Veritas™ System Recovery 21 Management Solution Administrator's Guide

Last Published:
Product(s): System Recovery (21)
  1. Introducing Veritas System Recovery Management Solution
    1.  
      About Veritas System Recovery 21 Management Solution
    2.  
      Components of Veritas System Recovery 21 Management Solution
    3.  
      How Veritas System Recovery 21 Management Solution works
    4.  
      What you can do with Veritas System Recovery 21 Management Solution
  2. Installing Veritas System Recovery Management Solution
    1.  
      About upgrading to Veritas System Recovery 21 Management Solution
    2.  
      Installing Veritas System Recovery 21 Management Solution
    3.  
      Uninstalling Veritas System Recovery 21 Management Solution
  3. Getting started with Veritas System Recovery Management Solution
    1.  
      About the Veritas System Recovery 21 Management Solution Home page
    2.  
      Starting Veritas System Recovery 21 Management Solution
    3.  
      Sending feedback to Veritas
    4.  
      Preparing to manage the backups of client computers
    5.  
      Discovering client computers on the network
    6.  
      Installing the Symantec Management Agent on client computers
    7.  
      Installing the Veritas System Recovery Plug-in on computers
    8.  
      Uninstalling the Veritas System Recovery Plug-in on computers
    9.  
      Installing Veritas System Recovery 21 and later or Veritas System Recovery 21 and later Linux Edition on client computers
    10.  
      Installing Veritas System Recovery 18 or 16 on client computers
    11.  
      Installing Veritas System Recovery 18 or 16 Linux Edition on client computers
    12.  
      Uninstalling Veritas System Recovery-related products and components from client computers
    13.  
      Generating the LightsOut Restore package in Veritas System Recovery 21 Management Solution
    14.  
      Generating the LightsOut Restore 18 and 16 package
    15.  
      Configuring and installing LightsOut Restore 21, 18, or 16 on client computers
    16.  
      Uninstalling LightsOut Restore from client computers
    17.  
      Updating the settings of a package
    18.  
      Uninstalling Veritas System Recovery-related products from the Symantec Management Platform
    19.  
      Adding or removing recovery point passwords
    20. About managing recovery point destinations
      1.  
        Creating default recovery point destinations
      2.  
        Editing network credentials for a recovery point destination
      3.  
        Deleting recovery point destinations
    21.  
      Configuring a Dedicated Offsite Copy task
    22. About viewing filters
      1.  
        Viewing Veritas System Recovery 21 Management Solution filters
      2.  
        Viewing the filters and policies that are assigned to a client computer
      3.  
        Adding a filtered results path in the Manage Tasks tab to Favorites
    23. About organizational views
      1.  
        Filtering the list of client computers using organizational views
    24. About managing Veritas System Recovery license policies
      1.  
        Adding Veritas System Recovery license policies
      2.  
        Deleting Veritas System Recovery license policies
      3.  
        Assigning Veritas System Recovery licenses to client computers
      4.  
        Unassigning Veritas System Recovery licenses from client computers
      5.  
        Checking the license status of Veritas System Recovery on client computers
  4. Managing backups
    1. About backup policies
      1.  
        Recovery point sets and independent recovery points in backup policies
      2.  
        Tips for creating recovery points
      3.  
        About backing up dual-boot systems
    2. Creating a basic backup policy
      1.  
        About recovery points stored on a network destination
      2.  
        About recovery points stored in a local folder on the client computer
      3.  
        About recovery points stored on an OpenStorage destination
      4.  
        About Offsite Copy
    3. Creating an advanced backup policy
      1.  
        About running command files during a backup
      2.  
        Deploying the command files package to client computers for use during a backup
    4.  
      Creating an independent backup task
    5.  
      Deploying a backup policy
    6.  
      Deploying an existing backup policy as soon as possible
    7.  
      Viewing the status of computers within a backup policy
    8.  
      Editing a backup policy
    9.  
      Editing the schedule of a backup policy
    10.  
      Renaming a backup policy
    11.  
      Disabling a backup policy
    12.  
      Disabling a backup schedule
    13.  
      Deleting a backup policy
    14.  
      Viewing Veritas System Recovery details for a client computer
  5. Managing recovery points
    1.  
      Best practices for creating recovery points
    2.  
      Best practices for managing recovery points
    3. About deleting recovery points
      1.  
        Deleting a recovery point set
      2.  
        Deleting recovery points within a set
  6. Managing the conversion of recovery points to virtual disks
    1.  
      About converting recovery points to virtual disks
    2.  
      Configuring a Convert to Virtual by Computer task
    3.  
      Configuring a Convert to Virtual by Destination task
    4.  
      Configuring a one-time convert to virtual task
    5.  
      Editing a convert to virtual task
    6.  
      Deleting a convert to virtual task
  7. Managing Cloud Storage
    1.  
      Direct to cloud
    2. Providing the OpenStorage destination path
      1.  
        OpenStorage destination options for backups
      2.  
        OpenStorage destination options for recovery
    3.  
      How Offsite Copy works for cloud storage
  8. Remote recovery of drives and computers
    1. About recovering a drive remotely
      1. Using LightsOut Restore to remotely recover client computers
        1.  
          Setting up and using LightsOut Restore
    2.  
      Recovering a drive
    3.  
      Recovering a remote computer
    4.  
      Performing an express recovery
  9. Local recovery of files, folders, drives, and computers
    1. About recovering lost data locally
      1.  
        Recovering files and folders locally by using file and folder backup data
      2.  
        Recovering files and folders locally by using a recovery point
    2.  
      Recovering a computer locally
    3. Starting a computer locally by using Veritas System Recovery Disk
      1.  
        Configuring a computer locally to start from a USB device or DVD
    4.  
      Checking a hard disk for errors
    5.  
      Recovering a computer locally by using a Veritas System Recovery Disk
    6.  
      About using Restore Anyware to recover locally to a computer with different hardware
    7. Recovering files and folders locally by using Veritas System Recovery Disk
      1.  
        Exploring files and folders locally on a computer by using Veritas System Recovery Disk
    8. About using the networking tools in Veritas System Recovery Disk
      1.  
        Starting networking services
      2.  
        Mapping a network drive from within Veritas System Recovery Disk
      3. Configuring network connection settings
        1.  
          Getting a static IP address
    9.  
      Viewing the properties of a recovery point
    10.  
      Viewing the properties of a drive within a recovery point
    11.  
      About the Support Utilities on Veritas System Recovery Disk
  10. Monitoring computers and processes
    1.  
      Viewing reports
    2.  
      Configuring a client option policy for computers
  11. Appendix A. About backing up databases
    1.  
      About backing up VSS-aware databases
    2. About backing up non-VSS-aware databases
      1.  
        Creating the cold, warm, and hot recovery points
    3.  
      Backing up Notification Server and the database
  12. Appendix B. About Active Directory
    1.  
      About the role of Active Directory
  13. Appendix C. Backing up Microsoft virtual environments
    1.  
      About backing up Microsoft virtual hard disks
    2.  
      About backing up and restoring Microsoft Hyper-V virtual machines
  14. Appendix D. About Veritas System Recovery 21 Management Solution and Windows Server 2008 Core
    1.  
      About Veritas System Recovery 21 and Windows Server Core
    2.  
      Installing Veritas System Recovery 21 on Windows Server Core using commands
  15.  
    Index

Performing an express recovery

You can use an Express Recovery task to restore recovery points from a computer to a set of destination computers.

The express recovery task is only available from the Monitor Tasks tab area. You can apply the task to multiple computers at a time. The express recovery task, however, is not available from the Manage Tasks tab. Tasks on that tab can only be applied to one computer at a time.

See Recovering a remote computer.

To configure a remote Express Recovery task

  1. On the Veritas System Recovery 21 Management Solution Monitor Tasks tab, right-click Veritas System Recovery Tasks, and then click New > Task.
  2. In the Client Tasks tree, click Veritas System Recovery Tasks > Express Recovery.
  3. In the right pane of the Create New Task page, type a name for the task.
  4. Set the express recovery settings that you want.

    Ignore recovery point corruption during recovery (potential data loss)

    Automatically excludes the corrupted data and continues to restore the recovery point. The restored data does not contain the corrupted portion of data.

    Note:

    There may be potential data loss as corrupted data is excluded from restore.

    Verify recovery point before recovery

    Determines whether a recovery point is valid or corrupt before it is recovered. If the recovery point is corrupt, the recovery process is discontinued. This option significantly increases the time that is required for the recovery to complete. However, it ensures that the recovery point being restored is valid.

    Do not verify recovery point before recovery

    Does not verify whether a recovery point is valid or corrupt before it is recovered. During recovery, if there is corrupted data on the recovery point, an error message is displayed and you cannot recover the recovery point.

    Check for file system errors

    Lets you check the recovered drive for errors after the recovery point is restored.

    Use the computer's latest recovery point

    Lets you use the computer's most recent recovery point.

    Use the computer's latest recovery point available on or before the specified date

    Lets you use a computer's recovery point based on the date it was created.

    If the recovery point is not available (deleted) at the primary destination, the Offsite Copy destination is checked for the same recovery point. If the recovery point is found, then the express recovery task is performed. Otherwise, the task fails.

    Use the selected recovery point

    Lets you use the recovery point that you have selected.

    Display recovery points from local and network Offsite locations

    Lets you display recovery points from an Offsite Copy destination within a backup policy. Or, you have configured a dedicated Offsite Copy location.

    See About Offsite Copy.

    Select the recovery point that you want to restore. If the recovery point is password-protected, enter the correct password in the field.

  5. Click OK.
  6. Do one of the following:

    To run the task one time as soon as possible after the task is saved

    Click Now.

    To run the task at a specific time or multiple times

    Click Schedule, and then set one of the following schedule options:

    • In the list, select At date/time, and then specify the date and time and how often the schedule repeats.

    • In the drop-down list, select Shared Schedule, and then select a shared schedule to use or create a new one to use.

  7. Do one or more of the following:
    • In the Quick add drop-down list, select a computer to add to the list of computers to which the schedule applies.

    • Click Add to add the computers to which the schedule applies.

      You can select computers individually and by target.

      When you select computers by target, it usually requires less maintenance than by individual computer. If the computers to which you want a schedule to apply are in a target, there is no need to change the schedule. The target membership changes. You get the most flexibility when you add computers individually. You can add any computer, regardless of how your targets are organized. In many situations, you can use a combination of targets and individual computers.

  8. Click Schedule at the bottom of the page.
  9. Double-click the description in the Task Status table to review a detailed summary of the task's progress.