The role of Active Directory
When protecting a domain controller with Symantec Backup Exec System Recovery, be aware of the following:
■ If your domain controller is Windows Server 2003, it supports VSS. Backup Exec System Recovery will automatically call VSS to prepare the Active Directory database for backup. In cases where the domain controller is running on a Windows 2000 server without VSS support, the Active Directory database must be backed up using NTbackup prior to using Backup Exec System Recovery to protect the full system. This process can be automated using an external command that is called by Backup Exec System Recovery. When configuring a job, you have the option to enter external commands. This provides a simple process for protecting domain controllers that do not support VSS.
■ Every domain controller must negotiate a trust token with other domain controllers to participate on the domain. This token is refreshed every 30 days by default. This time frame can be changed, and is referred to as a secure channel trust. If a recovery point is offline at the time that a new trust token is established, that recovery point will not be restored, and consequently, will not participate on the domain. In the latest version of Symantec Backup Exec System Recovery, this trust token can be reestablished without having to rejoin the domain.
■ In most cases, domain controllers should be restored non-authoritatively. This will prevent outdated objects in the Active Directory from being restored.
Outdated objects are referred to as tombstones. Active Directory will not restore data older than the limits it sets. Restoring a valid image of a domain controller
B
Appendix
is the equivalent of a non-authoritative restore. To determine which type of restore you want to perform, please refer to the Microsoft documentation. A non-authoritative restore will prevent tombstone conflicts.
For additional details about protecting non-VSS aware domain controllers, see the white paper titled "Protecting Active Directory," located on the Web.
http://sea.symantec.com/protectingdc
You can also refer to the Symantec Knowledge Base http://www.symantec.com/techsupp/lsidc
About Active Directory The role of Active Directory 166
Active Directory The directory service that stores information about objects on a network and makes this information available to users and network administrators. Active Directory gives network users access to permitted resources anywhere on the network using a single logon process. It provides network administrators with an intuitive, hierarchical view of the network and a single point of administration for all network objects.
backup image See recovery point.
bare metal recovery The complete recovery of a computer after a catastrophic hard disk failure. It includes the restoration of the operating system, file system, partitions, volumes, and data, from a complete recovery point.
basic disk A hard disk that can be accessed by DOS and Windows. Basic disks can have up to four primary partitions, or three primary partitions and one extended partition.
Within an extended partition you can create unlimited additional subdivisions called logical partitions.
cluster The smallest allocation unit in the FAT, FAT32, and NTFS file systems. One cluster consists of a fixed number of disk sectors.
delayed apply Restoring an operating system partition by starting the restore in the console (using the Restore Drive Wizard), and then finishing the restoration after booting into the recovery environment. An alternate method is to boot into the recovery environment and use the System Restore Wizard to perform the restoration.
drive lock A request by the software for exclusive use of a selected drive before making any modifications to the file system of the hard drive. By locking down a drive, you prevent other software programs from changing the file system while the product is trying to change it. This ensures that any data on the drive is current and accurate at the time of restoration.
dynamic disks A hard disk that contains volumes (or drives) that span multiple hard disks.
Dynamic disks, which are managed by Windows Disk Management tool, do not contain partitions or logical drives and cannot be accessed by DOS.
extended partition A special kind of primary partition that was developed to overcome the four-partition limit. The extended four-partition is a container inside of which you can create logical partitions. The extended partition itself does not hold any data, nor is it assigned a drive letter. But logical partitions inside the extended partition can hold applications and data and are assigned drive letters.
Glossary
hot backup A recovery point taken in real-time without interrupting system operation on the computer.
hot restore The restoration of a recovery point while the computer remains up and running.
You can perform hot restores of data or applications with Symantec Backup Exec System Recovery. Performing a hot restore of an operating system partition is not available. (See delayed apply.)
incremental recovery point
Recovery point set consisting of a base recovery point (.v2i) and incremental recovery points (.iv2i). Incremental recovery points contain a snapshot of the sectors that have changed on a drive since the base recovery point or the last incremental was taken. Incremental recovery points are faster to create and require less drive space than full recovery points, so they are useful if you want to back up your drive more often without using a lot of time or drive space.
Incremental recovery points can also be consolidated. When you restore a drive (or files and folders) to a point in time, the base recovery point and the
incrementals up to that point in time are used for the restore. For example, if you took a base recovery point on Friday night and an incremental recovery point on Wednesday morning, later you could restore files, folders, or an entire drive from the base and incrementals. To restore the recovery point, the base recovery point and all the incrementals in the recovery point set must be in the same directory and should not be deleted.
index file An index file that is saved as part of a recovery point set to ensure that the base recovery point and the incrementals are correctly associated with one another.
The .sv2i file must be in the same directory as the .v2i and .iv2i files to ensure that recovery points can be restored.
iv2i See incremental recovery points.
logical partition a) A contiguous area inside an extended partition that can be used by the operating system to store and retrieve files. The operating system typically assigns a letter (for example, D:, E:) to the logical drive.
b) Any partition, CD, or other storage device that contains a file system and is assigned a drive letter.
mount a volume The ability to see and use a volume within a recovery point that is physically located somewhere else on the network. The volume has a drive letter assigned to it, so it looks like it is a part of the local computer system. Though a mounted volume is read-only, you can open files and folders, scan for viruses, and even run some executables from within a mounted volume.
primary partition A partition referenced in the master boot record (MBR) partition table. Only four primary partitions can exist on a hard disk. One of these may be an extended partition. Only one primary partition on a drive may be active at a time. When one primary partition is active, the other primary partitions are typically not Glossary
168
accessible. Data and programs are often placed on a logical partition inside an extended partition. This enables the data to be accessed by all primary partitions.
protect drive Protecting a drive means the drive is placed under the full-time protection of the agent. When you protect a drive, you are specifying a schedule for creating consistent recovery points, the recovery point storage location, and any backup storage options you want.
recovery environment See Symantec Recovery Disk.
recovery point An exact copy of a drive (either containing data or the operating system) that is usually compressed and stored as a file. Both full recovery points (used stand-alone) and baseline recovery points (used with incremental backups) have a .v2i (Virtual Volume Image) file extension. The recovery point includes all the data (operating system, applications, data, and settings) needed to restore the drive to the state it was in when the backup was performed. Recovery points are what you use to restore files and folders or an entire drive. In legacy editions, a recovery point was also known as an image, backup, or backup set. You can view the contents of a recovery point using the Recovery Point Browser.
recovery point set If you use a base recovery point and incrementals to back up a drive, the
combination of the base recovery point and incrementals is called a recovery point set. When you restore to a given point in time, the base recovery point and all the incrementals taken up to that point in time are used for the restore. It is important that all the files in a recovery point set (the base recovery point and all the incrementals) are in the same directory. If any piece is missing, the backup is invalid and you will not be able to restore the data.
remote computer A computer that is physically located somewhere else on a network but is accessible from a local computer.
service A program, routine, or process that performs a specific system function to support other programs, particularly at a low (close to the hardware) level. The Symantec Backup Exec System Recovery agent is an example of a service.
sv2i See index file.
Symantec Recovery Disk A graphical, secondary boot environment (or operating system) that gives you the minimal functionality needed to access recovery points on your network and restore them. This environment is typically used when a drive cannot be restored from within Windows or when the computer has suffered a catastrophic failure and you need to restore the entire hard drive.
The Symantec Backup Exec System Recovery CD is used both to install the software and to boot a computer into the recovery environment, known as Symantec Recovery Disk. Be sure you store the CD in a safe place.
169 Glossary
UNC (Universal Naming Convention)
A method used to identify folders, files, and programs on a network computer. A UNC path begins with two backslashes \\ and is followed by the computer name, the share name, and usually the directory and/or the filename.
For example, \\computer_name\share_name\recovery_point_name.v2i
.v2i See recovery point.
Glossary 170
Numerics
.iv2i files 168
.NET Framework, installing 28 .sV2i files 169
.v2i files 170
A
access, allow or deny users or groups 127 activating the product 29
Active Directory definition 167
advanced options for recovery points 44 Advanced View
unavailable drives 76 agent
checking the status of 138 dependencies, viewing 124, 126 Microsoft Services 122 set security for 127
starting, stopping, or restarting 124 troubleshooting in Services 122
anonymous authentication for email notification 74 archiving recovery points 70. See archiving recovery
points
B
backing up dual-boot systems 36 backups
database, VSS-aware 36 dual-boot systems 36 bare metal restore 85, 88 base only recovery points
creating 55 basic volumes
157
benefits of using Symantec Backup Exec System Recovery 13
best practices 34
best practices, services 123
BIOS, modifying to make CD or DVD drive bootable 147
boot Symantec Recovery Disk 84 boot.ini, editing
152 booting to a CD
147
browse not working from Symantec Recovery Disk 88
C
cancelling the current operation 69 CD
booting from 147
see also removable media 44 changing recovery point schedules 69 checking computer agent services 121 checking the status of the agent 138 clean recovery point history 77
closing recovery points in Recovery Point Browser 104
cluster server, restoring to a 154
command files, running during recovery point 59 compression level 43
computer agent
services, checking 121 tour 121
computer protection best practices 34 computer restore options 81
computers
adding to the console 119 configuring agent security 127 connection, thin host
149 console
adding computers to 119
running with different user rights 129 troubleshooting 140
consolidate incremental recovery points 57 consolidate incrementals 66
copying a drive 113
Index
creating a drive letter for a recovery point 106 creating recovery points
manually 47 options 49, 65, 71 specifying default path 77 tips 35
to tape 140
credentials, changing for agent 129
D
databases
backing up non-VSS-aware 60 backing up VSS-aware 36 default path for recovery points 77
delayed apply, using when no DHCP exists 155 deleting
recovery point history 77 recovery point schedules 69 recovery points 72
dependencies, viewing agent 124, 126 Deploy Agent
errors 130
troubleshooting 130 using 117
devices, what is supported 21 DHCP
server down during restore 151 server, restoring to 155 using delayed apply 155 disabling
recovery point schedules 69 disk media, what is supported 21 disks, rescanning 72
dismounting recovery point drives 108 displaying
recovery point properties 110 volume properties 111
dividing a recovery point into smaller files 45, 72 drive
copying 113 restoring 88
drive letter, assigning to a recovery point 106 drive, restoring with Symantec Recovery Disk 88 Driver Validation 25
drives
dismounting 108 mounting 106
RAM, no support for 21 restoring multiple 85
Drives tab
unavailable drives 76 dual-boot systems, backing up 36 DVD
see removable media 44 DVD drive, booting from
147
encrypting recovery points 46 error messages
157
Deploy Agent 130 general 158
Recovery Point Browser 157
evaluation version, installing or upgrading 22 Events tab, log file history 73, 123
Events tab, reviewing 35 expiration of trial version 22
F
file systems, what is support 21 filenames
base and incremental recovery points 64 spanned recovery points 42, 44
files
modifying from within recovery points 105 restoring 101
restoring individual 108
viewing from within a recovery point 112 FireWire drive
advantages and disadvantages for storing recovery points 38
folders, restoring 108
G
general error messages 158 glossary definition 168
H
hard disks, rescanning 72 Index
172
hard drive, local
advantages and disadvantages for storing recovery points 38
history, recovery point 76
I
Image Browser
see Recovery Point Browser 102 images
see recovery points 72
images, creating, see creating recovery points 47 imaging computers 47
saving to removable media 42 installing
.NET Framework 28 product, options 21
Symantec Backup Exec System Recovery, troubleshooting 135
integrity of recovery point, checking 49, 65, 103 IP address, configuring
licensing, Symantec Backup Exec System Recovery 22 LightsOut Restore 96
limiting the number of recovery points for a drive 66 LiveUpdate, using 30
mail notification, setting 73
mapping network drives from Symantec Recovery Disk
151
media, what is supported 21
methods for restoring files and folders 101 methods for restoring recovery points 79 Microsoft .NET Framework
installing 28
modifying files in recovery points 105 modifying recovery point schedules 69 modifying recovery points (archiving) 70 mounting recovery point drives 106
multiple recovery points, restoring with Symantec Recovery Disk 85
N
network
cannot browse to locate recovery point 88, 149 connectivity during restore 151
network credentials, about 51 network drive
advantages and disadvantages for storing recovery points 39
network drives, accessing from Symantec Recovery Disk
148
non-VSS-aware databases, backing up 60 NTLM in email notifications, turning on or off 74
O
opening recovery points in Recovery Point Browser 104
opening the Recovery Point Browser 102 operating systems, backing up computers with
multiple 36
operation speed, setting 77 options
creating backups 65
creating recovery points 49, 71
173 Index
options (continued)
restoring recovery points 84
P
PARTINFO 145, 159, 162 passwords
adding to recovery points 45
path, specifying default for recovery points 77 pcAnywhere Thin Host
149
performance, adjusting during recovery points 77 ping remote computer 143
process control, adjusting 77 properties
recovery point 110 volume 111 push install of agent 117 pushlog.txt file
troubleshooting errors 130
Q
quality of recovery point, checking 49, 65, 103
R
RAM drives 21
recovering files from within a recovery point 104 recovery environment
booting into 84 troubleshooting 141 Recovery Point Browser
dismounting recovery point drives with 108 error messages 157
modifying files within recovery points 105 mounting recovery point drives with 106 opening 102
overview 102
restoring from recovery points that span media 105
splitting recovery points 72
viewing files within recovery point 112 viewing volume properties of a recovery
point 111 recovery point drives
dismounting 108 mounting 106 recovery point history 76
recovery point history, deleting 77
recovery point jobs deleting 69 disabling 69 editing 69
running immediately 68 recovery point properties 110 recovery point schedules
checking integrity of 49, 65, 103 closing in Recovery Point Browser 104 compressing 43
consolidate 57 creating 47
database, non-VSS-aware 60 deleting 72, 77
determining the kind of restore to perform 79, 101
limiting the number of recovery points for a drive 66
modifying 70
opening in Recovery Point Browser 104 passwords 45
restoring 83
restoring files and folders, methods 101 restoring files from within 104
restoring from spanned media 105
restoring individual files or folders from 108 restoring methods 79
restoring multiple 85
restoring, troubleshooting 139 running command files 59 scheduling 51
scheduling, troubleshooting 137 splitting for removable media 72 storage locations 80
troubleshooting 135–136 Recovery Wizard 85
red X for unavailable drives 76 Index
174
remote control session 149
removable media
advantages and disadvantages for storing recovery points 38
creating recovery points for copying to removable media later 44
recovery points split across 42 saving incrementals to 42 saving recovery points to 42
splitting a recovery point for archiving 70 what is supported 21
removing recovery point history 77 removing recovery point schedules 69 reports, log file 73, 123
requirements, system 19
Restore Drive Wizard 83 restore options 81 restoring backups
Symantec Recovery Disk explained 142 to DHCP server 155
restoring files and folders 104, 108 restoring recovery points 83
options 84
Symantec Recovery Disk 85 troubleshooting 139
under workgroup environment 155
restoring recovery points from spanned media 105 Run as, changing logon using 129
S
schedules deleting 69 disabling 69 modifying 69
scheduling recovery points 51
scripts, running during recovery point 59 sectors, ignore bad 44
security, agent 127
security, allow or deny permissions 127 security, granting access to users to back up 127 security, setting in recovery points 46
server cluster, restoring to a 154
service
definition 169
starting, stopping or restarting agent 124 services
best practices for using 123 opening on local computer 124 using with agent 122
setting 73
SmartSector copying, disabling 46 SmartSector, disable copying of 44 SMTP server, connecting anonymously 74 spanned backups 42
spanned recovery points 44
spanning recovery points across media 42 speed, setting in product 77
splitting a recovery point to save on removable media (archiving) 70
splitting recovery points 72 starting
computer Agent services 121 Recovery Point Browser 102 starting agent 124
static IP addresses, using 151
stopping agent 124
stopping computer agent services 121 stopping tasks 69
storage locations for recovery points 80 support utilities
thin host 149
supported file systems and removable media 21 sV2i files 92
Symantec Recovery Disk 169
booting from the Symantec Backup Exec System Recovery CD 147
cannot browse or see network 88, 149 how does it work? 142
mapping network drives from 151 restoring recovery points 85 restoring workgroups 154 troubleshooting 141
USB devices, connecting under 149 using pcAnywhere Thin Host 149 utilities 143
Symantec Recovery Disk, booting into 84 sysinfo.exe 135
system information 135
175 Index
system requirements 19
System Restore Wizard 86, 88, 90, 92
T
tabs
Drives 48 Events 35
Events and log file 73, 123 History 58, 76
tape, backing up directly to 140 tasks, cancelling 69
technical support
PartitionInfo utility 145, 159, 162 utilities to run under Symantec Recovery
Disk 143 thin host, pcAnywhere
149 throttling 77
time, elapsed time in Events tab 73, 123 tips and pointers 34
tips for creating recovery points 35 trial version, installing or upgrading 22 troubleshooting 135
agent 122
agent, checking status 138
cannot retrieve drive information 158 console 140
Deploy Agent 130 error messages 157
I am having problems restoring files from a recovery point that spans media 105 I cannot access the network drive where my
recovery points are saved 148
I do not know the information about my system that I am required to enter 135
PartitionInfo utility 145, 159, 162 product expired 29
Recovery Point Browser 157
restoring recovery points from Windows 139 storage device drivers needed for Symantec
Recovery Disk 147 Symantec Recovery Disk 141
what kind of restore should I perform? 79, 101 turn off recovery point schedules 69
U
unavailable drives 76
updating
automatically with LiveUpdate 30 upgrading
trial version of Symantec Backup Exec System Recovery 22
USB
advantages and disadvantages for storing recovery points 38
USB, connecting during recovery 149
users, rights to run the console 127 utilities
edit boot.ini 152
recovery environment 143
V
verify recovery point after creation 49, 65 verifying images 65
verifying recovery points 49, 103 viewing files within a recovery point 112 volume properties 111
volumes
see drives 84 volumes, getting help for
157
VSS, backing up databases 36
W
Windows Explorer, dismounting recovery point drives in 108
Windows Explorer, mounting recovery point drives in 106
Windows volumes, getting help for 157
wizards
Restore Drive 83
Symantec Recovery Disk 85 workgroup environment, restoring from
155
workgroups, restoring 154
X
X for unavailable drives 76 Index
176