Professional Documents
Culture Documents
Symantec Backup Exec Continuous Protection Server 2010 R3: Administrator's Guide
Symantec Backup Exec Continuous Protection Server 2010 R3: Administrator's Guide
Symantec Backup Exec Continuous Protection Server 2010 R3: Administrator's Guide
Administrator's Guide
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version: 2010
Legal Notice
Copyright 2011 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (Third Party Programs). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
Technical Support
Symantec Technical Support maintains support centers globally. Technical Supports primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantecs support offerings include the following:
A range of support options that give you the flexibility to select the right amount of service for any size organization Telephone and/or Web-based support that provides rapid response and up-to-the-minute information Upgrade assurance that delivers software upgrades Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis Premium service offerings that include Account Management Services
For information about Symantecs support offerings, you can visit our Web site at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy.
Hardware information Available memory, disk space, and NIC information Operating system Version and patch level Network topology Router, gateway, and IP address information Problem description:
Error messages and log files Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes
Customer service
Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues:
Questions regarding product licensing or serialization Product registration updates, such as address or name changes General product information (features, language availability, local dealers) Latest information about product updates and upgrades Information about upgrade assurance and support contracts Information about the Symantec Buying Programs Advice about Symantec's technical support options Nontechnical presales questions Issues that are related to CD-ROMs or manuals
Contents
Technical Support ............................................................................................... 4 Chapter 1 Introducing Symantec Continuous Protection Server ............................................................................... 13
About Symantec Backup Exec Continuous Protection Server ................ Components of Continuous Protection Server ................................... How Continuous Protection Server works ......................................... What you can do with Continuous Protection Server ........................... About backup strategies and planning ............................................. Data protection considerations ................................................. About backup job schedules ..................................................... Where to find more information ..................................................... Accessing the Continuous Protection Server documentation ................................................................ Accessing the online Help ........................................................ Accessing the Symantec Technical Support Web site .................... Accessing the Symantec Backup Exec Web site ............................ 13 14 16 19 20 21 21 23 23 24 24 24
Chapter 2
Contents
Drivers that are installed ......................................................... Continuous Protection Server services that are installed ............... Registry entries ..................................................................... Performing an initial installation .................................................... Viewing installation logs ......................................................... Push-installing Continuous Protection Server components .................. Upgrading to Continuous Protection Server 2010 ............................... Modifying Continuous Protection Server installations ........................ Uninstalling the Continuous Protection Server .................................. Uninstalling a Continuous Protection Agent .....................................
36 36 36 37 42 43 46 47 47 48
Chapter 3
Chapter 4
Contents
Defining a retention policy for a snapshot .................................. Viewing snapshot history ........................................................ States of snapshot indexing ..................................................... Deleting snapshots ................................................................. Configuring registry entries ........................................................... Accessing the Settings Utility ................................................... About the Settings Utility tunable parameters ............................. Changing Settings Utility parameters ........................................
71 72 73 73 74 74 75 85
Chapter 5
Chapter 6
Chapter 7
10
Contents
Installing Backup Exec Retrieve .................................................... About configuring Backup Exec Retrieve ......................................... Adding a data source ............................................................. Editing a data source ............................................................. Deleting a data source ........................................................... Uninstalling Backup Exec Retrieve ................................................ Troubleshooting Backup Exec Retrieve ...........................................
Chapter 8
Chapter 9
131 131 132 132 133 133 135 137 137 138 140 143 143
Contents
11
Chapter 10
Appendix A
12
Contents
DEFINITIONS. ..................................................................... LICENSE TO USE. ................................................................. RESTRICTIONS. ................................................................... LIMITED WARRANTY. .......................................................... DISCLAIMER OF WARRANTY. ................................................ LIMITATION OF LIABILITY. ................................................... SOFTWARE UPDATES FROM SUN. .......................................... SOFTWARE FROM SOURCES OTHER THAN SUN. ...................... TERMINATION. ................................................................... EXPORT REGULATIONS. ....................................................... TRADEMARKS AND LOGOS. .................................................. U.S. GOVERNMENT RESTRICTED RIGHTS. .............................. GOVERNING LAW. ............................................................... SEVERABILITY. ................................................................... INTEGRATION. .................................................................... SUPPLEMENTAL LICENSE TERMS ..........................................
176 176 176 177 177 177 177 178 178 178 179 179 179 179 179 180
Appendix B
Chapter
About Symantec Backup Exec Continuous Protection Server Components of Continuous Protection Server How Continuous Protection Server works What you can do with Continuous Protection Server About backup strategies and planning Where to find more information
14
Continuous Protection Server lets end users restore their own data through Backup Exec Retrieve, a Web-based data-retrieval tool. End users can retrieve their own files without IT assistance, and you do not need to install any software or clients on their computers. Continuous Protection Server is compatible with the following Symantec products:
Backup Exec (11d or later) for Windows Servers Protects your application servers such as Microsoft Exchange, SQL, and the Continuous Management Service. It also provides long-term storage to various media. Provides easy-to-use online disk storage management for mission-critical, enterprise Windows environments.
Description
The Backup Group includes the following components:
One Continuous Management Service At least one Business Server At least one Protection Server CPS Administration Console
Business Servers
The Business Servers store the data that users save during the course of their daily operations. Once data is saved to the Business Server, the data can be backed up to a Protection Server. The Business Servers must reside in the same Backup Group as the Protection Server. You must install a Continuous Protection Agent on each Business Server. The Protection Server is the destination of the CPS backup data. It is typically installed at a primary location or a central office. The Protection Server hosts the backup destinations where snapshots are taken and indexed. More than one Protection Server can be installed in the Backup Group.
Protection Server
15
Continuous The Continuous Management Service does the following: Management Service Provides primary control of the CPS processes
Retains configuration settings from the Administration Console Manages the CPS system
Note: You can install only one Continuous Protection Server in a Backup Group. You must
install the Continuous Protection Server before you install any other components. Also, the Continuous Protection Server should be installed on a server that has a fixed IP address. See Performing an initial installation on page 37. Continuous Protection Agent Administration Console The Continuous Protection Agent manages data collection during backup and restore jobs. You must install it on all Business Servers and Protection Servers in the Backup Group. The Administration Console controls all aspects of CPS, including defining data sources and destinations, creating backup and restore jobs, and defining backup and snapshot schedules. Additionally, the Administration Console is used to view and respond to alerts, monitor backup and restore jobs, and obtain product updates from Symantec.
Backup Exec Retrieve Backup Exec Retrieve allows workstation users to find and retrieve the files that were backed up with CPS, without requiring any assistance from system administrators. Workstations only require Web browsers to use this feature, so you do not need to install the Continuous Protection Server software on the users workstations. Users can browse all of their backed up files, or they can search for files by using full or partial file names. They can also view and restore versions of backed up files. Backup Exec SmartLink Remote Agent for Windows Systems (Remote Agent) This component lets users view the combined status of CPS and Backup Exec jobs in the Backup Exec Administration Console. Continuous Protection Server uses the Symantec Backup Exec Remote Agent for Windows Systems (Remote Agent) to access System State information for backup and restore. Remote Agent also enables Backup Exec to back up Protection Servers and the CMS to tape efficiently. Remote Agent is an optional component. You should install the Remote Agent on the following servers:
On Business Servers if you want to back up System State On Protection Servers that you want to back up with Backup Exec On servers that host the CMS and that you back up with Backup Exec
Remote Agent is not required when CPS is installed on Backup Exec because the server already contains Remote Agent functionality. However, the Remote Agents that are used by CPS and Backup Exec must be the same version (11d or later).
16
Introducing Symantec Continuous Protection Server How Continuous Protection Server works
Symantec LiveUpdate Symantec LiveUpdate is installed with the Administration Console. LiveUpdate notifies administrators when updates to installed Symantec products become available for download. LiveUpdate connects to the Symantec LiveUpdate server by the Internet.
Introducing Symantec Continuous Protection Server How Continuous Protection Server works
17
Figure 1-1
1
Business Servers (Local or Remote Offices) (Continuous Protection Agent) CPS Admin Console
3
Protection Server (Continuous Protection Agent)
6
Continuous Management Server
Copy Center
4
Web Server
7
Backup Exec Admin Console Backup Exec media server
The following scenario provides an example of how you can use Continuous Protection Server with Backup Exec to back up and restore data:
18
Introducing Symantec Continuous Protection Server How Continuous Protection Server works
Users save files and folders to local file servers (Business Servers) as part of their normal daily work. Business Servers are interconnected and together form a common Backup Group. See Configuring Business Servers on page 59.
The Continuous Protection Server Backup Destination Wizard designates a specific directory on a specific Protection Server where the data is backed up. The backup-destination definition includes the schedule for the data snapshots and the policies for snapshot retention. Different servers can be designated as backup destinations based on your needs. For example, separate destinations can be created for financial data on a server in the accounting department, employee data on a server in human resources, and customer records on a server in the sales department. See Managing backup destinations on page 65.
You can use the Backup Job Wizard to create Continuous Protection Server backup jobs to back up data from one or more Business Servers to a Protection Server. When you create a job, you select the data to be backed up and the schedule for the backup job. You can schedule CPS backup jobs to run at specific times (periodically), as files incur any changes (continuously), or as needed (on demand). See Creating CPS backup jobs on page 88.
As soon as the data is backed up to the Protection Server, scheduled snapshots of the data are made. The data is then indexed and made available in Backup Exec Retrieve. See Managing snapshots on page 68.
Users retrieve specific files and folders to their workstations by using Backup Exec Retrieve. Users can select specific versions of their data to be restored. If a system failure occurs at one or more Business Servers, the backed up data can be quickly restored from the Protection Server to the Business Server. See About restoring data with Continuous Protection Server on page 99.
After the data is backed up to the Protection Server, you can back up the data to Backup Exec to archive the data to tape or disk for long-term storage. See Backing up CPS with Backup Exec on page 133.
If a system failure or data loss occurs at a Protection Server, Backup Exec can quickly restore the data back to the Protection Server or back to a Business Server. See Restoring Continuous Protection Server with Backup Exec on page 135.
Introducing Symantec Continuous Protection Server What you can do with Continuous Protection Server
19
The Backup Exec SmartLink component lets you view the status of Continuous Protection Server backup jobs in the Backup Exec Job Logs and Alerts. This option lets administrators determine the quality and completion of the Continuous Protection Server jobs before or during the Backup Exec backup job. See Monitoring CPS jobs in Backup Exec on page 137.
Description
CPS backs up files on a network (LAN or WAN) and writes them immediately to a Protection Server with no wait time. You do not need to take incremental or differential backups on servers that are protected by CPS. This feature keeps productivity high while protecting the organizations information. Only the changed data is captured and protected. This granular (or byte-level) protection reduces the amount of data moving across the network, thereby increasing efficiency. Backup Exec Retrieve allows workstation users to find and retrieve the files that were backed up with CPS, without requiring any assistance from system administrators. Workstations only require Web browsers to use this feature, so you do not need to install the Continuous Protection Server software on the users workstations. Entire servers can be backed up, including system files. In the event of a system-wide failure, such as a virus attack, Business Servers (sources) can be quickly restored to a previous state.
Byte-level protection
Simultaneous backups Provides multi-streaming, which enables multiple file servers to be continuously backed up at one time to a single Protection Server. Administration Console Point-in-time snapshots The Administration Console enables users to define backup destinations, customize jobs, view status, and learn of any issues that arise. CPS leverages Volume Shadow Copy Service (VSS) snapshots to provide versioning of files. This allows users or administrators to recover a previous version of a document. Snapshot settings provide administrators with greater flexibility in managing and retaining snapshots.
SmartLink to Existing Symantec Backup Exec users can view some CPS activities from within the Backup Symantec Backup Exec Exec Administration Console. For example, you can view logs for CPS backup jobs. You also can use Backup Exec to move disk-based backups to tape for long-term storage. Flexible backup options Back up only the specific data you need. Save on system resources by backing up only the information that needs to be recovered.
20
Introducing Symantec Continuous Protection Server About backup strategies and planning
Description
Back up files on demand, or schedule periodic and continuous backups to run automatically.
Administrators can set the maximum amount of bandwidth to be used for continuous data protection jobs. Continuous Protection Server protects open files during continuous protection. Retention properties define how long to keep daily, weekly, and monthly backups on disk.
Automatically resumes a continuous protection job when lost connections are restored without requiring intervention from an administrator. Continuous Protection Agents can be push installed to remote servers from a central console. IT resources do not need to be at that office or location where continuous protection is installed or taking place. Intuitive search capabilities enable users to find files by file name, modification date, specific file type, or file size. Information can be backed up from sources in the current network, as well as from new servers as they are added to the Backup Group. Continuous Protection Server captures system state information, reducing the time and effort to recover server configuration information.
Push installation
Discovery
Scalable protection
Symantec LiveUpdate Uses Symantec LiveUpdate to provide periodic product updates. 64-bit native support IPv6 support Settings Utility Supports 64-bit native processors for Business and Protection servers. Supports Internet Protocol 6 (IPv6). Includes a Settings utility where user-configurable registry settings can be managed.
Continuous protection Supports continuous protection of Microsoft Exchange servers to Backup Exec. of Exchange
Introducing Symantec Continuous Protection Server About backup strategies and planning
21
The main purpose of your backup strategy is to recover and restore information as quickly as possible after a loss. Secondarily, you need to manage your resources effectively to save money. A well-designed backup strategy plays a key role in your ability to restore lost files quickly.
How much information needs to be saved and protected? How many servers need to be backed up? How much information can you store and which servers should store it? How long should the data be retained and available? Has the System Information for the server been modified so that it warrants backup protection? What information is business-critical and needs to be backed up continuously (every time the information changes)? What information you back up hourly, daily, weekly, monthly, or at irregular intervals? What information should you back up on an as-needed (manual) basis only? Are shared folders being used, or do all users have unique folders in which their files are stored? Who should have access to the Continuous Protection Server Administration Console for the purpose of changing settings, scheduling backups, restoring information, and managing system alerts? Who should have access to various backup destinations for the purpose of restoring data? How should the backup destinations be organized for access? How often should data snapshots be captured and how many should be retained?
22
Introducing Symantec Continuous Protection Server About backup strategies and planning
The quality of the backup The resources that are required to process and store the information The process of locating information that you need to restore
There are multiple levels of backup schedules that work well together and each organization might use a combination of these practices. Most importantly, all information on your servers should be backed up on a regular basis. Less-essential information should be backed up periodically. Pertinent data, such as data that is used for compliance purposes or that is related to your core products or services, should be backed up continually. See Creating CPS backup jobs on page 88. See Changing a backup job schedule on page 94. Table 1-3 describes the types of scheduled backup jobs that you can create. Table 1-3 Types of scheduled backups Description
Files that are manually backed up by a user on an as needed basis. Files that are backed up on a routine basis. You select the days the backups are run and the time the backups begin. For example, you can back up your personnel data each day, Monday through Friday, at 5:00 P.M. Another example would be to back up all of the Business Servers every Saturday, beginning at 1:00 A.M. Files that are backed up on certain days of the week and run periodically on timed intervals. For example, you can back up your sales proposals every hour, your development data every three hours, your quality assurance data every four hours, and so on. Critical business files, such as customer data, that are backed up continuously. Every time a file changes, the changes are copied to the Protection Server. There is no wait time or preset interval when the information is copied. The backup takes place immediately, even while files are open.
Regular
Periodic
Continuous
23
The XX in the filename indicates the language of the file. The choices are EN (English), ES (Spanish), FR (French), IT (Italian), DE (German), JP (Japanese), KO
24
(Korean), CH (Traditional Chinese), PT (Brazilian Portuguese) and ZH (Simplified Chinese). To access the Continuous Protection Server documentation
1 2 3
Insert the installation media. Using Windows Explorer, navigate to and open the Docs directory. Double-click the file to open it.
1 2
Chapter
Before you install System requirements for the product What gets installed and where Performing an initial installation Push-installing Continuous Protection Server components Upgrading to Continuous Protection Server 2010 Modifying Continuous Protection Server installations Uninstalling the Continuous Protection Server Uninstalling a Continuous Protection Agent
26
Run the Environment Check tool to check for issues that could affect the installation.
If you are upgrading from a previous See Upgrading to Continuous Protection Server version, review the product 2010 on page 46. documentation for any compatibility issues that could affect the installation. Review the Readme file for information See File system filter driver compatibility about incompatible products that on page 29. should be turned off or uninstalled before you install Continuous Protection Server. Review the product documentation for See Understanding the Continuous Protection information about setting up the Server service account on page 29. service account for Continuous Protection Server. Verify that the systems on which you want to install Continuous Protection Server and its components meet the system requirements. See System requirements for the product on page 30.
Configure your firewall to allow traffic See Firewall support on page 33. through the ports that are used by Continuous Protection Server.
Install the Continuous Management Service and an Administration Console before you install other Continuous Protection Server components. You should install the Continuous Management Service and the Administration Console on a dedicated server if possible. See Performing an initial installation on page 37. Use the Administration Console to push-install additional Administration Consoles and Continuous Protection Agents to other Business Servers or Protection Servers. See Push-installing Continuous Protection Server components on page 43. As necessary, use the Administration Console to install additional components.
27
If the computer meets the minimum requirements for installation, such as the operating system, disk and memory space, and sufficient logon account privileges. See System requirements for the product on page 30. If third-party software that uses Continuous Protection Server ports is configured correctly. If required components are installed, and if they are versions that are compatible with Continuous Protection Server. If previous versions of Continuous Protection Server are installed. If storage device hardware and associated drivers are properly installed and recognized by the Windows operating system.
Table 2-1 lists the results that are reported for each flagged item. Table 2-1 Flagged item
Passed
Warning
Failed
Although the Environment Check runs automatically during installation, you may want to run it manually before installing Continuous Protection Server or before backing up data with Continuous Protection Server.
28
1 2 3
Insert the installation media, click Pre-installation, and then click Start the Backup Exec Continuous Protection Server Environment Check. Click Next. Select one of the following:
Local Environment Check Remote Environment Check Checks the configuration of the local computer Checks the configuration of a remote computer
4 5
Click Next. If you checked Remote Environment Check in step 3, do one of the following:
To select the name of computer from a list, click Add Server From List. Select the computer from the list, and then click Next. To add the name of a computer manually, click Add Server Manually. Type the name of the domain and the computer name, and then click OK. Type the user name and password for this computer, and then click OK. To remove the name of a computer from the list of computers on which the Environment Check will run, select the computer from the list, and then click Remove.
Review the results of the Environment Check, especially those items that were flagged as Failed or Warning. To save the results of the Environment Check, check Save Results To.
7 8
To change the location where the Environment Check results are saved, click Change Path to browse to a new location. Click Finish.
29
Log on as a service. Administrator rights (provides complete and unrestricted rights to the computer).
On a computer running Windows Server 2003, you cannot install CPS using a service account that has a blank password. If you attempt to do so, an error message is displayed. You can configure Windows to allow for blank passwords. For more information, see the Windows documentation.
30
The account that is used must be valid on each node in the Backup Group. This account may require establishing a Domain Trust relationship. If a cross domain trust exists between the computers push installing from and to, the account that is running from the installing computer must be present in the local administrators group of the computer being push installed to. When operating in a workgroup environment, all nodes in the backup group must run in non-secure mode. (Pre and post-job scripts run under the service account, although additional rights may be required.)
31
Requirements
This component is supported on the following operating systems:
Microsoft Windows 2000 Server with Service Pack 4 Microsoft Windows 2000 Advanced Server with Service Pack 4 Microsoft Windows Server 2003 x64 Editions
Microsoft Windows Server 2003 (including R2, but not Data Center) with Service Pack 1 Microsoft Windows Server 2003, Small Business Server with Service Pack 1
Microsoft Windows Storage Server 2003 with Service Pack 1 Microsoft Windows Server 2008 and Windows 2008 R2, including Windows Server Core
RAM Disk Space: Continuous Protection Server Software Disk Space: Journals Disk Space: Logs and Alerts Disk Space: Named Objects
100 MB (10 GB or more recommended) 100 MB 100 MB or more depending on server configuration (minimum 1 GB recommended if backing up System State) Uninterruptible power supply (UPS) such as battery backup power, recommended Microsoft Data Access Components (MDAC) version 2.5 or later
UPS Utilities
32
Table 2-3
Component
Supported Operating Systems
Requirements
The Continuous Management Service and Protection Servers are supported on the following operating systems:
Microsoft Windows Server 2003 family (including R2, but not Data Center) with Service Pack 1 Microsoft Windows Server 2003, Small Business Server with Service Pack 1
Microsoft Windows Storage Server 2003 with Service Pack 1 Microsoft Windows Server 2008 and Windows Server 2008 R2, including Windows Server Core
RAM Disk Space: Continuous Protection Server Software Disk Space: Logs and Alerts Disk Space: Indexing Component Volumes
The Protection Server should have at least four separate volumes for ideal performance, such as the following:
System volume Journals volume Backup destination volume Snapshot storage volume for backup destination
UPS Utilities
Uninterruptible power supply (UPS) such as battery backup power, recommended Microsoft Data Access Components (MDAC) version 2.5 or later
33
Requirements
The Administration Console is supported on the following operating systems:
Microsoft Windows 2000 Professional with Service Pack 4 Microsoft Windows 2000 Server with Service Pack 4 Microsoft Windows 2000 Advanced Server with Service Pack 4
Microsoft Windows Server 2003 family (including R2, but not Data Center) with Service Pack 1 Microsoft Windows XP Professional
Microsoft Windows Server 2008 and Windows Server 2008 R2, including Windows Server Core Microsoft Windows 7 (all versions) RAM Disk Space 512 MB, 1GB recommended 35 MB for Console alone, plus the following:
250 MB for 32-bit push-install files 275 MB for 64-bit push-install files
10MB for Settings Utility, plus (if not already installed) the following:
300 MB for .Net framework 2.0 (32-bit version) 600 MB for .Net framework 2.0 (64-bit version)
Utilities
Microsoft Data Access Components (MDAC) version 2.5 or later. Net Framework 2.0 is installed for Settings Utility, if needed
Firewall support
Firewalls must be configured to allow the following ports through to support Continuous Protection Server. CPS automatically creates a firewall exception list. If any of the default port settings are changed on one computer, they must be changed on all computers in the Continuous Protection Server Backup Group. Warning: Incorrectly editing registry keys may severely damage your system. Before making changes to the registry, you should back up any valued data on the computer. Table 2-5 lists the default port settings for Continuous Protection Server.
34
20481
TCP
HKLM\Software\Symantec\Backup Exec CPS\Parameters\Communications\FFXport HKLM\Software\Symantec\Backup Exec CPS\Parameters\RPC Interface\RxRsaStaticPort HKLM\Software\Symantec\Backup Exec CPS\Parameters\RPC Interface\RxRmsStaticPort
CPA RPC
20483
TCP
CMS RPC
20485
TCP
Additionally, the Continuous Protection Server Services Manager, push-install, and Settings Utility utilize Windows file sharing (NetBIOS or SMB) ports. In order for these services to function, you must configure the ports. Table 2-6 lists the ports that you should not open to the Internet. Table 2-6 Service Name
Windows (NetBIOS over TCP/IP) Windows (NetBIOS 137 138 139 UDP UDP TCP No
Ports that should not be opened to the Internet Default Port Number Port Type Editable Registry Key
445 TCP No
Continuous Protection Server also uses the following ports on the local server:
Because these ports are only used on the local server, it is not necessary (or recommended) that they be opened through your firewall.
35
Description
The ASA folder contains the Win32 and Charsets folders. The Win32 folder contains the ASA database engine and its backup files, DBMS service, ASA support files, and ASA query tool. The database backup (cpsDBBackup.exe) and validation (cpsDBValidate.exe) utilities are also contained in this folder. The Charsets folder contains ASA Unicode support files.
Autonomy
Continuous Protection Server uses a third-party indexing service that is called Autonomy. The Autonomy folder contains all the files and services that are used by the indexing service. The Autonomy log files are also maintained in this folder. The Database folder contains the Continuous Management Service (rms.db) and Continuous Protection Agent (rsa.db) databases, their backup copies, and the related database files. The Drivers folder contains the Continuous Protection Server filter driver. The Install folder contains Continuous Protection Server, Remote Agent, and Symantec LiveUpdate installation files for push installs. The Services folder contains Continuous Protection Server service executable files and associated support files. The Logs folder contains the Network Helper (ENL) log and trace logs.
Database
Drivers Install
Services
Logs
36
Backup Exec RepBrokerSvc Continuous Protection Broker Service Backup Exec rxWriterSvc Continuous Protection Configuration Writer Backup Exec RxASA Continuous Protection Database Backup Exec RxNoService Continuous Protection System State Manager Backup Exec ENL Continuous Protection Network Helper (ENL)
Controls the configuration database for all Continuous Protection Server information.
Enables the Continuous Management Service to group and discover Continuous Protection Agents and communicate with them.
Registry entries
Continuous Protection Server adds the following registry keys:
37
This location stores information about the journal directories, Continuous Protection Server installation path, Continuous Management Service database installation directory, Continuous Protection Server parameters, and Continuous Protection Server build details.
HKLM\SYSTEM\CurrentControlSet\Services\ This location stores information about the Continuous Protection Server database technology (Adaptive Server Anywhere, version 9), file system filter driver, file system journal writer driver, and the file system recognizer driver configuration.
Registry entries can be changed using the Settings Utility. See Accessing the Settings Utility on page 74.
A server that has the Continuous Management Service, the Continuous Protection Agent, and the Administration Console installed. This server becomes the central management point in the Backup Group. A Continuous Protection Agent on each Business and Protection Server with the Indexing Component installed on each Protection Server. Any number of Administration Consoles.
Note: The Continuous Management Service components can be installed on a Backup Exec server or on a stand-alone server. If Continuous Protection Server is installed on Backup Exec, then that Backup Exec installation must be upgraded to Backup Exec 2010. If Continuous Protection Server is installed on a stand-alone server, then the latest version of the Remote Agent is also installed. A Remote Agent is not installed on Backup Exec. The first step in creating a fully functional environment is configuring the server that hosts the Continuous Management Service. Establishing the Continuous Management Service is usually accomplished by performing an initial installation from the installation media. Continuous Protection Server application files that should be installed during the initial installation include the Continuous Management Service and an Administration Console. If the server hosting the Continuous Management Service will also be a Business or Protection Server, a Continuous Protection Agent must also be installed. Backup Exec Retrieve is also installed. The Remote Agent is
38
installed optionally during the initial installation with a Continuous Protection Agent. Symantec LiveUpdate is installed automatically with an Administration Console. Firewalls need to be manually reconfigured for installation media and push installation. Alternatively, firewalls can be turned off during the installation process. See Firewall support on page 33. See Understanding the Continuous Protection Server service account on page 29. To use the versioning capabilities of Backup Exec Retrieve, Protection Servers must be running Windows Server 2003. See System requirements for Continuous Management Service and Protection Servers on page 31. Note: After installing Continuous Protection Server on a computer running Windows Server 2003, you might receive an error message that the Network Load Balancing Service failed to start. Microsoft reports the cause as: Although network Load Balancing (NLB) is not currently installed, some NLB registry keys might be present in the registry. Although Microsoft Knowledge Base Article 268437 describes the problem as applying to Windows 2000 Advanced Server, the fix also works for Windows Server 2003. For more information, see the Microsoft article entitled Network Load Balancing, Windows 2000 Advanced Server at the following URL: www.microsoft.com Administrator rights are required on the computer where the software is being installed when performing a installation. To perform an initial installation
1 2
Close all other programs that may be running. If Autoplay is enabled, the Install should automatically launch when the -ROM is inserted in the drive. If Autoplay is not enabled, double-click browser.exe file from the -ROM or download directory. Select the language, and then click OK. The welcome screen for Backup Exec Continuous Protection Server provides links to access various areas of the installation . After reviewing the various product information, click Pre-installation. Click Start the Backup Exec Continuous Protection Server Environment Check, and then click Next.
3 4
39
6 7
Select either Local Environment Check or Remote environment check. Do one of the following:
If the Environment Check does not reveal any issues that may prevent a successful installation of Continuous Protection Server, click Finish. If the Environment Check reveals issues that may prevent a successful installation of Continuous Protection Server, correct the issues before attempting to install again.
Select Start the Backup Exec Continuous Protection Server Installation to install Continuous Protection Server, and then click Next. Continuous Protection Server will determine whether the computer is a 32-bit or 64-bit server and install the appropriate version of the software.
Review the Continuous Protection Server Installation Wizard welcome screen, and then click Next. then click Next.
10 Read and accept the license agreement on the License Agreement screen, and 11 Select one of the following methods to enter license keys, and then click Next.
To enter license keys manually In the License Key box, type the license key number, and then click Add. Repeat this step for each license key for each option or agent you want to add. Click Import, and then select the cpssernum.xml file. Leave the license key field blank, and then continue with step 14.
The license keys you entered are saved to the cpssernum.xml file, located in the Windows or WINNT directory.
40
Settings Utility
41
Check this option to allow for continuous protection of Microsoft Exchange Servers. An Exchange Protection Agent with the Continuous Management Service and a Continuous Protection Agent must be installed on the Backup Exec media server. An Exchange Protection Agent must be installed with the Remote Agent and a Continuous Protection Agent on the Microsoft Exchange system. If you cannot select this option, check your DNS for proper settings.
13 On the Backup Group screen, enter a name of the Backup Group and the name
of the Continuous Management Service, and then click Next. When you click Next, you may be prompted with a Windows Security Alert screen with options of Keep Blocking, Unblock, or Ask Me Later. This security screen is displayed due to the installer looking for an existing Continuous Management Service that already has the specified Backup Group name registered. Select Unblock to continue.
14 On the Services screen, enter the credentials for the Backup Exec Continuous
Protection Server Service Account, including user name, password and domain.
15 Click Next. 16 If a Continuous Management Service was selected for this installation and
the Continuous Management Service server has multiple NIC cards, the Network Interface Selection screen is shown. Select the Network interface to use for the Backup Group management and verify the displayed settings.
17 Click Next.
42
18 On the Support Folder screen, accept the default directories or change the
directories, and then click Next.
System Cache Directory Select or browse to the directory where Continuous Protection Server can store System Information (System State and Shadow Copy Components) data to be backed up. The System Cache is a holding area for the system information and share information. At a minimum, System information requires at least 5 GB of disk space. If the server performs additional roles, such as also acting as a domain controller, more space is required. Journal Directory Select the default journal directory or browse to another directory to hold the backup journals. The Journal Folders contain the dynamic changes of the data that occur during continuous backups. Select the default directory or browse to another directory to hold the indexing database. The indexing component holds indexes of the snapshots that are captured on the Protection Server.
Indexing Directory
19 On the Ready to Install the Program screen, review the selections, and then
click Install.
43
installation logs are located in %allusersprofile%\symantec\Backup Exec CPS\logs. The file name is Cpsinst.log
Operating system
Windows Server 2008 and Windows Server CPA or the Administration Console. You 2008 R2 cannot install the Administration Console on a computer that runs the Windows Server Core installation option of Windows Server 2008. Windows Server 2003 Windows 2000 Server Windows Vista Windows XP Windows 7 CPA or the Administration Console CPA or the Administration Console Administration Console Administration Console Administration Console
44
If CMS is installed on a computer that runs Windows Server 2003, you can push-install the CPA and the Administration Console components to computers that run various operating systems. Table 2-10 lists the operating systems to which you can push-install CPS components if CMS is installed on a computer that runs Windows Server 2003. Table 2-10 Components you can push-install from Windows Server 2003 CPS component
CPA or the Administration Console CPA or the Administration Console Administration Console Administration Console
Operating system
Windows Server 2003 Windows 2000 Server Windows Vista Windows XP
Windows Server 2008 and Windows Server Administration Console 2008 R2 Windows 7 Administration Console
Firewalls need to be manually reconfigured for installation from media and push-installation. Alternatively, firewalls can be turned off during the installation process. See Firewall support on page 33. See Understanding the Continuous Protection Server service account on page 29. Administrator rights are required when push installing components to remote computers, as well as backup rights to the computer hosting the Continuous Management Service (CMS). If a cross domain trust exist between the computers push installing from and to, the account that is running from the installing computer must be present in the local administrators group of the computer being push installed to. Push-installing Continuous Protection Server components
1 2 3 4
On the Windows taskbar, click Start > Programs > Symantec > Backup Exec CPS > Backup Exec CPS Console. On the navigation bar, click Setup. On the task pane, under Server Tasks, click Push install CPS components using wizard. Review the introduction on the Welcome to the Push Install CPS Components Wizard screen, and then click Next.
45
On the Select a Computer screen, type or browse to the name of the computer on which to install the components. Alternatively, type the IP address for the computer. If the computer to which the components are installed is located on a different subnet, naming services such as Dynamic Name Service (DNS) or Windows Internet Naming Service (WINS) must be established across the routes for proper product operation and communication to occur.
6 7
Click Next. On the Select Components screen, select the components you want to install. By default, all options are pre-selected for installation. For optimal performance, some Continuous Protection Server components should be installed in separate volumes from one another. The Journal Folder, Indexing Component, Backup Destination, and System volume should all be in separate volumes.
8 9
Click Next. Enter the Credentials for the Backup Exec CPS Service Account, including user name, password and domain.
10 Enter the License Key provided, and then click Next. 11 On the Local System Object Cache Path screen, select or browse to the
directory where Continuous Protection Server can store System Information (System State and Shadow Copy Components) data to be backed up. The Local System Object Cache is a holding area for the system information and share information. At a minimum, System Information will require at least 2 GB of disk space (larger for Windows Server 2008). If the server performs additional roles, such as also acting as a domain controller, more space is required.
12 Click Next. 13 On the Select Journal Path screen, select the default journal directory or
browse to another directory to hold the backup journals. The Journal Folders contain the dynamic changes that occur during continuous backups.
14 Click Next. 15 On the Select Indexing Database Path screen, select the default directory or
browse to another directory to hold the indexing database. The indexing component holds indexes of the snapshots that are captured on the Protection Server.
46
16 Click Next. 17 Type or browse to the installation path on the remote computer where the
services will be installed. Installation must occur on one of the drives that are shown in the drop-down list although the rest of the path may be modified.
18 Click Next. 19 If a Protection Agent is being installed, the server must be restarted for the
installation to complete. Select Restart the computer if required for this to occur automatically at the end of the installation. If not, the system must be manually restarted before this server is part of the Backup Group.
20 On the Push Install Summary screen, verify that the settings are satisfactory,
and then click Next.
21 On the Completing the Push Install CPS Components Wizard screen, click
Finish to begin the installation. A screen appears showing the installation progress.
22 Verify that the Protection Agent was properly installed by noting that the
Business Server shows in the server list on the Servers tab. This step may take some time due to the configuration and system restart. The server you add to the Continuous Protection Server Backup Group must be restarted. If you use Microsofts Shutdown Event Tracker, you must restart the server manually after installation.
47
Note: When upgrading a CPS database, all job schedules are disabled to allow Continuous Protection Agents to be upgraded before the Continuous Management Service attempts to start the scheduled jobs. As soon as the Continuous Protection Agents are upgraded, the job schedules must be re-enabled from the Console. To upgrade to Continuous Protection Server 2010
1 2
Before performing the upgrade, close all other programs that may be running. Insert the Continuous Protection Server installation media into the drive. If AutoPlay is not enabled, navigate the installation media and double-click browser.exe. If an earlier version of Continuous Protection Server is detected (version 11.x or 10.x), a prompt appears noting that the earlier version must be manually uninstalled before Continuous Protection Server 2010 can be installed.
3 4
Click Update to continue. If you are upgrading a Continuous Protection Agent, when prompted, enter the license keys for CPS and then click Next to continue. The installation wizard detects which earlier components are already installed on that server, and then updates them to Continuous Protection Server 2010.
48
1 2 3 4 5 6
On the Windows Start menu, click Control Panel. Click Add or Remove Programs. In the Currently Installed Programs list, select Continuous Protection Server. Click Remove. Click Yes to confirm that you want to remove the program. A message prompts you to verify that you want to remove all data associated with Backup Exec Continuous Protection Server, which includes Continuous Management Service or Continuous Protection Agent databases, data stored within backup destinations, and the local data cache. Backup Exec Retrieve must be uninstalled separately. Click Yes to all removal of all data, or click No to remove the data manually after the uninstallation process has completed.
If applicable, restart the server to complete the software removal process. A system restart is required if you uninstall a Continuous Protection Agent.
Snapshots cannot be deleted after a Protection Server is uninstalled. Before uninstalling a Protection Server, you need to delete all snapshots. See Deleting snapshots on page 73. After the Protection Server is uninstalled, snapshots must be manually deleted. If a Business Server or Protection Server is being removed from a Backup Group, you must first uninstall the software from the server, and then the server can be removed from the Backup Group. If the Continuous Protection Agent is uninstalled, the user will be prompted to reboot after the uninstall is completed.
1 2 3 4 5
On the Windows Start menu, click Control Panel. On the Control Panel, click Add or Remove Programs. In the Currently Installed Programs list, select Continuous Protection Server. Click Remove. Click Yes to confirm that you want to remove the program.
49
Click Yes to restart the server. You will now delete the unavailable Business Server.
7 8 9
On the navigation bar of the Administration Console, click Setup. In the selection pane, click Servers. In the results pane, right-click the unavailable source, and then click Delete Unavailable Server. The data that is located on the backup destination and all the snapshots are not removed during the uninstall process. Snapshots should be deleted manually before uninstalling the CPA. If the CPA is uninstalled, the user will be prompted to reboot after the uninstall is completed.
50
Chapter
About the Continuous Protection Server Administration Console Starting the Continuous Protection Server Administration Console About the general Administration Console features About the Administration Console views
Add servers to the Backup Group Designate servers that will receive the backup data (Protection Servers) Create and schedule backup jobs Create restore jobs Monitor jobs View alerts
52
Using the Administration Console Starting the Continuous Protection Server Administration Console
1 2
On the Windows task bar, click Start > Programs > Symantec > Backup Exec CPS. Click Backup Exec CPS Console. You can add the option to the Start menu and access it from there. Right-click Backup Exec CPS Console, and then click Pin to Start menu.
Feature
Menu bar
Navigation bar
Task pane
53
Table 3-1
Feature
Selection pane
Preview pane
Status bar
Overview view
You can access the Getting Started, CPS Assistant, or System Summary views from the Overview view. Table 3-2 describes the different views that are available in Overview. Table 3-2 View
Getting Started view
54
Continuous Protection This view provides links to information about the setup, use, and Server Assistant view support of Continuous Protection Server. The information desk provides links to a variety of information such as the following: Documentation, getting started, configuration and Continuous Protection Server wizards. Continuous Protection Server Technical Support Web sites and Knowledge Base. Symantec learning tools and sites.
System Summary view This view displays information about backup jobs, Continuous Protection Server alerts, and backup servers. This view also enables you to get a comprehensive summary of your Backup Group and backup jobs.
Setup view
The Setup view lets you perform many of the functions of Continuous Protection Server, including setting up servers, backup destinations, and backup jobs. You can also create and view snapshots in this view. Table 3-3 describes the common tasks that are available in the task pane of the Setup view. Table 3-3 Task name
Push install CPS components using wizard New backup destination New backup destination using wizard View snapshots
55
Description
Provides specific information on the server, including server name, status (online or offline), IP address, domain, operating system information, build number, installed components, and time zone. Provides specific information on the available volumes of the server, including volume name (drive), file system type, total capacity, and free space. Provides a check box to remove server logs after a designated number of days. Provides the license key information for the selected server, including the type, the actual license key, and the days remaining for evaluation and demonstration keys. A text box is included to enter a new license key. Provides a log of activity for the specified server. The log can be filtered to show entries for the last 24 hours, last 7 days, or all entries. The server history log shows the date/time and description of each log entry.
Volumes
Advanced
License Keys
History
Server Log
56
Description
Provides information on the backup destination, including backup destination name, description, server name, and path. Provides the schedule when snapshots are taken. The schedule allows specific days of the week and snapshot frequency to be specified.
Snapshot
Schedule
Retention Policy Allows the retention of snapshots to be set. The retention policy defines how long snapshots are retained. For example, snapshots are retained for a given number of hours, and a specified number retained per day, per week, or per month. History Snapshots Provides a list of snapshots for the specified backup destination, including the date, age, and Indexing State of each snapshot. Buttons are also included to create a new snapshot or to delete one of the existing snapshots on the destination.
Table 3-6 describes the backup job properties. Table 3-6 Area
Settings
Description
Provides specific information on the backup job, including backup job name, description, and Protection Server details. Allows you to select the specific backup server, volumes, and System Information to be backed up. Allows you to specify when the backup job will run. The options are to run the job whenever a file changes, according to a schedule, or manually. Allows you to add or modify the bandwidth limitation for a specified job. This screen allows you to specify the Business Server, and the bandwidth usage for a selected network connection.
Bandwidth
57
Description
Allows you to specify a command script to be run before or after the backup job. You may enter or browse to the script. A limiting feature allows the script to be cancelled if not completed after a specified amount of time (minutes). A check box allows you to enable the script asynchronously with the backup job.
1 2 3
Select one of the options in the Settings pane. Right-click the server, destination, or job. Click Properties. To reveal specific properties or options, select the property from the properties pane.
Restore view
The Restore view lets you search for or select files to restore and is the best way to restore large sets of files. You can filter the list of files by specific points in time or view all versions of backed up files. If a small number of files need to be restored, use Backup Exec Retrieve.
Alerts view
The Alerts view lets you respond to notification about the status of the Continuous Protection Server jobs on all servers. In the event that a job does not run successfully, you can read a message that alerts you to the problem encountered. Various levels of errors, warnings, and information are built into Continuous Protection Server to enable you to manage your backup jobs successfully.
58
Selecting Properties for the Alerts view provides detailed information on the selected alerts.
Chapter
Configuring Business Servers Moving of servers between Backup Groups Managing the Continuous Protection Server Services Managing backup destinations Managing snapshots Configuring registry entries
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Servers. In the results pane, right-click the server, and then click Properties. Under Settings, click Advanced.
60
5 6 7
Check Remove log records after (days) to define the number of days to save the backup records. Specify the number of days to keep the records. Under Settings, click License Keys, and then define the options you want.
Server license keys License key of installed Continuous Protection Server software, including demonstration licenses and permanent licenses. To delete a license key (such as an evaluation license key), select the license key, and then click Remove. New Continuous Protection Server software license number. To add a new license, such as when upgrading to a permanent license, type the new software license number, and then click Add.
Under History, click Server Log, and then define the options you want.
Save As Show entries Save the log to a file. Narrows the list of server log entries to the following:
Time
Date and time the log record was written. The time is converted to your local time for display purposes. Information about the server log entry or a note for the administrator, such as the number of days remaining in a license period.
Description
Click OK.
61
Status IP address
Installed Components
Time Zone
Ports in use
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Servers. In the results pane, right-click the server, and then click Properties. Under Settings, click General.
62
Total Capacity
Free Space
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Servers. In the results pane, right-click the server, and then click Properties. Under Settings, click Volume.
Configuring Continuous Protection Server Managing the Continuous Protection Server Services
63
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Servers. In the results pane, right-click the server name that you want to move, and then click Change Management Server. On the Choose Change Management Server dialog box, type the name of the new CMS, and then click OK. The name cannot be the same as the existing CMS. Additionally, select the check box if you want to delete the job pairs and rules that are associated with the old CMS.
When you are prompted to verify that you want to change the CMS, click Yes to proceed or click No to cancel the operation. If you clicked Yes, the Administration Console that is still connected to the original CMS deletes all jobs that were involved with the server. If the job deletions were not successful, a message box notes the failure.
1 2
On the Tools menu of the Administration Console, click CPS Services. Select any of the following options:
Start all services Stop all services Restart all services Starts all CPS services for the selected server Stops all CPS services for the selected server Stops all CPS services and then restart the services for the selected server Refreshes this dialog box
Refresh
64
Configuring Continuous Protection Server Managing the Continuous Protection Server Services
1 2
On the Tools menu of the Administration Console, click CPS Services. Do one of the following:
To add a server, click Server Type. Type the name of a server to add to the list, and then click Add. To import a list of servers, click Import List, and then select the file that contains the server list. To remove a server, select one or more servers from the server list, and then click Remove Servers.
1 2 3
On the Tools menu of the Administration Console, click CPS Services. Click Services credentials. In the Security Mode list box, select one of the following modes.
Domain mode The user account must be a domain account that is recognized by every node that participates in backup. The account must be a member of the local administrator's group on the computer running the services. Symantec strongly recommends that customers use Domain mode, which is more secure than Workgroup mode. The user must have administrative credentials to run the CPS services. A user account is not required to run in Workgroup mode. Workgroup mode may be necessary for customers who are running outside of a Domain.
Workgroup mode
65
Permissions for backup destination folders or permissions on objects within a backup destination should not be changed after backup jobs have been run. If you are unable to delete some files from a backup destination, the task should be performed by a user with Administrator rights. Additionally, Administrators may not be able to delete the folder tree when deleting backup destinations. In this case, local ownership must be assigned to the Domain Admin on the files and all related subfolders if they originate from another local system. CPS cannot be used to back up a Protection Server's data to a backup destination on the same Protection Server. Backup destinations can only be created on servers that run Windows Server 2003/2008/2008 R2 operating systems and have a Continuous Protection Agent (CPA) installed. In addition, only one backup destination is allowed for each logical volume or drive letter. Symantec recommends that CPS backup destinations be created on volumes separate from the Backup Exec backup-to-disk volumes to prevent redundant use of storage.
66
1 2 3
On the navigation bar, click Setup. In the task pane, under Backup Destination Tasks, click New backup destination. Define the appropriate options.
Backup destination name Abbreviated name of this backup destination. For example: SLOMKT1. Description Full name or brief description of this backup destination. For example: San Luis Obispo Marketing Presentations. Server Name of the server on which the backup destination resides. Leave the default server or select from a list of servers in the Backup Group. The server cannot be changed after the backup destination is saved. Path Location on the Protection Server where you want the backup files to be stored. Type or browse to the location of the backup destination in the Backup Group. The path cannot be changed after the backup destination is saved.
Click OK.
1 2 3
Using Windows Explorer or My Computer, navigate to the drive containing the backup destination. For example, E:\. Right-click the drive, and then click Properties. Click the Shadow Copies tab.
67
4 5
Select the drive containing the backup destination. For example, E:\. Click Settings. The Volume should indicate the drive E:\.
Under Storage Area, select the volume where Shadow Storage should be located. For example, select F:\.
7 8
Optionally, you can modify the Maximum size of the storage area to accommodate its intended use. Click OK twice.
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Backup Destinations. In the results pane, right-click the backup destination, and then click Properties. Edit the appropriate options.
Backup destination name Abbreviated name of this backup destination. For example, WCMKT1. Description Full name or brief description of this backup destination. For example, West Coast Marketing Presentations.
Click OK.
68
All backup jobs that are assigned to the destination must be deleted before deleting the backup destination. Additionally, although the backup destination directory and files remain on the server, the CPS restore tools will not retrieve the data from these files. Neither CPS restore jobs nor Backup Exec Retrieve can access a backup destination after it has been deleted. After a Protection Server is uninstalled, you must manually delete the data that is contained in the backup destination. Be sure to note the location of the backup destination data before uninstalling the Protection Server. See Managing backup destinations on page 65. To delete a backup destination
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Backup Destinations. In the results pane, right-click the backup destination, and then click Delete. Select any of the following options:
Delete all snapshots associated with Deletes all snapshots automatically when the this Backup Destination backup destination is deleted. Open backup destination folder in explorer view Opens Windows Explorer so that data may be deleted manually. To manually delete the data, you must have adequate permissions. Refer to Microsoft Windows security help.
Managing snapshots
A snapshot is a consistent, point-in-time image of the contents of the backup destination. Note: Because snapshots are volume-based, any changes on the volume are captured in the snapshot, including the CPS data. Therefore, to achieve maximum performance, you should create a volume that contains only a backup destination. Continuous backup jobs use a filter driver to capture changed bytes in the data files on the source and move the changed bytes to the backup destination whenever
69
the information changes. CPS takes snapshots of the backup destination at scheduled intervals. Administrators schedule snapshots based on the importance of the data being backed up. Users can then select the specific versions of files to retrieve. The latest files on the backup destination can also be restored, although the latest version might not have been captured in a snapshot. Administrators define retention policies to save snapshots for specific periods of time. When the snapshot expires, it is removed automatically. If the destination reaches the limit of its disk space, the oldest snapshot is overwritten by new snapshots. In addition, a history of the snapshots can be viewed and unnecessary snapshots can be manually deleted from within the CPS Administration Console. However, when snapshots are deleted, the disk space may not be immediately freed. Additional details about managing snapshots include the following:
Snapshots can be stored up to a limit that is determined by the underlying snapshot technology. This limit may vary considerably if alternative snapshot providers are installed. Snapshots that are scheduled to be taken over a period of time where the end time is earlier than the start time, may continue to be taken until the end time on the next day. For example, snapshots that are scheduled to run every 1 hour beginning at 8:00 a.m. and ending at 7:00 a.m. on Thursday, may result in snapshots being created until Friday at 7:00 a.m. When backing up data from a single Business Server to multiple backup destinations, the snapshot schedules should be consistent so that all files that are protected by CPS are included in the snapshots. When scheduling snapshots, the minutes and seconds that are specified for the start and end times must be identical.
See Components of Continuous Protection Server on page 14. See How Continuous Protection Server works with Backup Exec on page 131.
1 2
On the navigation bar, click Setup. In the selection pane, click Backup Destinations.
70
3 4 5
In the results pane, select the backup destination. In the task pane, under Backup Destination Tasks, click Create snapshot now. Click Yes to confirm that you want to create the snapshot.
1 2 3 4 5
On the navigation bar, click Setup. In the selection pane, click Backup Destinations. In the results pane, right-click the backup destination, and then click Properties. In the Properties pane, under Snapshot, click Schedule. Select one of the following snapshot schedule options:
Run on these days Select the check box next to each day that you want the snapshot to occur. Select and define a specific time for the snapshot to occur. Select and define the intervals at which the snapshot occurs.
Snapshot schedules are always shown in the local time of the user who is creating the snapshot schedule. If snapshot schedules are created for servers that are located in other time zones, the specified time must be converted to your local time.
Click OK.
71
1 2 3 4 5 6
On the navigation bar, click Setup. In the selection pane, click Backup destinations. In the results pane, right-click the backup destination, and then click Properties. In the Properties pane, under Snapshot, click Schedule. Select the scheduling option you want. Click OK.
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Backup Destinations. In the results pane, right-click the backup destination, and then click Properties. In the Properties pane, under Snapshot, click Retention Policy.
72
If the volume becomes full, the operating system will delete snapshots.
Click OK.
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Backup Destinations. In the results pane, right-click the backup destination, and then click Properties. In the Properties pane, under History, click Snapshots.
Policy The snapshot retention policy expired and the snapshot was automatically deleted. The snapshot was manually deleted by a user. If the system is running out of disk space, the system might automatically delete snapshots to free up space.
Manual External
73
Deleting snapshots
You can keep snapshots for a certain number of hours, days, weeks, or months before being automatically deleted. You should define the retention period to indicate the length of time that snapshots are retained. If you need to free hard disk space on the destination, you can manually remove unnecessary snapshots. Note: You can store snapshots up to a limit that is determined by your underlying snapshot technology. This limit may vary considerably if alternative snapshot providers are installed. Snapshots that are associated with a given backup destination can also be deleted when the backup destination itself is deleted. See Deleting backup destinations on page 67. To delete snapshots
1 2
On the navigation bar, click Setup. In the selection pane, click Backup Destinations.
74
3 4 5 6 7
In the results pane, right-click the backup destination, and then click Properties. In the Properties pane, under History, click Snapshots. In the Available snapshots for backup destination list, select the snapshot, and then click Delete. Click Yes to confirm you want to delete the snapshot. Click OK.
CPS trace and indexing logs Journal root directory Named Objects (System Cache) directory Job Retry Intervals Selected Network Interface TCP and UDP ports
The parameters that are included in the Settings Utility are often updated. See the Symantec Web site for a current list and description of configurable parameters.
75
Refresh
Lets you update the values in the Parameter pane after making changes. Lets you access the online help for the Settings Utility. Lets you restore all parameters to their original default values.
Navigate to the CPS Services folder C:\Program Files\Symantec\Continuous Protection Server\Services, and then double-click settingsutility.exe. In the Administration Console, click Tools > Settings Utility.
Description
Specifies how often a grooming cycle will be run to remove outdated alerts from the system. The 'DaysToKeepAlertItems' key sets the number of days an alert will remain on a system before it is outdated. The default value is 86400 seconds (every 24 hours). Changes to this value will not require systems or services to be restarted.
AlwaysDoRegionAnalysis
To cause CPS to use region analysis regardless of file size, set this string value to 1 (default is 0). Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
76
Description
Specifies the IPv6 Multicast address where all discovery traffic is sent. The default value is ff02:0:0:0:0:0:0:1, which signifies all nodes on the local link. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
BroadcastHops
Specifies the maximum number of router hops for IPv6 discovery broadcasts. The default value is 1. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
ConnectionPooling
Enables ODBC connection pooling. The default value is 0. A 1 value enables connection pooling. Changing this value requires that the CPS Database Service be restarted on the server.
DaysToKeepAlertItems
The number of days that alert items are kept on the server. The default value is 30. Changing this value will not require systems or services to be restarted.
DaysToKeepDeletedSnapshots
Specifies the number of days that deleted snapshot entries are kept on the server. The default value is 30 days. Changes to this value will not require systems or services to be restarted.
77
Description
If set to 1, this parameter prevents the CPS filter driver from delaying the completion of Directory Change Notifications. The only time it is necessary is when the Windows Services for Macintosh (SFM) is running on the server where CPS is installed. Under conditions of heavy usage, SFM may fail if this setting is not made. However, there are no known issues with SFM after the setting is made. The default value is 1. Set a value of 0 only when the Microsoft Services for Macintosh is running on the system. Although making this setting will allow SFM to run, it will also create a problem for the Windows Simple Mail Transport Protocol (SMTP) service. It will prevent SMTP from picking up (i.e., noticing the appearance of) new mail items in its pickup folder. There is no way to get both SMTP and SFM working on the same system where CPS is installed. The user must make a choice as to which Windows service that will run. Changing this value requires that the server be restarted.
DoEventLog
If this value is set to 1, certain internal errors in CPS components will write an entry in the Windows application event log. If it is set to 0, no event log entry will be written. The default value is 1. Changing this value will not require systems or services to be restarted.
EnableDebugConsole
For Symantec Technical Support use only. The default value is 0. Changing this value will not require systems or services to be restarted.
EnableLogFile
Enables trace logging. The default value is 1 to enable diagnostic trace logging, or 0 to disable. Changing this value will not require systems or services to be restarted.
EnableTimestamp
If this value is set to 1, a timestamp is printed on each line of diagnostic trace logs recorded by CPS components. The default value is 1. Changing this value will not require systems or services to be restarted.
78
Description
Continuous Protection Agent data port. The default value is 20481. Changes to this value must be made on all computers in the Backup Group. In addition, the Continuous Protection Agent Service must be restarted on all computers.
FilteredIDList
Specifies a list of status or alert IDs that will be filtered from the Alert Database. The list should contain the IDs in either hexadecimal or decimal form separated by either commas or semicolons. Only new alerts will be filtered from the Alert Database after an addition to this list. No existing alerts will be removed from the database. The default value is an empty string. Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
Gateway (ENL\Network.TCPIP)
Either the host name, Fully Qualified Domain Name, or IP address of the ENL master. The default value is usually the CMS name. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
Gateway (ENL\Network.UDPv6)
Either the host name, Fully Qualified Domain Name, or IP address of the ENL master. The default value is usually the CMS name. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
Gateway (ENL\System)
Specifies whether or not this server will act as a router for ENL network traffic. The default value is Yes for a CMS computer and No for all non-CMS computers (except in special situations where a non-CMS may be used to route ENL traffic to a CMS on another subnet). Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
79
Description
Location of files that hold index information about the data that has been backed up by CPS. The location must have at least 120 MB of free space (1GB or more recommended). The default value is set by the CPS installer. Changing this value will require that the Continuous Protection Indexing Service be restarted on the server. In addition, indexing files will be moved from their previous location to the newly specified path.
JournalRoot
Location of the dynamic changes of data during continuous backups. The location must have at least 120 MB of free space (10 GB or more recommended). The default value is set by the CPS installer. Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
LogOpenFileTableOncePerSet
Controls whether the filter driver writes a table of open file entries into the first outbound dynamic journal file only once (when a job starts), or writes this table at the start of every new outbound journal file. The default value is 0. Set to 1 if journal writing errors occur during continuous backup jobs owing to an Open File Table (OFT) overflow, as can happen on systems where a great many files are opened in rapid succession. Changing this value requires that the system be restarted.
LogPath
Location of the CPS trace log files. The location must have at least 100 MB of free space. The location can be specified during installation, such as the following. C:\Program Files\Symantec\Continuous Protection Server\Logs Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
Specifies the directory where the ENL logs (efc.log) will be written to. The default value is set at install time. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
80
Description
A complex hexadecimal mask used to specify the type of entries that will be written to the 'EFC.log' file. The default value is 0x00300100. A value of 0xFFFFFFFF signifies that All ENL logging information will be written to the log file. This optional setting can be useful in debugging situations, but will quickly create very large amounts of log data. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
Specifies whether the ENL Service will start up in Master mode. The default value is Yes for a CMS computer and No otherwise. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
MaxDirSize
The maximum number of files to show for a single directory in the Backup Exec Retrieve browse view. The default value is 10000. Changing this value will not require systems or services to be restarted.
MaxLogSize
The maximum size (in bytes) that the diagnostic trace log can grow before a new file is started. The default value is 10485760 (10 MB). Changing this value will not require systems or services to be restarted.
MaxLogSize (ENL\System)
The maximum size of the ENL log in bytes. Default is 1048576 bytes (1 MB). Changing this value requires the ENL service and its dependent to be restarted.
MaxPacketSize (ENL\Network.TCPIP)
Sets the maximum size for a UDP packet. Useful on networks that have a small MTU. The default value is 5924. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
81
Description
Sets the maximum size for a UDP packet. Useful on networks that have a small MTU. The default value is 5924. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
MaxRAPerCentChange
To change the maximum percentage difference in file size for region analysis (in percent). Larger values mean region analysis will still take place, even if file sizes differ by a larger percentage. The default value is 25. Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
MinRASizeInKb
To change the minimum file size for Region Analysis (in KB). The default value is 1024. Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
MsBetweenRallyChecks
This parameter specifies the time that a job will attempt to be restarted after it has failed. The default value is 120000 ms (2 minutes). Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
NamedObjectsRoot
Holding location for the System State and share information. The location should have at least 100MB of free space (1GB or more recommended). The default value is set by the CPS installer. Changing this value requires that the Continuous Protection Agent Service and Continuous Protection System State Manager Service must both be restarted on the server. In addition, named objects files will be moved from their previous location to the newly specified path.
Netgroup (ENL\System)
The name of the CPS Backup Group that this computer is associated. The default value (Backup Group) is set at install time. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
82
Description
To disable region analysis for all files, set this value to 1. When region analysis is disabled, files are synchronized by copying the entire source file to the target system. If both this value and AlwaysDoRegionAnalysis are set to 1, the AlwaysDoRegionAnalysis value takes precedence. The default value is 0. Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
NumberOfLogs
This parameter specifies the number of diagnostic trace log files to keep. When the number of trace log files exceeds this number, older log files are deleted. Set this value larger than the default value to preserve more logs, and contain more job history. The default value is 10. Changing this value will not require systems or services to be restarted.
OutboundJournalCleanupSize
Size of the journal at which a switchover to the next journal may begin. This value must be less than the journal size by at least 1MB. This value must be an exact multiple of 1 MB (1048576 bytes). The default value is 7340032 (7 MB). Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
OutboundJournalNominalSize
This parameter is the default size in bytes of an outbound journal file when it is first created. The nominal size of journal files should be made larger than the default size only when necessary to avoid job cancellations owing to Open File Table (OFT) overflows. This value must be an exact multiple of 1 MB (1048576 bytes). The default value is 8388608 (8 MB). Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
OutboundSyncJournalLimit
If the number of outstanding sync journal files exceeds the OutboundSyncJournalLimit, the CPA service slows down the creation of sync journals during initial synchronization between two systems. The default value is 32. Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
83
Description
Specifies the IP address that the node will use when registering with the name service. This value must be an IPv4 compatible IP address. The default value is an empty string. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
PreferredAddress (ENL\Network.UDPv6)
Specifies the IP address that the node will use when registering with the name service. This value must be an IPv6 compatible IP address. The default value is an empty string. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
PreferredNIC (ENL\Network.TCPIP)
Specifies the NIC that will be used to find the preferred IP address if it is not explicitly set through the PreferredAddress key. The preferred NIC is specified by the MAC address of the NIC. The default value is an empty string. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
PreferredNIC (ENL\Network.UDPv6)
Specifies the NIC that will be used to find the preferred IP address if it is not explicitly set through the PreferredAddress key. The preferred NIC is specified by the MAC address of the NIC. The default value is an empty string. Changes to this value will require the ENL and dependent services, such as the CMS, CPA, Broker Service, and Continuous Protection System State Manager Service, to be restarted.
ReservedFreeDiskSpace
If the amount of free disk space on the volume containing CPS journals falls below this number of bytes, CPS jobs will be cancelled. The default value is 67108864 (64 MB). Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
84
Description
Continuous Management Service RPC port. The default value is 20485. Changing this value must be made on all computers in the Backup Group. In addition, the Continuous Protection Agent Service must be restarted on all computers, and the Continuous Management Service must be restarted on the CMS server.
RxRsaStaticPort
Continuous Protection Agent RPC port. The default value is 20483. Changing this value must be made on all computers in the Backup Group. In addition, the Continuous Protection Agent Service must be restarted on all computers.
Schedule
Specifies the frequency with which the System State Manager Service regenerates Named Object data. The default value is 0 3 5 4 0 1439. Changes to this value will not require systems or services to be restarted.
SerializeIrpLogging
Set this value to 1 to prevent the CPS filter driver from queueing too many i/o requests for journaling. The default value is 0. Set to 1 only on very slow, single-CPU systems if continuous backup jobs are failing owing to journal writing errors. Changing this value will require that the system be restarted.
ShareInfoAsSingleComponent
Groups all shares for a business server under a single entry for faster display and snapshot processing. The default value is 0 for multiple components. Set to 1 for single component. Changes to this value will not require systems or services to be restarted.
Socket
Specifies the UDP port used by ENL. Changing this value affects both the IPv4 and IPv6 functions of the ENL service. The default value is 1804. Changes to this value must be made on all computers in the Backup Group. In addition, the ENL Service must be restarted on all computers.
85
Description
Set this value to 0 to force CPS to use the standard Win32 methods of finding files. The default value is 1. Changing this value requires that the Continuous Protection Agent Service be restarted on the server.
Verbose (ENL\System)
Changes the amount of data that will be sent to the ENL logs. Default value is No. A value of Yes will send much more detailed data to the ENL logs. Changing this value requires the ENL service and its dependent to be restarted.
VolumeLevel
This parameter controls the level of detail shown in diagnostic trace log messages. A lower number means less detail. The default value is 1. Changing this value will not require systems or services to be restarted.
Note: Modifying multiple parameters may have unpredictable and adverse consequences. Symantec recommends that these parameters be changed only by knowledgeable users or at the guidance of Symantec Technical Support.
1 2 3 4
Open the Settings Utility. In the Server pane, select the server whose parameters you want to review or change. In the Parameters pane, double-click anywhere in the row of the parameter that you want to change, and then enter the new value. Click OK to continue.
86
5 6
Review the warning information, and then click OK to change the parameter value. Restart the services or computers as noted in the warning prompt.
Chapter
Backing up data
This chapter includes the following topics:
About CPS backup jobs Creating CPS backup jobs Editing backup job configurations Moving a backup job to a different backup destination Starting, stopping, and canceling backup jobs manually
You can define exceptions to backup rules. For example, if you want to back up everything in the Marketing Proposals folder except temporary files, exceptions can be defined for the temporary files. You can filter drivers to capture changed bytes in files and copy the changed bytes to the destination. Snapshots of the destination are taken at regular intervals. Each snapshot is saved for 24 hours unless you specify otherwise. You can run scripts before or after a backup job. Advanced settings are available for defining pre- and post-scripts to run before and after backup jobs. For example, you can close a database or run a virus scan on a folder before a backup job starts.
88
You can limit bandwidth so a job uses fewer resources. Advanced options are available for setting bandwidth restrictions.
89
steps for creating a backup job manually or using the wizard are essentially the same. When you create a backup job, you can specify the following information:
Name and description of the backup job Backup destination Location of the data to be backed up Schedule for the backup to occur
Before you can create a backup job, be sure that you have already defined a backup destination. See Managing backup destinations on page 65. See Adding a backup destination on page 65. All regular shares are backed up automatically by the backup job. The share backup job backs up the information about the share, but not the underlying data for the share. If you want to back up the data that the share points to, you must select the folder containing that data when you configure the backup job. When you select the folder containing the data, the share and the data are both backed up. You can restore the data, the share information, or both. The data in the tree view is selected for inclusion or exclusion, and the status is reflected with icons. Table 5-1 describes the status icons that are used in the tree view. Table 5-1 Status icons
90
Backup rights are required to all referenced servers of a CPS backup job, including the server hosting the Continuous Management Service. To create a CPS backup job
1 2 3 4 5
On the navigation bar, click Setup. In the task pane, under Backup Job Tasks, click New backup job using wizard. Review the text on the Welcome to Backup Job Wizard screen, and then click Next. On the Name the Backup Job screen, type a name and optional description for the backup job. On the Select a Backup Destination screen, select one of the defined backup destinations. This selection is the Protection Server where the data is backed up. On the Select Data to Back Up screen, select the information that you want to back up. On the Select When to Backup screen, designate when the backup should occur.
Whenever a file changes Initiates a continuous backup of the folder or file. That is, a file or folder is backed up whenever changes are made to it. This job starts as soon as the user clicks OK. Lets you set a regularly scheduled or periodic backup of the folder or file. If this option is selected, you need to define the backup schedule. This job starts if it is in the backup window and the user clicks OK. Backup job schedules are always shown in the local time of the user who is creating the backup job. If backup jobs are created for servers that are located in other time zones, you must convert that servers time to your local time. Initiate the backup job manually Lets you back up the contents of the folder or file on demand. This job will not start automatically.
6 7
According to a schedule
Verify that the backup job was created by observing that the Job shows on the list of jobs from the Job Monitor.
91
1 2 3 4 5
On the navigation bar, click Setup. In the selection pane, click Backup Jobs. In the results pane, right-click the backup job, and then click Properties. Under Settings, click General. Edit the entries as needed.
1 2 3 4 5
On the navigation bar, click Setup. In the selection pane, click Backup Jobs. In the results pane, right-click the backup job, and then click Properties. Select the new backup destination for the job from the Backup destination drop-down list. Click OK to save the backup destination and run the job.
92
Note: When files or directories are explicitly excluded, they are removed from the backup destination. If files or directories are not selected, they are not removed. You can add any combination of include and exclude filters to each backup selection. This enables you to select files to back up whose names match an arbitrary combination of patterns. For example, if you want to exclude all tmp files from the backup, except for those whose names contain the letter Q or the letter X, you can specify the following list of filters:
Be sure you specify the parameters in the right order. Parameters are applied top-to-bottom as listed, and the first rule matching a file name is the one that is used to decide whether or not to back up a file. When initially adding a filter, you can enter a semi-colon delimited list to specify multiple filters to add. Each item on the list is added as a separate filter. If you later edit an existing filter, you are not able to add a semi-colon delimited list. To include and exclude information from backup jobs
1 2 3 4 5 6 7
On the navigation bar, click Setup. In the selection pane, click Backup Jobs. In the results pane, right-click the backup job, and then click Properties. Under Settings, click Backup Selections. Expand the tree to expose the files that are selected for the backup job. Right-click the file or folder that is selected for the backup job, and then click Includes/Excludes. Click Add.
93
10 If you want to change the priority of a filter, select the filter, and then click 11 Click OK. 12 On the Backup Job Properties dialog box, click OK.
Editing filters
You can edit the include and exclude filters to refine what gets backed up. To edit filters
1 2 3 4
On the navigation bar, click Setup. In the selection pane, click Backup Jobs. In the results pane, right-click the job, and then click Properties. Under Settings, click Backup Selections.
94
5 6 7 8 9
Expand the tree to expose the files or folders that are selected for the backup job. Right-click the file or folder that is selected for the backup job, and then click Includes/Excludes. Select a filter, and then click Edit. Select the appropriate options. Click OK. Move Up or Move Down.
10 If you want to change the priority of a filter, select the filter, and then click 11 Click OK. 12 On the Backup Job Properties dialog box, click OK.
Deleting filters
You can delete include and exclude filters that you no longer use. To delete filters
1 2 3 4 5 6 7 8 9
On the navigation bar, click Setup. In the selection pane, click Backup Jobs. In the results pane, right-click the job, and then click Properties. Under Settings, click Backup Selections. Expand the tree to expose the files or folders that are selected for the backup job. Right-click the file or folder that is selected for the backup job, and then click Includes/Excludes. Select a filter, and then click Delete. Confirm that you want to delete the selected filter. Click OK.
95
Backup job schedules are always shown in the local time of the user who is creating the backup job. If backup jobs are created for servers that are located in other time zones, the specific time must be converted to your local time. You can review descriptions of the various backup job schedules. See About backup job schedules on page 21. To change a backup job schedule
1 2 3 4 5
On the navigation bar, click Setup. In the selection pane, click Backup Jobs. In the results pane, right-click the job, and then click Properties. Under Settings, click Schedule. Under Back up the selected files and folders, select the option that you want.
Whenever a file changes Initiates a continuous backup of the folder or file. Enables you to set a regularly scheduled or periodic backup of the folder or file. You need to define the backup schedule. Requires you to manually start the backup job from the CPS Console.
According to a schedule
6 7 8
Under Back up the selected files and folders, select According to a schedule. Click Edit Schedule. Select the options you want.
Run on these days Select the check box next to each day that you want the snapshot to occur. Select and define a specific time for the snapshot to occur. Select and define the intervals at which the snapshot occurs.
Run only at
Run
Click OK.
96
1 2 3 4 5 6 7
On the navigation bar, click Setup. In the selection pane, click Backup Jobs. In the results pane, select the backup job. In the task pane, under Backup Job Tasks, click Properties. Under Settings, click Bandwidth. Click Add. Complete the options that you want.
Source server Select the server from which the files are copied during the backup job. Select the bandwidth that is allocated to the backup job process. Select the type of connection existing between the Business Server and Protection Server.
8 9
1 2
On the navigation bar, click Setup. In the selection pane, click Backup Jobs.
97
3 4 5 6 7
In the results pane, select the backup job. In the task pane, under Backup Job Tasks, click Properties. Under Settings, click Commands. Click Add. Specify the following options:
Server Event Select the server on which to run the script. Select when the script will run. Your choices are Pre-backup or Post-backup. Type the path to the script file that will run before or after this backup job. If necessary, you can browse to the file. Select the number of minutes before the backup job is canceled if it is not completed. Select this option to start a script and continue processing. To run the pre-command script to completion before starting the backup, or to run the backup to completion before starting the post-command script, uncheck this option.
Script
1 2 3 4
On the navigation bar, click Job Monitor. In the Current Job Filter box, click All jobs, Backup jobs, or Restore jobs. In the results pane, right-click the job. Do one of the following:
98
To start the job, click Start Job. To stop the job, click Stop Job. To cancel the job, click Cancel Job.
Chapter
Restoring data
This chapter includes the following topics:
About restoring data with Continuous Protection Server Restoring files and folders Restoring system information Restoring System State to an Active Directory system Restoring network shares
100
1 2 3
On the navigation bar, click Restore. In the selection pane, select the information to restore. In the task pane, under Restore Tasks, click Restore files.
101
Options
5 6
102
State data at or near these same times, the restore may fail because a System State restore does not interrupt a System State data capture that is in progress. In this case, the System State restore jobs should be started well before or about 10 minutes after the backup times. See About backing up System State and Shadow Copy Components on page 88. To restore system information
1 2 3 4
On the navigation bar, click Restore. In the selection pane, select the System State or Shadow Copy Components. In the task pane, under Restore Tasks, click Restore files. Specify the options that you want.
Restore job name Abbreviated name of the restore job. For example, WCSRCSystem. Description Full name or brief description of the restore job. For example, West Coast Source Server System State. Restore to System State will always be restored to its original location.
5 6
Click OK. Click OK to clear the confirmation message. When the System Information is restored, the server will automatically restart.
103
1 2 3 4
On the navigation bar, click Restore. In the selection pane, select System State. In the task pane, under Restore Tasks, click Restore files. Specify the options you want.
Restore job name Abbreviated name of the restore job. For example, WCSRCSystem. Description Full name or brief description of the restore job. For example, West Coast Source Server System State. Restore to System State will always be restored to its original location.
5 6 7 8
Click OK. Click OK to clear the confirmation message. The computer will restart in DSRM mode. Log on using your DSRM password. Double-click the symantec dsrm system state restore.bat file, which is located on the Desktop. You can monitor the progress in the command window. When the System State restore has completed, the server will automatically restart back in normal mode.
1 2
On the navigation bar, click Restore. In the task pane, under Views, click Console restore.
104
3 4
In the results pane, select the restore job. Do one of the following:
To restore the share only, in the selection tree pane, do not select any information to restore. To restore the data and the share, in the selection tree pane, select the files and folders to restore.
In the selection list pane, select the shared folder. Items in the list view belong to the share. Selecting items in the selection list pane restores the share. If any attribute in the share changes, the share must be disabled before restoring. Attributes appear in the Microsoft Windows Properties dialog box for the shared item and include the share name, comments, user limits, and permissions.
6 7
In the task pane, under Restore Tasks, click Restore files. Specify the options that you want.
Restore job name Abbreviated name of the restore job. For example, WCMKTShare. Description Full name or brief description of the restore job. For example, West Coast Marketing Shared Folders. Restore to Location where the selected files and folders will be copied. Shares can only be restored to their original location, although the files in a share can be restored elsewhere. Options Restore to original folder - Restores the selected files to the folder from which they originated. Redirect the restore to an alternate folder Restores the selected files to the folder of your choice. Type the path to the folder in the text box. Preserve folder structure Maintains the tree structure of the selected files and folders during the restore. This check box is enabled for redirected restore jobs.
8 9
Chapter
About Backup Exec Retrieve How Backup Exec Retrieve works What end users can do with Backup Exec Retrieve Before you install Backup Exec Retrieve Requirements for installing Backup Exec Retrieve on a Web server Requirements for using Backup Exec Retrieve on end users' computers Installing Backup Exec Retrieve About configuring Backup Exec Retrieve Uninstalling Backup Exec Retrieve Troubleshooting Backup Exec Retrieve
106
Backup Exec Archiving Option Backup Exec Continuous Protection Server (CPS) Backup Exec Desktop and Laptop Option (DLO) Backup Exec System Recovery Manager
Backup Exec Retrieve uses Windows security and Internet browser download features and is limited to Windows server platforms.
Task or Process
Optional - Installs Backup Exec and Backup Exec Archiving Option on the Backup Exec media server. Installs Backup Exec Retrieve on a Web server or on the Backup Exec media server that is on a Web server.
Administrator
107
Task or Process
Configures Backup Exec Retrieve with the locations of any of the following indexers that can be included in searches by end users: Media server (for the files and the emails that the Backup Exec Archiving Option archives). Backup Exec System Recovery Manager server (for files in recovery points that Backup Exec System Recovery creates). Continuous Management Service server (for the files that Continuous Protection Servers back up). Desktop and Laptop Option server (for the files that the Backup Exec Desktop and Laptop Option backs up).
Administrator
Notifies the end users of the following Backup Exec Retrieve Web address so that they can search their own files and emails. https://<Backup Exec Retrieve Web server name>/BERetrieve You must also provide the following information to the end users: If the standard Windows security alert screens are displayed to the user, inform the user to click Yes or OK to continue. If a message appears to the user with information about the security certificate, it is related to SSL certificates. Have the user click Yes to continue.
108
Using Backup Exec Retrieve What end users can do with Backup Exec Retrieve
Task or Process
Launches Backup Exec Retrieve using the Web address that the administrator supplies. The browser may prompt the end user to download and install Microsoft Silverlight, which is a necessary component to use Backup Exec Retrieve. Your organization may not permit end users to download files from the Web. In such cases, the administrator must deploy Silverlight to the end users' computers before end users can use Backup Exec Retrieve. See About deploying the Silverlight run time in your organization on page 113. If Silverlight is already installed on the user's computer, the browser immediately displays the Backup Exec Retrieve logon screen. At the logon screen, the end users type their user name, password, and domain. The credentials that a user specifies here determines what data they are authorized to view and retrieve.
End user
Selects to search, browse, or view recent activity for files or email. Submits a query. Backup Exec Retrieve displays the results for the end user to page through. The user can click a related link to drill down into the information. Retrieves the selected file or email and saves it locally on their computer or elsewhere.
End user
End user
Using Backup Exec Retrieve What end users can do with Backup Exec Retrieve
109
Advanced search
Lets end users find the following: Files based on file name, file content, file folder, or specified date range. Email messages based on the text in the following locations: Subject field
Recent activity
Lets end users find recently archived, deleted, or edited files or email messages. Lets end users navigate through shared folders to which they have permissions. Also lets them view the files and email that were backed up or archived. When a backed up file is located, the end user can view all stored versions of that file. Versioning does not apply to archived files or email messages. Review the date, time, and file size to determine the version of the file that you want to retrieve.
Browse folders
Preview
Lets end users do the following: Open an abbreviated preview of email messages or some files in the list of search results. Preview an entire email message or some files in the list of search results.
110
Using Backup Exec Retrieve Before you install Backup Exec Retrieve
Using Backup Exec Retrieve Requirements for installing Backup Exec Retrieve on a Web server
111
Windows Server 2008 R2 Windows Server 2008 R2 (x64) Windows Server 2008 Windows Server 2008 (x64) Windows Server 2003 R2, SP 2 or later
Windows Server 2003 R2, SP 2 or later (x64) Windows Server 2003, SP1
2 GB 45 MB The following is installed on the computer on which you want to install Backup Exec Retrieve:
Microsoft .NET Framework 3.5 SP1. At a minimum, Microsoft .NET Framework 3.5 SP 1 is required to run Backup Exec Retrieve.
112
Using Backup Exec Retrieve Requirements for using Backup Exec Retrieve on end users' computers
Component
Operating system
Software
The following software is required: Microsoft Internet Explorer 7.0 or later. Other browsers should also be compatible, but certain features and user interface layouts may vary. Microsoft Silverlight 3.0 or later plug-in If Silverlight is not detected when a user accesses the Backup Exec Retrieve Web page, the browser offers to install it. Your organization may not permit end users to download files from the Web. In such cases, the administrator must deploy Silverlight to the end users' computers before end users can use Backup Exec Retrieve. See About deploying the Silverlight run time in your organization on page 113.
Internet access is required. End users must know the following Web server address, and their own user name and password to access Backup Exec Retrieve. https://<Backup Exec Retrieve Web server name>/BERetrieve If the standard Windows security alert screens are displayed to the user, inform the user to click Yes or OK to continue. If a message appears to the user with information about the security certificate, it is related to SSL certificates . Have the user click Continue to this Web site to continue.
113
Windows software update services Microsoft System Center Configuration Manager Group policy
For guidance on deploying the Silverlight run time in your own organization, see the following: http://www.microsoft.com/silverlight/resources/technical-resources/
Log on to your Web server (or the Backup Exec media server if it has Web server capabilities). You must use either the Administrator account or an account with administrator privileges.
2 3
Insert the Backup Exec installation media into the appropriate drive of the computer. Do one of the following:
If the installation starts automatically Continue to the next step.
114
Do the following in the order listed: On the Windows desktop, click Start > Run. Type: <media drive letter>:\Setup.exe.
4 5 6 7 8
Click Backup Exec Retrieve 2010. In the Welcome panel, click Next. In the License panel, read the license agreement, and then click I accept the terms of the license agreement. Click Next. In the Environment Check panel, review the results of the Environment Check . For each requirement, the following results are displayed:
Check mark The requirement and the recommendations are met. The requirement is not met. You cannot continue with the installation until the requirement is met. Click the associated link for additional information.
Click Next. Backup Exec Retrieve program files are installed in the default path that appears on the Options page.
115
Backup Exec media server on which the Archiving Option is installed Continuous Protection Servers Desktop and Laptop Option servers Backup Exec System Recovery Manager servers
You must have local administrator rights to add, edit, or delete data sources from Backup Exec Retrieve. See About configuring Backup Exec Retrieve on page 115.
116
1 2 3 4
Log on to the Backup Exec Retrieve Web server as a local administrator. On the Windows Start menu, click All Programs > Symantec Backup Exec Retrieve > Backup Exec Retrieve Configuration Console. In the Symantec Backup Exec Retrieve Configuration dialog box, click Add. Set the Add Data Source options. See Add or edit data source options on page 116.
Click OK.
Name or IP address
User name
Password
Indicates the password for this account. The software encrypts the password but does not display it. This option does not apply to the Archiving Option data type.
Confirm password
Confirms the password for this account. This option does not apply to the Archiving Option data type.
117
1 2 3 4 5
Log on to the Backup Exec Retrieve Web server as a local administrator. On the Windows Start menu, click All Programs > Symantec Backup Exec Retrieve > Backup Exec Retrieve Configuration Console. In the Symantec Backup Exec Retrieve Configuration dialog box, select the data source that you want to change. Click Edit. Set the Edit Data Source options. See Add or edit data source options on page 116.
Click OK.
118
1 2 3 4 5
Log on to the Backup Exec Retrieve Web server as a local administrator. On the Windows Start menu, click All Programs > Symantec Backup Exec Retrieve > Backup Exec Retrieve Configuration Console. In the Symantec Backup Exec Retrieve Configuration dialog box, select a data source name or type in the table. Click Delete. Click Yes to confirm the deletion of the data source.
1 2 3
From the Windows server on which Backup Exec Retrieve is installed, click Start, point to the Control Panel, and then click Add or Remove Programs. Click Backup Exec Retrieve, and then click Remove. Click Yes to proceed with the uninstall.
119
Selecting a file causes an When you select a file in Microsoft Internet Explorer, the error in the application that file is saved to the Internet cache. Then, the program that launches for viewing the file is required to open it is launched. If the Do not save encrypted pages to disk option is selected in Internet Explorer, then the file is not saved to the Internet cache. However, the associated application is launched but it cannot open the file. To fix this issue, deselect the option in Internet Explorer (the option is the default on Windows 2003). To deselect the option to save encrypted pages to disk In Internet Explorer, click the Tools menu, and then click Internet Options. Click Advanced, and then scroll down to the Security section. Uncheck Do not save encrypted pages to disk.
Backup Exec Retrieve usually runs on a separate computer from the original computer that was backed up. The only authority for local accounts and passwords is the original computer, which might not be available when you use Backup Exec Retrieve. You must use a domain account to log on and retrieve files using Backup Exec Retrieve. Backup Exec Retrieve makes every effort to capture the domain users and domain groups that are part of local groups. Therefore, if your domain account is a member of the Local Administrators group on your computer, you can retrieve your files.
Users cannot see all of my Indexing is a resource-intensive process. Performance data (indexing take too long) expectations vary significantly depending on your hardware, network configuration, and data change rate. Initial indexing for a new storage location that contains many base recovery points is the most intense load, in the range of minutes per image. A smaller load for subsequent incremental recovery points is in the range of seconds per incremental. Recovery points, archives, and files that not indexed do not display in search results. If you find that indexing takes too long, you might need to distribute the load across additional Indexing Servers.
120
Unable to download a file when you use the computer name or IP address of Backup Exec Retrieve in Internet Explorer
In Internet Explorer, click Tools > Internet Options. In the Security tab, click Custom Level.
In the Security Settings - Internet Zone page, scroll to Downloads > Automatic prompting for downloads. Click Enable.
Click OK, and then click Yes to confirm the change. Click OK to return to Internet Explorer.
Clicking the Backup Exec Retrieve in Internet Explorer results in a prompt to add the site to the trusted sites list.
If Enhanced Security is enabled in Windows, you are prompted to add the Backup Exec Retrieve URL to Internet Explorer's trusted sites list. If you continue without adding the URL to the trusted sites list, you are prompted to install Silverlight, even if it already installed. If you try to install Silverlight again, the installation fails. Symantec recommends that you add the Backup Exec RetrieveURL to Internet Explorer's trusted sites list. To add the Backup Exec Retrieve URL to Internet Explorer's trusted sites list:
In Internet Explorer, click Tools > Internet Options. In the Security tab, click Trusted sites.
Click Sites, and then on the Trusted sites page, add the Backup Exec Retrieve URL. Click Add, then click Close.
Chapter
About the Job Monitor Monitoring jobs and job pairs Viewing a job report Managing CPS job alerts
Likewise, each column in the Job Monitor view can be sorted and the columns can be rearranged by dragging a column heading to the left or right. The following terms need to be documented in this chapter:
122
Business Server #1 to Protection Server #1 (1:1) Business Server #2 to Protection Server #1 (2:1) Business Server #3 to Protection Server #1 (3:1) Business Server #4 to Protection Server #1 (4:1)
In CPS, the job represents the process that maintains the activity of each of the specific job pairs. You can view properties and change the status of an active job. The CPS job controls the job pairs and reflects what the job is supposed to be doing. The job pair states, however, reflect what is actually occurring.
Running
The starting phase has completed. That is, all job pairs have attempted to start. Errors or alerts indicate if any pairs are attempting to restart. For a continuous job, the job remains in this state until the user or schedule cancels the job. For a scheduled, non-continuous job, the job remains in this state until the job is completed, or the user or schedule cancels the job.
123
Stopped
The job has stopped and all pairs have completed synchronization. A stopped job state does not affect the schedule of a job. That is, the job will run at the next scheduled time.
Canceling
The job is attempting to stop abruptly. That is, the user or schedule has commanded that each pair stop running whether or not they have achieved synchronization. Errors and alerts indicate failures of one or more pairs to respond to the cancel request.
Canceled
The job has canceled and all pairs have stopped running. A canceled job state does not affect the schedule of a job. That is, the job will run at the next scheduled time.
Completed
If the job is a scheduled, non-continuous job, all pairs have completed. If the job is continuous, the job never completes. A continuous job must be stopped or canceled.
124
See About job states on page 122. The instantaneous rate that the job is running. For example, 21 Kbytes/Second. The cumulative rate since the job (or pair) started. For example, 21.3 MB Indicates whether errors are associated with the job. Possible values are Yes or No. Indicates the number of errors or warnings to which no one responded. Indicates the type of schedule that was designated for the job. Indicates the time that the job was last started.
Transferred
Errors
Alerts
Table 8-3 identifies status information that is provided for job pair listings (columns). Table 8-3 Column
Current jobs status Source Destination Status Transfer Rate The name of the source computer. The name and path to the destination computer. See About job states on page 122. The instantaneous rate that the job is running. For example, 21 Kbytes/Second.
125
Alerts
1 2
On the navigation bar, click Job Monitor. Check to see if this step is still true. To narrow or expand the job history, in the Job History Filter box, select one of the following:
1 2 3
On the navigation bar, click Job Monitor. In the results pane, under Current Job Tasks, select one or more jobs. In the task pane, select View job report. A Job Report is generated and displayed in a separate window.
Expand the report headings by clicking the plus sign [+] to the left of the heading.
126
Backup Job Selections Provides a list of the files and folders that are included and excluded from the job. Backup Job Pre/Post Commands Displays any pre- or post-commands that were assigned to the job. The information that is provided includes the server name, command, triggering event, whether the command is running asynchronously, and the timeout period. Contains CPS job log entries for the period since the job last ran. Job entries with warnings are displayed in orange text, and job entries with associated errors are shown in red text. Jobs with warnings or errors are also linked to the Symantec Support Web site for possible solutions. Backup Pair One Backup Pair box exists for each pair of the associated CPS job. The title of the box is the name of the actual CPS pair. If there is an exception associated with the pair, the box title contains the state of the pair along with a description of the exception condition.
127
Pair Log
Contains CPS pair log entries. Pair entries with warnings are displayed in orange text, and pair entries with associated errors are shown in red text. Pairs with warnings or errors are also linked to the Symantec Support Web site for possible solutions.
Alert history lists the alerts to which an administrator responded. Alerts remain in history for 30 days by default unless you delete them. You can delete one or more alerts in history.
128
When you view active alerts or alert history, you can change the order in which the information displays. The list can be sorted in ascending or descending order by any column. You can also change the order in which the columns display to view the information in order by the following:
Category Job name Message Server name Time alert received Type
1 2 3 4 5 6
On the navigation bar, click Alerts. Click the Active Alerts tab. In the Active Alerts Filter box, click an alert whose details you want to view. In the selection pane, select the alert to view the details. Click a column heading to sort the list in ascending or descending order. Click and drag a column to a new position in the list, and then drop it into place to change the order in which columns are displayed.
1 2
On the navigation bar, click Alerts. Click the Alert History tab.
129
3 4
In the Alert History Filter box, click one of the alerts you want. In the selection pane, select the alert to view details. Alerts older than 30 days are removed by the system.
5 6
Click a column heading to sort the list in ascending or descending order. Click and drag a column to a new position in the list, and then drop it into place to change the order in which columns are displayed.
1 2 3
On the navigation bar, click Alerts. Click the Active Alerts or the Alert History tab. In the selection pane, right-click the alert, and then click Properties.
Category Server Title of the alert. Name of the Business Server or Protection Server on which the alert occurred. Date and time the alert occurred. The time is the local time of the server. Name of the backup or restore job, if a job is associated with the alert. Alert text.
Job name
Message
Click OK.
130
1 2 3
On the navigation bar, click Alerts. On the Active Alerts tab, select the alerts to which you want to respond. Right-click an alert, and then do one of the following:
To respond to one selected alert, click Respond, and then click a response. To respond to all selected alerts, click Respond OK to All.
If the alerts have an OK response available, they are cleared from the list and moved to the alert history. If multiple alerts were selected, respond separately to each alert that is displayed.
1 2 3
On the navigation bar, click Alerts. On the Alert History tab, select the alerts that you want to delete. Do one of the following:
To delete an alert, right-click the alert, and then click Delete. To delete all alerts from history, click Delete All.
Click Yes.
Chapter
How Continuous Protection Server works with Backup Exec Protecting your Exchange Servers with Continuous Protection Server and Backup Exec Protecting CPS with Backup Exec Monitoring CPS jobs in Backup Exec
132
Using Continuous Protection Server with Backup Exec Protecting your Exchange Servers with Continuous Protection Server and Backup Exec
created, you can add a new job or modify an existing job to capture CPS data from the new server. In the event of a system failure or data loss, Backup Exec enables you to restore data to the CPS Protection Server or a Business Server in the Backup Group. Additionally, SmartLink technology may be used to check the status of CPS backup jobs, and then view any alerts in Backup Exec. Otherwise, CPS jobs can be monitored independently through the CPS Administration Console.
Protecting your Exchange Servers with Continuous Protection Server and Backup Exec
Symantec Backup Exec uses Continuous Protection Server to continuously protect Microsoft Exchange servers. The association between Backup Exec and CPS is achieved through the Backup Exec Continuous Protection Broker Service that is installed with each Continuous Protection Agent. For instructions on setting up CPS Exchange backup jobs, see the Backup Exec Administrator's Guide. See Continuous Protection Server services that are installed on page 36. The Broker Service is installed only if the option for the Exchange Protection Agent is installed. After the Exchange Protection Agent is installed, Backup Exec users can create a backup job to protect the Exchange database and transaction logs. The protected transaction logs are part of the Backup Exec Exchange full backup set, as well as Recovery Point backups. Recovery Point jobs protect only the transaction logs. When the transaction logs are coupled with the Exchange full backups, more point-in-time restore points are available. In addition, the transaction log growth on the Exchange server is contained. Although Exchange protection jobs can only be created from the Backup Exec Administration Console, CPS users can monitor the status of these jobs in the job log/report details from the Monitor view of the CPS Administration Console. For more information about viewing the status of a job or the job pairs, see the Symantec Backup Exec for Windows Servers Administrators Guide.
CPS databases that contain information, such as CPS configuration settings, the CMS, and the indexing database.
Using Continuous Protection Server with Backup Exec Protecting CPS with Backup Exec
133
Protection Servers and Business Servers. File shares on Business Servers in the Backup Group. Data from specific volumes on Business Servers in the Backup Group. System-level files from Business Servers in the Backup Group.
Procedures for selecting data for backup or restore jobs in Backup Exec are detailed in the Symantec Backup Exec for Windows Servers Administrators Guide. Depending on the kind of data that is backed up, you can use Backup Exec to restore the data to the CPS Protection Server or the Business Server in the Backup Group from which it was backed up, or to redirect the data to an alternate destination. See Backing up CPS with Backup Exec on page 133. See Backing up the Continuous Management Service (CMS) on page 134. See Backing up a Protection Server on page 134. See Restoring the Continuous Protection Server on page 136. See Restoring a CPS Business Server on page 137.
134
Using Continuous Protection Server with Backup Exec Protecting CPS with Backup Exec
Continuous Protection The Continuous Protection Server node is the gateway to all CPS Server data on the local server. The Continuous Protection Server or Protected Resources root nodes could be selected for backup. CPS Databases Databases reside on the Continuous Management Service (CMS). The CMS can be installed on a dedicated server or on a Protection Server. If the local server is not the CMS, the Databases node does not display. See Backing up CPS databases on page 134. Protection Servers Protection Servers are listed in order by name and contain nodes for the Business Servers on the local server. See Backing up a Protection Server on page 134. Business Servers Business Servers are listed in order by name under the Backup Destination node and contain nodes for CPS Backup data on the local server. See Backing up Business Servers on page 135. Snapshots Snapshots are listed in order by date and time. See Backing up snapshots on page 135.
Using Continuous Protection Server with Backup Exec Protecting CPS with Backup Exec
135
from the available Business Servers. To keep critical business data only, selectively choose information from specific volumes. Regular backups of the Protection Server can help you restore your CPS environment in the event of a disaster.
Backing up snapshots
Snapshots are created by CPS using Microsoft Volume Shadow Copy Service (VSS). They contain copies of the Backup Destination at various points in time. Depending on your configuration, a snapshot of the CPS Backup Destination may contain data from multiple Business Servers. It is not necessary to select the root of the Continuous Protection Server node or to back up snapshots regularly. Most of the data that is captured from snapshot to snapshot is redundant because the majority of the data on the server does not change between snapshots. Back up snapshots only as needed. For example, if a server is running out of disk space, it might be prudent to back up the oldest snapshot for archival. Snapshot data should be backed up from the Continuous Protection Server node on an as needed basis. This is because of the quantity of redundant data that the snapshots typically contain.
Restoring the data to a Protection Server. Restoring the data directly back to the Business Server from which it was backed up.
When you restore CPS data, you must have rights to the selected servers. Create or modify restore jobs by selecting data on the Restore Job Properties Selections screen.
136
Using Continuous Protection Server with Backup Exec Protecting CPS with Backup Exec
Restoring the CMS includes restoring the CMS and Network Helper databases. If the CMS is also a Protection Server, the CMS, CPA, indexing, and Network Helper databases are restored. All CPS configurations, including servers, backup destinations and jobs, that are modified after the backup was created revert to their previous state when restored.
SmartLink enables communication between Continuous Protection Server and Backup Exec for Windows Servers. That is, SmartLink enables backed up files that are stored on the CPS destination to be backed up using Backup Exec. Backup Exec users can restore those files from Backup Exec to a Continuous Protection Server destination through the Backup Exec Administration Console. Features in Microsoft Windows Server 2003, such as the VSS writer, are used to back up and restore the files. Restoring files from Backup Exec directly to a CPS source, bypassing the CPS destination, can be performed under certain circumstances. For example, you can restore files directly from Backup Exec to a CPS source running Windows Server 2003. When restoring CPS from Backup Exec, only the whole volume can be restored.
For more information about using Backup Exec Intelligent Disaster Recovery to recover Continuous Protection Server, go to the following URL: http://seer.entsupport.symantec.com/docs/278977.htm
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
137
138
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
Logon as the user that SmartLink will run under. Use the SmartLink command line to create the proper CPS credential. Type the following:
srbeslnkhost.exe /createcredential /server "server-name" / domain "domain-name" /user "user-name" /password "password"
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
139
1 2 3 4 5 6
Create a backup job in CPS. Create a backup job in Backup Exec that protects the backup destination of a CPS Protection Server. On the CPS navigation bar, click Setup. In the task pane, under General Tasks, click Create SmartLink using wizard. Review the information that displays, and then click Next. When the Enter a Backup Exec Media Server screen opens, SmartLink checks the local server to determine if it is a Backup Exec media server. If it is, the local server name is posted in the text box. If the local server is not a Backup Exec media server (or the appropriate media server), enter the actual name of the server where the CPS backup job is located. If a Backup Exec Central Administration Server (CAS) server is specified, SmartLink must be installed on all managed media servers that are selected for the job processing. Additionally, if SmartLink is run from a batch file, the batch file must exist on each managed media server where it might potentially be run. If the selected server is unavailable, a warning screen is posted.
7 8
Click Next to continue. Enter the appropriate credentials for the selected server, and then click OK to continue. If the credentials are not valid for the specified server, a warning appears and the wizard does not proceed. The credentials that are required to access the media server may not be valid to access the CPS Backup Group registry key on the Backup Exec media server. This registry key is required to verify that the media server is in the same Backup Group as the Continuous Management Server (CMS). If the credentials are not valid for the Backup Group registry key, a warning is presented that SmartLink is unable to determine the validity of the Group. If the credentials are valid, SmartLink determines the extent of the Backup Group. If the CMS and media server are in the same Backup Group, SmartLink proceeds. If the CMS and media server are not in the same Backup Group, SmartLink does not proceed.
Select the backup job to associate with the CPS job. Only the jobs that protect the backup destination appear in the Select a Backup Exec Job screen.
140
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
10 Select the CPS jobs to be monitored, and then click Next to continue. 11 To reduce the number of CPS job log entries, select Limit Log Entries and
enter the maximum number of entries per individual CPS job and pair. Click Next. SmartLink determines the state of the CPS jobs and pairs, and enters the states into the Backup Exec Log entries. By default, the CPS Log entries are not limited between backups. This may result in a very large Backup Exec log file.
12 Click Finish to transfer the CPS job information to the Backup Exec
pre-command. You can verify that the pre-command was successfully associated with the Backup Exec job by viewing the job properties in Backup Exec.
1 2 3
On the Backup Exec navigation bar, click Alerts. Select the alert from either the Active Alerts pane or the Alert History pane. Under General Tasks in the task pane, click Properties.
Type and category name All CPS-related alerts posted to Backup Exec are Warnings (yellow icon) and indicate a problem. A message or statement describing the condition that prompted the alert. The name of the Backup Exec server being backed up, which is also CPSs Protection Server. The name of the Backup Exec job.
Message
Server name
Job name
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
141
generates a Warning alert, and more than one alert can be generated during a single run of SmartLink. Table 9-2 describes the fatal alert messages and conditions. Table 9-2 Message Fatal alert messages Condition Solution
Check network connectivity and that the CMS is running.
SmartLink is unable to contact the Continuous SmartLink is unable to connect Management Service (CMS). The server may to the CMS. be down or a network issue may be preventing SmartLink from contacting the CMS. No CPS Backup data validation is possible. SmartLink has failed to authenticate to the Continuous Management Service <CMSservername>. No CPS Backup data validation is possible. Check the user name and password provided to SmartLink. SmartLink cannot authenticate to the CMS.
Verify credentials to CMS. See Understanding the credentials for using Backup Exec SmartLink on page 137.
SmartLink is unable to contact the Continuous General failure CMS errors. This Attempt to restart the services, Management Service (CMS) alert is a catch-all for and if not successful, contact non-network and non-credentials Symantec Technical Support. based errors. CPS Backup Job <Cpsjobname> - SmartLink has failed to authenticate to the JCD Server <JCDservername>. The Job and Pair Logs are Unavailable. Failure to authenticate to a JCD indicates that SmartLink is unable to acquire log entries. However, an alert is generated because it is a correctable configuration error. Verify credentials to JCD server. See Understanding the credentials for using Backup Exec SmartLink on page 137.
CPS Backup Job <Cpsjobname> - SmartLink is JCD is unreachable, which has the Check network connectivity and unable to contact the JCD Server same effect as the failure to that the JCD server is running <JCDservername>. The server may be down or authenticate. properly. a network issue may be preventing SmartLink from contacting the JCD. The Job and Pair Logs are Unavailable. CPS Backup Job <Cpsjobname> - SmartLink is General failure for non-network unable to contact the JCD server < and non-credentials based JCD JCDservername>. The Job and Pair Logs are errors. Unavailable. Attempt to restart the JCD services, and if not successful, contact Symantec Technical Support.
142
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
A specified CPS Job ID is invalid. Verify that the correct job ID has This condition is a correctable been entered. SmartLink configuration error and thus generates a top-level Alert. A specified Job name is invalid. This condition is a correctable SmartLink configuration error and thus generates a top-level Alert. Verify that the correct job name has been entered.
CPS Backup Job <Cpsjobname> - The Continuous Management Service (CMS) and the CPS Backup JCD server do not have consistent Job State information. The actual state of Job is unknown.
The CPS job is in an unknown Check the connectivity between state. In this case, the CMS does the CMS and JCD, and verify that not have the latest information each is running. regarding a job's run state.
CPS Backup Job <Cpsjobname> - Unable to get Unable to get Pair information. pair information.
Check the connectivity between the CMS and JCD, and verify that each is running. Check the connectivity between the CMS and JCD, and verify that each is running.
CPS Backup Job <Cpsjobname> - Unable to get Unable to get JCD information. JCD information.
CPS Backup Job <Cpsjobname> - Unable to get Unable to get job log information. Check the connectivity between job log details Information. the CMS and JCD, and verify that each is running.
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
143
CPS Backup Job One or more pairs in one or <cpsjobname> - Exception in more of the CPS jobs are One or More CPS Pairs. inconsistent.
1 2 3
On the Backup Exec navigation bar, click Job Monitor. In the Job History pane, select the Backup Exec jobs that are associated with the CPS job. Click the Job Log tab to view detailed information about the job. Under Job Information, details about the job server, job name, date and time that the job started, the job type, and the job log name appear.
Click the plus sign [+] to the left of Job Operation - Continuous Protection Job to expand the headings.
144
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
All CPS jobs are good. One or more problems exist with the CPS jobs. Fatal errors occurred that prevent SmartLink from running.
Table 9-4 provides more information about the summary log messages that might appear for each state. Table 9-4 Message
All CPS backup jobs are good CPS Backup Jobs are complete or are This message appears if all CPS jobs have completed or are running without running without errors. errors. There are one or more problems Exception in One or More CPS Backup If there are any problems with the CPS jobs or pairs, this message appears Jobs. in the CPS Log. Additionally, the Exceptions topic box appears later in the Job Log, which provides details on the specific problems that are encountered in the CPS jobs. See Exceptions topic box on page 145. A fatal error has occurred The SmartLink Command Line Has Syntax Errors. This message appears when syntax errors are encountered in the SmartLink command line. Additionally, if this message is posted, the Command Line Syntax Error topic box appears later in the Job Log, which provides details on the nature of the error. See Command Line Syntax Error topic box on page 145. SmartLink is unable to connect to the This error might occur for one of the following reasons: Backup Exec server. (Server: SmartLink may be invoked using invalid Backup Exec credentials, which <servername> User: <username> prevents SmartLink from connecting to Backup Exec. For example, this Pwd: xxxx ... Error: message appears if all CPS Jobs are good, but invalid Backup Exec <errorcode>Errors credentials were provided. SmartLink was not able to acquire the Backup Exec job information from Backup Exec.
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
145
SmartLink is unable to contact the The server may be down or a network issue may prevent SmartLink from Continuous Management Server. The contacting the CMS. No CPS Backup data validation is possible. server may be down or a network issue may be preventing SmartLink from contacting the Continuous Management Server. No backup data validation on Protection Server is possible. SmartLink is unable to contact the Continuous Management Server. The server may be down or a network issue may prevent SmartLink from contacting the CMS. No CPS Backup data validation is possible.
Pair did not meet goodness criteria. Job name or ID was not found. Unknown Job State. Failure to connect to the Job Control Delegate (JCD) to retrieve log details
146
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
Exceptions Description
The criteria that are evaluated to determine the consistency of a job are the following:
Each pair must be in a consistent state. Each pair must have been consistent since the last time the associated Backup Exec job was run.
This exception is given when one or more job names or IDs on the SmartLink command line cannot be found on the CMS. An invalid job that is specified on the SmartLink command line that does not exist in the CMS database. The JCD of a job and the CMS may be unsynchronized. Thus, there is no way for SmartLink to get an authoritative measure of the state of the job or any of the pairs in the job. Thus, the job in question has an entry in the Exceptions error box but does not have a Continuous Protection Job section.
Log Entry Limit Show Latest Log Entry First Issue Warning If Backup Data is Inconsistent Backup Exec Job Name Log File Name
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
147
Backup Exec Job information Continuous Management Service information CPS Job information Continuous Protection Log information
Description
Contains a summary of the job at the time SmartLink ran. It shows the job name, description, type, state, last started time, and last stopped time. Contains job properties that define how the job was configured when the SmartLink command line was started. The Job Details boxes contain most of the job properties that are found on the CPS Job Properties page. Contains CPS job log entries for the period starting when the Backup Exec job last ran, and ending with the current run. Log entries are presented based on the following: The log entries are sorted in the same order as the Backup Exec log entries. They are sorted in descending order with the latest entries at the bottom of the log. The date/time portions of CPS log entries are presented in the same format as the date/time fields in the rest of the Backup Exec log (12 versus 24-hour clock, UTC versus local time, international time format, and so forth.)
Job Details
Job Log
The number of entries is optionally configured with the -logLimit command line parameter. Backup Pair One Backup Pair box exists for each pair of the associated CPS job. The title of the box is the name of the actual CPS pair. If there is an exception associated with the pair, the box title contains the state of the pair along with a description of the exception condition.
148
Using Continuous Protection Server with Backup Exec Monitoring CPS jobs in Backup Exec
Description
Contains a summary of the pair at the time SmartLink ran. It shows the source and destination server names, pair state, last started time, last stopped time, destination consistency, and destination latency. Destination latency can only be calculated when both servers in a pair are running Continuous Protection Server version 10 or later.
Pair Log
Contains CPS pair log entries for the time period starting from when the owning Backup Exec job ran, and ending with the current run. Log entries are presented based on the following: The log entries are sorted in the same order as the Backup Exec log entries. They are sorted in descending order with the latest entries at the bottom of the log. The date/time portions of our log entries is presented in the same format as the date/time fields in the rest of the Backup Exec log (12 versus 24 hour clock, UTC versus local time, international time format, and so forth.)
The number of entries is optionally configured with the -logLimit command line parameter.
Chapter
10
Troubleshooting Continuous Protection Server Installation and upgrade issues Component issues Configuration issues General issues Backup and restore job issues Database maintenance utilities
150
Description
Symantec does not recommend or support mixing the servers hosting the Continuous Management Service and Continuous Protection Agent between workgroups and domains. Before you install CPS, you should disable any anti-spyware software. If you are prompted for permission to install CPS, click Yes. This is particularly relevant for computers where the Continuous Protection Agent was push installed, and their users tend to select the Block option since they may not know what is being installed and may think it is spyware from the Internet. If a cross-domain trust exists between the computers that you are installing from and to, the account that is running from the installing computer must be present in the local administrators group of the computer being push installed to. If a NIC card fails after installing CPS, the registry key for the new NIC card must be updated for CPS to work properly. CPS fails to start if CPS has been installed in a directory whose pathname includes characters from Asian languages, including Japanese, Chinese, and Korean. To avoid this problem, either install CPS in the default installation directory or choose a directory whose pathname, netgroup name and master server name only includes English characters (a-z, A-Z, 0-9). After installing Continuous Protection Server on a computer running Windows Server 2003, you might receive an error message that the Network Load Balancing Service failed to start. Microsoft reports the cause as: Although network Load Balancing (NLB) is not currently installed, some NLB registry keys might be present in the registry. Although Microsoft Knowledge Base Article 268437 describes the problem as applying to Windows 2000 Advanced Server, the fix also works for Windows Server 2003. For more information about network load balancing on Windows Server 2003, go to the following URL: www.microsoft.com/technet/prodtechnol/windows2000serv/support/nlbcontb.mspx
Table 10-2 describes a CPS uninstall issue. Table 10-2 Issue CPS uninstall issue Description
Uninstall and reinstall If CPS is uninstalled and reinstalled, information in the job logs loses job history and pair and pair logs is not saved. logs For more information about this issue, go to the following URL: http://seer.entsupport.symantec.com/docs/278649.htm
151
Component issues
Table 10-3 describes CPS administration console issues. Table 10-3 Issue Administration Console issues Description
Administration Console The first time that you select a server to do a CPS restore, a wait may run slowly when cursor appears and it may take several minutes before anything first run is displayed. Nothing in the console indicates that anything is happening and a user might think that nothing can be restored. This delay is caused by the mounting of the snapshots as volumes. The amount of time it takes to mount a snapshot is proportional to the size of the snapshot. Job name and description are in a different language than the Administration Console Consoles running on computers without the corresponding language pack that is installed is not able to properly interpret the job name or description. For example, when a job name is created with Japanese characters, these characters show as meaningless square boxes when the job is viewed on an English Console. Be sure that the language packs are installed for all languages of job names and descriptions that may be used in the Console.
Configuration issues
Table 10-5 describes snapshot and indexing issues.
152
The ability to search for files is accomplished by a built-in indexing service. The indexing database requires 1 GB of free disk space on the destination to search for files to restore or to display a list of recent activity. The number of files with which you work can vary widely. Without enough free disk space to handle the number of files, the search is not performed and the list of files that are found, or the list of recent activity, appears empty. If your destination servers do not have 1 GB of free disk space, the amount of space CPS looks for can be minimized. You can adjust the amount of free disk space that CPS looks for by adding the following line to the [SERVER] section of the Autonomy\suir.cfg file in the product installation folder. MinFreeSpaceMB=XX Where XX is the number of free megabytes that are required on the server to start the indexing service.
General issues
Table 10-6 describes processing efficiency issues. Table 10-6 Issue
Bandwidth throttling and Quality of Service (QOS)
153
System may run out of A chronic nearly out of memory condition may exist during memory during intensive periods of intensive input/output processing. input/output processing
In this state, the system is unresponsive to user input and should be corrected. For more information about this issue, go to the following URL: http://seer.entsupport.symantec.com/docs/277876.htm File system input/output deadlocks may occur when continuously backing up large database files An input/output deadlock can occur for the following reasons:
CPS is used to continuously back up large databases. The input/output activity on these database files is high. The host server has fewer than 4 logical CPUs (that is, 4 physical CPUs without hyperthreading, or 2 CPUs with hyperthreading).
For more information about this issue, go to the following URL: http://seer.entsupport.symantec.com/docs/277871.htm
154
Multiple pairs are configured to run between the same two computers
CPS database backup and Database backup and restore capabilities are based on Volume restore Shadow Copy Service (VSS) Writer Technology. The following utilities can be used in lieu of using Backup Exec with VSS capabilities for configuration database backups, or if the user wants to perform manual backups and verification. Use cpsDBBackup to create a validated backup image of the CMS or CPA database. Use cpsDBValidate to validate and repair the CMS or CPA database. Only corrupt indexes can be repaired. Restore is a manual procedure. For more information about the CPS database maintenance utilities, go to the following URL: http://seer.entsupport.symantec.com/docs/277860.htm
155
Connection outages
Table 10-9 describes a CPS restore job issue. Table 10-9 Issue
CPS does not allow files on a Protection Servers to be restored to a different location on the Protection Server
CPS Database Backup and Restore CPS Database Validation and Repair
Any procedures that are associated with CPS database maintenance utilities may be superseded by the Backup Exec backup and restore jobs. However, if the Continuous Management Service (CMS) is operating on a server using Windows 2000 (without the Shadow Copy components), these procedures apply. See Protecting CPS with Backup Exec on page 132. The Database Maintenance utilities are run from the CPS utilities command line prompt.
156
On the Windows taskbar, click Start > All Programs > Symantec > Backup Exec CPS > CPS Utilities.
157
Integrated logons cannot be enabled on systems that were installed in non-secure mode. The CMS or CPA service's log on or run as account must be set to a domain account and not the local system or a local system account. All CMS and CPA servers may have integrated logons enabled by running the SetIntegratedLogin utility. This must be done for each server, and one server at a time. If integrated logons is enabled on a combined CMS/CPA server, it is enabled for both services at the same time. Enabling integrated logons requires restarting the affected CPS services. After integrated logons have been enabled, it is possible to reset standard logons, again using the SetIntegratedLogin utility. This results in a server running in the same configuration as it was after installation. This is required if the log on account name is changed for any CMS or CPA service for whom integrated logons has been enabled. The SetIntegratedLogin utility is run from the CPS Utilities command line prompt. Note: It is necessary to run SetIntegratedLogin only if the services run as account name is changed, not the run as password. To reset the standard logon:
1 2 3
Run SetIntegratedLogin to reset the standard logons. Change the services in question to the run-as account name. Run SetIntegratedLogin to re-enable integrated logons.
1 2 3 4 5
Run the ODBC Data Source Administrator (odbcad32). Click the System DSN tab. Select the CPA DSN, and then click Configure. Click the Login tab. Select Supply user ID and password, and then click OK.
158
6 7
Repeat steps 1-5, but this time for the CMS DSN, if there is one. Exit the ODBC Data Source Administrator. The CMS and/or CPS services can now run. You must now reconfigure the services for integrated logon.
Run the SetIntegratedLogin utility to re-enable integrated logons. For example, SetIntegratedLogin Watchword. The services will now run in integrated logon mode.
1 2
Restore the CMS database from a pre-integrated login backup image. The CMS server does not start. Edit the ODBC CMS DSN to use standard logins. See Issues with integrated logon and database backups on page 157. The CMS service can start.
SetIntegratedLogin determines that the CMS and the CPA differ and returns an error. See Issues with integrated logon and database backups on page 157. Currently the only way to overcome this error is to restore both the CMS and CPA databases from the same backup image set. That is, both databases must be backed up at the same time, and the backup images should be kept and restored together as a set.
Restore the CMS and CPA databases from a pre integrated login backup image set. Neither service will start.
159
Modify the ODBC DSN for the CMS and the CPA to use standard logins. See Issues with integrated logon and database backups on page 157. The services can start.
SetIntegratedLogin (step 2) succeeds and the CMS and the CPA services will now run in integrated login mode.
160
Appendix
About Third-Party Legal Notices ACE and TAO are governed under the same license provided below. ACE (The Adaptive Communication Environment) TAO Apache Struts, Xerces C++ and Tomcat are governed under the same license provided below Apache Struts Xerces C++ Tomcat Blowfish Encryption Curl/LibCurl Digital Encryption Standard (DES) - MIT ICU MD5 Open SSL ReportCtrl.h.2.0.1 STLport Java 2 Runtime Environment
162
ACE and TAO are governed under the same license provided below.
This para is intentionally added.
TAO
Douglas C. Schmidt and his research group at Washington University and University of California, Irvine and Vanderbuilt Univerity. TAO(TM) is copyrighted by Douglas C. Schmidt and his research group at Washington University, University of California, Irvine, and Vanderbilt University Copyright (c) 1993-2003, all rights reserved. Copyright and Licensing Information for ACE(TM), TAO(TM), CIAO(TM), and CoSMIC(TM): ACE(TM), TAO(TM), CIAO(TM), and CoSMIC(TM) (henceforth referred to as "DOC software") are copyrighted by Douglas C. Schmidt and his research group at Washington University, University of California, Irvine, and Vanderbilt University, Copyright (c) 1993-2004, all rights reserved. Since DOC software is open-source, free software, you are free to use, modify, copy, and distribute--perpetually and
163
irrevocably--the DOC software source code and object code produced from the source, as well as copy and distribute modified versions of this software. You must, however, include this copyright statement along with code built using DOC software. You can use DOC software in proprietary software and are under no obligation to redistribute any of your source code that is built using DOC software. Note, however, that you may not do anything to the DOC software code, such as copyrighting it yourself or claiming authorship of the DOC software code, that will prevent DOC software from being distributed freely using an open-source development model. You needn't inform anyone that you're using DOC software in your software, though we encourage you to let us know so we can promote your project in the DOC software success stories. DOC software is provided as is with no warranties of any kind, including the warranties of design, merchantability, and fitness for a particular purpose, noninfringement, or arising from a course of dealing, usage or trade practice. Moreover, DOC software is provided with no support and without any obligation on the part of Washington University, UC Irvine, Vanderbilt University, their employees, or students to assist in its use, correction, modification, or enhancement. A number of companies around the world provide commercial support for DOC software, however. DOC software is Y2K-compliant, as long as the underlying OS platform is Y2K-compliant. Washington University, UC Irvine, Vanderbilt University, their employees, and students shall have no liability with respect to the infringement of copyrights, trade secrets or any patents by DOC software or any part thereof. Moreover, in no event will Washington University, UC Irvine, or Vanderbilt University, their employees, or students be liable for any lost revenue or profits or other special, indirect and consequential damages. The ACE, TAO, CIAO, and CoSMIC web sites are maintained by the DOC Group at the Institute for Software Integrated Systems (ISIS) and the Center for Distributed Object Computing of Washington University, St. Louis for the development of open-source software as part of the open-source software community. By submitting comments, suggestions, code, code snippets, techniques (including that of usage), and algorithms, submitters acknowledge that they have the right to do so, that any such submissions are given freely and unreservedly, and that they waive any claims to copyright or ownership. In addition, submitters acknowledge that any such submission might become part of the copyright maintained on the overall body of code, which comprises the DOC software. By making a submission, submitter agree to these terms. Furthermore, submitters acknowledge that the incorporation or modification of such submissions is entirely at the discretion of the moderators of the open-source DOC software projects or their designees.
164
Third-Party Legal Notices Apache Struts, Xerces C++ and Tomcat are governed under the same license provided below
The names ACE(TM), TAO(TM), CIAO(TM), CoSMIC(TM), Washington University, UC Irvine, and Vanderbilt University, may not be used to endorse or promote products or services derived from this source without express written permission from Washington University, UC Irvine, or Vanderbilt University. Further, products or services derived from this source may not be called ACE(TM), TAO(TM), CIAO(TM), or CoSMIC(TM) nor may the name Washington University, UC Irvine, or Vanderbilt University appear in their names, without express written permission from Washington University, UC Irvine, and Vanderbilt University. If you have any suggestions, additions, comments, or questions, please let me know. Douglas C. Schmidt
Apache Struts, Xerces C++ and Tomcat are governed under the same license provided below
This para is intentionally added.
Apache Struts
This para is intentionally added.
Xerces C++
This para is intentionally added.
Tomcat
Apache Software Foundation Portions of this program contain components from the Apache Software Foundation. These components are made available under the Apache License 2.0, a copy of which is provided below. License: Apache License, Version 2.0, January 2004 http://www.apache.org/licenses/ TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
165
Definitions.
License shall mean the terms and conditions for use, reproduction, and distribution as defined by Sections 1 through 9 of this document. Licensor shall mean the copyright owner or entity authorized by the copyright owner that is granting the License. Legal Entity shall mean the union of the acting entity and all other entities that control, are controlled by, or are under common control with that entity. For the purposes of this definition, control means (i) the power, direct or indirect, to cause the direction or management of such entity, whether by contract or otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding shares, or (iii) beneficial ownership of such entity. You (or Your) shall mean an individual or Legal Entity exercising permissions granted by this License. Source form shall mean the preferred form for making modifications, including but not limited to software source code, documentation source, and configuration files. Object form shall mean any form resulting from mechanical transformation or translation of a Source form, including but not limited to compiled object code, generated documentation, and conversions to other media types. Work shall mean the work of authorship, whether in Source or Object form, made available under the License, as indicated by a copyright notice that is included in or attached to the work (an example is provided in the Appendix below). Derivative Works shall mean any work, whether in Source or Object form, that is based on (or derived from) the Work and for which the editorial revisions, annotations, elaborations, or other modifications represent, as a whole, an original work of authorship. For the purposes of this License, Derivative Works shall not include works that remain separable from, or merely link (or bind by name) to the interfaces of, the Work and Derivative Works thereof. Contribution shall mean any work of authorship, including the original version of the Work and any modifications or additions to that Work or Derivative Works thereof, that is intentionally submitted to Licensor for inclusion in the Work by the copyright owner or by an individual or Legal Entity authorized to submit on behalf of the copyright owner. For the purposes of this definition, "submitted" means any form of electronic, verbal, or written communication sent to the Licensor or its representatives, including but not limited to communication on electronic mailing lists, source code control systems, and issue tracking systems that are managed by, or on behalf of, the Licensor for the purpose of discussing and improving the Work, but excluding communication that is conspicuously
166
marked or otherwise designated in writing by the copyright owner as "Not a Contribution." Contributor shall mean Licensor and any individual or Legal Entity on behalf of whom a Contribution has been received by Licensor and subsequently incorporated within the Work.
Redistribution.
You may reproduce and distribute copies of the Work or Derivative Works thereof in any medium, with or without modifications, and in Source or Object form, provided that You meet the following conditions:
You must give any other recipients of the Work or Derivative Works a copy of this License; and You must cause any modified files to carry prominent notices stating that You changed the files; and You must retain, in the Source form of any Derivative Works that You distribute, all copyright, patent, trademark, and attribution notices from the
167
Source form of the Work, excluding those notices that do not pertain to any part of the Derivative Works; and
If the Work includes a "NOTICE" text file as part of its distribution, then any Derivative Works that You distribute must include a readable copy of the attribution notices contained within such NOTICE file, excluding those notices that do not pertain to any part of the Derivative Works, in at least one of the following places: within a NOTICE text file distributed as part of the Derivative Works; within the Source form or documentation, if provided along with the Derivative Works; or, within a display generated by the Derivative Works, if and wherever such third-party notices normally appear. The contents of the NOTICE file are for informational purposes only and do not modify the License.
You may add Your own attribution notices within Derivative Works that You distribute, alongside or as an addendum to the NOTICE text from the Work, provided that such additional attribution notices cannot be construed as modifying the License. You may add Your own copyright statement to Your modifications and may provide additional or different license terms and conditions for use, reproduction, or distribution of Your modifications, or for any such Derivative Works as a whole, provided Your use, reproduction, and distribution of the Work otherwise complies with the conditions stated in this License.
Submission of Contributions.
Unless You explicitly state otherwise, any Contribution intentionally submitted for inclusion in the Work by You to the Licensor shall be under the terms and conditions of this License, without any additional terms or conditions. Notwithstanding the above, nothing herein shall supersede or modify the terms of any separate license agreement you may have executed with Licensor regarding such Contributions.
Trademarks.
This License does not grant permission to use the trade names, trademarks, service marks, or product names of the Licensor, except as required for reasonable and customary use in describing the origin of the Work and reproducing the content of the NOTICE file.
Disclaimer of Warranty.
Unless required by applicable law or agreed to in writing, Licensor provides the Work (and each Contributor provides its Contributions) on an AS IS BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied, including, without limitation, any warranties or conditions of TITLE,
168
NON-INFRINGEMENT, MERCHANTABILITY, or FITNESS FOR A PARTICULAR PURPOSE. You are solely responsible for determining the appropriateness of using or redistributing the Work and assume any risks associated with Your exercise of permissions under this License.
Limitation of Liability
In no event and under no legal theory, whether in tort (including negligence), contract, or otherwise, unless required by applicable law (such as deliberate and grossly negligent acts) or agreed to in writing, shall any Contributor be liable to You for damages, including any direct, indirect, special, incidental, or consequential damages of any character arising as a result of this License or out of the use or inability to use the Work (including but not limited to damages for loss of goodwill, work stoppage, computer failure or malfunction, or any and all other commercial damages or losses), even if such Contributor has been advised of the possibility of such damages.
Blowfish Encryption
Bruce Schneier Copyright 2003 by George Anescu The code in this project is Copyright 2003 by George Anescu. You have the right to use and distribute the code in any way you see fit as long as this paragraph is included with the distribution. No warranties or claims are made as to the validity of the information and [Blowfish] code contained herein, so use it at your own risk.
169
Curl/LibCurl
Daniel Stenberg Copyright (c) 1996 - 2004, Daniel Stenberg, <daniel@haxx.se>. All rights reserved. Permission to use, copy, modify, and distribute this software for any purpose with or without fee is hereby granted, provided that the above copyright notice and this permission notice appear in all copies. THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder.
170
permission. M.I.T. makes no representations about the suitability of this software for any purpose. It is provided as is without express or implied warranty.
ICU
International Business Machines Corporation Copyright (c) 1995-2003 International Business Machines Corporation and others. All rights reserved. ICU License - ICU 1.8.1 and later COPYRIGHT AND PERMISSION NOTICE Copyright (c) 1995-2003 International Business Machines Corporation and others. All rights reserved. Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the Software), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, provided that the above copyright notice(s) and this permission notice appear in all copies of the Software and that both the above copyright notice(s) and this permission notice appear in supporting documentation. THE SOFTWARE IS PROVIDED AS IS, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. Except as contained in this notice, the name of a copyright holder shall not be used in advertising or otherwise to promote the sale, use or other dealings in this Software without prior written authorization of the copyright holder. All trademarks and registered trademarks mentioned herein are the property of their respective owners.
MD5
RSA Data Security, Inc.
171
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. Ronald L. Rivest Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved. License to copy and use this software is granted provided that it is identified as the RSA Data Security, Inc. MD5 Message-Digest Algorithm in all material mentioning or referencing this software or this function. License is also granted to make and use derivative works provided that such works are identified as derived from the RSA Data Security, Inc. MD5 Message-Digest Algorithm in all material mentioning or referencing the derived work. RSA Data Security, Inc. makes no representations concerning either the merchantability of this software or the suitability of this software for any particular purpose. It is provided as is without express or implied warranty of any kind. These notices must be retained in any copies of any part of this documentation and/or software.
Open SSL
The OpenSSL Project Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. LICENSE ISSUES: The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the OpenSSL License and the original SSLeay license apply to the toolkit. See below for the actual license texts. Actually both licenses are BSD-style Open Source licenses. In case of any license issues related to OpenSSL please contact openssl-core@openssl.org. OpenSSL License Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution.
172
All advertising materials mentioning features or use of this software must display the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://www.openssl.org/) The names OpenSSL Toolkit and OpenSSL Project must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact openssl-core@openssl.org. Products derived from this software may not be called OpenSSL nor may OpenSSL appear in their names without prior written permission of the OpenSSL Project. Redistributions of any form whatsoever must retain the following acknowledgment: This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/)
THIS SOFTWARE IS PROVIDED BY THE OpenSSL PROJECT AS IS AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE OpenSSL PROJECT OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. This product includes cryptographic software written by Eric Young (eay@cryptsoft.com). This product includes software written by Tim Hudson (tjh@cryptsoft.com).
173
SSL documentation included with this distribution is covered by the same copyright terms except that the holder is Tim Hudson (tjh@cryptsoft.com). Copyright remains Eric Young's, and as such any Copyright notices in the code are not to be removed. If this package is used in a product, Eric Young should be given attribution as the author of the parts of the library used. This can be in the form of a textual message at program startup or in documentation (online or textual) provided with the package. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
Redistributions of source code must retain the copyright notice, this list of conditions and the following disclaimer. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. All advertising materials mentioning features or use of this software must display the following acknowledgement: "This product includes cryptographic software written by Eric Young (eay@cryptsoft.com)" The word 'cryptographic' can be left out if the routines from the library being used are not cryptographic related :-). If you include any Windows specific code (or a derivative thereof) from the apps directory (application code) you must include an acknowledgement:
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
174
The licence and distribution terms for any publically available version or derivative of this code cannot be changed. i.e. this code cannot simply be copied and put under another distribution licence [including the GNU Public Licence.]
ReportCtrl.h.2.0.1
Maarten Hoeben Copyright Maarten Hoeben Author: Maarten Hoeben E-mail: hamster@xs4all.nl Implementation of the CReportCtrl and associated classes. This code may be used in compiled form in any way you desire. This file may be redistributed unmodified by any means PROVIDING it is not sold for profit without the authors written consent, and providing that this notice and the authors name and all copyright notices remains intact. An email letting me know how you are using it would be nice as well. This file is provided "as is" with no expressed or implied warranty. The author accepts no liability for any damage/loss of business that this product may cause.
STLport
Boris Fomitchev Copyright 1999,2000 Boris Fomitchev Boris Fomitchev grants Licensee a non-exclusive, non-transferable, royalty-free license to use STLport and its documentation without fee. By downloading, using, or copying STLport or any portion thereof, Licensee agrees to abide by the intellectual property laws and all other applicable laws of the United States of America, and to all of the terms and conditions of this Agreement. Licensee shall maintain the following copyright and permission notices on STLport sources and its documentation unchanged : Copyright 1999,2000 Boris Fomitchev This material is provided "as is", with absolutely no warranty expressed or implied. Any use is at your own risk. Permission to use or copy this software for any purpose is hereby granted without fee, provided the above notices are retained on all copies. Permission to modify
175
the code and to distribute modified code is granted, provided the above notices are retained, and a notice that the code was modified is included with the above copyright notice. The Licensee may distribute binaries compiled with STLport (whether original or modified) without any royalties or restrictions. The Licensee may distribute original or modified STLport sources, provided that:
The conditions indicated in the above permission notice are met; The following copyright notices are retained when present, and conditions provided in accompanying permission notices are me :
Copyright 1994 Hewlett-Packard Company Copyright 1996,97 Silicon Graphics Computer Systems, Inc. Copyright 1997 Moscow Center for SPARC Technology.
Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Hewlett-Packard Company makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Silicon Graphics makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty. Permission to use, copy, modify, distribute and sell this software and its documentation for any purpose is hereby granted without fee, provided that the above copyright notice appear in all copies and that both that copyright notice and this permission notice appear in supporting documentation. Moscow Center for SPARC Technology makes no representations about the suitability of this software for any purpose. It is provided "as is" without express or implied warranty.
176
Binary Code License Agreement for the JAVA(TM) 2 RUNTIME ENVIRONMENT (J2RE), STANDARD EDITION, VERSION 1.4.2_X SUN MICROSYSTEMS, INC. ("SUN") IS WILLING TO LICENSE THE SOFTWARE IDENTIFIED BELOW TO YOU ONLY UPON THE CONDITION THAT YOU ACCEPT ALL OF THE TERMS CONTAINED IN THIS BINARY CODE LICENSE AGREEMENT AND SUPPLEMENTAL LICENSE TERMS (COLLECTIVELY "AGREEMENT"). PLEASE READ THE AGREEMENT CAREFULLY. BY DOWNLOADING OR INSTALLING THIS SOFTWARE, YOU ACCEPT THE TERMS OF THE AGREEMENT. INDICATE ACCEPTANCE BY SELECTING THE "ACCEPT" BUTTON AT THE BOTTOM OF THE AGREEMENT. IF YOU ARE NOT WILLING TO BE BOUND BY ALL THE TERMS, SELECT THE "DECLINE" BUTTON AT THE BOTTOM OF THE AGREEMENT AND THE DOWNLOAD OR INSTALL PROCESS WILL NOT CONTINUE.
DEFINITIONS.
"Software" means the identified above in binary form, any other machine readable materials (including, but not limited to, libraries, source files, header files, and data files), any updates or error corrections provided by Sun, and any user manuals, programming guides and other documentation provided to you by Sun under this Agreement. "Programs" mean Java applets and applications intended to run on the Java 2 Platform, Standard Edition (J2SETM platform) platform on Java-enabled general purpose desktop computers and servers.
LICENSE TO USE.
Subject to the terms and conditions of this Agreement, including, but not limited to the Java Technology Restrictions of the Supplemental License Terms, Sun grants you a non-exclusive, non-transferable, limited license without license fees to reproduce and use internally Software complete and unmodified for the sole purpose of running Programs. Additional licenses for developers and/or publishers are granted in the Supplemental License Terms.
RESTRICTIONS.
Software is confidential and copyrighted. Title to Software and all associated intellectual property rights is retained by Sun and/or its licensors. Unless enforcement is prohibited by applicable law, you may not modify, decompile, or reverse engineer Software. You acknowledge that Licensed Software is not designed or intended for use in the design, construction, operation or maintenance of any nuclear facility. Sun Microsystems, Inc. disclaims any express or implied warranty of fitness for such uses. No right, title or interest in or to any trademark, service
177
mark, logo or trade name of Sun or its licensors is granted under this Agreement. Additional restrictions for developers and/or publishers licenses are set forth in the Supplemental License Terms.
LIMITED WARRANTY.
Sun warrants to you that for a period of ninety (90) days from the date of purchase, as evidenced by a copy of the receipt, the media on which Software is furnished (if any) will be free of defects in materials and workmanship under normal use. Except for the foregoing, Software is provided "AS IS". Your exclusive remedy and Sun's entire liability under this limited warranty will be at Sun's option to replace Software media or refund the fee paid for Software. Any implied warranties on the Software are limited to 90 days. Some states do not allow limitations on duration of an implied warranty, so the above may not apply to you. This limited warranty gives you specific legal rights. You may have others, which vary from state to state.
DISCLAIMER OF WARRANTY.
UNLESS SPECIFIED IN THIS AGREEMENT, ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT THESE DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
LIMITATION OF LIABILITY.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL SUN OR ITS LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER CAUSED REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. In no event will Sun's liability to you, whether in contract, tort (including negligence), or otherwise, exceed the amount paid by you for Software under this Agreement. The foregoing limitations will apply even if the above stated warranty fails of its essential purpose. Some states do not allow the exclusion of incidental or consequential damages, so some of the terms above may not be applicable to you.
178
and updated versions of the Software from Sun ("Software Updates"), which may require you to accept updated terms and conditions for installation. If additional terms and conditions are not presented on installation, the Software Updates will be considered part of the Software and subject to the terms and conditions of the Agreement.
TERMINATION.
This Agreement is effective until terminated. You may terminate this Agreement at any time by destroying all copies of Software. This Agreement will terminate immediately without notice from Sun if you fail to comply with any provision of this Agreement. Either party may terminate this Agreement immediately should any Software become, or in either party's opinion be likely to become, the subject of a claim of infringement of any intellectual property right. Upon Termination, you must destroy all copies of Software.
EXPORT REGULATIONS.
All Software and technical data delivered under this Agreement are subject to US export control laws and may be subject to export or import regulations in other countries. You agree to comply strictly with all such laws and regulations and acknowledge that you have the responsibility to obtain such licenses to export, re-export, or import as may be required after delivery to you.
179
GOVERNING LAW.
Any action related to this Agreement will be governed by California law and controlling U.S. federal law. No choice of law rules of any jurisdiction will apply.
SEVERABILITY.
If any provision of this Agreement is held to be unenforceable, this Agreement will remain in effect with the provision omitted, unless omission would frustrate the intent of the parties, in which case this Agreement will immediately terminate.
INTEGRATION.
This Agreement is the entire agreement between you and Sun relating to its subject matter. It supersedes all prior or contemporaneous oral or written communications, proposals, representations and warranties and prevails over any conflicting or additional terms of any quote, order, acknowledgment, or other communication between the parties relating to its subject matter during the term of this Agreement. No modification of this Agreement will be binding, unless in writing and signed by an authorized representative of each party.
180
A. Software Internal Use and Development License Grant. Subject to the terms and conditions of this Agreement, including, but not limited to the Java Technology Restrictions of these Supplemental Terms, Sun grants you a non-exclusive, non-transferable, limited license without fees to reproduce internally and use internally the Software complete and unmodified (unless otherwise specified in the applicable README file) for the purpose of designing, developing, and testing your Programs. B. License to Distribute Software. Subject to the terms and conditions of this Agreement, including, but not limited to the Java Technology Restrictions of these Supplemental Terms, Sun grants you a non-exclusive, non-transferable, limited license without fees to reproduce and distribute the Software, provided that (i) you distribute the Software complete and unmodified (unless otherwise specified in the applicable README file) and only bundled as part of, and for the sole purpose of running, your Programs, (ii) the Programs add significant and primary functionality to the Software, (iii) you do not distribute additional software intended to replace any component(s) of the Software (unless otherwise specified in the applicable README file), (iv) you do not remove or alter any proprietary legends or notices contained in the Software, (v) you only distribute the Software subject to a license agreement that protects Sun's interests consistent with the terms contained in this Agreement, and (vi) you agree to defend and indemnify Sun and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys' fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of any and all Programs and/or Software. C. License to Distribute Redistributables. Subject to the terms and conditions of this Agreement, including but not limited to the Java Technology Restrictions of these Supplemental Terms, Sun grants you a non-exclusive, non-transferable, limited license without fees to reproduce and distribute those files specifically identified as redistributable in the Software "README" file ("Redistributables") provided that: (i) you distribute the Redistributables complete and unmodified (unless otherwise specified in the applicable README file), and only bundled as part of Programs, (ii) you do not distribute additional software intended to supersede any component(s) of the Redistributables (unless otherwise specified
181
in the applicable README file), (iii) you do not remove or alter any proprietary legends or notices contained in or on the Redistributables, (iv) you only distribute the Redistributables pursuant to a license agreement that protects Sun's interests consistent with the terms contained in the Agreement, (v) you agree to defend and indemnify Sun and its licensors from and against any damages, costs, liabilities, settlement amounts and/or expenses (including attorneys' fees) incurred in connection with any claim, lawsuit or action by any third party that arises or results from the use or distribution of any and all Programs and/or Software.
D. Java Technology Restrictions. You may not modify the Java Platform Interface ("JPI", identified as classes contained within the "java" package or any subpackages of the "java" package), by creating additional classes within the JPI or otherwise causing the addition to or modification of the classes in the JPI. In the event that you create an additional class and associated API(s) which (i) extends the functionality of the Java platform, and (ii) is exposed to third party software developers for the purpose of developing additional software which invokes such additional API, you must promptly publish broadly an accurate specification for such API for free use by all developers. You may not create, or authorize your licensees to create, additional classes, interfaces, or subpackages that are in any way identified as "java", "javax", "sun" or similar convention as specified by Sun in any naming convention designation. E. Source Code. Software may contain source code that, unless expressly licensed for other purposes, is provided solely for reference purposes pursuant to the terms of this Agreement. Source code may not be redistributed unless expressly provided for in this Agreement. F. Third Party Code. Additional copyright notices and license terms applicable to portions of the Software are set forth in the THIRDPARTYLICENSEREADME.txt file. In addition to any terms and conditions of any third party opensource/freeware license identified in the THIRDPARTYLICENSEREADME.txt file, the disclaimer of warranty and limitation of liability provisions in paragraphs 5 and 6 of the Binary Code License Agreement shall apply to all Software in this distribution.
For inquiries please contact: Sun Microsystems, Inc., 4150 Network Circle, Santa Clara, California 95054, U.S.A. (LFI#135955/Form ID#011801)
182
Appendix
Maintaining accessibility
This appendix includes the following topics:
About accessibility in Continuous Protection Server About general keyboard navigation in Continuous Protection Server About keyboard navigation in dialog boxes Using keyboard shortcuts Setting accessibility options
184
The TAB key moves the focus to the next active area, field, or control, following a preset sequence. SHIFT+TAB moves the focus in the reverse direction through the sequence. CTRL+TAB switches to the next Console view. CTRL+SHIFT+TAB switches to the previous Console view. UP and DOWN ARROW keys move focus up and down the items of a list. The ALT key in combination with the underlined mnemonic letter for a field or command button shifts the focus to that field or button. Either ENTER or the SPACEBAR activates your selection. For example, after pressing the TAB key to select Next in a wizard panel, press the SPACEBAR to display the next screen. SHIFT+F10 provides access to context menus.
The TAB key moves focus between controls within the dialog box along a preset sequence. Controls displaying a mnemonic (an underlined letter) can be selected regardless of focus by typing ALT and the underlined letter. A dark border indicates the default command button. Press Enter at any time to choose the button with a dark border. ESC chooses the Cancel button if one exists. SPACEBAR chooses a control you select with the TAB key.
185
SPACEBAR changes the state of a check box that has focus. Typing a mnemonic (if one is available) moves the focus to the check box and change its state. Arrow keys move focus within radio buttons, list boxes, sliders, groups of option controls, or groups of page tabs. Items that cannot be changed are not visited by the TAB key sequence. Options that are unavailable are grayed-out and can neither be selected nor given focus.
While the controls described here are typically found in dialog boxes, they also can occur in other contexts. The same navigation standards apply.
List Boxes
List boxes display a column of available choices. Different kinds of list boxes exist with additional navigation conventions such as the following:
Drop-down list boxes by default show only the selected item. A small button to the right of the control will show a downward-pointing arrow. Select the arrow to display more items from the list box. If there are more choices than can fit in the preset list box area, a slider appears along the side of the list box. Show or hide the list using ALT+DOWN ARROW, ALT+UP ARROW, or F4. The TAB key selects an item. Extended selection list boxes support selecting single items, blocks of items, or combinations of the two. After an item is selected, hold down CTRL+navigation keys to select or clear additional items or blocks of items.
186
The File menu expands. On the File menu, you can create new jobs, devices and media, print selected items, view properties, or exit Continuous Protection Server. The Edit menu expands. On the Edit menu, you can rename, delete, copy, and select items. In addition, you can work with selection lists and search catalogs. The View menu expands. On the View menu, you can change the information that displays on the screen. The options on the View menu change according to which item is selected on the navigation bar. The Tools menu expands. The Tools menu provides many important options for working with Continuous Protection Server, including starting and stopping services, using device and media operations, using Wizards, and setting default options. The Window menu expands. Use the Window menu to move to a new window or view. The Help menu expands. Use the Help menu to access Continuous Protection Server documentation and various Symantec Web sites.
ALT
ALT
ALT
ALT
ALT
Select secondary menu items by opening the main menu and using the UP or DOWN ARROW key until the item you want to work with is highlighted. Press the RIGHT ARROW key to open a submenu, and ENTER to select your choice.
187
On the Windows taskbar, click Start > Settings > Control Panel > Accessibility Options. On the Windows taskbar, click Programs > Accessories > Accessibility > Accessibility Wizard.
188
Glossary
Administration Console The interface that the administrator uses to manage operations in CPS, such as
setting backup destinations, creating backup or restore jobs, and monitoring CPS processes and alerts.
administrator rights
The credentials that enable a person to make systemwide changes to a domain or computer, install programs, and access all files. The administrator user account has full access to other user accounts. Administrator rights also enable the person to manage user and group accounts, assign passwords, and grant permissions. An event, such as a completed backup job, that usually requires some form of user interaction or acknowledgment. The location on a Protection Server where the files that are backed up from a Business Server are stored. The destination is defined in the backup job properties. Only one backup destination is allowed per volume. The gateway by which users access the Web Restore Server Component to retrieve files. Backup Exec Retrieve uses Internet browsers (Internet Explorer 6.0 or later, and others). CPS software is not required on the user workstations. A group of computers that are managed by a single Continuous Management Service. Files can be backed up only to a Protection Server that is in the same Backup Group as the Business Server. An operation that has been scheduled for processing by the Continuous Management Service. For example, if you make selections and submit a backup that is based on those selections, you have created a backup job. Jobs contain source and destination information, settings, and a schedule. Every type of backup job backs up the selected data and all regular shares. The specific days and times when backup jobs are run. These can be one-time events, periodically run jobs, or continuous processes. Administrators can set or change backup schedules in the CPS Administration Console. This para is intentionally added. The procedures you implement for backing up your information on the network. A good backup strategy requires minimal time to get your information back in the event of a loss.
alert
backup destination
Backup Group
backup job
backup schedule
190
Glossary
Business Server
A local or remote server where users save files and folders as part of their daily work. A Business Server is the source of a backup job and must have a Continuous Protection Agent installed. The primary control of the processes. The CMS maintains a database with all command and control information, and configures the Protection Agents according to settings that are sent from the Administration Console. A backup job that runs continuously, thereby allowing any changes to be backed up as they occur. The Continuous Protection Agent is a software collection that must be installed on each computer in a Backup Group. This agent uses a file system component and file replication technology to enable continuous data protection between computers in the Backup Group. A CPS component that allows communications within the product and with Backup Exec. The Network Helper Service was formerly known as the Enterprise Network Layer (ENL). The server in the network to which information is written during the job process. In a backup job, the information is copied from the Business Servers (sources) to a Protection Server (destination). A Microsoft Windows technology that lets you store information on disk in an encrypted format. The encryption is enabled through the advanced file attributes. CPS skips over files that are encrypted with EFS. A file on the Continuous Management Service where snapshots are stored. The product stores each snapshot for 24 hours unless specified otherwise in the retention settings. The Indexing component maintains a directory for the files that are available to user file retrieval using the Web Restore Server Component and Backup Exec Retrieve. The Indexing component is an optional feature and should be installed on any server that will be accessed by users for file retrieval using Backup Exec Retrieve. The Indexing component supports searches by file, file versions and recent activity. The underlying foundation or basic framework of the Backup Group. The product runs on an infrastructure of Windows-based servers. A job defines what data is to be backed up, which server the data will be backed up from and to, when the data will be backed up, and other settings. Similar jobs are defined to restore the data. The results of a job and are created when a job runs. You can review job logs to find job errors and details.
continuous backup
destination server
history file
Indexing component
infrastructure
job
job log
Glossary
191
periodic backup
A backup job that runs on timed intervals, such as Monday through Friday, every 12 hours. The credentials that enable a particular user to access a particular resource in a shared network environment. For example, users are granted permissions to access files, directories, and printers. A Protection Server is the destination of data that is backed up by CPS from Business Servers. A backup job that is run on a regular schedule, such as every Friday at 6:00 P.M. A CPS uses the Symantec Backup Exec Remote Agent for Windows Systems (Remote Agent) to access System State information for backup and restore. Remote Agent is an optional component and should be installed on any CPS Business Server that needs to have its System State protected. Remote Agent should also be installed on the Protection Server and Continuous Management Service if they will be protected by Symantec Backup Exec. A job defines what data is to be restored, from what computers the data will be restored from and back to, when the data will be restored, and other settings. The length of time you want to save snapshots on the backup destination. You can store snapshots up to a limit that is determined by your underlying snapshot technology. For most installations, this limit is approximately 64 snapshots per destination. This limit may vary considerably if alternative snapshot providers are installed. A backup job that runs on a set schedule: regularly scheduled, periodically scheduled, or continuous. Regularly scheduled backup jobs run on specific days at a specific time, every week. Periodically scheduled backup jobs run on specific days at timed intervals, such as every 12 hours. Continuously scheduled backup jobs are ongoing. The Windows user account under which the CPS services run. A point-in-time, fixed representation, or copy of a specified volume. A volume that is specified where snapshots are stored. A technology that integrates Backup Exec with other Symantec products, such as CPS. SmartLink enables the status of backup jobs that are created in the product to display in the Backup Exec Administration Console. A point-in-time, fixed representation, or copy of a specified volume. A server in the Backup Group that contains the files to be backed up. This computer must have a Continuous Protection Agent installed. The disk drive space on the servers in the Backup Group. Storage space generally refers to available disk space.
permissions
Protection Server
restore job
retention properties
scheduled backup
storage space
192
Glossary
The philosophy of using multiple types of backup jobs to protect your organizations information. A strategic backup plan generally uses several layers of backups to protect different types of information. The philosophy of naming files and backup destinations in a meaningful way. Rather than naming backup destinations sequentially such as Backup01, Backup02, and Backup03, destination names are based on physical office locations, functional business units, or other meaningful criteria. Therefore, when viewing a list of backup destinations, the destinations are differentiated from each other and are easier to find information. The Windows operating system includes data that requires special handling to protect and restore properly. This data, referred to as system information in CPS, contains different information depending on the specific version of Windows that is installed on the system. For Windows 2000 systems, this includes a set of data that is called System State and that includes various operating system files and registry information. For those systems that support Volume Shadow Copy Services (VSS), the system information consists of key elements of Shadow Copy Components including System State and Service State. The parts that make up or operate computer systems or networks such as client computers, servers, printers, cables, modems, bandwidth, memory, or mother boards. Resources are allocated to programs or processes while they are running. A snapshot of system-specific data on the source that is comprised of the registry, the COM+ Class Registration database, and start and system files. If the source is a Certificate Services database, the Certificate Services database is also included. If the server is a domain controller, the data also includes the Active Directory services database and SYSVOL directory. The System State data is backed up and restored only as a collection, never individually. The Web Restore Server component is a feature of the CMS that makes available versioned copies (snapshots) of files for user retrieval to their workstations.
system information
system resources
Index
Symbols
64-bit support 20
A
accessibility dialog boxes 184 keyboard shortcuts 185 overview 183 settings 186 Active Directory 102 Adaptive Server Anywhere 35, 37 adding scripts 96 Administration Console alerts view 57 assistant view 53 backup job properties 57 credentials 52 defined 15 general features 52 information desk view 54 job monitor view 57 menu bar 52 minimum requirements 32 navigation bar 52 preview pane 53 restore view 57 selection pane 53 server properties 55 setup view 54 setup view properties 55 starting 52 status bar 53 system summary view 54 task pane 52 views general 53 Administration Service 36 AlertGroomFrequency parameter 75 alerts 127 deleting 130 fatal 140
alerts (continued) messages 140 properties 140 responding to 129 SmartLink pairs 142 viewing 128 active 128 history 128 properties 129 alerts view 57 AlwaysDoRegionAnalysis parameter 75 ASA directory 35 assistant view 53 autonomy directory 35
B
backup destinations adding 65 credentials 65 deleting 67 description 65 managing 65 properties 56 renaming 67 Backup Exec alerts 140 job logs accessing 143 job selection for backup 139 media server credentials 139 protecting Business Servers 135 Continuous Management Service 134 Continuous Protection Server 132 CPS databases 134 Protection Servers 134 snapshots 135 restoring Business Servers 137 Continuous Management Service 135
194
Index
Backup Exec (continued) restoring (continued) CPS 135 Protection Servers 136 specifying a media server 139 Backup Exec Retrieve description 1516 end users, requirements for using 112 requirements for installing 110 troubleshooting 118 backup group defined 14 moving servers between 62 backup jobs adding scripts 96 alert history 128 alert properties 129 alerts posted to Backup Exec 140 changing bandwith 96 changing schedules 94 creating 88 credentials 90 filtering alerts 128 filters 91 including and excluding information 91 managing alerts 127 statuses 122 manual operation 97 pairs 122 properties 57 schedules 21 states 123 status 122 storing snapshots 71 viewing the status 122 backup schedules continuous description 22 periodic description 22 scheduled description 22 backup strategies considerations 21 periodic backups 22 regular backups 22 bandwidth limiting 96
bandwith limiting 96 batch files 138 BroadcastAddress parameter 76 BroadcastHops parameter 76 Broker Services, services 36 Business Servers configuring 59 description 14 installing 43 managing 59 minimum requirements 30 uninstalling 48
C
Central Admin Server environments 139 command-line syntax errors 145 complete installation 37 configuration troubleshooting 151 Configuration Writer, services 36 configuring Backup Exec Retrieve 115 ConnectionPooling parameter 76 continuous backups description 22 plans 22 Continuous Management Service defined 15 system requirements 31 Continuous Protection Server components 14 credentials 38 database backup and restore 154 databases 134 documentation 23 drivers 36 firewall support 33 installation modification 47 installation upgrade 46 installing 37 integrating with Backup Exec 131 invalid jobs 146 job report 125 jobs topic box 126, 147 key tasks 19 monitoring jobs 122 overview 13 service account 29, 41 Services 36
Index
195
Continuous Protection Server (continued) Services Manager 63 starting 52 tunable parameters 75 uninstalling 47 use model 16 cpssernum.xml file 39 credentials Administration Console 52 backup destinations 65 Backup Exec media server 139 CPS service account 29 creating backup jobs 90 installing CPS 38 push installing CPS 44 SmartLink 137
Environment Check 27 Evaluation version 39 exceptions topic box 145 Exchange protection 20
F
FFXPort parameter 78 file access secured in Backup Exec Retrieve 106 files and directories restoring 100 FilteredIDList parameter 78 filters deleting 94 description 91 include and exclude 92 modifying 93 firewall support 33
D
data protection 21 data source adding 115 deleting 117 editing 117 options 116 database backup and restore 156 database directory 35 database maintenance utilities 155 database services 36 database validation and repair 156 DaysToKeepAlertItems parameter 76 DaysToKeepDeletedSnapshots parameter 76 DelayDirChangeNotifications parameter 77 deploying Silverlight in your organization 113 destinations installing 37 uninstalling 47 Directory Services Restore Mode 102 DoEventLog parameter 77 domain security mode 64 domain trust 30 drivers directory 35
G
Gateway (ENL\System) parameter 78 Gateway (Network.TCPIP) parameter 78 Gateway (Network.UDPv6) parameter 78
H
hardware requirements 31 Help online 24 history alerts 128
I
Indexing directory 42 Indexing Root parameter 79 indexing state snapshots 73 information desk view 54 install directory 35 installation about 26 complete 37 Environment Check 27 Evaluation version 39 modifying 47 prerequisites 25 push install 43 upgrading 46
E
EnableDebugConsole parameter 77 EnableLogFile parameter 77 EnableTimestamp parameter 77 Encrypting File System defined 88
196
Index
M
Master (ENL\System) parameter 80 MaxDirSize parameter 80 MaxLogSize (ENL) parameter 80 MaxLogSize parameter 80 MaxPacketSize (Network.TCPIP) parameter 80 MaxPacketSize (Network.UDPv6) parameter 81 MaxRAPerCentChange parameter 81 menu bar 52 MinRASizeInKb parameter 81 monitoring processes 122 MsBetweenRallyChecks parameter 81
J
job details topic box 147 job ID not found 146 job logs job header 147 SmartLink 143 topic box 147 viewing 143 job monitor view 57 job name not found 146 job pairs alerts 142 description 122 exceptions 145 job report 125 job state unknown 146 job states 122 job status 124 jobs monitoring 122 Journal directory 42 JournalRoot parameter 79
N
NamedObjectsRoot parameter 81 navigation bar 52 NetBios 34 Network (ENL\System) parameter 81 Network Helper services 34, 36 network load balancing service 38, 150 network shares restoring 103 NeverDoRegionAnalysis parameter 82 NumberOfLogs parameter 82
O
OutboundJournalCleanupSize parameter 82 OutboundJournalNominalSize parameter 82 OutboundSyncJournalLimit parameter 82
L
latency target 127, 148 license keys 39 limiting bandwidth 96 LiveUpdate 20 local system object cache 45 log entries limiting 140 parameter 147 LogOpenFileTableOncePerSet parameter 79 LogPath (EFC) parameter 79 LogPath parameter 79 logs viewing installation 42 Logs directory 35 LogText parameter 80
P
pair header topic box 148 pair log topic box 148 pair status 124 pairs job 122 parameters tunable AlertGroomFrequency 75 AlwaysDoRegionAnalysis 75 BroadcastAddress 76 BroadcastHops 76 changing values 85 ConnectionPooling 76 DaysToKeepAlertItems 76 DaysToKeepDeletedSnapshots 76 DelayDirChangeNotifications 77 DoEventLog 77
Index
197
parameters (continued) tunable (continued) EnableDebugConsole 77 EnableLogFile 77 EnableTimestamp 77 FFXPort 78 FilteredIDList 78 Gateway (ENL\System) 78 Gateway (Network.TCPIP) 78 Gateway (Network.UDPv6) 78 IndexingRoot 79 JournalRoot 79 LogOpenFileTableOncePerSet 79 LogPath 79 LogPath (EFC) 79 LogText 80 Master (ENL\System) 80 MaxDirSize 80 MaxLogSize 80 MaxLogSize (ENL) 80 MaxPacketSize (Network.TCPIP) 80 MaxPacketSize (Network.UDPv6) 81 MaxRAPerCentChange 81 MinRASizeInKb 81 MsBetweenRallyChecks 81 NamedObjectsRoot 81 Network (ENL\System) 81 NeverDoRegionAnalysis 82 NumberOfLogs 82 OutboundJournalCleanupSize 82 OutboundJournalNominalSize 82 OutboundSyncJournalLimit 82 PreferredAddress (Network.TCPIP) 83 PreferredAddress (Network.UDPv6) 83 PreferredNIC (Network.UDPv6) 83 PreferredNIC(Network.TCPIP) 83 registry entries 74 ReservedFreeDiskSpace 83 RxRmsStaticPort 84 RxRsaStaticPort 84 Schedule 84 SerializeIrpLogging 84 ShareInfoAsSingleComponent 84 Socket 84 UsePrivateFindFileMethod 85 using Settings Utility 75 Verbose (ENL) 85 VolumeLevel 85
periodic backup description 22 permissions backup destinations 65 media server 139 port settings Services Manager 34 Settings Utility 34 pre/post commands adding 96 runtime settings 138 PreferredAddress (Network.TCPIP) parameter 83 PreferredAddress (Network.UDPv6) parameter 83 PreferredNIC (Network.TCPIP) parameter 83 PreferredNIC (Network.UDPv6) parameter 83 preview pane 53 properties alerts 129 backup destination 56 backup jobs 57 server 55, 59 Protection Agent defined 15 service 36 Protection Server description 14 minimum requirements 31 push installation 43
R
registry entries 74 Remote Agent for Windows Systems 15 renaming backup folders 65 report job 125 requirements for end users Backup Exec Retrieve 112 requirements for installing Backup Exec Retrieve 110 ReservedFreeDiskSpaceparameter 83 responding to alerts 129 restore view 57 retention policies snapshots 69, 71 run log topic box 146 RunLog parameter 146 RxRmsStaticPort parameter 84 RxRsaStaticPort parameter 84
198
Index
S
Schedule parameter 84 scheduled backups description 22 schedules changing 94 changing for snapshots 71 continuous backups 88 snapshots 70 schedules for jobs troubleshooting 90 scripts 96 secured file access 106 security modes domain 64 workgroup 64 selection pane 53 SerializeIrpLogging parameter 84 server properties 55 servers managing properties 59 moving between backup groups 62 service account 29 Services Administration Service 36 Broker Services 36 Configuration Writer 36 database 36 Network Helper 36 Protection Agent 36 System State Manager 36 services manager 63 setintegratedlogin utility 156 Settings Utility 20, 74 setup view 54 setup view properties 55 Shadow Copy Components 88 Shadow Storage changing location 66 ShareInfoAsSingleComponent parameter 84 Silverlight deploying in your organization 113 SmartLink alerts categories 140 credentials 137 description 137 fatal alerts 140 job log descriptions 143
SmartLink (continued) job logs summary messages 145 job topic box 143 options topic box 146 topic boxes command-line syntax errors 145 CPS jobs 147 exceptions 145 job details 147 job log 147 options 146 pair header 148 run log 146 snapshots changing schedules 71 creating 69 creating on demand 69 deleting 73 indexing state 73 managing 68 reasons for deleting 72 reindexing 152 retention 71 retention policies 69 scheduling 70 storing 71 viewing history 72 Socket parameter 84 source properties 59 status job and pair 124 status bar 53 Symantec knowledge base 24 LiveUpdate 20 Technical Support 23 System Cache directory 42 System Information 102 system requirements hardware 31 minimum 30 System State backup schedule 102 Manager 36 restore to an Active Directory 102 restoring 101 system summary view 54
Index
199
T
target latency 127, 148 task pane 52 tasks available in Backup Exec Retrieve 108 Technical Support 23 troubleshooting 149 troubleshooting issues Administration Console 151 anti-spyware software 150 Backup Exec compatibility 28 browsers supported 150 business servers 151 configuration 151 connection outages 155 CPS backup jobs 155 CPS components 151 CPS configurations 151 CPS restore jobs 155 database backup and restore 154, 156 database maintenance 155 database validationa nd repair 156 disk space for indexing 152 file system filter drivers 29 installation 150 network load balance 150 NIC failure 150 pathnames with Asian characters 150 processing efficiency 153 push installing over domain trust 150 services account 29 setintegratedlogin utility 156 snapshot schedules 90 SNMP support 153 system state backup and restore 155 uninstalling CPS 150 utility partitions 153 workgroups and domains 150
V
Verbose (ENL) parameter 85 VolumeLevel parameter 85
W
Windows File Sharing 34 workgroup environment 30 security mode 64
U
uninstallation Business Server 48 Continuous Protection Server 47 destinations 47 sources 48 uninstalling 118 use case 106 UsePrivateFindFileMethod parameter 85