Veritas™ System Recovery 18 Service Pack 3 Management Solution Administrator's Guide

Last Published:
Product(s): System Recovery (18.0.3)
  1. Introducing Veritas System Recovery Management Solution
    1.  
      About Veritas System Recovery 18 Management Solution
    2.  
      Components of Veritas System Recovery 18 Management Solution
    3.  
      How Veritas System Recovery 18 Management Solution works
    4.  
      What you can do with Veritas System Recovery 18 Management Solution
  2. Installing Veritas System Recovery Management Solution
    1.  
      About upgrading to Veritas System Recovery 18 Management Solution
    2.  
      Installing Veritas System Recovery 18 Management Solution
    3.  
      Uninstalling Veritas System Recovery 18 Management Solution
  3. Getting started with Veritas System Recovery Management Solution
    1.  
      About the Veritas System Recovery 18 Management Solution Home page
    2.  
      Starting Veritas System Recovery 18 Management Solution
    3.  
      Sending feedback to Veritas
    4.  
      Preparing to manage the backups of client computers
    5.  
      Discovering client computers on the network
    6.  
      Installing the Symantec Management Agent on client computers
    7.  
      Installing the Veritas System Recovery Plug-in on computers
    8.  
      Uninstalling the Veritas System Recovery Plug-in on computers
    9.  
      Installing Veritas System Recovery 18 or Veritas System Recovery 18 Linux Edition on client computers
    10.  
      Installing Veritas System Recovery 16 on client computers
    11.  
      Installing Veritas System Recovery 16 Linux Edition on client computers
    12.  
      Installing Symantec System Recovery 2013 R2 on client computers
    13.  
      Installing Symantec System Recovery 2013 R2 Linux Edition on client computers
    14.  
      Uninstalling Veritas System Recovery-related products and components from client computers
    15.  
      Generating the LightsOut Restore package in Veritas System Recovery 18 Management Solution
    16.  
      Generating the LightsOut Restore 16 package
    17.  
      Generating the LightsOut Restore 2013 R2 package
    18.  
      Configuring and installing LightsOut Restore 18 on client computers
    19.  
      Configuring and installing LightsOut Restore 16 on client computers
    20.  
      Configuring and installing LightsOut Restore 2013 R2 on client computers
    21.  
      Uninstalling LightsOut Restore from client computers
    22.  
      Updating the settings of a package
    23.  
      Uninstalling Veritas System Recovery-related products from the Symantec Management Platform
    24.  
      Adding or removing recovery point passwords
    25. About managing recovery point destinations
      1.  
        Creating default recovery point destinations
      2.  
        Editing network credentials for a recovery point destination
      3.  
        Deleting recovery point destinations
    26.  
      Configuring a Dedicated Offsite Copy task
    27. About viewing filters
      1.  
        Viewing Veritas System Recovery 18 Management Solution filters
      2.  
        Viewing the filters and policies that are assigned to a client computer
      3.  
        Adding a filtered results path in the Manage Tasks tab to Favorites
    28. About organizational views
      1.  
        Filtering the list of client computers using organizational views
    29. About managing Veritas System Recovery license policies
      1.  
        Adding Veritas System Recovery license policies
      2.  
        Deleting Veritas System Recovery license policies
      3.  
        Assigning Veritas System Recovery licenses to client computers
      4.  
        Unassigning Veritas System Recovery licenses from client computers
      5.  
        Checking the license status of Veritas System Recovery on client computers
  4. Managing backups
    1. About backup policies
      1.  
        Recovery point sets and independent recovery points in backup policies
      2.  
        Tips for creating recovery points
      3.  
        About backing up dual-boot systems
    2. Creating a basic backup policy
      1.  
        About recovery points stored on a network destination
      2.  
        About recovery points stored in a local folder on the client computer
      3.  
        About recovery points stored on an OpenStorage destination
      4.  
        About Offsite Copy
    3. Creating an advanced backup policy
      1.  
        About running command files during a backup
      2.  
        Deploying the command files package to client computers for use during a backup
    4.  
      Creating an independent backup task
    5.  
      Deploying a backup policy
    6.  
      Deploying an existing backup policy as soon as possible
    7.  
      Viewing the status of computers within a backup policy
    8.  
      Editing a backup policy
    9.  
      Editing the schedule of a backup policy
    10.  
      Renaming a backup policy
    11.  
      Disabling a backup policy
    12.  
      Disabling a backup schedule
    13.  
      Deleting a backup policy
    14.  
      Viewing Veritas System Recovery details for a client computer
  5. Managing recovery points
    1.  
      Best practices for creating recovery points
    2.  
      Best practices for managing recovery points
    3. About deleting recovery points
      1.  
        Deleting a recovery point set
      2.  
        Deleting recovery points within a set
  6. Managing the conversion of recovery points to virtual disks
    1.  
      About converting recovery points to virtual disks
    2.  
      Configuring a Convert to Virtual by Computer task
    3.  
      Configuring a Convert to Virtual by Destination task
    4.  
      Configuring a one-time convert to virtual task
    5.  
      Editing a convert to virtual task
    6.  
      Deleting a convert to virtual task
  7. Managing Cloud Storage
    1.  
      Direct to cloud
    2. Providing the OpenStorage destination path
      1.  
        OpenStorage destination options for backups
      2.  
        OpenStorage destination options for recovery
    3.  
      How Offsite Copy works for cloud storage
  8. Remote recovery of drives and computers
    1. About recovering a drive remotely
      1. Using LightsOut Restore to remotely recover client computers
        1.  
          Setting up and using LightsOut Restore
    2.  
      Recovering a drive
    3.  
      Recovering a remote computer
    4.  
      Performing an express recovery
  9. Local recovery of files, folders, drives, and computers
    1. About recovering lost data locally
      1.  
        Recovering files and folders locally by using file and folder backup data
      2.  
        Recovering files and folders locally by using a recovery point
    2.  
      Recovering a computer locally
    3. Starting a computer locally by using Veritas System Recovery Disk
      1.  
        Configuring a computer locally to start from a USB device or DVD
    4.  
      Checking a hard disk for errors
    5.  
      Recovering a computer locally by using a Veritas System Recovery Disk
    6.  
      About using Restore Anyware to recover locally to a computer with different hardware
    7. Recovering files and folders locally by using Veritas System Recovery Disk
      1.  
        Exploring files and folders locally on a computer by using Veritas System Recovery Disk
    8. About using the networking tools in Veritas System Recovery Disk
      1.  
        Starting networking services
      2.  
        Mapping a network drive from within Veritas System Recovery Disk
      3. Configuring network connection settings
        1.  
          Getting a static IP address
    9.  
      Viewing the properties of a recovery point
    10.  
      Viewing the properties of a drive within a recovery point
    11.  
      About the Support Utilities on Veritas System Recovery Disk
  10. Monitoring computers and processes
    1.  
      Viewing reports
    2.  
      Configuring a client option policy for computers
  11. Appendix A. About backing up databases
    1.  
      About backing up VSS-aware databases
    2. About backing up non-VSS-aware databases
      1.  
        Creating the cold, warm, and hot recovery points
    3.  
      Backing up Notification Server and the database
  12. Appendix B. About Active Directory
    1.  
      About the role of Active Directory
  13. Appendix C. Backing up Microsoft virtual environments
    1.  
      About backing up Microsoft virtual hard disks
    2.  
      About backing up and restoring Microsoft Hyper-V virtual machines
  14. Appendix D. About Veritas System Recovery 18 Management Solution and Windows Server 2008 Core
    1.  
      About Veritas System Recovery 18 and Windows Server Core
    2.  
      Installing Veritas System Recovery 18 on Windows Server Core using commands

Editing a backup policy

You can edit any of the properties and options of a backup policy, except the selected drives that are backed up and the backup type. The resulting backup policy is updated on any computers that are in its assigned resource target.

See Creating a basic backup policy.

See Creating an advanced backup policy.

See Viewing the status of computers within a backup policy.

See Editing the schedule of a backup policy.

To edit a backup policy

  1. On the Veritas System Recovery 18 Management Solution Manage Tasks tab, in the left pane, click Backup Policies.
  2. In the middle panel, select a backup policy name.
  3. On the table's toolbar, click Edit.
  4. In the displayed pane, use the available options and backup properties to make any changes that you want to the policy.

    Backup Policy Schedule tab options for a recovery point set

    Schedule

    Lets you select the days and a start time for when the backup should run.

    Start time (24 hour format)

    Lets you customize the start time of the backup .

    Sun Mon Tue Wed Thu Fri Sat

    Lets you customize the days of the week for the backup to run. The default is to run the backup Monday through Friday.

    Run more than once per day

    Lets you run the backup more than once a day to protect the data that you edit or change frequently.

    Time between backups

    Lets you specify the maximum time that should occur between backups.

    Number of times

    Lets you specify the number of times per day that the backup should run.

    Automatically optimize

    Lets you select how often optimization should occur for the backup destination to manage the used disk space.

    You can choose from the following options:

    • Never

      Indicates that no deletion of incremental recovery points is performed.

    • Every four hours

      Indicates that a deletion of incremental recovery points that are four hours old (or older) is performed every four hours. Also, after the first incremental of the day is taken, all incremental files from two days previous are consolidated to a single file.

    • Every twelve hours

      Indicates that a deletion of incremental recovery points that are 12 hours old (or older) is performed every 12 hours. Also, after the first incremental of the day is taken, all incremental files from two days previous are consolidated to a single file.

    Distribute strategy randomly across (minutes)

    Indicates that the policy is distributed randomly across a specified number of minutes (0-1440) to all the computers that are assigned to the policy. This option applies if you save recovery points to a network destination.

    For example, suppose you want to distribute a backup policy in 60 minutes to 120 computers. Each of the 120 computers would randomly choose a time within the 60 minutes, before or after the scheduled start time, to start the backup.

    This option helps to run not the policy at the same start time for all computers, which can cause a denial of service condition on the network, the recovery point destination, or both.

    Start a new recovery point set

    Lets you select how frequently a new recovery point set should be started.

    Your options for starting new recovery point set (base) include the following:

    • Weekly

      Creates a new recovery point set on the first scheduled or manual backup of the week.

    • Monthly

      Creates a new recovery point set on the first scheduled or manual backup of the month.

    • Quarterly

      Creates a new recovery point set on the first scheduled or manual backup every three months from the date when you selected this option.

    • Yearly

      Creates a new recovery point set on the first scheduled or manual backup of the year, once a year, on the date that you selected for this option.

    • Custom

      Lets you set specific weekly or monthly options for starting a new recovery point set.

    Custom

    Lets you customize the start time, and the days of the week or month to run the backup.

    Note:

    If you choose to archive recovery points, consider creating recovery point sets more frequently to keep the size of your recovery point sets smaller.

    Backup Policy Triggers tab options for a recovery point set

    Any application is installed

    Indicates that an incremental recovery point is created at the time users begin to install a software application on their computer.

    Specified applications are launched

    Indicates that an incremental recovery point is created at the time users run a specified software application on their computer.

    Any user logs on to the computer

    Indicates that an incremental recovery point is created when users log on to Windows on their computer.

    Any user logs off from the computer

    Indicates that an incremental recovery point is created at the moment users log off from Windows on their computer (but does not turn off Windows).

    Data added to the drive exceeds

    Indicates that an incremental recovery point is created when the added data on a drive exceeds an amount (in megabytes) that you specify.

    Backup Policy Schedule options for an independent recovery point

    Automatically create a recovery point

    Lets you specify a weekly or monthly backup schedule.

    The scheduling options include the following:

    • Weekly

      Creates a new, independent recovery point on each day of the week that you check, and at the specified time. When you create independent recovery points one or more times per week, large amounts of disk storage space may be required.

    • Monthly

      Creates a new, independent recovery point on each day of the month that you check, and at the specified time.

    • No Schedule

      Saves all of the backup policy settings except a schedule. You can later deploy the backup policy at your convenience by assigning a schedule to the policy.

    You can also create a single independent recovery point once, with no schedule.

    See Creating an independent backup task.

    Start time (24 hour format)

    Lets you customize the start time of the backup .

    Days of the week

    Lets you customize the days of the week for the backup policy to run.

    Days of the month

    Lets you customize the days of the month for the backup policy to run.

    Distribute strategy randomly across (minutes)

    Indicates that the policy is distributed randomly across a specified number of minutes (0-1440) to all the computers that are assigned to the policy. This option applies if you save recovery points to a network destination.

    For example, suppose you want to distribute a backup policy in 60 minutes to 120 computers. Each of the 120 computers would randomly choose a time within the 60 minutes, before or after the scheduled start time, to start the backup.

    This option helps to not run the policy at the same start time for all computers, which can cause a denial of service condition on the network, the recovery point destination, or both.

    Backup Destination options

    Enter a folder relative to the managed computers

    Indicates the location where you want to store the recovery points, relative to the managed computers.

    Browse

    Lets you browse only a local destination that you want to use, relative to the managed computers. You must have create, read, and write privileges at the specified location.

    Note:

    You cannot browse and select an OpenStorage destination, FTP destination, or network destination.

    If there is insufficient space at the destination where the recovery point is stored, the policy fails and an error is reported on the Veritas System Recovery 18 Management Solution Home tab.

    User name

    Lets you specify the user name to a destination folder that is located in a network path or OpenStorage destination.

    See Providing the OpenStorage destination path.

    See OpenStorage destination options for backups.

    Password

    Lets you specify the password to a destination that is located in a network path or OpenStorage destination.

    See Providing the OpenStorage destination path.

    See OpenStorage destination options for backups.

    Confirm password

    Lets you retype the password for confirmation.

    Advanced recovery point options

    Active backup policy

    Activates the backup policy on the managed client computer. If you deselect this option, the backup policy is still sent to the managed client computer but it is not activated.

    Limit the number of recovery point sets (bases) saved for this backup (Recovery point sets only)

    or

    Limit the number of recovery points saved for this backup (Independent recovery points only)

    Specifies the maximum number of recovery points or recovery point sets that are saved for each drive.

    When this limit is reached, each successive recovery point or set is first created and stored. The oldest, previously created recovery point or set is then deleted (including all associated incrementals, if applicable) from the same storage location.

    Ensure that you have enough hard disk space to accommodate the number of recovery points or sets you specify, plus one additional recovery point or set.

    If you run out of hard disk space before the number is reached, the recurring recovery point process cannot complete successfully, and a current recovery point or set is not created

    Verify recovery point after creation

    Checks whether a recovery point or recovery point set is valid or corrupt immediately following its creation.

    For steps on how to verify the integrity of a recovery point long after it has been created, refer to the Veritas System Recovery product documentation.

    When you verify a recovery point, it can approximately double the time that is required to create the recovery point.

    Disable SmartSector copying

    Speeds up the copying process by copying only hard disk sectors with data. However, in some cases, it may be desirable to copy all sectors in their original layout, whether or not they contain data.

    If you want to copy both used and unused hard disk sectors, select Disable SmartSector Copying.

    When you select this option, it increases the process time, and usually results in a larger recovery point file size.

    Ignore bad sectors during copy

    Creates a recovery point even if bad sectors are on the hard drive. Although most drives do not have bad sectors, the potential for problems increases during the lifetime of the hard drive.

    Perform full VSS backup

    Lets you perform a full backup on the VSS storage and send a request for VSS to review its own transaction log. This option is used for VSS applications, such as Microsoft SQL.

    VSS determines what transactions are already committed to the database and then truncates those transactions. Among other things, truncated transaction logs help keep the file size manageable and limits the amount of hard drive space that the file uses.

    If you do not select this option, backups still occur on the VSS storage. However, VSS does not automatically truncate the transaction logs following a backup.

    Note:

    This option does not apply to Veritas System Recovery Linux Edition.

    Divide into smaller files to simplify archiving

    Splits a recovery point into two or more smaller files. This feature is useful if you create or export a recovery point that you want to copy to removable media later for safekeeping. The recovery point is split into smaller, more manageable files. You can then copy the files onto separate, removable media, such as a DVD or CD.

    If Veritas System Recovery creates an .sv2i file in addition to the .v2i files, you need to save the .sv2i file on the same media as the first .v2i file.

    If you create a recovery point of volumes with thousands of files on a computer that has low memory, splitting the recovery point into smaller segments can help speed the process.

    If a recovery point is divided into multiple files, the file names for subsequent files are appended with _S01, _S02, and so forth. For example, if the default file name were Dev-RBrough_C_Drive.v2i, the second file name would be Dev-RBrough_C_Drive_S01.v2i, and so on.

    Include system and temporary files

    Includes the indexing support for the operating system and temporary files when a recovery point is created on the client computer.

    Note:

    This option does not apply to Veritas System Recovery Linux Edition.

    Command File Settings options

    Use command file package to deliver command files to the local machine

    Indicates if you intend to deploy the Veritas System Recovery command file package that is stored on the Notification Server computer.

    See Deploying the command files package to client computers for use during a backup.

    When you deselect this option, you can specify a folder on a network share where the command files are stored for deployment.

    Command files folder

    Lets you specify the location of command files if you want them to be located in a place other than the default location. You can also specify a location on a per-job basis, as well as specify a location that can be shared among several computers. If you specify a network location, you are prompted for network credentials.

    User name

    Lets you specify the user name to a command file folder that is located in a network path.

    Password

    Lets you specify the password to a command file folder that is located in a network path.

    Confirm password

    Lets you retype the password to a command file folder that is located in a network path.

    Run before snapshot creation

    Lets you run a command file after a backup has started and before a recovery point is created. You can run a command during this stage to prepare for the recovery point creation process. For example, you can close any open applications that use the drive.

    Note:

    If you use this option, be sure that the command file has an error recovery mechanism built into it. If the computer has one or more services that must be stopped at this stage (such as stopping a non-VSS aware database or a resource-intensive application), and the command file does not contain any form of error recovery, one or more of the stopped services may not be restarted. An error in the command file can cause the recovery point creation process to stop immediately. No other command files can run.

    Run after snapshot creation

    Lets you run a command file after a snapshot is created. Running a command during this stage is a safe point for allowing services to resume normal activity on the drive while continuing the recovery point creation.

    Because the snapshot takes only a few seconds to create, the database is in the backup state momentarily. A minimal number of log files are created.

    Run after recovery point creation

    Lets you run a command file after the recovery point file is created. You can run a command during this stage to act on the recovery point itself. For example, you can copy it to an offline location.

    Timeout (applies to each stage)

    Lets you specify the amount of time (in seconds) that a command file is allowed to run.

  5. Click Save changes.