Veritas™ System Recovery 18 Management Solution Administrator's Guide

Last Published:
Product(s): System Recovery (18.0)
  1. Introducing Veritas™ System Recovery 18 Management Solution
    1.  
      About Veritas System Recovery 18 Management Solution
    2.  
      Components of Veritas System Recovery 18 Management Solution
    3.  
      How Veritas System Recovery 18 Management Solution works
    4.  
      What you can do with Veritas System Recovery 18 Management Solution
  2. Installing Veritas System Recovery 18 Management Solution
    1.  
      About upgrading to Veritas System Recovery 18 Management Solution
    2.  
      Installing Veritas System Recovery 18 Management Solution
    3.  
      Uninstalling Veritas System Recovery 18 Management Solution
  3. Getting started with Veritas System Recovery 18 Management Solution
    1.  
      About the Veritas System Recovery 18 Management Solution Home page
    2.  
      Starting Veritas System Recovery 18 Management Solution
    3.  
      Sending feedback to Veritas
    4.  
      Preparing to manage the backups of client computers
    5.  
      Discovering client computers on the network
    6.  
      Installing the Symantec Management Agent on client computers
    7.  
      Installing the Veritas System Recovery Plug-in on computers
    8.  
      Uninstalling the Veritas System Recovery Plug-in on computers
    9.  
      Installing Veritas System Recovery 18 or Veritas System Recovery 18 Linux Edition on client computers
    10.  
      Installing Veritas System Recovery 16 on client computers
    11.  
      Installing Veritas System Recovery 16 Linux Edition on client computers
    12.  
      Installing Symantec System Recovery 2013 R2 on client computers
    13.  
      Installing Symantec System Recovery 2013 R2 Linux Edition on client computers
    14.  
      Uninstalling Veritas System Recovery-related products and components from client computers
    15.  
      Generating the LightsOut Restore package in Veritas System Recovery 18 Management Solution
    16.  
      Generating the LightsOut Restore 16 package
    17.  
      Generating the LightsOut Restore 2013 R2 package
    18.  
      Configuring and installing LightsOut Restore 18 on client computers
    19.  
      Configuring and installing LightsOut Restore 16 on client computers
    20.  
      Configuring and installing LightsOut Restore 2013 R2 on client computers
    21.  
      Uninstalling LightsOut Restore from client computers
    22.  
      Updating the settings of a package
    23.  
      Uninstalling Veritas System Recovery-related products from the Symantec Management Platform
    24.  
      Adding or removing recovery point passwords
    25. About managing recovery point destinations
      1.  
        Creating default recovery point destinations
      2.  
        Editing network credentials for a recovery point destination
      3.  
        Deleting recovery point destinations
    26.  
      Configuring a Dedicated Offsite Copy task
    27. About viewing filters
      1.  
        Viewing Veritas System Recovery 18 Management Solution filters
      2.  
        Viewing the filters and policies that are assigned to a client computer
      3.  
        Adding a filtered results path in the Manage Tasks tab to Favorites
    28. About organizational views
      1.  
        Filtering the list of client computers using organizational views
    29. About managing Veritas System Recovery license policies
      1.  
        Adding Veritas System Recovery license policies
      2.  
        Deleting Veritas System Recovery license policies
      3.  
        Assigning Veritas System Recovery licenses to client computers
      4.  
        Unassigning Veritas System Recovery licenses from client computers
      5.  
        Checking the license status of Veritas System Recovery on client computers
  4. Managing backups
    1. About backup policies
      1.  
        Recovery point sets and independent recovery points in backup policies
      2.  
        Tips for creating recovery points
      3.  
        About backing up dual-boot systems
    2. Creating a basic backup policy
      1.  
        About recovery points stored on a network destination
      2.  
        About recovery points stored in a local folder on the client computer
      3.  
        About Offsite Copy
    3. Creating an advanced backup policy
      1.  
        About running command files during a backup
      2.  
        Deploying the command files package to client computers for use during a backup
    4.  
      Creating an independent backup task
    5.  
      Deploying a backup policy
    6.  
      Deploying an existing backup policy as soon as possible
    7.  
      Viewing the status of computers within a backup policy
    8.  
      Editing a backup policy
    9.  
      Editing the schedule of a backup policy
    10.  
      Renaming a backup policy
    11.  
      Disabling a backup policy
    12.  
      Disabling a backup schedule
    13.  
      Deleting a backup policy
    14.  
      Viewing Veritas System Recovery details for a client computer
  5. Managing recovery points
    1.  
      Best practices for creating recovery points
    2.  
      Best practices for managing recovery points
    3. About deleting recovery points
      1.  
        Deleting a recovery point set
      2.  
        Deleting recovery points within a set
  6. Managing the conversion of recovery points to virtual disks
    1.  
      About converting recovery points to virtual disks
    2.  
      Configuring a Convert to Virtual by Computer task
    3.  
      Configuring a Convert to Virtual by Destination task
    4.  
      Configuring a one-time convert to virtual task
    5.  
      Editing a convert to virtual task
    6.  
      Deleting a convert to virtual task
  7. Remote recovery of drives and computers
    1. About recovering a drive remotely
      1. Using LightsOut Restore to remotely recover client computers
        1.  
          Setting up and using LightsOut Restore
    2.  
      Recovering a drive
    3.  
      Recovering a remote computer
    4.  
      Performing an express recovery
  8. Local recovery of files, folders, drives, and computers
    1. About recovering lost data locally
      1.  
        Recovering files and folders locally by using file and folder backup data
      2.  
        Recovering files and folders locally by using a recovery point
    2.  
      Recovering a computer locally
    3. Starting a computer locally by using Veritas System Recovery Disk
      1.  
        Configuring a computer locally to start from a USB device or DVD
    4.  
      Checking a hard disk for errors
    5.  
      Recovering a computer locally by using a Veritas System Recovery Disk
    6.  
      About using Restore Anyware to recover locally to a computer with different hardware
    7. Recovering files and folders locally by using Veritas System Recovery Disk
      1.  
        Exploring files and folders locally on a computer by using Veritas System Recovery Disk
    8. About using the networking tools in Veritas System Recovery Disk
      1.  
        Starting networking services
      2.  
        Mapping a network drive from within Veritas System Recovery Disk
      3. Configuring network connection settings
        1.  
          Getting a static IP address
    9.  
      Viewing the properties of a recovery point
    10.  
      Viewing the properties of a drive within a recovery point
    11.  
      About the Support Utilities on Veritas System Recovery Disk
  9. Monitoring computers and processes
    1.  
      Viewing reports
    2.  
      Configuring a client option policy for computers
  10. Appendix A. About backing up databases
    1.  
      About backing up VSS-aware databases
    2. About backing up non-VSS-aware databases
      1.  
        Creating the cold, warm, and hot recovery points
    3.  
      Backing up Notification Server and the database
  11. Appendix B. About Active Directory
    1.  
      About the role of Active Directory
  12. Appendix C. Backing up Microsoft virtual environments
    1.  
      About backing up Microsoft virtual hard disks
    2.  
      About backing up and restoring Microsoft Hyper-V virtual machines
  13. Appendix D. About Veritas System Recovery 18 Management Solution and Windows Server 2008 Core
    1.  
      About Veritas System Recovery 18 and Windows Server 2008 Core
    2.  
      Installing Veritas System Recovery 18 on Windows Server 2008 Core using commands

Creating default recovery point destinations

You can define destinations where you want to store recovery points that client computers create. The destination must be accessible by the client computer that you back up.

See About managing recovery point destinations.

See About Offsite Copy.

See Configuring a Dedicated Offsite Copy task.

To create default recovery point destinations

  1. On the Veritas System Recovery 18 Management Solution Manage Tasks tab, expand the Destinations area in the left pane.
  2. In the left pane, in the Destinations tree, select a destination type.
  3. On the toolbar in the middle pane, click Create.
  4. Depending on the destination type you selected in the left pane, do one of the following:

    If you selected Local

    On the Backup Destinations panel, type a local folder path.

    The local folder path you specify is relative to the managed client computer. It is not the folder path on the computer where you run Symantec Management Console.

    You can also use the specified local path as an off-site destination by selecting it from the Off-site drop-down list in a backup policy. USB is not supported as an off-site location.

    If you selected Network Shares

    On the Backup Destinations panel, do the following:

    • Type a UNC path to a network share. Make sure double backslash characters (\\) precede the UNC path.

      Or, type the IP address path to a network share. Make sure double backslash characters (\\) precede the IP address path.

    • In the Network credentials group box, type the domain\user_name (or workgroup\user_name). Type the password for logging on to the network storage location.

    You can also use the specified network share as an off-site destination by selecting it from the Off-site drop-down list in a backup policy.

    If you selected FTP

    On the Backup Destinations panel, type an FTP path that you can use with the Offsite Copy option in a backup policy.

    You can also use the specified FTP path as an off-site destination by selecting it from the Off-site drop-down list in a backup policy.

    If you selected ESX

    On the ESX Server panel, do the following:

    • Type the name of the VMware ESX server or the server's IP address.

    • In the ESX server credentials group box, type a valid administrator user name that has sufficient rights.

    • Type a valid password to the server.

    • In the Upload Locations area, specify the path to the folder where the virtual disk files are written. Use the Add, Remove, and Edit options to configure the upload folder path you want.

    • In the Import Locations area, specify the path to the folder where you want to import virtual disk files.

      The folder that you select must be different than the upload location folder.

      Use the Add, Remove, and Edit options to configure the import folder path you want.

    The virtual disk files are transferred to an ESX server through a Secure Shell (SSH) and secure file transfer protocol (SFTP). You might need to change the settings on the ESX server. For more information, see your ESX server documentation.

    If you selected Linux

    In the Backup Destinations panel, type a Linux-based path name to a destination directory. For absolute path names, make sure a single forward slash character (/) precedes the path.

    You do not need to specify a user name and password for a Linux-based destination

    ESX Server Location options

    ESX Server Name or Address

    Specifies the name of the server or the server's IP address.

    Note:

    The virtual disk files are transferred to an ESX server through a Secure Shell (SSH) and secure file transfer protocol (SFTP). You might need to change the settings on the ESX server. For more information, see your ESX server documentation.

    ESX Server credentials

    Specifies a valid administrator name that has sufficient rights and a valid password to the server.

    Create ESX Server

    Lets you add the defined ESX Server whose name or address and credentials you have specified.

    Upload Location

    Lets you specify the path to the folder where the virtual disk files are written.

    Use the Add, Remove, and Edit options to configure the upload folder path you want.

    Import Location

    Specifies the path to the folder where you want to import virtual disk files.

    Note:

    The folder that you select must be different than the upload location folder.

    Use the Add, Remove, and Edit options to configure the import folder path you want.

  5. Click Apply.