Veritas™ System Recovery 18 Service Pack 3 Management Solution Administrator's Guide

Last Published:
Product(s): System Recovery (18.0.3)
  1. Introducing Veritas System Recovery Management Solution
    1.  
      About Veritas System Recovery 18 Management Solution
    2.  
      Components of Veritas System Recovery 18 Management Solution
    3.  
      How Veritas System Recovery 18 Management Solution works
    4.  
      What you can do with Veritas System Recovery 18 Management Solution
  2. Installing Veritas System Recovery Management Solution
    1.  
      About upgrading to Veritas System Recovery 18 Management Solution
    2.  
      Installing Veritas System Recovery 18 Management Solution
    3.  
      Uninstalling Veritas System Recovery 18 Management Solution
  3. Getting started with Veritas System Recovery Management Solution
    1.  
      About the Veritas System Recovery 18 Management Solution Home page
    2.  
      Starting Veritas System Recovery 18 Management Solution
    3.  
      Sending feedback to Veritas
    4.  
      Preparing to manage the backups of client computers
    5.  
      Discovering client computers on the network
    6.  
      Installing the Symantec Management Agent on client computers
    7.  
      Installing the Veritas System Recovery Plug-in on computers
    8.  
      Uninstalling the Veritas System Recovery Plug-in on computers
    9.  
      Installing Veritas System Recovery 18 or Veritas System Recovery 18 Linux Edition on client computers
    10.  
      Installing Veritas System Recovery 16 on client computers
    11.  
      Installing Veritas System Recovery 16 Linux Edition on client computers
    12.  
      Installing Symantec System Recovery 2013 R2 on client computers
    13.  
      Installing Symantec System Recovery 2013 R2 Linux Edition on client computers
    14.  
      Uninstalling Veritas System Recovery-related products and components from client computers
    15.  
      Generating the LightsOut Restore package in Veritas System Recovery 18 Management Solution
    16.  
      Generating the LightsOut Restore 16 package
    17.  
      Generating the LightsOut Restore 2013 R2 package
    18.  
      Configuring and installing LightsOut Restore 18 on client computers
    19.  
      Configuring and installing LightsOut Restore 16 on client computers
    20.  
      Configuring and installing LightsOut Restore 2013 R2 on client computers
    21.  
      Uninstalling LightsOut Restore from client computers
    22.  
      Updating the settings of a package
    23.  
      Uninstalling Veritas System Recovery-related products from the Symantec Management Platform
    24.  
      Adding or removing recovery point passwords
    25. About managing recovery point destinations
      1.  
        Creating default recovery point destinations
      2.  
        Editing network credentials for a recovery point destination
      3.  
        Deleting recovery point destinations
    26.  
      Configuring a Dedicated Offsite Copy task
    27. About viewing filters
      1.  
        Viewing Veritas System Recovery 18 Management Solution filters
      2.  
        Viewing the filters and policies that are assigned to a client computer
      3.  
        Adding a filtered results path in the Manage Tasks tab to Favorites
    28. About organizational views
      1.  
        Filtering the list of client computers using organizational views
    29. About managing Veritas System Recovery license policies
      1.  
        Adding Veritas System Recovery license policies
      2.  
        Deleting Veritas System Recovery license policies
      3.  
        Assigning Veritas System Recovery licenses to client computers
      4.  
        Unassigning Veritas System Recovery licenses from client computers
      5.  
        Checking the license status of Veritas System Recovery on client computers
  4. Managing backups
    1. About backup policies
      1.  
        Recovery point sets and independent recovery points in backup policies
      2.  
        Tips for creating recovery points
      3.  
        About backing up dual-boot systems
    2. Creating a basic backup policy
      1.  
        About recovery points stored on a network destination
      2.  
        About recovery points stored in a local folder on the client computer
      3.  
        About recovery points stored on an OpenStorage destination
      4.  
        About Offsite Copy
    3. Creating an advanced backup policy
      1.  
        About running command files during a backup
      2.  
        Deploying the command files package to client computers for use during a backup
    4.  
      Creating an independent backup task
    5.  
      Deploying a backup policy
    6.  
      Deploying an existing backup policy as soon as possible
    7.  
      Viewing the status of computers within a backup policy
    8.  
      Editing a backup policy
    9.  
      Editing the schedule of a backup policy
    10.  
      Renaming a backup policy
    11.  
      Disabling a backup policy
    12.  
      Disabling a backup schedule
    13.  
      Deleting a backup policy
    14.  
      Viewing Veritas System Recovery details for a client computer
  5. Managing recovery points
    1.  
      Best practices for creating recovery points
    2.  
      Best practices for managing recovery points
    3. About deleting recovery points
      1.  
        Deleting a recovery point set
      2.  
        Deleting recovery points within a set
  6. Managing the conversion of recovery points to virtual disks
    1.  
      About converting recovery points to virtual disks
    2.  
      Configuring a Convert to Virtual by Computer task
    3.  
      Configuring a Convert to Virtual by Destination task
    4.  
      Configuring a one-time convert to virtual task
    5.  
      Editing a convert to virtual task
    6.  
      Deleting a convert to virtual task
  7. Managing Cloud Storage
    1.  
      Direct to cloud
    2. Providing the OpenStorage destination path
      1.  
        OpenStorage destination options for backups
      2.  
        OpenStorage destination options for recovery
    3.  
      How Offsite Copy works for cloud storage
  8. Remote recovery of drives and computers
    1. About recovering a drive remotely
      1. Using LightsOut Restore to remotely recover client computers
        1.  
          Setting up and using LightsOut Restore
    2.  
      Recovering a drive
    3.  
      Recovering a remote computer
    4.  
      Performing an express recovery
  9. Local recovery of files, folders, drives, and computers
    1. About recovering lost data locally
      1.  
        Recovering files and folders locally by using file and folder backup data
      2.  
        Recovering files and folders locally by using a recovery point
    2.  
      Recovering a computer locally
    3. Starting a computer locally by using Veritas System Recovery Disk
      1.  
        Configuring a computer locally to start from a USB device or DVD
    4.  
      Checking a hard disk for errors
    5.  
      Recovering a computer locally by using a Veritas System Recovery Disk
    6.  
      About using Restore Anyware to recover locally to a computer with different hardware
    7. Recovering files and folders locally by using Veritas System Recovery Disk
      1.  
        Exploring files and folders locally on a computer by using Veritas System Recovery Disk
    8. About using the networking tools in Veritas System Recovery Disk
      1.  
        Starting networking services
      2.  
        Mapping a network drive from within Veritas System Recovery Disk
      3. Configuring network connection settings
        1.  
          Getting a static IP address
    9.  
      Viewing the properties of a recovery point
    10.  
      Viewing the properties of a drive within a recovery point
    11.  
      About the Support Utilities on Veritas System Recovery Disk
  10. Monitoring computers and processes
    1.  
      Viewing reports
    2.  
      Configuring a client option policy for computers
  11. Appendix A. About backing up databases
    1.  
      About backing up VSS-aware databases
    2. About backing up non-VSS-aware databases
      1.  
        Creating the cold, warm, and hot recovery points
    3.  
      Backing up Notification Server and the database
  12. Appendix B. About Active Directory
    1.  
      About the role of Active Directory
  13. Appendix C. Backing up Microsoft virtual environments
    1.  
      About backing up Microsoft virtual hard disks
    2.  
      About backing up and restoring Microsoft Hyper-V virtual machines
  14. Appendix D. About Veritas System Recovery 18 Management Solution and Windows Server 2008 Core
    1.  
      About Veritas System Recovery 18 and Windows Server Core
    2.  
      Installing Veritas System Recovery 18 on Windows Server Core using commands

Configuring a client option policy for computers

You can set a variety of options that affect one computer or entire groups of computers.

To configure a client option policy for computers

  1. On the Veritas System Recovery 18 Management Solution Manage Tasks tab, expand the Configuration Policies list in the left pane.
  2. Do one of the following:

    To edit the default client configuration policy

    Do the following:

    • In the left pane, select a client configuration policy name.

    • In the right pane, select the name of the default policy in the table.

    • Click Edit on the table's toolbar.

    To create a new client configuration policy

    Do the following:

    • In the left pane, select a client configuration policy name.

    • In the right pane, on the table's toolbar, click Create.

    • In the displayed pane, in the text box, type a name for the new policy.

    • Click Apply.

    • In the right pane, on the table's toolbar, click Edit.

  3. Near the upper-right corner of the displayed page, make sure On is selected from the list to enable the policy.
  4. Based on the client configuration policy you selected, set the configuration options you want.

    Event Log

    Sets the minimum priority level and error message types that are added to the Windows application log regarding Veritas System Recovery on the computer.

    FTP

    Sets the default FTP connection settings if you use FTP as an Offsite Copy destination.

    The following options are available:

    • Passive (Recommended)

      Helps avoid conflicts with security systems. This mode is necessary for some firewalls and routers. When you use passive mode, the FTP client opens the connection to an IP address and port that the FTP server supplies.

    • Active

      Uses the Active mode when connections or transfer tries fail in Passive mode, or when you receive data socket errors. When an FTP client connects with Active mode, the server opens a connection to an IP address and port that the FTP client supplies.

    • Limit connection attempts to

      Specifies the number of times Veritas System Recovery on the client computer tries to connect to an FTP server before it gives up. Veritas System Recovery can try a maximum of 100 times.

    • Stop trying to connect after

      Specifies the number of seconds Veritas System Recovery on the client computer tries to connect to an FTP server before it gives up. You can specify up to 600 seconds (10 minutes).

    • Default port

      Specifies the port of the FTP server that listens for a connection.

      You should consult the FTP server administrator to be sure that the port you specify is configured to receive incoming data.

    Log File

    Sets the following log file options:

    • Priority Level

      Indicates the minimum priority level and error message types that you want logged to a file regarding Veritas System Recovery on the computer.

    • Log file location

      Specifies the path that you want to use for storing log files.

    • Maximum file size

      Specifies the maximum file size of the log file. When the maximum file size is reached, the log file is renamed (*.Old). A new log is started and the original file name is used.

    Performance

    Adjusts the operation speed of Veritas System Recovery. This adjustment occurs during the creation of a recovery point by dragging the slider bar to the left or to the right. By reducing the operation speed of Veritas System Recovery, you can improve the performance of other software programs that may be running on the computer. When Veritas System Recovery (with a user interface) is installed, the throttle value that you set in the solution takes precedence. Therefore, any throttle value that a remote user sets is ignored.

    If you save recovery points to a network storage location, you can also set a network throttle value. You set the value by specifying the maximum number of kilobytes per second (200-1048576) of recovery point data that is transferred over the network. If your network has limited bandwidth, you can enable network throttling during a recovery point to help reduce network traffic.

    SMTP Notification

    Configures a user to receive SMTP email notification messages.

    Lets you choose the minimum priority level and error message types that you want to send regarding Veritas System Recovery on the computer.

    You must have an SMTP-compliant email system, such as a POP3 mail server, to receive notification messages.

    Also, suppose you change an existing SMTP Notification setting policy to Off. Even though the policy is off, it does not prevent resource targets with Veritas System Recovery from sending email notifications to the recipient. To stop email notifications, you must create an exclusive SMTP policy that has no SMTP settings. Select On to enable the policy, and then deploy it to the resource targets that you want.

    You can use Encryption or Authentication settings for SMTP. If you have Veritas System Recovery 16.0.2 or earlier versions installed, you must configure SMTP Authentication settings. For Veritas System Recovery 18and 18.0.1, you must configure SMTP Encryption settings. For Veritas System Recovery 18.0.2 and later you can either use Encryption or Authentication settings to configure SMTP email notifications.

    Encryption or Authentication

    If you are installing Veritas System Recovery 18 Management Solution for the first time, you can select Authentication or Encryption.

    By default, the Encryption option is selected.

    For SMTP Encryption

    Lets you select the type of encryption for the specified SMTP server. You can select:

    • None

    • TLS (Transport Layer Security) (selected by default)

    • SSL (Secured Socket Layer)

    You can add the name of the SMTP mail server (for example, smtpserver.domain.com or server1) on which you have a valid account. Veritas System Recovery 18 Management Solution does not verify the server name or the email address.

    You can add secured ports for the sent emails by specifying an encryption level (either None, TLS (Transport Layer Security), or SSL (Secured Socket Layer)), and a user name and password.

    For SMTP Authentication

    Lets you select the method to authenticate to the specified SMTP server. You can select:

    • Anonymous (selected by default)

    • Basic

    • NTLM

    You can add the name of the SMTP mail server (for example, smtpserver.domain.com or server1) on which you have a valid account. Veritas System Recovery 18 Management Solution does not check the server name or the email address for validity.

    You can increase the security of the sent email by specifying an authentication level (either Basic or NTLM), and a user name and password. Anonymous authentication does not require a user name and password.

    SNMP Notification

    Receives the SNMP traps from Veritas System Recovery when you install and configure the Windows SNMP system service.

    By default, Veritas System Recovery is not enabled to send traps to NMS managers.

    Tray Icon

    Shows or hides the Veritas System Recovery system tray icon on computers.

    Hiding the tray icon is useful for the following reasons:

    • You want the actions of Veritas System Recovery to remain invisible to the user.

    • You do not want to add another icon to the system tray of the computer.

    • You want users to avoid having any intervention with Veritas System Recovery on critical computers such as product servers.

    Veritas System Recovery and the Veritas System Recovery Plug-in must already be installed on the client computer.

    You can choose the level of messages that you want the remote user to see, even if the system tray icon is hidden.

    Volume Alert

    Changes how Veritas System Recovery 18 Management Solution reports the status of a particular drive on a client computer. For example, suppose drive D contains unimportant data and you have chosen not to include it in a backup job. The backup status reports that the computer is at risk. You can configure Veritas System Recovery 18 Management Solution to ignore drive D so that it does not calculate the status of drive D. Or, you can specify that only errors, such as missed or failed backups, are included in the status report.

    The backup status is reported on each drive on a client computer wherever the drive is listed in the solution . When you customize status reporting for a drive, the status is reflected anywhere that the drive is listed in Veritas System Recovery 18 Management Solution.

    You should first determine the importance of the data on a particular drive before you decide on the level of status reporting to assign it.

    You can set the status reporting level that you want to be associated with the drives based on the following criteria:

    • Full Status Reporting

      Shows the current status of the selected drives where the status is shown. Click this option if the data is critical.

    • Error Only Status Reporting

      Shows the current status of the selected drives only when errors occur. Click this option if the data is important, but you only want the status to report errors when they occur.

    • No Status Reporting

      Does not show any status for the selected drive. Click this option if the data is unimportant and the missed or failed backups do not need to be reported.

  5. In the Applied to field, select a resource target, and then select the filtering rules that you want to be applied to the policy.
  6. Click Save Changes.