 32
Restore Questions
Sometimes the byte counts for data that I restore don’t match the byte counts indicated
when the data was initially backed up. Why?
When data backed up from an NTFS volume is restored to an NTFS volume, the byte
count will match between the backup and restore operations. However, when data backed
up from a NTFS or FAT volume is restored to a FAT volume, the byte count restored is
expected to be less than that backed up. The reason for the discrepancy is that the
Windows NT operating system returns a default ACL (access control list) for FAT data; the
stream of data is backed up (and the bytes are counted) but is discarded during a restore
(and the bytes are not counted).
Error Messages
Invalid filename The file name contains characters Enter a valid file name.
[filename]. not permitted by Backup Exec for
Windows Servers. Refer to your
Backup Exec for Windows Servers
Administrator’s Guide.
The path cannot contain The path contains a drive Remove the drive designator and
a drive designator. designator (e.g., c:, g:, etc.). try again.
The path cannot contain The path contains a file name. Remove the file name and try
a file name. again.
Warning: This media is While using multiple media, you Remove the media and insert the
out of sequence. loaded the media out of sequence. correct media in the sequence.
File name is not valid. The file name contains characters Enter a valid file name.
not permitted by Backup Exec for
Windows Servers. Refer to your
Backup Exec for Windows Servers
Administrator’s Guide.
None of the sets The search did not find any backup If the path entered is not correct,
matched the requested sets that matched the correct it and try again.
volume. drive/volume specified.
Too many files matched The search criteria was too general. Enter more specific search criteria
the selection criteria. or increase the Maximum Search
More files were found Results and try again.
than will be displayed.
This set is not The backup set is not completely Catalog the media again.
completely cataloged. cataloged. The backup set may
have crossed media or cataloging
was canceled before it was
completed.
This set must be The set is partially cataloged. Fully catalog the set by clicking OK
cataloged before it can in the window.
be viewed.
Storage device not Backup Exec cannot access the Exit Backup Exec, power down the
responding. storage device. server and the storage device, if it
is external. Check the connections
on the storage device, and then
power on the storage device before
you power on the server.
Unable to attach to This is a network error. A server Check your server or check with
[computer name]. The may not be available or not your network administrator.
Troubleshooting
network path was not responding.
found.
Storage device <device There may be a bad drive, cabling, Correct the hardware problem and
name> reported an error driver, or SCSI card. try again.
on a request to <string
describing operation>.
Error reported: Timeout
before function
completed.
Storage device <device The drive could be dirty or the Clean the drive and/or try a new
name> reported an error media may be bad. There could or different media.
on a request to <string also be a drive problem.
describing operation>.
Error reported: Bad
data.
Storage device <device There may be a drive problem or a Correct the problem and try again.
name> reported an error problem or conflict with some
on a request to <string other peripheral on the same bus.
describing operation>.
Error reported: Bus
reset.
Storage device <device There may be a bad drive, cabling, Correct the hardware problem and
name> reported an error or SCSI card. try again.
on a request to <string
describing operation>.
Error reported:
Hardware failure.
WARNING: Media # This media is part of a multi-media Remove the media, insert the
[number] is out of family and the media you have correct media, and try again.
sequence. loaded is out of sequence.
The selections for The device specified in the Correct the problem and try again.
[device name] will be selections is not available.
omitted from the
operation.
Unexpected end of This media is part of a multi-media If you want to catalog this media
backup set encountered family with a format that requires and restore data from it, you must
on [filename]. that the media be processed in start the catalog operation with
sequential order. media #1 in the drive.
Media is out of This media is part of a multi-media Remove the media and insert the
sequence. Insert media family and the media you have correct media.
one of this media family. loaded is out of sequence.
Workstation
Agents
569
The Backup Exec Windows 98 and Windows Me Agents
Note If an earlier version of the Backup Exec Windows 98/Me agent is already installed
and running on the Windows 98/Me workstation, you must shut down the agent
before upgrading it.
1. Log on to the media server from the workstation, and from the Program
Files\VERITAS\Backup Exec\NT\Agents\win9x\[language] directory on the media
server, double-click Setup.exe.
Workstation
Agents
4. When you have completed the instructions, you are prompted to reboot the Windows
98/Me workstation. You must reboot the workstation for the agent to run properly.
Option Action
General tab
Disable network backup Keeps the workstation from being backed up by the media server.
When Disable Network Backup is on, the agent is not loaded
when the workstation is started, and the media server will no
longer see the computer as a published agent.
If you turn on this option while the agent is running, the agent is
stopped.
Enable network backup Enables the media server to back up or restore to the workstation.
Current Status Displays the current status of the agent. Status messages include:
Not Running, Idle, and Connected. Not Running indicates
the agent is either disabled or shut down. Idle indicates the agent
has loaded and is waiting for a connection by a user or the media
server. Connected indicates that a user or the media server has
Workstation
connected to the agent and is accessing it. Agents
Registry
Option Action
Published Folders
Name, Path, Access Lists any published directories and drives, or their aliases, and
Control the level of access control assigned. By default, all local drives are
published.
Add Used to add directories and drives to the list of published folders.
Remove Used to remove the selected directory or drive from the list of
published folders.
See also:
“Publishing Drives and Directories Using the Backup Exec Windows 98/Me Agent”
on page 574
“Configuring the Network Protocol for the Backup Exec Windows 98/Me Agent” on
page 576
2. Click Properties and then click the Configuration tab. In the list of installed network
components, double-click Backup Exec Agent.
Item Description
Path Enter the path to the folder you want to protect, or click Browse to
help locate a folder.
Folder Name (Optional) In Folder Name, enter an alias that you want to use for
this folder.
Access Control (Optional) Sets or changes access control for a published folder, do
one of the following
Read Only (RO) Designates the folder as read-only. Clicking Read Only enables
only backup operations to be performed on the path; restore
Workstation
operations are not allowed.
Agents
5. Click OK.
The drives and folders you selected, and any access control that you designated for
those folders, are displayed in the Published Folders window on the Backup Exec
Agent Properties dialog box.
Note If you use Dynamic Host Configuration Protocol (DHCP) on a media server or a
server that is used for remote administration purpose, and plan to use the Windows
98 Agent on TCP/IP, read the following:
Because the IP address assigned to the Backup Exec Windows 98/Me agent during
agent installation is supposed to match the IP address of the computer running
Backup Exec, agent-to-host communication problems may occur since the host’s IP
address might change each time it boots.
You can also enter a DNS host name instead of an IP address. This eliminates the
need for a static IP address.
In order to ensure that the Backup Exec Windows 98/Me agent consistently
communicates with the Backup Exec host computer, you should RESERVE an IP
address for the host running Backup Exec using the Windows DHCP Administrator
program. Refer to your Windows documentation for details.
Item Description
SPX/IPX Configures the Backup Exec Agent for use with SPX/IPX-based
networks. Typically used with Novell NetWare-based networks.
TCP/IP Configures the Backup Exec Agent for use with TCP/IP-based
networks. TCP/IP is the communications protocol typically used in
Workstation
heterogeneous networks. Agents
7. In the Adding Media Server box, type the host name or IP address of the media
server that will be used to back up this computer, then click OK.
Note The Backup Exec Macintosh Agent only supports Mac OS X; Macintosh Operating
System versions 6.x though 9.x are not supported.
See also:
“Understanding Backup Methods and Their Advantages” on page 340
“Installing and Configuring the Macintosh Agent on a Mac OS X Workstation” on
page 579
“Requirements for Running the Backup Exec Macintosh Agent” on page 578
7. Using Finder, select Applications and then Utilities and then Terminal.
8. In the Terminal window, change to the root user by typing su at the command
prompt and then pressing <Enter>.
9. Because the Macintosh Agent must communicate with the Backup Exec media server,
you must either specify the IP address, use a naming service or enter the media
Workstation
server’s IP address in the NetInfo database in order for communications to occur. Agents
- To use a naming service (DNS, NIS, LDAP, etc.), you must configure the
Macintosh to use this feature. For more information, see your Macintosh OS X
documentation.
- To use the media server’s IP address, specify it in place of the media server’s
name in step 31.
- To use NetInfo, perform the steps listed in “Modifying the NetInfo Database” on
page 583 and then continue with step 10 in this section.
10. Copy the be_agnt.tar file, which contains the Macintosh OS X Agent, to a temporary
directory on the workstation to be protected. The be_agnt.tar file is located on the
Backup Exec installation CD and in the Agents subdirectory of the Backup Exec
media server’s Programs directory.
You can copy the file to the workstation via the network using FTP, a Macintosh share
on the media server, or any other method you prefer. Or you can insert the Backup
Exec installation CD in the workstation to be protected and copy the file from the CD.
Note If you are pushing the Macintosh OS X Agent from the media server to the
workstation using FTP, ensure that you use the binary transfer mode, not the ascii
mode. Prior to starting the file transfer, type binary at the command prompt on the
media server, and then press <Enter>.
11. At the workstation, from the temporary directory you want to use, type
tar -xvf be_agnt.tar
15. If prompted, select a language by typing the number that corresponds to the language
you want to use, then press <Enter>.
16. Enter the full directory path where you want the Backup Exec Macintosh Agent to be
installed.
By default, the agent is installed in /etc/bkupexec. You can specify another
directory. If the full directory path that you specify does not exist, you are prompted
to have it created.
18. You can choose to require a password for this workstation. If you do, you are
prompted to enter a password.
19. You are asked about the number of network interfaces in your workstation. If you
have more than one network interface, you are asked if you want to specify which
network interface to use. If you answer yes, then you must specify an IP address of a
local network interface for the agent to use. Should you have more than one network
interface and choose not to specify which one to use, the agent will use an appropriate
interface to communicate with a media server
20. Enter the directory path that you want backed up.
If you want to back up the Macintosh workstation’s entire hard disk, simply define a
directory path as “/”. This allows the network administrator to select the entire disk
for backup. You can create and publish up to eight unique directory paths.
Note If your computer has more than one file storage volume on the same physical hard
disk, or has more than one hard disk, then specifying the root directory (/) for
backup will not protect all of the volumes. To back up the desired additional
volumes, they must be specified individually. For example, to back up a disk called
Videos, you must also specify /Volumes/Videos as one of the directories to be
backed up.
22. To allow files to be restored to a published path, type y, when prompted. If you do not
want to allow the Backup Exec application to restore files, type n.
23. You can choose to require a password for each published path.
If you choose to password-protect the path, the password is required before Backup
Exec can perform operations on this path.
Workstation
24. You can continue to publish directory paths for backup and restore operations by Agents
repeating these steps.
25. When you have finished creating published paths, you are prompted to enter the
names of the media servers that will back up your workstation. A maximum of
twenty media servers is allowed.
After entering a media server name, the server is located and added to the list of valid
media servers.
26. You are prompted to enter the frequency (in seconds) that you want the Backup Exec
Macintosh Agent to send advertisement messages to the media servers so that the
servers are aware that the workstation is accessible.
27. You are prompted to choose a method to back up symbolic links. Choose one of the
following methods:
- Method 1: The symbolically linked directory is handled as a special file and only
the information required to create the symbolic link is backed up.
- Method 2: The symbolically linked directory is backed up as a normal directory.
All files and subdirectories within the symbolically linked directory are also
backed up.
28. After choosing a backup method for symbolic links, your Backup Exec Macintosh
Agent configuration is complete. You can edit the agent.cfg file to change your agent
configuration at any time. Changes to the configuration file take effect after the
Macintosh workstation is rebooted.
29. Start the Mac OS X Agent by moving to the folder where the Backup Exec Macintosh
Agent is installed.
1. Using Finder, select Applications and then Utilities and then Terminal.
In the Terminal window, change to the root user by typing su at the command
prompt and then pressing <Enter>
2. Run the following commands in the Terminal window, replacing the myhost name
and IP address with the name and IP address of your Backup Exec media server:
niutil -create . /machines/myhost
niutil -createprop . /machines/myhost name myhost
niutil -createprop . /machines/myhost ip_address 10.88.100.201
niutil -createprop . /machines/myhost serves ./local
ping -c 3 myhost
Workstation
Agents
Note During the initial installation of Backup Exec, the Backup Exec UNIX Agent files are
copied automatically from the Backup Exec installation CD to the Program
Files\VERITAS\Backup Exec\NT\Agents\UNIX directory on the media
server.
1. Edit the input file (/etc/services) for the map you want to change.
2. Add the following line, then save and exit the file:
grfs 6101/tcp # Backup Exec Agent
Workstation
1. Log on as root on the media server, and put the Backup Exec installation CD in the Agents
server’s CD-ROM drive.
2. The be_agnt.tar file must be transferred to the UNIX workstation. One way to transfer
this file is to open a command prompt window, and at the prompt, type
ftp xx.xx.xx.xx <Enter>
where xx.xx.xx.xx is the IP address of the UNIX workstation where you want to install
the agent.
3. Because the UNIX agent file must be pushed from the server to the workstation in
binary mode, change from the ASCII default mode to the binary mode by typing the
following at the prompt:
binary <Enter>
4. Create a temporary directory on the workstation. If you prefer, you can use the /tmp
directory. Go to the temporary directory or /tmp directory, and then type
put be_agnt.tar <Enter>
5. At the workstation, from the temporary directory you want to use, type
tar -xvf be_agnt.tar <Enter>
7. If prompted, select a language by typing the number that corresponds to the language
you want to use, then press <Enter>.
8. Enter the full directory path where you want the Backup Exec UNIX Agent to be
installed.
By default, the agent is installed in /etc/bkupexec. You can specify another directory.
If the full directory path that you specify does not exist, you are prompted to have it
created.
10. You can choose to require a password for this workstation. If you do, you are
prompted to enter a password.
11. You are asked about the number of network interfaces in your workstation. If you
have more than one network interface, you are asked if you want to specify which
network interface to use. If you answer yes, then you must specify an IP address of a
local network interface for the agent to use. Should you have more than one network
interface and choose not to specify which one to use, the agent will use an appropriate
interface to communicate with a media server.
12. Enter the directory path that you want backed up.
If you want to back up the workstation’s entire hard disk, simply define a directory
path as “/”. This allows the network administrator to select the entire disk for backup.
You can create and publish up to eight unique directory paths.
14. To allow files to be restored to a published path, type y, when prompted. If you do not
want to allow the Backup Exec application to restore files, type n.
15. You can choose to require a password for each published path.
If you choose to password-protect the path, the password is required before Backup
Exec can perform operations on this path.
16. You can continue to publish directory paths for backup and restore operations by
repeating these steps.
17. When you have finished creating published paths, you are prompted to enter the
names of the media servers that will back up your workstation. A maximum of
twenty media servers is allowed.
After entering a media server name, the server is located and added to the list of valid
media servers.
Note You can also enter the media server’s IP address in place of the media server’s
name.
18. You are prompted to enter the frequency (in seconds) that you want the Backup Exec
Workstation
UNIX Agent to send advertisement messages to the media servers so that the servers Agents
are aware that the workstation is accessible.
19. You are prompted to choose a method to back up symbolic links. Choose one of the
following methods:
- Method 1: The symbolically linked directory is handled as a special file and only
the information required to create the symbolic link is backed up.
- Method 2: The symbolically linked directory is backed up as a normal directory.
All files and subdirectories within the symbolically linked directory are also
backed up.
After choosing a backup method for symbolic links, your Backup Exec UNIX Agent
configuration is complete. You can edit the agent.cfg file to change your agent
configuration at any time. Changes to the configuration file take effect after the UNIX
workstation is rebooted.
Agent.cfg Commands
Item Description
name <workstation name> Use this command to enter another name for this workstation. This
name appears in the Backup Exec selection screens. This item is
optional.
If a workstation name is not provided, the workstation’s network
node name (for example, uname -n) is used.
password <passwd> Use this command to assign a password to this workstation. If you
assign a password, then in order to access this workstation, the
Backup Exec administrator must enter the password during
operations. If a password was not provided during installation, the
Backup Exec administrator must press <Enter> when prompted for a
password. This item is optional.
Item Description
export Use this command to specify a directory tree to publish so that it will
be accessed by Backup Exec. The following commands are used with
export:
◆ <resourcename> - Use this command to identify the exported
paths of the agent workstation. This name appears in the Backup
Exec Networks window under Backup Exec Agents.
◆ [write_protected] - Use this command if you want the
published path to be accessed for backup operations but not for
restore operations.
◆ <password> - Use this command to assign a password to a
specific published path. The Backup Exec administrator is
required to enter the password before the published path can be
accessed by backup operations.
◆ [include_remote]- Use this command to access remotely
mounted (NFS) file systems through their normal mount points.
export / as ROOT include_remote
◆ <no_nfs_locking> - Use this command to prevent locking of
files during backup operations if they are located in remotely
mounted file systems with mount points within a directory tree.
Example:
export <directory> as <resourcename>
[write_protected] [password <passwd>]
[include_remote][no_nfs_locking]
tell <machine name> Use this command to specify a media server name as an argument.
This server name is added to the list of computers to which
advertisements will be sent. This machine name must be found in the
/etc/hosts file.
tell_interval Use this command to specify the number of seconds the agent waits
<number_of_seconds> before re-advertising itself to the media server. If you enter a
Workstation
number other than the default setting (30 seconds), the number Agents
should not be more than a few minutes or less than 60 seconds.
Longer numbers cause a delay in the workstation’s network
broadcast verification and shorter numbers cause excessive network
traffic. Each advertisement transaction requires eight (8) network
packets.
follow_symdirs Use this command to specify that the contents of the linked
directories be backed up but not the symbolic links themselves. By
default, the contents of symbolically linked directories are not
backed up, but the symbolic links themselves are.
Item Description
exclude_file <filename> Use this command to specify individual files which should never be
backed up. The <filename> must include a fully specified path. No
wildcards are permitted.
preserve_ctime Use this command to force the agent to ignore the message which
sets object’s (files and directories) attributes when a backup occurs.
Normally, during a backup, the backup engine preserves an object’s
last access timestamp by resetting the last access timestamp to the
value before the backup occurred. When the agent modifies the
objects’ last access timestamp, the OS internally updates the object’s
“ctime.” An object’s ctime is the time when an object’s attributes
(permissions, timestamps, etc.) have been modified. By not
attempting to reset the attributes after a backup, the object’s ctime is
not updated. This option does not affect object attributes set during
restore operations.
Note This release of the Command Line Applet does not support submission of catalog,
verify, or rewind jobs.
591
Command Line Applet Requirements
Note The Command Line Applet can target clustered media servers. The only limitation
is that the Command Line Applet can target a drive pool, but not a specific device in
that drive pool.
Note Type quotation marks before and after the user name and password if they contain
spaces or a colon.
Command
Line
In each of the previous examples, a -1 is returned if the job fails. You can also track the
status of the job submission by including the Verbose Output command line
switch -v.
Command line switches are described in the following sections.
Substitute the text that appears in italics next to the command, such as job name, with a
value, such as the correct job name.
Note If the value contains a space or a colon, enclose the value with quotation marks. If
the switch contains more than one letter and you are not using quotation marks to
enclose the value, a colon must appear immediately after the switch.
For commands using Job IDs, this version of Backup Exec uses a globally unique identifier
(GUID) in a 16-byte hex string format for each job.
Item Description
-cmedia server Specifies the name of the media server where the operation is to be
performed. If a media server name is not specified, the local
computer name is used by default.
-llogfile Directs all output to a specified logfile and to the console. You must
specify the logfile name where the output is to be written.
-la:logfile Appends all output to the specified logfile and to the console. You
must specify the logfile name where the output is to be written.
Note The colon (:) must be included.
-nuser name Specifies the user name credential for logging into a remote Backup
Exec server. If a user name is not specified, the current credential is
used.
Item Description
-ppassword Specifies the password credential for logging into a remote Backup
Exec server. If a password is not specified, the current password
credential is used.
-tBackup Exec server Specifies the type of OS the server is running. The default is
type Windows.
To specify a NetWare server, type -tNW.
To specify a Windows server, type -tNT.
The switch -w (Waits for the job to complete before exiting the program) can be used with
switches -o1 through -o8, -o17, -o18, -o42, -o46, and -o90. This command returns a 1 if
successful or -1 on failure.
Command
Line
-o1 Run backup job Runs a backup job that has been previously
defined. Returns a job instance ID. Also
returns a 1 if the command succeeds or a -1 if
the command fails.
-o2 Create backup Creates and runs a backup job for a specified
job list of files. This operation returns a job
instance ID. Also returns a 1 if the command
succeeds or a -1 if the command fails.
-sfile list Specifies the list of files to back up. The list
should be comma delimited. By default,
subdirectories will be recursed; to skip
subdirectories during backup, the characters
/n should appear before the comma
separating the entries, and the last quotation
mark. For example, "c:\winnt\*.* /n". The
order resource selections are specified is the
order in which the resources will be backed
up. Please note the following about the order
in which selections can be backed up:
You can order resources within a server,
but you cannot alternate selections across
servers. For example, you can select C:
and D: from Server A followed by
selections from Server B. However, you
cannot order selections as C: from Server
A and then C: from Server B and then D:
from both servers.
For any given server, system state or
shadow copy components must be
ordered last.
Note This switch cannot be used with the -sf
switch.
-o3 Back up server Creates and runs a backup job to back up the
drive specified drive on the media server. Returns a
job instance ID. Also returns a 1 if the
command succeeds or a -1 if the command
fails.
Command
Line
-o5 Back up SQL This option is not for SQL 2000. If you are
server running SQL 2000, use operation -o8.
Creates and runs a backup job to back up the
Microsoft SQL Server on the media server.
Returns a job instance ID. Also returns a 1 if
the command succeeds or a -1 if the command
fails.
Note While individual tables and file groups
cannot be selected for backup, all
subcontainers (except for the master
filegroup) are included in a server
backup.
-o8 Back up SQL Creates and runs a backup job for SQL Server
Server 2000 2000. Returns a job instance ID. Also returns a
1 if the command succeeds or a -1 if the
command fails.
Note The Agent for Microsoft SQL Server
must be enabled on the media server in
order for this command to work.
-o17 Back up Lotus Creates and runs a backup job of the Lotus
Notes server Notes server. Returns 1 if successful or -1 if
there is an error.
-o18 Back up Oracle Creates and runs a backup job of the Oracle
server server. Returns 1 if successful or -1 if there is
an error.
Note Only one SID can be specified per
command. Use -si to indicate the SID
name to back up.
Command
Line
-i Dump job IDs Instructs Backup Exec to dump the job IDs to
the screen.
-j Dump job names Instructs Backup Exec to dump the job names
to the screen.
-i Dump job IDs Instructs Backup Exec to dump the job IDs to
the screen.
-j Dump job names Instructs Backup Exec to dump the job names
to the screen.
-i Dump job IDs Instructs Backup Exec to dump the job IDs to
the screen.
-j Dump job names Instructs Backup Exec to dump the job names
to the screen.
-o15 Get job status Displays one of many predefined job statuses
if the command was successful. Also returns a
1 if the command succeeds or a -1 if the
command fails.
-o16 Dump job status Copies to the console the job information and
for scheduled descriptive headings for each item associated
and active job with the job ID. Returns 1 if the command was
successful or -1 if the command failed.
of a specific job.
Line
-o30 Dump job log Copies to the console the job log name that is
name of associated with the specified job ID. Returns 1
completed job if the command was successful or -1 if the
command failed.
-o31 Dump job log Copies to the console the contents of the job
contents log specified on the command line. Returns 1
if the command was successful or -1 if the
command failed.
-o201 Take Job off Takes the specified job off hold. Returns 1 if
Hold the command is successful or -1 if it failed.
-o250 List all backup Displays all available backup job templates.
job templates Returns 1 if the command is successful or -1 if
it failed.
-o251 List all backup Displays all available backup selection lists.
selection lists Returns 1 if the command is successful or -1 if
it failed.
-o7 Restore job Runs a restore job that has been previously
defined for a media server. Returns a job
instance ID. Also returns a 1 if the command
succeeds or a -1 if the command fails.
See also:
“Using Backup or Restore Job Script Files” on page 660
-i Dump alert IDs Displays all the alert IDs on the screen.
-o42 Dump alert text Dumps the alert title and message to the
console. Returns 1 if the command is
successful and -1 if it fails.
-i Dump all alert If -i is used with this command, all alert IDs
IDs will be displayed on the screen.
-i Dump all alert If -i is used with this command, all alert IDs
IDs will be displayed on the screen.
-o47 Get all warning Displays the number of warning alerts on the
alerts computer. Also returns a 1 if the command
succeeds or a -1 if the command fails.
-i Dump all alert If -i is used with this command, all alert IDs
IDs will be displayed on the screen.
-o48 Get all error Displays the number of error alerts on the
alerts computer. Also returns a 1 if the command
succeeds or a -1 if the command fails.
-i Dump all alert If -i is used with this command, all alert IDs
IDs will be displayed on the screen.
-i Dump all alert If -i is used with this command, all alert IDs
IDs will be displayed on the screen.
-jl: Enable inclusion Sends the job log to the alert recipient
of job log configured for notification.
-ac:timeout Set time for Sets the time in minutes for Backup Exec to
automatic automatically clear the alert.
clearing of alert
-pj: Pause job on Indicates the job is to be paused until the user
error has taken action to clear the error. If this
switch is absent, the job will be canceled until
its next scheduled run.
error occurs.
Line
-ddrive name Specifies the name for the drive you want to
display properties for.
-o81 Export drive Exports a list of backup tapes. Returns the job
slots ID and a 1 if the command was successful, or
a -1 if the command fails.
-o101 Create media set Creates a media set with the specified name.
Returns a 1 if successful or -1 if the command
fails.
-o102 Create drive Creates a drive pool with the specified name
pool and assigns the given drives to it.
Returns a 1 if successful, 0 if one or more
specified drives cannot be found, or -1 if the
command fails.
returning.
Command
Line
-o115 Eject media from Ejects the tape in the specified drive.
drive
Returns the job ID and a 1 if successful, or -1 if
the command failed. When using this
command, you must also use the -ddrive
name command.
-o120 Delete media set Deletes the specified media set. Returns 1 if
the command is successful or -1 if it failed.
-o107 Set wizards as Sets the registry so that the startup wizards do
run not run. Returns 1 if successful or -1 if the
command failed.
-o501 Are Backup Exec Checks if the Backup Exec system services are
system services running. Returns 1 if the Backup Exec services
running are running on the computer. If the system
services are not running, a 0 is displayed. If
the command fails, a -1 is displayed.
Report Switches
The following switch and subswitches allow you to view and manage Backup Exec
reports from the command line:
Report switches
-ft:format Use:
-ft:0 to use .rpt with save data file type
(default).
-ft:1 for HTML file type.
-ft:2 for XML file type.
-ft:3 for Microsoft Excel file type.
-ft:4 for Microsoft Word file type.
Note If the value contains a space or a colon, enclose the value with quotation marks. If
the switch contains more than one letter and you are not using quotation marks to
enclose the value, a colon must appear immediately after the switch.
The default parameters set through the -o300 switch can be overridden when creating an
individual job. The following default options can be set using the -o300 switch:
DO_JOB_PRIORITY Set job priority Specifies the priority for the job. If
another job is scheduled to run at the
same time as this job, the priority
determines which job runs first.
If a priority is not entered, the priority
will be Medium. Priority options
include:
0 = Low
1 = Lowest
2 = Medium
3 = High
4 = Highest
DO_JOB_CMDEXELOC Select systems for pre- Specifies whether an .EXE or batch file
and post-job commands command should run on both local and
remote systems, on local systems only,
or on remote systems only. Values that
can be used with this command are:
0 = The command is to run on both
local and remote systems.
1 = The command is to run only on
the local system.
2 = The command is to run only on
the remote systems.
DO_JOB_RUNJOBIFPRE Run job only if the pre-job Enter 1 to run the job only if the pre-job
SUCCESS command is successful. command is successful; otherwise,
enter 0. If the pre-job command is not
successful, the job does not run, and is
marked as failed.
DO_JOB_CMDTIMEOUT Specify time interval for Specifies the amount of time before or
command after the job in which the pre or post
command should run.
DO_JOB_FAILIFCMDFAILS Mark job as failed if either Enter 1 to have the job marked as
command fails failed if either the pre-job or post-job
command fails; otherwise, enter 0.
DO_JOB_ Cancel the job if not Specifies the amount of time Backup
CANCELTHRESHOLD completed within the Exec should wait for the job to
specified time. complete before cancelling the job. This
value should be provided in minutes.
DO_JOB_ Set default device for job Specifies the drive pool or stand-alone
DEVICEGUID drive to be used for processing the
backup.
DO_JOB_ Set the default media set Specifies the media set for the job.
MEDIASETGUID
Command
Line
DO_BACKUP_ Enable single instance Enter 1 to ensure that only one instance
SINGLEBACKUPNTFS backup for NTFS volumes of the backing file for NTFS volumes
will be backed up regardless of the
number of single instance store (SIS)
links that point to it; otherwise, enter 0.
DO_BACKUP_ Set last access date Note If 5 was entered as the value for
LASTACCCESSEDDAYS DO_BACKUPT_TYPE, the
DO_BACKUP_
LASTACCESSEDDAYS entry must
be completed.
Enter the number of days to include
files last accessed during. For example,
to specify a working set backup to
include all files last accessed within 30
days, type:
-do:DO_BACKUP_
LASTACCESSEDDAYS -dv:30
DO_BACKUP_HSM Back up data in remote Enter 1 to back up data that has been
storage migrated from primary storage to
secondary storage; otherwise, enter 0.
When using this option, the data will
not be recalled to its original location; it
will be backed up directly to the
backup media.
This option should not be used if:
A single device containing one
drive is used for secondary storage
and backups because Remote
Storage and Backup Exec will
compete for use of the drive.
You want to run a backup of the
entire system because Backup Exec
attempts to access all data that has
been migrated to secondary storage
and this may take a considerable
amount of time.
DO_BACKUP_ Use Open File Option if Enter 1 to use the Open File Option if
USEOPENFILEOPTION available available; otherwise, enter 0.
DO_BACKUP_ Back up open file if closed If 3 was entered for the value for
OPENFILESKIPSECS within x seconds DO_BACKUP_OPENFILEMETHOD,
enter a number from 1 to 999 to specify
the number of seconds Backup Exec is
to wait for an open file to close before
continuing the backup. If the files do
not close during the specified interval,
they are skipped.
DO_RESTORE_ Restore over existing files Enter 1 to overwrite files on the target
EXISTINGMETHOD device that have the same name as files
that are being restored; otherwise, enter
0.
DO_TRIAL_ Check logon credentials Enter 1 to verify that the logon account
CHECKCREDENTIALS for trial run job is correct for the volumes being backed
up; otherwise, enter 0.
DO_TRIAL_ Check media capacity for Enter 1 to test whether enough tape is
CHECKCAPACITY trial run job available to complete the job;
otherwise, enter 0.
Note During the test run job, the
number of scheduled jobs in the
queue is not checked; therefore,
jobs that are scheduled before the
test run job may use the media
that was available when the test
run job was performed.
DO_TRIAL_CHECKMEDIA Check media for trial run Enter 1 to test whether the media is
job online and overwritable for a trial run
job; otherwise, enter 0.
DO_TRIAL_ Place job on hold if trial Enter 1 to have the scheduled job
HOLDONFAILURE job fails placed on hold if any failures are
detected during the test run; otherwise,
enter 0.
DO_LOG_SUMMARYLEVEL Select summary level for Enter one of the following values for
job log the job log summary level:
0 = Summary only
1 = Summary and directories
2 = Summary, directories, and files
3 = Summary, directories, files, and
details.
DO_LOG_FILEBASE Specify job log name Specify a job log name FILENAME#.txt.
The # starts at 00. The default is
BEX#.txt.
DO_SQL_BACKUPMETHOD Select the SQL backup Select the backup method to be used
method for SQL databases by entering one of
the following values:
0 = full
1 = log
2 = log no truncate
3 = differential
DO_SQL_ Continue with backup if Enter 1 if you want the backup job to
CONTINUEIFCHECKFAILS consistency check fails continue if the consistency check fails;
otherwise, enter 0.
Command
Line
DO_SQL_RESTOREMETHOD SQL restore method Select the default restore method for
SQL databases. Values include:
0 = no recover
1 = recover
2 = standby
DO_XCH_LOGPATH Select temporary location Enter the temporary location for log
for log and patch files and patch files.
DO_DOMINO_ Lotus Domino backup Select the default method for backing
BACKUPMETHOD method up Lotus Domino databases. Values
include:
0 = full
1 = differential
2 = incremental
DO_DOMINO_ Mark archive logs for Enter 1 to mark archive logs for
RECYCLELOGS recycling recycling; otherwise, enter 0.
DO_DOMINO_ Seconds to wait for Specify the number of seconds for the
SECONDSTOWAIT database restore process to wait for a database
that is in use by entering a value from 0
to 999.
DO_CAT_TRUNCATEDDAYS Amount of days before Enter the amount of days before file
truncating catalogs and directory details are removed from
the catalogs. The value can be between
1 and 999.
DO_CAT_PATH Set catalog path Specify a path on the volume for the
catalog files.
DO_MEDIA_ Set the media overwrite Enter one of the following values:
OVERWRITEOPTIONS options 0 = Overwrite scratch media before
overwriting recyclable media
contained in the targeted media set
1 = Overwrite recyclable media
contained in the targeted media set
before overwriting scratch media
DO_DB_GROOM Remove old data from the Enter 1 if you want Backup Exec to
Backup Exec database automatically delete old data from its
database, using specified criteria.
Otherwise, enter 0.
DO_DB_JOBHISTORYDAYS Number of days to keep Enter the number of days for job
job history data history data to remain on the Backup
Exec database.
DO_DB_ Number of days to keep Enter the number of days for alert
ALERTHISTORYDAYS alert history data history data to remain on the Backup
Exec database.
DO_DB_JOBLOGDAYS Number of days to keep Enter the number of days for job logs to
job logs remain on the Backup Exec database.
DO_DB_REPORTDAYS Number of days to keep Enter the number of days for report
report data data to remain on the Backup Exec
database.
DO_DB_COMPACT Compact the Backup Exec Enter 1 if you want to compact the
database Backup Exec database; otherwise, enter
0.
Command
Line
[General]
[Backup Options]
enter NO.
Line
1 = Backup Log
2 = Backup Log No Truncate
Line
[Media Options]
the password.
Line
[Miscellaneous]
[W2K]
[Schedule]
[Selections]
EXCH2ROOT2=SERVER_NAME
EXCH2SG2=Second Storage Group
EXHC2DB2=Mailboxes
EXCH2ROOT3=SERVER_NAME
EXCH2SG3=Second Storage Group
EXHC2DB3=Users
SQL2S2=SERVER_NAME
SQL2NI2=TWO
SQL2S3=SERVER_NAME
Command
Line
LNSERVER2=SERVER_NAME
LNDRIVE2=E
ORCLSRV2=SERVER_NAME
ORCLSID2=SID2
Command
Line
Command
Line
[General]
USERNAME=user name Type the user name for logging into the
system being restored. If a user name is
not specified, the current user name is
used.
[Restore Options]
[Selections]
[Schedule]
Command
Line
All possible entries for a backup job template script file are described in the following
table. In creating your script file, you would not want to include all entries.
[Selections]
EXCH2ROOT2=SERVER_NAME
EXCH2SG2=Second Storage Group
EXHC2DB2=Mailboxes
EXCH2ROOT3=SERVER_NAME
EXCH2SG3=Second Storage Group
EXHC2DB3=Users
SQL2S2=SERVER_NAME
SQL2NI2=TWO
SQL2S3=SERVER_NAME
LNSERVER2=SERVER_NAME
LNDRIVE2=E
for database.”
ORCLSRV2=SERVER_NAME
ORCLSID2=SID2
Note Alias selections will be ignored unless RUN_IMMEDIATE=YES in the [Schedule] section of
backup job or backup job template.
[Backup Options]
[Media Options]
[Miscellaneous]
[W2K]
[Schedule]
SCHED_DAYSOFWEEK=1/1,1/2,1
/3
Command
Line
[Schedule]
SCHED_DAYSOFWEEK=1/1,1/2,1
/3
SCHED_EXCLUDEDATE2=08/25/2002
Line
3 Success with exceptions Job is terminal with success but there are some
exceptions.
8 Invalid time window The time window is mutually exclusive thus job will
never run.
10 Not in window Date of job makes it eligible to run, but time is not in
window.
23 Linked job The job is linked to another job so will not start until
the master job is finished.
Command
Line
739
How Backup Exec Works in a Cluster
Chapter 15, Using VERITAS Backup Exec with Server Clusters 741
Installing Backup Exec on a Cluster
Note By default, failover from the controlling node to a designated node occurs in
alphabetical order according to the machine name of each node. To change the order
in which failover will occur on the designated nodes, rename the machines.
The Remote Agent is automatically installed on all the nodes in the cluster. If this
installation of Backup Exec will be used to back up remote servers outside the cluster,
install the Remote Agent on those remote servers as well. For more information about the
Remote Agent, see “Installing the Remote Agent to Remote Windows Servers” on
page 823.
1. Install Backup Exec on all the nodes that you want in the cluster.
2. From the node that you want to be the active node, start Backup Exec.
3. From the Tools menu, point to Wizards, and then click Cluster Configuration
Wizard.
Note On the Virtual Server Information screen, Backup Exec automatically displays a
default name called BACKUPEXECVRS for the virtual server. You can type a new
default name if you do not want to use the default.
5. When the Cluster Configuration Wizard completes, create a drive pool that contains
all the locally-attached storage devices on each node to be used when failover occurs.
This ensures that jobs can be run on the storage devices that are attached to the
failover nodes. For more information, see “Creating Drive Pools for Clusters” on
page 745.
See also:
“Creating Drive Pools for Clusters” on page 745
“Enabling or Disabling Checkpoint Restart” on page 747
Note If you are using the Advanced Open File Option, set those defaults on each physical
node the option is installed on, not on the virtual server. Because the default settings
for the static volume can be different on each node, Advanced Open File Option
defaults do not fail over.
1. On the controlling node, make sure the Backup Exec group is online before you start
installing additional options.
3. After the installation is complete on the controlling node, use the cluster
administrator to move the Backup Exec group to the next appropriate node, and
repeat step 2. Be sure to install the same options with the same settings for each node
in the cluster.
Note To install the Backup Exec Agent for Oracle Server and the R/3 Agent for Oracle
Server on other nodes, map a drive to the shared disks where Backup Exec is
installed on the cluster, and run SETUP. For more information, see “Installing the
Oracle Agent” on page 1160 and “Installing the Backup Exec R/3 Agent” on
page 1201.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 743
Installing Backup Exec on a Cluster
1. From the Tools menu, point to Wizards, and then click Cluster Configuration
Wizard.
2. Use the wizard to remove Backup Exec Cluster from all selected servers. You can now
uninstall Backup Exec from the node.
3. After Backup Exec has been uninstalled, move any resource disks from the Backup
Exec cluster group to another group, and then delete the Backup Exec cluster group.
4. On any node, click Start, point to Settings, and then click Control Panel to uninstall
Backup Exec.
3. Add locally-attached storage devices and then exit Backup Exec. If there are tape
devices on a shared SCSI bus, then add the tape device name used by each node.
For information on adding devices to a drive pool, see “Adding Drives to a Drive
Pool” on page 98.
4. Using the cluster administrator, move the Backup Exec resource group to the next
appropriate node.
5. Open Backup Exec, add locally-attached storage devices for this node to the previous
drive pool and then exit Backup Exec. If there are tape devices on a shared SCSI bus,
then add the tape device name used by each node.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 745
Using Checkpoint Restart on Cluster Failover
◆ If failover occurs in the middle of backing up a resource, the media that was being
used at the time of the failover is left unappendable and new media will be requested
upon restart. It is recommended that you select an adequate media overwrite
protection level to ensure that media that was used prior to the failover is not
overwritten upon restart.
◆ The data that is backed up upon restart is part of a different backup set than the data
that was backed up prior to the failover. Separate catalog backup set entries are
created for the data backed up prior to the failover and after the failover.
In addition, if multiple cluster failovers occur during the backup of a given resource, a
different backup set is created each time the job restarts. These multiple backup sets
allow potential for duplication of backed up data.
It is important to restore the backup sets in the order in which they were backed up. In
addition, you should enable the Restore over existing files option when performing a
restore operation on these backup sets. For more information about restore settings,
see “Restoring Data to a Server or Workstation” on page 403.
◆ If failover occurs during a post-backup verify job, or a pre-backup or post-backup
database consistency check job, that job starts at the beginning after failover.
◆ Entries for full-volume backups that were interrupted by a cluster failover and
resumed from the point of failover do not display in the IDR Restore Wizard.
However, you can restore these backup sets manually after you make the initial
recovery using the IDR Restore Wizard.
3. Select or clear Apply CheckPoint Restart (resume jobs from point of failover).
Chapter 15, Using VERITAS Backup Exec with Server Clusters 747
Using Checkpoint Restart on Cluster Failover
Defaults set in Backup Exec remain the same on the failover nodes as they were on the
controlling node when failover occurs.
4. Enable the Cluster Failover error-handling rule. On the Tools menu, select Configure
Error-Handling rules.
❖ By default, in a cluster, failover from the controlling node to a designated node occurs
in alphabetical order according to the machine name of each node. To change the
order in which failover will occur on the designated nodes, rename the machines in
the order in which they should fail over.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 749
Specifying A Different Failover Node
4. If you have added a failover node, also add any locally attached storage devices that
are to be used when failover occurs to the cluster drive pool. This ensures that jobs can
be run on the storage devices that are attached to the failover nodes.
See also:
“Creating Drive Pools for Clusters” on page 745
“Specifying A Different Failover Node” on page 749
“Configurations for Backup Exec and Clusters” on page 752
1. Install the new server as a member server with the Library Expansion Option and
SAN Shared Storage Option installed.
Make sure connections to the Backup Exec Cluster and other member servers are
working properly.
2. Using the cluster administrator, shut down the Backup Exec Cluster services.
Be sure to keep the Disk resource online.
3. Move the catalog files from the Backup Exec Cluster installation path to the respective
installation paths on the new database server.
4. Use BEUtility.exe to connect all Backup Exec servers to the new database server and to
start all Backup Exec services.
5. Stop and restart the Backup Exec Services on the new database server.
6. Using the Cluster Administrator, move the Backup Exec resource group to the failover
node and make sure services start on that node.
7. Use BEUtility.exe to stop and restart the Backup Exec Services on all the member
servers of the SAN in order for them to connect to the new database server.
See also:
“Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 758
“Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 760
Chapter 15, Using VERITAS Backup Exec with Server Clusters 751
Configurations for Backup Exec and Clusters
Note If you install the cluster on a private network, use the Cluster Administrator to
enable public communication if necessary.
If you are using a cluster on a fibre channel SAN or with storage devices on a shared SCSI
bus, depending on the capability of your various SAN components, media might be
orphaned in the tape drive until the failed node becomes active again.
If end-of-job markers were not written to the media before the failover occurred, the
media may be marked as unappendable by the Backup Exec engine when the next append
backup job is run. The media remains unappendable until it is overwritten (or erased, or
the retention period expires, etc.).
If the storage device is a robotic library, you can review the Robotic Library Inventory
report to discover if the media was marked unappendable by the Backup Exec engine. If
the Full column reports a 3, the Backup Exec engine has marked the media as
unappendable.
To add or remove hot-swappable devices in a cluster, run the Hot-swap Device Wizard on
all Backup Exec Cluster nodes. If a server is not updated to recognize a new device, any
job that is targeted to that device may fail. For more information about hot-swapping
devices, see “Hot Swap for Storage Devices” on page 94.
See the following for examples of various cluster configurations:
“Two-node Cluster with Locally-attached Storage Devices” on page 753
“Two-node Cluster with Tape Devices on a Shared SCSI Bus” on page 754
“Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 758
“Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 760
LAN
See also:
“Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 758
“Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 760
Chapter 15, Using VERITAS Backup Exec with Server Clusters 753
Configurations for Backup Exec and Clusters
Heartbeat
LAN
See also:
“Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 758
“Four-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 760
Note You must use a signal converter to connect single-ended and differential devices in
order to avoid hardware damage.
You must terminate the SCSI bus at both ends so that commands and data can be
transmitted to and from all devices on the bus. Each SCSI bus must have two terminators
and they must be at each end of the segment.
If a tape device is in the middle of the bus, as shown in “Two-node Cluster with Tape
Devices on a Shared SCSI Bus” on page 754, remove any internal termination in that
device.
If the tape device is at the end of the bus, as shown in “Example of a shared bus with tape
devices at the end of the bus” on page 755, and the tape device has internal termination,
you can use the device’s internal termination to terminate the bus.
Example of a shared bus with tape devices at the end of the bus
Heartbeat
LAN
Chapter 15, Using VERITAS Backup Exec with Server Clusters 755
Configurations for Backup Exec and Clusters
◆ SCSI adapters. This method is not recommended because if the server is disconnected
from the shared bus, or if there is a power supply failure, the bus may not be properly
terminated and may be inoperable.
◆ Pass-through (or feed-through) SCSI terminators. These can be used with SCSI adapters
and with some tape devices. If the tape device is at the end of the bus, you can attach a
pass-through SCSI terminator to terminate the bus. The internal terminators in the
tape device must be disabled. This is a recommended method.
Tip To ensure termination if a power supply failure occurs, turn off the on-board
terminators on the SCSI controller (using the host adapter manufacturer’s
recommended method) and physically terminate the controller with a terminator.
◆ Y cables. These can be used with some tape devices. If the tape device is at the end of
the bus, you can attach a terminator to one branch of a Y cable to terminate the bus.
The internal terminators in the tape device must be disabled. This is a recommended
method.
Example of a Y cable
◆ Trilink connectors. These can be used with some tape devices. If the tape device is at the
end of the bus, you can attach a terminator to one of the trilink connectors to
terminate the bus. The internal terminators in the tape device must be disabled. This
is a recommended method.
Besides terminating the bus, Y-cables and trilink connectors also allow you to isolate the
devices from the shared bus without affecting the bus termination. You can maintain or
remove that device without affecting the other devices on the shared SCSI bus.
2. Prepare the SCSI controllers for the shared SCSI bus. Refer to your SCSI host adapter
manufacturer’s documentation for details.
Note Do not have power on to both nodes while configuring the systems, or if both nodes
have power on, do not connect the shared SCSI buses to both nodes.
3. Connect the shared SCSI tape devices to the cable, connect the cable to both nodes,
and then terminate the bus segment using one of the methods discussed in the
previous section.
See also:
“Two-node Cluster with Tape Devices on a Shared SCSI Bus” on page 754
Chapter 15, Using VERITAS Backup Exec with Server Clusters 757
Configurations for Backup Exec and Clusters
In this configuration, you should create a failover drive pool for the cluster. For details
about creating a failover drive pool, see “Creating Drive Pools for Clusters” on page 745.
This configuration also offers increased performance since backups are performed locally
instead of over a network. Additionally, centralized media catalogs are available. Because
the SAN SSO uses a shared catalog database, a tape that has already been cataloged can be
physically moved from one device to another and not have to be recataloged.
Tip The SAN SSO option must be installed on each failover node, with the same settings
that were used on the primary node. Either all nodes should be database servers or
all nodes should be secondary member servers.
Two 2-node Clusters on a Fibre Channel SAN with the SAN SSO
Fibre Channel
SAN Secondary
server
Secondary
Storage
Devices
LAN
Note You can designate any server on the fibre channel SAN as the Shared Storage
Option Database server.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 759
Configurations for Backup Exec and Clusters
Note You can designate any server on the fibre channel SAN as the Shared Storage
Option Database server.
In this configuration, you should create a failover drive pool for the cluster. For details
about setting up a drive pool, see “Creating Drive Pools for Clusters” on page 745.
This configuration also offers increased performance since backups are performed locally
instead of over a network. Additionally, centralized media catalogs are available. Because
the SAN SSO uses a shared catalog database, a tape that has already been cataloged can be
physically moved from one device to another and not have to be recataloged.
Tip The SAN SSO option must be installed on each failover node, with the same settings
that were used on the primary node. Either all nodes should be database servers or
all nodes should be secondary member servers.
Secondary
server
Fibre Channel
SAN
Shared Drives
Secondary
Storage
Devices
Backup Exec
Virtual Server
Controlling
node Failover
nodes
Heartbeat
LAN
For details on installing the SAN SSO, see “Installing the SAN Shared Storage Option” on
page 915.
See also:
“Two-node Clusters on a Fibre Channel SAN with the SAN SSO” on page 758
“Designating a New SAN SSO Database Server in a Cluster” on page 751
Chapter 15, Using VERITAS Backup Exec with Server Clusters 761
Backing Up Clusters
Backing Up Clusters
To protect all data in the cluster, including file systems, databases, and the cluster quorum,
back up the following:
◆ Local disks and System State on each node. The cluster quorum, which contains
recovery information for the cluster and information about changes to the cluster
configuration, is included in the System State backup. For more information, see
“Backing Up Local Disks in a Cluster” on page 764.
◆ All shared disks, including the data in the MSCS folder on the Quorum disk. For more
information, see “Backing Up Shared Disks” on page 764.
◆ Virtual servers, which may contain data or contain applications such as Microsoft SQL
Server or Exchange Server. Use Backup Exec database agents to back up databases.
For more information, see “Backing Up Database Files in a Cluster” on page 765.
For details on setting up and running backup operations, see “Creating a Backup Job” on
page 235.
The Command Line Applet can be used with Backup Exec when Backup Exec is installed
in a cluster. The only limitation is that you cannot use the Command Line Applet to
specify a device for backup. You can use the Command Line Applet to target a drive pool,
but not a specific device in that pool. For more information, see “Using the Command
Line Applet” on page 593.
See also:
“Backing Up Local Disks in a Cluster” on page 764
“Backing Up Shared Disks” on page 764
“Backing Up Database Files in a Cluster” on page 765
“Backing Up Windows 2000 and Windows.NET Features” on page 763
Note You can select System State for backup on a remote system only when the Remote
Agent is installed on the remote system.
See also:
“Restoring Windows 2000 and Windows.NET Features” on page 767
Chapter 15, Using VERITAS Backup Exec with Server Clusters 763
Backing Up Clusters
2. On the Backup selection pane, expand Remote Selections, expand the domain that
contains the nodes, and then select the local disks on each node.
Note When making backup selections for nodes running Windows 2000, be sure to select
System State. For more information, see “Selecting Data to Back Up” on page 259.
When making backup selections for nodes running Windows.NET, select Shadow
Copy Components, which include System State. For more information, see
“Protecting Windows.NET Systems” on page 333.
3. Continue with the full backup procedure as usual. For more information, see
“Creating a Backup Job” on page 235.
Tip If you created a drive pool for the cluster, select it as the default destination device
so that jobs can restart on the failover node if failover occurs.
2. On the Backup selection pane, expand Remote Selections, expand the domain that
contains the nodes, and then select either the Microsoft Cluster Server virtual server
or the Backup Exec virtual server. The virtual servers allow your backup jobs to access
shared data via any node that controls the disk.
4. Continue with the full backup procedure as usual. For more information, see
“Creating a Backup Job” on page 235.
Tip If you created a drive pool for the cluster, select it as the default destination device
so that jobs can restart on the failover node if failover occurs.
2. In the Backup selections pane, expand Remote Selections. Expand the domain that
contains the cluster, then expand the virtual server that contains the database files.
Then select the database icon.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 765
Backing Up Clusters
The following example shows the virtual server EXCLUSTER2K selected for backup.
Refer to the specific Backup Exec database agent documentation for details on how to
set backup defaults for the database.
3. After setting any database-specific defaults, continue with the full backup procedure
as usual. For more information, see “Creating a Backup Job” on page 235.
Tip If you created a drive pool for the cluster, select it as the default destination device
so that jobs can restart on the failover node if failover occurs.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 767
Restoring Data To Clusters
Note If possible, take the other nodes in the cluster offline before restoring the cluster
quorum. If the nodes cannot be taken offline, you should select the Force the
recovery... option on the Advanced Restore Job Properties dialog box (explained in
step 4).
4. Select Force the recovery of the cluster quorum even if other nodes are online
and/or disk signatures do not match in the following circumstances:
- If you are not able to take the other nodes in the cluster offline. When this option
is selected, the cluster service for any nodes that are online is stopped.
- If the disk that the cluster quorum previously resided on has been changed. The
disk may have been replaced with a new one, or the disk configuration may have
been changed so that the cluster quorum now resides on a different disk. This
option allows the drive letter of the disk that the cluster quorum was on to remain
the same, even if the configuration has changed and the disk signatures contained
in the restore media do not match the disk signatures contained in the cluster
quorum.
5. Continue the restore operation by following the steps in “Restoring Data to a Server
or Workstation” on page 403.
6. When the restore operation is complete, use the cluster administrator software to
restart the cluster service on nodes on which it was stopped.
▼ To restore the cluster quorum to a node running Active Directory without using
Backup Exec Cluster:
Note If possible, take the other nodes in the cluster offline before restoring the cluster
quorum. If the nodes cannot be taken offline, you should use the -f option with the
clrest.exe command, explained in step 8.
1. To restore System State, start the computer in safe (repair) mode (restart the computer
and then press <F8> when prompted to select an operating system) and then select
Directory Services Restore Mode.
If this is a local restore, you must also start the Backup Exec services before you
restore the System State data. For instructions on starting the Backup Exec services,
see “Starting and Stopping Backup Exec Services” on page 65.
5. Clear the Restore cluster quorum option. This option must not be selected.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 769
Restoring Data To Clusters
8. After reboot is complete, run clrest.exe from the command line to restore the cluster
quorum from the default location to the quorum disk:
clrest path
where path is the complete path to the cluster quorum; typically, the pathname is
%SystemRoot%\cluster\BackupExec. A path is required.
You can include other options on the command line to force the restore to proceed
even if other cluster nodes are online, and/or if the disk signatures do not match, and
to specify another disk as the quorum disk:
clrest path [-f] {drive letter]
where
[-f] forces the restore to proceed even if other cluster nodes are online and/or the disk
signatures do not match. When this option is selected, the cluster service for any
nodes that are online is stopped. This option also allows the drive letter of the disk
that the cluster quorum was on to remain the same, even if the configuration has
changed and the disk signatures contained in the restore media do not match the disk
signatures contained in the cluster quorum.
[drive letter] specifies another drive letter for the quorum disk. If you use this option,
the drive letter that the cluster quorum resides on will be changed to the drive letter
specified. Otherwise, the drive letter that the cluster quorum resides on will stay the
same as it was previously.
9. After the cluster quorum is restored, use the cluster administrator to bring the other
cluster nodes online.
4. Clear the Restore cluster quorum option. This option must not be selected.
7. After reboot is complete, run clrest.exe from the command line to restore the cluster
quorum from the default location to the quorum disk.
clrest path [-f] [drive letter]
where
path is the complete path to the cluster quorum; typically, the pathname is
%SystemRoot%\cluster\BackupExec. A pathname is required.
[-f] forces the restore to proceed even if other cluster nodes are online and/or the disk
signatures do not match. When this option is selected, the cluster service for any
nodes that are online is stopped. This option also allows the drive letter of the disk
that the cluster quorum was on to remain the same, even if the configuration has
changed and the disk signatures contained in the restore media do not match the disk
signatures contained in the cluster quorum.
[drive letter] specifies another drive letter for the quorum disk. If you use this option,
the drive letter that the cluster quorum resides on will be changed to the drive letter
specified. Otherwise, the drive letter that the cluster quorum resides on will stay the
same as it was previously.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 771
Restoring Data To Clusters
8. After the cluster quorum is restored, use the cluster administrator to bring the other
cluster nodes online.
▼ To specify a new drive letter for the cluster quorum disk on Windows NT 4:
4. Change the quorum disk to the new drive letter in the Quorum Disk field and the
Partition field.
5. Close the Cluster Administrator, and then restart the cluster services. Do not use the
-fixquorum startup parameter.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 773
Disaster Recovery of A Cluster
Note If you want to change your setup and use hardware or a hardware configuration
that is different from the original configuration, you must perform a manual
recovery.
Note Only one set of diskettes needs to be created for Windows NT 4 cluster nodes; you
do not need to create a set of disaster recovery diskettes for each node in the cluster.
You do need to include the machine-specific disaster recovery file for both nodes on
the disaster recovery diskettes.
You must create a set of diskettes for each Windows 2000 cluster node; each set of
disaster recovery diskettes is customized for a single computer. You will not be able
to use the set of diskettes interchangeably between the nodes in a cluster.
When recovering both nodes in a cluster, make sure that the drive letters match the
original cluster configuration. The scaled-back version of Windows that runs the recovery
wizard may detect the hard drives in a different order than what was originally
configured under the original version of Windows.
If the original configuration does not match, then to a certain extent, you can control the
hard drive numbering scheme that Windows devises. See the table “Windows hard drive
numbering scheme” on page 901, which lists the normal order that Windows uses to
assign disk drive numbers.
If you cannot get the IDR Recovery Wizard to properly detect the hard drive order, you
can still manually set up hard drive partitions using the Disk Administrator option within
the Recovery Wizard. After this is done, you can continue with automated restore of your
backup media afterward.
Note After Windows has been installed, you cannot change the system drive’s letter. You
must restore the system to the same drive letter from which it was backed up.
Use the following sequence to recover the nodes. For detailed instructions, see “VERITAS
Backup Exec - Intelligent Disaster Recovery Option” on page 855.
1. If you are recovering more than one node, disconnect the shared disks. If you are
recovering only one node, the shared disks do not need to be disconnected.
If all nodes in the cluster are unavailable and must be recovered, the cluster cannot fail
over. The shared disks should be disconnected before recovery begins.
2. To restore the nodes, follow the steps in “Using IDR to Recover a Computer” on
page 891.
4. Restore the data files through the virtual server or through the node that controls the
resource.
5. To restore a database to the shared drives, use the appropriate Backup Exec agent. For
procedures, read the following sections:
- “Disaster Recovery of SQL 2000” on page 1020
- “Disaster Recovery for Exchange Server 5.5” on page 1138
- “Disaster Recovery of a Lotus Domino Server” on page 1196
- “Recovering a Remote Oracle Database Server from a Disaster” on page 1175
2. Perform IDR on one of the nodes. During this process, use the disk manager to
repartition all shared disks to their original configuration. Restore the local disk,
system state, and the data files to the shared disk.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 775
Disaster Recovery of A Cluster
4. Perform IDR on all other nodes. Restore only the local disk and system state.
1. On the first node you want to recover, reinstall Windows, including the last service
pack applied before the failure. For details on how to do this, see “Manual Disaster
Recovery of Windows Computers” on page 540.
Caution After booting the nodes in a cluster, make sure that the drive letters match the
original cluster configuration. If the original configuration does not match, then
to a certain extent, you can control the hard drive numbering scheme that
Windows devises by using the Disk Administrator. See the table “Windows
hard drive numbering scheme” on page 901 that lists the normal order that
Windows uses to assign disk drive numbers.
2. On the other nodes you want to recover, reinstall Windows, including the last service
pack applied before the failure. Refer to the previous Caution as well.
4. Use the Cluster Wizard to reinstall Backup Exec for Windows Servers on the cluster.
You must use the same settings used during the initial installation. For more
information, see “Installing Backup Exec on a Cluster” on page 742.
6. On the Backup Exec navigation bar on the active node, click Restore.
7. In the Restore selections pane, select the last full backup sets made of the active node,
and then select System State.
9. Select the Restore cluster quorum option. This option must be selected.
11. When the restore has completed, reboot the active node.
12. For each node that you need to recover, repeat step 6 through step 11.
13. After all nodes are recovered, restore the Backup Exec data files, and all other data
files, to the shared disks.
14. To restore a database to the shared disks, use the appropriate Backup Exec agent. For
procedures, read the following sections:
- “Disaster Recovery of SQL 2000” on page 1020
- “Disaster Recovery for Exchange Server 5.5” on page 1138
- “Disaster Recovery of a Lotus Domino Server” on page 1196
- “Recovering a Remote Oracle Database Server from a Disaster” on page 1175
3. On the Computer Management menu, select System Tools. Then select Device
Manager.
5. Click OK.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 777
Disaster Recovery of A Cluster
8. In the Restore selections pane, select the most recent backup set of the MSCS folder.
9. Redirect the restore of the MSCS folder to the designated Quorum disk.
10. After the cluster data files have been restored to the Quorum disk, you can enable the
cluster disk driver and start the cluster service.
11. After the cluster quorum is restored, use the cluster administrator to bring the other
cluster nodes online.
1. Disable the cluster disk driver on all nodes in order to gain access to the new disk.
2. Replace and then repartition the shared disk. Use Disk Manager to verify that all
nodes see the shared disk the same.
3. Run Dumpcfg to replace the disk signature for the Quorum disk.
4. Using a remote BE server, restore the cluster files to the Quorum disk via the node that
has access to the disk.
1. Uninstall all cluster applications and the cluster software from both nodes.
2. Replace and then repartition the shared disk to the previously saved configuration.
4. Reinstall the cluster-aware version of Backup Exec for Windows Servers on the
cluster. For more information, see “Installing Backup Exec” on page 46.
6. Use Backup Exec to restore any data from the catalogs. For more information, see
“Restore Operations and the Catalog” on page 396.
1. Replace the shared disk if necessary, and add that disk to the cluster as a disk
resource.
2. Reinstall the cluster-aware version of Backup Exec for Windows Servers on the cluster
using the same information used in the original installation. For more information,
see “Installing Backup Exec” on page 46.
Troubleshooting Clusters
After I recovered my cluster and all shared disks, the cluster service will not start. Why
won’t it start and how can I get it started?
The cluster service may not start because the disk signature on the Quorum disk is
different from the original signature. If you have the Microsoft 2000 Resource Kit, use
Dumpcfg.exe to replace the disk signature by typing:
dumpcfg.exe /s 12345678 0
Replace 12345678 with the disk signature and replace 0 with the disk number. You can
find the disk signature and the disk number in the event log.
If you do not have the Microsoft 2000 Resource Kit, you can use -Fixquorum to change the
Quorum disk signature.
Chapter 15, Using VERITAS Backup Exec with Server Clusters 779
Troubleshooting Clusters
1. Start the cluster service on one node with the -Fixquorum option in the startup
parameters.
2. Open the Cluster Administrator and right-click the cluster, and then select Properties.
5. Click OK.
6. Stop the cluster services and then restart them without the -Fixquorum option.
Note You may run the -Fixquorum option as many times as needed to redesignate a
Quorum disk signature.
I used the Checkpoint Restart option for my backups. During one of my backups, a
cluster failover occurred. Multiple backup sets were created. When I try to verify or
restore using these backup sets, an "Unexpected End of Data" error occurs on the set
that contains the data that was backed up prior to the failover. Why does this occur? Is
my data safe?
You received this error because failover occurred in the middle of backing up the resource,
therefore the backup set was not closed on the media. However, the objects that were
partially backed up in the first backup set were completely backed up again during
restart, ensuring data integrity. Therefore, all of the objects on the media for the given
backup set should still be restored and verified.
Note In version 8.6 of Backup Exec, this feature was called Backup Exec Server Appliance
Kit (BESAK).
Client requirements:
◆ Internet Explorer 5.5 or later
◆ Windows NT 4.0 or later
781
Installing BEWAC
Installing BEWAC
To install BEWAC, select the Web Administration Console option when you install Backup
Exec for Windows Servers. For details about installing Backup Exec, see “Installing
Backup Exec Using the Installation Program” on page 47.
Starting BEWAC
▼ To start BEWAC after installing it:
Note It is recommended that you add a link to this address for quick access.
4. If this is the first time you have started Backup Exec, run the First Time Startup
Wizard.
BEWAC
◆ Right-click functionality. The ability to right-click an item and then select an option
from a Backup Exec shortcut menu is available only in the Selection pane and Results
pane on the Backup Job Properties and Restore Job Properties dialog boxes. For
example, if you right-click the icon for the C: drive in the Backup Selection pane, you
can refresh the screen, select advanced file selection or user-defined selection options,
connect as a different user, check or uncheck the drive, or view properties.
If you right-click an item in any other area of BEWAC, the Internet Explorer shortcut
menu displays.
◆ Wizards. The wizards that display on the Tools menu in Backup Exec for Windows
Servers, such as the Media Rotation Wizard and the Logon Account Wizard, are not
available. However, the First Time Startup Wizard is available in both BEWAC and
Backup Exec for Windows Servers.
◆ Preview panes for media and device properties. The BEWAC user interface does not have
the preview pane that displays in the lower right side of the screen in Backup Exec for
Windows Servers.
◆ Pop-up alerts and error messages. BEWAC does not support most pop-up alerts and
messages. Alerts display in the status area of the server appliance.
Accessing Help
To access Help for BEWAC, click the question mark (?) in the upper right corner of each
screen. If you click the Help tab on the primary navigation bar or press F1, the Windows
Server Appliance Kit help displays.
You can refer to the Backup Exec for Windows Servers Administrator’s Guide and Help
for overview information and procedures for BEWAC. If a different step is required for
BEWAC, the alternate step is indicated in a note in the procedure.
Navigating in BEWAC
Navigation in BEWAC differs from navigation in Backup Exec for Windows Servers.
BEWAC contains a status area at the top of the screen, which is where alerts display. This
status area replaces the Alerts view in Backup Exec for Windows Servers. Below the status
area are two navigation bars. The blue bar is the primary navigation bar. From the
primary navigation bar you can select the tab for the application or task you want to work
with, such as Backup Exec. The white bar is the secondary navigation bar. From the
secondary navigation bar you select BEWAC options, such as backup and restore. The
secondary navigation bar in BEWAC is the equivalent of the navigation bar in Backup
Exec for Windows Servers. You also can click the icons to access BEWAC options.
Status area
Primary
navigation bar
Secondary
navigation bar
Help button
Tools
The Tools tab serves the same function in BEWAC as the Tools menu in Backup Exec for
Windows Servers. When you are following instructions in the Backup Exec for Windows
Servers Administrator’s Guide, replace any mention of the Tools menu with the Tools tab.
BEWAC
From the Tools tab, you can:
◆ Start or stop Backup Exec services, and change logon credentials for the services
◆ Configure alert categories
◆ Configure notification recipients
◆ Create and view a diagnostics log
◆ Configure e-mail and pager notification
◆ Configure error-handling rules
◆ Configure default options for Backup, Restore, Media, Database Maintenance, Job
Logs, Catalogs, and Agents
◆ Add, delete, edit, and replace logon accounts
◆ Add or remove serial numbers
◆ Initiate VERITAS update
2. Under Alerts, click the alert for which you want to view details.
3. At the bottom of the screen, click the name of the alert to view details or respond to it.
4. After viewing the alert details or responding to the alert, click OK to clear the alert
from the alert list.
2. Under Alerts, click the alert for which you want to clear.
Backup Exec
media servers. It is automatically installed in your Backup Exec working directory during
Utility
the initial Backup Exec for Windows Servers installation.
With the Backup Exec Utility, you can:
◆ Reconfigure Backup Exec SAN Shared Storage environments by moving primary
media server responsibilities among Backup Exec media servers.
◆ Configure logical groups of Backup Exec media servers, enabling you to perform
operations on all computers at the same time in the group. These operations can
include starting or stopping services or configuring application service security, such
as changing service account information as well as startup options for one or more
servers in the group. With the Backup Exec Utility, you can also add or remove media
servers from the group.
◆ Start immediate database utility operations on the Backup Exec Database (BEDB) that
are normally initiated by the database maintenance utilities themselves. These
maintenance operations include database dumps, shrink and grooming operations,
along with BEDB database consistency and data integrity checks.
See also:
“Starting the Backup Exec Utility” on page 788
“Completing Tasks using the Backup Exec Utility” on page 790
“Running Backup Exec Utility General Tasks” on page 792
“Running Backup Exec Utility Services Tasks” on page 798
“Running Backup Exec Utility SAN SSO Tasks” on page 804
“Running Database Tasks” on page 809
“Running Media Server Group Tasks” on page 816
787
Starting the Backup Exec Utility
results pane
See also:
“Completing Tasks using the Backup Exec Utility” on page 790
Getting Started
Before you can reconfigure or modify Backup Exec media servers, you must add the
names of the media servers to the list of media servers that the Backup Exec Utility knows
about.
2. On the task pane, under General Tasks, click New Media Server.
Backup Exec
3. Select the appropriate options from the following:
Utility
New Media Server dialog box options
Item Description
Media Server Enter the name of a media server you want to add, or click Browse
to find a server to add.
Check server status Validates that the media server is indeed a media server before
adding it to the Backup Exec Utility master list of known servers.
Include all servers Adds other media servers that may be part of a SAN SSO
known by this server environment to the Backup Exec Utility master list of known
servers.
Get Server Information Shows the properties of the media server entered in the Media
server field.
4. Click OK.
The media server name appears in the results pane when All Media Servers is
selected.
See also:
“Completing Tasks using the Backup Exec Utility” on page 790
Note The task pane can be toggled on and off by selecting Task Pane under View.
Start and stop services on media servers “Running Backup Exec Utility Services
Change media server service accounts Tasks” on page 798
Edit media server configurations.
Set or remove the primary SAN SSO server “Running Backup Exec Utility SAN SSO
Configure the SAN Shared Storage Option Tasks” on page 804
Promote a Backup Exec media server to the primary
server in a SAN Shared Storage Option environment
Move the primary SAN Shared Storage Option
server to a different Backup Exec media server.
Check Backup Exec Database consistencies “Running Database Tasks” on page 809
Age Backup Exec Databases
Compact Backup Exec Databases, and
Dump Backup Exec Databases.
Rebuild, repair and recover Backup Exec Databases.
Change the SQL Server sa password.
Change the database access
Backup Exec
Utility
Add a media server to a media server group “Running Media Server Group Tasks”
Remove a media server from a media server group on page 816
2. On the task pane, under General Tasks, click New Media Server.
Item Description
Media Server Enter the name of a media server you want to add, or click Browse
to find a server to add.
Check server status Validates that the media server is indeed a media server before
adding it to the Backup Exec Utility master list of known servers.
Backup Exec
Include all servers Adds other media servers that may be part of a SAN SSO
known by this server environment to the Backup Exec Utility master list of known
Utility
servers.
Get Server Information Shows the properties of the media server entered in the Media
server field.
4. Click OK.
See also:
“Delete a Media Server from the All Media Servers Subnode” on page 794
“Completing Tasks using the Backup Exec Utility” on page 790
2. On the task pane, under General Tasks, click New Server Group.
Item Description
Media Server Group Enter the name of a media server you want to add, or click Browse
to find a server to add.
Create group from SAN Enables you to create the new media server group and populate it
SSO configuration with the computers found in your SAN SSO environment.
Primary SAN SSO The name of your primary SAN SSO server from which this new
server media server group will be created.
4. Click OK.
See also:
“Add Media Server” on page 816
“Delete a Media Server Group” on page 795
“Completing Tasks using the Backup Exec Utility” on page 790
Note Delete Media Server cannot be used to remove media servers from the Media
Server Groups subnode. To remove media servers from the Media Servers Group
subnode, see Remove Media Server.
2. On the task pane, under General Tasks, click Delete Media Server.
Backup Exec
Utility
3. Select a media server or servers to delete.
4. Click OK.
See also:
“Remove a Media Server” on page 817
“Add a New Media Server” on page 792
“Completing Tasks using the Backup Exec Utility” on page 790
Note All media servers contained in the media server group are deleted along with the
media server group itself. Although they are deleted from the group, the deleted
media servers are not removed from the Backup Exec Utility’s All Media Servers
subnode.
2. On the task pane, under General Tasks, click Delete Media Server Group.
4. Click OK.
See also:
“Create a New Media Server Group” on page 793
“Add Media Server” on page 816
“Completing Tasks using the Backup Exec Utility” on page 790
▼ To run BE Diagnostics:
Backup Exec
View Media Server Properties
Utility
Properties enables you to view server, options and system properties for any Backup Exec
media server that appears in Backup Exec Utility.
Stop Services
Stop Services enables you to remotely stop Backup Exec services on any Backup Exec
media server that appears in the Backup Exec Utility.
Caution When stopping services on a clustered Backup Exec media server, the entire
Backup Exec cluster group will be taken offline. To bring the entire group back
online, restart the services using Start Services.
1. Select a media server from either a media server group or from the All Media Servers
subnode.
4. After the services stop, click Close on the Operation Progress screen.
See also:
“Start Services” on page 799
“Running Backup Exec Utility Services Tasks” on page 798
“Completing Tasks using the Backup Exec Utility” on page 790
Start Services
Start Services enables you to remotely start Backup Exec services on any Backup Exec
media server that appears in the Backup Exec Utility.
Caution When starting services on a clustered Backup Exec media server, the entire
Backup Exec cluster group will be placed online. To bring the entire group back
offline, stop the services using Stop Services.
Backup Exec
1. Select a media server from either a media server group or from the All Media Servers
subnode.
Utility
2. On the task pane, under Services Tasks, click Start Services.
3. After the services start, click Close on the Operation Progress screen.
See also:
“Stop Services” on page 798
“Running Backup Exec Utility Services Tasks” on page 798
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
Note If you are changing the service account on a clustered Backup Exec media server,
you must first bring the Backup Exec cluster group offline using Stop Services. On
the task pane, under Services Tasks, click Change Service Account.
Item Description
Server(s) The name of the media server where the service account is being
changed.
Account The user account designated for the Backup Exec services. The
service account must previously exist and be a member of the
Administrators or Backup Operators groups. The service account is
assigned the following rights: Log on as a service, Act as part of the
operating system, and Create a token object.
Confirm Password Used to re-enter the password to ensure it matches the one entered
in the Password field.
Start type Enables you to change the start up behavior of the service. Choices
include Automatic, Manual, Disabled.
3. Click OK.
Backup Exec
Item Description
Utility
Yes or OK Automatically responds Yes or OK to the generated alert, if you take
no action.
The following media alerts can be configured to use automatic responses: Media
Overwrite, Media Remove, Media Insert and Library Insert.
You can also use the Edit Configuration dialog box to change the amount of time that a
media server waits to release a tape drive before attempting to acquire another tape drive.
In addition, you can also change the amount of time that the media server keeps
possession of a tape drive after a job completes.
1. Select a media server from either a media server group or from the All Media Servers
subnode.
Item Description
Server(s) The name of the media server where the service account is being
changed.
General
Delay before mount Changes the amount of time the media server waits after releasing a
time (in seconds) tape drive and before attempting to acquire a storage device.
Note In a SAN SSO environment, this option should be used in
order to keep one media server from monopolizing the storage
device.
Item Description
Next job wait time (in Changes the amount of time that the media server keeps possession
seconds) of a storage device after a job completes.
Note This option is useful when multiple append jobs are targeted
to a particular media server during the same backup window,
Backup Exec
and you want to save some time.
Utility
In a SAN SSO environment, as soon as a job finishes, the
media server releases the storage device, which enables the
media dismount sequence to begin. When another job is
submitted for processing, the media mount sequence is
initiated. Each of these mount/dismount sequences take time
to complete.
Mount poll time Changes the time interval (in seconds) before Backup Exec retries
mounting media in order to run a job, or attempts to acquire a
storage device with media in it.
Note In a SAN SSO environment, all media servers should use the
same time interval, as this gives them all equal opportunity to
acquire a storage device when jobs are submitted for
processing.
Media Overwrite Alert Enable you to set the automated response for the Media Overwrite
automated response Alert. Responses include: Yes or OK, No, or Cancel.
Media Remove Alert Enable you to set the automated response for the Media Remove
automated response Alert. Responses include: Yes or OK, No, or Cancel.
Item Description
Media Insert Alert Enable you to set the automated response for the Media Insert Alert.
automated response Responses include: Yes or OK, No, or Cancel.
Library Insert Alert Enable you to set the automated response for the Library Insert
automated response Alert. Your choices are Yes or OK, No, or Cancel.
See also:
“Running Backup Exec Utility Services Tasks” on page 798
“Completing Tasks using the Backup Exec Utility” on page 790
Note If the media server is currently part of another SAN SSO storage area network, it
will first be removed from that SAN.
1. Select a media server from either a media server group or from the All Media Servers
subnode.
2. On the task pane, under SAN SSO Tasks, click Set Primary SAN SSO Server.
3. Enter the name of the target SAN SSO storage area network’s primary SAN SSO
server.
4. After the operation finishes, click Close on the Operation Progress screen.
Backup Exec
See also:
Utility
“Running Backup Exec Utility SAN SSO Tasks” on page 804
“Completing Tasks using the Backup Exec Utility” on page 790
Note When converting to standalone status, the server’s Backup Exec Database reverts to
the previous state it was in before the media server was converted to a SAN SSO
Server.
▼ To convert a SAN SSO storage area network media server to a standalone media
server:
1. Select a media server from either a media server group or from the All Media Servers
subnode.
2. On the task pane, under SAN SSO Tasks, click Remove Primary SAN SSO Server.
4. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Backup Exec Utility SAN SSO Tasks” on page 804
“Completing Tasks using the Backup Exec Utility” on page 790
Note You must create a Media Server Group that contains at least two media servers to
use this option.
1. On the Media Server pane, under Media Server Groups, click a Media Server Group
containing at least two media servers.
2. On the task pane, under SAN SSO Tasks, click Configure SAN SSO.
3. In the Primary SAN SSO server field’s list box, click the name of a media server.
4. Click OK.
5. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Backup Exec Utility SAN SSO Tasks” on page 804
“Completing Tasks using the Backup Exec Utility” on page 790
1. On the Media Server pane, under Media Server Groups, click a media server group
containing at least two media servers.
2. On the Task pane, under SAN SSO Tasks, click Promote to Primary SAN SSO
Server.
Backup Exec
Utility
Promote Primary SAN SSO Server Options.
Item Description
Servers Lists the names of the media servers that comprise the media server
group.
Primary SAN SSO The name of the media server to be promoted. The target media
server server is selected from the list of media servers that appear in the
Servers field.
4. Click OK.
After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Backup Exec Utility SAN SSO Tasks” on page 804
“Completing Tasks using the Backup Exec Utility” on page 790
1. On the Media Server pane, under Media Server Groups, click a media server group
containing at least two media servers.
2. On the Task pane, under SAN SSO Tasks, click Move Primary SAN SSO Server.
Item Description
Servers Lists the names of the media servers that comprise the media server
group.
Old primary SAN SSO The name of the existing primary SAN SSO Server.
server
Item Description
New primary SAN SSO The name of the media server to be converted to the new primary
server SAN SSO Server. The target media server is selected from the list of
media servers that appear in the Servers field.
4. Click OK.
After the operation finishes, click Close on the Operation Progress screen.
See also:
Backup Exec
“Running Backup Exec Utility SAN SSO Tasks” on page 804
Utility
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
2. On the task pane, under Database Tasks, click Check Database Consistency.
3. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
3. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
Backup Exec
3. After the operation finishes, click Close on the Operation Progress screen.
Utility
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
3. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
3. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
3. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
3. On the Recover Database dialog box, select the appropriate option for your situation.
Backup Exec
Utility
Item Description
Server The name of the media server on which the Backup Exec Database is
being recovered.
Recovery method
Use best recovery As the Backup Exec Utility default, this option attempts to fix and
method for current recover the existing Backup Exec Database before either deleting it
configuration and creating a new database, or deleting it and recovering from the
previous database dump.
Drop existing database Deletes the existing Backup Exec Database and restores the backup.
and reload from
backup This option works in conjunction with the Backup Exec for
Windows Servers option, Save contents of database to the
Backup Exec data directory, found in the Database
Maintenance node. If this option is set, Backup Exec automatically
dumps the Backup Exec Database to the media server’s hard drive
at a predetermined, user-defined schedule. When you run the
Backup Exec Utility task Recover Database and select the option,
Drop existing database and reload from backup, the existing
BE Database is deleted and replaced with the copy of the database
that was dumped to Backup Exec’s data directory.
For more information, see “Configuring Database Maintenance” on
page 389.
Drop existing database Deletes the existing Backup Exec Database and creates, in its place, a
and reload from base new and empty database.
For more information, see “Configuring Database Maintenance” on
page 389.
4. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
2. On the task pane, under Database Tasks, click Change SQL Server sa Password.
6. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
1. Select a media server from either a media server group or from the All Media Servers
subnode.
Backup Exec
2. On the task pane, under Database Tasks, click Change Database Access.
Utility
3. In the User Name field, enter a user name.
Note To use a local account, enter the local machine name in the domain field. Backup
Exec Utility assumes the local machine name if the field is left blank.
6. Click OK.
7. After the operation finishes, click Close on the Operation Progress screen.
See also:
“Running Database Tasks” on page 809
“Completing Tasks using the Backup Exec Utility” on page 790
2. On the task pane, under Media Servers Group Tasks, click Add Media Server.
4. Click OK.
See also:
“Delete a Media Server from the All Media Servers Subnode” on page 794
“Remove a Media Server” on page 817
“Completing Tasks using the Backup Exec Utility” on page 790
Backup Exec
Utility
Note Remove Media Server does not delete the media server from the All Media Servers
node.
2. On the task pane, under Media Server Group Tasks, click Remove Media Server.
4. Click OK.
See also:
“Delete a Media Server from the All Media Servers Subnode” on page 794
“Add Media Server” on page 816
“Completing Tasks using the Backup Exec Utility” on page 790
Item Description
Server(s) The name of the selected media server or servers on which the SCSI
bus or specific SCSI LUN is being reset.
SCSI Bus Reset Enables the device and media service to issue a SCSI bus reset to the
first device found on the bus. This only occurs when there is a
cluster fail-over and this option is enabled. Resetting the bus
releases any device that may be reserved at the time of the fail-over.
Item Description
SCSI LUN Reset Enables the device and media service to issue a targeted LUN reset
to a storage device that is being reserved in the cluster fail-over
configuration. This targeted LUN reset will be issued only if the
device (storage device, router, etc.) supports targeted LUN resets.
Check your hardware documentation for support of this feature.
Backup Exec
▼ To edit a cluster configuration:
Utility
1. Select a media server from either a media server group or from the All Media Servers
subnode.
2. On the task pane, under Cluster Task, click Edit Cluster Configuration.
3. Select SCSI Bus Reset if your storage device is being shared on a shared SCSI bus.
Caution Do not use the option, SCSI Bus Reset, in a SAN Shared Storage Option
configuration.
4. Select SCSI LUN Reset if your device or devices support targeted LUN reset and
your environment is using a Fibre Channel Storage Area Network (SAN).
5. Click OK.
See also:
“Completing Tasks using the Backup Exec Utility” on page 790
Remote Agent
backup data into a continuous stream that the media server then processes as a single
task. This method provides better data transfer rates over traditional technologies,
which require multiple requests and acknowledgments between the media server and
the remote server.
◆ Enables you to backup and restore in firewall environments.
◆ Enables you to backup and restore using the Specified Network feature in Backup
Exec for Windows Servers.
In order to backup and restore the following platforms, the Remote Agent must be
purchased and installed. These platforms include:
◆ Windows.NET (all versions)
◆ Windows 2000 (all Server versions)
◆ Windows NT 4.0 (all Server versions)
Note To protect the Workstation versions of these platforms, you must install the Remote
Agent on each platform; however a license is not required.
821
Requirements for the Remote Agent
Significant performance increases are attained when running modified backups (for
example, differential and incremental). This occurs because file selection is performed
locally by the Remote Agent, instead of across the network as performed by traditional
network backup applications.
Network hardware has a major impact on performance. Performance is directly related to
the capabilities of the networking hardware in the media server and the remote device.
Higher network bandwidth ratings also contribute to faster operation processing.
See also:
“Requirements for the Remote Agent” on page 822
“Installing the Remote Agent to Remote Windows Servers” on page 823
“Enable Remote Agent TCP dynamic port range” on page 328
“Backing Up Data in a Mixed Environment Using the Remote Agent” on page 825
Note If you have a previous version of the Remote Agent installed, it will automatically
be upgraded when you initiate a new Remote Agent installation. Previous versions
of the Remote Agent are automatically detected on the remote systems and replaced
with the new version during installation of the new Remote Agent. Note that the
name of the system service may have changed when the upgrade is complete.
To install the Remote Agent on a remote server, see “Installing Backup Exec Remote
Agents and Options on Remote Servers” on page 54.
Note You can also install and uninstall the Remote Agent on remote servers using the
Windows command line. See “Installing and Uninstalling the Remote Agent to
Remote Windows Servers Using the Command Line” on page 823.
Remote Agent
Installing and Uninstalling the Remote Agent to Remote
Windows Servers Using the Command Line
You can also install the Remote Agent using silent mode on a remote server using the
Windows command line.
Note Silent mode runs the installation operation without the benefit of a user interface.
▼ To install the Remote Agent on a remote server using the Windows command line:
2. Map a drive letter to the Backup Exec for Windows Servers media server RANT32
directory using the following path:
\Program Files\VERITAS\Backup Exec\NT\Agents\RANT32
3. Open a command prompt and enter the drive letter you mapped in step 2.
5. The Remote Agent is installed on the remote server in the following directory:
\Program Files\VERITAS\Backup Exec\RANT
▼ To uninstall the Remote Agent from a remote server using the Windows command
line:
2. Change directories to the Remote Agent install directory using the following path:
\Program Files\VERITAS\Backup Exec\RANT
Note The -s parameter is used to run the operation in silent mode, without the benefit of
a user interface. The -u parameter specifies an uninstall operation.
▼ To stop or start the Remote Agent on a Windows 2000, Windows XP, or .NET
system:
3. In the Results pane, right-click the Backup Exec Remote Agent for Windows Servers
service. Click Stop to stop Remote Agent or click Start to start the Remote Agent.
3. Select the Backup Exec Remote Agent for Windows Servers service.
4. Click Stop to stop the Remote Agent or click Start to start the Remote Agent.
See also:
“Enable Remote Agent TCP dynamic port range” on page 328
Remote Agent
◆ Disk quota data
◆ Removable Storage data
◆ Remote Storage data
◆ Mount points
◆ Sparse files
◆ System State data, including:
- COM+ Class Registration database
- Boot and system files
- Registry
- Certificate Services database (if the server is operating as a certificate server)
- Active Directory (if the server is a domain controller)
- SYSVOL (if the server is a domain controller)
- Cluster quorum
Note You can select System State for backup on a remote system running Windows 2000,
Windows XP, or Windows.NET only when the Remote Agent is installed on the
remote system.
Admin Plus
To use the Admin Plus Pack Option features, the media server must have the Admin Plus
Pack Option installed. Separate serial numbers are required for each remote server you
Pack
plan on cloning or using to copy jobs, scripts, or templates.
For more information about requirements for media servers, refer to “System
Requirements” on page 42.
You can install the Admin Plus Pack Option while installing Backup Exec by following the
procedures described in “Installing Backup Exec Using the Installation Program” on
page 47. If you have already installed Backup Exec and now want to install the Admin
Plus Pack Option, complete the procedures described in “Installing Backup Exec Options
on a Local Server” on page 49 or “Installing Backup Exec Remote Agents and Options on
Remote Servers” on page 54.
827
Using a Clone CD Image
2. When the list of features being installed appears, ensure Create Clone CD is selected.
Features that are not selected will have a red X appearing next to the feature name.
828
Using a Clone CD Image
4. When the Create Clone CD Image dialog box appears, ensure the directory listed is
the directory where you want the clone CD image file copied. If the location is not
correct, click Change and browse to select the correct location. The directory install
will be copying the clone CD image file to should be an empty directory.
Note If the Backup Exec installation CD is not in your CD drive, Backup Exec will prompt
you to specify the path where the CD image is located. If you have not yet created a
clone CD image, you must insert the Backup Exec installation CD or be able to
access this installation CD from the network.
Note If autorun is not enabled on your system, run SETUP.CMD, which is in the root of
the installation CD directory.
Admin Plus
Because the installation parameters, or options, have already been captured in the clone
Pack
CD image, you will not be prompted for these options.
3. When the Select Push Method dialog box appears, select from one of the following
options:
Item Description
Remote install with Select this option if you want to enter serial numbers for the remote
serialized options systems. During the install, a dialog asking for the serial numbers
for the remote system appears.
Remote install with Select this option if you want to install remotely using all of the
cloned local settings installation options installed on the local system. When this option is
used, you cannot change any settings on the remote system. For
example, if you have installed the Intelligent Disaster Recovery
option locally, this option will also be installed remotely.
Remote install from Select this option if you want to install remotely using the clone file
clone file settings settings that may be contained on a clone CD image or could also be
contained in a previously created parameter file (see “Creating and
Using Installation Parameter Files” on page 62). When this option is
selected, you will be able to browse to a parameter file.
830
Copying Jobs, Selection Lists, and Job Templates Between Servers
2. Select the job, template, or backup selection list you want to copy.
3. Under Backup Tasks in the task list, select Copy to media servers.
Admin Plus
Pack
Copy options
Item Description
Server Name Enter the name of the server you want to copy to, and then click
Add. Each server added to the list will receive a copy.
If this item already Select this option if you want to overwrite an existing job, selection
exists on the list, or template having the same name.
destination server,
overwrite it
5. Click OK.
The operation is queued. The default timeout is five minutes; if the transfer cannot be
completed within five minutes, the transfer is aborted and an alert is issued.
Advanced Reports
Active Alerts by Media Lists all active alerts grouped and filtered by media server,
Server displaying the most recent alerts first (see “Active Alerts by Media
Server Report” on page 835).
Alert History by Media Lists all alerts in the alert history grouped and filtered by media
Server server, displaying the most recent alerts first (see “Alert History by
Media Server Report” on page 836).
832
Advanced Reporting Capabilities
Backup Job Success Rate Lists the success rate for backup jobs run to protect selected servers
(see “Backup Job Success Rate Report” on page 837).
Backup Set Details by Lists all backup sets that ran within the last 72 hours. The sets are
Resource grouped by the server and resource (see “Backup Set Details by
Resource Report” on page 838).
Backup Size by Resource Lists the backup size for each resource job for up to seven previous
runs and then computes the trailing average for up to seven previous
runs for each job run (see “Backup Size By Resource Report” on
page 839).
Backup Success Rate Lists the success rate for backup jobs for a specific number of days
for selected servers (see “Backup Success Rate Report” on page 840).
Daily Job Summary Lists all the jobs that ran within the last 72 hours in chronological
order (see “Daily Job Summary Report” on page 841).
Daily Network Device Lists drive summary history for each archive device for the past 30
Utilization days including daily job count, bytes processed, and the percentage
of drive utilization (see “Daily Network Device Utilization Report”
on page 842).
Device Usage by Template Lists all the job templates that are targeted to specific drive
selections (see “Device Usage by Template” on page 843).
Admin Plus
Pack
Event Recipients Lists all events registered by each notification recipient (see “Event
Recipients Report” on page 843).
Failed Backup Jobs Lists all the failed backup jobs sorted by the resource server and time
frame (see “Failed Backup Jobs Report” on page 844).
Job Distribution by Device Lists all the jobs that have been run on each system device during the
specified period (see “Job Distribution by Device Report” on
page 845).
Job Queue Status Lists the jobs in the queue sorted by status (see “Job Queue Status
Report” on page 845).
Job Templates Lists all the job templates that are defined for the server (see “Job
Templates Report” on page 846).
Machines Backed Up Lists all the servers that have been protected by Backup Exec (see
“Machines Backed Up Report” on page 847).
Media Required for Lists the media that contain the backup sets for each system backed
Recovery up on selected servers for the specified time period. This report can
be inaccurate if media overwrite settings allow the media to be
overwritten (see “Media Required for Recovery Report” on
page 848).
Move Media to Vault Lists all media that can be moved to a media vault. The media listed
are not currently in a media vault and the media’s append period has
expired (see “Move Media to Vault Report” on page 849).
Overnight Summary Lists the results of backup jobs for each resource during the last 24
hours. This report includes backup jobs that were scheduled to run
but did not run. Jobs are given a grace period of 24 hours before
being marked as past due (see “Overnight Summary Report” on
page 849).
Problem Files Lists all the problem files reported for jobs. The files are grouped by
day and resource (see “Problem Files Report” on page 850).
Recently Written Media Lists all media that have been modified in the last 24 hours (see
“Recently Written Media Report” on page 851).
Resource Risk Lists job information for resources on which the last backup job run
Assessment on the resource failed. The data is filtered by resource server (see
“Resource Risk Assessment Report” on page 852).
Retrieve Media from Vault Lists all reusable media currently in the specified vault (see “Retrieve
Media from Vault Report” on page 853).
Scheduled Server Lists the estimated scheduled workload for the next 24-hour period
Workload by server (see “Scheduled Server Workload” on page 853).
Template Definition Usage Lists the usage of template definitions by resources (see “Template
Definition Usage Report” on page 854).
See also:
“Reports” on page 501
834
Advanced Reporting Capabilities
Item Description
Admin Plus
Time Date and time the alert occurred.
Pack
Job Name The name of the job associated with the alert.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Media Server Name of the media server on which the alert occurred.
Job Name The name of the job associated with the alert.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
836
Advanced Reporting Capabilities
Item Description
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Admin Plus
Pack
Item Description
Job Statistics
Exceptions
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
838
Advanced Reporting Capabilities
Item Description
Server Name of the media server where the data for the backup job was
located.
Job Date and Time Run Date and time the backup job was processed.
Trailing Avg, MB Amount of data backed up during the seven previous runs.
Difference % Amount by which the data backed up in the current job differs from the
Admin Plus
previous backup jobs.
Pack
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Backup Sets Total number of backup sets processed by the media server
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
840
Advanced Reporting Capabilities
Item Description
Job Statistics
Admin Plus
File Exceptions
Pack
Skipped Number of files skipped during the operation.
Type Specific type of backup. For more information on backup methods, see
“Backup method for files” on page 248.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Drive Name Name of the storage device and the media server where the device is
located.
Bytes Processed The number of bytes processed by the media server’s storage device.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
842
Advanced Reporting Capabilities
Item Description
Drive Name Name of the storage device and the media server where the device is
located.
Method Specific type of backup. For more information on backup methods, see
“Backup method for files” on page 248.
Set Description Describes the data that was backed up and the location of the data.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Admin Plus
Event Recipients Report
Pack
The Event Recipient report lists events registered by each notification recipient.
Information displayed in the Event Recipient report is described in the following table.
Item Description
Recipient Type The type of recipient, such as Person, Net Send, Printer, or Group.
Item Description
Type Specific type of backup. For more information on backup methods, see
“Backup method for files” on page 248.
Error Category The category for the failed job that may be generated by a system, job,
media, or device error.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
844
Advanced Reporting Capabilities
Item Description
Job Date and Time Run Date and time the job was processed.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Admin Plus
The Job Queue Status report provides details about the job queue sorted by status. You
Pack
can limit the amount of data that appears in the report by selecting filter parameters for
the Job status.
Information displayed in the Job Queue Status report is described in the following table.
Item Description
Next Due Date Next date and time the job is scheduled to run.
Original Due Date Original date and time the job was scheduled to run.
Item Description
Priority Job priority that determines which job runs first. If another job is
scheduled to run at the same time as this job, the priority you set
determines which job runs first. Available priorities include:
◗ Highest
◗ High
◗ Medium
◗ Lowest
◗ Low
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Set Description Describes the data that will be backed up and the location of the data.
Method Specific type of backup. For more information on backup methods, see
“Understanding Backup Methods and Their Advantages” on page 340.
846
Advanced Reporting Capabilities
Item Description
Media Set Name of the media set on which the job will run.
Overwrite/Append The media overwrite protection option configured for the backup job
template properties.
See also:
“Running a Report” on page 503
“Viewing Report Properties” on page 512
Item Description
Admin Plus
Server Name of the server that was backed up.
Pack
Total Backup Count Total number of backups performed.
Last Backup Date of the last backup job for this server.
Item Description
Type Specific type of backup. For more information on backup methods, see
“Backup method for files” on page 248.
Date Date and time the backup job set was created.
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
848
Advanced Reporting Capabilities
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Admin Plus
the last 24 hours. This report includes backup jobs that were due to run but did not run.
Pack
Jobs are given a grace period of 24 hours before being marked as past due. You can limit
the amount of data that appears in the report by entering filter parameters for the
Protected server option.
Information displayed in the Overnight Summary report is described in the following
table.
Item Description
Type Specific type of backup. For more information on backup methods, see
“Backup method for files” on page 248.
Item Description
Error Category The category for the job that may be generated by a system, job, media,
or device error.
Media Server Name of the media server on which the job ran.
Total Tasks Total number of jobs run within the last 24 hours.
Uncorrected Exceptions Number of jobs that failed and were not run again with successful
completion.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
850
Advanced Reporting Capabilities
Item Description
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Admin Plus
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
Pack
contained on a pre-assigned bar code label.
Location Location of the media, such as the storage vault name or drive name.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Error Text Describes the event that caused the job to fail.
Error Category The category for the failed job that may be generated by a system, job,
media, or device error.
Media Server Name of the media server on which the job ran.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
852
Advanced Reporting Capabilities
Item Description
Media Label Media label assigned by Backup Exec, assigned by the administrator, or
contained on a pre-assigned bar code label.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Admin Plus
displays recurring jobs that have already run at least one time, not jobs scheduled to run
Pack
once. You can limit the amount of data that appears in the report by selecting filter
parameters for the Media server option and range parameters for the Hours option.
Information displayed in the Scheduled Server Workload report is described in the
following table.
Item Description
Media Server Name of the media server that will process the scheduled jobs.
Next Due Date The time and day the next job is scheduled to run.
Item Description
Backup Size, MB Estimated amount of data in megabytes to be processed during the next
24 hours.
Total Size (MB) Total amount of data to be processed on the server during the next 24
hours.
Total Size (MB) Total amount of data to be processed on all media servers.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
Item Description
Set Description Describes the data that was backed up and the location of the data.
See also:
“Running a Report” on page 503
“Running and Viewing a New Report Job” on page 506
854
VERITAS Backup Exec - Intelligent Disaster
Recovery Option C
Backup Exec for Windows Servers Intelligent Disaster Recovery (IDR) Option enables you
to quickly and efficiently recover Windows computers after a disaster. The IDR wizards
guide you in preparing for disaster recovery and in recovering a local or remote computer
to its pre-disaster state.
A complete intelligent disaster recovery consists of:
c. Running the IDR Preparation Wizard to create bootable media and recovery
diskettes for each computer.
d. Recovering a computer using the IDR Recovery Wizard and the recovery media.
During initial startup, a wizard guides you through setting an alternate data path for the
computer-specific disaster recovery file, called a *.dr file, in which the asterisk (*)
represents the name of the computer for which the file was created. A *.dr file contains
specific information for the computer you are protecting, including:
◆ Hardware-specific information for each computer, such as hard disk partition
information (Windows 2000 and NT only), mass storage controller information, and
Network Interface Card information.
◆ A list of catalog entries that identify the backup media used to recover the computer.
◆ For Windows XP and .NET computers, Windows Automated System Recovery (ASR)
IDR
configuration information. The ASR files are necessary to recreate partitions on
Windows XP and .NET computers during the recovery process.
The default data path for the *.dr file is on the media server’s hard drive, but it is
recommended that you specify an alternate data path to store another copy of the *.dr file
in case the media server’s hard drive is damaged.
CD-R, CD-RW Requires less preparation and Requires a BIOS that supports
recovery time than diskettes. booting from a CD.
Can also be used to protect Requires a CD burner.
remote Windows computers
on the network.
Can create bootable CD
images for remote computers.
Bootable tape Requires less preparation and Requires a BIOS that supports
recovery time than diskettes. booting from a SCSI CD and a
bootable tape device that
emulates a SCSI CD drive.
Cannot create bootable tape
images for remote computers.
Note When creating a bootable tape image, the bootable tape image must be created
before running full backups.
You will be prepared to successfully recover local or remote computers, using any of the
following recovery methods:
◆ Restore a media server (Backup Exec server) using a locally attached storage device.
◆ Restore a Windows computer by moving the media and the storage device to the
computer being restored, and then restoring the computer through the locally
attached storage device.
◆ Restore a remote Windows computer using a network connection to the media server
See also:
“Getting Started with IDR” on page 859
“Creating and Updating Recovery Media” on page 865
IDR
Note Disaster recovery from virtual devices must be done via Remote IDR using a media
server with access to the virtual device.
See also:
IDR
Note When using Backup Exec’s Remote Administrator, specifying drive A: as the
Alternate Data Path points to the media server’s floppy disk drive. The remote
computer’s drive A: is not used as the Alternate Data Path unless the full path is
entered and a valid share exists for this drive. Be sure to check the path and make
sure that the correct computer and directory path are specified.
7. Enter the alternate location where a copy of the *.dr file will be stored, and then click
Next.
8. If the computer does not have a locally attached bootable tape device, the IDR
configuration is complete. You are ready to run backups and create bootable media.
Go to “Creating and Updating Recovery Media” on page 865 to continue disaster
recovery preparation.
If a bootable tape device is detected, you are prompted to create a bootable tape
image.
a. Click Yes, create the image now (recommended), click Next, and then continue
with step 10.
b. Click No, I will create the image later, and then click Next.
The IDR Configuration wizard is finished.
Create the bootable image for tape later by running the IDR Preparation Wizard
before running the overwrite backup job or the tape will not be bootable. IDR
Go to “Creating and Updating Recovery Media” on page 865 to continue disaster
recovery preparation.
10. When the Starting Tape Image Creation screen appears, the option Let IDR
automatically partition the boot and system drive (Windows 2000 only) is selected
by default.
Selecting this option allows IDR to automatically partition the boot and system drives
for a Windows 2000 computer during the recovery process, and to restore any utility
partitions that previously existed.
11. If you clear this option, then before starting the recovery process, reinstall any utility
partitions by using the OEM-supplied installation media. During the recovery,
manually repartition or reformat the boot and system drives. Click Next to continue.
The completed IDR Configuration screen appears .
The bootable tape image is stored on this computer. When you run an overwrite
backup job for this computer, the bootable image is written to the tape.
Go to “Creating and Updating Recovery Media” on page 865 to continue disaster
recovery preparation.
See also:
“Creating and Updating Recovery Media” on page 865
▼ To set the default and alternate data paths for the *.dr file:
IDR
Item Description
Data path Enter a directory path where a copy of the *.dr file for the protected
computer will be stored. Backup Exec automatically creates the *.dr
file during a backup and stores it in the default location on the
media server’s hard drive, which is
C:\Program Files\VERITAS\Backup
Exec\NT\IDR\Data\<computer name>.DR.
Alternate data path Enter an alternate directory path where a copy of the *.dr files for the
protected computers will be stored. Backup Exec automatically
creates or updates the *.dr file during a backup and stores it in the
specified location.
It is recommended that you specify an alternate data path that is not
on the media server, or is on a different physical drive than the
default location. During a recovery, you can copy the *.dr file from
the alternate path to a diskette to recover the target computer if the
media server’s hard drive is unavailable.
If you are specifying a remote computer’s hard drive as the
alternate data path, browse to or type the path to the remote
computer’s directory that will contain the disaster recovery data
files:
\\<remote_computer_name>\<directory_name>
Check the directory later to make sure the *.dr files were copied.
If you are specifying a directory on a different physical hard
drive on the local computer, browse to or type the drive name
and the path:
d:\drfiles
Note When using Backup Exec’s Remote Administrator, specifying
drive A: as the Alternate Data Path points to the media
server’s floppy disk drive. The remote computer’s drive A: is
not used as the Alternate Data Path unless the full path is
entered and a valid share exists for this drive. Be sure to check
the path and make sure that the correct computer and
directory path are specified.
Note If the bootable media are diskettes, the Windows operating system CD is also
required for recovery; it is not required if the bootable media is tape or CD.
◆ The bootable media contain the system files necessary to make a failed Windows
computer operational after a disaster. Create a new bootable image whenever
hardware, SCSI drivers, or storage device drivers change on the computer that is
being protected.
For Windows NT, more information on choosing SCSI drivers during the SCSI host
adapter (HBA) detection phase of the IDR Preparation Wizard is in “Choosing
IDR
◆ The recovery diskette, which you can create and update separately from the bootable
media by using the IDR Preparation Wizard, is labeled the Intelligent Disaster
Recovery diskette and contains:
- One or more *.dr files, which include computer-specific information such as
hardware-specific information, and catalog entries that identify the media
necessary to recover the computer. For XP and .NET computers, Windows
Automated System Recovery (ASR) configuration information is also included
and is required in order to recreate critical partitions on these computers during
the recovery process.
- Any necessary drivers.
- The Disaster Recovery Wizard.
These items are copied to the Intelligent Disaster Recovery diskette. Create and
update this diskette separately from the bootable media.
At times, the *.dr file may not fit on the Intelligent Disaster Recovery diskette. If
this occurs, copy the *.dr file to a separate diskette.
See also:
“Creating A Full Set of Diskettes” on page 871
“Creating a Bootable CD Image” on page 875
“Creating a Bootable Tape Image” on page 877
“Creating the Intelligent Disaster Recovery Diskette Only” on page 879
“Updating the Full Set of Disaster Recovery Diskettes” on page 881
“Updating the Intelligent Disaster Recovery Diskette Only” on page 883
“Updating Bootable Media” on page 886
Note In most cases, use the SCSI drivers currently installed on the computer being
protected because the drivers contained on the Windows installation CD may not be
up-to-date. If there is an IDE hard disk greater than 8 GB, select Use SCSI drivers
currently installed on this system.
Since IDR runs at a Service Pack 0 or 1 level, some SCSI drivers, such as Symbios
Logic drivers, will not work because they rely on later Service packs.
If there are different SCSI driver versions on the selected computers, the Driver Versions
Do Not Match screen appears. Select which driver version is to be put into the bootable
image. Options include:
- First version found. Hardware installation diskettes may be required for the
highlighted computers.
- Latest date time stamp. The newest drivers may not work on older hardware.
- Only drivers from Windows setup media. Hardware installation diskettes may IDR
be required for some computers.
Note Click Back to try a different set of computers. If more computers are highlighted as
incompatible, try clearing the first computer name in the list to find a larger set of
computers with compatible SCSI driver versions. Consider updating all computers
to the same service pack level to eliminate SCSI driver version differences.
◆ The Windows installation CD that matches the version and language (English, French,
etc.) installed on the protected system is required.
For example, if you are running the IDR Preparation Wizard from a computer running
Windows 2000, but the computer you want to prepare recovery media for is running
Windows NT, then you must have a Windows NT installation CD with the same
language and type of licensing that is on the Windows NT computer.
To prepare recovery media for a remote computer, note that:
- A Windows 2000 computer can create recovery media only for another Windows
2000 computer or for a Windows NT computer.
- A Windows NT computer can create recovery media only for other Windows NT
computers.
- Windows XP and .NET computers can create recovery media for all Windows
2000, NT, XP, and .NET computers.
Note To prepare recovery media for a computer that is running Windows NT 4.0
Terminal Server edition, insert a standard Windows NT 4.0 installation CD when
prompted instead of the Windows NT 4.0 Terminal Server installation CD that
matches the operating system in the target computer.
◆ For Windows 2000, XP, and .NET: If the Windows product key does not appear on this
screen by default, type the Windows product key in the space provided, and then
click Next.
This product key is saved on the recovery media so that it does not have to be
manually entered during recovery.
◆ Administrative privileges for the protected computer are required.
See also:
For instructions on modifying diskette 1, see “Modifying Diskette Sets for Use
with Multiple Windows 2000 Computers” on page 874.
For instructions on update the Intelligent Disaster Recovery diskette, see
“Updating the Intelligent Disaster Recovery Diskette Only” on page 883.
◆ Prior to a disaster, test the bootable diskettes to ensure that the computer can boot
from them.
1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
By default, the IDR Preparation Wizard uses this computer to create the full set of
disaster recovery diskettes. If this computer does not have the IDR option installed
locally, select another media server on which the IDR option is installed to create the
disaster recovery diskettes.
a. To use another computer to create the disaster recovery diskettes, select Choose a
different media server, and see “Preparing IDR Media Via Other Media Servers”
on page 889 for details.
b. To use this computer to create disaster recovery diskettes, on the Welcome screen,
click Next.
The Create or Update IDR Boot Media screen appears.
3. Select Create - Full set of diskettes to boot the Windows Installation CD, and then
click Next.
The Starting Bootable Diskettes Creation screen appears.
5. If the option Let IDR automatically partition the boot and system drive (Windows
2000 only) is not selected when recovery media is created, you can use the same
diskettes 2 through 5 for all IDR-protected Windows 2000 computers, but you must
modify diskette 1 for each computer. For details, see “Modifying Diskette Sets for Use
with Multiple Windows 2000 Computers” on page 874.
See also:
“Booting the Computer in an IDR Recovery” on page 894
“Choosing Generic or Current SCSI Drivers for Windows NT” on page 867
IDR
Winnt.sif file
Because Windows 2000 automated installations allow only one computer name to be
listed in this script, edit the winnt.sif file and change the computer name to another
Windows 2000 computer to be recovered. If the computer name is not modified, duplicate
computer names on the network may result, and may prevent the recovered server from
participating on the network.
The Intelligent Disaster Recovery diskette may also store computer-specific *.dr files, and
may need to be recreated for each computer as well.
See also:
“Updating the Intelligent Disaster Recovery Diskette Only” on page 883
1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
By default, the IDR Preparation Wizard uses this computer to create a bootable CD
image. If this computer does not have the IDR option installed locally, select another
media server on which the IDR option is installed to create a bootable CD image.
b. To use this computer to create the bootable CD image, on the Welcome screen,
click Next.
The Create or Update IDR Boot Media screen appears.
3. Select Create - Bootable CD Image for use with CD Writers (ISO 9660), and then
click Next.
5. When the bootable CD image is complete, run the IDR Preparation Wizard again to
create the Intelligent Disaster Recovery diskette.
See also:
“Booting the Computer in an IDR Recovery” on page 894
“Creating the Intelligent Disaster Recovery Diskette Only” on page 879
“Choosing Generic or Current SCSI Drivers for Windows NT” on page 867
Note A bootable tape drive and its driver must be detected by the Intelligent Disaster
Recovery Preparation Wizard before the option to create a bootable tape image is
displayed. IDR
1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
By default, the IDR Preparation Wizard uses this computer to prepare the bootable
tape image. If this computer does not have the IDR option installed locally, select
another media server on which the IDR option is installed to create the boot image.
a. To use another computer to create the bootable tape image, select Choose a
different media server, and see “Preparing IDR Media Via Other Media Servers”
on page 889 for details.
b. To use this computer to create the bootable tape image, on the Welcome screen,
click Next.
The Create or Update IDR Boot Media screen appears.
3. Select Create - Bootable Tape Image for use with bootable tape devices, and then
click Next.
The Starting Tape Image Creation screen appears.
4. To allow IDR to automatically partition the boot and system drives for a Windows
2000 computer during recovery, and to restore any utility partitions that existed, select
the option Let IDR automatically partition the boot and system drive (Windows
2000 only).
If you do not select this option, then before starting the recovery process, reinstall any
utility partitions by using the OEM-supplied installation media. During the recovery,
manually repartition and reformat the boot and system drives. See “Using IDR To
Recover Windows 2000 Computers” on page 893.
6. When the bootable tape image has completed, run an overwrite backup job so that the
bootable image is written to the tape.
7. When the backup job has completed, run the IDR Preparation Wizard again to create
the Intelligent Disaster Recovery diskette.
See also:
“Choosing Generic or Current SCSI Drivers for Windows NT” on page 867
“Updating Bootable Media” on page 886
“Booting the Computer in an IDR Recovery” on page 894
When the Intelligent Disaster Recovery diskette is complete, click View Disk
Configuration to display the Disk Configuration Report. It is recommended that you save
this report to another drive or to a diskette, since this information may be helpful during
recovery if you did not choose to allow IDR to automatically partition the boot and system
drives.
1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
By default, the IDR Preparation Wizard uses this computer to create the Intelligent IDR
Disaster Recovery diskette. If this computer does not have the IDR option installed
locally, select another media server on which the IDR option is installed to create the
Intelligent Disaster Recovery diskette.
b. To use this computer to create the Intelligent Disaster Recovery diskette, on the
Welcome screen, click Next.
The Create or Update IDR Boot Media screen appears.
3. Select Intelligent Disaster Recovery diskette only, and then click Next.
5. When the Finish screen appears, click View Disk Configuration to display the Disk
Configuration Report.
It is recommended that you save this report to another drive or to a diskette, since this
information may be helpful during recovery if you did not choose to allow IDR to
automatically partition the boot and system drives.
6. Remove the diskette from the drive and store it with the rest of the disaster recovery
media.
See also:
“Updating the Intelligent Disaster Recovery Diskette Only” on page 883
Note When updating diskettes for a Windows 2000 computer, you will need to have all of
the diskettes available during the update.
2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
By default, the IDR Preparation Wizard uses this computer to update the full set of
disaster recovery diskettes. If this computer does not have the IDR option installed
locally, select another media server on which the IDR option is installed to update the
diskettes.
a. To use another computer to update the disaster recovery diskettes, select Choose
a different media server, and see “Preparing IDR Media Via Other Media
Servers” on page 889 for details.
b. To use this computer to update the disaster recovery diskettes, on the Welcome
screen, click Next.
The Create or Update IDR Boot Media screen appears.
4. Under Update, select Full set of diskettes used to boot the Windows Installation
CD, and then click Next.
6. When the Finish screen appears, click View Disk Configuration to display the Disk
Configuration Report.
It is recommended that you save this report to another drive or to a diskette, since this
information may be helpful during recovery if you did not choose to allow IDR to
automatically partition the boot and system drives.
7. Remove the diskette from the drive and store it with the rest of the disaster recovery
media.
The full set of diskettes used to boot the Windows installation CD are now updated.
See also:
“Choosing Generic or Current SCSI Drivers for Windows NT” on page 867
Note If you created a bootable CD image and chose to create and add the ASR files to the
CD image, you must recreate the bootable CD image to update the ASR files.
◆ Necessary drivers.
When you have finished creating the Intelligent Disaster Recovery diskette, click View
Disk Configuration to display the Disk Configuration Report. It is recommended that IDR
you save this report to another drive or to a diskette, since this information may be helpful
during recovery if you did not choose to allow IDR to automatically partition the boot and
system drives.
2. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
By default, the IDR Preparation Wizard uses this computer to update the Intelligent
Disaster Recovery diskette. If this computer does not have the IDR option installed
locally, select another media server on which the IDR option is installed to update the
Intelligent Disaster Recovery diskette.
b. To use this computer to update the Intelligent Disaster Recovery diskette, on the
Welcome screen, click Next.
The Create or Update IDR Boot Media screen appears.
4. Select Update - Intelligent Disaster Recovery diskette only, and then click Next.
6. When the Finish screen appears, click View Disk Configuration to display the Disk
Configuration Report.
It is recommended that you save this report to another drive or to a diskette, since this
information may be helpful during recovery if you did not choose to allow IDR to
IDR
7. Remove the diskette from the drive and store it with the rest of the disaster recovery
media.
Note A bootable tape drive and its driver must be detected by the Intelligent Disaster
Recovery Preparation Wizard before the option to create a bootable tape image is
displayed.
1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
By default, the IDR Preparation Wizard uses this computer to update the bootable
tape image. If this computer does not have the IDR option installed locally, select
another media server on which the IDR option is installed to update the boot image.
a. To use another computer to update the bootable tape image, select Choose a
different media server, and see “Preparing IDR Media Via Other Media Servers”
on page 889 for details.
b. To use this computer to update the bootable tape image, on the Welcome screen,
click Next.
The Create or Update IDR Boot Media screen appears.
3. Select Create - Bootable Tape Image for use with bootable tape devices, and then
click Next.
The Starting Tape Image Creation screen appears.
4. To allow IDR to automatically partition the boot and system drives for a Windows
2000 computer during recovery, and to restore any utility partitions that existed, select
the option Let IDR automatically partition the boot and system drive (Windows
2000 only), and then click Next.
IDR
If you do not select this option, then before starting the recovery process, reinstall any
utility partitions by using the OEM-supplied installation media. During the recovery,
manually repartition and reformat the boot and system drives.
If you have previously prepared a bootable image for tape, the Disaster Recovery
Image Found screen appears.
5. Select Delete the existing image to write the new bootable image to the bootable tape
when the first overwrite backup job runs.
7. When the bootable image is completed, run an overwrite backup job so that the image
is written to the tape.
8. When the backup job has completed, run the IDR Preparation Wizard again to create
the Intelligent Disaster Recovery diskette.
See also:
1. On the Tools menu, click Wizards, and then click Intelligent Disaster Recovery
Preparation Wizard.
2. On the IDR Preparation Wizard Welcome screen, select the option Choose a different
media server, and then click Next.
IDR
3. Click Browse to browse the network and select a media server that has the IDR option
installed, and then click Next to continue preparing disaster recover media.
The media server that you select here will be the computer that actually creates the
media.
Restoring the media server to its pre-disaster status with IDR consists of the following
phases and requirements:
◆ Planning any hardware changes to the computer being recovered.
◆ Booting the computer using the bootable media created with the IDR Preparation
Wizard to install a minimal version of Windows on the computer.
◆ Using the Windows Setup program to repartition and reformat the computer being
recovered.
◆ Using the Disaster Recovery Wizard to restore the computer to its pre-disaster state
and restore the data files.
Note Boot managers, such as System Commander or the OS/2 Boot Manager, cannot be
restored with IDR. Boot managers are usually installed at a very low level that
Backup Exec cannot protect. For example, the OS/2 Boot Manager resides in its own
hard drive partition that Backup Exec cannot access. Because of the many different
boot managers available, an IDR recovery may render the computer unbootable,
even though the operating system was restored. If this happens, re-installing the
boot manager should fix the problem.
◆ Floppy and CD devices cannot be external PC-card drives. Because external PC-card
devices are not supported during the GUI-mode Windows Setup phase, they cannot
be used to access data, and recovery cannot be completed.
◆ If a *.dr file is unavailable for the computer being restored, you can still use IDR to
recover the computer, but you must first manually restore the partition information,
including utility partitions.
See also:
Note For Windows NT: Because IDR runs at a Service Pack 0 or 1 level, some SCSI drivers
such as Symbios Logic drivers will not work since they rely on later service packs.
◆ Network interface cards. When using IDR to recover a computer remotely, and if
different network interface cards (NIC) have been installed, run the Windows
Network Control Panel to remove the old NIC drivers and install the new NIC
drivers.
◆ Video hardware. If you install different video hardware, install the video driver for that
hardware after the original Windows operating system boots into VGA compatibility
mode. IDR will not install new video drivers.
For example, C: and D: are two partitions available on a basic disk. This disk is upgraded
to dynamic, and two more drives, E: and F:, are created. Then, during disaster recovery,
only C: and D: will be recreated. The disks will be basic, but can later be upgraded to
dynamic by using the Windows Disk Administrator.
For more information about basic and dynamic disks, refer to your Windows
documentation.
If the option Let IDR automatically partition the boot and system drive (Windows 2000
only) was not selected during the IDR preparation for Windows 2000 computers, then use
the OEM-supplied installation media to boot and re-create any utility partitions before
continuing with the instructions in “Booting the Computer in an IDR Recovery” on
page 894.
Caution Disconnect any storage area network (SAN) or cluster that is attached to the
computer being recovered; otherwise, the hard drives on those computers may
also be repartitioned and reformatted.
2. Follow the prompts on the screen, and continue with “Using the Windows Setup in an
IDR Recovery” on page 897.
1. At the computer being recovered, insert the last full backup media containing the
bootable image into the tape drive.
2. Follow the bootable tape drive manufacturer’s instructions for booting from the tape
drive.
You may have to change the SCSI BIOS settings to enable booting from a SCSI
CD-ROM. Some bootable tape drives require that you hold the eject button while
powering up the tape drive.
After booting the computer, a magenta-colored Backup Exec Intelligent Disaster
Recovery Bootstrap screen appears, and displays the following information.
Backup Exec Intelligent Disaster Recovery for Windows
(NT/W2K/XP/.NET)
Copyright (c) VERITAS Software Corporation 1984-2002 All
Rights Reserved.
- If you are performing an actual disaster recovery, press <Enter> to begin the
disaster recovery process, and continue with “Using the Windows Setup in an
IDR Recovery” on page 897.
1. At the computer being recovered, insert the bootable CD into the CD-ROM drive.
Make sure the BIOS is enabled to boot from a CD.
You may need to use the following keys during the Windows Setup boot process if the
ASR files are on diskette, or if there are OEM-specific SCSI drivers that must be installed:
Condition Action
For Windows XP and .NET only, and During the Windows Setup boot process, press
if ASR files are on a diskette <F2>, and insert the diskette containing the ASR
files.
IDR uses Windows Automated System Recovery
(ASR) to restore the critical partitions that were
previously on the computer. If the ASR files are
included in the bootable image, you are not
prompted to provide them. The partitions are
created as they were defined in the ASR
configuration file.
If the computer being recovered contains During the Windows Setup boot process, press
OEM-specific SCSI drivers third party <F6> to manually add the SCSI host adapter
drivers or RAID controller drivers before
loading Windows. If you do not add the drivers
before loading the operating system, hard drive
partitions on the computer are not recognized by
Windows. For more information, see
“Recovering Computers Requiring
OEM-Specific SCSI Drivers” on page 904.
Note If the option Let IDR automatically partition the boot and system drive (Windows
2000 only) was not selected during the IDR preparation for Windows 2000
computers, then manually repartition the boot and system partitions. Do not change IDR
the size of the partitions.
When the Windows 2000 Setup screens display the partitions, if utility partitions are
present, they appear as either unknown partitions or as EISA utilities. There is no
drive letter assigned to these partitions. Do not delete these partitions.
Note If a logon screen appears during the setup process, press <Ctrl> + <Alt> + <Delete>
to log on and then press <Enter> to continue.
4. Remove any diskettes or CDs from the drives, and then press <Enter> to reboot the
computer.
5. For Windows NT, XP, and .NET, after the reboot, the IDR Wizard is automatically
started. Continue with “Using the Disaster Recovery Wizard” on page 899.
For Windows 2000, do the following:
a. After the computer is rebooted, at the logon prompt, enter Administrator as the
username and leave the password field blank.
b. When prompted, insert the Intelligent Disaster Recovery diskette. After all files
are restored, the IDR Disaster Recovery Wizard welcome screen appears.
1. After reading the Welcome screen, place the diskette containing the *.dr file into Drive
A: and click Next.
3. Select the *.dr file for the computer being recovered, and then click Next.
Each *.dr file is labeled using the name of the computer from which it was created,
and displays the date and time it was created.
If the necessary *.dr file is not displayed, copy the *.dr file from the default locations
on the media server that ran the last backup to any diskette. Insert this diskette into
Drive A:, and then click Scan Drive A: to find the file that you just copied.
To proceed without selecting a *.dr file, click Next.
5. For Windows NT/2000, if the hard disk partition layout changed, you are prompted
to keep the current layout or restore the original layout that is contained in the *.dr
file.
If you are recovering a Windows NT/2000 computer, and you receive messages that
one or more of the hard drives are smaller than the originals, the version of Windows
NT/2000 that runs the Recovery Wizard may have detected the hard drives in a
different order than they were originally configured.
If the original configuration does not match, then to a certain extent, you can control
the hard drive numbering scheme that Windows NT/2000 devises. The following
chart lists the normal order that Windows NT/2000 uses to assign disk drive
numbers. The information in this chart may change if third party drivers are used.
Other types of mass storage controllers are usually seen as SCSI controllers by
Windows.
Note If the IDR Recovery Wizard cannot detect the hard drive order properly, set up hard
drive partitions using the Windows Disk Administrator option within the IDR
Recovery Wizard. Then, continue with the automated restore of the backup media.
IDR
For more information, see “Using IDR To Recover Windows 2000 Computers” on
page 893.
6. When the Modify Hard Disk Layout screen appears, do one of the following:
- To use the original configuration from the *.dr file, click Next.
- To save the contents of this screen as a text file, click Save Configuration.
- To make changes to the hard disk layout, click Run Disk Manager. Use Disk
Administrator to make additional changes to the partition information. For more
information on these programs and fault tolerant configurations, please refer to
your Windows documentation, and to “Altering Hard Drive Partition Sizes” on
page 903.
If a *.dr file does not exist for the computer being recovered, click Run Disk
Manager and repartition the hard drive to match the partition layout found on
the original computer.
7. If you are restoring with bootable CD or diskettes, select one of the following methods
to access the storage device:
- Use locally attached media device and then click Next. Select the storage device
from which you want to restore, and then click Next.
- Use the network to restore from a remote media server and then click Next.
A Finish screen appears. If changes were made to the partitions, the computer is
rebooted.
9. If the *.dr file is on a diskette, select the drives to be restored, and then click Next.
Depending on the level of assistance selected earlier, all backup sets may be
automatically restored, or you can select individual backup sets to restore.
After the automated restore is complete, you can provide additional media to restore.
If a *.dr file does not exist, or if there are no catalog entries in the *.dr file, then
perform a manual restore and select I will provide my own media, and then go to
“Performing a Manual Restore” on page 905.
Note If a robotic library is being used to recover your computer, the first drive in the
robotic library is for the restore.
13. To make changes to the computer before starting the operating system, click Run
CMD.EXE to open a command prompt window, or click Edit BOOT.INI to modify
the boot.ini file on the root of the system partition.
Caution Modifying the boot.ini file incorrectly may prevent the computer from
restarting.
14. Click Finish to exit the Recovery Wizard and restart the computer.
IDR
Note These steps can also be used to specify the order in which the drivers are loaded.
▼ Perform the following steps using the IDR full set of bootable diskettes:
1. When the blue Windows Setup screen appears after booting with the IDR boot
diskette, press and hold down the <F6> key.
You are prompted for diskette 2.
2. Insert diskette 2 and press and hold the <F6> key again.
After loading additional drivers, a Setup screen appears that allows you to specify
additional devices.
3. Release the <F6> key, and then press the <S> key.
5. After loading the controller driver software, press <S> again to specify loading
another device.
1. Follow step 1 through step 9 in “Using the Disaster Recovery Wizard” on page 899.
2. If you provided a *.dr file, make sure I will provide my own media is selected and
then click Next.
4. To restore to a location other than the one displayed, click Change, and then select a
location where the data will be restored. IDR
a. Click Restore Set to restore the backup set displayed in Media Information and
Set Information.
IDR begins restoring the data to the selected partition. When the restore is
complete, the Found Backup Set dialog box re-appears for the next backup set
found on the media. If there are no more backup sets, the Select Tape Drive screen
appears.
To restore another backup set, click Restore Set again to restore the next backup
set.
Repeat this step for each backup set found on the media.
b. Click Skip Set to skip the restoration of this backup set and search the media for
another backup set from which to restore.
c. Click Skip Media to eject the media and replace it with different media.
6. After the last backup set is restored, click Finish to end the recovery process and exit
Intelligent Disaster Recovery.
See also:
“Recovering Computers Requiring OEM-Specific SCSI Drivers” on page 904
1. Follow step 1 through step 7 of “Using the Disaster Recovery Wizard” on page 899.
2. Select Install networking and restore from a remote media server, and then click
Next.
3. To recover a Windows NT computer, click Next, and continue with step 4; otherwise,
continue with step 13.
b. Select Manual to use the Windows NT Network Setup Wizard. You may need to
provide OEM network driver media when prompted.
Enter the name of the computer being recovered, and then click Next.
The NT Network Setup Wizard appears.
5. Make sure that Wired to the Network is selected, and then click Next.
7. Select the networking protocols used on the network, and then click Next.
Note Additional setup screens that specifically address the Network Interface Card may
appear. If so, follow the screen prompts. IDR
9. If TCP/IP is selected as the network protocol, you are prompted to use DHCP. If you
do not want to use DHCP, you are required to enter an IP address.
The Windows NT Networking Installation dialog box appears.
10. Click Next to start the network and complete the installation of the networking
components.
11. Enter the name of the workgroup or domain for the computer, and then click Next.
Note Entering the name of a temporary workgroup, rather than the name of a domain, is
recommended. The computer will be restored to its original workgroup or domain
when the recovery is complete.
12. Click Finish to complete the network installation and continue with recovery.
13. On the Connect to Media Server screen, enter Backup Exec service account
information to logon to a media server where the storage device is located, and then
click Next.
Note If the media server is in a workgroup, enter the server name again in the domain
field.
Intelligent Disaster Recovery lists drive letters that you can restore; each drive letter
corresponds to a backup set listed in the computer’s data recovery file.
14. Select the drives to recover to do an automatic restore or select I will provide my own
restore media.
16. If you selected I will provide my own restore media, go to the media server, select the
backup set to restore, and then restore to the target computer being recovered. For the
automatic restore, IDR runs jobs on the media server.
See also:
“Microsoft SQL Server Recovery Notes” on page 909
“Microsoft Exchange Recovery Notes” on page 909
“Using IDR To Recover IBM Computers” on page 893
“Recovering Computers Requiring OEM-Specific SCSI Drivers” on page 904
“Using Backup-to-Disk Folders and Files” on page 143
Caution For the Intelligent Disaster Recovery Option to work with SQL 2000, copies are
made of the master and model databases. Copies are only made when
non-AOFO (Advanced Open File Option) backups of the master and model
databases are run. If you are using AOFO for SQL backups, make at least one
backup of the master and model databases without using AOFO.
If SQL 2000 is upgraded, refresh the master and model database copies with
another non-AOFO backup.
911
Example of the SAN Shared Storage Option using FC-AL
Workstation LAN
Server A Server B
Database Server C
Server
Fibre-to-SCSI Bridge
You can use any media server to change the names of the robotic libraries and drives to
names that are more descriptive of your operations.
If you have multiple SANs, it is recommended that you treat each SAN independently,
with each SAN having its own Backup Exec database server for the shared ADAMM
database and catalogs for that loop. Using a single Backup Exec database server for more
than one SAN increases the number of single-point failures that can affect the system.
Job completion statistics or errors can be viewed through any administration console
attached to the server that ran the job.
See also:
“Sharing Media” on page 931.
“Scheduling and Viewing Jobs” on page 929
“Requirements for the SAN Shared Storage Option” on page 914
Caution If you allow the backups of these files to go to a large media set, you may have
to catalog every tape in that large media set in order to find the latest versions of
the ADAMM database and catalogs to restore.
If the database server is not operational, Backup Exec is unusable on all of the servers on
the SAN. The Intelligent Disaster Recovery Option is strongly recommended for
protecting the database server. Should this entire system be lost, you can use IDR to
quickly recover this system.
If you deem the Backup Exec functions to have a high availability requirement, you
should consider setting up one of the other media servers on the storage network as a
BEUTIL swap-ready server. Creating a swap-ready server involves:
◆ Establishing a share to match the one on the current Backup Exec shared database
server.
◆ Familiarizing yourself with BEUTIL so that you know how to use it should you need
to perform the swap.
If you use this scheme, you can quickly switch the storage network to the swap-ready
media server using BEUTIL.
See also:
“VERITAS Backup Exec - Intelligent Disaster Recovery Option” on page 855
Shared Storage
Note If the SAN Shared Storage Option is installed on a media server, Backup Exec
disables all fibre channel-connected devices in Removable Storage. You cannot
re-enable the devices in Removable Storage until the SAN Shared Storage Option
and VERITAS device drivers are uninstalled.
See also:
“Installing the SAN Shared Storage Option” on page 915
Tip For best performance, install the shared ADAMM and catalog databases on the
fastest server on the SAN that is not heavily loaded with non-Backup Exec tasks.
You can install the SAN Shared Storage Option while installing Backup Exec by following
the procedures described in “Installing Backup Exec Using the Installation Program” on
page 47. If you have already installed Backup Exec, follow the procedures described in
“Installing Backup Exec Options on a Local Server” on page 49. If installing to the
database server, select Primary.
If the SAN Shared Storage Option has already been installed to the primary, or database,
server, and you are installing to a secondary server, select Secondary and enter the name
of the database server.
If you installed Backup Exec on the database server, reboot the database server before
loading Backup Exec on other servers. The server containing the shared database must be
running before other media servers can be installed properly.
The first time you run Backup Exec, First Time Wizard displays automatically. The First
Time Startup Wizard is a collection of wizards that help you set up the important features
of Backup Exec, including media sets, overwrite protection settings, devices, and logon
accounts. You must complete the applicable sections of this wizard as it guides you in
preparing Backup Exec for operations.The Media Overwrite Protection Wizard only
appears on the database server. Setting the desired Media Overwrite Protection Level is
important since the media is shared throughout the SAN.
Note When uninstalling Backup Exec, you must uninstall from the secondary servers
before uninstalling from the primary server. For more information about uninstall
procedures, see “Uninstalling Backup Exec” on page 66.
See also:
“VERITAS Backup Exec - Remote Agent” on page 821
“Starting Backup Exec” on page 74
“Scheduling and Viewing Jobs” on page 929
Shared Storage
Note The SAN Shared Storage Option must be installed for Backup Exec to recognize any
devices connected to the fibre channel loop or Fibre Channel Switched Fabric
(FC-SW). FC-SW is a fibre channel configuration in which the devices are connected
in a network using a fibre channel switch.
Storage devices are categorized as either robotic libraries or stand-alone drives. The
Library Expansion Option is required to support robotic libraries (see “VERITAS Backup
Exec - Library Expansion Option” on page 1143).
If you need to add a new device to the SAN after you install Backup Exec, follow your
storage network vendor’s instructions. After you add the new device, reboot the Backup
Exec database server to verify that the new device is recognized. You should reboot the
other media servers according to your storage network vendor’s instructions because
some vendors do not support booting multiple servers concurrently or booting any server
while active jobs are running.
Backup Exec’s device management feature provides the following functionality for the
secondary storage units on a SAN:
◆ Device allocation. Jobs must first reserve the shared secondary backup devices before
they can be used. The job that gains a reservation on a drive keeps it reserved while
the drive is in use. The drive is released after a job completes, which allows other jobs
to compete for it.
◆ Drive pools. You can assign the drives to drive pools in which one or more drives are
combined as a backup target. Jobs submitted to a particular drive pool run on the first
available drive in that pool. You can also submit a job to a selected individual drive in
the drive pool.
Note Cascaded drive pools, in which multiple drives are linked together to create the
appearance of one drive with greater capacity, are not recommended for shared
storage environments.
See also:
“Using Drive Pools with the SAN Shared Storage Option” on page 920
“Using Device Operations with the SAN Shared Storage Option” on page 921
Shared devices
Locally attached drive
Default drive pool for server in SAN
Shared devices
Stand-alone drive
Robotic library
Shared Storage
You can also run the Device Summary report to monitor drives in the SAN Shared Storage
Option.
Drive properties for shared devices can be viewed following steps described in “Viewing
and Using Drive Properties and Statistics” on page 116. With shared devices, the Write
single block mode and Write SCSI pass-through mode options are selected by default.
Selecting these options decreases the chances of dropping critical blocks of data and
provides more detailed information when write errors occur.
See also:
“Device Summary Report” on page 519
“Viewing Drive Configuration Properties” on page 119
See also:
“Using Drive Pools with the SAN Shared Storage Option” on page 920
“Using Device Operations with the SAN Shared Storage Option” on page 921
“Scheduling and Viewing Jobs” on page 929
Shared Storage
Note The Device Management window on other Backup Exec administration consoles
may need to be manually refreshed before the new names appear on them.
See also:
“Pausing, Resuming, and Renaming Devices” on page 94
Shared Storage
Note The drive licenses you purchase for your robotic library are not platform-specific for
this implementation. For example, if you are planning on sharing a ten-drive robotic
library, you can purchase nine Backup Exec for Windows Servers or Backup Exec
for NetWare drive licenses (the first drive in a robotic library does not require a
Library Expansion Option license).
In order to successfully share robotic libraries, you need a working knowledge of both
Backup Exec for Windows Servers and of Backup Exec for NetWare. You also should have
complete access to hardware and the ability to restart media servers.
Before proceeding with the robotic library sharing configuration, plan how you want to
use your robotic library in this shared environment. For example, if you have a robotic
library that has 100 slots in it, you may want to partition your robotic library so Backup
Exec for Windows Servers uses 50 slots and Backup Exec for NetWare uses 50 slots.
Factors affecting how many slots you use for each operating system include media
rotation schemes, the number of servers you are protecting, and the types of data stored
on each server.
Label your media according to operating system or Backup Exec type. Color-coded or
unique bar codes identifying whether the tapes are being used with Backup Exec for
Windows Servers or Backup Exec for NetWare is recommended. This will help you
identify the media when you need to restore data or rotate the media back into your
media rotation schedule.
Note If you are running Backup Exec for NetWare 9.0 on any of the media servers that
will be sharing the library, all Backup Exec for NetWare media servers in the shared
storage environment must be installed in the same media handling mode.
▼ To configure Backup Exec for Windows Servers for robotic library sharing:
1. At the Windows server where the SAN Shared Storage Option is installed, start the
Backup Exec administration console.
2. Click Devices.
The tree pane contains a list of any fibre-attached or locally-attached devices.
4. Under Robotic Library Tasks in the task pane, select Configure partitions.
5. Set up your partitions following the steps provided in “Creating Robotic Library
Partitions” on page 140.
Shared Storage
6. From the Devices tree pane, select the drive in this partition that will not be used by
your Backup Exec for Windows Servers media servers.
9. If you are using Backup Exec for NetWare 8.5, for each drive connected to the shared
robotic library, set the block size to 32K:
Note Backup Exec for NetWare 8.5 does not support writing tapes higher than 32K block
size. Some higher performance devices (such as DLT drives) support block sizes of
64K or higher. If you mix up your tapes and try to read a Backup Exec for Windows
NT tape written with the 64K block size in Backup Exec for NetWare 8.5 it will
appear empty and could be overwritten, resulting in data loss. Therefore, you
should set the block size to 32K. This change only needs to be made at the Backup
Exec for Windows NT database server. This restriction does not apply if using
Backup Exec for NetWare 9.0.
a. From the Devices tree pane, right-click a drive included in the partition you will
be using, and select Properties.
b. From the Configuration tab, check the block size. If it is larger than 32K, change it
to 32K, and then click OK to save.
c. If you are sharing more than one robotic library, repeat steps a through b for each
robotic library.
10. Reboot all other Windows servers and make sure you can see the shared robotic
library on each server.
Note No fibre activity or backup jobs should be run until all Backup Exec for Windows
Servers and all Backup Exec for NetWare servers are configured for robotic library
sharing.
▼ To configure Backup Exec for NetWare 8.5 for robotic library sharing:
Note Backup Exec for NetWare does not dynamically set 0-based robotic libraries at
startup. If you are unsure whether your robotic library is 0-based, go to the Backup
Exec for Windows NT Administration Console and look at the properties for the
robotic library. It is critical that the robotic library is set the same way in both NT
and NetWare so you do not overlap slots between the NetWare and Windows NT
partitions.
b. Select Hardware.
d. From the Robotic Library dialog, highlight any 0-based robotic libraries with the
<Spacebar> and press <F2> to save your selections.
3. From the Options menu, select Partition Management, and then select
Define/Maintain Partitions.
a. From the Options menu, select Partition Management, and then select
Define/Maintain Partitions to create a partition to be used by Backup Exec for
NetWare.
c. From the screen listing the available robotic libraries, move the selection arrows
next to a drive that you want to include in the partition, and then press <F2>.
d. From the Partition Description window, select the starting slot and enter the total
number of slots that will be in this partition.
e. Repeat steps a and b for each partition in the shared robotic library that will be
used by Backup Exec for NetWare.
6. If you plan to share more than one robotic library, repeat the above steps for each
robotic library.
7. Restart Backup Exec for NetWare on the group servers and make sure you can see the
shared robotic library on each server.
Shared Storage
▼ To configure Backup Exec for NetWare 9.x running in the partition management
mode:
1. From the Administration Console, ensure you are connected to the Primary Group
Server and that you are running in partition management mode.
From the Administration Console for NetWare at the Primary Group Server, ensure
you are running in partition management mode.
a. Click Drives.
b. Click Partitions.
e. Repeat step 3 and step 4 for each partition you want to delete.
To delete a partition from the Administration Console for NetWare:
a. Select Drives.
b. Select Partitions.
e. Repeat step 3 and step 4 for each partition you want to delete.
3. Create the partitions in the shared library to be used by Backup Exec for NetWare.
To create a partition from the Administration Console:
b. Right-click Partitions.
e. Click OK.
6. Click OK.
To create a partition from the Administration Console for NetWare:
b. Select Partitions.
c. Press <Ins>.
h. Select Advanced Configuration and then press <Enter> to view or edit options
on the Advanced Configuration dialog box.
j. Press <F2>.
7. If you plan to share more than one library, repeat step 2 and step 3 for each library that
will be shared.
8. Restart Backup Exec for NetWare on the group servers and make sure you can see the
shared library on each server.
Shared Storage
▼ To configure Backup Exec for NetWare 9.x running in the media management mode:
1. From the Administration Console, ensure you are connected to the Primary Group
Server and that you are running in media management mode.
From the Administration Console for NetWare at the Primary Group Server, ensure
you are running in media management mode.
2. Select Drives.
5. From the Administration Console, right-click the robot you want to share, and then
click Properties.
From the Administration Console for NetWare, select the robot you want to share, and
press <F4>.
6. Select Configuration.
7. Enter the starting slot and number of slots to be used by NetWare servers.
9. Restart Backup Exec for NetWare on the group servers and make sure you can see the
shared library on each server.
See also:
“VERITAS Backup Exec - Library Expansion Option” on page 1143
Note If your job is awaiting a storage device, the Job Monitor window will not display a
Device Name. Also, if the Job Status displays as Queued, the job is awaiting an
available storage device.
Shared Storage
With the SAN Shared Storage Option enabled, all of the media servers share access to the
storage devices through the shared ADAMM database. The server that reserves the
storage device first runs its job first. Therefore, a job scheduled by a server may not run
exactly when scheduled if all the storage devices are being used by other servers.
When a server releases control of a device, there is a short delay before the server looks for
additional jobs to process. This delay provides a window of opportunity for other media
servers to reserve the shared storage device.
If a device fails during a nonrecurring job, that job will fail and will be rescheduled on
hold. If a device fails during a recurring job, the job is rescheduled. The device is then
released for the next job scheduled for that device. But, depending on why the device
failed, the second job may become trapped. This might prevent other jobs from seeing the
device, running to normal completion, or failing and being rescheduled to an "on hold"
status. If you determine that a device is malfunctioning, you may want to retarget jobs to
another drive or quickly replace the failed drive and resume the jobs that were placed on
hold.
See also:
“Backing Up Data” on page 233
“Restoring Data” on page 395
“Monitoring Jobs” on page 365
“Viewing Completed Jobs” on page 378
Sharing Media
The Backup Exec servers can share media within the shared storage devices, but not
simultaneously. For example, media server A can write a backup to a media, and when
that job is finished, media server B can append another backup to the same media. Or, if
overwrite protection is not enabled, media server B may overwrite that media.
Media sets are not server-centric. In the shared storage environment, all users have a view
of all media and media sets. Each media set can contain media in the shared devices and
media in any local devices attached to servers.
Note The default media overwrite protection is not server-centric; this option is set in the
shared ADAMM database and affects all media, including media in locally attached
devices. For example, if media overwrite protection is set to None by one server, all
media in the shared storage environment – including media in other servers’ locally
attached devices – are immediately available for overwriting.
Media stored in locally-attached secondary storage devices are not accessible by other
media servers.
See also:
“Media Sets” on page 226
Shared Storage
Note Before you begin troubleshooting, verify that your devices are on the Backup Exec
supported device list, which is located at
www.support.veritas.com/info/sso.htm.
5. Click Configuration.
7. Click Apply.
9. Click OK.
10. As a test, run a short backup job targeted to the device that was offline.
11. If the device is still marked as offline, verify that the operating system recognizes the
device:
- For Windows 2000 and Windows .NET - From Computer Management, select
Device Manager.
- For Windows NT - From the Windows Control Panel, select SCSI Devices.
13. If restarting the Backup Exec services did not resolve the problem, reboot the server.
14. If the operating system consistently sees the device, but Backup Exec fails to see it
consistently and you are sure that the device is on the supported device list, then there
may be a high error rate on the SAN that prevents communication.
See also:
“SAN Hardware Tips” on page 935
1. The proper device drivers might not be installed. To verify that the proper device
drivers were installed:
a. Run Tapeinst.exe
The default location is C:\Program Files\VERITAS\Backup Exec\NT.
2. Many problems in a SAN environment are caused by SCSI issues. Apply normal SCSI
troubleshooting techniques at the fibre to SCSI bridge. Use the bridge administration
tool to verify that the bridge can see all of the devices.
3. There may be a bad GBIC on the SAN. Replace the GBIC in the path between the
server and the storage device, or contact your SAN hardware vendor.
4. SCSI error 9 or 11 in the system event log indicates faulty hardware or an incorrect
version of a driver is installed. If you have verified that the driver is on the supported
driver list, contact your hardware vendor.
5. Frequent events 32770 (“Adamm Service Error: Write operation forced success!” or
“Adamm Service Error: Read operation retry!”) in the application event log indicate a
faulty SAN component. Contact your hardware vendor.
1. If jobs are running, let the jobs complete and place all other jobs on hold.
3. Power down the bridge and all SCSI devices connected to the bridge.
1. If jobs are running, let the jobs complete and place all other jobs on hold.
Note ServerFree backup operations on remote resources outside the SAN are not
supported. ServerFree backups can only be run on the media server.
939
The ServerFree Option
Traditional backup operations (both SAN and direct attached) involve reading the data
from the SAN’s disk array into the Backup Exec media server’s memory. The backup data
is processed and then sent across the SAN to the target backup device. This type of backup
operation is heavily dependent on both the CPU and memory in the Backup Exec media
server.
Traditional SAN backup operation without using the ServerFree Option
Network
Fibre-to-SCSI bridge Da
ta
or router Flo
w
Fibre Channel
Switch and
attached disk
array storage
SAN-attached target
backup device
Backup operations from the disk array to the SAN-attached target backup
device use media server CPU and memory cycles to process the backup
operation. As such, engaging the media server during backup operations
results in a decrease in media server performance.
Unlike traditional SAN backup operations, the VERITAS ServerFree Option keeps the use
of Backup Exec media server CPU and memory resources to a minimum during the
backup operation, thus enhancing performance. Using the ServerFree Option, the
majority of the processing done by the Backup Exec media server is completed at the
beginning of the backup operation. The actual process of moving data from the fibre
channel disk array to the target backup device is done by the Fibre-to-SCSI bridge or
router, where the data mover is located. By using the ServerFree Option, along with the
Fibre-to-SCSI bridge or router (data mover), Backup Exec media server processing is kept
to a minimum. The media server is now free to use its processing power for other business
operations.
SAN backup operations using the ServerFree Option
Network
Fibre-to-SCSI bridge
or router
Fibre Channel
Switch and
Data mover
attached disk
operations
array storage
occur in the
Fibre-to-SCSI
bridge or router
Data
Flow
SAN-attached target
backup device
Volume snapshot
Using the ServerFree Option, backup operations use minimal media server
CPU cycles when backups are running. By essentially bypassing the media
server, backup performance is enhanced, while also freeing the media server’s
processing resources for other important applications.
Appendix E, VERITAS Backup Exec for Windows Servers - ServerFree Option and Intelligent Image
The ServerFree Option
Required Components
If any of the following requirements are not met, the ServerFree backup job you have
configured will run as an Intelligent Image Option backup job. If Intelligent Image Option
is not available, a standard backup job will run. After the backup job completes, the
Backup Exec job log will indicate what backup option was used.
Hardware
In order to benefit from ServerFree Option technology, you must have certified SAN
hardware that supports data moving operations. This support is provided by SAN
hardware manufacturers. Contact your hardware vendor for a complete list of required
and supported components that support data moving operations.
VERITAS Software will certify new ServerFree-supported SAN solutions as they become
available. For more information on whether your hardware vendor supports this
technology, and for a complete list of requirements, please contact the hardware vendor
directly. You can also contact VERITAS Software by going to
www.support.veritas.com/dsl for information regarding tested solutions.
If you presently have storage area network hardware in place, you may need to update
both the SAN’s hardware software drivers or firmware in order to use the ServerFree
Option. Hardware components that may require updating include:
◆ Fibre channel host bus adapter (HBA)
◆ Fibre-to-SCSI bridge or router
◆ Fibre channel disk array
◆ Fibre channel switch
Software
To install the ServerFree Option on a media server, you need to purchase the following
VERITAS Software products:
◆ Backup Exec for Windows Servers
◆ SAN Shared Storage Option
◆ ServerFree Option (includes the Advanced Open File Option and the Intelligent
Image Option)
Note ServerFree Option by default, uses the included VERITAS Volume Snapshot
Provider from the Advanced Open File Option, to create a snapshot or frozen image
of the volume on the fibre disk array. Alternatively, VERITAS Volume Manager,
along with its separately purchased FlashSnap Option can be used to create the
point in time snapshot of the volume on the fibre disk array.
◆ (Optional) VERITAS Volume Manager and the Volume Manager FlashSnap Option
◆ One license key for each of the above items for each Backup Exec media server in your
SAN.
See your Backup Exec for Windows Servers Administrators Guide for more information on
these options and how to install them.
See also:
“Installing Backup Exec Options on a Local Server” on page 49
Appendix E, VERITAS Backup Exec for Windows Servers - ServerFree Option and Intelligent Image
The ServerFree Option
Network
SAN-attached target
backup device
Note The SAN Shared Storage Option must be installed on the media server before you
can install the ServerFree Option.
Note Only fibre disk arrays that are connected to the same data path as the data mover on
the SAN will use ServerFree Option technology for the backup operation.
Note The ServerFree Option uses the VERITAS Volume Snapshot Provider by default.
Note Microsoft Volume Shadow Copy Service cannot be used in a ServerFree backup job
configuration.
Note The VERITAS Volume Manager FlashSnap Option is compatible with Windows
2000 only.
The volumes you want to use with the FlashSnap Option must first be snap-started
through VERITAS Volume Manager, using the VERITAS Enterprise Administrator
(VEA). For more information, see “Snap Starting a VERITAS Volume Manager
Volume” on page 969.
Appendix E, VERITAS Backup Exec for Windows Servers - ServerFree Option and Intelligent Image
The ServerFree Option
▼ To set the ServerFree Option as the default for all backup jobs:
2. On the Properties pane, under Job Defaults, click Advanced Open File.
Note The ServerFree Option uses the VERITAS Volume Snapshot Provider by default.
Note Microsoft Volume Shadow Copy Service cannot be used in a ServerFree backup job
configuration.
Note The VERITAS Volume Manager FlashSnap Option is compatible with Windows
2000 only.
The volumes you want to use with the FlashSnap Option must first be snap-started
through VERITAS Volume Manager, using the VERITAS Enterprise Administrator
(VEA). For more information, see “Snap Starting a VERITAS Volume Manager
Volume” on page 969.
Note Unlike a ServerFree backup operation, a ServerFree restore job does not use the data
mover during the restore operation. As a result, the Backup Exec media server’s
resources are used to process the job.
Caution Because the ServerFree option uses the Intelligent Image Option, canceling a
ServerFree restore job while it is in progress will result in unusable data, and
may leave the drive in an unusable state. You may want to redirect the restore to
a noncritical target and then copy the data to a final destination when the job
successfully completes.
See also:
“Restoring Data” on page 395
“The Intelligent Image Option” on page 948
“Restoring Files From An Intelligent Image Backup” on page 954
Appendix E, VERITAS Backup Exec for Windows Servers - ServerFree Option and Intelligent Image
The Intelligent Image Option
Note While Backup Exec’s image technology can result in a high-performance backup
operation, performance gains may not be apparent without a high-performance
backup tape device.
The Intelligent Image Option can also be run from the Command Line Applet.
See also:
“Using the Command Line Applet” on page 593
“Requirements for the Intelligent Image Option” on page 949
“Installing the Intelligent Image Option” on page 949
“The ServerFree Option” on page 939
“Understanding the Advanced Open File Option” on page 955
Appendix E, VERITAS Backup Exec for Windows Servers - ServerFree Option and Intelligent Image
The Intelligent Image Option
6. Start the backup job or select other options from the Properties pane.
See also:
“Understanding the Advanced Open File Option” on page 955
“Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on
page 966
“Requirements for Using the Advanced Open File Option” on page 958
“Checking the Job Log When Using the Advanced Open File Option” on page 968
“Selecting the Image Option as the Default for All Backup Jobs” on page 951
Selecting the Image Option as the Default for All Backup Jobs
You can set the Use Intelligent Image Option as the default to be used for every backup
job.
If the volume selected for backup does not meet the requirements for using the image
option, then a non-image backup is performed on the selected files instead. The job log
will report that the image option was not available and that a non-image backup was
performed for the selected files.
2. On the Properties pane, under Job Defaults, click Advanced Open File.
4. Select the option Use Intelligent Image Option and if applicable, Use ServerFree
Option.
5. Click OK.
All backup jobs now default to using the Intelligent Image Option if it is available.
See also:
“Checking the Job Log When Using the Advanced Open File Option” on page 968
“Requirements for Using the Advanced Open File Option” on page 958
“Selecting the Intelligent Image Option for a Single Backup Job” on page 950
Appendix E, VERITAS Backup Exec for Windows Servers - ServerFree Option and Intelligent Image
The Intelligent Image Option
=====================================================================
Job Operation - Backup
Media operation - overwrite.
Hardware compression enabled.
=====================================================================
Appendix E, VERITAS Backup Exec for Windows Servers - ServerFree Option and Intelligent Image
The Intelligent Image Option
IIO icon
Caution Canceling an image option restore job while it is in progress will result in
unusable data, and may leave the drive in an unusable state. You may want to
redirect the restore to a noncritical target and then copy the data to a final
destination when the job completes successfully.
Option
- Advanced Open File Option F
The VERITAS Backup Exec for Windows Servers - Advanced Open File Option (AOFO) is
installed as a separate, add-on component of Backup Exec for Windows Servers.
The Advanced Open File Option uses advanced open file and image technologies
designed to alleviate issues that are sometimes encountered during backup operations,
such as protecting open files and managing shortened backup windows.
See also:
“Understanding the Advanced Open File Option” on page 955
“Selecting the Advanced Open File Option for a Single Backup Job” on page 964
“Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on
page 966
“The Intelligent Image Option” on page 948
“The ServerFree Option” on page 939
955
Understanding the Advanced Open File Option
than letting Backup Exec automatically calculate them. Use caution when you manually
enter specific sizes for the static volumes since those sizes are used regardless of the sizes
of the volumes being backed up. If you don’t allocate enough space, the job could fail.
By creating and backing up a snapshot view of the files on a volume, the Advanced Open
File Option can back up files even as they are being changed.
Note The recommended method for protecting databases is to use Backup Exec database
agents. Backup Exec database agents provide selective restores of data and more
integration with the database application while preventing backups of partial
transactions. Agents also enable backups on a database that is spread across
multiple disk volumes.
You can also use the Advanced Open File Option on the same volume as a database to
provide open file support for other applications. The Advanced Open File Option
provides generic protection for data that is not supported by Backup Exec agents.
Snapshot Support
When creating a snapshot of a volume, Backup Exec uses advanced snapshot technologies
to momentarily suspend write activity to a hard drive so that a point in time, or snapshot
of a volume can be created. After creating a snapshot, the data can then be backed up.
Note To use snapshot technologies with Backup Exec, you must first purchase the
Advanced Open File Option.
Backup Exec supports multiple snapshot technologies, which are found in the following
options:
◆ VERITAS Advanced Open File Option
using the VERITAS Volume Snapshot Provider
◆ VERITAS Volume Manager FlashSnap Option
◆ Microsoft Volume Shadow Copy Service. Operating system vendors, as well as other
third party software vendors often provide additional technologies that work in
conjunction with the Microsoft Volume Shadow Copy Service. These technologies,
called Writers, are used to close any open files residing in the computer’s memory
before the Microsoft Volume Shadow Copy Service makes a snapshot of the volume to
be backed up. Using a Writer along with the Microsoft Volume Shadow Copy Service
ensures a complete backup of your volume.
Note Microsoft Volume Shadow Copy Service is only supported on the Windows XP and
Windows.NET platforms.
See your software documentation for information about Writers that may be provided by
the software’s vendor.
After making backup selections and then choosing the Advanced Open File Option, you
can increase backup performance by configuring Backup Exec to use the snapshot
Open File
technologies installed on your systems. Use the following table as a guide.
Option
If you are running: These are the available options:
VERITAS Volume Manager VERITAS Volume Manager version 3.0, along with Service Pack 1
with mirrored drives in a or greater, along with the FlashSnap Option.
Windows 2000 environment Note The volumes you want to use with the FlashSnap Option must
only first be snap-started through VERITAS Volume Manager, using
the VERITAS Enterprise Administrator (VEA). For more
information, see “Snap Starting a VERITAS Volume Manager
Volume” on page 969.
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 957
Understanding the Advanced Open File Option
Note The Advanced Open File Option cannot be used on CD-ROM, floppy diskettes, or
removable media.
If you are installing the Advanced Open File Option locally to protect the media server’s
data, you are entitled to move the Remote Agent that was included with the Advanced
Open File Option installation to one remote Windows server so that resource can be
protected by Backup Exec.
However, if the Advanced Open File Option is protecting a remote resource, the Remote
Agent is necessary in order to perform remote backup and restore operations, and you are
not entitled to move it to another Windows server.
For instructions on moving the Remote Agent to another Windows computer, see
“Installing and Uninstalling the Remote Agent to Remote Windows Servers Using the
Command Line” on page 823.
Open File
Installing Advanced Open File Option will install the VERITAS Snapshot Provider only;
Option
to use the VERITAS Volume Manager FlashSnap Option, you must purchase VERITAS
Volume Manager, along with its FlashSnap Option; for Microsoft Volume Shadow Copy
Service, you must be using the Windows XP and Windows.NET platforms.
To use snapshot technologies with Backup Exec, you must first purchase the Advanced
Open File Option.
Caution Backup Exec for Windows Servers will not use older versions of the Open File
Option. You must upgrade the Advanced Open File Option by purchasing and
re-installing it on the local server and all remote computers on which it
currently resides.
Note You will need to reboot the computer on which you are installing AOFO after
completing the installation.
To install the Advanced Open File Option on a local media server, see “Installing Backup
Exec Options on a Local Server” on page 49.
To install the Advanced Open File Option on a remote media server, see “Installing
Backup Exec Remote Agents and Options on Remote Servers” on page 54.
Note You can also install and uninstall the Advanced Open File Option on remote servers
using the Windows command line. See “Installing and Uninstalling the Advanced
Open File Option to Remote Windows Servers Using the Command Line” on
page 960.
See also:
“Upgrading Backup Exec Options on Remote Computers” on page 71
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 959
Installing the Advanced Open File Option
Note Silent mode runs the installation operation without the benefit of a user interface.
▼ To install the Advanced Open File Option on a remote server using the Windows
command line:
2. Map a drive letter to the Backup Exec for Windows Servers media server RANT32
directory using the following path:
\Program Files\VERITAS\Backup Exec\NT\Agents\RANT32
3. Open a command prompt and enter the drive letter you mapped in step 2.
Note The -s parameter is used to run the install operation in silent mode, without the
benefit of a user interface.
5. The Advanced Open File Option files are installed on the remote server in the
following directory:
\Program Files\VERITAS\Backup Exec\RANT
▼ To uninstall the Advanced Open File Option from a remote server using the
Windows command line:
Open File
Option
2. Change directories to the Advanced Open File Option install directory using the
following path:
\Program Files\VERITAS\Backup Exec\RANT
Note The -s parameter is used to run the operation in silent mode, without the benefit of
a user interface.
The Advanced Open File Option is uninstalled from the remote server. After the
uninstall finishes, reboot the system at your convenience in order to de-activate the
Advanced Open File Option.
1. From the Start menu, point to Settings, then click Control Panel.
3. Select VERITAS Backup Exec for Windows Servers, and then click Change/Remove.
Under Windows NT, click Add/Remove.
5. Click Continue on the VERITAS Backup Exec Serial Numbers dialog box.
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 961
Changing the Advanced Open File Option Default Settings
6. In the Destination pane of the VERITAS Backup Exec Features dialog box, select the
computer from which you want to remove the Advanced Open File Option.
7. In the List pane, click the icon preceding the Advanced Open File Option and click
This feature will not be available.
8. Click Continue.
9. Click Finish.
Note The Advanced Open File Option Wizard only enables you to change the
configuration options for the VERITAS Volume Snapshot Provider.
Note If the amount of data that you have selected to back up is significantly less (30%)
than the total amount of data on the volume, the backup may run faster if you use
the Advanced Open File Option Wizard to decrease the size of the static volume,
rather than letting Backup Exec calculate it automatically.
Use caution when you manually enter a specific size for the static volume since that
size is used regardless of the size of the volume being backed up, and the job could
fail if there is not enough space.
▼ To change the Advanced Open File Option default settings using the Advanced
Open File Option Wizard:
1. On the Tools menu, select Wizards, and then click Advanced Open File Option
Wizard.
3. On the Open File Option Configuration screen, enter new defaults using the
following table.
Open File
Option
Item Description
Have Backup Exec Enables Backup Exec to automatically calculate the initial and
calculate the initial and maximum size of the static volume for each backup.
maximum size of the
static volume
Initial size of the static Sets the initial size of the static volume.
volume (1 - 100 percent):
If you choose not to use the default, then type the percentage of
free space you want Advanced Open File Option to use to create
the static volume and for incremental growth of the backup.
Increase this percentage if you receive an error message stating
that Advanced Open File Option is out of disk space. This
increase enables additional free space to be allocated on the
volume, which then can be used during the backup.
Maximum size that the Sets the maximum size of the static volume.
static volume can grow
to: If you choose not to use the default, then type the maximum
percentage that you allow for the static volume. If the static
volume exceeds the percentage indicated, the job will fail and the
error will be listed in the job log.
Number of seconds Sets the minimum length of quiet time in seconds, in which the
during which there can application waits for disk inactivity before the static volume is
be no disk activity before created. Decrease this setting if you have an active system so that
the static volume is the static volume can be created before reaching the maximum
created length of quiet time.
The recommended minimum length is five seconds, but you can
choose between two and four seconds.
Number of seconds that Sets the maximum length of quiet time in which the application
the application tries to waits for disk inactivity before creating the static volume. Increase
obtain the minimum quiet this setting if a backup fails repeatedly. Increasing this setting
time, after which the job maximizes the length of time used to create the static volume. The
fails default is 2,000 seconds.
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 963
Using the Advanced Open File Option
2. Select the data you want to back up from the Backup Selections tree or choose an
existing selection list using the Load Selections from Existing List button.
Note Backing up files and directories by following junction points is supported only if
you are using the Advanced Open File Option on a Windows 2000 volume, and you
are using the VERITAS Volume Snapshot Provider.
Item Description
Open File
Option
Use Advanced Open Activates the Advanced Open File Option for use with Backup Exec
File Option for Windows Servers.
Automatically select Enables Backup Exec to select the best open file technology to use
open file technology for the type of data being backed up.
VERITAS Volume Backup Exec’s default open file option technology. It is compatible
Snapshot Provider with each of Microsoft’s operating environments (Windows NT 4.0,
Windows 2000, Windows XP or Windows.NET).
VERITAS Volume VERITAS Volume Manager version 3.0, along with Service Pack 1 or
Manager FlashSnap greater, along with the FlashSnap Option.
Option
For use with VERITAS Volume Manager in a Windows 2000
environment only.
Note The volumes you want to use with the FlashSnap Option must
first be snap-started through VERITAS Volume Manager,
using the VERITAS Enterprise Administrator (VEA). For more
information, see “Snap Starting a VERITAS Volume Manager
Volume” on page 969.
Microsoft Volume For use with vendor-specific, third party software, along with
Shadow Copy Service Windows XP or Windows.NET
Microsoft’s Volume Shadow Copy Service technology enables third
party hardware and software vendors to create snapshot plugins for
use with Microsoft’s technology.
Use Intelligent Image Used in conjunction with the Advanced Open File Option, this
Option option enables Backup Exec to create a backup job as an image,
rather than as a file-by-file backup set. For more information, see
“The Intelligent Image Option” on page 948.
Use ServerFree Enables Backup Exec to use third party copy support if your storage
Option hardware supports it and you are running in a SAN environment.
For more information, see “The ServerFree Option” on page 939.
5. Start the backup job or select other backup options from the Properties pane.
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 965
Using the Advanced Open File Option
6. To monitor the operation while it is processing, click Job Monitor on the navigation
bar, and then expand the job you want to view.
7. Check the Job Log to make sure the Advanced Open File Option is being used during
the backup.
See also:
“Selecting the Advanced Open File Option for a Single Backup Job” on page 964
“Selecting Data to Back Up” on page 259
“Using Selection Lists” on page 267
“Creating a Manual Backup Job by Configuring Job Properties” on page 236
“Setting Advanced Open File Option as the Default Setting for All Backup Jobs” on
page 966
“Checking the Job Log When Using the Advanced Open File Option” on page 968
“Advanced Open File Option Error Messages” on page 970
Note Jobs saved before the Advanced Open File Option was installed will continue to use
the previous settings for backing up open files. In order to use the Advanced Open
File Option with these jobs, you must edit the job and select Use Advanced Open
File Option.
Open File
Option
3. Select Use Advanced Open File Option.
Selecting this option causes Backup Exec to use the Advanced Open File Option for all
backup jobs.
Note Remember, the Backup Open Files options (Never; If closed within 30 seconds;
With a lock; Without a lock) only apply if the volume selected for backup does not
meet the requirements for using the Advanced Open File Option.
Note Backing up files and directories by following junction points is supported only if
you are using the Advanced Open File Option on a Windows 2000 volume, and you
are using the VERITAS Volume Snapshot Provider.
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 967
Using the Advanced Open File Option
Checking the Job Log When Using the Advanced Open File
Option
If a backup completes successfully while using the Advanced Open File Option,
information is displayed in the Job Log.
If the backup included more than one volume, this information is repeated for each
volume.
If the Advanced Open File Option fails on initialization, the backup still runs but it is
marked as failed in the job log. If the Advanced Open File Option fails during the backup
of a device, that backup set is terminated and is reported as an error.
Open File
1. Start VERITAS Enterprise Administrator (VEA).
Option
2. Expand the Volumes object in the left pane, and then right-click the volume to Snap
Start.
3. On the short cut menu, select Snap, and then select Snap Start.
4. On the Snap Start Volume screen, select either Auto select disks or Manually select
disks.
Note Auto select disks enables Volume Manager to make the disk selection for you,
while Manually select disks enables you to make the selection.
Note Snap Starting a volume only needs to be done once. The Snap Start procedure takes
a considerable amount of time because it creates a mirror.
To make backup selections from the volume, see “Selecting Data to Back Up” on
page 259.
Caution If you are backing up SQL or Exchange databases on the Snap started volume,
you must make your selections using the Backup Exec SQL or Exchange
database agents.
For more information, see “VERITAS Backup Exec - Agent for Microsoft SQL
Server” on page 975 and “VERITAS Backup Exec - Agent for Microsoft
Exchange Server” on page 1067.
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 969
Advanced Open File Option Error Messages
Microsoft Volume This is a VERITAS Volume Snapshot Restart VERITAS Volume Snapshot
Shadow Copy Service Provider internal error. More details Provider and Backup Exec for
error: may be available in the Windows Windows Servers services. If this
Bad State Event Log. fails to solve the issue, the VERITAS
Volume Snapshot Provider may
need to be re-installed.
Microsoft Volume Backup Exec for Windows Servers Install or re-install the snapshot
Shadow Copy Service detected that the underlying provider. Reboot the computer.
error: Snapshot provider is either not
Snapshot Provider installed or is not working.
not registered.
Microsoft Volume The volume specified by the user is Check the Windows Event Log for
Shadow Copy Service not supported for snapshot. details on how to correct the
error: problem.
Volume not supported
for snapshot
Microsoft Volume Maximum number of volumes that Split the job so that fewer volumes
Shadow Copy Service can be supported by the Microsoft are involved per job.
error: Volume Shadow Copy Service has
Cannot add anymore been reached. The maximum
volumes since the number of volumes supported is 64.
maximum limit has
been exceeded.
Microsoft Volume Volume is currently locked by some Check for the process that has
Shadow Copy Service other process and cannot be locked the file. Either quiescence it
Error: snapped. or wait until it is done, and then
Volume is in use. re-submit the job.
Microsoft Volume Out of disk space during the Make sure that at least one volume
Shadow Copy Service snapshot. has enough space to save the
error: snapshot cache file.
Insufficient storage
Snapshot ran out of This should never been seen. Check the Windows Virtual Page
Open File
memory file size and available disk space.
Option
You may need to increase both.
Snapshot reports Snapshot open file option or the Check the Windows Event Log for
unable to mount provider could not mount the more details. Also check to
volume specified. determine if the volume can be
mounted manually.
Snapshot version Snapshot version number is not Ensure that the Snapshot version
error supported by Backup Exec for number is one supported by Backup
Windows Servers. Exec. Check the VERITAS website
for compatibility
(www.veritas.com).
Snapshot timed out Snapshot exceeded the time limit Check the Windows Event Log for
mounting volume allowed for mounting a volume. more details. Also determine if the
volume is locked by another
process. You can also verify that the
volume can be mounted manually.
Snapshot cannot Snapshot cannot meet the minimum Either increase the quite time using
meet minimum quiet quiet time specified by the user on the Advanced Open File Option
time the target machine. The default is wizard, or submit the job when
five (5) seconds. there is less activity on the volume.
Snapshot unable to The snapshot provider indicates Check that the disk is readable.
read real disk that the real disk could not be read. Make sure that the mount points are
valid and browsable.
Snapshot is not able Volume specified for snapshot is not Remove virtual volumes from your
to create a snapshot a physical volume. Advanced Open job and provide the physical volume
of a virtual snap File Option does not support virtual name instead.
volume volumes.
Snapshot not taken The evaluation period has expired You need to either extend the
because the for Backup Exec and the Advanced evaluation period or purchase the
evaluation period has Open File Option. Advanced Open File Option.
expired
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 971
Advanced Open File Option Error Messages
Microsoft Volume Out of disk space. There must be enough free disk
Shadow Copy Service space on one volume to create the
Snapshot Microsoft Volume Shadow Copy
CacheFileBroker was Service cache file.
unable to allocate
cache files
Snapshot job The specified backup job includes Use Microsoft’s Volume Shadow
specified has shadow copy components. These Copy Service for shadow copy
incompatible components cannot be snapped component backup. Volume
snapshot types. using either VERITAS Volume Shadow Copy Service is available
VERITAS Volume Snapshot Provider and Volume only on Windows XP and
Snapshot Provider Manager Windows.NET servers.
and Volume Manager
cannot be used for
shadow copy
backups.
The Advanced Open The AOFO option was upgraded Reboot the system to load the
File Option will not be from a previous version of Backup updated AOFO driver.
available until the Exec.
system is rebooted.
Static file has grown The static file has outgrown the On the AOFO Wizard Advanced
to maximum size and maximum size specified for the Open File Option Configuration
cannot be Advanced Open File Option. dialog, select the option Have
incremented Backup Exec calculate the initial
anymore. and maximum size of the static
volume. This allows Backup Exec to
automatically calculate the initial
and maximum size of the static
volume for each backup.
Or, using the AOFO Wizard,
increase the space in the Initial size
of the static volume (1-100 percent).
Volume name is A location for the static file was Enter a valid drive and path for the
invalid or not entered, but the drive does not exist static volume. For more
available. or is not a local or valid drive. information, see “Changing the
Advanced Open File Option Default
Settings” on page 962.
Data read error on You may have cross link clusters or Fix the disk errors using scan disk,
Open File
physical volume. other disk errors. and then restart the backup for that
Option
volume.
Driver failed to load. The Advanced Open File Option Reinstall the Advanced Open File
files may have been installed Option on the machine that failed.
incorrectly, or may have been
deleted after installation.
Driver version is A software component that is Reinstall the Advanced Open File
incompatible. incompatible with the Advanced Option on the machine that failed.
Open File Option has been loaded.
Error during backup. An error occurred within AOFO. Check job log for a more detailed
Set has been error.
terminated.
Error while writing to A disk error has occurred. Fix the disk errors using scan disk,
static volume. and then restart the backup for that
volume.
A Win32 error has The temporary drive mapping to Use the AOFO wizard to change the
occurred. the static volume does not exist. location of the static volume to a
path that exists on the drive.
File system is not This is not a file system supported This is not a file system supported
NTFS or FAT. by Advanced Open File Option. by Advanced Open File Option.
Evaluation period has The evaluation period has been Contact your reseller.
been exceeded. exceeded.
Appendix F, VERITAS Backup Exec for Windows Servers - Advanced Open File Option 973
Advanced Open File Option Error Messages
IO attach error has This is a network error. A server Check your server or check with
occurred. may not be available or responding. your network administrator.
Not available on The volume being backed up is a This is not currently supported.
specified volume. CD-ROM drive or floppy diskette.
Not enough disk The static volume has exceeded the Check the amount of free space
space for work amount of free space available. available; you may need to add
volume. more free space. Restart the backup
for that volume.
OFO: Volume Volume Manager 3.x can only Do not select basic volumes directly
specified is not snapshot dynamic volumes; it or indirectly (via mount points) for
snappable. Possible cannot snapshot basic volumes. backup with Volume Manager.
reasons: Volume has Jobs with mount points will also fail Instead, back up dynamic volumes
NOT been Snap with the same error message. by assigning drive letters to the
Started or is a volumes.
non-dynamic (basic)
volume.
Unable to get In order to create the static volume, The backup runs, but without using
minimum quiet time there can be no disk activity for six the Advanced Open File Option.
window for physical seconds. Each time the static volume Reduce the traffic on this volume, or
volume. grows, another six seconds of disk wait and run the backup when there
inactivity is required. is less disk activity on the volume.
SQL Agent
installations of SQL that are connected to a network. SQL database backups can be
integrated with network backups without separate administration or dedicated hardware.
Continue reading for information about using the SQL Agent with SQL 2000 installations,
or for information about using the SQL Agent with SQL 7.0 installations, see “About the
Agent for SQL 7.0” on page 1024.
In SQL 2000 installations, the SQL Agent provides support for:
◆ Backups of multiple instances.
◆ Database, transaction log, differential, and filegroup backups, as well as database
recovery and replacement.
◆ Database Consistency Checks (DBCC) for each backup and restore job, including a
fast database consistency check of only the physical consistency of the database.
◆ Restores of transaction logs to a specific point in time or to a named transaction when
log marks are used.
◆ Full, bulk-logged, and simple recovery models. The simple recovery model is similar
to setting the truncate log on checkpoint option in SQL 7.0. With the simple recovery
model, copies of the transactions are not stored in the log file, which prevents
transaction log backups from being run. Therefore, you can recover the database to
the point of the last backup, but you cannot restore the database to the point of failure
or to a specific point in time.
◆ Standby database. If the primary SQL server fails, or is shut down for maintenance,
another database called a standby database can be brought online. The standby
database contains a copy of the primary server's databases so that users can continue
to access the database even though the primary server is unavailable. When the
primary server is available again, the changes on the standby database must be
restored back to the primary server or the changes will be lost. The databases on the
primary server should then be backed up and restored on the standby database again.
975
Requirements for Using the SQL Agent with SQL 2000
Backup Exec provides a backup option that enables you to put the database in
standby mode when the log file backup completes, and a recovery completion state of
Leave database read-only and able to restore additional transaction logs to create
and maintain a standby database.
◆ An automated restore of the master database.
◆ The Intelligent Disaster Recovery option, which automates the disaster recovery
process of SQL 2000.
See also:
“Installing the SQL Agent” on page 977
SQL Agent
If you are using the SQL Agent to protect databases on the local media server only, you are
entitled to install the Remote Agent that was included with the SQL Agent installation to
one remote Windows server so that resource can be protected by Backup Exec.
However, if the SQL Agent is protecting a remote resource, the Remote Agent is necessary
in order to perform remote backup and restore operations, and you are not entitled to
install it on another Windows server.
For instructions on installing the SQL Agent on the local media server, see “Installing
Backup Exec Options on a Local Server” on page 49.
For instructions on installing the SQL Agent on a remote resource, see “Installing Backup
Exec Remote Agents and Options on Remote Servers” on page 54.
For instructions on moving the Remote Agent to another remote Windows computer, see
“Installing and Uninstalling the Remote Agent to Remote Windows Servers Using the
Command Line” on page 823.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 977
Using Backup Exec Logon Accounts for SQL 2000 Resources
If you are using SQL Server Authentication, then add a Backup Exec logon account that
stores the credentials of the SQL user account. In the backup selections list, apply the
Backup Exec logon account for the Windows user account to the Windows server that SQL
is installed on, and then apply the logon account for the SQL user account to the SQL
instance.
SQL Agent
SQL user account
credentials is applied to
the SQL instance
If you use a Backup Exec logon account that does not have the proper rights, you will
receive an error message stating that the username and password are invalid.
See also:
“Changing Logon Accounts for Resources” on page 266
“Configuring Logon Accounts” on page 347
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 979
Backup Strategies for SQL 2000
Protect the entire SQL To make sure SQL is completely protected, back up the following on a
Server. regular basis:
The system drive that SQL is on.
The Windows registry and System State.
SQL databases or filegroups. You do not need to back up both.
Transaction logs.
Back up both system Copies of the master and model databases are automatically created by
and user databases and Backup Exec whenever you back up the master and model databases. If
transaction logs these databases become corrupted or are missing, and SQL cannot be
regularly. started, you can replace them with the copies of the master and model
databases, and then start SQL. After SQL is running again, you can
restore the latest copy of the master database using Backup Exec’s
Automate master database restore option, and then restore any other
databases, if needed.
SQL Agent
If you purchased the Intelligent Disaster Recovery (IDR) option, then
during an IDR recovery of the C: drive, it will automatically replace the
damaged databases with the copies of the master and model databases
that you made.
When you upgrade, run If you upgrade SQL, run new full database backups. You may not be
new full database able to restore backups from one version or service pack level of SQL to
backups. other versions.
If you have filegroups, When databases grow too large to be backed up all at once, filegroups
back them up instead of can provide an alternative backup method. Different filegroups can be
databases. Do not back backed up at different times and frequencies. A combination of
up filegroups and filegroup and log backups provides complete database protection.
databases.
Run consistency We recommend that you run a consistency check after a backup. If a
checks after backups. database, transaction log, or filegroup contains errors when it is backed
up, the backup will still contain the errors when it is restored, if it is
restorable at all. These consistency checks include:
A full consistency check, including indexes. This check will have
significant impacts on SQL performance; therefore, it should be
performed in off-peak hours.
A full consistency check with no index check. While not as thorough
as a full consistency check that includes indexes, this check is faster
and can be done during peak hours with little impact on system
performance.
A physical only check. Another low-overhead check, this method
checks only the integrity of the physical structure of the page and
record headers, and the consistency between the pages' object ID
and index ID and the allocation structures.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 981
Consistency Checks for SQL 2000
Back up the master Back up the master database whenever procedures are run that change
database whenever data information in the database, especially after:
is changed in the New databases are created.
master database.
Files are added to an existing database.
Usernames or passwords are added or changed.
If changes are not backed up before the master database must be
restored, the changes are lost.
Run one backup at a Do not schedule more than one backup to occur simultaneously against
time. a database or its transaction log, or a filegroup.
SQL Agent
transaction log backups are not supported.
◆ It is recommended that SQL backup jobs be run separately from AOFO Volume
Shadow Copy Service and Volume Snapshot Provider backup jobs. If you select
Microsoft Volume Shadow Copy Service or VERITAS Volume Snapshot Provider, the
SQL databases may freeze for several minutes while the snapshot is initiated. All
activity on the SQL Server 2000 is stopped while the snapshot is being made. Volume
Shadow Copy Service and Volume Snapshot Provider backups also incur additional
overhead to the SQL backups.
VERITAS Volume Manager FlashSnap Option will freeze the SQL databases for only a
few seconds.
◆ SQL backups made with the AOFO are considerably bigger than regular SQL
backups.
◆ SQL filegroups can be backed up using AOFO but only one filegroup per database
can be backed up in a job.
◆ For the Intelligent Disaster Recovery Option to work with SQL 2000, copies are made
of the master and model databases. Copies are only made when non-AOFO backups
of master and model are run. If you are using AOFO for SQL backups, make at least
one backup of the master and model databases without using AOFO.
If SQL 2000 is upgraded, refresh the copies with another non-AOFO backup.
SQL backups made using the AOFO will fail if:
◆ Multiple databases are selected for backup and SQL Service Pack 2 is not installed. If
SQL Service Pack 2 is installed, you can select multiple databases at the same time for
backup.
◆ A differential or transaction log backup method is selected.
See also:
“VERITAS Backup Exec for Windows Servers - Advanced Open File Option” on
page 955
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 983
Setting Backup Options for SQL 2000
Item Description
Backup method: Full - Back up entire database or filegroup. Select this to back
up the entire database or filegroup. See “Backing Up SQL 2000
Databases” on page 988. This option is selected by default.
Log - Back up transaction log. Select this to back up only the
data contained in the transaction log; it does not back up
database data. After the transaction log is backed up,
SQL Agent
committed transactions are removed (truncated).
Select this option to be able to select No recover or Standby
under Enable SQL 2000 advanced log backup options.
See “Backing Up SQL 2000 Transaction Logs” on page 992.
Log No Truncate - Back up transaction log - no truncate. Select
this method only when the database is corrupted or database
files are missing. Since the Log No Truncate method does not
access the database, you can still back up transactions that you
may not be able to access otherwise when the database is in this
state. You can then use this transaction log backup along with
the database backup and any previous transaction log backups
to restore the database to the point at which it failed; however,
any uncommitted transactions are rolled back. The Log No
Truncate method does not remove committed transactions after
the log is backed up. See “Backing Up SQL 2000 Transaction
Logs” on page 992.
Differential - Back up database or filegroup changes only.
Select this to back up only the changes made to the database or
filegroup since the last full backup. Because differential
backups allow the restore of a system only to the point in time
that the differential backup was created, you should also create
multiple log backups between the differential backups.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 985
Setting Backup Options for SQL 2000
Item Description
Continue with backup if Select this to continue with the backup operation even if the
consistency check fails consistency check fails. You may want to continue with the backup
when the consistency check fails if you think that a backup of the
database in its current state is better than no backup at all, or if you
are backing up a very large database with only a small problem in a
table.
Item Description
Consistency check after Select a consistency check to run after a backup. Because database
backup transactions can occur during or after the consistency check, but
before the backup runs, consider running a consistency check after
the backup to ensure the data was consistent at the time of the
backup.
None. Select this if you do not want a consistency check to run
after a backup. It is strongly recommended that you always run
a consistency check either before or after the backup. This
option is selected by default.
SQL Agent
Full check, excluding indexes. Select this to exclude indexes
from the consistency check. If indexes are not checked, the
consistency check runs significantly faster but is not as
thorough. Only the data pages and clustered index pages for
each user table are included in the consistency check. The
consistency of the nonclustered index pages is not checked.
Full check, including indexes. Select this to include indexes in
the consistency check. Any errors are logged.
Physical check only (SQL 2000). Select this to perform a low
overhead check of the physical consistency of the SQL 2000
database. This option only checks the integrity of the physical
structure of the page and record headers, and the consistency
between the pages' object ID and index ID and the allocation
structures.
Enable SQL 2000 This option is available only when the selected backup method is
advanced log backup Log - Back up transaction log.
options Select this option to choose either the No Recover - Place database
in loading state option or the Standby - place database in standby
state option to apply to the backup.
No recover - Place Select this option to put the database in a loading state when the
database in loading log file backup completes. Users cannot connect to or query the
state database while it is in a loading state.
Standby - Place Select this option to put the database in standby mode when the
database in standby log file backup completes. Users can connect to and query the
state database when it is in standby mode, but cannot update it.
Convert a standby database to a live database by restoring the
latest transaction log and specifying the recovery completion state
Leave database operational. No additional transaction logs can
be restored.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 987
Setting Backup Options for SQL 2000
Item Description
Guide Me Click this to start a wizard that helps you select backup job
properties for SQL.
See also:
“Selecting Data to Back Up” on page 259
“Using Selection Lists” on page 267
“Consistency Checks for SQL 2000” on page 982
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts for SQL 2000 Resources” on page 978.
3. To select SQL data from local or remote selections, click the domain name icon or
icons that contain the SQL installations, and then click the actual Windows computer
icon that contains the SQL installation. If you are using a cluster server, make backup
SQL Agent
selections from the virtual server.
A list of shared network directories appears, along with an icon that represents the
SQL installation.
To select all databases in SQL, click the checkbox preceding the SQL icon, or you can
select specific databases by clicking the SQL icon, and then selecting individual
databases.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 989
Setting Backup Options for SQL 2000
4. To select the SQL backup job properties, on the Properties pane, under Settings, click
SQL.
5. After selecting job options, start the backup job or select other backup options from
the Properties pane.
See also:
“Backing Up Data” on page 233
“Backing Up SQL 2000 Transaction Logs” on page 992
“Setting Backup Options for SQL 2000” on page 984
3. Select the option Display filegroups when creating new backup jobs.
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts for SQL 2000 Resources” on page 978.
3. To select SQL data, click the domain name icon or icons that contain the SQL
installations, and then click the actual Windows computer icon that contains the SQL
installation. If you are using a cluster server, make backup selections from the virtual
SQL Agent
server.
Expand the SQL container and select specific filegroups.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 991
Setting Backup Options for SQL 2000
4. To select SQL backup job properties, on the Properties pane, under Settings, click
SQL.
5. After selecting job options, start the backup job or select other backup options from
the Properties pane.
See also:
“Backing Up Data” on page 233
“Setting Backup Options for SQL 2000” on page 984.
Caution Do not run a log backup using either method if the SQL 2000 database is using
the simple recovery model. With the simple recovery model, you can recover
data only up to the most recent full or differential backup. If you run a log
backup on a database using the simple recovery completion state, the backup
will fail.
To check the database properties, from the Enterprise Manager on the SQL Server,
right-click the database, click Properties, click the Options tab, and then view the
configuration settings.
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts for SQL 2000 Resources” on page 978.
SQL Agent
3. To select SQL data, click the domain name icon or icons that contain the SQL
installations, and then click the actual Windows computer icon that contains the SQL
installation. If you are using a cluster server, make backup selections from the virtual
server.
A list of shared network directories appears, along with an icon that represents the
SQL installation.
4. To select SQL backup job properties, on the Properties pane, under Settings, click
SQL.
5. After selecting job options, start the backup job or select other backup options from
the Properties pane.
See also:
“Setting Backup Options for SQL 2000” on page 984
“About Restoring SQL 2000 Databases and Filegroups” on page 999
“Restoring from SQL 2000 Transaction Logs Up to a Point in Time” on page 1002
“Restoring from SQL 2000 Transaction Logs Up to a Named Transaction” on
page 1003
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 993
Restore Options for SQL 2000
Item Description
Leave database Select this option when restoring the last database, differential, or
operational. No log backup in the restore sequence in order to have the restore
additional transaction operation roll back all uncompleted transactions. After the
logs can be restored. recovery operation, the database is ready for use. If Leave
SQL Agent
(With Recovery) database operational is not performed, the database is left in an
intermediate state and is not usable.
If Leave database operational is selected when an intermediate
backup is being applied, you cannot continue to restore backups.
You must restart the restore operation from the beginning.
Leave database Select this option during a restore if you have additional
nonoperational but able differential or transaction log backups to be restored in another
to restore additional restore job.
transaction logs
(No Recovery)
Leave database Select this option during transaction log and database restore to
read-only and able to create and maintain a standby database. See your SQL
restore additional documentation for information on standby databases.
transaction logs
(Standby)
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 995
Restore Options for SQL 2000
Item Description
Automate master Select this checkbox to enable Backup Exec to stop SQL so that the
database restore master database can be restored. All existing users are logged off,
and SQL Server is put into single-user mode.
When this option is selected, only the master database can be
restored; if this option is selected for any other database, those jobs
will fail.
If Backup Exec does not have access to the SQL registry keys,
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL
Server, and
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer,
then a restore to the default directory may not work, and the option
Automate master database restore on the restore job properties for
SQL will not work. To ensure that Backup Exec has access rights,
verify that the logon account used has administrator rights to the
Windows server that the SQL instance is installed on.
Consistency check after None. Select this if you are doing sequential restores. Do not
restore run a consistency check after a restore until all sequential
restores have been done. If a consistency check is selected
during a restore, the restore will complete but the consistency
check will not be done. Check the job log for this information.
Item Description
Default drive for Use this option to select a default drive to which SQL database files
restoring database files: can be restored if the drive where one or more of the database files
previously resided no longer exists.
When a SQL database is backed up, the physical file names (which
include the directory path) of the files that make up the database
are stored in the backup set by SQL. For example, for the logical file
pubs, the physical file name is stored as
E:\MSSQL7\DATA\pubs.mdf. If the database must later be
restored, SQL uses these same physical file names to target the
SQL Agent
restore to. During a restore, Backup Exec automatically creates any
necessary subdirectories that do not exist.
However, if the drive where one or more of the database files
previously resided no longer exists, Backup Exec moves those files
to their original directory path, but on the default drive specified.
Using the same example, if the default drive C: is specified, then
the file with the original directory path of
E:\MSSQL7\DATA\pubs.mdf is restored to
C:\MSSQL7\DATA\pubs.mdf.
If no default drive is specified in this situation, the job will fail.
Restore all database Select this checkbox to restore all database files to their original
files to default drive directory path on the default drive, even if the drive where they
originally resided exists. To make this option available, select a
drive letter in Default drive for restoring database files.
Note Do not select this option when restoring filegroups.
Filegroups must be restored to the same drive letter and path
that they were backed up from.
Restore all database Select this checkbox to restore files to the default data and log
files to the target directories of the destination instance. For example, if you are
instance’s data location restoring a database to a different instance of SQL, you would
select this option to move the database files to the correct location
for the new instance.
If this option is not selected, then the files are restored to the
directory that the master database is in.
Note Do not select this option when restoring filegroups.
Filegroups must be restored to the same drive letter and path
that they were backed up from.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 997
Restore Options for SQL 2000
Item Description
Point in time log restore Select this checkbox to restore transactions from a transaction log
up to and including a point in time in the transaction log. After the
point in time, recovery from the transaction log is stopped.
In the Date box, select the part of the date you want to change, and
then enter a new date or click the arrow to display a calendar from
which you can select a date.
In the Time box, select the part of the time you want to change, and
then enter a new time or click the arrows to select a new time.
Restore log up to Select this checkbox to restore transactions from a transaction log
named transaction (SQL up to a named transaction (or named mark) in the transaction log;
2000) after that, recovery from the transaction log is stopped. The named
transactions are case-sensitive.
Check your client application event log to find dates and times of
named transactions.
Include the named Select this checkbox to include the named transaction in the restore;
transaction otherwise the restore will stop immediately before the named
transaction is restored.
Found after Select this checkbox to specify a date and time after which the
restore operation is to search for the named transaction. For
example, if you specify a restore from a log up to the named
transaction AfternoonBreak, found after 6/02/2000, 12:01 p.m., then
the restore operation will not search for AfternoonBreak until after
that time.
Guide Me Click this to start a wizard that helps you select restore job
properties for SQL.
See also:
“About Restoring SQL 2000 Databases and Filegroups” on page 999.
“Restoring from SQL 2000 Transaction Logs Up to a Point in Time” on page 1002
“Restoring from SQL 2000 Transaction Logs Up to a Named Transaction” on
page 1003
“Restoring from SQL 2000 Filegroup Backups” on page 1004
SQL Agent
◆ Restoring a database or a primary filegroup from a filegroup backup. Separate restore
jobs must be used to restore the primary filegroup, to restore the rest of the filegroup
backup sets, and to restore the transaction logs.
◆ Restoring a nonprimary filegroup. After running a Log No Truncate backup, separate
restore jobs must be used to restore the missing filegroup from full and differential
backups of the filegroups, and to restore the transaction logs.
If you use multiple jobs to restore a database, make sure that you specify the recovery
completion state Leave database nonoperational but able to restore additional
transaction logs for all the jobs except the last one, for which you should specify the
recovery completion state Leave database operational.
SQL database files contain unused space so that the disk file does not have be grown
every time a small amount of data is added to the database. SQL fills the unused space
with zeros. When SQL databases are restored, it is not known how much of the file will
actually be used by the restored data, so SQL creates the required database files on disk
and then fills them with zeros.
With very large databases this process can take several hours to complete. During this
time Backup Exec reports that no data is being transferred, and the Byte count field in the
Job Monitor view is not updated. When SQL has completed filling the files with zeros, the
restore job continues. This occurs for all database restores but is noticeable only on very
large databases.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 999
About Restoring SQL 2000 Databases and Filegroups
For steps on how to create the restore job, and for descriptions of all the options for
restoring SQL data, see “Redirecting Restores for SQL 2000” on page 1009.
Note SQL 7.0 database backups can be restored to SQL 2000, but SQL 2000 backups
cannot be restored to SQL 7.0.
See also:
“Restoring Data” on page 395
“Restoring from SQL 2000 Transaction Logs Up to a Point in Time” on page 1002
“Restoring from SQL 2000 Transaction Logs Up to a Named Transaction” on
page 1003
“Restoring from SQL 2000 Filegroup Backups” on page 1004
“Redirecting Restores for SQL 2000” on page 1009
SQL Agent
2. On the Properties pane, under Source, click Selections.
3. In the restore selections list, select the most recent full database backup set, and the
most recent differential database backup set, if any, to restore.
5. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational. No additional transaction logs can be restored.
For information on other SQL restore options, see “Restore Options for SQL 2000” on
page 994.
6. Start the restore job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
“About Restoring SQL 2000 Databases and Filegroups” on page 999
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1001
About Restoring SQL 2000 Databases and Filegroups
3. In the restore selections list, select the most recent full database backup set, and the
most recent differential database backup set, if any, and all the log backup sets you
want to restore.
5. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational. No additional transaction logs can be restored.
6. Select Point in time log restore, and then select a date and time.
For information on selecting other options, see “Restore Options for SQL 2000” on
page 994.
7. Start the restore job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
“About Restoring SQL 2000 Databases and Filegroups” on page 999
SQL Agent
your client application event log.
If the named transaction is not found, then the restore operation succeeds, but a warning
is generated and the database remains in an intermediate state.
The names of transactions are case-sensitive. Make sure you enter the correct upper- and
lower-case characters when specifying a named transaction.
3. In the restore selections list, select the most recent full database backup set, and the
most recent differential database backup set, if any, and all the log backup sets you
want to restore.
5. On Restore Job Properties for SQL, select the recovery completion state Leave
database operational. No additional transaction logs can be restored.
6. Select Restore log up to named transaction, and then enter the name of the
transaction.
The names are case-sensitive. Make sure you enter the correct upper- and lower-case
characters.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1003
About Restoring SQL 2000 Databases and Filegroups
7. To include the named transaction in the restore, select Include the named transaction.
8. To specify a particular named transaction in the log, select Found after and then select
a date and time.
If a date and time are not entered, recovery from the transaction log is stopped at the
first transaction with the specified name.
For information on other SQL restore options, see “Redirecting Restores for SQL
2000” on page 1009.
9. Start the restore job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
“About Restoring SQL 2000 Databases and Filegroups” on page 999
Note If the primary filegroup is missing, the log backup methods are unavailable. You
can restore the database only up to the last log backup.
◆ Filegroup restores can be redirected to a different server, but the database file paths
cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA
then the filegroup must be restored to G:\SQLDATA, regardless of the server the
restore is redirected to.
The options Restore all databases to default drive and Restore all database files to
the target instance’s data location on the Restore Job Properties for SQL dialog box do
not apply to filegroup restores. Filegroups must be restored to the same drive letter
and path that they were backed up from.
◆ When restoring from filegroup backups, separate restore jobs are required.
◆ Previous versions of Backup Exec cannot restore filegroup backups made with
Backup Exec v9.0.
SQL Agent
Note Use separate restore jobs to restore the primary filegroup, the rest of the filegroup
backup sets, and the transaction logs.
3. In the restore selections list, select the backup set containing the primary filegroup.
5. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database nonoperational but able to restore additional transaction logs. For
information on other SQL restore options, see “Redirecting Restores for SQL 2000” on
page 1009.
7. After the primary filegroup is restored, select the rest of the filegroup backup sets
containing the latest full and differential backups.
8. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database nonoperational but able to restore additional transaction logs, and
then start the restore job.
9. When the full and differential backups are restored, select the backup set containing
the transaction logs.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1005
About Restoring SQL 2000 Databases and Filegroups
10. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational and restore all of the transaction logs, or select Point in
time log restore or Restore log up to named transaction.
11. Start the restore job or select other restore options from the Properties pane. For
information on other restore options, see “Restoring Data” on page 395.
5. Select the backup method Log No Truncate, select None for a consistency check, and
then start the backup job.
6. After the Log No Truncate backup is complete, restore the missing or corrupted
filegroup by selecting the filegroup backup sets containing the latest full and
differential backups, and the transaction log backups.
7. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational. No additional transaction logs can be restored.
8. Start the restore job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
SQL Agent
running the Rebuild Master utility or reinstalling SQL to be able to restart SQL, you can
replace the corrupted or missing databases with the copies of the master and model
databases that Backup Exec automatically creates and updates whenever backups of those
databases are run. After SQL is running again, you can restore the latest copy of the
master database using Backup Exec’s Automate master database restore option, and then
restore any other databases, if needed.
If copies of the master and model databases were not made, then you must use Microsoft’s
rebuildm.exe utility to rebuild the master database and start SQL.
Because all changes made to the master database after the last backup was created are lost
when the backup is restored, the changes must be reapplied. If any user databases were
created after the master database was backed up, those databases cannot be accessed until
the databases are restored from backups or reattached to SQL.
2. Open a command prompt window, and delete the original master and model
databases and their transaction logs.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1007
About Restoring SQL 2000 Databases and Filegroups
For example:
C:\Program Files\Microsoft SQL Server\MSSQL\Data> del
master.mdf mastlog.ldf model.mdf modellog.ldf
5. Continue with the next procedure to restore the latest changes to the master database.
3. On the restore selections list, select the backup set containing the last master database
backup.
5. On the Restore Job Properties for SQL dialog box, select Automate master database
restore.
All existing users are logged off, and SQL Server is put into single-user mode.
When this option is selected, only the master database can be restored; if this option is
selected for any other database, those jobs will fail.
If Backup Exec does not have access to the SQL registry keys
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the
default directory may not work, and the option Automate master database restore on
the restore job properties for SQL will not work. To ensure that Backup Exec has
access rights, verify that the account that Backup Exec uses has administrator rights to
the computer that is running SQL.
SQL Agent
Redirecting Restores for SQL 2000
You can redirect the following:
◆ A database backup to a different server, database, or instance.
◆ Differential and log backups to wherever the associated database is restored.
◆ One or more filegroups in a backup to a different server or instance. Filegroups can be
redirected to a different server, but the database file paths cannot be changed. For
example, if the filegroup was backed up from G:\SQLDATA, then it must be restored
to G:\SQLDATA, even if it is redirected to another server. Filegroups must be restored
to the same drive letter and path that they were backed up from.
Single-job restores and multiple-job restores can both be used in redirected restore
operations.
▼ To redirect a restore:
2. After selecting options on the Restore Job Properties dialog box, on the Properties
pane, under Destination, click SQL Redirection.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1009
About Restoring SQL 2000 Databases and Filegroups
3. Select the appropriate options as follows, and then start the redirected restore job or
select other restore options from the Properties pane:
Item Description
Redirect Microsoft SQL Select this checkbox to enable redirection of SQL backup sets.
Server sets
Restore to server To redirect this restore to a different server, type the target server
name.
You can redirect a full database backup to a different server or
database; however, if the drive configuration is different from
when the database backup was created, you must select either
Default drive for restoring database files or Restore all database
files to the target instance’s data location on the Restore Job
Properties for SQL dialog box (see Restore Options for SQL 2000
on page 994).
Item Description
Server logon account To restore to a server, use a Backup Exec logon account that stores
the credentials of a Windows user account. The Windows user
account must have been granted the System Administrator role
on the SQL instance. The default logon account is displayed. To
use another logon account, click Change. For more information
about logon accounts, see “Using Backup Exec Logon Accounts
for SQL 2000 Resources” on page 978.
SQL logon account If you are using SQL Server Authentication, use a Backup Exec
SQL Agent
logon account that stores the credentials of the SQL user account.
Apply the Backup Exec logon account for the Windows user
account to the Windows server that SQL is installed on, and then
apply the logon account for the SQL user account to the SQL
instance.
To use another logon account, click Change. To remove the SQL
logon account displayed in this field, click Clear. For more
information about logon accounts, see “Using Backup Exec Logon
Accounts for SQL 2000 Resources” on page 978.
Restore to named To redirect this restore to a named instance, type the instance
instance (SQL 2000) name. If you are restoring to the default instance, leave the field
empty.
Restore to database To redirect the restore to a different database on the target server,
type the target database name; otherwise, leave the field blank.
You can redirect a full database backup to a different server
and/or database; however, if the drive configuration is different
from when the database backup was created, you must select
either Default drive for restoring database files or select Restore
all database files to the target instance’s data location on the
Restore Job Properties for SQL dialog box (see “Redirecting
Restores for SQL 2000” on page 1009).
If you are restoring a differential or log backup, and the
associated database backup was restored to a different server,
enter the new database name.
See also:
“Restoring Data” on page 395
“About Restoring SQL 2000 Databases and Filegroups” on page 999
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1011
Setting Default Backup and Restore Options for SQL 2000
Item Description
Backup
Backup method Full - Back up entire database or filegroup. Select this to back
up the entire database or filegroup. See “Backing Up SQL
2000 Databases” on page 988. This option is selected by
default.
SQL Agent
Log - Back up transaction log. Select this to back up only the
data contained in the transaction log; it does not back up
database data. After the transaction log is backed up,
committed transactions are removed (truncated). See
“Backing Up SQL 2000 Transaction Logs” on page 992.
Log No Truncate - Back up transaction log - no truncate.
Select this method only when the database is corrupted or
database files are missing. Since the Log No Truncate method
does not access the database, you can still back up
transactions that you may not be able to access when the
database is in this state. You can then use this transaction log
backup along with the database backup and any previous
transaction log backups to restore the database to the point at
which it failed; however, any uncommitted transactions are
rolled back.
The Log No Truncate method does not remove committed
transactions after the log is backed up. See “Backing Up SQL
2000 Transaction Logs” on page 992.
Differential - Back up database or filegroup changes only.
Select this to back up only the changes made to the database
or filegroup since the last full backup. Because differential
backups allow the restore of a system only to the point that
the differential backup was created, you should also create
multiple log backups between the differential backups. See
“Backing Up SQL 2000 Databases” on page 988.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1013
Setting Default Backup and Restore Options for SQL 2000
Item Description
Continue with backup if Select this to continue with the backup operation even if the
consistency check fails consistency check fails. You may want to continue with the
backup when the consistency check fails if you think that a
backup of the database in its current state is better than no backup
at all, or if you are backing up a very large database with only a
small problem in a table.
Item Description
Consistency check after Select a consistency check to run after a backup. Because database
backup transactions can occur during or after the consistency check, but
before the backup runs, consider running a consistency check
after the backup to ensure the data was consistent at the time of
the backup.
None. Select this if you do not want a consistency check to run
after a backup. It is strongly recommended that you always
run a consistency check either before or after the backup. This
option is selected by default.
SQL Agent
Full check, excluding indexes. Select this to exclude indexes
from the consistency check. If indexes are not checked, the
consistency check runs significantly faster but is not as
thorough. Only the data pages and clustered index pages for
each user table are included in the consistency check. The
consistency of the nonclustered index pages is not checked.
Full check, including indexes. Select this to include indexes
in the consistency check. Any errors are logged.
Physical check only (SQL 2000 only). Select this to perform a
low overhead check of the physical consistency of the SQL
2000 database. This option only checks the integrity of the
physical structure of the page and record headers, and the
consistency between the pages' object ID and index ID and the
allocation structures.
Display filegroups when Select this checkbox if filegroups exist that you want to select for
creating new backup jobs backup. If this checkbox is not selected, filegroups are not
displayed as backup selections.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1015
Setting Default Backup and Restore Options for SQL 2000
Item Description
Restore
Item Description
Consistency check after None. Select this if you are doing sequential restores. Do not
restore run a consistency check after a restore until all sequential
restores have been done. If a consistency check is selected
during a restore, the restore will complete but the consistency
check will not be done. Check the job log for this information.
If you need to recover the database after restores are complete,
select one of the following consistency checks when you select
the Leave database operational option.
Full check, excluding indexes. Select this to exclude indexes
SQL Agent
from the consistency check. If indexes are not checked, the
consistency check runs significantly faster but is not as
thorough. Only the data pages and clustered index pages for
each user table are included in the consistency check. The
consistency of the nonclustered index pages is not checked.
Full check, including indexes. Select this to include indexes
in the consistency check. Any errors are logged. This option is
selected by default.
Physical check only (SQL 2000 only). Select this to perform a
low overhead check of the physical consistency of the SQL
2000 database. This option only checks the integrity of the
physical structure of the page and record headers, and the
consistency between the pages' object ID and index ID and the
allocation structures.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1017
Preparing for Disaster Recovery of SQL 2000
Caution For the Intelligent Disaster Recovery Option to work with SQL 2000, copies are
made of the master and model databases. Copies are only made when
non-AOFO backups of master and model are run. If you are using AOFO for
SQL backups, make at least one backup of the master and model databases
without using AOFO.
If SQL 2000 is upgraded, refresh the copies with another non-AOFO backup.
SQL Agent
◆ The latest backup of the SQL directory (\Program Files\Microsoft SQL
Server\MSSQL), and the Windows registry/System State.
◆ The SQL database or filegroup backups, and differential and log backups.
◆ An Administrator logon account (or an Administrator equivalent) during the
recovery.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1019
Disaster Recovery of SQL 2000
SQL Agent
1. Verify that the database copies are present.
The database copies are named master$4idr, mastlog$4idr, model$4idr, and
modellog$4idr.
In a default installation of SQL 2000, the databases are in:
C:\Program Files\Microsoft SQL Server\MSSQL\Data\*.*.
In a named instance of SQL 2000, the databases are in:
C:\Program Files\Microsoft SQL
Server\MSSQL$Instance_Name\Data\*.*
If necessary, restore the master and model database copies from a backup set to the
same directory that the original master and model databases are in.
2. Open a command prompt window, and delete the original master and model
databases and their transaction logs.
Type the following:
C:\program files\microsoft sql server\mssql\data> del
master.mdf mastlog.ldf model.mdf modellog.ldf
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1021
Disaster Recovery of SQL 2000
5. Continue with the next procedure to restore the latest changes to the master database.
3. On the restore selections list, select the backup set containing the last master database
backup.
5. On the Restore Job Properties for SQL dialog box, select Automate master database
restore.
All existing users are logged off, and SQL Server is put into single-user mode.
When this option is selected, only the master database can be restored; if this option is
selected for any other database, those jobs will fail.
If Backup Exec does not have access to the SQL registry keys
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the
default directory may not work, and the option Automate master database restore on
the restore job properties for SQL will not work. To ensure that Backup Exec has
access rights, verify that the account that Backup Exec uses has administrator rights to
the computer that is running SQL.
8. Continue with the next procedure, restoring the remaining SQL databases.
Note Do not select the master database for restore at this time.
If you are restoring the SQL databases from filegroup backups, go to “Restoring
from SQL 2000 Filegroup Backups” on page 1004.
3. Select all the backup sets that you want to apply, including the full backup, any
SQL Agent
differential backups, and any log backups.
5. Select the option Leave database operational. No additional transaction logs can be
restored.
7. In the Consistency Check After Database Restore field, select Full check, including
indexes.
8. Start the restore job or select other options from the Properties pane. If the restore is
being redirected, see “Redirecting Restores for SQL 2000” on page 1009.
When all of the restore operations have completed successfully, then the recovery of
the SQL databases is complete.
After the recovery has been completed, it is strongly recommended that a full
database backup be performed as soon as possible.
See also:
“Restoring Data” on page 395
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1023
About the Agent for SQL 7.0
SQL Agent
To ensure that Backup Exec has access rights, verify that the Backup Exec logon
account used has administrator rights to the Windows server that the SQL instance is
installed on.
◆ The media server must have access to the SQL installation.
◆ The credentials stored in the Backup Exec logon account used for backing up and
restoring SQL must have been granted the System Administrator role on the SQL
instance.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1025
Installing the SQL Agent
SQL Agent
The Backup Exec
logon account containing
the Windows credentials
is applied to the Windows
server that SQL is
installed on
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1027
Using Backup Exec Logon Accounts for SQL 7.0 Resources
If you are using SQL Server Authentication, then add a Backup Exec logon account that
stores the credentials of the SQL user account. In the backup selections list, apply the
Backup Exec logon account for the Windows user account to the Windows server that SQL
is installed on, and then apply the Backup Exec logon account for the SQL user account to
the SQL instance.
If you use a Backup Exec logon account that does not have the proper rights, you will
receive an error message stating that the username and password are invalid.
See also:
“Changing Logon Accounts for Resources” on page 266
“Configuring Logon Accounts” on page 347
SQL Agent
◆ In mid-sized environments, consider running a weekly full database backup and
daily transaction log backups along with daily differential backups except on the day
when the full backup is run.
◆ In large environments, consider running daily differential database backups, weekly
full database backups, and transaction log backups as necessary. Many shops run full
backups on a weekly basis, preferring to run differential backups throughout the
week to keep backup run time to a minimum. Extremely large environments may
need to run filegroup backups in order to split the full backup over several days. Log
backups are required to be able to recover a system from a filegroup backup.
The trade-off with running fewer full backups and running more differential backups
occurs at recovery time when you must recover using the full database backup as well as
the last differential database backup and all log backups made after the last differential
database backup.
What will work best for you will be based on the size of your environment, the number of
transactions processed each day, and the expectations of your users when a recovery is
required.
When developing a SQL backup strategy, consider the following:
Protect the entire SQL To make sure SQL is completely protected, back up the following on a
Server. regular basis:
The system drive that SQL is on.
The Windows registry and System State.
SQL databases or filegroups. You do not need to back up both.
Transaction logs.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1029
Backup Strategies for SQL 7.0
Create a copy of the Make copies of the master and model databases and place the copies in
master and model the same directory that the master and model databases are in. Then, if
databases, and place the master database becomes critically damaged and SQL cannot be
the copies in the same started, instead of running the Rebuild Master utility or reinstalling
directory that the SQL, you can replace the corrupted or missing databases with the
databases are in. copies of the master and model databases, and then start SQL. After
SQL is running again, you can restore the latest copy of the master
database using Backup Exec’s Automate master database restore
option, and then restore any other databases, if needed.
If you purchased the Intelligent Disaster Recovery (IDR) option, then
during an IDR recovery of the C: drive, it will automatically replace the
damaged databases with the copies of the master and model databases
that you made.
For details, see “To create copies of the master and model databases:”
on page 1062.
When you upgrade, run If you upgrade SQL, run new full database backups. You may not be
new full database able to restore backups from one version or service pack level of SQL to
backups. other versions.
If you have filegroups, When databases grow too large to be backed up all at once, filegroups
run at least one full can provide an alternative backup method. Different filegroups can be
database backup first, backed up at different times and frequencies.
then back up the However, SQL 7.0 databases cannot be restored using only filegroup
filegroups instead of and log backups. SQL 7.0 databases must have at least one full database
databases. Do not back backup in order to be restored. If the database has been deleted or does
up filegroups and not exist, restore the full database backup, and then restore all the
databases. filegroup and log backups.
Run consistency We recommend that you run a consistency check after a backup. If a
checks after backups. database, transaction log, or filegroup contains errors when it is backed
up, the backup will still contain the errors when it is restored, if it is
restorable at all. These consistency checks include:
A full consistency check, including indexes. This check will have
significant impacts on SQL performance; therefore, it should be
performed in off-peak hours.
A full consistency check with no index check. While not as
thorough, this check is faster and can be done during peak hours
with little impact on system performance.
Back up the master Back up the master database whenever procedures are run that change
database whenever data information in the database, especially after:
is changed in the New databases are created.
master database.
Files are added to an existing database.
Usernames or passwords are added or changed.
If changes are not backed up before the master database must be
restored, the changes are lost.
SQL Agent
Run one backup at a Do not schedule more than one backup to occur simultaneously against
time. a database or its transaction log, or a filegroup.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1031
Setting Backup Options for SQL 7.0
Item Description
Backup Method Full - Back up entire database or filegroup. Select this to back
up the entire database or filegroup. See “Backing Up SQL 7.0
Databases” on page 1035. This option is selected by default.
Log - Back up transaction log. Select this to back up only the
data contained in the transaction log; it does not back up
database data. After the transaction log is backed up,
SQL Agent
committed transactions are removed (truncated). See “Backing
Up SQL 7.0 Transaction Logs” on page 1039.
Log No Truncate - Back up transaction log - no truncate. Select
this method only when the database is corrupted or database
files are missing. Since the Log No Truncate method does not
access the database, you can still back up transactions that you
may not be able to access otherwise when the database is in this
state. You can then use this transaction log backup along with
the database backup and any previous transaction log backups
to restore the database to the point at which it failed; however,
any uncommitted transactions are rolled back. The Log No
Truncate method does not remove committed transactions after
the log is backed up. See “Backing Up SQL 7.0 Transaction
Logs” on page 1039.
Differential - Back up database or filegroup changes only.
Select this to back up only the changes made to the database or
filegroup since the last full backup. Because differential
backups allow the restore of a system only to the point in time
that the differential backup was created, you should also create
multiple log backups between the differential backups.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1033
Setting Backup Options for SQL 7.0
Item Description
Continue with backup if Select this checkbox to continue with the backup operation even if
consistency check fails the consistency check fails. You may want to continue with the
backup when the consistency check fails if you think that a backup
of the database in its current state is better than no backup at all, or
if you are backing up a very large database with only a small
problem in a table.
Consistency check after Select a consistency check to run after a backup. Because database
backup transactions can occur during or after the consistency check, but
before the backup runs, consider running a consistency check after
the backup to ensure the data was consistent at the time of the
backup.
None. Select this if you do not want a consistency check to run
after a backup. It is strongly recommended that you always run
a consistency check either before or after the backup. This
option is selected by default.
Full check, excluding indexes. Select this to exclude indexes
from the consistency check. If indexes are not checked, the
consistency check runs significantly faster but is not as
thorough. Only the data pages and clustered index pages for
each user table are included in the consistency check. The
consistency of the nonclustered index pages is not checked.
Full check, including indexes. Select this to include indexes in
the consistency check. Any errors are logged.
Guide Me Click this to start a wizard that helps you select backup job
properties for SQL.
See also:
“Backing Up SQL 7.0 Databases” on page 1035
“Backing Up SQL 7.0 Filegroups” on page 1037
“Backing Up SQL 7.0 Transaction Logs” on page 1039
SQL Agent
Consider using differential backups when only a relatively small amount of data changes
between full database backups, or if the same data changes often. Differential backups
may also work well in your environment if you need backups more often, but cannot
spare the time to do frequent full database backups.
If you want to run database backups only, instead of a mix of database and log backups,
use SQL Enterprise Manager to enable the database option truncate log on checkpoint for
each database you are backing up. Enabling this option causes the transaction log to be
automatically truncated whenever a checkpoint occurs in the database. This helps prevent
transaction logs from becoming full since the logs are not cleared after a database backup.
If you do not run transaction log backups, you can recover the database to the point of the
last backup, but you cannot restore the database to the point of failure or to a specific
point in time.
The master database can only be backed up with the full method; you cannot use the log
or differential methods to back up the master database.
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1027.
3. To select SQL data from local or remote selections, click the domain name icon or
icons that contain the SQL installations, and then click the actual Windows computer
icon that contains the SQL installation. If you are using a cluster server, make backup
selections from the virtual server.
A list of shared network directories appears, along with an icon that represents the
SQL installation.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1035
Setting Backup Options for SQL 7.0
To select all databases in SQL, click the checkbox preceding the SQL icon, or you can
select specific databases by clicking the SQL icon, and then selecting individual
databases.
4. To select the SQL backup job properties, on the Properties pane, under Settings, click
SQL.
5. Select options for the backup job. For details on these options, see “Setting Backup
Options for SQL 7.0” on page 1032.
6. Start the backup job. For details on running or scheduling the job, as well as other
backup options, see “Backing Up Data” on page 233.
SQL Agent
backups. Consider using differential backups when only a relatively small amount of data
changes between full filegroup backups, or if the same data changes often.
Because differential backups allow the restore of a system only to the point that the
differential backup was created, you should also create multiple log backups between the
differential backups. Using transaction log backups allows you to recover the filegroup to
the exact point of failure.
Caution SQL 7.0 databases cannot be restored using only filegroups and log backups.
SQL 7.0 databases must have at least one full database backup in order to be
restored. If the database has been deleted or does not exist, restore the full
database backup, and then restore all the filegroup and log backups.
Before filegroups are displayed on the backup selections pane, you must enable an option
on the SQL applications default dialog box.
1. On the Backup Exec menu bar, click Tools, and then click Options.
2. On the Properties pane, under Job Defaults, click SQL to display the SQL application
defaults dialog box.
3. Select the option Display filegroups when creating new backup jobs.
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1037
Setting Backup Options for SQL 7.0
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1027.
3. To select SQL data, click the domain name icon or icons that contain the SQL
installations, and then click the actual Windows computer icon that contains the SQL
installation. If you are using a cluster server, make backup selections from the virtual
server.
Expand the SQL container and select specific filegroups.
4. To select SQL backup job properties, on the Properties pane, under Settings, click
SQL.
5. After selecting job options, start the backup job or select other backup options from
the Properties pane.
See also:
“Backing Up Data” on page 233
“Setting Backup Options for SQL 7.0” on page 1032
SQL Agent
Use the Log No Truncate method only when the database is corrupted or database files
are missing. This method backs up transactions that you may not be able to access
otherwise when the database is in this state. You can then use this transaction log backup
along with the database backup and any previous transaction log backups to restore the
database to the point at which it failed; however, any uncommitted transactions are rolled
back. The Log No Truncate method does not remove committed transactions after the log
is backed up.
To use the Log No Truncate backup to restore a database, you should also have a database
backup that was created before the Log No Truncate backup. The transaction log contains
only the log files used in the restore process, which alone are not sufficient to restore a
complete database. You must have at least one database backup or a full set of filegroup
backups to be able to restore a database.
Do not run a log backup using either method if:
◆ The SQL database option truncate log on checkpoint is enabled. When this option is
enabled, every time a checkpoint occurs in the database, the transaction log is
truncated without the truncated part of the transaction log being backed up, which
prevents more transaction log backups from being created. You should run a database
or differential backup instead.
◆ The SQL database option select into/bulkcopy is enabled, and nonlogged operations
have occurred in the database since the last database backup was created. Nonlogged
operations break the sequence of transaction log backups. The restore of a database
using database and transaction log backups is successful only if there is an unbroken
sequence of transaction log backups after the last database or differential backup. If
these conditions are present, you should run a database or differential backup and
then start running log backups again in order to save any changes necessary to restore
the database.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1039
Setting Backup Options for SQL 7.0
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts for SQL 7.0 Resources” on page 1027.
3. To select SQL data, click the domain name icon or icons that contain the SQL
installations, and then click the actual Windows computer icon that contains the SQL
installation. If you are using a cluster server, make backup selections from the virtual
server.
A list of shared network directories appears, along with an icon that represents the
SQL installation.
4. To select SQL backup job properties, on the Properties pane, under Settings, click
SQL.
5. After selecting job options, start the backup job or select other backup options from
the Properties pane.
6. Start the backup job. For details on other backup options, see
See also:
“Setting Backup Options for SQL 7.0” on page 1032
“Restoring from SQL 7.0 Transaction Logs Up to a Point in Time” on page 1048
SQL Agent
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1041
Restore Options for SQL 7.0
Item Description
Leave database Select this option when restoring the last database, differential, or
operational. No log backup in the restore sequence in order to have the restore
additional transaction operation roll back all uncompleted transactions. After the
logs can be restored recovery operation, the database is ready for use. If Leave
(With Recovery) database operational is not performed, the database is left in an
intermediate state and is not usable.
If Leave database operational is selected when an intermediate
backup is being applied, you cannot continue to restore backups.
You must restart the restore operation from the beginning.
This option is selected by default.
Leave database Select this option during a restore if you have additional
nonoperational but able differential or transaction log backups to be restored in another
to restore additional restore job.
transaction logs
(No Recovery)
Leave database Select this option during transaction log and database restore to
read-only and able to create and maintain a standby database. See your SQL
restore additional documentation for information on standby databases.
transaction logs
(Standby)
Item Description
Automate master Select this checkbox to enable Backup Exec to stop SQL so that the
database restore master database can be restored. All existing users are logged off,
and SQL Server is put into single-user mode.
When this option is selected, only the master database can be
restored; if this option is selected for any other data, those jobs will
fail.
If Backup Exec does not have access to the SQL registry keys,
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL
SQL Agent
Server, and
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer,
then a restore to the default directory may not work, and the option
Automate master database restore on the restore job properties for
SQL will not work. To ensure that Backup Exec has access rights,
verify that the logon account used has administrator rights to the
Windows server that the SQL instance is installed on.
Consistency check after None. Select this if you are doing sequential restores. Do not
restore run a consistency check after a restore until all sequential
restores have been done. If a consistency check is selected
during a restore, the restore will complete but the consistency
check will not be done. Check the job log for this information.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1043
Restore Options for SQL 7.0
Item Description
Default drive for Use this option to select a default drive to which SQL database files
restoring database files can be restored if the drive where one or more of the database files
previously resided no longer exists.
When a SQL database is backed up, the physical file names (which
include the directory path) of the files that make up the database
are stored in the backup set by SQL. For example, for the logical file
pubs, the physical file name is stored as
E:\MSSQL7\DATA\pubs.mdf. If the database must later be
restored, SQL uses these same physical file names to target the
restore to. During a restore, Backup Exec automatically creates any
necessary subdirectories that do not exist.
However, if the drive where one or more of the database files
previously resided no longer exists, Backup Exec moves those files
to their original directory path, but on the default drive specified.
Using the same example, if the default drive C: is specified, then
the file with the original directory path of
E:\MSSQL7\DATA\pubs.mdf is restored to
C:\MSSQL7\DATA\pubs.mdf.
If no default drive is specified in this situation, the job will fail.
Restore all database Select this checkbox to restore all database files to their original
files to default drive directory path on the default drive, even if the drive where they
originally resided exists. To make this option available, select a
drive letter in Default drive for restoring database files.
Note Do not select this option when restoring filegroups.
Filegroups must be restored to the same drive letter and path
that they were backed up from.
Restore all database Select this checkbox to restore files to the default data and log
files to the target directories of the destination instance. For example, if you are
instance’s data location restoring a database to a different instance of SQL, you would
select this option to move the database files to the correct location
for the new instance.
If this option is not selected, then the files are restored to the
directory that the master database is in.
Note Do not select this option when restoring filegroups.
Filegroups must be restored to the same drive letter and path
that they were backed up from.
Item Description
Point in time log restore Select this checkbox to restore transactions from a transaction log
up to and including a point in time in the transaction log. After the
point in time, recovery from the transaction log is stopped.
In the Date box, select the part of the date you want to change, and
then enter a new date or click the arrow to display a calendar from
which you can select a date.
In the Time box, select the part of the time you want to change, and
then enter a new time or click the arrows to select a new time.
SQL Agent
Guide Me Click this to start a wizard that helps you select restore job
properties for SQL.
See also:
“About Restoring SQL 7.0 Databases or Filegroups” on page 1045
“Restoring from SQL 7.0 Transaction Logs Up to a Point in Time” on page 1048
“Restoring from SQL 7.0 Filegroup Backups” on page 1049
Caution SQL 7.0 databases cannot be restored using only filegroups and log backups.
SQL 7.0 databases must have at least one full database backup in order to be
restored. If the database has been deleted or does not exist, restore the full
database backup, and then restore all the filegroup and log backups.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1045
About Restoring SQL 7.0 Databases or Filegroups
Note SQL 7.0 database backups can be restored to SQL 2000, but SQL 2000 backups
cannot be restored to SQL 7.0.
SQL Agent
3. In the restore selections list, select the most recent full database backup set, and the
most recent differential database backup set, if any, to restore.
5. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational. No additional transaction logs can be restored.
For information on other SQL restore options, see “Restore Options for SQL 7.0” on
page 1041.
6. Start the restore job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
“About Restoring SQL 7.0 Databases or Filegroups” on page 1045
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1047
About Restoring SQL 7.0 Databases or Filegroups
3. In the restore selections list, select the most recent full database backup set, and the
most recent differential database backup set, if any, and all the log backup sets you
want to restore.
5. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational. No additional transaction logs can be restored.
6. Select Point in time log restore, and then select a date and time.
For information on selecting other options, see “Restore Options for SQL 7.0” on
page 1041.
7. Start the restore job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
“About Restoring SQL 7.0 Databases or Filegroups” on page 1045
Caution SQL 7.0 databases cannot be restored using only filegroups and log backups.
SQL 7.0 databases must have at least one full database backup in order to be
restored. If the database has been deleted or does not exist, restore the full
database backup, and then restore all the filegroup and log backups.
SQL Agent
deleted from a filegroup, you cannot restore that filegroup to a point in time before
the table was deleted and then leave it at that time; you must continue restoring the
filegroup to the same point in time shared by all existing filegroups.
To be able to restore a filegroup to the same point in time as the other filegroups, run
one of the following log backups:
- If the database is intact, run a Log backup.
- If any files or filegroups are missing, run a Log - No Truncate backup.
Note If the primary filegroup is missing, the log backup methods are unavailable. You
can restore the database only up to the last log backup.
◆ Filegroup restores can be redirected to a different server, but the database file paths
cannot be changed. For example, if the filegroup was backed up from G:\SQLDATA
then the filegroup must be restored to G:\SQLDATA, regardless of the server the
restore is redirected to.
The options Restore all databases to default drive and Restore all database files to
the target instance’s data location on the Restore Job Properties for SQL dialog box do
not apply to filegroup restores. Filegroups must be restored to the same drive letter
and path that they were backed up from.
◆ Previous versions of Backup Exec cannot restore filegroup backups made with
Backup Exec v9.0.
Note Use separate restore jobs to restore the primary filegroup, the rest of the filegroup
backup sets, and the transaction logs.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1049
About Restoring SQL 7.0 Databases or Filegroups
3. In the restore selections list, select the backup set containing the primary filegroup.
5. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database nonoperational but able to restore additional transaction logs. For
information on other SQL restore options, see “Redirecting Restores for SQL 7.0” on
page 1053.
7. After the primary filegroup is restored, select the rest of the filegroup backup sets
containing the latest full and differential backups.
8. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database nonoperational but able to restore additional transaction logs, and
then start the restore job.
9. When the full and differential backups are restored, select the backup set containing
the transaction logs.
10. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational. No additional transaction logs can be restored and
restore all of the transaction logs, or select Point in time log restore or Restore log up
to named transaction, and then start the restore job.
11. Start the restore job or select other restore options from the Properties pane. For
information on other restore options, see “Restoring Data” on page 395.
5. Select the backup method Log No Truncate, select None for a consistency check, and
then start the backup job.
6. After the Log No Truncate backup is complete, restore the missing filegroup by
selecting the filegroup backup sets containing the latest full and differential backups,
and the transaction log backups.
7. On the Restore Job Properties for SQL dialog box, select the recovery completion state
Leave database operational. No additional transaction logs can be restored.
8. Start the restore job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
SQL Agent
Restoring the SQL 7.0 Master Database
If the master database is damaged, symptoms may include:
◆ An inability to start SQL.
◆ Segmentation faults or input/output errors.
◆ A report generated by SQL Database Consistency Checker utility (DBCC).
If you can still start SQL, you can restore the latest copy of the master database backup
using the Automate master database restore option in Backup Exec’s Restore Job
Properties for SQL, and then restore any other databases, if needed.
If the master database is critically damaged and SQL cannot be started, rather than
running the Rebuild Master utility, or reinstalling SQL to be able to restart SQL, you can
replace the corrupted or missing databases with the copies of the master and model
databases that you created as part of your disaster recovery preparation plan. After SQL is
running again, you can restore the latest copy of the master database using Backup Exec’s
Automate master database restore option, and then restore any other databases if needed.
If copies of the master and model databases were not made, then you must use Microsoft’s
Rebuild Master utility (\MSSQL7\binn\Rebuildm.exe) to rebuild the master database
and start SQL. For more information, refer to your Microsoft SQL documentation.
Because all changes made to the master database after the last backup was created are lost
when the backup is restored, the changes must be reapplied. If any user databases were
created after the master database was backed up, those databases cannot be accessed until
the databases are restored from backups or reattached to SQL.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1051
About Restoring SQL 7.0 Databases or Filegroups
2. Open a command prompt window, and delete the original master and model
databases and their transaction logs.
Type the following:
C:\ mssql7\data> del master.mdf mastlog.ldf model.mdf
modellog.ldf
5. Continue with the next procedure to restore the latest changes to the master database.
3. On the restore selections list, select the backup set containing the last master database
backup.
4. On the Restore Job Properties for SQL dialog box, select Automate master database
restore.
All existing users are logged off, and SQL Server is put into single-user mode.
When this option is selected, only the master database can be restored; if this option is
selected for any other data, those jobs will fail.
If Backup Exec does not have access to the SQL registry keys
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the
default directory may not work, and the option Automate master database restore on
the restore job properties for SQL will not work. To ensure that Backup Exec has
access rights, verify that the logon account used has administrator rights to the
Windows server that the SQL instance is installed on.
SQL Agent
6. Start the restore job.
After the restore, SQL is restarted in multi-user mode.
See also:
“Restoring Data” on page 395.
▼ To redirect a restore:
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1053
About Restoring SQL 7.0 Databases or Filegroups
2. After selecting options on the Restore Job Properties dialog box, on the Properties
pane, under Destination, click SQL Redirection.
3. Select the appropriate options as follows, and then start the redirected restore job or
select other restore options from the Properties pane:
Item Description
Redirect Microsoft SQL Select this checkbox to enable redirection of SQL backup sets.
Server sets
Restore to server To redirect this restore to a different server, type the target server
name.
You can redirect a full database backup to a different server or
database; however, if the drive configuration is different from
when the database backup was created, you must select either
Default drive for restoring database files or Restore all database
files to the target instance’s data location on the Restore Job
Properties for SQL dialog box (see Restore Options for SQL 7.0 on
page 1041).
Item Description
Server logon account To restore to a server, use a Backup Exec logon account that stores
the credentials of a Windows user account. The Windows user
account must have been granted the System Administrator role
on the SQL instance. The default logon account is displayed by
default. To use another logon account, click Change. For more
information about logon accounts, see “Using Backup Exec Logon
Accounts for SQL 7.0 Resources” on page 1027.
SQL logon account If you are using SQL Server Authentication, use a Backup Exec
SQL Agent
logon account that stores the credentials of the SQL user account.
Apply the Backup Exec logon account for the Windows user
account to the Windows server that SQL is installed on, and then
apply the logon account for the SQL user account to the SQL
instance.
To use another logon account, click Change. To remove the SQL
logon account displayed in this field, click Clear. For more
information about logon accounts, see “Using Backup Exec Logon
Accounts for SQL 7.0 Resources” on page 1027.
Restore to database To redirect the restore to a different database on the target server,
type the target database name in this field; otherwise, leave the
field blank.
You can redirect a full database backup to a different server
and/or database; however, if the drive configuration is different
from when the database backup was created, you must select
either Default drive for restoring database files or select Restore
all database files to the target instance’s data location on the
Restore Job Properties for SQL dialog box (see “Redirecting
Restores for SQL 7.0” on page 1053).
If you are restoring a differential or log backup, and the
associated database backup was restored to a different server,
enter the new database name.
See also:
“Restoring Data” on page 395
“About Restoring SQL 7.0 Databases or Filegroups” on page 1045
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1055
Setting Default Backup and Restore Options for SQL 7.0
Item Description
Backup
Backup method Full - Back up entire database or filegroup. Select this to back
up the entire database or filegroup. See “Backing Up SQL 7.0
Databases” on page 1035. This option is selected by default.
Log - Back up transaction log. Select this to back up only the
SQL Agent
data contained in the transaction log; it does not back up
database data. After the transaction log is backed up,
committed transactions are removed (truncated). See
“Backing Up SQL 7.0 Transaction Logs” on page 1039.
Log No Truncate - Back up transaction log - no truncate.
Select this method only when the database is corrupted or
database files are missing. Since the Log No Truncate method
does not access the database, you can still back up
transactions that you may not be able to access otherwise
when the database is in this state. You can then use this
transaction log backup along with the database backup and
any previous transaction log backups to restore the database
to the point at which it failed; however, any uncommitted
transactions are rolled back.
The Log No Truncate method does not remove committed
transactions after the log is backed up. See Backing Up SQL
7.0 Transaction Logs on page 1039.
Differential - Back up database or filegroup changes only.
Select this to back up only the changes made to the database
or filegroup since the last full backup. Because differential
backups allow the restore of a system only to the point in time
that the differential backup was created, you should also
create multiple log backups between the differential backups.
See “Backing Up SQL 7.0 Databases” on page 1035.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1057
Setting Default Backup and Restore Options for SQL 7.0
Item Description
Continue with backup if Select this checkbox to continue with the backup operation even if
consistency check fails the consistency check fails. You may want to continue with the
backup when the consistency check fails if you think that a
backup of the database in its current state is better than no backup
at all, or if you are backing up a very large database with only a
small problem in a table.
Consistency check after Select a consistency check to run after a backup. Because database
backup transactions can occur during or after the consistency check, but
before the backup runs, consider running a consistency check
after the backup to ensure the data was consistent at the time of
the backup.
None. Select this if you do not want a consistency check to run
after a backup. It is strongly recommended that you always
run a consistency check either before or after the backup. This
option is selected by default.
Full check, excluding indexes. Select this to exclude indexes
from the consistency check. If indexes are not checked, the
consistency check runs significantly faster but is not as
thorough. Only the data pages and clustered index pages for
each user table are included in the consistency check. The
consistency of the nonclustered index pages is not checked.
Full check, including indexes. Select this to include indexes
in the consistency check. Any errors are logged.
Display filegroups when Select this checkbox if filegroups exist that you want to select for
creating new backup jobs backup. If this checkbox is not selected, filegroups exist are not
displayed as backup selections.
Item Description
Restore
SQL Agent
not usable.
If Leave database operational is selected when an
intermediate backup is being applied, you cannot continue to
restore backups. You must restart the restore operation from
the beginning.
This option is selected by default.
Leave database nonoperational but able to restore
additional transaction logs (No Recovery). Select this option
during a restore if you have additional differential or
transaction log backups to be restored in another restore job.
Leave database read-only and able to restore additional
transaction logs (Standby). Select this option during
transaction log and database restores to create and maintain a
standby database. See your SQL documentation for
information on standby databases.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1059
Setting Default Backup and Restore Options for SQL 7.0
Item Description
Consistency check after None. Select this if you are doing sequential restores. Do not
restore run a consistency check after a restore until all sequential
restores have been done. If a consistency check is selected
during a restore, the restore will complete but the consistency
check will not be done. Check the job log for this information.
SQL Agent
restore the latest master database backup and any other databases that are necessary.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1061
Preparing for Disaster Recovery of SQL 7.0
1. Use the SQL Server Service Manager to stop the SQL services.
2. Open a command prompt window, and copy the original master and model databases
and their transaction logs to the specified file names. In a default installation of SQL
7.0, the databases are in C:\MSSQL7\Data.
Type the following:
C:\ mssql7\data> copy master.mdf master$4idr
C:\ mssql7\data> copy mastlog.ldf mastlog$4idr
C:\ mssql7\data> copy model.mdf model$4idr
C:\ mssql7\data> copy modellog.ldf modellog$4idr
SQL Agent
Manual recovery of the Windows server, and then manual recovery of the SQL
databases. This method involves manually restoring the Windows server from full
system backups, and then recovering the SQL databases.
◆ The Intelligent Disaster Recovery Option. This option provides an automated method
of restoring the Windows server as well as the SQL databases from full system
backups. See “Microsoft SQL Server Recovery Notes” on page 909.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1063
Disaster Recovery of SQL 7.0
2. Open a command prompt window, and delete the original master and model
databases and their transaction logs.
Type the following:
C:\ mssql7\data> del master.mdf mastlog.ldf model.mdf
modellog.ldf
5. Continue with the next procedure to restore the latest changes to the master database.
SQL Agent
▼ To restore the master database:
3. In the restore selections list, select the backup set containing the last master database
backup.
5. On the Restore Job Properties for SQL dialog box, select Automate master database
restore.
All existing users are logged off, and SQL Server is put into single-user mode.
When this option is selected, only the master database can be restored; if this option is
selected for any other data, those jobs will fail.
If Backup Exec does not have access to the SQL registry keys
HKEY_LOCAL_MACHINE\Software\Microsoft\Microsoft SQL Server and
HKEY_LOCAL_MACHINE\Software\Microsoft\MSSQLServer, then a restore to the
default directory may not work, and the option Automate master database restore on
the restore job properties for SQL will not work. To ensure that Backup Exec has
access rights, verify that the logon account used has administrator rights to the
Windows server that the SQL instance is installed on.
Appendix G, VERITAS Backup Exec - Agent for Microsoft SQL Server 1065
Disaster Recovery of SQL 7.0
8. Continue with the next procedure, restoring the remaining SQL databases.
Note Do not select the master database for restore at this time.
If you are restoring the SQL databases from filegroup backups, go to “Restoring
from SQL 7.0 Database Backups” on page 1047.
3. Select all the backup sets that you want to apply, including the full backup, any
differential backups, and any log backups.
5. Select the option Leave database operational. No additional transaction logs can be
restored.
7. In the Consistency Check After Database Restore field, select Full check, including
indexes.
8. Start the restore job or select other options from the Properties pane. If the restore is
being redirected, see “Redirecting Restores for SQL 7.0” on page 1053.
When all of the restore operations have completed successfully, then the recovery of
the SQL databases is complete.
After the recovery has been completed, it is strongly recommended that a full
database backup be performed as soon as possible.
See also:
“Restoring Data” on page 395
Exchange
◆ Selecting storage groups for backup and restore, or selecting one or more databases
Agent
within the storage group for backup and restore.
◆ Increased performance of mailbox backups through:
- Incremental and differential backups.
- Individual mailbox backup and restore.
- The ability to globally exclude or include specified subfolders in each mailbox for
backup and restore operations.
- Single-instance storage for message attachments.
- The ability to back up only a single instance of a message attachment.
◆ Individual public folder backup and restore with the same capabilities that are
available for mailbox backup and restore.
See also:
“Installing the Exchange Agent” on page 1068
“Backup Strategies for Exchange 2000” on page 1070
“Recommended Configurations for Exchange 2000 Server” on page 1073
1067
Requirements for Using the Exchange Agent with Exchange 2000
Exchange
Exchange organization.
Agent
A unique name is one that does not exist in the organization as a subset of characters in
another mailbox name. For example, if EXCH1 has been entered as the mailbox name, and
there are other mailbox names such as EXCH1BACKUP, or BACKUPEXCH1, then Backup
Exec will not accept the name and you are prompted to choose another mailbox name. If
you cannot create a unique mailbox name, you must create a Backup Exec logon account
and enter the fully qualified name in the username field of the logon account. For
example:
/O=Company/OU=Orlando/CN=Test/CN=EXCH1
See also:
“Backing Up Exchange 2000 Mailboxes and Public Folders” on page 1080
“Configuring Logon Accounts” on page 347
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1069
Backup Strategies for Exchange 2000
File system Back up folders and drives containing files for Windows and Exchange.
Usually, this is the root drive C:\ and the virtual drive created by
Exchange during installation, which by default is M:\ but may be
different in each environment.
Note Back up the C:\ drive, but do not back up the virtual drive
created by Exchange. It is intended only to provide Explorer
access to the Exchange data, but all files system functions may not
be replicated. Backup and restore operations are not
recommended or supported.
As a general practice, we recommend that you exclude the Exchange
database and log files from the file system backup. The .EDB files, as
Exchange
well as any active .LOG files, are not backed up when the file system is
Agent
backed up because they are opened for exclusive use by the Exchange
system. These files appear as “in use - skipped” during the file system
backup; however, these files are backed up when the Exchange
databases are selected for backup.
Windows NT registry For Windows NT, back up the registry by running a full backup.
System State Select System State and run a full backup to back up the following:
The Internet Information Service (IIS) metabase
The Windows registry
Active Directory
For more information on backing up System State, see “Selecting Data
to Back Up” on page 259. If the entire server must be restored, you must
restore System State to the server before you can restore Exchange 2000.
Key Management Back up the Key Management Service database by selecting the KMS
Service (KMS) database icon in Backup Selections, and then running a full backup. Local or
remote backups can be performed on the KMS database.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1071
Backup Strategies for Exchange 2000
Active Directory To back up Active Directory, select System State on the domain
controllers and run a full backup.
When there are configuration changes on Exchange 2000, such as when
objects are added, modified, or deleted, back up the Active Directory on
the domain controllers.
Note Spread multiple domain controllers throughout each domain for
efficient Active Directory replication, and so that if one domain
controller fails, redundancy is still provided.
Mailboxes and public When you back up the Exchange server databases, mailboxes and
folders public folders are included in the backup. However, to make restores
easier, you can also select one or more mailboxes or public folders for
backup separately from the databases. You can also enable features in
Backup Exec to make mailbox and public folder backups faster.
See “Recommendations for backing up Exchange 2000 mailboxes and
public folders” on page 1081.
See also:
“Backup Options for Exchange 2000” on page 1074
“Backing Up Exchange 2000” on page 1078
“Backing Up Exchange 2000 Mailboxes and Public Folders” on page 1080
“Setting Default Backup and Restore Options for Exchange 2000” on page 1097
“Preparing for Disaster Recovery of Exchange 2000” on page 1101
Exchange
◆ Disable Write Cache on the SCSI controller. Windows does not use buffers, so when
Agent
Exchange (or other applications) receives a write complete notice from Windows, the
write-to-disk has been completed. If Write Cache is enabled, Windows responds as
though a write-to-disk has been completed, and will provide this information to
Exchange (or other applications) incorrectly. The result could be data corruption if
there is a system crash before the operation is actually written to disk.
◆ Disable circular logging if possible. Circular logging minimizes the risk that the hard
disk will be filled with transaction log files. But, if a solid backup strategy is in place,
transaction log files are purged during the backup, thus freeing disk space. If circular
logging is enabled, transaction log histories are overwritten, incremental and
differential backups of storage groups and databases are disabled, and recovery is
only possible up to the point of the last full or copy backup.
See also:
“Reviewing Circular Logging for Exchange 2000” on page 1079
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1073
Backup Options for Exchange 2000
Item Description
Exchange server FULL - Database & Logs (flush committed logs). Select this to
backup method back up the databases as well as their associated transaction log
files. After the databases and transaction logs are backed up,
the transaction log files that have all transactions committed to
the database are then deleted. This option is selected by default.
COPY - Databases & Logs. Select this to back up the databases
as well as their associated transaction log files; however, the
transaction logs are not deleted after being backed up.
You can use the copy method to make a full backup of a
database without disturbing the state of ongoing incremental or
differential backups.
DIFFERENTIAL - Logs. Select this to back up all of the
transaction logs that have been created or modified since the
last full backup. However, the transaction logs are not deleted
Exchange
after being backed up.
Agent
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from differential backups, the last differential backup
and the last full backup are required.
INCREMENTAL - Logs (flush committed logs). Select this to
back up all of the transaction logs that have been created or
modified since the last full or incremental backup, and then
delete the transaction logs that have been committed to the
database.
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from incremental backups, the last full backup and
all incremental backups done since are required.
Guide Me Click Guide Me to start a wizard that helps you choose backup job
properties for backing up Exchange 2000.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1075
Backup Options for Exchange 2000
Item Description
Mailbox backup method FULL - Back up messages. Reset archive bit. Select this to back
up all messages in the selected mailboxes. This option is set by
default.
A time/date stamp placed in each folder indicates the
messages have been backed up.
COPY - Back up messages. Select this to back up all messages
in the selected mailboxes. A time/date stamp is not used, so
incremental and differential backups are not affected.
Use the copy method to make a full backup of the mailboxes
without disturbing the state of ongoing incremental or
differential backups.
DIFFERENTIAL - Back up changed messages. Select this to
back up all of the messages that have been created or modified
in the selected mailboxes since the last full backup.
The time/date stamp placed on the folders during the last full
backup is used to determine which messages have been
modified since, but the time/date stamp is not updated during
the differential backup.
INCREMENTAL - Back up changed messages. Reset archive
bit. Select this to back up only the messages that have been
modified in the selected mailboxes since the last full or
incremental backup.
The time/date stamp placed on the folders during the last full
or incremental backup is used to determine which messages
have been modified since, and the time/date stamp is updated
during the differential backup.
Item Description
Enable single instance Select this to back up only a single copy of all identical message
backup for message attachments. When an identical attachment is found, a reference to
attachments (for the attachment is retained and the actual attachment is backed up
mailbox and public at the end of the backup set.
folder backups only) Enabling single instance backup for message attachment increases
backup performance since duplicate attachments are backed up
only once.
Disable this option if you want each identical copy of a message
attachment backed up and kept in order on the backup set.
Exchange
running the job again will not back up the same
Agent
messages and attachments. You must run a full or
copy backup to ensure that all messages and
attachments are backed up completely.
Guide Me Click Guide Me to start a wizard that helps you choose backup job
properties for recreating user accounts and mailboxes.
See also:
“Backing Up Exchange 2000” on page 1078
“Backing Up Exchange 2000 Mailboxes and Public Folders” on page 1080
“Reviewing Circular Logging for Exchange 2000” on page 1079
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1077
Backing Up Exchange 2000
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts with Exchange 2000 Resources” on page 1069.
3. To select Exchange data from local or remote selections, click the domain name icon or
icons that contain the Exchange installations, and then click the actual Windows
computer icon that contains the Exchange installation. If you are using a server
cluster, make backup selections from the virtual server.
A list of shared network directories appears, along with an icon that represents the
Exchange installation.
To select all storage groups in Exchange, click the checkbox preceding the Microsoft
Information Store, or you can select specific storage groups by expanding the
Exchange icon, and then individually selecting storage groups.
4. To select the Exchange server backup method, on the Properties pane, under Settings,
click Exchange. For details on these options, see “Backup Options for Exchange 2000”
on page 1074.
Note To perform incremental and differential backups of storage groups, make sure that
circular logging is not enabled on the storage group.
5. Select other backup options from the Properties pane or start the backup job.
See also:
“Backup Strategies for Exchange 2000” on page 1070
“Backing Up Exchange 2000 Mailboxes and Public Folders” on page 1080
“Reviewing Circular Logging for Exchange 2000” on page 1079
“Backing Up Data” on page 233
Exchange
When circular logging is enabled, incremental and differential backups of Exchange
Agent
databases and storage groups cannot be performed because these types of backups rely on
a complete history of logs.
When circular logging is enabled, transaction log files that have already been committed
to the database are overwritten, preventing the accumulation of logs. The log files are
overwritten whether or not a full or incremental backup has been run, and a history of
previous logs since the last full or incremental backup is not maintained.
When circular logging is disabled, transaction log files accumulate on the disk until a full
or incremental backup is performed, after which the log files that have all transactions
committed to the database are deleted.
2. Expand the tree to the storage group for which you want to review the circular
logging setting.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1079
Backing Up Exchange 2000 Mailboxes and Public Folders
5. If you want to perform incremental and differential backups on databases, make sure
that circular logging is not enabled.
See also:
“Backup Strategies for Exchange 2000” on page 1070
To obtain the most efficiency and greatest performance in mailbox and public folder
backups, consider the following:
Recommendation Description
Use full and incremental Consider running full backups of mailboxes or public folders on a
backups regular basis, supplemented with incremental or differential backups
throughout your schedule to keep backup run time to a minimum.
Exclude unwanted or When you select a mailbox or public folder for backup, by default all
unnecessary folders folders and subfolders are included. You can easily exclude specific
from the backup folders and subfolders from the backups by using the ** wildcard in the
file selection path on the Advanced File Selection dialog box when
making backup selections (see “Including or Excluding Files for Backup
Using Advanced File Selection” on page 262).
For example, to exclude all mail in the Deleted Items folder, type:
\**\Deleted Items\*
To exclude all mail in the Sent Items folder, type:
Exchange
\**\Sent Items\*
Agent
If you also want to exclude all subfolders of the specified folders from
the backup, check the Include Subfolders checkbox in the Advanced
File Selection dialog.
Use single-instance When backing up mailboxes and public folders, you can choose to back
storage for message up only a single copy of all identical message attachments. When an
attachments identical attachment is found, a reference to that attachment is retained,
and the actual attachment is backed up only once at the end of the
backup set.
Enabling single instance backup for message attachment increases
backup performance since duplicate attachments are backed up only
once.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1081
Backing Up Exchange 2000 Mailboxes and Public Folders
Recommendations for backing up Exchange 2000 mailboxes and public folders (continued)
Recommendation Description
Do not back up special While these special system mailboxes can be backed up, it is not
system mailboxes necessary or useful. The following are common examples of special
created by Exchange system mailboxes, but there may be others depending on the Exchange
2000 server configuration and environment.
System Attendant
Any mailbox name starting with SMTP or System Mailbox
Also, when selecting objects from the mailbox tree, all objects are
displayed as messages. Some non-message objects can be identified by
the subject line. For example, if you create a Calendar event named
Appointment1, that name is displayed in the subject line for that object.
However, some objects such as Forms and Views do not have a subject
line (even though they can be named) and may not be easily
identifiable.
Select public folders The same public folders may be displayed for multiple Exchange
from only one Exchange servers since public folders can be replicated. Selecting public folders
server. on multiple Exchange servers will only increase the time and media
required for the backup and does not provide any additional protection.
Mailboxes are displayed in a server-centric view; that is, only mailboxes on the selected
Exchange server are displayed in the backup selections list. Public folders, however, may
be displayed on more than one server since public folders can be replicated to many
servers.
Note In versions of Backup Exec prior to 8.6, mailboxes could be selected for backup from
a site-centric view, which listed all mailboxes in the Exchange Organization, not just
mailboxes on the selected server. Even though only the server-centric view is now
available for Exchange mailboxes, you can still restore mailbox backup sets created
using a site-centric view.
If the mailboxes are all selected from the same server, they are placed together in one
backup set on the storage media. If the mailboxes are selected from more than one server,
then the mailboxes are placed in separate backup sets according to the server.
3. To select Exchange mailboxes or public folders from local or remote selections, click
the domain name icon or icons that contain the Exchange mailboxes, and then click
the actual Windows computer icon that contains the Exchange mailboxes. If you are
using a server cluster, make backup selections from the virtual server.
4. Expand the Microsoft Exchange Mailbox icon that contains the mailboxes or public
folders you want to back up.
You can select all mailboxes or individual messages, mailboxes, and folders to back
up. When you select a mailbox or public folder, all folders and subfolders are included
in the backup by default. For a faster backup, consider using Advanced File Selections
to exclude some folders, such as Deleted Items or Sent Items, and subfolders from
the backup.
Because public folders can be replicated on multiple Exchange servers, select public
folders from only one Exchange server.
Exchange
Agent
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1083
Backing Up Exchange 2000 Mailboxes and Public Folders
5. If prompted, select a logon account that will allow you to connect to the Exchange
mailboxes or public folders.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts with Exchange 2000 Resources” on page 1069.
6. To select the mailbox or public folders backup method, on the Properties pane, under
Settings, click Exchange. For details on these options, see “Backup Options for
Exchange 2000” on page 1074.
7. Select other backup options from the Properties pane or start the backup job.
See also:
“Using Backup Exec Logon Accounts with Exchange 2000 Resources” on page 1069
“Recommendations for backing up Exchange 2000 mailboxes and public folders” on
page 1081
“Backing Up Data” on page 233
Exchange
Agent
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1085
Restore Options for Exchange 2000
Item Description
Automatically recreate Select this checkbox to recreate the user accounts and their
user accounts and mailboxes if they do not already exist on the target server.
mailboxes Otherwise, the restore job will fail if a mailbox that is being
restored does not exist on the target server.
When this checkbox is selected, the password you entered on the
Exchange Options - Set Application Defaults dialog box is used as
the password for accounts that are recreated.
To change the password, on the Tools menu click Options, and
then in the Properties pane under Job Defaults, click Exchange.
Select Automatically recreate user accounts and mailboxes, and
then click Change password.
Note This option applies only if mailboxes are being restored to
their original location. If the mailbox restore is being
redirected, the user account and mailbox must already exist
on the target server.
Exchange 2000
No loss restore (do not Select this checkbox to preserve the existing transaction logs on
delete existing the Exchange 2000 server. Transaction logs from the storage
transaction logs) media are then restored and added to the existing set of
transaction logs on the Exchange 2000 server. When the restore
operation finishes, Exchange 2000 automatically updates its
databases with the uncommitted transactions found in the
existing and newly-restored transaction logs. This option is
selected by default.
If you are restoring individual databases into a storage group, the
No loss restore checkbox should be selected. If this checkbox is
not selected, uncommitted transactions for other databases in the
storage group may be lost.
Item Description
Temporary location for Type a location where the associated log and patch files are to be
log and patch files kept until the database is restored. The default location is \temp,
and a subdirectory is created for each storage group. The log and
patch files for each storage group are kept in the corresponding
subdirectory.
Make sure the temporary location for log and patch files is empty
before you start a restore job. If a restore job fails, check the
temporary location (including subdirectories) to make sure any
previous log and patch files from a previous restore job were
deleted.
Commit after restore If your selection contains the last backup set to be restored, select
completes this checkbox to direct the restore operation to replay the log files
and roll back any uncompleted transactions. If this option is not
selected, the database is left in an intermediate state and is not yet
usable.
If Commit after restore completes is selected when an
Exchange
intermediate backup is being applied, you cannot continue to
Agent
restore backups. You must restart the restore operation from the
beginning.
After the database is restored, the log and patch files in the
temporary location are applied to the database, and then the
current log files are applied. After the restore is complete, the log
and patch files are automatically deleted from the temporary
location (including any subdirectories).
Mount database after Select this checkbox to mount the database so that it is available to
restore users. This checkbox is only available if Commit after restore
completes is selected.
Guide Me Click Guide Me to start a wizard that helps you choose restore
job properties for Exchange 2000.
See also:
“Restoring Exchange 2000 Mailboxes and Public Folders” on page 1089
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1087
Restoring Exchange 2000
3. In the restore selections list, select the backup sets you want to restore.
- Restore the last full backup, or
- Restore the last full backup and the last differential backup, or
- Restore the last full backup and all subsequent incremental backups.
5. Select the appropriate options. For details, see “Restore Options for Exchange 2000”
on page 1085.
Do not select the Commit after restore completes checkbox and the Mount
database after restore checkbox on the Restore Job Properties dialog box for
Exchange unless your selections include the last backup set to be restored. These
selections direct the Exchange server to replay transactions, roll back uncommitted
transactions, and mount the databases to make them available for use after the
restore.
6. Start the restore job or select other restore options from the Properties pane.
Exchange
created when individual mailboxes were backed up from the Microsoft Exchange
Agent
Mailboxes selection, or when individual public folders were backed up from the Microsoft
Exchange Public Folders selection. You cannot restore individual mailboxes, messages, or
public folders from storage group or database backups.
If you need to restore mailboxes that have been deleted back to their original location, you
can choose to have the user account and mailbox automatically recreated. A password
that you specify is assigned to the recreated user account. If the mailbox restore is being
redirected, the mailbox must already exist on the target server.
Following are notes about restoring mailboxes or public folders:
◆ Mailbox backup sets that were created using a site-centric view in versions of Backup
Exec prior to 8.6 may require multiple jobs to be run in order to restore all the
mailboxes:
- Mailboxes that resided on the target server will restore normally.
- Mailboxes that resided on other servers must be redirected to those servers.
◆ If you restore mailboxes from a backup created with a version of Backup Exec prior to
8.5, and mailboxes with duplicate Display Names reside on the server, select those
mailboxes for restore separately and follow the instructions in “Redirecting Mailbox
and Public Folder Restores in Exchange 2000” on page 1093.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1089
Restoring Exchange 2000 Mailboxes and Public Folders
3. In the restore selections list, navigate to and select the data you want to restore.
5. Start the restore job or select other restore options from the Properties pane.
6. After the restore is complete, run a full backup of the restored mailboxes.
See also:
“Restore Options for Exchange 2000” on page 1085
“Redirecting Mailbox and Public Folder Restores in Exchange 2000” on page 1093
Exchange
Exchange System Manager utility, right-click the database you want to overwrite,
Agent
click Properties, and then on the Database tab, select This database can be
overwritten by a restore.
You cannot redirect the restore of:
◆ A version of Exchange server database to a different version of the database.
◆ Site Replication Service (SRS) and Key Management Service (KMS). These services are
dependent on the computer they reside on; redirection to another computer is not
supported and could result in the loss of functionality of these services.
Before starting the restore job, review “Restoring Data” on page 395 for information on
finding and viewing specific data to restore, as well as for details on restore options and
submitting restore jobs. After completing the restore, it is recommended that a full backup
of the restored databases be performed.
1. Follow the instructions for the restore in “Restoring Exchange 2000” on page 1088.
2. After selecting options on the Restore Job Properties dialog box, on the Properties
pane, under Destination, click Exchange Redirection.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1091
Restoring Exchange 2000 Mailboxes and Public Folders
3. Select the appropriate options as follows, and then start the redirected restore job or
select other restore options from the Properties pane. After completing the restore, it
is recommended that a full backup of the restored databases be performed.
Item Description
Redirect Exchange sets Select this checkbox to enable the Restore to server and Server
logon account fields.
Restore to server Type the name of the computer to which you are restoring, using
the format \\server name.
Server logon account To restore to a server, use a Backup Exec logon account that stores
the credentials of a Windows user account. The default logon
account is displayed by default. To use another logon account,
click Change. For more information about logon accounts, see
“Using Backup Exec Logon Accounts with Exchange 2000
Resources” on page 1069.
Exchange
Agent
enabled for redirected restores.
◆ To ensure that Backup Exec can access mailboxes on the server that you are
redirecting messages or mailbox restores to, click the destination server in the backup
selections list, select Microsoft Exchange Mailboxes and verify that the target
mailbox is displayed in the list of mailboxes. If you are prompted for a logon account,
use a logon account that stores the credentials of a user account that is unique and has
a corresponding mailbox of the same name. See “Using Backup Exec Logon Accounts
with Exchange 2000 Resources” on page 1069.
◆ More than one mailbox can exist with the same Display Name. When the restore of a
mailbox is redirected in Backup Exec, it is redirected to the target mailbox’s Display
Name. If a duplicate Display Name exists, then the data may be restored to the wrong
mailbox.
To prevent restoring the data to the wrong mailbox, type the name of the target
mailbox exactly as it appears when browsing to the mailbox in the backup selections
list, including the brackets surrounding the mailbox directory identifier (for example,
“Mailbox Name [mailboxname]”).
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1093
Restoring Exchange 2000 Mailboxes and Public Folders
Following are requirements for redirecting the restore of individual messages to another
mailbox.
◆ When redirecting the restore of mailbox data, all destination mailboxes must already
exist before the restore begins. The contents of the restored mailboxes are placed in the
destination mailboxes.
For example, if you back up Mailbox 1, which consists of Top of Information Store,
Inbox, and Folders 1 and 2, each containing some mail messages, and then you restore
Mailbox 1 to the existing Mailbox 2, then all of Mailbox 1, including the Top of
Information Store, Inbox, Folders 1 and 2, and messages, are restored to Mailbox 2.
Note that Mailbox 1 itself is not created under Mailbox 2.
Redirecting the restore of Mailbox 1 to Mailbox 2
Exchange
Before starting the restore job, review “Restoring Data” on page 395 for information on
Agent
finding and viewing specific data to restore, as well as for details on restore options and
submitting restore jobs.
1. Follow the instructions for the restore in “Restoring Exchange 2000 Mailboxes and
Public Folders” on page 1089.
2. After selecting options on the Restore Job Properties dialog box, on the Properties
pane, under Destination, click Exchange Redirection.
3. Select the appropriate options as follows, and then start the redirected restore job or
select other restore options from the Properties pane. After completing the restore, it
is recommended that a full backup of the restored mailboxes be performed.
Item Description
Redirect Exchange sets Select this checkbox to enable the Restore to server and Server
logon account fields.
Restore to server Type the name of the computer to which you are restoring, using
the format \\server name.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1095
Restoring Exchange 2000 Mailboxes and Public Folders
Item Description
Server logon account To restore to a server, use a Backup Exec logon account that stores
the credentials of a Windows user account. The default logon
account is displayed by default. To use another logon account,
click Change. For more information about logon accounts, see
“Using Backup Exec Logon Accounts with Exchange 2000
Resources” on page 1069.
Restore to mailbox Type the name of the target mailbox exactly as it appears when
browsing to the mailbox in the backup selections pane, including
the brackets surrounding the mailbox directory identifier (for
example, “Mailbox Name [mailboxname]”). The mailbox must
already exist before you can restore to it. See “Redirecting
Mailbox and Public Folder Restores in Exchange 2000” on
page 1093.
Mailbox logon account To restore a mailbox or public folder, use a Backup Exec logon
account that stores the credentials of the mailbox user account. To
use another logon account, click Change. To clear the displayed
logon account and use the same logon account specified in the
Server logon account field, click Clear. For more information
about logon accounts, see “Using Backup Exec Logon Accounts
with Exchange 2000 Resources” on page 1069.
Exchange
Agent
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1097
Setting Default Backup and Restore Options for Exchange 2000
Item Description
Backup
Exchange method FULL - Database & Logs (flush committed logs). Select this
to back up the databases as well as their associated transaction
log files. After the databases and transaction logs are backed
up, the transaction log files that have all transactions
committed to the database are then deleted. This option is
selected by default.
COPY - Databases & Logs. Select this to back up the
databases as well as their associated transaction log files;
however, the transaction logs are not deleted after being
backed up.
You can use the copy method to make a full backup of a
database without disturbing the state of ongoing incremental
or differential backups.
DIFFERENTIAL - Logs. Select this to back up all of the
transaction logs that have been created or modified since the
last full backup. However, the transaction logs are not deleted
after being backed up.
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from differential backups, the last differential
backup and the last full backup are required.
INCREMENTAL - Logs (flush committed logs). Select this to
back up all of the transaction logs that have been created or
modified since the last full or incremental backup, and then
delete the transaction logs that have been committed to the
database.
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from incremental backups, the last full backup and all
incremental backups done since are required.
Item Description
Mailbox method: FULL - Back up messages. Reset archive bit. Select this to
back up all messages in the selected mailboxes. This option is
set by default.
A time/date stamp placed in each folder indicates the
messages have been backed up.
COPY - Back up messages. Select this to back up all messages
in the selected mailboxes. A time/date stamp is not used, so
incremental and differential backups are not affected.
Use the copy method to make a full backup of the mailboxes
without disturbing the state of ongoing incremental or
differential backups.
DIFFERENTIAL - Back up changed messages. Select this to
back up all of the messages that have been created or
modified in the selected mailboxes since the last full backup.
The time/date stamp placed on the folders during the last full
backup is used to determine which messages have been
Exchange
modified since, but the time/date stamp is not updated
Agent
during the differential backup.
INCREMENTAL - Back up changed messages. Reset archive
bit. Select this to back up only the messages that have been
modified in the selected mailboxes since the last full or
incremental backup.
The time/date stamp placed on the folders during the last full
or incremental backup is used to determine which messages
have been modified since, and the time/date stamp is
updated during the differential backup.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1099
Setting Default Backup and Restore Options for Exchange 2000
Item Description
Enable single instance Select this to back up only a single copy of all identical message
backup for message attachments. When an identical attachment is found, a reference
attachments (for mailbox to the attachment is retained and the actual attachment is backed
and public folder up at the end of the backup set.
backups only) Enabling single instance backup for message attachment
increases backup performance since duplicate attachments are
backed up only once.
Disable this option if you want each identical copy of a message
attachment backed up and kept in order on the backup set.
Temporary location for Type a location where the associated log and patch files are to be
log and patch files kept until the database is restored. The default location is \temp.
If storage groups are being restored, a subdirectory in \temp is
created for each storage group. The log and patch files for each
storage group are kept in the corresponding subdirectory.
If Commit after restore completes is selected for the restore job,
the log and patch files in the temporary location are applied to the
database, and then the current log files are applied. After the
restore is complete, the log and patch files are automatically
deleted from the temporary location (including any
subdirectories). To select Commit after restore completes, on the
navigation bar, click Restore, and then on the Properties pane,
under Settings, click Exchange.
Note Make sure the temporary location for log and patch files is
empty before you start a restore job. If a restore job fails,
check the temporary location (including subdirectories) to
make sure any previous log and patch files from a previous
restore job were deleted.
Item Description
Automatic recreation
Automatically recreate Select this checkbox to recreate the user accounts and their
user accounts and mailboxes if they do not already exist on the target server.
mailboxes Otherwise, the restore job will fail if a mailbox that is being
restored does not exist on the target server.
When this checkbox is selected, the password you entered on the
Exchange Options - Set Application Defaults dialog box is used as
the password for accounts that are recreated.
To change the password, see “To restore Exchange mailboxes and
public folders:” on page 1090.
Note This option applies only if mailboxes are being restored to
their original location. If the mailbox restore is being
redirected, the user account and mailbox must already exist
on the target server.
Exchange
Change password... Click this to specify a password to use when user accounts and
Agent
mailboxes are automatically recreated on the target server.
See also:
“Restoring Exchange 2000” on page 1088
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1101
Disaster Recovery for Exchange 2000
1. Recover the Windows server first. For instructions, see “Disaster Preparation of the
Windows Computer” on page 533.
Note Make sure you restore the Exchange 2000 files that existed on all disk partitions.
When the Windows 2000 server disaster recovery procedure is complete (after the last
reboot), you must recover the Exchange 2000 server.
2. From the Services applet, verify the Microsoft Exchange Information Store service is
started.
4. Catalog the media that contains the latest full, incremental, and differential backups
of the Exchange 2000 storage groups you want to recover.
7. Select the latest full backups of each storage group for restore.
Note If the Exchange 2000 Server being recovered contains the Site Replication Service
(SRS) and/or Key Management Service (KMS), then select those databases for
restore as well.
Exchange
10. Clear the Exchange 2000 option No loss restore (do not delete existing transaction
Agent
logs).
11. In the field Temporary location for log and patch files, type a location where the
associated log and patch files are to be kept until the database is restored.
Note Make sure the temporary location for log and patch files is empty before you start a
restore job. If a restore job fails, check the temporary location (including
subdirectories) to make sure any previous log and patch files from a previous
restore job were deleted.
12. If your selection contains the last backup set to be restored, select Commit after
restore completes.
Do not select this checkbox if you still have backup sets to restore.
If Commit after restore completes is selected when an intermediate backup is being
applied, you cannot continue to restore backups and you must restart the restore
operation from the beginning.
After the database is restored, the log and patch files in the temporary location are
applied to the database, and then the current log files are applied. After the restore is
complete, the log and patch files are automatically deleted from the temporary
location (including any subdirectories).
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1103
Disaster Recovery for Exchange 2000
13. If you want the databases to be immediately available to users after the recovery,
select Mount database after restore.
This checkbox is only available if Commit after restore completes is selected.
14. Start the restore job or select other restore options on the Properties pane.
15. After completing the restore, it is recommended that a full backup of the restored
databases be performed.
Exchange
- The ability to back up only a single instance of a message attachment.
Agent
◆ Individual public folder backup and restore with the same capabilities that are
available for mailbox backup and restore.
See also:
“Installing the Exchange Agent” on page 1106
“Recommended Configurations for Exchange 5.5 Server” on page 1109
“Backup Strategies for Exchange 5.5” on page 1107
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1105
Installing the Exchange Agent
Exec logon account that stores the credentials of a user account that is unique and has a
corresponding mailbox of the same name, then you are not prompted for an additional
logon account when selecting mailboxes or public folders. Otherwise, you must choose or
create a Backup Exec logon account that stores the name of a unique mailbox within the
Exchange organization.
A unique name is one that does not exist in the organization as a subset of characters in
another mailbox name. For example, if EXCH1 has been entered as the mailbox name, and
there are other mailbox names such as EXCH1BACKUP, or BACKUPEXCH1, then Backup
Exec will not accept the name and you are prompted to choose another mailbox name. If
you cannot create a unique mailbox name, you must create a Backup Exec logon account
and enter the fully qualified name in the username field of the logon account. For
example:
/O=Company/OU=Orlando/CN=Test/CN=EXCH1
See also:
“Backing Up Exchange 5.5” on page 1114
“Backing Up Exchange 5.5 Mailboxes and Public Folders” on page 1115
“Configuring Logon Accounts” on page 347
Exchange
Agent
Backup Strategies for Exchange 5.5
Backup Exec incorporates online, nondisruptive Exchange database protection as part of
everyday backup routines, which increases the chance of data recovery and minimizes
data loss without inhibiting daily activity. Backup Exec protects Exchange data, down to
the individual database, mailbox, message, or folder with full, copy, incremental, and
differential backups.
To decide which backup methods to use, consider the following:
◆ In small office environments with relatively small numbers of messages passing
through the system, a daily full backup will provide good data protection and the
quickest recovery. If log file growth becomes an issue, consider using incremental
online backups at midday to provide an added recovery point and manage the log file
growth for you automatically.
◆ In large environments, incremental backups should be used to provide more frequent
recovery point options throughout the day and to manage log file growth. Many
shops run full backups on a weekly basis, preferring to run incremental backups
throughout the week to keep backup run time to a minimum. The trade-off with this
technique occurs at recovery time when you must not only recover from the full
backup but from each incremental backup as well.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1107
Backup Strategies for Exchange 5.5
What will work best for you will be based on the size of your environment, number of
transactions processed each day, and the expectations of your users when a recovery is
required.
For fastest recoveries, consider the following backup options listed in recovery priority
sequence:
◆ Full backups run as frequently as possible, no less than once a day.
◆ Full backups daily with differential backups used at regular periods throughout the
day.
◆ Full backups every few days (no less than weekly) with frequent incremental backups
in between each full backup.
You should also read about best practices for configuring Exchange to provide the fastest
and safest recovery in “Recommended Configurations for Exchange 5.5 Server” on
page 1109.
In addition to the Information Store and Directory Store, we strongly recommend that you
also back up the following on a regular basis:
File system Back up folders and drives containing files for Windows and Exchange.
Usually, these are on drive C:\ unless a different location was specified
during installation.
Windows registry For Windows NT, back up the registry by running a full backup of the
\WINNT directory.
For Windows 2000, back up the registry by selecting System State and
running a full backup.
Key Management To back up the KMS database, stop the Key Management Server service
Service (KMS) database if it is running, and then back up the contents of the directory stored in
EXCHSRVR\KMSdata.
This directory contains security data that includes encryption keys
needed to decipher encrypted mail messages. Without these keys, all
previously encrypted messages cannot be opened by recipients.
Directory Store for each The Directory Store for each Exchange Server is unique, so it is critical
Exchange Server to have a backup of the Directory Store for each Exchange Server.
Exchange
differential backups of databases are disabled, and recovery is only possible up to the
Agent
point of the last full or copy backup.
See also:
“Reviewing Circular Logging for Exchange 5.5” on page 1115
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1109
Backup Options for Exchange 5.5
Item Description
Exchange server FULL - Database & Logs (flush committed logs). Select this to
backup method back up the databases as well as their associated transaction log
files. After the databases and transaction logs are backed up,
the transaction log files that have all transactions committed to
the database are then deleted. This option is selected by default.
COPY - Databases & Logs. Select this to back up the databases
as well as their associated transaction log files; however, the
transaction logs are not deleted after being backed up.
You can use the copy method to make a full backup of a
database without disturbing the state of ongoing incremental or
differential backups.
DIFFERENTIAL - Logs. Select this to back up all of the
transaction logs that have been created or modified since the
last full backup. However, the transaction logs are not deleted
Exchange
after being backed up.
Agent
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from differential backups, the last differential backup
and the last full backup are required.
INCREMENTAL - Logs (flush committed logs). Select this to
back up all of the transaction logs that have been created or
modified since the last full or incremental backup, and then
delete the transaction logs that have been committed to the
database.
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from incremental backups, the last full backup and
all incremental backups done since are required.
Guide Me Click Guide Me to start a wizard that helps you choose backup job
properties for backing up Exchange 5.5.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1111
Backup Options for Exchange 5.5
Item Description
Mailbox backup method FULL - Back up messages. Reset archive bit. Select this to back
up all messages in the selected mailboxes. This option is set by
default.
A time/date stamp placed in each folder indicates the
messages have been backed up.
COPY - Back up messages. Select this to back up all messages
in the selected mailboxes. A time/date stamp is not used, so
incremental and differential backups are not affected.
Use the copy method to make a full backup of the mailboxes
without disturbing the state of ongoing incremental or
differential backups.
DIFFERENTIAL - Back up changed messages. Select this to
back up all of the messages that have been created or modified
in the selected mailboxes since the last full backup.
The time/date stamp placed on the folders during the last full
backup is used to determine which messages have been
modified since, but the time/date stamp is not updated during
the differential backup.
INCREMENTAL - Back up changed messages. Reset archive
bit. Select this to back up only the messages that have been
modified in the selected mailboxes since the last full or
incremental backup.
The time/date stamp placed on the folders during the last full
or incremental backup is used to determine which messages
have been modified since, and the time/date stamp is updated
during the differential backup.
Item Description
Enable single instance Select this to back up only a single copy of all identical message
backup for message attachments. When an identical attachment is found, a reference to
attachments (for the attachment is retained and the actual attachment is backed up
mailbox and public at the end of the backup set.
folder backups only) Enabling single instance backup for message attachment increases
backup performance since duplicate attachments are backed up
only once.
Disable this option if you want each identical copy of a message
attachment backed up and kept in order on the backup set.
Exchange
running the job again will not back up the same
Agent
messages and attachments. You must run a full or
copy backup to ensure that all messages and
attachments are backed up completely.
Guide Me Click Guide Me to start a wizard that helps you choose backup job
properties for recreating user accounts and mailboxes.
See also:
“Backup Strategies for Exchange 5.5” on page 1107
“Backing Up Exchange 5.5 Mailboxes and Public Folders” on page 1115
“Reviewing Circular Logging for Exchange 5.5” on page 1115
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1113
Backing Up Exchange 5.5
2. On the Properties pane, under Source, click Selections, and then select the data you
want to back up.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1106.
3. To select Exchange data from local or remote selections, click the domain name icon or
icons that contain the Exchange installations, and then click the actual Windows
computer icon that contains the Exchange installation. If you are using a server
cluster, make backup selections from the virtual server.
A list of shared network directories and resources appears.
4. Click the check boxes preceding the Microsoft Exchange Information Store and
Microsoft Exchange Directory.
5. To select the Exchange server backup method, on the Properties pane, under Settings,
click Exchange. For details on these options, see “Backup Options for Exchange 5.5”
on page 1110.
Note To perform incremental and differential backups of storage groups, make sure that
circular logging is not enabled on the storage group.
See also:
“Backup Strategies for Exchange 5.5” on page 1107
“Backing Up Exchange 5.5 Mailboxes and Public Folders” on page 1115
“Reviewing Circular Logging for Exchange 5.5” on page 1115
2. Select the server you want to check by clicking Site, then Configuration, and then
clicking Servers.
Exchange
Agent
3. From the File menu, click Properties.
5. If you want to perform incremental and differential backups of the stores, make sure
that circular logging is not enabled on the stores.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1115
Backing Up Exchange 5.5 Mailboxes and Public Folders
Consider using the Exchange Administrator utility to adjust the deleted item retention
settings for the Public and Private Information Store’s properties so that deleted items are
retained for a period of time, allowing them to be recovered rather than restored. See your
Microsoft Exchange Server documentation for details.
To obtain the most efficiency and greatest performance in mailbox and public folder
backups, consider the following:
Recommendation: Description:
Use full and incremental Consider running full backups of mailboxes or public folders on a
backups regular basis, supplemented with incremental backups throughout
your schedule to keep backup run time to a minimum.
Exclude unwanted or When you select a mailbox or public folder for backup, by default all
unnecessary folders folders and subfolders are included. You can easily exclude specific
from the backup folders and subfolders from the backups by using the ** wildcard in the
file selection path on the Advanced File Selection dialog box when
making backup selections (see “Including or Excluding Files for Backup
Using Advanced File Selection” on page 262).
For example, to exclude all mail in the Deleted Items folder, type:
\**\Deleted Items\*
To exclude all mail in the Sent Items folder, type:
\**\Sent Items\*
If you also want to exclude all subfolders of the specified folders from
the backup, check the Include Subfolders checkbox in the Advanced
File Selection dialog.
Use single-instance When backing up mailboxes and public folders, you can choose to back
storage for message up only a single copy of all identical message attachments. When an
attachments identical attachment is found, a reference to that attachment is retained,
and the actual attachment is backed up only once at the end of the
backup set.
Enabling single instance backup for message attachment increases
backup performance since duplicate attachments are backed up only
once. However, if the backup is incomplete, the attachments may not be
included on the backup set. The backup should be rerun until it is
successfully completed.
Recommendation: Description:
Do not back up special While these special system mailboxes can be backed up, it is not
system mailboxes necessary or useful. The following are common examples of special
created by Exchange system mailboxes, but there may be others depending on the Exchange
5.5 server configuration and environment.
Microsoft Schedule+Free/Busy Connector
System Attendant
Directory Service
Also, when selecting objects from the mailbox tree, all objects are
displayed as messages. Some non-message objects can be identified by
the subject line. For example, if you create a Calendar event named
Appointment1, that name is displayed in the subject line for that object.
However, some objects such as Forms and Views do not have a subject
line (even though they can be named) and may not be easily
identifiable.
Select public folders The same public folders may be displayed for multiple Exchange
Exchange
from only one Exchange servers since public folders can be replicated. Selecting public folders
Agent
server. on multiple Exchange servers will only increase the time and media
required for the backup and does not provide any additional protection.
Mailboxes are displayed in a server-centric view; that is, only mailboxes on the selected
Exchange server are displayed in the backup selections list. Public folders, however, may
be displayed on more than one server since public folders can be replicated to many
servers.
Note In versions of Backup Exec prior to 8.6, mailboxes could be selected for backup from
a site-centric view, which listed all mailboxes that resided on Exchange Servers in
the same Exchange site, not just mailboxes on the selected server. Even though only
the server-centric view is now available for Exchange mailboxes, you can still
restore mailbox backup sets created using a site-centric view.
3. To select Exchange mailboxes or public folders from local or remote selections, click
the domain name icon or icons that contain the Exchange mailboxes, and then click
the actual Windows computer icon that contains the Exchange mailboxes. If you are
using a server cluster, make backup selections from the virtual server.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1117
Backing Up Exchange 5.5 Mailboxes and Public Folders
4. Expand the Microsoft Exchange Mailbox icon that contains the mailboxes or public
folders you want to back up.
You can select all mailboxes or individual messages, mailboxes, and folders to back
up. When you select a mailbox or public folder, all folders and subfolders are included
in the backup by default. For a faster backup, consider using Advanced File Selections
to exclude some folders, such as Deleted Items or Sent Items, and subfolders from
the backup.
Because public folders can be replicated on multiple Exchange servers, select public
folders from only one Exchange server.
5. If prompted, select a logon account that will allow you to connect to the Exchange
mailboxes or public folders.
For information on using logon accounts when making backup selections, see “Using
Backup Exec Logon Accounts with Exchange 5.5 Resources” on page 1106.
6. To select the mailbox or public folders backup method, on the Properties pane, under
Settings, click Exchange. For details on these options, see “Backup Options for
Exchange 5.5” on page 1110.
7. Select other backup options from the Properties pane or start the backup job.
See also:
“Backing Up Data” on page 233
Exchange
Agent
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1119
Restore Options for Exchange 5.5
Item Description
Automatically recreate Select this checkbox to recreate the user accounts and their
user accounts and mailboxes if they do not already exist on the target server.
mailboxes during restore Otherwise, the restore job will fail if a mailbox that is being
restored does not exist on the target server.
When this checkbox is selected, the password you entered on the
Exchange page in the Options - Set Application Defaults dialog
box is used as the password for accounts that are recreated.
To change the password, on the Tools menu click Options, and
then in the Properties pane under Job Defaults, click Exchange.
Select Automatically recreate user accounts and mailboxes, and
then click Change password.
Note This option applies only if mailboxes are being restored to
their original location. If the mailbox restore is being
redirected, the user account and mailbox must already exist
on the target server.
Exchange v5.5
No loss restore (Do not Select this to preserve the existing transaction logs on Exchange
delete existing 5.5. Transaction logs on the storage media are then restored and
transaction logs) added to the existing set of transaction logs on Exchange 5.5.
When the restore operation finishes, Exchange 5.5 automatically
updates its databases with the uncommitted transactions found in
the existing and newly restored transaction logs. This option is
selected by default.
Restore public folder Select this to restore only the Information Store’s public database
(PUB.EDB). Although this database cannot be backed up
separately from the Information Store’s private database
(PRIV.EDB), it can be restored separately.
Restore private Select this to restore only the Information Store’s private
mailboxes database. Although this database cannot be backed up separately
from the Information Store’s public database (PUB.EDB), it can be
restored separately.
If the Restore public folder and Restore private mailboxes
options are selected independently, the No loss restore option is
automatically selected and cannot be cleared.
Item Description
Guide Me Click Guide Me to start a wizard that helps you choose restore
job properties for restoring Exchange 5.5 Directory and
Information Store data.
Note The Directory and Information Store services are stopped when the corresponding
stores are restored. Users cannot access them until the restore is complete and the
Exchange
services restarted.
Agent
Following are requirements for running a restore job for Exchange 5.5 Server:
◆ The Exchange System Attendant service is running on the target server. If you are
restoring Exchange data to more than one Windows computer, the System Attendant
service must be running on each target computer.
◆ If you are restoring the Exchange Directory, the target server must have access to the
original Security Account Manager (SAM) information. If the recovered server does
not have access to the SAM information from the original domain, and the Directory
Store is restored, none of the Exchange data is accessible after the restore. This is
because the Exchange Directory uses SID (Security Identifier) information for
authenticating access to objects and the restored SID information will not match SID
information from the SAM in the new domain.
Note Restoring an Exchange 5.5 Directory Store to an Exchange Server other than the
original is not supported; only Information Store data can be restored to a different
computer.
Before starting the restore job, review “Restoring Data” on page 395 for information on
finding and viewing specific data to restore, as well as for details on restore options and
submitting restore jobs.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1121
Restoring Exchange 5.5
3. In the restore selections list, select the backup sets you want to restore.
- Restore the last full backup, or
- Restore the last full backup and the last differential backup, or
- Restore the last full backup and all subsequent incremental backups.
5. Select the appropriate options. For details, see “Restore Options for Exchange 5.5” on
page 1119.
6. Start the restore job or select other restore options from the Properties pane.
7. After the restore job completes, reboot the destination Exchange server or start the
Exchange services manually. You can also put a batch file in a post-job command to
restart the services. See “Pre/Post Commands for Restore Jobs” on page 416.
8. When the Exchange Server is back online, run the Directory Store/Information Store
(DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the
consistency adjustment can be found in the Windows Event Log.
For more information concerning the DS/IS consistency adjuster, refer to your
Exchange documentation.
9. After the restore is complete, it is recommended that you run a full backup of the
restored databases.
See also:
“Restoring Data” on page 395
Exchange
◆ If you restore mailboxes from a backup created with a version of Backup Exec prior to
Agent
8.5, and mailboxes with duplicate Display Names reside on the server, select those
mailboxes for restore separately and follow the instructions in “Redirecting Mailbox
and Public Folder Restores in Exchange 5.5” on page 1127.
◆ When messages in mailboxes or public folders are restored to a location where a
message with the same name already exists, the restored message does not replace the
existing message, but is added to the destination folder; therefore, duplicate messages
may result in the destination folder.
◆ The option Restore over existing files in the Restore Job Properties dialog box does
not apply to mailboxes or public folders. If other selections are restored in addition to
mailboxes or public folders, and the option Restore over existing files is selected, it
applies only to the other selections; mailboxes and public folders are not restored over
existing objects.
To display the Restore Job Properties dialog box, on the navigation bar click Restore,
and then on the Properties pane, click Settings.
◆ Do not restore special system mailboxes created by Exchange.
The following are common examples of special system mailboxes, but there may be
others depending on the Exchange 5.5 server configuration and environment.
- Microsoft Schedule + Free/Busy Connector
- System Attendant
- Directory Service
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1123
Restoring Exchange 5.5 Mailboxes and Public Folders
Before starting the restore job, review “Restoring Data” on page 395 for information on
finding and viewing specific data to restore, as well as for details on restore options and
submitting restore jobs.
3. In the restore selections list, navigate to and select the data you want to restore.
5. Start the restore job or select other restore options from the Properties pane.
6. After the restore is complete, run a full backup of the restored mailboxes.
See also:
“Restoring Data” on page 395
“Restore Options for Exchange 2000” on page 1085
“Setting Default Backup and Restore Options for Exchange 2000” on page 1097
Restriction Description
The Site and Organization Backup Exec does not prevent redirection of an Information
names of the original and Store when the Site and Organization names differ. If the Site
destination servers must match. and Organization names are different, the redirected restore
may appear to complete successfully but the IS service will fail
to start afterward.
Exchange
Agent
The No loss restore option The No loss restore option must be cleared so that any
cannot be selected. transaction logs on the destination server are removed to
avoid an incompatibility that would prevent the Information
Store service from starting.
The No loss restore option appears on the Restore Job
Properties for Exchange 5.5 dialog box. To access this option,
on the navigation bar, click Restore, and then in the Properties
pane under Settings, click Exchange.
The Directory Store cannot be You cannot redirect a restore job in which you have selected to
restored through redirection. restore one or more Exchange 5.5 Directory databases.
Before starting the restore job, review “Restoring Data” on page 395 for information on
finding and viewing specific data to restore, as well as for details on restore options and
submitting restore jobs.
1. Follow the instructions for the restore in “Restoring Exchange 5.5” on page 1121.
2. After selecting options on the Restore Job Properties dialog box, on the Properties
pane, under Destination, click Exchange Redirection.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1125
Restoring Exchange 5.5 Mailboxes and Public Folders
3. Select the appropriate options as follows, and then start the redirected restore job or
select other restore options from the Properties pane:
Item Description
Redirect Exchange sets Select this checkbox to enable the Restore to server and Server
logon account fields.
Restore to server Type the name of the computer to which you are restoring, using
the format \\server name.
Server logon account To restore to a server, use a Backup Exec logon account that stores
the credentials of a Windows user account. The default logon
account is displayed by default. To use another logon account,
click Change. For more information about logon accounts, see
“Using Backup Exec Logon Accounts with Exchange 5.5
Resources” on page 1106.
4. After the restore job completes, reboot the destination Exchange server or start the
Exchange services manually. You can also put a batch file in a post-job command to
restart the services. See “Advanced options for restore” on page 412.
5. When the Exchange server is back online, run the Directory Store/Information Store
(DS/IS) consistency adjuster in order to resolve any inconsistencies. Results of the
consistency adjustment can be found in the Windows Event Log.
For more information concerning the DS/IS consistency adjuster, refer to your
Exchange documentation.
6. After the restore is complete, it is recommended that you run a full backup of the
restored databases.
See also:
“Restoring Data” on page 395
Exchange
Agent
You can redirect the restore of individual mailboxes and public folders from backup sets
created when individual mailboxes were backed up from the Microsoft Exchange
Mailboxes selection, or when individual public folders were backed up from the Microsoft
Exchange Public Folders selection. You cannot restore individual mailboxes or public
folders from database backups.
If you select a single mailbox, or one or more messages or folders from a single mailbox,
you can redirect that restore to another existing mailbox on the same or a different server.
If any of the folders in the original mailbox do not exist in the destination mailbox, they
will be created during the restore.
If you select more than one mailbox, or folders and messages from more than one
mailbox, you can only redirect the restore to another server. Mailboxes with the same
names as those selected must already exist on the target server.
Following are requirements for redirecting the restore of mailboxes:
◆ If the mailboxes do not already exist on the target server, you must create them before
redirecting the restore. Automatic recreation of mailboxes on the target server is not
enabled for redirected restores.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1127
Restoring Exchange 5.5 Mailboxes and Public Folders
◆ To ensure that Backup Exec can access mailboxes on the server that you are
redirecting messages or mailbox restores to, click the destination server in the backup
selections list, select Microsoft Exchange Mailboxes and verify that the target
mailbox is displayed in the list of mailboxes. If you are prompted for a logon account,
use a logon account that stores the credentials of a user account that is unique and has
a corresponding mailbox of the same name. See “Using Backup Exec Logon Accounts
with Exchange 5.5 Resources” on page 1106.
◆ More than one mailbox can exist with the same Display Name. When the restore of a
mailbox is redirected in Backup Exec, it is redirected to the target mailbox’s Display
Name. If a duplicate Display Name exists, then the data may be restored to the wrong
mailbox.
To prevent restoring the data to the wrong mailbox, type the name of the target
mailbox exactly as it appears when browsing to the mailbox in the backup selections
list, including the brackets surrounding the mailbox directory identifier (for example,
“Mailbox Name [mailboxname]”).
Following are requirements for redirecting the restore of individual messages to another
mailbox.
◆ When redirecting the restore of mailbox data, all destination mailboxes must already
exist before the restore begins. The contents of the restored mailboxes are placed in the
destination mailboxes.
For example, if you back up Mailbox 1, which consists of Top of Information Store, Inbox,
and Folders 1 and 2, each containing some mail messages, and then you restore Mailbox 1
to the existing Mailbox 2, then all of Mailbox 1, including the Top of Information Store,
Inbox, Folders 1 and 2, and messages, are restored to Mailbox 2. Note that Mailbox 1 itself
is not created under Mailbox 2.
Redirecting the restore of Mailbox 1 to Mailbox 2
Exchange
Before starting the restore job, review “Restoring Data” on page 395 for information on
Agent
finding and viewing specific data to restore, as well as for details on restore options and
submitting restore jobs.
▼ To redirect a restore:
1. Follow the instructions for the restore in “Restoring Exchange 5.5 Mailboxes and
Public Folders” on page 1123.
2. After selecting options on the Restore Job Properties dialog box, on the Properties
pane, under Destination, click Exchange Redirection.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1129
Restoring Exchange 5.5 Mailboxes and Public Folders
3. Select the appropriate options as follows, and then start the redirected restore job or
select other restore options from the Properties pane. After completing the restore, it
is recommended that a full backup of the restored mailboxes be performed.
Item Description
Redirect Exchange sets Select this checkbox to enable the Restore to server and Restore
to mailbox fields.
Restore to server Type the name of the computer to which you are restoring, using
the format \\server name.
Server logon account To restore to a server, use a Backup Exec logon account that stores
the credentials of a Windows user account. The default logon
account is displayed. To use another logon account, click Change.
For more information about logon accounts, see “Using Backup
Exec Logon Accounts with Exchange 5.5 Resources” on
page 1106.
Item Description
Restore to mailbox Type the name of the target mailbox exactly as it appears when
browsing to the mailbox in the backup selections pane, including
the brackets surrounding the mailbox directory identifier (for
example, “Mailbox Name [mailboxname]”). The mailbox must
already exist before you can restore to it. See “Redirecting
Mailbox and Public Folder Restores in Exchange 5.5” on
page 1127.
Mailbox logon account To restore a mailbox or public folder, use a Backup Exec logon
account that stores the credentials of the mailbox user account. To
use another logon account, click Change. To clear the displayed
logon account and use the same logon account specified in the
Server logon account field, click Clear. For more information
about logon accounts, see “Using Backup Exec Logon Accounts
with Exchange 5.5 Resources” on page 1106.
Exchange
Agent
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1131
Setting Default Backup and Restore Options for Exchange 5.5
1. On the Backup Exec menu bar, click Tools, and then click Options.
Item Description
Backup
Exchange method FULL - Database & Logs (flush committed logs). Select this
to back up the databases as well as their associated transaction
log files. After the databases and transaction logs are backed
up, the transaction log files that have all transactions
committed to the database are then deleted. This option is
selected by default.
COPY - Databases & Logs. Select this to back up the
databases as well as their associated transaction log files;
however, the transaction logs are not deleted after being
backed up.
You can use the copy method to make a full backup of a
database without disturbing the state of ongoing incremental
or differential backups.
Exchange
Agent
DIFFERENTIAL - Logs. Select this to back up all of the
transaction logs that have been created or modified since the
last full backup. However, the transaction logs are not deleted
after being backed up.
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from differential backups, the last differential
backup and the last full backup are required.
INCREMENTAL - Logs (flush committed logs). Select this to
back up all of the transaction logs that have been created or
modified since the last full or incremental backup, and then
delete the transaction logs that have been committed to the
database.
Note If circular logging is enabled, incremental and differential
backups cannot be performed.
To restore from incremental backups, the last full backup and
all incremental backups done since are required.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1133
Setting Default Backup and Restore Options for Exchange 5.5
Item Description
Mailbox method: FULL - Back up messages. Reset archive bit. Select this to
back up all messages in the selected mailboxes. This option is
set by default.
A time/date stamp placed in each folder indicates the
messages have been backed up.
COPY - Back up messages. Select this to back up all messages
in the selected mailboxes. A time/date stamp is not used, so
incremental and differential backups are not affected.
Use the copy method to make a full backup of the mailboxes
without disturbing the state of ongoing incremental or
differential backups.
DIFFERENTIAL - Back up changed messages. Select this to
back up all of the messages that have been created or
modified in the selected mailboxes since the last full backup.
The time/date stamp placed on the folders during the last full
backup is used to determine which messages have been
modified since, but the time/date stamp is not updated
during the differential backup.
INCREMENTAL - Back up changed messages. Reset archive
bit. Select this to back up only the messages that have been
modified in the selected mailboxes since the last full or
incremental backup.
The time/date stamp placed on the folders during the last full
or incremental backup is used to determine which messages
have been modified since, and the time/date stamp is
updated during the differential backup.
Item Description
Enable single instance Select this to back up only a single copy of all identical message
backup for message attachments. When an identical attachment is found, a reference
attachments to the attachment is retained and the actual attachment is backed
up at the end of the backup set.
Enabling single instance backup for message attachment
increases backup performance since duplicate attachments are
backed up only once.
Disable this option if you want each message attachment backed
up and kept in order on the backup set.
Exchange
running the job again will not back up the same
Agent
messages and attachments. You must run a full
or copy backup to ensure that all messages and
attachments are backed up completely.
Restore 5.5
No loss restore (do not Select this to preserve the existing transaction logs on Exchange
delete existing 5.5. Transaction logs on the storage media are then restored and
transaction logs) added to the existing set of transaction logs on Exchange 5.5.
When the restore operation finishes, Exchange 5.5 automatically
updates its databases with the uncommitted transactions found in
the existing and newly restored transaction logs. This option is
selected by default.
Restore public folder Select this to restore only the Information Store’s public database
(PUB.EDB). Although this database cannot be backed up
separately from the Information Store’s private database
(PRIV.EDB), it can be restored separately.
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1135
Setting Default Backup and Restore Options for Exchange 5.5
Item Description
Restore private Select this to restore only the Information Store’s private
mailboxes database. Although this database cannot be backed up separately
from the Information Store’s public database (PUB.EDB), it can be
restored separately.
If the Restore public folder and Restore private mailboxes
options are selected independently, the No loss restore option is
automatically selected and cannot be cleared.
Automatic recreation
Automatically recreate Select this checkbox to recreate the user accounts and their
user accounts and mailboxes if they do not already exist on the target server.
mailboxes Otherwise, the restore job will fail if a mailbox that is being
restored does not exist on the target server.
When this checkbox is selected, the password you entered on the
Exchange page on the Options - Set Application Defaults dialog
box is used as the password for accounts that are recreated.
To change the password, see “To restore Exchange mailboxes and
public folders:” on page 1124.
Note This option applies only if mailboxes are being restored to
their original location. If the mailbox restore is being
redirected, the user account and mailbox must already exist
on the target server.
Password Click this to specify a password to use when user accounts and
mailboxes are automatically recreated on the target server.
See also:
“Restore Options for Exchange 5.5” on page 1119
“Restoring Data” on page 395
Exchange
◆ An Exchange Performance Optimizer settings sheet
Agent
To perform the actual recovery, you will need:
◆ An installed copy of Backup Exec for Windows Servers
◆ The latest full, incremental, and differential backups of the Exchange databases you
want to recover
◆ The Microsoft Exchange Server Installation CD
◆ Any service packs which were applied to the original installation
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1137
Disaster Recovery for Exchange Server 5.5
1. Recover the Windows server first. For instructions, see “Disaster Recovery of a Local
Windows NT Computer” on page 541 or “Disaster Recovery of a Remote Windows
2000/XP/.NET Computer (includes non-authoritative restore of Active Directory for
a domain controller)” on page 549.
Note Make sure you restore the Exchange Server files that existed on all disk partitions.
When the Windows server disaster recovery procedure is complete (after the last
reboot), recover the Exchange server.
Note This step is necessary because the Microsoft Exchange Directory service may hang
when there is no database to use because you have not restored it yet. However, if
you have tools that can kill a process such as KILL or PVIEWER, then kill the
DSAMAIN.EXE process and go to step 4 on page 1139.
a. For Windows 2000, click Start, point to Settings, and then click Control Panel.
Double-click Administrative Tools, and then double-click Services. Right-click
Microsoft Exchange Directory service, and then click Properties. On the General
tab, under Startup, click Disabled, and then click OK.
b. For Windows NT, click Start, point to Settings, and then click Control Panel, and
then double-click Services. Double-click Microsoft Exchange Directory service,
change the Startup Type to Disabled, and then click OK.
Note Upon reboot, a message is displayed stating that not all services could be started.
4. Double-click the Microsoft Exchange Directory service, and then change the Startup
Type to Automatic.
5. Click OK.
8. Catalog the tapes that contain the latest full, incremental, and differential backups of
the Exchange Stores you want to recover.
Exchange
Agent
11. On the restore selections list, select the latest full backups of the Directory and
Information Stores for restore.
12. Select all subsequent incremental Directory and Information Store backups.
If differential backups are to be restored, only the last differential Directory and
Information Store backups (the newest) need to be selected.
13. On the Properties pane, double-click Settings, and then click Exchange.
14. Select the Exchange 5.5 options Restore Public Folder and Restore Private
Mailboxes.
15. Clear the checkbox for the Exchange 5.5 option No loss restore (do not delete
existing transaction logs).
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1139
Disaster Recovery for Exchange Server 5.5
17. After the restore has completed, insert the Microsoft Exchange Server installation CD
into the CD-ROM drive, open a command window, and copy the contents of the
following directory on the Exchange CD:
\setup\<your processor type>\bootenv
to the following directory on your hard drive:
\exchsrvr\mtadata
For example, assuming your Exchange installation is on drive C, your CD-ROM drive
is drive D, and your processor type is Intel, you would type the following in a
command window:
copy d:\setup\i386\bootenv\*.* c:\exchsrvr\mtadata
Note If you use File Manager or Windows Explorer to copy the files, you must remove
the READ ONLY file attribute from the files after you copy them. If you do not
remove this file attribute, the Microsoft Exchange Message Transfer Agent service
will not start.
a. For Windows 2000, click Start, point to Settings, and then click Control Panel.
Double-click Administrative Tools, and then double-click Services.
b. For Windows NT, click Start, point to Settings, and then click Control Panel, and
then double-click Services.
20. Start ALL of the Exchange services that have Automatic as a Startup Type.
This should include:
- Microsoft Exchange Directory
- Microsoft Exchange Information Store
- Microsoft Exchange Message Transfer Agent
- Microsoft Exchange System Attendant
21. After the Exchange server is back online, it is recommended that you use the
Exchange Administrator to run the Directory Store/Information Store (DS/IS)
consistency adjuster in order to resolve any inconsistencies. Results of the consistency
adjustment can be found in the Windows Event Log.
For more information about the DS/IS consistency adjuster, refer to your Microsoft
Exchange Server documentation.
22. After completing the restore, it is recommended that a full backup of the restored
databases be performed.
Exchange
Agent
Appendix H, VERITAS Backup Exec - Agent for Microsoft Exchange Server 1141
Disaster Recovery for Exchange Server 5.5
Expansion
◆ Make sure the robotic arm is set to “Random” mode. Please refer to your robotic
Library
library documentation for more information.
◆ If you have a multi-LUN robotic library, make sure your controller card is set to
support multiple LUNs (if supported).
◆ The SCSI ID of the robotic arm must precede the SCSI address of the drives in the
robotic library.
The following illustration shows an example of a standalone drive and robotic library
configuration.
1143
Setting Up Robotic Library Hardware
Expansion
Library
Note Support for a single robotic library drive is included with Backup Exec for Windows
Servers.
Devices in the
robotic library
Robotic library
Expansion
Library
Make sure that each device in the robotic library is properly associated with the robotic
library.
Make sure the drives in the library appear in the device configuration wizard under the
robotic library in the order matching their drive element address. The drive having the
lowest drive element address should appear at the top of the list.
If a robotic library storage device appears in the list as a stand-alone device, you can
correct the association by clicking and dragging the drive over the robotic library entry.
If this does not work, make sure the SCSI addresses of the robotic library and the storage
device are configured properly.
Note During startup, Backup Exec expects the storage devices in the robotic library to be
empty. If there is media in the device, Backup Exec tries to return the media to its
original magazine slot. If, for any reason, it cannot return the media to the slot, an
error message appears requesting that the media be ejected from the storage device.
See also:
“Setting Up Robotic Library Hardware” on page 1143
“Using the Backup Exec Assistant” on page 82
“Viewing Drive Configuration Properties” on page 119
Robotic library
All slots
Individual slots
Depending upon your robotic library configuration, the first slot could be numbered 1 or
0. If your robotic library uses a zero-based slot configuration you can reassign how the
slots are displayed in Backup Exec, by right clicking the Robotic Library in the left pane,
selecting Properties, and then selecting Configuration. Depending on whether your
robotic library begins slot numbering at 0 or 1, specify the appropriate number in the Slot
Base field.
After completing the configuration of your robotic library, you should perform an
Inventory operation to update Backup Exec’s media database.
See also:
“Inventorying Media in Devices” on page 165
Expansion
Library
Oracle Agent
associated data files are backed up. After backup, the tablespace is placed back online, if it
was previously online. When all selected tablespaces have been backed up, the archive
redo logfiles are backed up to the same backup set. Backing up the archive redo logfiles
after the tablespace is placed online again gives you the ability to restore the tablespace to
the state at which the tablespace backup was completed.
Note The Oracle Agent takes advantage of the Oracle Database Service’s ability to create
a copy of a database’s control file while the database is online. Using this feature,
the agent can back up the copy of the database’s control file while the database is
actually being backed up online.
1151
Requirements for Using the Oracle Agent
Oracle Tablespaces
Item Description
Data files that comprise the tablespace appear as files within the
appropriate tablespace directory entry. The datafile path is stored as
part of the file name, so Backup Exec changes the display of the file
names so that backslashes (\) display as forward slashes (/) and
colons (:) display as vertical bars (|).
For Oracle 8.1.x and above, do not select a temporary tablespace with
local extent management for backup. There is no need to back up
temporary tablespaces with local extent management because they
are used by Oracle only for the duration of a session and are not
recognized during media recovery. Oracle Agent
Archived Logfiles The Oracle Agent creates a directory entry named {Archived
Logfiles} in the root directory of the agent device. During a backup
operation the Backup Exec administration console does not display
any files within this directory. However, the Backup Exec job server
has access to the actual Oracle archived redo logfiles when a backup
operation takes place.
Item Description
Control File Backup The Oracle Agent creates a directory named {Database Control File}
in the root directory of the agent device. The Backup Exec
administration console does not display any files within this
directory, but the Backup Exec job server will see and back up the file
called Becf<Sid_Name>.bak from this directory.
Be sure to replace USERNAME with the assigned login user name and PASSWORD with the
appropriate password.
create user USERNAME identified by PASSWORD;
grant dba to USERNAME;
After all of the commands have been entered, the assigned user will have the appropriate
rights needed to protect the database.
Note Archivelogs can be replicated to another machine for safe storage and duplication.
For more information on Archivelog replication, please see the Oracle
documentation.
shutdown;
3. Start the database service without mounting the database. Type the following
command:
startup nomount;
4. Open the database and mount it in exclusive mode. Type the following command:
6. Open the database and mount it for general use. Type the following command:
alter database open;
7. IMPORTANT: To enable Automatic Archival, you must edit the Oracle instance
initialization parameter file (default Init<SID>.ora where <SID> is the name of the
instance).
The following item must be specified:
log_archive_start = true
8. You may also specify the directory where Oracle will create the Archived log files
(LOG_ARCHIVE_DEST). If this parameter is not specified in the Oracle parameter
initialization file, Oracle will use the default value of $Oracle_Home\RDBMSxx. You
can specify the archive redo logfile location by setting LOG_ARCHIVE_DEST to the
appropriate path.
log_archive_dest = \orant\database\logs
Note Each time a tablespace is backed up, an archive redo logfile is created and backed
up. Over time, you may want to delete older archived redo logfiles to help save
hard drive space. By default the Oracle installation maintains two instances of redo
logs, but recommends three copies of them. Please see the Oracle documentation for
more information.
2. After each database has been shut down, type the following command to bring each
of them back online:
startup;
3. Verify that Automatic Archival is enabled and the database log is in ARCHIVELOG
mode by typing the following command:
archive log list;
You should see:
Database Log Mode ARCHIVE LOG
Automatic Archival ENABLED
If either parameter is not set correctly, shut down the database and set it correctly.
Oracle Agent
1. Take the non-SYSTEM tablespace that contains the data file offline.
2. Use either the Rename Datafile dialog box of Enterprise Manager/GUI or the SQL
command ALTER TABLESPACE with the RENAME DATAFILE option to change the
filenames within the database.
For example, the following statement renames the datafile 'FILENAME' to
'D:\Orant\Database\Filename' in the tablespace USERS:
ALTER TABLESPACE users RENAME DATAFILE filename
TO 'd:\orant\database\filename';
Note If you have multiple Oracle SIDs (databases) on an Oracle database server, and you
want to protect them all, you must run the Oracle Agent Configuration Utility and
add a configuration definition for each Oracle SID that resides on the Oracle database
server. Oracle SIDs are limited to four characters in length in Oracle 8.0.x and to
eight characters in Oracle 8i and 9i.
Oracle Agent
Note The Oracle Agent must be installed on the media server. If Backup Exec is not
already installed, see “Installing Backup Exec” on page 41.
1. At the Oracle database server, map a drive letter to the volume on the media server
that contains the Backup Exec Oracle Agent software. The default location for the
agent is:
\Program Files\VERITAS\Backup Exec\NT\Agents\Oracle\<Lang>
2. Double-click Setup.exe.
Note The Oracle Agent Configuration Utility displays automatically after you install the
Backup Exec for Windows Servers Agent for Oracle Server. If you closed the
Configuration utility before setting it up, you can reopen it. To open the Oracle
Agent Configuration Utility at the Oracle database server, click Start, and then point
to Programs. Then click VERITAS Agent for Oracle Server Configuration Utility.
General tab
Item Description
Confirm Retype the password you typed in the Password field. You must Oracle Agent
provide exactly the same password in the password Confirm field
as you did in the Password field.
Item Description
Configured Media Lists the Backup Exec media servers on your network that will
Servers have access to this Oracle Agent. At least one media server should
be listed.
All Backup Exec media servers that appear in this list can be used
to process backup and restore jobs from the Oracle database
server running the Oracle Agent.
When entering a media server, click Add and then type either
a media server’s host name or its TCP/IP address.
To remove a media server from the list, click the host name or
the address of the machine you want to remove, and then
click Remove.
2. Click Database.
3. Click Add to add the Oracle SID (unique identifier) of the databases residing on your
Oracle database server.
Item Definition
SID Name The SID of an Oracle database residing on the database server.
The SID can be up to four characters in Oracle 8.0.x and up to
eight characters in Oracle 8i and 9i. Oracle SIDs refer to the
unique identifier or name of each Oracle Database on the Oracle
Server. The Oracle Agent requires the exact Oracle SID identifier
to be configured in order to connect to and backup the Oracle
databases.
User The Oracle user account name you want the agent to use when
logging in to the Oracle server.
Note The user account must have specific rights for the agent to
function properly. For more information, see “Creating a
New Oracle User Account for the Oracle Agent” on
page 1154.
Password The password for the user account you want the Oracle Agent to
use when logging on to the Oracle database server.
Archived Logfile The path of the Archive Logfile location for this SID. Make sure
Location the directory you choose actually exists. You can click Browse to
set the archived logfile path.
Control File Backup The path where the backup copy of the Database Control File is
Location created. Make sure the directory you choose exists.
5. Click OK.
Oracle Agent
▼ To configure a media server’s host name or IP address for use with the Oracle
Agent:
1. At the Oracle database server, click Start, point to Programs, and then click VERITAS
Agent for Oracle Server Configuration Utility.
3. Click Add.
5. Click OK.
To add additional media servers, repeat steps 3-5.
6. Click the Database tab and add one or more SID definitions.
7. Click OK to save your configuration information and configure the Oracle Agent as a
system service. Following configuration, the service is started.
The Oracle Agent is now ready for use.
Note For Oracle 8.1.x and above, do not select a temporary tablespace with local extent
management for backup. There is no need to back up temporary tablespaces with
local extent management because they are used by Oracle only for the duration of a
session and are not recognized during media recovery.
Oracle Agent
1. At the media server, start Backup Exec.
3. In the Backup Selections pane, expand Remote Selections, and then expand Backup
Exec Agents.
5. Expand the Oracle database server that you want to back up.
If you have previously password-protected the Oracle Agent, a Backup Exec Attach
To dialog box appears. Type the password and click Attach.
6. In the Results pane, click the check box preceding the Oracle database you want to
back up.
A check mark appears in the box, indicating that the complete database, including all
tablespaces, control files, and archived logfile data will be backed up.
7. Complete the backup settings as normal. For more information, see “Creating a
Backup Job” on page 235.
Caution When backing up an individual tablespace, make sure you also select the
ARCHIVED LOGFILES folder for backup.
Note For Oracle 8.1.x and above, do not select a temporary tablespace with local extent
management for backup. There is no need to back up temporary tablespaces with
local extent management because they are used by Oracle only for the duration of a
session and are not recognized during media recovery.
3. In the Backup Selections pane, expand Remote Selections, and then expand Backup
Exec Agents.
5. Expand the Oracle database server that contains the database you want to back up.
If you have previously password-protected the Oracle Agent, a Backup Exec Attach
Oracle Agent
To dialog box appears. Enter the password and click Attach.
6. Expand the Oracle database that contains the tablespace you want to back up.
A list of tablespaces, along with the Database Control File folder and the Archived
Logfiles folder appears.
7. Click the box preceding the tablespace folders you want to back up. Make sure you
also select the {Archived Logfiles} folder.
A check mark appears in the box, indicating that only the specified tablespaces, along
with the Archived Logfile data, will be backed up.
Caution When creating Oracle database restore jobs, you must always select the option
Restore Over Existing Files. To access this option, on the navigation bar, click
Restore. And then under Settings, click General.
Oracle Agent
The following procedure is used when the database is operational, but you want to restore
the entire database to a prior state for which you have an online backup.
Restoring an online database requires you to run two separate restore jobs. First, restore the
database’s Archived Logfiles directory. Second, restore each of the database’s tablespaces,
which completes the database recovery.
After each tablespace is restored, the Oracle Agent automatically attempts to perform
media recovery for the tablespace. If the media recovery is unsuccessful, the agent creates
an application event log entry with the specific Oracle error code.
Note A database’s system tablespace cannot be restored while the database is online. The
system tablespace can only be restored to a closed database.
1. Make sure that the Backup Exec Oracle Agent has been loaded and is running on the
Oracle database server.
5. Determine which system you want to restore and expand the view to reveal backup
sets that contain either tablespaces and/or logfiles.
6. Click the box preceding the {Archived Logfiles} directory from the appropriate
backup set.
1. After restoring the {Archived Logfiles} directory, on the navigation bar, click Restore.
3. Determine which system you want to restore and expand the view to reveal backup
sets that contain either tablespaces and/or logfiles. Clicking a backup set in the left
pane reveals the set’s contents in the right pane.
4. Click the backup set from which you restored the {Archived Logfile} directory.
Oracle Agent
Note If you cannot close the database using the normal shutdown command, you can
close the database using the Oracle Enterprise Manager Shutdown Abort mode of
the Shutdown Database dialog box, or the SHUTDOWN command with the
ABORT option.
4. Determine which system you want to restore and expand the view to reveal backup
sets that contain either tablespaces and/or logfiles. Clicking a backup set in the
restore selections pane reveals the set’s contents in the results pane.
5. Determine which backup set contains the entire Oracle database you want to restore.
6. Create a restore job by clicking the check box preceding the backup set you want to
restore.
A corrupted or deleted tablespace usually results in the following error when the database
is initialized:
Tablespace recovery can also be performed with the Oracle Agent when either of the
following conditions exist:
◆ An empty copy of the missing data file cannot be created because the original file was
created after the logfiles had been reset.
◆ An old version of the data file cannot be found and restored using a closed database
restore procedure.
2. Make sure the database is mounted using an exclusive mount, but is not open.
6. Click the database backup set from which you want to restore.
8. Restore as normal.
9. When the restore job completes, move back to the Oracle database server.
10. Start the Oracle Server Manager and connect as System, as a SYSDBA.
12. After the recovery of the database completes, shut down and restart the database.
1. Re-install Windows on the Oracle database server. During the re-install process,
install Windows into a temporary directory that you can delete after your Oracle
database server is running.
2. At the media server and using the storage media containing the full Oracle database
server file system backup, restore the entire contents of the media to the Oracle
database server using Backup Exec.
4. Restore your last full closed Oracle database backup and start your database.
Your database is now operational. To bring your database up-to-date, restore your
most recent online Oracle database backup.
5. At the media server, run another restore operation. This time, use the Oracle Agent to
restore the storage media containing all of the Oracle tablespace data files.
6. When the restore operation completes, move to the Oracle database server and start
the Oracle Server Manager.
9. After the recovery of the database completes, type alter database open
resetlogs.
10. After the command completes, shut down and restart the database.
Your Oracle database server should now be restored to full working order.
11. Delete the temporary directory containing the copy of Windows that was used to
initially boot the computer.
Disaster recovery of the Oracle database server is now complete.
See also:
“Restoring an Online Oracle Database” on page 1170
“Restoring Individual Tablespaces” on page 1172
1. Re-install Windows on the Oracle database server/media server. During the re-install
process, install Windows into a temporary directory that you can delete after your
Oracle database server/media server is back up and running.
4. Restore the entire contents of the media containing the full server file system backup.
This restore operation restores your original Windows system, along with any
services required to run your Oracle databases.
6. Run another restore operation. This time, use the Oracle Agent to restore the media
containing all of the Oracle tablespace data files.
7. When the restore operation completes, start the Oracle Server Manager.
9. Type Recover.
10. After the recovery of the database completes, shut down and restart the database.
Your Oracle database server/media server should now be restored to full working
order.
11. Delete the temporary directory containing the copy of Windows that was used to
initially boot the computer.
Disaster recovery of the Oracle database server is now complete.
See also:
“Disaster Recovery Prerequisites” on page 1174
“Restoring Individual Tablespaces” on page 1172
Unable to access database control file Verify that the specified directory is correct and
backup location = “%1” exists.
If the specified directory is incorrect, use the
Oracle Agent Configuration Utility to set the
correct location for the backup copy of the
database control file.
Unable to access archived log file location = Verify that the specified directory is correct and
“%1” exists.
If the specified directory is incorrect, use the
Oracle Agent Configuration Utility to set the Oracle Agent
correct location of the archive redo logfiles.
System service error “%1” The Oracle Agent was not installed correctly or
its system service control parameters have been
corrupted.
Uninstall and then re-install the Oracle Agent.
(ALTER TABLESPACE “%1” BEGIN BACKUP) The Oracle Agent was unable to complete the
failed. Oracle Status = “%2” command.
(ALTER TABLESPACE “%1” OFFLINE Check the Oracle database server code
IMMEDIATE) failed. Oracle Status = “%2” documentation for information about the
(ALTER TABLESPACE “%1” END BACKUP) particular status code.
failed. Oracle Status = “%2”
(ALTER TABLESPACE “%1” ONLINE) failed.
Oracle Status = “%2”
Unable to access Oracle datafile (%1). Oracle The Oracle Agent is unable to access the named
data files must be defined using a full path datafile.
specification! Verify that the datafile was defined using a fully
specified path.
Unable to logon to the Oracle server. Make sure that the Oracle user name and
Oracle user account name “%1” password are valid for this Oracle account.
This event will also occur if another instance of
Backup Exec for Windows Servers attempts to
access the Oracle Agent when the Oracle
database instance is shut down.
Unable to resolve the Oracle service name for Verify that the Oracle SQL Net configuration
SID = “%1” (Tnsnames.ora) has been set up properly for the
named SID.
Lotus Domino
Agent
1179
Lotus Domino Agent Requirements
Caution If transaction logging is enabled and you have Lotus Domino Release 5.0.3 or
earlier, the transaction log to which the Lotus Domino server is actively writing
transactions cannot be completely backed up. This may result in data loss
during a restore operation.
Following are the requirements for backing up Lotus Domino database files residing on
the media server, or for remote Windows computers and workstations.
If the Lotus Domino files you want to back up are on the local media server, the server
must have:
◆ Backup Exec for Windows Servers
◆ An Intel-compatible processor
◆ The Lotus Domino data directory on the Lotus Domino server
If the Lotus Domino files you want to back up are on a remote computer, the remote
computer must have:
◆ Windows operating system
◆ Backup Exec Remote Agent for Windows Servers
◆ An Intel-compatible processor
◆ Corresponding Windows Administrative Share for each volume that contains Lotus
Domino databases
◆ The Lotus Domino data directory on the Lotus Domino server
Following are requirements for backing up Lotus Domino transaction logs:
◆ Transaction logging must be enabled to perform differential and incremental backups
and to perform point in time recovery.
◆ The Lotus Domino logging style must be set to archive if you want to back up the
transaction logs.
See also:
“Viewing and Selecting Lotus Domino Databases” on page 1182
❖ On the navigation bar, click Backup, and then in the selections pane, expand Lotus
Domino Databases. All of the Lotus Domino data found on the local server is listed by
volume under the Lotus Domino Databases icon.
Note Lotus Domino transaction logs do not appear under the Lotus Domino Databases;
however, when the database is selected for backup, the transaction logs will
automatically be included.
❖ Select the check box next to the volume to choose all of the databases in a volume, or
expand the volume and select specific folders and databases. When selecting
databases to back up, the databases must be local to the Lotus Domino server.
The following file types appear in the view for the Lotus Domino server:
◆ filename.nsf - Lotus Domino database files
◆ filename.ntf - Lotus Domino template files
◆ filename.box - shared mail database
◆ filename.dsk - cache files
You must back up all of these files in order to properly recover Lotus Domino
Databases.
Only database files appear under the Lotus Domino Databases view. Domino
Program files and other files such as.id and notes.ini appear in the volume in which
the Lotus Domino Program directory is located. They must be backed up separately as
part of a system backup.
4. If necessary, click the domain that contains the Lotus Domino installations, and then
click the computer in which the Lotus Domino database is located.
A list of shared network directories appears, along with an icon that represents the
Lotus Domino Databases.
See also:
“Backing Up Lotus Domino Databases” on page 1185
“Restoring Lotus Domino Databases” on page 1189
“Preparing for Disaster Recovery on a Lotus Domino Server” on page 1195
3. Select Lotus Domino backup default options. For more information, see the Backup
job properties for Lotus Domino databases table in the “Backup Options for Lotus
Domino Databases” on page 1187 section.
4. Select Lotus Domino restore default options. For more information, see the Restore job
properties for Domino databases table in the “Restore Options for Lotus Domino
Databases” on page 1192 section.
5. Click OK to save the options or select other options from the Properties pane.
◆ Local Databases. Lotus databases are considered Local when they cannot be found in
the Domino data directory, cannot be shared, and cannot be logged. This type of
database requires a backup of the database itself when using any of the Lotus Domino
R5 backup methods. The database can be restored only to the point of the latest
database backup.
Caution When circular logging is enabled, the circular transaction log cannot be backed
up, which could result in the loss of changes made to the database since the last
backup was performed.
Caution All Lotus Domino databases and transaction logs that reside on single or
multiple volumes must be backed up by the same media server. In addition,
you should back up a Lotus Domino server simultaneously from multiple
media servers.
Lotus Domino
Agent
Item Description
Backup method: Full - Back up Database and Logs - Reset Archive Bit. Select
this to back up all the selected databases. To properly back up
your Lotus Domino data, you should perform regular full
backups of the database. This backup method should also be
used when the DBIID for the database has changed since prior
transactions cannot be applied to the new database.
Differential - Changed Database and Logs. Select this to back
up files that were modified since the last Full backup. This
backup method is smaller and faster than a Full backup
because only archived transaction logs, unlogged databases,
and logged databases with DBIIDs that have changed will be
backed up.
Incremental - Changed Database and Logs - Reset Archive
Bit. Select this to back up files that were modified since the last
Full or Incremental backup. This backup method is smaller and
faster than a Full backup because only archived transaction
logs, unlogged databases, and logged databases with DBIIDs
that have changed will be backed up.
Item Description
Mark archive logs for Select this check box to reuse the transaction log after it has been
recycling backed up.
Backup Exec will not delete the transaction log. Selecting this
option only indicates that the transaction log is ready to be reused
after it has been backed up successfully; the Lotus Domino server
actually deletes the transaction logs.
If the option is selected when you perform a differential or
incremental backup job, transaction logs that are needed to
maintain the differential backups will be reused. However, it
should be selected regularly to create space for new transaction
logs.
Note This option may not work for Lotus Domino versions prior to
5.0.7. For more information about this limitation of Lotus
Domino, go to the Lotus Domino web site.
4. Start the backup job or select other backup options from the Properties pane.
See also:
“Backing Up Data” on page 233
The recovery process begins automatically after the last database is copied to the server.
The database is restored to a point in time using transactions from the required
transaction logs. Required transaction logs that were backed up and recycled are also
included in the recovery process. After the recovery process completes, the Lotus Domino
database is brought online.
If you back up your Lotus Domino databases regularly, then restoring the most recent
backup set containing the Lotus Domino data is all that is required to restore the most
recent backups of your Lotus Domino databases.
Note If circular logging is enabled and both the databases and the Domino transaction
log are lost, the database can only be recovered to the point of the last full backup.
Lotus Domino data is usually contained in the most recent backup set. However, some
subsequent differential or incremental backup jobs run after a full backup job may not
contain data in the backup set because only the transaction log was backed up. If the data
you want to restore is not located in the most recent backup set, check the previous
backup sets until you find the data.
Note If a new DBIID has been assigned to databases and you run a differential or
incremental backup, the data will be contained in the most recent backup set since
transactions with the new DBIID will not match the old DBIID.
For example, LD Server has a Full Backup 0001 and a Differential Backup 0002. If you
decide you want to restore data from Differential Backup 0002, you may select the Data
directory and find that it is empty.
The data backed up for Differential Backup 0002 is actually contained in the transaction
log backup set. To restore the data, you must select it from the previous Full Backup 0001.
The transaction logs from Differential Backup 0002 will be used to bring the database up
to date.
Lotus Domino
Agent
Option Description
Seconds to wait for the Enter the number of seconds for the restore process to wait for a
database to go offline database that is in use. When a Lotus database is restored it must
first be taken offline. This will ensure that the database is not being
accessed, closed, or deleted while the restore operation is being
processed. If the database is still in use and cannot be taken offline
after the specified wait time, the restore will fail.
Database Identification
Retain original IDs Select this option to restore the original database IDs.
Assign new database ID Select this option to assign new IDs to the database.
Assign new database ID Select this option to assign new IDs to the database. A replica ID is
Lotus Domino
and replica ID used to synchronize two or more databases that are being
replicated in the Lotus Domino environment. You can assign a new
Agent
Option Description
Point in time restore Select this option to enter a date and time in which to restore the
database. The option is only available for logged databases when
the archive logging style is set. Backup Exec will restore the Lotus
Domino database you selected in the Restore selections dialog box
and then automatically restore the necessary transaction logs
required to bring the databases up to the date and time specified.
If a point in time is not specified, the databases will be restored up
to the last committed transactions in the log file.
Caution If your Lotus Domino database is replicated, the databases on each machine
must have identical database and replica IDs. If you want to ensure that the
databases continue to be replicated after the restore, select the Retain original
IDs option.
4. Start the restore job or select other options from the Properties pane.
See also:
“Restoring Data” on page 395
“Lotus Domino Transaction Logs” on page 1186
1. Select the media that contains the data you want to restore.
4. After selecting options on the Restore Job Properties dialog box, on the Properties
pane, under Destination, click File Redirection.
6. Select the drive to which you are restoring in Restore to drive. You cannot enter the
name of the drive, you must make a selection.
7. Enter the logon account for the server in Server logon account.
9. Enter the logon account for the path in Path logon account.
10. Start the redirection job or select other restore options from the Properties pane.
See also:
“Restoring Data” on page 395
“Configuring Logon Accounts” on page 347
Note If transaction logging is enabled on the Lotus Domino server, go to the section that
contains the steps for disaster recovery for the style of logging selected on the
server.
System recovery can be performed manually (see “Disaster Preparation and Recovery” on
page 531) or with Backup Exec’s Intelligent Disaster Recovery option (see “VERITAS
Backup Exec - Intelligent Disaster Recovery Option” on page 855).
After rebuilding the server, you can restore the databases from your most recent backup.
1. Restore or re-install the Lotus Domino server program directory to the same location
as before the disaster occurred.
2. Restore the notes.ini, cert.id, and server.id files from the last full backup of the Lotus
Domino server program directory.
3. Use the Lotus Domino Agent to restore the databases to the Domino data directory.
▼ To recover the Lotus Domino server, databases, and transaction logs when archive
logging is enabled:
1. Restore or re-install the Lotus Domino server program directory (excluding the
notes.ini, cert.id, and server.id files) to the same location as before the disaster
occurred.
3. Check that the transaction log directory (logdir) is created and does not contain old
files.
If the log directory was not created, recreate the directory to the same location as
before the disaster occurred.
4. Restore the last transaction logs from the last backup to the logdir directory.
Caution Do not start the Lotus Domino server after performing the previous steps.
5. Restore the notes.ini, cert.id, and server.id files from the last full backup of the Lotus
Domino server program directory.
6. To have Lotus Domino create the control file when the server starts, set the following
parameter in the Notes.ini file:
translog_recreate_logctrl=1
Note If you enter the translog_recreate_logctrl=1 parameter on the last line in the
Notes.ini file, you must press <Enter> after the parameter.
7. Use the Lotus Domino Agent to restore the databases to the Domino data directory.
Lotus Domino
Agent
▼ To recover the Lotus Domino server and databases when circular logging is
enabled:
1. Restore or re-install the Lotus Domino server program directory (excluding the
notes.ini, cert.id, and server.id files) to the same location as before the disaster
occurred.
2. Check that the log directory (logdir) is created and does not contain old files.
If the log directory was not created, recreate the directory to the same location as
before the disaster occurred.
Caution Do not start the Lotus Domino server after performing the previous steps.
3. Restore the notes.ini, cert.id, and server.id files from the last full backup of the Lotus
Domino server program directory to the same location as before the disaster occurred.
4. To have Lotus Domino create the circular log file in the log directory (created in
step 2) when the server starts, set the following parameter in the notes.ini file:
translog_path=logdir
5. Use the Lotus Domino Agent to restore the databases to the Domino data directory.
See also:
“Restoring Data” on page 395
“Restore Options for Lotus Domino Databases” on page 1192
Note You must always use SAPDBA or CCMS to run database-related operations.
When the job is complete, the Backup Exec server writes a standard job log, as it does for
any submitted job. You can view this job log using the standard Backup Exec
administration console (remote or local). The BACKINT executable also sends the results
of the operations to the SAP R/3 tools. When a job is initiated by SAPDBA or CCMS, a job
log with an eight-character name is created to represent that job. The R/3 system stores
that job log in a directory:
<x>:\Oracle\<SID>\sapbackup
1199
where <x> is the database installation drive and <SID> represents the system ID of the
Oracle instance. This file is a plain ASCII text file that you can view with any text editor.
A file called Backint.mdb that correlates the R/3 catalog with the Backup Exec catalog is
maintained in the Usr\<SID>\sys\exe\run directory. You must be able to restore this
file in order to restore data to the R/3 server using the Backup Exec R/3 Agent.
The Backup Exec R/3 Agent is capable of supporting multiple media servers running on
the same network.
See also:
“Backup Exec R/3 Agent Security” on page 1200
Note The Backup Exec R/3 Agent does not support data stored on RAW partition types.
See also:
“Installing the Backup Exec R/3 Agent” on page 1201
“Backup Exec R/3 Agent Security” on page 1200
If this is the initial installation of Backup Exec, see “Installing Backup Exec” on
page 46.
To install the Backup Exec R/3 Agent, see “Installing Backup Exec Options on a Local
Server” on page 49.
Appendix L, VERITAS Backup Exec - Agent for R/3 for Oracle Server 1201
Using the R/3 Agent to Back Up the R/3 Database
Note All scheduled jobs must be handled by the R/3 database management system. Any
attempt to schedule jobs not using the R/3 database management system can
potentially damage your database. For more information on how to check or
perform this operation, consult the R/3 User Manual or your Oracle Server
Administrator's Guide.
The backup utility parameter file is used for every backup job submitted to Backup Exec
from the SAPDBA or CCMS console. If you are directing the backup job to a remote media
server, you must edit the backup utility parameter file and change the “Server” entry to
reference the media server. If a “Server” entry is not supplied, the backup will be
submitted to the local server.
You can also create a new .ini file to use with specific jobs. You specify which .ini file is to
be used when you submit the job from the SAPDBA or CCMS console. Any valid file
name or location can be specified as long as you enter the complete file specification.
Note All Backup Exec options not specified in the .ini file will use the values and defaults
specified by the media server.
2. Edit any of the following options in the Biparam.ini file to configure the media server.:
Server=<server name> To specify a Backup Exec server to perform this backup job.
Note Restore jobs are automatically directed to the Backup Exec
server from where the original backup was executed.
The default is the local machine.
Appendix L, VERITAS Backup Exec - Agent for R/3 for Oracle Server 1203
Using the R/3 Agent to Back Up the R/3 Database
Description=<backup set To specify a name for the next backup set description.
name> The default is a backup set description automatically specified by
Backup Exec, which is an incremental number of the backup sets
created since the installation of Backup Exec; for example, Backup
0020.
Compression = <backup To specify the backup compression mode. Allowable values are:
compression mode> Best - Use hardware compression; if not available, then use
software compression.
Hardware - Use hardware compression; if not available, then
use no compression.
Software - Use software compression.
None - Use no compression.
The default is Hardware.
Print Log=<> To toggle the printing of job history job log information after a
backup job completes.
The default is off.
See also:
“Backing Up the R/3 Database” on page 1205
“Restoring the R/3 Database” on page 1206
“Backup Exec Alerts and the BACKINT Interface” on page 1200
Note The Backup Exec R/3 Agent does not support concurrent backup or restore
operations. Attempting to back up or restore the same R/3 database from more than
one media server at a time causes the operations to fail.
Note If the BACKINT interface is in unattended mode, any alert that requires a response
from you causes the backup job to fail. You can start the backup job in attended
mode by setting Confirm backup parameters to Yes in the Backup Database screen
of SAPDBA.
1. From the SAPDBA console, select the appropriate backup option (database or archive
logs).
2. Select Backup Device Type, and then select util_file for an offline database backup or
select util_file_online for an online database backup.
3. Select Backup utility parameter file, and then enter the full path to the Biparam.ini
file (or any other .ini file you created), including the file name.
4. Press <Enter>.
5. Verify that you have selected the correct backup type for the utility file type you
specified (online, offline, etc.).
Appendix L, VERITAS Backup Exec - Agent for R/3 for Oracle Server 1205
Restoring the R/3 Database
2. Select Restore Type, and then select the catalog that you want to restore.
Note Restore jobs are automatically directed to the Backup Exec server from where the
original backup was executed.
4. When the restore operation completes, open the SAPDBA or CCMS console, and
select Check and Repair Database.
Appendix L, VERITAS Backup Exec - Agent for R/3 for Oracle Server 1207
Disaster Recovery Using the Backup Exec R/3 Agent
1. Re-install Windows on the R/3 database server. During the re-install process, install
Windows into a temporary directory that you can delete after your R/3 database
server is back up and running.
2. At the media server, and using the storage media containing the FULL flat file R/3
database server file system backup, restore the entire contents of the media to the R/3
database server using Backup Exec.
4. If you have a full offline R/3 database backup, restore your last full offline R/3
database backup and start your database. If you do not have a full offline database
backup, skip this step and proceed to step 5.
Your database is now operational.
5. Restore the Backint.mdb file from the latest full server backup. This file correlates the
R/3 catalog with the Backup Exec catalog.
6. To bring your database up-to-date, restore your most recent online or offline R/3
database backup.
7. At the media server, run another restore operation. This time, use the Backup Exec
R/3 Agent to restore the storage media containing all of the R/3 tablespace data files.
8. When the restore operation completes, open the SAPDBA or CCMS console, and
select Check and Repair Database.
3. Recatalog the media containing the full flat file R/3 database server file system
backup, and the media containing the R/3 database tablespace data files.
4. Restore the entire contents of the media containing the full flat file server file system
backup. This restores your original Windows system, along with any services
required to run your R/3 database.
6. Restore the Backint.mdb file from the latest full server backup. This file correlates the
R/3 catalog with the Backup Exec catalog.
7. Run another restore operation. This time, use the Backup Exec R/3 Agent to restore
the media containing all of the R/3 tablespace data files.
8. When the restore operation completes, open the SAPDBA or CCMS console, and
select Check and Repair Database.
Appendix L, VERITAS Backup Exec - Agent for R/3 for Oracle Server 1209
Disaster Recovery Using the Backup Exec R/3 Agent
Agent
SharePoint Portal Server M
The SharePoint Agent enables network administrators to perform backup and restore
operations on SharePoint Portal Server installations that are connected to a network.
SharePoint backups can be integrated with network backups without separate
administration or dedicated hardware. You can back up and restore the SharePoint Portal
Server, an entire SharePoint workspace, or the individual documents that are contained in
the SharePoint workspaces. If you choose to back up the individual documents, you can
quickly restore them without restoring the entire SharePoint Portal Server.
When you are backing up the SharePoint Portal Server, the SharePoint Agent includes the
following data in the backup:
◆ Microsoft Web Storage System files, which include database files, log files, and
backup patch files
◆ Microsoft Search Service (MSSearch) system resources, which include the property
store, subscriptions store, full-text index files, and propagated indexes
◆ SharePoint Portal Server configuration information, including Web Storage System
configuration information, content source information, server properties, and access
accounts
◆ The Applications folder, which contains a subfolder for each workspace on the server
◆ Shortcuts or content sources that reference the local file system
◆ Individual documents that are contained in the workspaces
SharePoint Agent does not back up the following data:
◆ Content source crawls (a content source is a URL that SharePoint Portal Server uses as a
starting point to search, or crawl, for content in documents stored outside the
workspace) scheduled using Microsoft Windows 2000 Scheduled Tasks
◆ Scheduled tasks for processing subscriptions
1211
Requirements for the SharePoint Agent
◆ Gatherer logs
◆ Lotus Notes configuration information
For more information about the various types of data stored on SharePoint Portal Server,
see your Microsoft SharePoint Portal Server documentation.
See also:
“Requirements for the SharePoint Agent” on page 1212
“Installing the SharePoint Agent” on page 1213
“Backing Up a SharePoint Portal Server or Workspace” on page 1213
“Restoring SharePoint Portal Servers and SharePoint Portal Workspaces” on
page 1215
“Redirecting SharePoint Portal Server Restore Jobs” on page 1217
“Disaster Recovery of a SharePoint Portal Server” on page 1221
SharePoint
To install the SharePoint Agent, see “Installing Backup Exec Options on a Local Server” on
Agent
page 49.
To install the Backup Exec for Windows Servers Remote Agent, see “Installing Backup
Exec Remote Agents and Options on Remote Servers” on page 54.
3. From the Backup Selections pane, and under Local Selections, expand Microsoft
SharePoint Portal Workspaces. If SharePoint Portal Server is installed remotely,
expand Remote Selections.
4. Select the folders and/or documents in the workspace that you want to back up.
Appendix M, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server 1213
Backing Up a SharePoint Portal Server or Workspace
5. Start the backup job or select other backup options from the Properties pane.
6. To monitor the operation while it is processing, click Job Monitor on the navigation
bar, and then double-click the job you want to view.
SharePoint
were backed up separately, just the individual documents that are contained in the
Agent
SharePoint Portal Workspaces. You can redirect the restore of a SharePoint Portal Server
to a different server than the one from which it was backed up. In addition, you can
redirect the restore of SharePoint Portal Workspaces to an alternate workspace or file
share.
There are some limitations on what information can be restored in SharePoint Portal
Workspaces. The Microsoft SharePoint Portal Workspaces interface in Backup Exec is
intended to provide backup and restore of individual documents stored in the Documents
subfolder for each workspace and should not be used as a substitute for SharePoint Portal
Server database backup. Many of the other files and folders contained in the workspace
are controlled by the SharePoint Portal Server software and may not restore successfully
into the workspace even though they are available for backup. In addition, when restoring
individual documents, the creation date and modification date properties do not restore.
Note SharePoint Portal Server must be installed on the target server before you can
restore a SharePoint Portal Server.
Caution When you restore a SharePoint Portal Server database, all SharePoint data on
the target server is overwritten.
See also:
“Creating a Manual Restore Job by Configuring Job Properties” on page 404
1. Place the media containing the data you want to restore in the storage device.
3. Navigate to and select the SharePoint Portal Server database you want to restore.
Appendix M, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server 1215
Restoring SharePoint Portal Servers and SharePoint Portal Workspaces
6. To monitor the operation while it is processing, click Job Monitor on the navigation
bar, and then double-click the job you want to view.
1. Place the media containing the data you want to restore in the storage device.
3. Navigate to and select the SharePoint workspace data you want to restore.
6. To monitor the operation while it is processing, click Job Monitor on the navigation
bar, and then double-click the job you want to view.
See also:
“Backing Up Folders and Documents from a SharePoint Portal Workspace” on
page 1213
“Redirecting SharePoint Portal Server Restore Jobs” on page 1217
SharePoint
Caution When you restore a SharePoint Portal Server database, all SharePoint data on
Agent
the target server is overwritten.
1. Place the media containing the data you want to restore in the storage device.
3. Navigate to and select the SharePoint Portal Server database you want to restore.
6. In the Restore to server field, enter the name of the SharePoint server to which you
are restoring. Use the following format: \\servername.
7. Use the default logon account as indicated, or click Change to select a different one.
Appendix M, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server 1217
Restoring SharePoint Portal Servers and SharePoint Portal Workspaces
8. On the Properties pane, select other job properties that might be appropriate for your
environment.
10. To monitor the operation while it is processing, click Job Monitor on the navigation
bar, and then double-click the job you want to view.
After the restore completes, it is recommended that you perform a full backup of the
restored SharePoint Portal Server databases.
See also:
“Backing Up a SharePoint Portal Server or Workspace” on page 1213
“Restoring a SharePoint Portal Server” on page 1215
Caution When you restore SharePoint Portal workspace data, all documents that exist in
the target location are overwritten by those being restored.
1. Place the media containing the data you want to restore in the storage device.
3. Navigate to and select the SharePoint Portal workspace data you want to restore.
6. In the Restore to server field, enter the name of the SharePoint server to which you
are restoring. Use the following format: \\servername.
7. In the Restore to workspace field, enter the name of the workspace to which you are
restoring. If you have not yet created the workspace, you must do so before starting
the restore operation.
SharePoint
Agent
8. Use the default logon account as indicated, or click Change to select a different one.
9. On the Properties pane, select other job properties that might be appropriate for your
environment.
11. To monitor the operation while it is processing, click Job Monitor on the navigation
bar, and then double-click the job you want to view.
See also:
“Backing Up Folders and Documents from a SharePoint Portal Workspace” on
page 1213
“Restoring a SharePoint Portal Workspace” on page 1216
Appendix M, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server 1219
Restoring SharePoint Portal Servers and SharePoint Portal Workspaces
1. Place the media containing the data you want to restore in the storage device.
3. Navigate to and select the SharePoint Portal Server data you want to restore.
5. Check the box labeled Redirect SharePoint Portal document sets, and then select
Redirect to path.
6. Enter the drive letter and path to which you want to direct the restore in the Restore
to drive and Restore to path fields, or click the ellipsis (...) button to browse to the
desired location.
Note You can also enter a UNC path (\\servername\share) in the Restore to drive
field.
7. Use the default logon account as indicated, or click Change to select a different one.
8. On the Properties pane, select other job properties that might be appropriate for your
environment.
SharePoint
10. To monitor the operation while it is processing, click Job Monitor on the navigation
Agent
bar, and then double-click the job you want to view.
See also:
“Backing Up Folders and Documents from a SharePoint Portal Workspace” on
page 1213
“Restoring a SharePoint Portal Workspace” on page 1216
Caution You cannot completely recover a SharePoint Portal Server database using
backups of individual workspaces. You must use a backup of the SharePoint
Portal Server database to complete the disaster recovery.
Appendix M, VERITAS Backup Exec - Agent for Microsoft SharePoint Portal Server 1221
Disaster Recovery of a SharePoint Portal Server
1. Use Add/Remove Programs in the Windows Control Panel to uninstall the SharePoint
Portal Server software. Restart the server when the uninstall operation completes.
2. Insert the SharePoint CD and install the SharePoint Portal Server software to the
desired location using the appropriate options for your environment. When the New
Workspace Wizard starts, click Cancel.
3. If applicable, install any SharePoint Portal Server service packs that were applied to
the original installation.
1. Place the media containing the data you want to restore in the storage device.
6. To monitor the operation while it is processing, click Job Monitor on the navigation
bar, and then double-click the job you want to view.
After the restore completes, it is recommended that you perform a full backup of the
restored SharePoint Portal Server database.
NetWare Agent
servers to perform backup and restore operations on NetWare servers that are connected
to their network. The Backup Exec Remote Agent for NetWare supports NetWare v4.2,
NetWare v5.x, or NetWare 6.x. Because the Remote Agent for NetWare is also a Client
Access License (CAL), it enables you to fully protect your NetWare data and to perform
accelerated backups of NetWare data. You cannot select data and special files on resources
for a remote NetWare server for backup until a Remote Agent has been installed.
The Remote Agent for NetWare is a NetWare Loadable Module (NLM) called
BEREMOTE.NLM, and is installed on the NetWare server. The Remote Agent provides
faster backups by locally performing tasks that in typical backup technologies require
extensive network interaction. For example, instead of waiting for requests and data
packets to be sent between the NetWare server and the media server each time a file is
selected for backup, the Remote Agent processes backup data into continuous streams
that use Novell’s Storage Management Services (SMS) and that the media server then
processes as a single task. The Remote Agent is fully Novell SMS-compliant.
The Remote Agent for NetWare consists of NLMs that execute Target Service Agents
(TSAs) to provide backup support on the NetWare server. When the Remote Agent for
NetWare is installed, the most current versions of the NLMs needed by Backup Exec to
process NetWare-specific requests are copied to the NetWare server.
1223
Requirements for the Remote Agent for NetWare
Tip Your network hardware can have a major impact on performance. For example, an
8-bit Network Interface Card (NIC) in the server does not provide the performance
of a 16- or 32-bit NIC. Bandwidth also plays a major role. For example, 100 Mbps
Ethernet provides much better performance than 10 Mbps Ethernet when running
concurrent remote backups.
Note When configuring 100 Mbps NICs, ensure that all of the components on the
network are using the same duplex setting. Having your NIC cards at full duplex on
a switch that is set to half duplex will severely impact performance.
NetWare Agent
If you already have the latest tested or most recent version of the NLMs installed on
your server, they are not replaced.
◆ The BESTART.NCF and BESTOP.NCF files are created and placed in the SYS:SYSTEM
directory. These files contain commands to load the appropriate NLMs that allow the
NetWare server to be backed up.
Note Backup Exec must already be installed before you can install options to remote
systems. The Remote Agent for NetWare is installed remotely from the Windows
media server.
If you have previously installed the Remote Agent for NetWare on NetWare servers,
run BESTOP from each NetWare console before installing the Remote Agent on
those servers again.
For instructions on installing the Remote Agent for NetWare, see “Installing Backup Exec
Remote Agents and Options on Remote Servers” on page 54.
When Backup Exec is installed, both the TCP/IP and NetWare IPX/SPX protocols are
selected for use by default. You can change the default settings through the Options-Set
Application Defaults dialog box. For more information, see “Default Settings for the
Remote Agent for NetWare” on page 1235.
See also:
“Installing Backup Exec Remote Agents and Options on Remote Servers” on page 54
“Using NetWare 5.x and 6.x in a TCP/IP Only Environment” on page 1226
“Adding BESTART to the AUTOEXEC.NCF File on the NetWare Server” on page 1226
1. Add the command BESTART as the last line in the AUTOEXEC.NCF file so that the
Remote Agent for NetWare is automatically started each time the NetWare server is
booted.
2. After saving the AUTOEXEC.NCF file, reboot the NetWare server in order for the
changes to take effect.
NetWare Agent
or
bestop <Enter> (which unloads all NLMs associated with the Agent)
You can still use the Remote Agent for NetWare to back up the NetWare server when the
Remote Agent is unloaded, but the speed of the backup will be significantly less.
To back up, and restore when necessary, the NDS Tree, you must have a user account on
the NetWare server that has the following rights to the [Root] object of the NDS Tree:
NetWare Agent
Delete Write
Rename Add Self
Inheritable Inheritable
Note White check boxes for these rights will display with black check marks in the
Trustees of [Root] dialog box. With default rights only, these check boxes will be
gray with gray check marks.
As with file system backups, the administrator must consider what might be lost if a
disaster occurs on the day the next full backup is to be performed. Be sure to figure in
the time it will take to rebuild the changes to the directory manually, if just such a
disaster were to occur.
◆ Single administrator - multiple servers strategy. NDS installations that have a single
network administrator (a single object with supervisor rights to the entire directory
database), and multiple servers should rely almost entirely on the built-in replication
features of NDS for fault tolerance. If a disaster occurs on a specific server, NDS
remains intact and available from replicas stored on other servers. When the failed
server is repaired, NDS is reinstalled using Novell’s INSTALL NLM on NetWare 4.1
and NWCONFIG.NLM on NetWare 5.x and later. Replicas are then placed back onto
the server, if required.
The NDS database should still be backed up regularly in case it is needed to replace
objects that have been accidentally deleted.
◆ Multiple administrator strategy. NDS installations that have multiple network
administrators, each with access to only a portion of the directory tree, are faced with
additional challenges when designing a backup strategy. Within this type of
installation, it is rare that an object has full rights to the entire directory tree, as is the
case with many smaller- to medium-sized networks.
Instead, the tree is logically broken into smaller components. For example, partitions
with specific administrators assigned the responsibility to manage each component.
While this type of installation offers the highest level of network security, it brings
with it the most complicated level of disaster recovery.
The best method for implementing fault tolerance should remain partition replication.
Because it is likely that Inherited Rights Filters (IRFs) will be applied at the container
level, a properly replicated directory offers a much quicker restoration in the event of
a disaster. If possible, you should create an object that has full rights as a trustee of the
root of the NDS tree, and perform full backups on the NDS tree, instead of partial
backups. Doing so reduces the complexity of rebuilding NDS in the event of a
disaster.
You should refer to your Novell documentation for more information on configuring
and managing NDS replicas and partitions.
Backup Selections
NetWare Agent
2. Double–click the NetWare computer icon for the NetWare server you want to back up.
NetWare servers should be selected from the Novell Storage Management Services
node. If they are not selected from this node, NDS objects and file attributes will not
be backed up.
When logging on to the NetWare server, you may need to provide a fully distinguished
and typeless name, such as .admin.novell.
A fully distinguished, or complete, name consists of different object types, such as
common name (CN), Organizational Unit (OU) objects, and Organization (O) objects.
When the abbreviations for these objects are not included as part of the object’s
complete name, the naming is referred to as a typeless name. For more information
about complete, partial, typeful, or typeless names, refer to your Novell NetWare
documentation.
3. Click the checkbox preceding the volume icon to select the directories that you want
to back up, or double-click the volume to select directories.
NetWare File System and NetWare Directory Services (Novell Directory) are listed
separately. Each directory that you want to back up must be selected.
The following screen shows a NetWare server (TRINITY) that has both the file system
and the NetWare Directory Services selected for backup:
4. If you want to change the Backup default, on the Properties pane, under Settings,
click NetWare SMS.
5. Select or clear the Backup compressed files in decompressed form option. If you
select this option, Backup Exec decompresses, or expands, compressed files as they
are backed up. If you select this option, the server may run out of memory or disk
space. Also, the backup job will take longer due to the extra time involved in file
decompression.
6. Continue creating the job by following the procedures in “Creating a Manual Backup
Job by Configuring Job Properties” on page 236.
NetWare Agent
objects are stored in a single partition.
However, if information about partitions is available when the restore operation is
performed, objects are restored to the proper partition.
2. Select the data you want to restore. For details on how to select data, see “Selecting
Data to Restore” on page 428.
3. If you want to change the Restore option default, on the Properties pane, under
Settings, click NetWare SMS.
4. Select or clear the Restore volume restriction option. If you select this option, Backup
Exec restores NetWare volume restrictions. Restoring volume restrictions is not
recommended unless you are performing disaster recovery.
5. (Optional) If you want to redirect the restore to another server, under Destination,
click File Redirection and complete the options as described in “Files destination
options” on page 437.
NetWare Agent
1. On the Tools menu, click Options.
Note If using TCP/IP with a NetWare 5.x server, ensure that Enable agents using TCP/IP
protocol is selected. Otherwise, select Enable agents using NetWare IPX/SPX
protocol. For more information about setting default network options, see
“Specifying the Default Backup Network” on page 325.
Item Description
General
Display the following Backup Exec checks the registry for a list of NetWare servers. If
servers the list does not exist, Backup Exec creates it using the
wildcard (*) default so that all servers that advertise using the
Server Advertising Protocol (if IPX/SPX is being used) and the
NetWare Agent
Service Location Protocol (if TCP/IP is being used) can be
seen. Backup Exec displays these servers in this field.
You can manually add or delete servers to or from this list. As
soon as a server is added, all of the servers that were displayed
from the wildcard default are deleted. Only the servers that
are added display in the network resources.
If you are using an IP-only environment and your network is
not configured to allow the use of Service Location Protocol,
you must manually add the servers’ names. For more
information, see “Using NetWare 5.x and 6.x in a TCP/IP Only
Environment” on page 1226.
For these changes to take effect, you must restart the Backup
Exec administration console.
Backup
Restore
a. Click Add.
b. Type the name of the server you want to add, and then click OK.
b. Click Delete.
6. After all servers have been added or deleted, and the NetWare SMS default options
have been selected, click OK.
Note You can use the following options when loading BEDIAG.NLM: (for example, load
bediag /c)
/c - outputs the file to the screen
/s - gathers information for SCSI devices only
/n - exclude information for SCSI devices
3. On the print-out of the BEDIAG.FAX, write the Supervisor user and password.
NetWare Agent
Disaster Recovery of NetWare Servers
To manually recover NetWare servers if a disaster occurs, you must:
◆ Reinstall NetWare.
◆ Reinstall the Backup Exec Remote Agent for NetWare.
◆ Use the information from BEDIAG.FAX to restore your server configuration.
◆ Restore your latest backups.
Tip Intelligent Disaster Recovery for NetWare is available as a separate add-on option.
For more information, see “Getting Started with IDR” on page 859
Tivoli Option
“Requirements for the TSM Option” on page 1241
“Backup Exec as a TSM Client” on page 1242
“TSM Backup Exec Components” on page 1243
Note The Backup Exec TSM Option does not support the following communication
protocols: SPX, NetBEUI, NetBIOS or any mainframe protocols such as SNA
The Tivoli Storage Manager Administrator’s Guide and Administrator’s Reference Guide may
also be helpful.
1241
Backup Exec as a TSM Client
Backup Exec’s TSM Option enables computers running Backup Exec for Windows Servers
to become clients of a Tivoli Storage Manager server. As a TSM client, Backup Exec can
use the TSM server as storage volumes for its backup jobs.
To become a TSM client, each computer runs Backup Exec for Windows Servers, along
with the appropriate TSM option.
Note The TSM server must be prepared using the BEX.MAC macro before becoming a
TSM client.
TSM Example
- AIX, AS/400, HP-UX,
MVS, OS/390, z/OS,
Sun Solaris, VM, and
Windows
- Tivoli Storage Manager
Tivoli Storage Manager
Corporate Network
After establishing communication with the TSM Server, Backup Exec recognizes the TSM
server as a virtual single tape drive robotic library and stores the contents of its backup
jobs on it.
Because the TSM option is implemented within Backup Exec as an add-on logical device
driver, all standard robotic library features are available except LABM. You can also
configure a variable number of logical media slots within the virtual tape robotic library.
Device
Driver Tape Device
Device
Driver Virtual Tape Loader
TCP/IP Protocol
Tivoli Option
TSM Server
See also:
“TSM Backup Exec Components” on page 1243
“Requirements for the TSM Option” on page 1241
Note The VT data stream must first be written to a disk-based storage pool, then
optionally migrated to tape. Configurations in which the VT data stream is sent
directly to tape are not supported.
Finally, a node named Backupexec is registered on the TSM server. All of the Backup Exec
media servers can share this node, with backup sessions from the servers differentiated on
the TSM server by the media server’s file space name.
VERITAS includes a TSM server preparation macro named BEX.MAC that automatically
performs all steps necessary to prepare the TSM server. Regardless of your experience with
TSM, it is extremely important that you use the instructions under Preparing the TSM Server
and Running the BEX Macro to properly configure the TSM server.
From the Backup Exec interface, you can direct output from Backup Exec jobs to the TSM
server by selecting the name of the TSM robotic library as the destination.
See also:
“Preparing the TSM Server” on page 1245
“BEX.MAC Macro Command Details” on page 1253
Note Regardless of your experience with TSM, it is extremely important to install this
TSM option using both the following instructions and the included macro,
BEX.MAC.
The TSM command conventions used within the BEX.MAC macro file may need to
be adjusted to reflect the operating system conventions your TSM server is using.
See also:
“Allocating Storage Space” on page 1245
Tivoli Option
“Creating The bexpi.dsm Storage Volume” on page 1246
“Running the BEX.MAC Macro” on page 1248
Note You must install the Backup Exec for Windows Servers TSM Option to obtain a
copy of the BEX.MAC macro. During the install, the BEX.MAC macro is placed in
the same directory where Backup Exec was installed.
However, for the BEX.MAC macro to run correctly, you must first use the TSM DSMFMT
utility to allocate space for the storage pool, backupexec_pi, used by the position
information (PI) data stream.
The TSM DSMFMT utility is delivered as part of the TSM server, and is used to
pre-allocate the space needed when disk-based storage pools are created. For information
on the DSMFMT utility parameters, see your TSM Administrator’s Reference Guide.
See also:
“BEX.MAC Macro Command Details” on page 1253
1. Using the Volume Formatting Wizard, in the Storage Management interface, create a
30MB database file named bexpi.dsm, which will act as the storage volume name for
the storage pool backupexec_pi.
For example, if you are using TSM on the Windows NT, Windows 2000 or
Windows.NET platforms, and you want to format a 30MB file to be located in the root
directory, select this location when using the wizard. Other paths can be used, but the
other paths must be reflected in the BEX.MAC.
2. After formatting the bexpi.dsm file, edit the BEX.MAC macro to associate the
backupexec_pi storage pool with the bexpi.dsm file. The macro also executes
commands that complete the preparation of the TSM server.
Note For the BEX.MAC macro to run correctly, the BACKUPPOOL storage pool must
exist on the TSM server.
▼ To manually format a file as a storage volume for the backupexec_pi storage pool:
1. From the command prompt on the TSM server, format a 30-MB file named bexpi.dsm
as the storage volume for the storage pool backupexec_pi, by typing:
[drive:][path]dsmfmt [drive:][path]bexpi.dsm 30
Note For TSM version 4.x, you must access the server command window under the
Reports option.
Item Description
[drive:][path] The drive and directory location of the DSMFMT utility. The
dsmfmt location of the DSMFMT utility may vary according to the operating
system your TSM server is using.
Item Description
[drive:][path] The drive and directory location where you want to create the
bexpi.dsm bexpi.dsm file. The DSMFMT utility specifies the bexpi.dsm file as a
storage volume for the storage pool backupexec_pi.
Important:
The BEX.MAC macro looks for the bexpi.dsm file in the root or
top-level directory, then associates it with the backupexec_pi
storage pool. If you locate the bexpi.dsm file in a directory other
than the root or top-level, you must edit the BEX.MAC macro and
change the location of the bexpi.dsm file so it can be associated with
the backupexec_pi storage pool.
30 Specifies that the size of the bexpi.dsm file is 30MB. (When using the
Volume Formatting Wizard, this value is expressed in megabytes by
default.)
If you require the file to be a size other than 30MB, use the following
formula to find the maximum filespace needed:
Tivoli Option
(number of slots +1) x 64K = maximum space required per robotic
library.
Add the maximum space required for each robotic library to find the
total space required by the bexpi.dsm file.
For example, if you are using TSM on the Windows NT, Windows 2000, Windows XP,
or Windows.NET platforms and you want to format a 30MB file to be located in the
root directory, type:
dsmfmt <path>bexpi.dsm 30
where <path> is the directory to create the file in.
2. After formatting the bexpi.dsm file, run the BEX.MAC macro to associate the
backupexec_pi storage pool with the bexpi.dsm file. The macro also executes
commands that complete the preparation of the TSM server.
Note For the BEX.MAC macro to run correctly, the BACKUPPOOL storage pool must
exist on the TSM server.
See also:
“BEX.MAC Macro Command Details” on page 1253
1. Using the Tivoli Server Administration tools, expand the OBJECT VIEW and then
select AUTOMATION and SERVER COMMAND SCRIPTS. See your TSM
administrator’s manual for details on creating Server Command Scripts.
If any errors occur while the macro is executing, no changes or additions are made to
the TSM server, and an error notification number appears on the final line of the
server console. For information on the error code, see your TSM administrator’s
reference guide.
2. If you want each Backup Exec server to have an individual node, you must register
each media server, using a new node name and a new password. Included in the
advantages of sharing a node between all the media servers are:
- Easy access of backup data between Backup Exec servers since each server is
identified by the file space name of the server submitting the job.
- Only one administration console and one password are required for any number
of Backup Exec servers.
- A macro, BEX.MAC, included on the TSM Option CD, that automates the
association of the new storage pool, and the creation of the necessary policy
domain, policy set, management classes, and node registration. With shared
nodes, this macro is run once to complete preparation of the TSM server.
Disadvantages of using individual nodes for each Backup Exec server include:
- Difficult access of backup data written by other Backup Exec servers since file
space names are not easily shared across nodes.
- A unique node name and a unique password are required for each Backup Exec
server.
3. After the BEX.MAC macro completes with no errors, enable Backup Exec to run with
TSM. Refer to “Enabling TSM Support” on page 1249.
Note During the installation, you will need to know both the TSM server’s IP and port
address settings.
See also:
“Changing the Defaults for Backup Exec for Windows Servers” on page 1249
“Preparing the TSM Server” on page 1245
Tivoli Option
management class names, node names and passwords used on the two servers must
match. If the values on the TSM server do not match the values in the Backup Exec
registry key, the TSM Option will not work.
When the TSM Option is installed, the BEX.MAC macro contains the same default names
that are in the Backup Exec server registry key:
HKEY_LOCAL_MACHINE/SOFTWARE/VERITAS/BACKUP EXEC/ADSM
If you change default names in the BEX.MAC macro, you must make the same changes on
the Backup Exec server by editing fields in the registry key.
If you do not use the BEX.MAC macro to prepare the TSM server, or if you register a node
manually, either use the same values that are in the registry key, or change the registry key
values to match whatever values you enter on the TSM server.
After you make changes in the registry key, stop and restart the Backup Exec services. The
following screen shows the registry key. The values appear in hexadecimal format.
Following is a description of the values in the registry key that can be changed. The values
are given as decimal values:
Item Description
CommTimeout: This value must match the Communications Timeout entry in the
DSMSERV.OPT file on the TSM server. Minimum: 1 second
Maximum: 65535 seconds, Default: 60 seconds
If the If closed with X seconds setting is selected in Backup Exec,
(under Advanced node in the Backup Job Properties pane) its value
should not exceed the Communications Timeout setting on the IBM
TSM server.
If the time-out value does exceed the TSM CommTimeout value,
backups may fail with an I/O device error indicated for the TSM
drive. The TSM CommTimeout value must be coordinated with the
CommTimeout value on the TSM server, as described in the TSM
installation documentation.
Item Description
Enabled: Enables or disables TSM support. When this field is set to 0, TSM is
disabled. Default: 1 (on)
FileSpaceName: Changes the file space name of a media server for which you want to
view or restore data. By default, the machine name is used as the file
space name.
Multiple Backup Exec servers can send backup data to the TSM
server. If the media servers are sharing a node, which is the default,
the TSM server uses the server’s file space name to distinguish
backup sessions.
To be able to view or access backup data, you must use the same file
space name that was used when the data was sent to the TSM server.
For example, if you backed up data to the TSM server using the
media server with the file space name of ACCT, but you are now on a
media server with the file space name of PUBS, you can view or
restore the backup data from ACCT by changing the file space name
Tivoli Option
on PUBS to ACCT and cataloging the tapes/slots you want to view.
Maximum length: 1023 characters
Default: MachineName
LoaderSlots: Sets the number of slots you can define in any given magazine
Minimum: 1 slot, Maximum: 255 slots
Default: 10 slots
NodeName: Sets the name of the node used to communicate with the TSM server.
This name must match the node name registered for Backup Exec on
the TSM server.
Maximum length: 63 characters, Default: BackupExec
Item Description
ObjectMegSize: When Backup Exec sends data to the TSM server, it sends the data in
blocks. For example, 50MB of data is sent to the TSM server in five
10MB blocks. This key is used to change the default block size.
You may want to change the block size from the 10MB default
according to your system performance. A recommendation is to set
the object size to 1/100 of the available space in the BACKUPPOOL
storage pool, if more than 100 MB are available in that pool.
An indication that the object size is too large, or that the TSM server
is running out of storage space, is if the following errors appear in
the Event Log:
7106: Storage device “TSM Storage” reports an error on a request to
write a file mark to media. The error reported is “Hardware failure.”
14000: An error occurs while processing an TSM command,
“ANS4311E (RC11) Server out of data storage space,” and
“ANSO2661 (RC2302) The dsmEndTxn vote is ABORT.” Check the
reason field.
Minimum: 0MB, Maximum: 3096MB, Default: 10MB
PI_MgmtClass: Sets the name of the position information management class. This
name must match the PI management class name on the TSM server.
Maximum length: 29 characters, Default: MC_PI.
VT_MgmtClass: Sets the name of the virtual tape management class. This name must
match the VT management class name on the TSM server.
Maximum length: 29 characters, Default: MC_VT.
See also:
“Changing Passwords” on page 1253
Changing Passwords
To change the password for TSM on a Backup Exec server, run ADSMCFG.EXE, found in
the Backup Exec program directory. For example: C:\PROGRAM
FILES\VERITAS\BACKUP EXEC\NT.
You are prompted to enter a new password, and then to re-enter it to confirm it. You must
make the same password change on the TSM server or you will receive an authentication
failure error when the next Backup Exec session starts.
On a shared node, if the password is changed for one Backup Exec server, it must be
changed for all servers sharing that node.
The TSM server automatically expires node passwords after a specified amount of time.
When the password expires, Backup Exec instructs the TSM server to reuse the previous
password.
Tivoli Option
with Backup Exec. By using the BEX.MAC macro, you can save time and prevent errors.
In brief, the macro:
◆ Associates the storage pool backupexec_pi with the storage volume file bexpi.dsm.
◆ Creates a new policy domain named VERITAS.
◆ Creates a new policy set in the VERITAS domain named bex_backup.
◆ Creates a management class named MC_PI.
◆ Creates a management class named MC_VT, and modifies it to be the default
management class for the policy set bex_backup.
◆ Creates a backup copy group (inside the MC_PI management class) with a destination
pointing to the backupexec_pi storage pool.
◆ Creates a backup copy group (inside the MC_VT management class) with a
destination pointing to the TSM server’s BACKUPPOOL storage pool.
◆ Activates all the changes and additions.
◆ Registers a node on the TSM server named backupexec with a password of bex.
Note If you change any of the default names used in the BEX.MAC macro, you must
make the same changes on the Backup Exec server.
Item Description
define volume Associates the file c:\bexpi.dsm with the storage pool named
backupexec_pi backupexec_pi.
c:\bexpi.dsm access =
READWrite
define policyset VERITAS Creates a policy set in the domain VERITAS named bex_backup.
bex_backup
define mgmtclass Creates a management class named MC_PI for the policy set
VERITAS bex_backup bex_backup in the domain VERITAS with space management
MC_PI disabled. The MC_PI management class acts like a map for all the
SPACEMGTECHnique = backup data files that are stored on the TSM server. It is written to
NONE and read from by Backup Exec during almost every operation.
define mgmtclass Creates a management class called MC_VT for the policy set
VERITAS bex_backup bex_backup in the domain VERITAS. This class is where the bulk of
MC_VT the data being backed up resides.
SPACEMGTECHnique = Backup Exec stores its data on the TSM server in chunks called
NONE objects. By default, the object size is 10MB, but the size can be
changed. For details on how to change the object size, and when it
might be necessary, see “Changing the Defaults for Backup Exec for
Windows Servers” on page 1249.
Item Description
define copygroup Creates a backup copy group with a destination pointing to the
VERITAS bex_backup backupexec_pi storage pool.
mc_pi DESTination = The number of backup versions to keep is set to one because Backup
backupexec_pi VERExists Exec only recognizes one copy of backup data.
= 1 VERDeleted = 0
Because Backup Exec does not use the Length of Time To Retain Only
RETExtra = 0 RETOnly =
Backup Version feature, it is set to No Limit.
NOLimit
define copygroup Creates a backup copy group for the VT data stream with a
VERITAS bex_backup destination pointing to the TSM server’s BACKUPPOOL storage
mc_vt DESTination = pool.
BACKUPPOOL VERExists Note The VT data stream must first be written to a disk-based
= 1 VERDeleted = 0 storage pool, then optionally migrated to tape. Configurations
RETExtra = 0 RETOnly = in which the VT data stream is sent directly to tape are not
NOLimit supported.
Tivoli Option
activate policyset VERITAS Activates all the previously listed additions/modifications.
bex_backup
REGister Node Registers a node on the TSM server called backupexec with a
backupexec bex DOMain = password of bex, using the policy domain called VERITAS, and
VERITAS BACKDELETE = allowing the deletion of file spaces.
YES If you are using individual nodes for each Backup Exec server, you
can use this node registration for one server. You must manually
register all other servers using a unique node name and password,
and using the policy domain VERITAS. You must also change the
default names on the Backup Exec server to match the new node
registration. See “Changing the Defaults for Backup Exec for
Windows Servers” on page 1249.
Troubleshooting
If the TSM server and the Backup Exec server cannot communicate after the TSM Option
has been installed, check the following:
◆ Are all the necessary API and OPT files copied to the correct locations?
◆ Does the DSM.OPT file have the correct TCP/IP address and port number entered?
◆ Can you ping the TSM server’s TCP/IP address? If you cannot ping the server, the
support will not work.
See also:
“TSM Problem Resolutions for Backup Exec for Windows Servers” on page 1257
1. Verify the Registry entries for TSM Tape and Robotic Library Devices:
HKEY_LOCAL_MACHINE\SOFTWARE\VERITAS\ADAMM\Scsi\Scsi Port
xx\Scsi Bus x\Target Id x\...
Logical Unit Id 0
DeviceName: REG_SZ: MediumChanger40
Identifier: REG_SZ: ADSM Changer Device
Type: REG_SZ: MediumChangerPeripheral
Logical Unit Id 1
DeviceName: REG_SZ: Tape41
Identifier: REG_SZ: ADSM Tape Device
Type: REG_SZ: TapePeripheral
Tivoli Option
2. Verify that TSM is enabled in the Registry:
HKEY_LOCAL_MACHINE\SOFTWARE\VERITAS\Backup Exec\ADSM
Enabled: REG_DWORD: 0x1
You may need to restart the Backup Exec services for the changes to take effect.
3. To restart the services, go to Control Panel - Settings. Select the Backup Exec services,
and then click Stop.
4. Click Start.
Item: Hardware Error Detected message box says, “No storage device has been
detected…”.
The Windows Event Viewer will contain an entry under Application Log.
Possible error messages and corrective actions for this problem are listed in the following
table:
An error occurred while attempting to load the IBM ADSM32.DLL. Verify that these files are
The files ADSM32.DLL, BLKHOOK.DLL, DSCAMENG.TXT and present.
DSM.OPT must reside in the same directory as Backup Exec.
An error occurred while processing a TSM command. (610) The file DSCAMENG.TXT is
missing.
An error occurred while processing a TSM command. Options file The file DSM.OPT is
not found. missing.
An error occurred while processing a TSM command. Session Verify that TCP/IP is
rejected: TCP/IP connection failure. installed properly.
Ensure the DSM.OPT entry
for TCPServeraddress points
to a valid TSM server.
An error occurred while processing a TSM command. Session Ensure that the Backup Exec
rejected: Unknown or incorrect ID entered. node exists on the TSM
server.
Item: If the object size is set too large, or the TSM server is running out of storage space,
the following errors appear in the Event Log:
◆ 7106: Storage device “TSM Storage” reports an error on a request to write a file mark
to media. The error reported is “Hardware failure.”
◆ 14000: An error occurs while processing a TSM command, “ANS4311E (RC11) Server
out of data storage space,” and “ANSO2661 (RC2302) The dsmEndTxn vote is
ABORT.” Check the reason field.
Administration Console
The user interface that allows you to run Backup Exec operations. The user interface can
be run from the media server or a remote system.
Glossary
Agent
A component that allows workstations or other servers, for example your SQL server, to
interact with the Backup Exec server.
Alert
An event that usually requires some form of user interaction or acknowledgment.
Alert Category
One of 35 classes or groups used by Backup Exec in which an alert fits. Examples of alert
categories include job success, install warning, and database maintenance failure.
Alert Source
One of four areas that can generate an alert. Alert sources include job, media, device, and
system.
Alert Type
Determined by the severity of the alert, an alert type has a corresponding colored icon.
Backup Exec recognizes four types of alerts: Error, Warnings, Information, and Attention
Required.
Allocated Media
Media that belongs to a user media set.
1259
Append Period
The length of time that data may be added to the media. The append period starts when
the first backup job is written to this media.
Archive Bit
A file attribute that is set whenever a file is modified. For full and incremental backups
that use archive bits, this bit is turned off after the backup completes, indicating to the
system that the file has been backed up. If the file is changed again before the next
incremental or full backup, the bit will be turned on and Backup Exec will back up the file.
Backup
A process where files on a server or workstation drive are copied and stored on a reliable
form of media.
Backup Folder
A virtual device that Backup Exec treats as any real tape device. Backup folders can be
part of drive pools, but not cascaded drive pools, and are created using Backup Exec’s
backup-to-disk feature.
Backup Method
When you run a backup, you can specify how you want Backup Exec to use and set the
file’s backup status. This is necessary when you incorporate a backup strategy. Backup
Exec uses the following backup methods:
FULL - Back Up Files - Reset Archive Bit. Backs up all selected data on a volume and
resets the archive bit to indicate that the files have been backed up.
1260
COPY - Back Up Files. Includes all selected data, and does not affect any media rotation
scheme because the archive bit is not reset.
DIFFERENTIAL - Changed Files. Includes all files that have been changed (based on
archive bit) since the last full or incremental backup, and does not affect any media
rotation scheme because the archive bit is not reset.
INCREMENTAL - Changed Files - Reset Archive Bit. Includes only the files that have
changed (based on the archive bit) since the last full or incremental backup and resets the
archive bit to indicate that the files have been backed up.
FULL - Back Up Files - Allow incrementals and differentials using modified time.
Includes all of the selected data on a volume and allows the use of incrementals and
differentials using the modified date and time stamp.
DIFFERENTIAL - Using modified time. Includes all files since last full backup using the
files’ last modified date and time stamp.
INCREMENTAL - Using modified time. Includes all files that have changed since the
Glossary
last full or incremental backup using the files’ last modified date and time stamp.
DAILY - Files that Changed Today. Backs up files that were created or modified today.
WORKING SET - All files last accessed in (x) days. Includes all files that were created or
modified since the last full or incremental backup. If you select this backup method, you
can then indicate that you want to include data that has been accessed in a specific
number of days.
ARCHIVE - Deletes files after successful copy backup. Backs up all selected files,
verifies the media, and then deletes the data from the volume. For data to be deleted,
rights to delete a file must be granted; otherwise, data will be backed up but not deleted.
Backup Set
When a backup job is run, the data selected from a single resource, such as a Microsoft
Exchange dataset, for the backup is placed together on media in a backup set. Files selected
from multiple resources create multiple backup sets.
Backup Strategy
The procedures you implement for backing up your network. A good backup strategy
allows minimal time to get a system up and running in the event of a disaster.
Glossary 1261
Cascaded Drive Pool
The grouping of drives of the same drive type so they appear logically as one drive. This
grouping allows backups that exceed the capacity of media in one drive to automatically
continue on the next drive defined in the group.
Catalog
A database for keeping track of the contents of media created during a backup or archive
operation. You can only restore information from fully cataloged media.
Cluster
When two or four servers (called nodes) are linked in a network, and run cluster software
that allows each node access to the shared disks.
Copy Backup
One of the available backup methods. Includes all selected data, and does not affect any
media rotation scheme because the archive bit is not reset.
Daily Backup
One of the available backup methods. Backs up files that were created or modified today.
Database Server
In a shared storage environment, the server in which the shared Advanced Device and
Media Management (ADAMM) database and the shared catalog resides.
Drive Pool
A grouping of drives for Backup Exec operations. In a non-cascaded drive pool, jobs
assigned to the drive pool are run on the first available drive.
Event
Action that occurs during a Backup Exec operation. For example, the canceling of a job.
1262
Failover
When a node in a cluster becomes unavailable and cluster resources migrate to an
available node.
Fibre Channel
A high speed storage network that can operate over copper wire or optical fiber and may
support simultaneous transfer of many different data protocols, including SCSI, IPI,
HiPPI, IP, and ATM.
Glossary
A networking device used to connect the components of a Fibre Channel Switched Fabric
(FC-SW).
Full - Back Up Files - Allows incrementals and differentials using modified time Backup
One of the available backup methods. Includes all of the selected data on a volume and
allows the use of incrementals and differentials using the modified date and time stamp.
Glossary 1263
Hub
A connecting device in a network that joins communication lines together.
Imported Media
Media created by a product other than this installation of Backup Exec.
Job
An operation that has been scheduled for processing by the media server. For example, if
you make selections and submit a backup based on those selections, you have created a
backup job. Jobs contain source or destination information, settings, and a schedule. Types
of jobs include backup, restore, media rotation, resource discovery, report, test run, and
utility jobs.
Job History
A report of what happened during the processing of the job (statistics, errors, and so on).
Job Log
Created when a job runs, the job log contains the results from the job. You can review the
job log to review job errors and details.
Local Device
A disk or tape drive connected to a server and only available to the server to which it is
attached.
1264
Media ID
A unique internal label assigned by Backup Exec to individual media and used to keep
statistics on each media. The media ID, unlike the media label, cannot be erased or
changed.
Media Label
Used to identify media, the label can be assigned automatically by Backup Exec or you
can specify a label prefix and number to be assigned for a type of media. If the media was
first used in a library with a bar code reader, the media label will consist of a pre-assigned
bar code label.
Media Location
Location of your media. In Backup Exec, there are three categories available for tracking
media:
Online location. The online location lists media that reside in a storage device, robotic
library slot, or backup-to-disk folder. It is defined by Backup Exec, so you cannot delete or
rename it. In addition, you cannot add media to it.
Offline location. The offline location displays all media that are onsite but are not in drives
Glossary
or slots, or media vaults. Media are automatically moved to this location if you use
Backup Exec to remove media from a device or slot.
User-defined media vault. A logical representation of the actual physical location of media.
Media Rotation
A strategy that determines when media can be reused, or rotated back into use, by Backup
Exec.
Media Server
The Windows server where Backup Exec was installed and the Backup Exec services are
running.
Media Set
A group of media on which a backup job is targeted. The media set controls the overwrite
protection period, the length of time that data is retained on a specific media before being
overwritten, and the append period, the length of time that data can be appended to a
media assigned to a media set.
Glossary 1265
Media Vault
A logical representation of the actual physical location of media.
Node
Servers operating in a cluster environment. A node can also be a selection in a tree view
on the administration console (see “Using the Administration Console” on page 76).
Partition
A grouping of slots in a robotic library for use in Backup Exec operations.
Recyclable Media
Media that is assigned to a media set but has expired data overwrite protection periods.
Remote Administrator
The Backup Exec user interface (administration console) run on remote computers.
Remote Agent
A Backup Exec system service that runs on Windows or NetWare remote servers and
workstations and allows remote backup and restore of these systems and provides
increased backup throughput.
Resource
Data files and databases, such as Windows shares and Microsoft SQL databases, that can
be selected for backing up.
Resource Discovery
A Backup Exec operation that allows detection of new backup resources within a
Windows domain.
Restore
A process by which data that has been backed up to media is returned to disk.
1266
Retired Media
Media that has been taken out of service, usually because of an excessive number of
errors. Media that is retired is available for restore but backups will not run to it. Media
must be retired before it can be deleted. If you want to use media that has been deleted,
Backup Exec will recognize it as imported media. It must be cataloged before you can
restore from it.
Robotic Library
A high-capacity data storage system for storing, retrieving, reading, and writing multiple
magnetic tape cartridges. It contains storage racks for holding the cartridges and a robotic
mechanism for moving the cartridge to the drive or drives.
Scratch Media
Media that do not belong to a media set and can be overwritten, including new or blank
media, erased media, and media moved from another group to scratch media.
SCSI
Small Computer System Interface. A processor-independent standard for system level
Glossary
interfacing between a computer and peripheral devices such as printers, hard drives, and
CD-ROMs.
Selection List
The data selected to be backed up or restored. Selection lists can be save and used for
multiple jobs.
Shared Device
A disk or tape drive that can be accessed by multiple servers.
Static Volume
A point in time view of a volume.
System Media
All media that has been introduced into the Backup Exec system, except those media that
have been assigned to a media set.
Glossary 1267
Wizard
A series of instructional dialogs that guide you through the steps needed to accomplish a
task, such as creating a backup job.
1268
Index
A described 263
active alerts selecting files 262
defined 454 Advanced Open File Option
responding to 459 changing default settings 962
viewing 454 error messages 970
Active Alerts by Media Server Report 835 overview 36
active alerts report 515 requirements 958
Active Directory, backing up in Exchange uninstalling 961
2000 1072 using for all backup jobs 966
active history using for single backup job 964
report 515 wizard 962
active job Advanced options
viewing properties 370 for backup 252
active jobs for duplicate job 303
canceling 373 for restore 412
removing hold 374 Agent for Microsoft SharePoint Portal
viewing 365 Server
ADAMM, defined 1259 about backing up a SharePoint Server or
Admin Plus Pack Workspace 1213
advanced reporting capabilities 832 about restoring a SharePoint Server or
Index
installing 827 Workspace 1215
overview 36, 827 disaster recovery 1221
scheduling report jobs 835 installing 1213
setting notification recipients for reports overview 1211
835 redirecting restore jobs 1217
administrating jobs using command line system requirements 1212
applet 614 agent, defined 1259
administration console agent.cfg commands (UNIX Agent) 588
defined 1259 Agents, Backup Exec
overview 76 See also Exchange Server Agent, Lotus
role in backup process 39 Domino Agent, NetWare Agent, Oracle
Advanced Device and Media Management Agent, R/3 for Oracle Server Agent,
(ADAMM) Remote Agent, SharePoint Agent, SQL
database overview 911 Server Agent
device management overview 89 list of agents with descriptions 36
Devices view 90 upgrading on remote computers 71
media operations overview 218 alert category, defined 1259
Advanced File Selection options
1269
alert history defined 855, 859
defined 454 ASR See Automated System Recovery
viewing 454 audit log
alert notification, printers 485, 487 logon accounts 356
alert source, defined 1259 report 517
alert switches for command line applet 619 AUTOEXEC.NCF file, NetWare Agent 1226
alert type, defined 1259 auto-inventory media after import job
alerts completes 181
alert types 453 Automated System Recovery 537
assigning recipients 491
B
clearing recipients 492
backing up
configuring 453
clusters
configuring default options 86
database files 765
defined 453, 1259
local disks 764
filters 454
shared disks 764
modifying alert category properties 492
Windows 2000 and Windows.NET
notification methods 467
763
properties 457
files and directories by following
responding to 453, 459
junction points 252
setting filter 456
media server using one-button backup
using command line applet 619
292
viewing 454
R/3 database 1205
viewing job log 460
remote storage 253
views 454
BACKINT
alias backup, in backup job script file 608,
alerts 1200
684, 711
implementation 1199
all media, defined 190
overview 1200
allocated media
backup
defined 191, 1259
defined 1260
overwriting 195
overview 233
append options for media 195
Backup Exec
append period
installing
defined 185, 228, 1260
command line installation 56
setting for media set 228
evaluation copy 553
append to media option 244
installation requirements 46
Archive - delete files after successful copy,
overview 46
defined 1260
serialized copy, upgrading to 553
archive bit, defined 344, 1260
silent mode installation 56
archive logging
uninstalling 66
Lotus Domino 1186
upgrading 71
recovery of Lotus Domino 1197
using Repair option 64
archiving
overview
freeing disk space 293
additional options 36
NTFS and VFAT file systems 294
how it works 39
using disk grooming 294
new features 33
ARCserve media, restoring data from 426
system requirements 42
ASR files, in IDR
repairing 64
copy to diskette or CD 875
Index
810 tools 785
compacting the media server backup file
database 811 defined 143
dumping a media server database deleting 156
811 recreating a deleted file 157
rebuilding a media server database renaming 155
indices 812 viewing and changing properties 157
recovering a media server database backup folder
813 adding 144
repairing a media server database changing the path 148
812 creating for removable media 147
General Tasks creating more disk space 242
adding new media servers 792 defined 143
deleting a media server 794 deleting 149
deleting a media server group 795 designating location for 146
deleting media servers from the All overview 143
Media Servers subnode 794 pausing and resuming 151
recreating 150
Index 1271
renaming 148 defined 1260
viewing properties 152 Intelligent Image Option (IIO) 948
backup job selecting 248
Advanced options 252 selecting for template 279
alias backup in script file 608, 684, 711 setting default 313
choices for creating 233 using modified time 345
copying to another server 831 backup mode, Oracle Agent 1151
creating from template 283 backup network
creating manually 236 changing for a backup job 328
creating using command line applet 596 configuring 325
creating using script file 660 overview 323
creating using the wizard 236 setting up 325
Device and Media options 242 backup options
general options for new job from backing up data in remote storage 253
template 284 contents of mounted local drives 252
overview 235 NetWare network volumes 335
pre/post commands 256 backup selections, changing order 265
running from command line 596 backup set, defined 1261
scheduling 358 Backup Size by Resource Job Report 839
script file, creating and using 660 backup strategies
script file, saving and launching 704 See also names of individual agents
selecting devices and data 259 choosing devices to back up 338
Selections options 239, 407 defined 336, 1261
switches for command line applet 596 frequency of backups 337
tasks to do before 234 increasing throughput with Backup Exec
using command line applet to back up Remote Agent 821
server drive 599 length of data retention 338
Backup Job Properties dialog box multiple devices per job 339
Exchange 2000 1074 one job per device 338
Exchange 5.5 1110 protecting against viruses 338
SQL 2000 984 Backup Success Rate 837
SQL 7.0 1032 backup types
backup job script file archive 344
creating 660 copy 342
saving and launching 704 daily 342
backup job template differential 341
copying to another server 831 full 340
creating 276 incremental 342
creating a copy 282 working set 343
creating job using with command line Backup Wizard, launching 236
applet 729 backup-to-disk
creating with command line applet 713 properties
defined 276, 1260 General tab 158
editing 282 Management tab 159
setting general options 278 Statistics tab 160
backup job template script file renaming file 155
creating 713 renaming folder 148
values 713 viewing folder properties 152
backup methods
Index
Boot managers, restoring in IDR 891 circular logging
bootable media for IDR Exchange 2000, reviewing in 1079
CD image, creating 875 Exchange 5.5, reviewing in 1115
comparing types 856 Lotus Domino 1186
floppy diskettes, creating 871 recovery of Lotus Domino server 1198
tape image, creating 877 cleaning jobs, submitting for robotic
types of media 856 libraries 178
buffer count, setting for drives 122 cleaning properties for media 225
buffer size, setting for drives 122 Cleaning tab for drive properties 128
build and version information, displaying client (or gateway) services for NetWare 335
553 clone CD image
byte count, incorrect 564 creating 828
overview 828
C
clone, using alias backup for a 608, 684, 711
calendar
clrest command 770
display filters 369
clusters
view filters 369
adding or removing a failover node 750
viewing 368
all drives pool 745
Index 1273
backing up cluster quorum disk 771
database files 765 Windows 2000 and Windows.NET
local disks 764 767
shared disks 764 size 565
Windows 2000 and Windows.NET system state, backing up 764
763 troubleshooting 779
BEUtility 751 uninstalling Backup Exec 744
changing the order in which nodes fail using with Backup Exec 739
over 749 virtual servers, backing up 765
clrest command 770 combination R/3 database server/media
configurations server recovery 1209
four-node on a fibre channel SAN command line applet
with the SAN SSO 760 administrating jobs 614
overview 752 alert switches 619
shared SCSI bus for tape devices 755 alias backup 608, 684, 711
two-node on a fibre channel SAN backup and restore script files 660
with the SAN SSO 758 backup job switches 596
two-node with locally-attached bemcmd command 593
storage devices 753 defined 591
two-node with tape devices on a error-handling rules 623
shared SCSI bus 754 job status messages 736
creating drive pools 745 logon account switches 642
database server, designating new in managing Backup Exec services 641
SAN SSO 751 managing devices 624
disaster recovery media management switches 624
Backup Exec on a cluster using IDR online help 594
775 report switches 643
cluster data files 777 requirements 592
clustered Backup Exec 779 restore job switches 618
entire cluster manually 776 setting default options 645
nodes using IDR 774 switches for administrating jobs 614
overview 773 using 593
shared disks 778 command line installation of Backup Exec 56
using IDR to prepare 774 command line switches, used with all
error-handling rules 386 operations 594
failover restart 740 commands See also names of individual
installation commands
additional options 743 completed jobs, job log overview 382
Backup Exec in a cluster 742 compression
requirements 741 enable hardware compression option
Open File Option, and using 743 121
overview 762 in cascaded drive pools 107
Remote Agent, installing 742 setting backup defaults 315
restoring configuration settings
cluster quorum for Windows 2000 report 518
and Windows.NET 768 Configuration tab for drive properties 120
cluster quorum to node running Configuration tab for robotic library 136
Active Directory 769 Configure Devices button 75
specifying a new drive letter for the
Index
database maintenace
overview of utility jobs 164
configuring 389
retensioning a tape 171
database maintenance
using with SAN Shared Storage Option
overview 389
921
database server
device summary
defined 911, 1262
report 519
in clusters 751
Device Summary Report 918
Date Modified tab 435
devices
default options
configuring 93
backup and restore for Exchange 2000
Hot-swappable Device Wizard 94
1097
managing using command line applet
backup and restore for Exchange 5.5
624
1132
pausing and resuming 94
IDR, setting 863
release from Backup Exec 564
NetWare network volumes 335
renaming 95
overview 39
SCSI address 559
restore 441
troubleshooting 934
setting 84
viewing 90
Index 1275
viewing with Library Expansion Option Oracle Agent 1174
1148 overview 540
Devices view 90 remote Windows 2000 computers
Dfs See Distributed file system (non-authoritative) 549
DHCP See Dynamic Host Configuration remote Windows NT computers 543
Protocol disaster recovery alternate data path, in IDR
dialog boxes, overview 79 864
differential backups disaster recovery data path, in IDR 864
advantages and disadvantages 341 disaster recovery file (*.dr file) in IDR
changed files, defined 1262 defined 855, 859
defined 341 setting locations for 862
using modified time, defined 1262 Disaster Recovery Wizard
disable device for Backup Exec 120 requirements 899
disaster preparation running 899
Disaster Preparation Plan (DPP) 532 disk grooming, using for archive job 294
emergency repair disk 535 Disk Manager, using in IDR 902
Exchange 2000 1101 Distributed file system (Dfs)
Exchange 5.5 1137 backing up 261
hardware protection 532 restoring 424
Lotus Domino Agent 1195 DLT tape, drive hangs when cataloging 561
off-site storage 532 Domain Controller, using redirected restore
overview 531 to install from media 439
SQL 2000 1018 domains, host and target, defined 45
SQL 7.0 1061 DPP See also Disaster Preparation Plan
disaster recovery Drive Pool Properties dialog box 106
See also names of individual agents drive pools
clusters See also cascaded drive pools
Backup Exec 779 adding drives 98
Backup Exec on a cluster using IDR creating 97
775 creating in a cluster 745
data files 777 default for SAN Shared Storage Option
entire cluster manually 776 920
nodes using IDR 774 defined 89, 1262
overview 773 deleting 102
shared disks 778 deleting drives 101
using IDR to prepare 774 overview 96
data protected by Backup Exec agents prioritizing drives 99
540 properties 105
different types of computers, overview renaming 104
540 SAN Shared Storage Option 916
Exchange 2000 1102 using the default drive pool 96
Exchange 5.5 1138 viewing properties 106
local Windows 2000 computers drive properties
(non-authoritative) 546 Cleaning tab 128
local Windows NT computers 541 Configuration tab 119
Lotus Domino Agent 1196 General tab 117
manual recovery of Windows system Media Types tab 130
540 SCSI Information tab 125
NetWare Agent 1239 Statistics tab 126
Index
editions of Backup Exec, listed and
circular logging, reviewing 1079
described 31
Guide Me wizard 1075, 1077
See also names of individual editions
Internet Information Service (IIS)
eject media
metabase 1071
after job completes 244
Key Management Service (KMS) 1071
from a drive 177
mailbox backup methods 1076
e-mail
public folders 1080
configuring MAPI notification 469
recommended selections 1071
configuring SMTP notification 467
single instance backup for message
configuring VIM notification 470
attachments 1077
emergency repair disk, creating 535
Site Replication Services (SRS) database
enabling
1071
bar code rules 137
storage groups 1078
device for Backup Exec option 120
strategies for 1070
hardware compression 121
system state 1071
Removable Storage (RSM) 137
Exchange 2000, restoring 1086
robotic library for Backup Exec 137
change password when recreating
mailboxes 1101
Index 1277
commit after restore completes option redirecting mailboxes and public folders
1087 1127
mailboxes and public folders, overview Redirection dialog box 1125
1089 requirements 1121
mailboxes and user accounts, recreating Restore Job Properties dialog box 1119
1086 restore private mailboxes option 1120
mount database after restore option 1087 restore public folder option 1120
no loss restore option 1086 restoring data to server 1119
redirecting mailboxes and public folders Exchange Server Agent, backing up
1093 backup job script file method, using 665,
redirecting storage groups and 705
databases 1091 command line
Redirection dialog box 1091 for Exchange 2000 603
requirements 1088 using for backup job 600
restore defaults 1097 executing a command
Restore Job Properties dialog box 1085 after backup 256
restoring data to server 1085 after restore 417
temporary location for log and patch before backup 256
files 1087 before restore 417
Exchange 5.5 ExecView
agent features 1105 communication module, defined 391
agent installation 1106 components 392
agent requirements 1105 information server, defined 391
best practices 1109 launching console 394
logon accounts 1106 overview 391
Resource Discovery feature, using with user preferences overview 393
1105 exporting media 181
Exchange 5.5, backing up express setup, when to use in IDR 898
Backup Job Properties dialog box 1110
F
backup methods 1111
failback, defined 740
circular logging, reviewing 1115
Failed Backup Jobs Report 844
Guide Me wizard 1111
failover
Key Management Service (KMS) 1108
adding or removing a failover node 750
mailbox backup methods 1112
changing the order in which nodes fail
recommended selections 1108
over 749
single instance backup for message
defined 739
attachments 1113
restart 740
strategies for 1107
FAT
Exchange 5.5, restoring 1120
cluster size 565
change password when recreating
partition 564
mailboxes 1136
fatal tape format inconsistency message 560
defaults 1135
father/son media rotation strategy 215
DS/IS consistency adjuster after restore
FC-AL See Fibre Channel Arbitrated Loop
1122, 1127
Fibre Channel Arbitrated Loop (FC-AL)
mailboxes and user accounts, recreating
defined 1263
1120
in SAN SSO 911
no loss restore option 1120
fibre channel hub, defined 1263
redirecting database restores 1125
fibre channel switch, defined 1263
Index
Backup Exec 82 Incremental - Using modified time, defined
Full - Back Up Files - Allows incrementals 1264
and differentials using modified time incremental backups
defined 1263 advantages and disadvantages 342
Full - Back Up Files - Reset Archive Bit defined 342
defined 1263 indows XP
full backups backing up 333
advantages and disadvantages 340 Information Desk, overview 79
defined 340 installation parameter file
creating 62
G
defined 62
General drive properties 117
using 62
general job defaults, setting 87
installation requirements, Backup Exec 46
general media properties, viewing 220
See also names of individual agents and
general options
options
backup job template 278
installing
duplicate job 302
additional Backup Exec options on a
job created from template 284
cluster 743
Index 1279
Backup Exec 47 overview 36, 855
Backup Exec in a cluster 742 Recovery Wizard, running 899
Domain Controllers from media 439 requirements 858
Library Expansion Option 1146 restoring remote media server 902
locally Sharepoint Portal Server, recovering 909
additional options 49 System Commander boot manager,
using clone CD image 829 restoring 891
overview 41 utility partitions, backing up 868
Remote Administrator 67 virtual devices, using in 858
remotely Windows Automated System Recovery
using clone CD image 830 (ASR) files 855, 859
SharePoint Agent 1213 Intelligent Disaster Recovery Additional
storage devices 41 Client option, installing 858
using installation program 47 Intelligent Image Option (IIO)
using Repair option 64 caution about canceling a restore job 954
Windows Management Instrumentation command line, running from 600, 611
performance counter 499 encrypted files, backing up 948
Windows Management Instrumentation installing 949
SNMP provider 499 Intelligent Disaster Recovery (IDR),
Intelligent Disaster Recovery (IDR) used with 948
alternate data path on a remote job log example 952
computer 864 open files, backup and restore of 948
ASR files 855, 859 overview 38
boot managers 891 requirements 949
catalog entries, added to *.dr file 857 restoring IIO backup sets 954
clusters selecting as backup method 951
recovering Backup Exec 775 single-pass restore 948
recovering nodes 774 Internet Information Services (IIS)
custom setup, using 898 metabase, backing up 1071
disaster recovery diskettes, updating 881 inventory job
disaster recovery file (*.dr file), defined creating 166
855, 859 setting job priority 167
express setup, using 898 inventorying
First Time Startup Configuration all drives on startup 85
Wizard 859 all drives when Backup Exec starts 165
hard disk partitions, changing for drives 165
Windows NT 900
J
hard drive partition, altering sizes using
job audit log, defined 1264
IDR 903
Job Distribution by Device Report 845
IBM computers 893
job history
installing 858
defined 40, 1264
Intelligent Image Option (IIO), used
deleting report 511
with 948
saving report 510
Microsoft Exchange Server, recovering
viewing 378
909
viewing report 509
Microsoft SQL Server, recovering 909
job log
Options - Set Application Defaults
configuring default options 384
dialog box 863
defined 1264
OS/2 boot manager, restoring 891
Index
defined 1264 lock robotic library panel 182
deleting scheduled 377 logon accounts
edit recipients 493 changing default 355
editing schedule 360 changing for a resource being backed up
holiday scheduling 364 266
Lotus Domino backup properties 1187 clearing audit log 356
removing hold command line applet switches 642
active jobs 374 default, defined 348
scheduled jobs 375 deleting 354
run report 506 editing 353
running scheduled job 374 Exchange 2000 resources, and 1069, 1106
running scheduled test job 376 Exchange 5.5 resources, and 1106
scheduled, modifying 374 overview 347
scheduled, viewing 374 replacing 353
scheduling 358 SQL 2000 resources 978
selecting recipients for notifications 492 SQL 7.0 resources 1027
setting general defaults 87 system logon account 349
viewing active 365 viewing audit log 356
Index 1281
Lotus Domino Agent Management tab for backup-to-disk folder
APIs 1185 159
archive logging 1186 manually update server list, for NetWare
backup job script method, using 666, 718 1238
backup options 1187 MAPI
circular logging 1186 configuring recpients 474
command line, using for backup 606 MAPI e-mail notification method 469
configuring default options 1184 master database backup
database backup overview 1185 SQL 2000 982
database backup requirements 1180 SQL 7.0 1031
disaster preparation 1195 master database restore
disaster recovery SQL 2000 996, 1007
archive logging 1197 SQL 7.0 1043
circular logging 1198 media
of server 1196 adding to the offline location or
overview 37 user-defined media vault 211
redirecting restore 1194 all media, defined 190
requirements 1180 allocated, defined 191
restore overview 1189 append backup to 244
selecting for restore 1190 append options 195
selecting restore options 1192 cartridges 560
supported configurations 1185 cleaning properties, viewing 225
viewing databases 1182 creating default labels 206
damaged 196
M
deleting 218
Machines Backed Up Report 847
deleting user-defined vault 213
Macintosh Agent, system requirements 578
displaying media ID 220
mailboxes
finding in a location or vault 210
Exchange 2000
general properties 220
backup methods 1076
hardware-compressed tape 561
best practices 1081
how Backup Exec searches for
change password when recreating
overwritable media 193
1101
imported, defined 191
exclude specific folders 1081
management properties, viewing 222
overview of backing up 1080
managing using command line applet
recreating mailboxes and user
624
accounts 1086
moving to a media set 219
redirecting restores 1093
moving to a new location 212
restore overview 1089
overwrite for backup 244
Exchange 5.5
overwrite options 192
backup methods 1112
overwriting allocated or imported 195
best practices 1116
properties 220
change password when recreating
recyclable, defined 191
mailboxes 1136
retired, defined 191
exclude specific folders 1116
scratch, defined 190
overview of backing up 1115
setting default options 203
redirecting restores 1127
sharing 931
restore overview 1123
statistical properties 223
majority node in a cluster 741
system, defined 190
Index
media rotation strategies 608, 684, 711
father/son 215 mixed media library bar code labeling 199
grandfather 216 mounted local drives, backing up files and
son 214 directories 252
Media Rotation Wizard 217 Move Media to Vault Report 849
media rotation, defined 1265 moving
media server media from user-defined vault 213
backing up using one-button backup 292 media to a media set 219
connecting 68 MSCS, using with Backup Exec 740
defined 1265
N
running diagnostics on 112
Name & Location dialog box 434
viewing properties 112
named transaction
media servers
include in restore, SQL 2000 998
configuring for robotic library sharing
restore up to, SQL 2000 998, 1003
923
navigation bar, overview 77
media set
Net Send
creating 227
configuring recipients 482
default 189
Index 1283
NetWare methods defined 467
client (or gateway) services 335 modifying alert category properties 492
options 1237 modifying recipient properties 489
NetWare Agent scheduling recipients 488
AUTOEXEC.NCF file 1226 selecting recipients for jobs 492
installing 1225 Novell Storage Management Services tree
overview 37 view 335
Remote Agent 1224 NTFS
system requirements 1224 cluster size 565
TCP/IP only environment 1226 partition 564
NetWare Agent, backing up numbering, specify for media label 207
BEDIAG.NLM utility 1238
O
create BEDIAG.FAX 1238
offline media location
decompressed files 1237
adding media to 211
password database 1228
defined 209, 1265
rights for backup 1228, 1229
offline, when devices display as 120
single server backup strategies 1229
off-site storage of backups 532
strategies for multiple administrators
one-button backup 292
1230
online media location 209, 1265
strategies for single administrator 1230
Online Registration Wizard, using 63
NetWare Agent, restoring 1233
online, putting device back 120
network
open files
changing a backup network for a job 328
backing up 254
overview of backup networks 323
setting default for backing up 318
setting up a backup network 325
unable to back up 562
network options, restore job 445
optimizing remote backups 253
network protocols, IPX/SPX 327
options
network shares, NetWare volumes 335
default for job log 384
New Backup-to-Folder dialog box 145
Options - Set Application Defaults
nodes
General 87
adding or removing a failover node 750
Preferences 85
changing the order in which nodes fail
options, additional Backup Exec options
over 749
described 36
configurations in a cluster 752
Oracle Agent 1161
defined 739
adding media servers 1164
disaster recovery using IDR 774
archived redo logfiles 1151
nonlogged operations occurring in SQL 7.0
backup mode, described 1155
1039
backup strategies 1152
notification
error messages 1177
assigning recipients to alerts 491
fully specified paths, using 1158
defined 453
installing 1160
notifications
overview 37
assigning alert categories 491
renaming data files from a single
clearing recipients 492
tablespace 1158
configuring MAPI e-mail 469
shutting down and restarting the Oracle
configuring pager 471
database 1156
configuring SMTP e-mail 467
system requirements 1152
configuring SNMP 494
troubleshooting 1177
configuring VIM e-mail 470
Index
redefining for robotic library 142
requirements 1154
password database, NetWare Agent 1228
server manager 1155
pausing a device 120
SID 1157
pausing device 95
SID name 1163
performance, increasing during backups of
tablespace data 1153
remote systems 822
TCP/IP address 1164
physical check, SQL 2000 987
Oracle Agent, disaster recovery
PHYSICAL_ONLY utility 982
file system backup 1174
placing scheduled job on hold if test run fails
Oracle database server and media server
311
combination 1176
point in time log restore option
remote Oracle database server 1175
SQL 2000 998, 1002
requirements 1174
SQL 7.0 1045, 1048
tablespace data files 1174
portal support 181
Oracle Agent, restoring
post-job command
closed database 1171
setting for backup job 256
database control file 1173
setting for restore job 416
individual tablespaces 1172
pre/post command options for jobs 320
online database 1170
Index 1285
Pre/Post Commands 320 Q
prefix, creating for media label 207 Quick Start Edition of Backup Exec,
pre-job command described 32
setting for backup job 256
R
setting for restore job 416
R/3 Agent
preserve tree option
backing up the R/3 database 1205
for backup job 249
R/3 Agent for Oracle Server
for backup template 280
BACKINT implementation 1199
for restores 411
how it works 1199
primary navigation bar 784
installing 1201
primary server
requirements 1201
defined 911
security 1200
printer, configuring recipients 485
R/3 Agent for Oracle Server, restoring
priority
disaster recovery requirements 1207
changing for scheduled job 375
submitting restore jobs 1206
setting for backup job 247
R/3 database server, restoring, remote
setting for drives in pools 99, 121, 153
recovery 1208
setting for restore job 410
reapplying templates to jobs 286
Problem Files Report 850
reassigning how slots appear 137
product updates, receiving 70
Rebuild Master utility, SQL 7.0 1051
prompt before overwriting allocated or
Recently Written Media Report 851
imported media 205
recipients
properties
assigning alert categories 491
active job 370
clearing recipients 492
alerts 457
configuring 477
Lotus Domino 1187
configuring groups 487
media
configuring MAPI e-mail 474
cleaning 225
configuring Net Send 482
general 220
configuring new for jobs 493
management 222
configuring pager 479, 485
statistical 223
configuring SMTP 472
report 512
defined 472
protecting Windows XP and Windows.NET
modifying alert category properties 492
systems 333
selecting for notifications 492
public folders
recovery completion state
Exchange 2000
SQL 2000 995
backing up 1080
SQL 7.0 1042
best practices 1081
recovery requirements in IDR 891
exclude specific folders 1081
recyclable media, defined 191, 1266
redirecting restores 1093
redirected restore
restore overview 1089
See also names of individual agents
Exchange 5.5
using to install Domain Controllers from
backing up 1115
Media 439
best practices 1116
redirecting scheduled job 103
exclude specific folders 1116
registry, restoring 414
redirecting restores 1127
Remote Administrator
restore overview 1123
defined 1266
restore public folder option 1120
running 68
published drives, defined 569
Index
Backup Success Rate Report 837 order, changing 265
configuration settings 518 resource discovery
Daily Jobs 841 creating job 295
Daily Jobs by Resource 838 defined 1266
Daily Network Device Utilization 842 Resource Risk Assessment Report 852
deleting in job history 511 resource, defined 1266
device summary 519 responding to active alerts 459
Error Handling Rules 521 restore job
error-handling 521 Advanced File Selection 430
event logs 522 advanced options 412
Event Recipients 843 canceling 446
Failed Backup Jobs 844 copying to another server 831
Job Distribution by Device 845 creating through dialog boxes 404
Job Queue Status 845 creating using script file 686
Job Templates 846 creating with wizard 403
Machines Backed Up 847 file permissions 420
Media Required for Recovery 848 general options 409
media sets 523 Lotus Domino options 1192
Index 1287
over existing files 410 single-pass restore with Intelligent
overview 403 Image Option 948
pre/post commands 416 using the media view 428
preserve tree option 411 using the resource view 428
R/3 Agent for Oracle Server 1206 resuming a drive 95
redirecting 436 retarget job 103
redirecting Lotus Domino 1194 retensioning a tape 171
running from command line 618 retired media
security 411 defined 191, 1267
setting defaults 441 moving damaged media 196
specifying network 445 Retrieve Media from Vault Report 853
Restore Job Properties dialog box returning to a previous configuration 533
Exchange 2000 1085 rjscript.txt 660
Exchange 5.5 1119 robotic library
Exchange Redirection page 1091, 1125 cleaning jobs 178
SQL 2000 994 configuring 133
SQL 7.0 1041 configuring partitions 140
restore job script file 686 creating partitions 140
saving and launching 704 defined 1267
Restore Selections dialog box 428 displaying storage devices 1146
restore, defined 1266 example configuration 1145
restoring exporting media 181
ARCserve tapes 426 importing media 180
byte count does not match 566 lock front panel 182
caution about canceling an IIO restore portal support 181
job 954 problem with not displaying 559
closed Oracle database 1171 redefining partitions 142
clusters setting up hardware 1143
cluster quorum for Windows 2000 unlock front panel 183
and Windows.NET 768 using with Backup Exec 132
cluster quorum on node running viewing 1148
Active Directory 769 viewing properties 134
Windows 2000 and Windows.NET Robotic Library Inventory Report 526
767 robotic library properties
Distributed file system (Dfs) 424 Configuration tab 136
Exchange 2000 1085 General tab 135
Exchange 5.5 1119 SCSI Information tab 138
individual Oracle tablespaces 1172 Status tab 139
Intelligent Image Option backup sets 954 robotic library sharing
Lotus Domino Agent 1190 between Windows and NetWare servers
media view 395 922
media with hardware compression 561 prerequisites 922
NetWare Agent volume restrictions 1237
S
online Oracle database 1170
SAN Shared Storage Option (SSO)
Oracle database control file 1173
device allocation 916
registry 414
device operations 921
resource view 395
installing 915
searching for files 433
overview 37
selecting data 428
Index
information about drives 125 server properties
information about robotic library 138 viewing 112
modes 560 viewing server information 113
setting address for robotic library drives viewing system properties 114
1143 Server tab 113
SCSI bus, configuring for tape devices in a ServerFree Option
cluster 755 installing 944
SCSI pass-through mode, setting for drives overview 38
123 service account
search catalogs 433 changing 65
secondary navigation bar 784 described 46
security services
changing for Windows systems 44 starting and stopping 65
R/3 Agent for Oracle Server 1200 starting and stopping on multiple
restoring 411 servers 933
select into/bulk copy option, SQL 7.0 1039 Set Application Defaults, Preferences 85
selecting devices and data to back up 259 Set Primary SAN SSO Server, See also
selection lists
Index 1289
Backup Exec Utility WMI 499
Set Remote Agent Priority 253 software license agreement 47, 67
Shadow Copy Components son media rotation strategy 214
backing up 333 Sony, recommended driver 558
selecting for backup 333 Specified Backup Network feature
shared catalogs, using 911 configuring 325
shared device, defined 1267 described 323
SharePoint Agent 1211 splash screen, show at startup 85
backing up a SharePoint Portal Server or SQL 2000
Workspace 1213 agent features 975
disaster recovery 1221 agent installation 977
installing 1213 agent requirements 976
overview 38, 1211 Backup Job Properties dialog box 984
redirecting restore jobs 1217 consistency check, recommendations
restoring SharePoint Portal Servers and 981
Workspaces 1215 Database Consistency Check (DBCC),
system requirements 1212 recommendations 981
SharePoint Portal Server disaster recovery preparation 1018
command line, backing up from 605 logon accounts 978
disaster recovery 1221 overview 975
redirecting restore jobs 1217 SQL 2000, backing up
sharing media 911, 931 backup job script file method 719
silent mode installation 46, 56, 1267 backup methods 985
simple recovery model, SQL 2000 975 command line 604
single block mode, setting for drives 123 consistency check after backup 987
single instance backup for message consistency check recommendations 981
attachments databases 988, 989
Exchange 2000 1077 disaster recovery preparation 1018
Exchange 5.5 1113 filegroups 991
single instance backup for NTFS volumes Guide Me wizard 988
252 loading state 987
Site Replication Services (SRS) database, standby mode 987
backing up 1071 strategies for 980
size, cluster 565 transaction logs 993
slot base configuration 137, 1148 Windows registry 980
Small Business Server Edition of Backup SQL 2000, restoring
Exec, described 32 automate master database restore 996
SMTP create standby database 995
configuring e-mail recipients 472 database files to target instance 997
SMTP e-mail notification method 467 disaster recovery 1020
SNMP filegroups 1004
configuring notification 494 Guide Me wizard 998
configuring system service for Windows Intelligent Disaster Recovery (IDR)
2000 498 option 1018
configuring system service for Windows master database 1007
NT 497 named transaction, include 998
installing WMI provider 499 named transaction, to a 998, 1003
object identifier prefix 494 point in time log restore option 1002
traps, defined 494 primary and nonprimary filegroups 999
Index
filegroups 1037 system logon account 349
Guide Me wizard 1034 system media, defined 190, 1267
nonlogged operations occurring 1039 system requirements
select into/bulk copy option 1039 See also names of individual agents and
transaction logs 1040 options
truncate log on checkpoint option 1035, Backup Exec 42
1039 System State
Windows registry 1029 backing up on remote systems 825
SQL 7.0, restoring restoring 421
automate master database restore 1043 System Summary, overview 80
create standby database 1042 System tab 114
disaster recovery 1063
T
filegroups 1049
tablespace data, Oracle Agent 1153
Guide Me wizard 1045
tape driver, recommended use 558
primary and nonprimary filegroups
tape drives, cartridge 558
1045
tapes
Rebuild Master utility 1051
See also media
recovery completion state 1042, 1059
Index 1291
DLT tape drive 561 VERITAS policy domain, default
target domain, defined 45 1254
task pane, overview 77 components
TCP/IP Backup Exec default node name 1255
adding for user-defined shares 275 Backup Exec default node
enabling protocol 327 registration 1255
required for UNIX Agent 584 backupexec_pi storage pool
Template Definition Usage Report 854 associated with bexpi.dsm file 1254
test run job backupexec_pi storage pool, defined
creating 307 1244
defined 307 backuppool 1244, 1254
running for scheduled job 376 bex.mac macro, command details
setting defaults 310 1254
Tivoli Storage Manager (TSM) Option, bex.mac macro, defaults created by
overview 38 1254
transaction logs bex.mac macro, defined 1245, 1253
Lotus Domino DBIID 1186 bex.mac macro, errors while
overview, Lotus Domino 1186 executing 1248
recycling, Lotus Domino 1189 bex.mac macro, using with shared or
viewing Lotus Domino 1182 individual nodes 1248
transaction logs, backing up bex_backup policy set, default 1254
SQL 2000 992 bexpi.dsm file, as used in bex.mac
SQL 7.0 1039 macro 1254
troubleshooting creating backupexec_pi storage pool
clusters 779 1245
Oracle Agent 1177 creating the bexpi.dsm file 1246
TSM option 1256 diserror.log error log 1256
truncate log on checkpoint option, SQL 7.0 dsmfmt utility, defined 1245
1035, 1039 dsmfmt utility, using to create a
TSM Option storage volume 1246
Backup Exec as TSM client 1242 dsmrc.h file 1256
commands MC_PI management class 1243
management classes created by MC_VT management class in theory
bex.mac macro 1254 of operation 1244
MC_PI management class created by Position Information (PI) data
bex.mac macro 1254 stream, defined 1243
MC_VT management class created setting backup versions to keep 1255
by bex.mac macro 1254 storage volume, creating with
objects, default size 1254 dsmfmt utility 1246
objects, defined 1254 theory of operation 1243
password for backupexec node, error logs 1256
default 1255 individual nodes 1248
policy domain VERITAS, default registering nodes 1249
1254 registry keys 1249
policy set bex_backup, default 1254 changing default number of slots in
registering nodes 1255 robotic library 1251
time to retain only backup version, changing default password 1253
setting 1255 communications timeout, changing
default 1250
Index
exclude directories/files 590 Lotus Domino databases 1182
identify exported paths 589 Lotus Domino transaction logs 1182
include remote file systems 589 scheduled jobs 374
password-protect published path 589 views, alerts 454
password-protect workstation 588 VIM
preserve ctime 590 configuring recipients 477
publish directory tree 589 VIM, e-mail notification method 470
write-protect published path 589 virtual devices, using in IDR 858
unlocking robotic library panel 183 virtual servers, backing up in a cluster 765
user account, Oracle Agent 1154 virus, effect on data storage requirements
user-defined media vault 209, 1265 338
adding media to 211 volume restrictions, NetWare Agent 1237
creating 210
W
deleting 213
Windows 2000
renaming 211
remote systems, backing up with Backup
user-defined selections, adding 275
Exec Remote Agent 825
utility jobs, overview 164
System State, backing up on remote
utility partitions
systems 825
Index 1293
Windows 98/Me Agent Windows Management Instrumentation
installing 571 (WMI), adding WMI capability 499
password-protecting published folders Windows NT
575 disaster recovery 541
publishing drives and directories 574 drivers list 558
set directories as read-only 575 Windows registry, backing up
system requirements 570 SQL 2000 980
Windows 98/Me Agent, configuring SQL 7.0 1029
allow registry restore 573 Windows XP
current status 573 disaster recovery 537
disable and enable network backup 573 Windows.NET
overview 572 backing up 333
publish directories 574 disaster recovery 537
set up network protocol 576 support in Backup Exec 33
set workstation password 573 wizards
using DHCP 576 accessing using the Assistant 82
Windows Automated System Recovery defined 1268
(ASR) files, in IDR, defined 855, 859 WMI
Windows Change Journal installing performance counter provider
option to use for backup job 249 499
using to determine backed up status 346 installing SNMP provider 499
Windows Explorer, backups performance counters 499
creating 286 uninstalling SNMP provider 500
enabling 85 WMI See Windows Management
overview 286 Instrumentation
specifying or changing settings 287 working set backups, defined 343, 1268
submitting 290 write checksums to media 244