Veritas™ System Recovery 18 Service Pack 3 Management Solution Administrator's Guide

Last Published:
Product(s): System Recovery (18.0.3)
  1. Introducing Veritas System Recovery Management Solution
    1.  
      About Veritas System Recovery 18 Management Solution
    2.  
      Components of Veritas System Recovery 18 Management Solution
    3.  
      How Veritas System Recovery 18 Management Solution works
    4.  
      What you can do with Veritas System Recovery 18 Management Solution
  2. Installing Veritas System Recovery Management Solution
    1.  
      About upgrading to Veritas System Recovery 18 Management Solution
    2.  
      Installing Veritas System Recovery 18 Management Solution
    3.  
      Uninstalling Veritas System Recovery 18 Management Solution
  3. Getting started with Veritas System Recovery Management Solution
    1.  
      About the Veritas System Recovery 18 Management Solution Home page
    2.  
      Starting Veritas System Recovery 18 Management Solution
    3.  
      Sending feedback to Veritas
    4.  
      Preparing to manage the backups of client computers
    5.  
      Discovering client computers on the network
    6.  
      Installing the Symantec Management Agent on client computers
    7.  
      Installing the Veritas System Recovery Plug-in on computers
    8.  
      Uninstalling the Veritas System Recovery Plug-in on computers
    9.  
      Installing Veritas System Recovery 18 or Veritas System Recovery 18 Linux Edition on client computers
    10.  
      Installing Veritas System Recovery 16 on client computers
    11.  
      Installing Veritas System Recovery 16 Linux Edition on client computers
    12.  
      Installing Symantec System Recovery 2013 R2 on client computers
    13.  
      Installing Symantec System Recovery 2013 R2 Linux Edition on client computers
    14.  
      Uninstalling Veritas System Recovery-related products and components from client computers
    15.  
      Generating the LightsOut Restore package in Veritas System Recovery 18 Management Solution
    16.  
      Generating the LightsOut Restore 16 package
    17.  
      Generating the LightsOut Restore 2013 R2 package
    18.  
      Configuring and installing LightsOut Restore 18 on client computers
    19.  
      Configuring and installing LightsOut Restore 16 on client computers
    20.  
      Configuring and installing LightsOut Restore 2013 R2 on client computers
    21.  
      Uninstalling LightsOut Restore from client computers
    22.  
      Updating the settings of a package
    23.  
      Uninstalling Veritas System Recovery-related products from the Symantec Management Platform
    24.  
      Adding or removing recovery point passwords
    25. About managing recovery point destinations
      1.  
        Creating default recovery point destinations
      2.  
        Editing network credentials for a recovery point destination
      3.  
        Deleting recovery point destinations
    26.  
      Configuring a Dedicated Offsite Copy task
    27. About viewing filters
      1.  
        Viewing Veritas System Recovery 18 Management Solution filters
      2.  
        Viewing the filters and policies that are assigned to a client computer
      3.  
        Adding a filtered results path in the Manage Tasks tab to Favorites
    28. About organizational views
      1.  
        Filtering the list of client computers using organizational views
    29. About managing Veritas System Recovery license policies
      1.  
        Adding Veritas System Recovery license policies
      2.  
        Deleting Veritas System Recovery license policies
      3.  
        Assigning Veritas System Recovery licenses to client computers
      4.  
        Unassigning Veritas System Recovery licenses from client computers
      5.  
        Checking the license status of Veritas System Recovery on client computers
  4. Managing backups
    1. About backup policies
      1.  
        Recovery point sets and independent recovery points in backup policies
      2.  
        Tips for creating recovery points
      3.  
        About backing up dual-boot systems
    2. Creating a basic backup policy
      1.  
        About recovery points stored on a network destination
      2.  
        About recovery points stored in a local folder on the client computer
      3.  
        About recovery points stored on an OpenStorage destination
      4.  
        About Offsite Copy
    3. Creating an advanced backup policy
      1.  
        About running command files during a backup
      2.  
        Deploying the command files package to client computers for use during a backup
    4.  
      Creating an independent backup task
    5.  
      Deploying a backup policy
    6.  
      Deploying an existing backup policy as soon as possible
    7.  
      Viewing the status of computers within a backup policy
    8.  
      Editing a backup policy
    9.  
      Editing the schedule of a backup policy
    10.  
      Renaming a backup policy
    11.  
      Disabling a backup policy
    12.  
      Disabling a backup schedule
    13.  
      Deleting a backup policy
    14.  
      Viewing Veritas System Recovery details for a client computer
  5. Managing recovery points
    1.  
      Best practices for creating recovery points
    2.  
      Best practices for managing recovery points
    3. About deleting recovery points
      1.  
        Deleting a recovery point set
      2.  
        Deleting recovery points within a set
  6. Managing the conversion of recovery points to virtual disks
    1.  
      About converting recovery points to virtual disks
    2.  
      Configuring a Convert to Virtual by Computer task
    3.  
      Configuring a Convert to Virtual by Destination task
    4.  
      Configuring a one-time convert to virtual task
    5.  
      Editing a convert to virtual task
    6.  
      Deleting a convert to virtual task
  7. Managing Cloud Storage
    1.  
      Direct to cloud
    2. Providing the OpenStorage destination path
      1.  
        OpenStorage destination options for backups
      2.  
        OpenStorage destination options for recovery
    3.  
      How Offsite Copy works for cloud storage
  8. Remote recovery of drives and computers
    1. About recovering a drive remotely
      1. Using LightsOut Restore to remotely recover client computers
        1.  
          Setting up and using LightsOut Restore
    2.  
      Recovering a drive
    3.  
      Recovering a remote computer
    4.  
      Performing an express recovery
  9. Local recovery of files, folders, drives, and computers
    1. About recovering lost data locally
      1.  
        Recovering files and folders locally by using file and folder backup data
      2.  
        Recovering files and folders locally by using a recovery point
    2.  
      Recovering a computer locally
    3. Starting a computer locally by using Veritas System Recovery Disk
      1.  
        Configuring a computer locally to start from a USB device or DVD
    4.  
      Checking a hard disk for errors
    5.  
      Recovering a computer locally by using a Veritas System Recovery Disk
    6.  
      About using Restore Anyware to recover locally to a computer with different hardware
    7. Recovering files and folders locally by using Veritas System Recovery Disk
      1.  
        Exploring files and folders locally on a computer by using Veritas System Recovery Disk
    8. About using the networking tools in Veritas System Recovery Disk
      1.  
        Starting networking services
      2.  
        Mapping a network drive from within Veritas System Recovery Disk
      3. Configuring network connection settings
        1.  
          Getting a static IP address
    9.  
      Viewing the properties of a recovery point
    10.  
      Viewing the properties of a drive within a recovery point
    11.  
      About the Support Utilities on Veritas System Recovery Disk
  10. Monitoring computers and processes
    1.  
      Viewing reports
    2.  
      Configuring a client option policy for computers
  11. Appendix A. About backing up databases
    1.  
      About backing up VSS-aware databases
    2. About backing up non-VSS-aware databases
      1.  
        Creating the cold, warm, and hot recovery points
    3.  
      Backing up Notification Server and the database
  12. Appendix B. About Active Directory
    1.  
      About the role of Active Directory
  13. Appendix C. Backing up Microsoft virtual environments
    1.  
      About backing up Microsoft virtual hard disks
    2.  
      About backing up and restoring Microsoft Hyper-V virtual machines
  14. Appendix D. About Veritas System Recovery 18 Management Solution and Windows Server 2008 Core
    1.  
      About Veritas System Recovery 18 and Windows Server Core
    2.  
      Installing Veritas System Recovery 18 on Windows Server Core using commands

Creating a basic backup policy

You can automate the creation of recovery points with a daily, weekly, or monthly schedule. If you create a recovery point set, you can also specify that certain events, like logging on or off a computer, create incremental recovery points.

When a backup runs, each snapshot is stored on your computer as a recovery point. You can use the recovery point to restore your computer to the point in time when you created the snapshot.

Note:

Veritas recommends that you enable AES encryption for the recovery points so that only users with passwords can mount the files.

See About backup policies.

See Creating an advanced backup policy.

See Editing a backup policy.

See Editing the schedule of a backup policy.

To create a basic backup policy

  1. On the Veritas System Recovery 18 Management Solution Manage tab, in the left pane, expand the Backup Policies list in the left pane.
  2. Select the type of recovery point that you want the backup policy to create, and then click New > Backup Policy.

    See Recovery point sets and independent recovery points in backup policies.

  3. On the Backup Policies panel, in the Name text field, type a descriptive name for the new backup policy.
  4. In the Drives field, click the hyperlink.
  5. On the Backup Policy Drives panel, set the drive option you want, and then click Apply.

    All drives on selected computers

    Lets you define a backup policy for two or more computers. You should select this option to protect all drives (including hidden or unmounted), that exist on the client computers.

    By Drive

    Lets you select the drives that you want to back up on the selected client computers.

    If you chose to create a recovery point set, hidden drives are not displayed in the By Drive list.

    Sometimes a selected drive letter is not available for backing up on a particular client computer. The drive has been deleted or the entire hard disk has been removed from the client computer since Veritas System Recovery was installed. In such cases, when the recovery point is created, it does not include the drive.

    Note:

    During a backup, if you select a drive or volume that includes a system drive, the partitions associated with the drive are also backed up. For example, System Reserved, UEFI, and Recovery partitions.

  6. In the Schedule field, click the hyperlink.
  7. On the Backup Policy Schedule panel, set the schedule options you want, and then click Apply.

    The available scheduling options depend on the recovery point type that you selected.

    Backup Policy Schedule tab options for a recovery point set

    Schedule

    Lets you select the days and a start time for when the backup should run.

    Start time (24 hour format)

    Lets you customize the start time of the backup .

    Sun Mon Tue Wed Thu Fri Sat

    Lets you customize the days of the week for the backup to run. The default is to run the backup Monday through Friday.

    Run more than once per day

    Lets you run the backup more than once a day to protect the data that you edit or change frequently.

    Time between backups

    Lets you specify the maximum time that should occur between backups.

    Number of times

    Lets you specify the number of times per day that the backup should run.

    Automatically optimize

    Lets you select how often optimization should occur for the backup destination to manage the used disk space.

    You can choose from the following options:

    • Never

      Indicates that no deletion of incremental recovery points is performed.

    • Every four hours

      Indicates that a deletion of incremental recovery points that are four hours old (or older) is performed every four hours. Also, after the first incremental of the day is taken, all incremental files from two days previous are consolidated to a single file.

    • Every twelve hours

      Indicates that a deletion of incremental recovery points that are 12 hours old (or older) is performed every 12 hours. Also, after the first incremental of the day is taken, all incremental files from two days previous are consolidated to a single file.

    Distribute strategy randomly across (minutes)

    Indicates that the policy is distributed randomly across a specified number of minutes (0-1440) to all the computers that are assigned to the policy. This option applies if you save recovery points to a network destination.

    For example, suppose you want to distribute a backup policy in 60 minutes to 120 computers. Each of the 120 computers would randomly choose a time within the 60 minutes, before or after the scheduled start time, to start the backup.

    This option helps to run not the policy at the same start time for all computers, which can cause a denial of service condition on the network, the recovery point destination, or both.

    Start a new recovery point set

    Lets you select how frequently a new recovery point set should be started.

    Your options for starting new recovery point set (base) include the following:

    • Weekly

      Creates a new recovery point set on the first scheduled or manual backup of the week.

    • Monthly

      Creates a new recovery point set on the first scheduled or manual backup of the month.

    • Quarterly

      Creates a new recovery point set on the first scheduled or manual backup every three months from the date when you selected this option.

    • Yearly

      Creates a new recovery point set on the first scheduled or manual backup of the year, once a year, on the date that you selected for this option.

    • Custom

      Lets you set specific weekly or monthly options for starting a new recovery point set.

    Custom

    Lets you customize the start time, and the days of the week or month to run the backup.

    Note:

    If you choose to archive recovery points, consider creating recovery point sets more frequently to keep the size of your recovery point sets smaller.

    Backup Policy Triggers tab options for a recovery point set

    Any application is installed

    Indicates that an incremental recovery point is created at the time users begin to install a software application on their computer.

    Specified applications are launched

    Indicates that an incremental recovery point is created at the time users run a specified software application on their computer.

    Any user logs on to the computer

    Indicates that an incremental recovery point is created when users log on to Windows on their computer.

    Any user logs off from the computer

    Indicates that an incremental recovery point is created at the moment users log off from Windows on their computer (but does not turn off Windows).

    Data added to the drive exceeds

    Indicates that an incremental recovery point is created when the added data on a drive exceeds an amount (in megabytes) that you specify.

    Backup Policy Schedule options for an independent recovery point

    Automatically create a recovery point

    Lets you specify a weekly or monthly backup schedule.

    The scheduling options include the following:

    • Weekly

      Creates a new, independent recovery point on each day of the week that you check, and at the specified time. When you create independent recovery points one or more times per week, large amounts of disk storage space may be required.

    • Monthly

      Creates a new, independent recovery point on each day of the month that you check, and at the specified time.

    • No Schedule

      Saves all of the backup policy settings except a schedule. You can later deploy the backup policy at your convenience by assigning a schedule to the policy.

    You can also create a single independent recovery point once, with no schedule.

    See Creating an independent backup task.

    Start time (24 hour format)

    Lets you customize the start time of the backup .

    Days of the week

    Lets you customize the days of the week for the backup policy to run.

    Days of the month

    Lets you customize the days of the month for the backup policy to run.

    Distribute strategy randomly across (minutes)

    Indicates that the policy is distributed randomly across a specified number of minutes (0-1440) to all the computers that are assigned to the policy. This option applies if you save recovery points to a network destination.

    For example, suppose you want to distribute a backup policy in 60 minutes to 120 computers. Each of the 120 computers would randomly choose a time within the 60 minutes, before or after the scheduled start time, to start the backup.

    This option helps to not run the policy at the same start time for all computers, which can cause a denial of service condition on the network, the recovery point destination, or both.

  8. On the Backup Policies panel, do one of the following:
    • On the Destination list, select a local target folder, network share, or OpenStorage destination.

    • Click Define destination. On the Backup Destination panel, set the options you want, and then click Apply.

      If you have not created a new OpenStorage destination, use Define destination to create it.

      See Providing the OpenStorage destination path.

      See OpenStorage destination options for backups.

      When you click Define Destination and select a network destination to save the recovery points, the backup is not encrypted.

      Note:

      Veritas recommends that you use AES encryption when you define a backup to prevent unauthorized access to the files.

      Enter a folder relative to the managed computers

      Indicates the location where you want to store the recovery points, relative to the managed computers.

      Browse

      Lets you browse only a local destination that you want to use, relative to the managed computers. You must have create, read, and write privileges at the specified location.

      Note:

      You cannot browse and select an OpenStorage destination, FTP destination, or network destination.

      If there is insufficient space at the destination where the recovery point is stored, the policy fails and an error is reported on the Veritas System Recovery 18 Management Solution Home tab.

      User name

      Lets you specify the user name to a destination folder that is located in a network path or OpenStorage destination.

      Password

      Lets you specify the password to a destination that is located in a network path or OpenStorage destination.

      Confirm password

      Lets you retype the password for confirmation.

      See About managing recovery point destinations.

  9. Optionally, select Create subfolder for each computer if you want to create new subfolders on the network share or OpenStorage destination that serves as the backup destination.

    The new subfolders are given the same names as each client computer that is backed up. For example, suppose you have two client computers. One is named "CathyReadLaptop" and the other is named "MyLaptop". The new subfolders are named \CathyReadLaptop and \MyLaptop.

  10. Optionally, if you want to make copies of your recovery points to store at a remote location for added backup protection, do one of the following:
    • In the Offsite Copy list, select an off-site destination.

    • In the Offsite Copy list area, click Define Destination. Specify the path to an external drive, a network server, an FTP server, or an OpenStorage destination, and then click Apply.

      All drives on selected computers

      Lets you define a backup policy for two or more computers. You should select this option to protect all drives (including hidden or unmounted), that exist on the client computers.

      By Drive

      Lets you select the drives that you want to back up on the selected client computers.

      If you chose to create a recovery point set, hidden drives are not displayed in the By Drive list.

      Sometimes a selected drive letter is not available for backing up on a particular client computer. The drive has been deleted or the entire hard disk has been removed from the client computer since Veritas System Recovery was installed. In such cases, when the recovery point is created, it does not include the drive.

      See About Offsite Copy.

  11. In the Enable password protection panel, enter the following information.

    Enable password protection

    Sets a password and enables AES encryption on the recovery point when it is created.

    This check box is selected by default.

    Password

    Lets you specify a password for the backup. Passwords can include standard characters. Passwords cannot include extended characters, or symbols. (Use characters with an ASCII value of 128 or lower.)

    You must type this password before you restore a backup or view the contents of the recovery point.

    Confirm password

    Lets you retype the password for confirmation.

    AES encryption

    Encrypts recovery point data to add another level of protection to your recovery points.

    Note:

    If the Use Password check box is selected, you must define AES encryption.

    Choose from the following encryption levels:

    • Standard 128-bit (8+ character password)

    • Medium 192-bit (16+ character password)

    • High 256-bit (32+ character password)

    You may have older backup policies created using Symantec System Recovery 2013 Management Solution or Symantec System Recovery 2011 Management Solution, where password protection was not enabled. If you edit the older policies using Veritas System Recovery 18 Management Solution, the AES Encryption field displays None. You need to select one of the options in the list to enable AES encryption.

    While higher strengths require longer passwords, the result is greater security for your data.

    Note:

    When you create a backup policy, the password that you enter in this option is also automatically added to the recovery point password store.

    See Creating an advanced backup policy.

    See Adding or removing recovery point passwords.

    See Creating an independent backup task.

    See Editing a backup policy.

    See Editing the schedule of a backup policy.

  12. Click Save changes.
  13. In the middle pane, click Apply on the toolbar.
  14. Select the targets to which you want the policy to be applied, and then click OK.

    You can also click Unapply on the toolbar in the middle pane to remove the policy from selected targets.