Symantec Backup Exec
Continuous Protection Server
2010
The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
Documentation version: 2010
Legal Notice
Copyright © 2009 Symantec Corporation. All rights reserved.
Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation 350 Ellis Street
Mountain View, CA 94043 http://www.symantec.com
Printed in the United States of America. 10 9 8 7 6 5 4 3 2 1
Technical Support
Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right amount of service for any size organization
■ Telephone and Web-based support that provides rapid response and up-to-the-minute information
■ Upgrade assurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week
■ Advanced features, including Account Management Services
For information about Symantec’s Maintenance Programs, you can visit our Web site at the following URL:
www.symantec.com/techsupp/
Contacting Technical Support
Customers with a current maintenance agreement may access Technical Support information at the following URL:
www.symantec.com/techsupp/
Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem.
When you contact Technical Support, please have the following information available:
■ Product release level
■ Hardware information
■ Available memory, disk space, and NIC information
■ Version and patch level
■ Network topology
■ Router, gateway, and IP address information
■ Problem description:
■ Error messages and log files
■ Troubleshooting that was performed before contacting Symantec
■ Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical support Web page at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and maintenance contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement, please contact the maintenance agreement administration team for your region as follows:
customercare_apac@symantec.com Asia-Pacific and Japan
semea@symantec.com Europe, Middle-East, and Africa
supportsolutions@symantec.com North America and Latin America
Additional enterprise services
Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively. Enterprise services that are available include the following:
These solutions provide early warning of cyber attacks, comprehensive threat analysis, and countermeasures to prevent attacks before they occur. Symantec Early Warning Solutions
These services remove the burden of managing and monitoring security devices and events, ensuring rapid response to real threats.
Managed Security Services
Symantec Consulting Services provide on-site technical expertise from Symantec and its trusted partners. Symantec Consulting Services offer a variety of prepackaged and customizable options that include assessment, design, implementation, monitoring, and management capabilities. Each is focused on establishing and maintaining the integrity and availability of your IT resources. Consulting Services
Educational Services provide a full array of technical training, security education, security certification, and awareness communication programs. Educational Services
To access more information about Enterprise services, please visit our Web site at the following URL:
www.symantec.com
Technical Support
... 4Chapter 1
Introducing Symantec Continuous Protection
Server
... 13About Symantec Backup Exec Continuous Protection Server ... 13
Components of Continuous Protection Server ... 14
How Continuous Protection Server works ... 16
What you can do with Continuous Protection Server ... 19
About backup strategies and planning ... 20
Data protection considerations ... 21
About backup job schedules ... 21
Where to find more information ... 23
Accessing the Continuous Protection Server documentation ... 23
Accessing the online Help ... 24
Accessing the Symantec Technical Support Web site ... 24
Accessing the Symantec Backup Exec Web site ... 24
Chapter 2
Installing Continuous Protection Server
... 25Before you install ... 25
Guidelines for installation ... 26
Checking your environment before installation ... 27
Continuous Protection Server and Backup Exec compatibility ... 28
File system filter driver compatibility ... 29
Understanding the Continuous Protection Server service account ... 29
System requirements for the product ... 30
System requirements for Business Servers ... 30
System requirements for Continuous Management Service and Protection Servers ... 31
System requirements for Administration Console ... 32
Firewall support ... 33
What gets installed and where ... 35
Folders that are installed ... 35
Contents
Drivers that are installed ... 36
Continuous Protection Server services that are installed ... 36
Registry entries ... 36
Performing an initial installation ... 37
Viewing installation logs ... 42
Push-installing Continuous Protection Server components ... 43
Upgrading to Continuous Protection Server 2010 ... 46
Modifying Continuous Protection Server installations ... 47
Uninstalling the Continuous Protection Server ... 47
Uninstalling a Continuous Protection Agent ... 48
Chapter 3
Using the Administration Console
... 51About the Continuous Protection Server Administration Console ... 51
Starting the Continuous Protection Server Administration Console ... 52
About the general Administration Console features ... 52
About the Administration Console views ... 53
Overview view ... 53
Setup view ... 54
Restore view ... 57
Job Monitor view ... 57
Alerts view ... 57
Chapter 4
Configuring Continuous Protection Server
... 59Configuring Business Servers ... 59
Reviewing the general properties of a Business Server ... 60
Reviewing the volume properties of a Business Server ... 61
Moving of servers between Backup Groups ... 62
Managing the Continuous Protection Server Services ... 63
Stopping or starting Continuous Protection Server services ... 63
Adding or removing servers from the Service Manager ... 64
Changing service account credentials ... 64
Managing backup destinations ... 65
Adding a backup destination ... 65
Configuring a backup destination for Shadow Storage ... 66
Renaming backup destinations ... 67
Deleting backup destinations ... 67
Managing snapshots ... 68
Creating snapshots on demand ... 69
Creating a snapshot schedule ... 70
Editing a snapshot schedule ... 71
Contents 8
Defining a retention policy for a snapshot ... 71
Viewing snapshot history ... 72
States of snapshot indexing ... 73
Deleting snapshots ... 73
Configuring registry entries ... 74
Accessing the Settings Utility ... 74
About the Settings Utility tunable parameters ... 75
Changing Settings Utility parameters ... 85
Chapter 5
Backing up data
... 87About CPS backup jobs ... 87
About backing up System State and Shadow Copy Components ... 88
How encrypted files are handled ... 88
Creating CPS backup jobs ... 88
Editing backup job configurations ... 91
Moving a backup job to a different backup destination ... 91
Including and excluding information from backup jobs ... 91
Changing a backup job schedule ... 94
Limiting the network bandwidth of a backup job ... 96
Adding a script that runs before or after backup jobs ... 96
Starting, stopping, and canceling backup jobs manually ... 97
Chapter 6
Restoring data
... 99About restoring data with Continuous Protection Server ... 99
Restoring files and folders ... 100
Restoring system information ... 101
Restoring System State to an Active Directory system ... 102
Restoring network shares ... 103
Chapter 7
Using Backup Exec Retrieve
... 105About Backup Exec Retrieve ... 105
How Backup Exec Retrieve works ... 106
What end users can do with Backup Exec Retrieve ... 108
Before you install Backup Exec Retrieve ... 110
Requirements for installing Backup Exec Retrieve on a Web server ... 110
Requirements for using Backup Exec Retrieve on end users' computers ... 112
About deploying the Silverlight run time in your organization ... 113
9 Contents
Installing Backup Exec Retrieve ... 113
About configuring Backup Exec Retrieve ... 115
Adding a data source ... 115
Editing a data source ... 117
Deleting a data source ... 117
Uninstalling Backup Exec Retrieve ... 118
Troubleshooting Backup Exec Retrieve ... 118
Chapter 8
Monitoring CPS processes
... 121About the Job Monitor ... 121
Monitoring jobs and job pairs ... 122
About job states ... 122
Viewing the status of a job and job pairs ... 123
Viewing a job report ... 125
CPS job report details ... 125
Managing CPS job alerts ... 127
Viewing and filtering active alerts ... 128
Viewing and filtering alert history ... 128
Viewing alert properties ... 129
Responding to active alerts ... 129
Deleting alerts from alert history ... 130
Chapter 9
Using Continuous Protection Server with Backup
Exec
... 131How Continuous Protection Server works with Backup Exec ... 131
Protecting your Exchange Servers with Continuous Protection Server and Backup Exec ... 132
Protecting CPS with Backup Exec ... 132
Configuring CPS for Backup Exec ... 133
Backing up CPS with Backup Exec ... 133
Restoring Continuous Protection Server with Backup Exec ... 135
Monitoring CPS jobs in Backup Exec ... 137
Understanding the credentials for using Backup Exec SmartLink ... 137
Setting up a SmartLink connection between CPS and Backup Exec ... 138
Viewing Backup Exec alerts ... 140
Viewing Backup Exec job logs ... 143
About CPS backup job log details ... 143
Contents 10
Chapter 10
Troubleshooting Continuous Protection Server
... 149Troubleshooting Continuous Protection Server ... 149
Installation and upgrade issues ... 149
Component issues ... 151
Configuration issues ... 151
General issues ... 152
Backup and restore job issues ... 154
Database maintenance utilities ... 155
CPS database backup and restore ... 156
CPS database validation and repair ... 156
Resetting the standard logon ... 156
Appendix A
Third-Party Legal Notices
... 161About Third-Party Legal Notices ... 162
ACE and TAO are governed under the same license provided below. ... 162
ACE (The Adaptive Communication Environment) ... 162
TAO ... 162
Apache Struts, Xerces C++ and Tomcat are governed under the same license provided below ... 164
Apache Struts ... 164
Xerces C++ ... 164
Tomcat ... 164
Definitions. ... 165
Grant of Copyright License. ... 166
Grant of Patent License. ... 166
Redistribution. ... 166
Submission of Contributions. ... 167
Trademarks. ... 167
Disclaimer of Warranty. ... 167
Limitation of Liability ... 168
Accepting Warranty or Additional Liability. ... 168
Blowfish Encryption ... 168
Curl/LibCurl ... 169
Digital Encryption Standard (DES) - MIT ... 169
ICU ... 170
MD5 ... 170
Open SSL ... 171
Original SSLeay License ... 172
ReportCtrl.h.2.0.1 ... 174
STLport ... 174
Java 2 Runtime Environment ... 175
11 Contents
DEFINITIONS. ... 176 LICENSE TO USE. ... 176 RESTRICTIONS. ... 176 LIMITED WARRANTY. ... 177 DISCLAIMER OF WARRANTY. ... 177 LIMITATION OF LIABILITY. ... 177
SOFTWARE UPDATES FROM SUN. ... 177
SOFTWARE FROM SOURCES OTHER THAN SUN. ... 178
TERMINATION. ... 178
EXPORT REGULATIONS. ... 178
TRADEMARKS AND LOGOS. ... 179
U.S. GOVERNMENT RESTRICTED RIGHTS. ... 179
GOVERNING LAW. ... 179
SEVERABILITY. ... 179
INTEGRATION. ... 179
SUPPLEMENTAL LICENSE TERMS ... 180
Appendix B
Maintaining accessibility
... 183About accessibility in Continuous Protection Server ... 183
About general keyboard navigation in Continuous Protection Server ... 184
About keyboard navigation in dialog boxes ... 184
List Boxes ... 185
Using keyboard shortcuts ... 185
Setting accessibility options ... 186
Glossary
... 189Index
... 193Contents 12
Introducing Symantec
Continuous Protection
Server
This chapter includes the following topics:
■ About Symantec Backup Exec Continuous Protection Server
■ Components of Continuous Protection Server
■ How Continuous Protection Server works
■ What you can do with Continuous Protection Server
■ About backup strategies and planning
■ Where to find more information
About Symantec Backup Exec Continuous Protection
Server
Symantec Backup Exec Continuous Protection Server helps ensure that
business-critical data is always protected and always available. It combines proven Backup Exec data protection with replication technology and disk-based data protection to provide fast and reliable data backup and retrieval. It provides continuous data protection and lets you restore data at a granular level from points in time throughout the day. You can also perform simultaneous backups of multiple servers. Continuous Protection Server integrates with Symantec Backup Exec for Windows Servers for traditional tape-based data protection. It delivers integrated management through Backup Exec SmartLink technology.
1
Continuous Protection Server lets end users restore their own data through Backup Exec Retrieve, a Web-based data-retrieval tool. End users can retrieve their own files without IT assistance, and you do not need to install any software or clients on their computers.
Continuous Protection Server is compatible with the following Symantec products: Protects your application servers such as Microsoft Exchange, SQL, and the Continuous Management Service. It also provides long-term storage to various media. Backup Exec (11d or later) for Windows
Servers
Provides easy-to-use online disk storage management for mission-critical, enterprise Windows environments.
Storage Foundation for Windows
Components of Continuous Protection Server
Table 1-1describes the components of Continuous Protection Server. Table 1-1 Components of Continuous Protection Server
Description Component
The Backup Group includes the following components:
■ One Continuous Management Service
■ At least one Business Server
■ At least one Protection Server
■ CPS Administration Console Backup Group
The Business Servers store the data that users save during the course of their daily operations. Once data is saved to the Business Server, the data can be backed up to a Protection Server. The Business Servers must reside in the same Backup Group as the Protection Server. You must install a Continuous Protection Agent on each Business Server.
Business Servers
The Protection Server is the destination of the CPS backup data. It is typically installed at a primary location or a central office. The Protection Server hosts the backup destinations where snapshots are taken and indexed. More than one Protection Server can be installed in the Backup Group.
Protection Server
Introducing Symantec Continuous Protection Server
Components of Continuous Protection Server
Table 1-1 Components of Continuous Protection Server (continued)
Description Component
The Continuous Management Service does the following:
■ Provides primary control of the CPS processes
■ Retains configuration settings from the Administration Console
■ Manages the CPS system
Note:You can install only one Continuous Protection Server in a Backup Group. You must install the Continuous Protection Server before you install any other components. Also, the Continuous Protection Server should be installed on a server that has a fixed IP address. See“Performing an initial installation”on page 37.
Continuous
Management Service
The Continuous Protection Agent manages data collection during backup and restore jobs. You must install it on all Business Servers and Protection Servers in the Backup Group. Continuous
Protection Agent
The Administration Console controls all aspects of CPS, including defining data sources and destinations, creating backup and restore jobs, and defining backup and snapshot schedules. Additionally, the Administration Console is used to view and respond to alerts, monitor backup and restore jobs, and obtain product updates from Symantec.
Administration Console
Backup Exec Retrieve allows workstation users to find and retrieve the files that were backed up with CPS, without requiring any assistance from system administrators. Workstations only require Web browsers to use this feature, so you do not need to install the Continuous Protection Server software on the users’ workstations.
Users can browse all of their backed up files, or they can search for files by using full or partial file names. They can also view and restore versions of backed up files.
Backup Exec Retrieve
This component lets users view the combined status of CPS and Backup Exec jobs in the Backup Exec Administration Console.
Backup Exec SmartLink
Continuous Protection Server uses the Symantec Backup Exec Remote Agent for Windows Systems (Remote Agent) to access System State information for backup and restore. Remote Agent also enables Backup Exec to back up Protection Servers and the CMS to tape efficiently. Remote Agent is an optional component.
You should install the Remote Agent on the following servers:
■ On Business Servers if you want to back up System State
■ On Protection Servers that you want to back up with Backup Exec
■ On servers that host the CMS and that you back up with Backup Exec
Remote Agent is not required when CPS is installed on Backup Exec because the server already contains Remote Agent functionality. However, the Remote Agents that are used by CPS and Backup Exec must be the same version (11d or later).
Remote Agent for Windows Systems (Remote Agent)
15 Introducing Symantec Continuous Protection Server
Table 1-1 Components of Continuous Protection Server (continued)
Description Component
Symantec LiveUpdate is installed with the Administration Console. LiveUpdate notifies administrators when updates to installed Symantec products become available for download. LiveUpdate connects to the Symantec LiveUpdate server by the Internet.
Symantec LiveUpdate
See“How Continuous Protection Server works”on page 16.
How Continuous Protection Server works
Figure 1-1shows an example of how Continuous Protection Server works with Backup Exec to protect your business data.
Introducing Symantec Continuous Protection Server
How Continuous Protection Server works
Figure 1-1 Overview of the Continuous Protection Server model Web Server End-User Workstations (Connected to a local Business Server) Business Servers
(Local or Remote Offices)
(Continuous Protection Agent) Protection Server (Continuous Protection Agent) Snapshots and Indexing Copy Center Backup Exec media server Data Archived to Tape or Disk Storage CPS Admin Console Backup Exec Admin Console Continuous Management Server
1
2
3
6
4
7
9
8
5
The following scenario provides an example of how you can use Continuous Protection Server with Backup Exec to back up and restore data:
17 Introducing Symantec Continuous Protection Server
Users save files and folders to local file servers (Business Servers) as part of their normal daily work. Business Servers are interconnected and together form a common Backup Group.
See“Configuring Business Servers”on page 59. 1
The Continuous Protection Server Backup Destination Wizard designates a specific directory on a specific Protection Server where the data is backed up. The backup-destination definition includes the schedule for the data snapshots and the policies for snapshot retention.
Different servers can be designated as backup destinations based on your needs. For example, separate destinations can be created for financial data on a server in the accounting department, employee data on a server in human resources, and customer records on a server in the sales department.
See“Managing backup destinations”on page 65. 2
You can use the Backup Job Wizard to create Continuous Protection Server backup jobs to back up data from one or more Business Servers to a Protection Server. When you create a job, you select the data to be backed up and the schedule for the backup job. You can schedule CPS backup jobs to run at specific times (periodically), as files incur any changes (continuously), or as needed (on demand).
See“Creating CPS backup jobs”on page 88. 3
As soon as the data is backed up to the Protection Server, scheduled snapshots of the data are made. The data is then indexed and made available in Backup Exec Retrieve.
See“Managing snapshots”on page 68. 4
Users retrieve specific files and folders to their workstations by using Backup Exec Retrieve. Users can select specific versions of their data to be restored. 5
If a system failure occurs at one or more Business Servers, the backed up data can be quickly restored from the Protection Server to the Business Server. See“About restoring data with Continuous Protection Server”on page 99. 6
After the data is backed up to the Protection Server, you can back up the data to Backup Exec to archive the data to tape or disk for long-term storage. See“Backing up CPS with Backup Exec”on page 133.
7
If a system failure or data loss occurs at a Protection Server, Backup Exec can quickly restore the data back to the Protection Server or back to a Business Server.
See“Restoring Continuous Protection Server with Backup Exec”on page 135. 8
Introducing Symantec Continuous Protection Server
How Continuous Protection Server works
The Backup Exec SmartLink component lets you view the status of Continuous Protection Server backup jobs in the Backup Exec Job Logs and Alerts. This option lets administrators determine the quality and completion of the Continuous Protection Server jobs before or during the Backup Exec backup job. See“Monitoring CPS jobs in Backup Exec”on page 137.
9
What you can do with Continuous Protection Server
Table 1-2describes the features and benefits of Continuous Protection Server. Table 1-2 Features and benefits of Continuous Protection Server
Description Feature
CPS backs up files on a network (LAN or WAN) and writes them immediately to a Protection Server with no wait time. You do not need to take incremental or differential backups on servers that are protected by CPS. This feature keeps productivity high while protecting the organization’s information.
Continuous data protection
Only the changed data is captured and protected. This granular (or byte-level) protection reduces the amount of data moving across the network, thereby increasing efficiency. Byte-level protection
Backup Exec Retrieve allows workstation users to find and retrieve the files that were backed up with CPS, without requiring any assistance from system administrators. Workstations only require Web browsers to use this feature, so you do not need to install the Continuous Protection Server software on the users’ workstations.
Backup Exec Retrieve
Entire servers can be backed up, including system files. In the event of a system-wide failure, such as a virus attack, Business Servers (sources) can be quickly restored to a previous state.
Full system restore
Provides multi-streaming, which enables multiple file servers to be continuously backed up at one time to a single Protection Server.
Simultaneous backups
The Administration Console enables users to define backup destinations, customize jobs, view status, and learn of any issues that arise.
Administration Console
CPS leverages Volume Shadow Copy Service (VSS) snapshots to provide versioning of files. This allows users or administrators to recover a previous version of a document. Snapshot settings provide administrators with greater flexibility in managing and retaining snapshots. Point-in-time
snapshots
Existing Symantec Backup Exec users can view some CPS activities from within the Backup Exec Administration Console. For example, you can view logs for CPS backup jobs. You also can use Backup Exec to move disk-based backups to tape for long-term storage.
SmartLink to Symantec Backup Exec
Back up only the specific data you need. Save on system resources by backing up only the information that needs to be recovered.
Flexible backup options
19 Introducing Symantec Continuous Protection Server
Table 1-2 Features and benefits of Continuous Protection Server (continued)
Description Feature
Back up files on demand, or schedule periodic and continuous backups to run automatically. Customized backup
schedules
Administrators can set the maximum amount of bandwidth to be used for continuous data protection jobs.
Bandwidth throttling
Continuous Protection Server protects open files during continuous protection. Open file protection
Retention properties define how long to keep daily, weekly, and monthly backups on disk. Customized retention
properties
Automatically resumes a continuous protection job when lost connections are restored without requiring intervention from an administrator.
Auto job resume
Continuous Protection Agents can be push installed to remote servers from a central console. IT resources do not need to be at that office or location where continuous protection is installed or taking place.
Push installation
Intuitive search capabilities enable users to find files by file name, modification date, specific file type, or file size.
Discovery
Information can be backed up from sources in the current network, as well as from new servers as they are added to the Backup Group.
Scalable protection
Continuous Protection Server captures system state information, reducing the time and effort to recover server configuration information.
System State backup
Uses Symantec LiveUpdate to provide periodic product updates. Symantec LiveUpdate
Supports 64-bit native processors for Business and Protection servers. 64-bit native support
Supports Internet Protocol 6 (IPv6). IPv6 support
Includes a Settings utility where user-configurable registry settings can be managed. Settings Utility
Supports continuous protection of Microsoft Exchange servers to Backup Exec. Continuous protection
of Exchange
About backup strategies and planning
One of the most important assets to any business is the information that is stored on its computers.
Having a strategic backup plan can save time and money by requiring less time for reconstructing information in the event of a failure or loss. Continuous Protection Server can help streamline backup and file recovery strategies.
Introducing Symantec Continuous Protection Server
About backup strategies and planning
The main purpose of your backup strategy is to recover and restore information as quickly as possible after a loss. Secondarily, you need to manage your resources effectively to save money. A well-designed backup strategy plays a key role in your ability to restore lost files quickly.
Data protection considerations
Before you install and use CPS, you should consider the following questions to help assess your backup requirements:
■ How much information needs to be saved and protected?
■ How many servers need to be backed up?
■ How much information can you store and which servers should store it?
■ How long should the data be retained and available?
■ Has the System Information for the server been modified so that it warrants backup protection?
■ What information is business-critical and needs to be backed up continuously (every time the information changes)?
■ What information you back up hourly, daily, weekly, monthly, or at irregular intervals?
■ What information should you back up on an as-needed (manual) basis only?
■ Are shared folders being used, or do all users have unique folders in which their files are stored?
■ Who should have access to the Continuous Protection Server Administration Console for the purpose of changing settings, scheduling backups, restoring information, and managing system alerts?
■ Who should have access to various backup destinations for the purpose of restoring data?
■ How should the backup destinations be organized for access?
■ How often should data snapshots be captured and how many should be retained?
About backup job schedules
Perhaps the most important part in developing a strong backup strategy is deciding what to back up and when.
The frequency with which you back up files can affect many things including the following:
21 Introducing Symantec Continuous Protection Server
■ The quality of the backup
■ The resources that are required to process and store the information
■ The process of locating information that you need to restore
There are multiple levels of backup schedules that work well together and each organization might use a combination of these practices. Most importantly, all information on your servers should be backed up on a regular basis. Less-essential information should be backed up periodically. Pertinent data, such as data that is used for compliance purposes or that is related to your core products or services, should be backed up continually.
See“Creating CPS backup jobs”on page 88. See“Changing a backup job schedule”on page 94.
Table 1-3describes the types of scheduled backup jobs that you can create. Table 1-3 Types of scheduled backups
Description Scheduled backup type
Files that are manually backed up by a user on an “as needed” basis.
On demand
Files that are backed up on a routine basis. You select the days the backups are run and the time the backups begin. For example, you can back up your personnel data each day, Monday through Friday, at 5:00 P.M. Another example would be to back up all of the Business Servers every Saturday, beginning at 1:00 A.M.
Regular
Files that are backed up on certain days of the week and run periodically on timed intervals. For example, you can back up your sales proposals every hour, your development data every three hours, your quality assurance data every four hours, and so on.
Periodic
Critical business files, such as customer data, that are backed up continuously. Every time a file changes, the changes are copied to the Protection Server. There is no wait time or preset interval when the information is copied. The backup takes place immediately, even while files are open. Continuous
Introducing Symantec Continuous Protection Server
About backup strategies and planning
Where to find more information
The product documentation provides assistance for using Backup Exec Continuous Protection Server to your advantage. You can access the information that you need from the installation media and the Symantec Web site.
See“Accessing the Continuous Protection Server documentation”on page 23. See“Accessing the online Help”on page 24.
See“Accessing the Symantec Technical Support Web site”on page 24. See“Accessing the Symantec Backup Exec Web site”on page 24.
Accessing the Continuous Protection Server documentation
The Backup Exec Continuous Protection Server documentation is available on the product CD and installed with each Administration Console.
Table 1-4describes the manuals and help that comprise the Continuous Protection Server documentation set.
Table 1-4 Continuous Protection Server documentation set
Description Document title
Continuous Protection Server is written for system administrators and delivered in Adobe Acrobat (PDF) format. Continuous Protection
Server Administrator’s Guide
(CPSadmin_XX.pdf)
The Continuous Protection Server Quick Installation Guide is intended to assist you while installing the product and components. It is delivered in Adobe Acrobat (PDF) format. Continuous Protection
Server Quick Installation Guide
(CPSquick_xx.pdf)
Installed and stored on the server, the Help file is accessible from the Administration Console.
Continuous Protection Server Help files (CPSconsole_XX.chm)
An HTML file containing any product changes and installation issues that should be reviewed before installing the Continuous Protection Server product.
Continuous Protection Server Readme files (Readme_XX.html)
The “XX” in the filename indicates the language of the file. The choices are EN (English), ES (Spanish), FR (French), IT (Italian), DE (German), JP (Japanese), KO
23 Introducing Symantec Continuous Protection Server
(Korean), CH (Traditional Chinese), PT (Brazilian Portuguese) and ZH (Simplified Chinese).
To access the Continuous Protection Server documentation
1
Insert the installation media.2
Using Windows Explorer, navigate to and open the Docs directory.3
Double-click the file to open it.Accessing the online Help
Online Help is installed with the Continuous Protection Server software. To access the online Help
1
Install the Continuous Protection Server software.2
Click Help.Accessing the Symantec Technical Support Web site
On the Symantec Technical Support Web site, you can find the latest program updates, patches, online tutorials, Knowledge Base articles, and virus removal tools.
To access the Symantec Support Web site
◆ On the Internet, go to the following URL: www.symantec.com/techsupp
Accessing the Symantec Backup Exec Web site
On the Symantec Backup Exec Web site, you can find online technical information, user forums, as well as links to product information, white papers and tutorials. To access the Symantec Backup Exec web site
◆ On the Internet, go to the following URL: http://backupexec.com
Introducing Symantec Continuous Protection Server
Where to find more information
Installing Continuous
Protection Server
This chapter includes the following topics:
■ Before you install
■ System requirements for the product
■ What gets installed and where
■ Performing an initial installation
■ Push-installing Continuous Protection Server components
■ Upgrading to Continuous Protection Server 2010
■ Modifying Continuous Protection Server installations
■ Uninstalling the Continuous Protection Server
■ Uninstalling a Continuous Protection Agent
Before you install
You should do the following tasks before you install Continuous Protection Server: See“Guidelines for installation”on page 26. Review the guidelines for installing
Continuous Protection Server for information about the order in which the components should be installed.
2
See“Checking your environment before installation”on page 27.
Run the Environment Check tool to check for issues that could affect the installation.
See“Upgrading to Continuous Protection Server 2010”on page 46.
If you are upgrading from a previous version, review the product
documentation for any compatibility issues that could affect the installation.
See“File system filter driver compatibility” on page 29.
Review the Readme file for information about incompatible products that should be turned off or uninstalled before you install Continuous Protection Server.
See“Understanding the Continuous Protection Server service account”on page 29.
Review the product documentation for information about setting up the service account for Continuous Protection Server.
See“System requirements for the product” on page 30.
Verify that the systems on which you want to install Continuous Protection Server and its components meet the system requirements.
See“Firewall support ”on page 33. Configure your firewall to allow traffic
through the ports that are used by Continuous Protection Server.
Guidelines for installation
You should install Continuous Protection Server as follows:
■ Install the Continuous Management Service and an Administration Console before you install other Continuous Protection Server components.
■ You should install the Continuous Management Service and the Administration Console on a dedicated server if possible.
See“Performing an initial installation”on page 37.
■ Use the Administration Console to push-install additional Administration Consoles and Continuous Protection Agents to other Business Servers or Protection Servers.
See“Push-installing Continuous Protection Server components”on page 43.
■ As necessary, use the Administration Console to install additional components.
Installing Continuous Protection Server
Before you install
Checking your environment before installation
The Symantec Backup Exec Environment Check tool lets you assess your existing hardware and software resources for compatibility with the Continuous Protection Server software installation.
The Environment Check tool assesses and reports on the following pre-installation configurations:
■ If the computer meets the minimum requirements for installation, such as the operating system, disk and memory space, and sufficient logon account privileges.
See“System requirements for the product”on page 30.
■ If third-party software that uses Continuous Protection Server ports is configured correctly.
■ If required components are installed, and if they are versions that are compatible with Continuous Protection Server.
■ If previous versions of Continuous Protection Server are installed.
■ If storage device hardware and associated drivers are properly installed and recognized by the Windows operating system.
Table 2-1lists the results that are reported for each flagged item. Table 2-1 Results of flagged items
Result Flagged item
There are no incompatibilities to prevent the Continuous Protection Server installation. For hardware, this result indicates that the hardware configuration is recognized by Continuous Protection Server. Passed
An incompatibility with Continuous Protection Server exists, but can be resolved. Or, a condition of which you should be aware.
Warning
An incompatibility with Continuous Protection Server exists, and the installation failed. Some action is required before you can successfully install Continuous Protection Server.
Failed
Although the Environment Check runs automatically during installation, you may want to run it manually before installing Continuous Protection Server or before backing up data with Continuous Protection Server.
27 Installing Continuous Protection Server
To check your environment before installation
1
Insert the installation media, click Pre-installation, and then click Start theBackup Exec Continuous Protection Server Environment Check.
2
Click Next.3
Select one of the following:Checks the configuration of the local computer Local Environment Check
Checks the configuration of a remote computer Remote Environment Check
4
Click Next.5
If you checked Remote Environment Check in step3, do one of the following:■ To select the name of computer from a list, click Add Server From List. Select the computer from the list, and then click Next.
■ To add the name of a computer manually, click Add Server Manually. Type the name of the domain and the computer name, and then click OK. Type the user name and password for this computer, and then click OK.
■ To remove the name of a computer from the list of computers on which the Environment Check will run, select the computer from the list, and then click Remove.
6
Review the results of the Environment Check, especially those items that were flagged as Failed or Warning.To save the results of the Environment Check, check Save Results To.
7
To change the location where the Environment Check results are saved, clickChange Path to browse to a new location.
8
Click Finish.Continuous Protection Server and Backup Exec compatibility
Be careful when installing the CPS Protection Agent on the servers that have older versions of Remote Agent installed. The CPS installer can optionally upgrade the Remote Agent components. However, this upgrade breaks existing backup functionality if the Backup Exec Media Sever is a 11d or earlier version. The installer will always alert you before upgrading the Remote Agent. The same consideration should be given when upgrading Backup Exec if that is where the Continuous Management Service will run.
Installing Continuous Protection Server
Before you install
File system filter driver compatibility
Software that uses file system filter drivers, such as disk defragmenter utilities, certain open file agents and some virus protection software, cannot be used with this product as there could be conflicts with the CPS file system filter driver. If an incompatible product is found on a CPS server, starting both CPS and the incompatible product could cause the system to become unstable or crash. Likewise, enabling both products at system start time could prevent the system from starting. System Restore allows the system to return to its previous configuration. You must remove incompatible products or make them unavailable before you install CPS. If CPS is already installed on the system, do not enable or start the other product while CPS is running.
For more information, see the Readme file accompanying this release for the most current list of products with incompatible filter drivers.
Understanding the Continuous Protection Server service account
Some CPS services are run in the context of a user account that is configured for the CPS system services. To specify an account for CPS, enter a name and password of an Administrator account for the CPS services to use.The services will not start if the account password has expired. Also, if the services try to start too many times with an expired password, the user may get locked out of the account.
If the computer that is hosting the CPS services is in a domain, enter a Domain user’s account. The CPS installer adds the account to the local Administrator’s group.
If this computer is in a workgroup, enter an Administrator’s account, or an equivalent account that is part of the Administrator’s group on the computer. The account that is designated for the CPS services (whether it is a new account or an existing account) will be assigned the following rights:
■ Log on as a service.
■ Administrator rights (provides complete and unrestricted rights to the computer).
On a computer running Windows Server 2003, you cannot install CPS using a service account that has a blank password. If you attempt to do so, an error message is displayed. You can configure Windows to allow for blank passwords. For more information, see the Windows documentation.
29 Installing Continuous Protection Server
The account that is used must be valid on each node in the Backup Group. This account may require establishing a Domain Trust relationship.
If a cross domain trust exists between the computers push installing from and to, the account that is running from the installing computer must be present in the local administrators group of the computer being push installed to.
When operating in a workgroup environment, all nodes in the backup group must run in non-secure mode. (Pre and post-job scripts run under the service account, although additional rights may be required.)
System requirements for the product
To install and use this product, your hardware and software requirements must meet the minimum requirements for each Continuous Protection Server component.
Actual production requirements may require greater resources than the noted minimum requirements. Additionally, where several components exist on the same server, the requirements are cumulative.
See“System requirements for Business Servers”on page 30.
See“System requirements for Continuous Management Service and Protection Servers”on page 31.
See“System requirements for Administration Console”on page 32. See“Firewall support ”on page 33.
System requirements for Business Servers
Business Servers store data that is routinely used and saved by users to file servers, and that is backed up to a Protection Server.
Table 2-2lists the system requirements for Business Servers.
Installing Continuous Protection Server
System requirements for the product
Table 2-2 System requirements for Business Servers
Requirements Component
This component is supported on the following operating systems:
■ Microsoft Windows 2000 Server with Service Pack 4
■ Microsoft Windows 2000 Advanced Server with Service Pack 4
■ Microsoft Windows Server 2003 x64 Editions
■ Microsoft Windows Server 2003 (including R2, but not Data Center) with Service Pack 1
■ Microsoft Windows Server 2003, Small Business Server with Service Pack 1
■ Microsoft Windows Storage Server 2003 with Service Pack 1
■ Microsoft Windows Server 2008 and Windows 2008 R2, including Windows Server Core Supported Operating Systems 512 MB, 1 GB recommended RAM 25 MB Disk Space: Continuous
Protection Server Software
100 MB (10 GB or more recommended) Disk Space: Journals
100 MB Disk Space: Logs and Alerts
100 MB or more depending on server configuration (minimum 1 GB recommended if backing up System State)
Disk Space: Named Objects
Uninterruptible power supply (UPS) such as battery backup power, recommended UPS
Microsoft Data Access Components (MDAC) version 2.5 or later Utilities
System requirements for Continuous Management Service and
Protection Servers
Data is backed up from Business Servers to Protection Servers.
Table 2-3lists the system requirements for Continuous Management Server and Protection Servers.
31 Installing Continuous Protection Server
Table 2-3 System requirements for Continuous Management Service and Protection Servers
Requirements Component
The Continuous Management Service and Protection Servers are supported on the following operating systems:
■ Microsoft Windows Server 2003 x64 Editions
■ Microsoft Windows Server 2003 family (including R2, but not Data Center) with Service Pack 1
■ Microsoft Windows Server 2003, Small Business Server with Service Pack 1
■ Microsoft Windows Storage Server 2003 with Service Pack 1
■ Microsoft Windows Server 2008 and Windows Server 2008 R2, including Windows Server Core Supported Operating Systems 512 MB, 1 GB recommended RAM 58 MB Disk Space: Continuous
Protection Server Software
100 MB Disk Space: Logs and Alerts
1 GB or more as required Disk Space: Indexing
Component
The Protection Server should have at least four separate volumes for ideal performance, such as the following:
■ System volume
■ Journals volume
■ Backup destination volume
■ Snapshot storage volume for backup destination Volumes
Uninterruptible power supply (UPS) such as battery backup power, recommended UPS
Microsoft Data Access Components (MDAC) version 2.5 or later Utilities
System requirements for Administration Console
Any number of Administration Consoles may be installed in the Backup Group.
Table 2-4lists the system requirements for the Administration Console.
Installing Continuous Protection Server
System requirements for the product
Table 2-4 System requirements for Administration Console
Requirements Component
The Administration Console is supported on the following operating systems:
■ Microsoft Windows 2000 Professional with Service Pack 4
■ Microsoft Windows 2000 Server with Service Pack 4
■ Microsoft Windows 2000 Advanced Server with Service Pack 4
■ Microsoft Windows Server 2003 family (including R2, but not Data Center) with Service Pack 1
■ Microsoft Windows XP Professional
■ Microsoft Windows XP Professional x64 Edition
■ Microsoft Windows Vista
■ Microsoft Windows Server 2008 and Windows Server 2008 R2, including Windows Server Core
■ Microsoft Windows 7 (all versions) Supported Operating
Systems
512 MB, 1GB recommended RAM
35 MB for Console alone, plus the following:
■ 250 MB for 32-bit push-install files
■ 275 MB for 64-bit push-install files
10MB for Settings Utility, plus (if not already installed) the following:
■ 300 MB for .Net framework 2.0 (32-bit version)
■ 600 MB for .Net framework 2.0 (64-bit version) Disk Space
Microsoft Data Access Components (MDAC) version 2.5 or later. Net Framework 2.0 is installed for Settings Utility, if needed Utilities
Firewall support
Firewalls must be configured to allow the following ports through to support Continuous Protection Server. CPS automatically creates a firewall exception list. If any of the default port settings are changed on one computer, they must be changed on all computers in the Continuous Protection Server Backup Group.
Warning:Incorrectly editing registry keys may severely damage your system. Before making changes to the registry, you should back up any valued data on the computer.
Table 2-5lists the default port settings for Continuous Protection Server.
33 Installing Continuous Protection Server
Table 2-5 Default port settings for Continuous Protection Server
Editable Registry Key Port Type
Default Port Number Service Name HKLM\Software\Symantec\ENL\Network.TCPIP UDP 1804 Network Helper Service (ENL) HKLM\Software\Symantec\Backup Exec CPS\Parameters\Communications\FFXport TCP 20481 CPA Data HKLM\Software\Symantec\Backup Exec CPS\Parameters\RPC Interface\RxRsaStaticPort TCP 20483 CPA RPC HKLM\Software\Symantec\Backup Exec CPS\Parameters\RPC Interface\RxRmsStaticPort TCP 20485 CMS RPC
Additionally, the Continuous Protection Server Services Manager, push-install, and Settings Utility utilize Windows file sharing (NetBIOS or SMB) ports. In order for these services to function, you must configure the ports.
Table 2-6lists the ports that you should not open to the Internet. Table 2-6 Ports that should not be opened to the Internet
Editable Registry Key Port Type
Default Port Number Service Name
No TCP
445 Windows
(NetBIOS over TCP/IP)
No UDP UDP TCP 137 138 139 Windows (NetBIOS
Continuous Protection Server also uses the following ports on the local server:
■ 2638 ■ 9000-9003 ■ 10000 ■ 13730 ■ 14300 ■ 20487
Because these ports are only used on the local server, it is not necessary (or recommended) that they be opened through your firewall.
Installing Continuous Protection Server
System requirements for the product
What gets installed and where
After the Continuous Protection Server installation completes, depending on the Continuous Protection Server components that are installed, a number of files, services, drivers, and registry entries are made to the system.
See“Folders that are installed”on page 35. See“Drivers that are installed”on page 36.
See“Continuous Protection Server services that are installed”on page 36. See“Registry entries”on page 36.
See“Understanding the Continuous Protection Server service account”on page 29.
Folders that are installed
By default, Continuous Protection Server installs files and folders to C:\Program Files\Symantec\Continuous Protection Server\.
Table 2-7describes the folders that are installed. Table 2-7 Folders that are installed
Description Folder
The ASA folder contains the Win32 and Charsets folders. The Win32 folder contains the ASA database engine and its backup files, DBMS service, ASA support files, and ASA query tool. The database backup (cpsDBBackup.exe) and validation (cpsDBValidate.exe) utilities are also contained in this folder.
The Charsets folder contains ASA Unicode support files. ASA (Adaptive Server
Anywhere)
Continuous Protection Server uses a third-party indexing service that is called Autonomy. The Autonomy folder contains all the files and services that are used by the indexing service. The Autonomy log files are also maintained in this folder.
Autonomy
The Database folder contains the Continuous Management Service (rms.db) and Continuous Protection Agent (rsa.db) databases, their backup copies, and the related database files. Database
The Drivers folder contains the Continuous Protection Server filter driver. Drivers
The Install folder contains Continuous Protection Server, Remote Agent, and Symantec LiveUpdate installation files for push installs.
Install
The Services folder contains Continuous Protection Server service executable files and associated support files.
Services
The Logs folder contains the Network Helper (ENL) log and trace logs. Logs
35 Installing Continuous Protection Server
Drivers that are installed
Continuous Protection Server installs the filter driver CpsFsJnl.sys. This driver detects changes in protected files and records the changes to the Protection Server.
Continuous Protection Server services that are installed
Table 2-8describes the services that Continuous Protection Server installs. Table 2-8 Services that are installed
Description Short name
Service name
The Continuous Management Service service is present only on the server hosting the Continuous Management Service. It manages the
configuration for all Backup Exec Continuous Protection Agents in the Backup Group.
RxRMS Backup Exec
Continuous Protection Administration Service
The Continuous Protection Agent service is present on all servers on which the Continuous Protection Agent is installed. It enables Continuous Protection Server to back up data from the server or move the backed-up data on the server.
RxRSA Backup Exec
Continuous Protection Agent
Allows communication between Continuous Protection Server and Backup Exec to facilitate continuous protection of Microsoft Exchange transaction logs.
RepBrokerSvc Backup Exec
Continuous Protection Broker Service
Communicates with Volume Shadow Services to save and store the Continuous Protection Server’s configuration information. rxWriterSvc
Backup Exec
Continuous Protection Configuration Writer
Controls the configuration database for all Continuous Protection Server information.
RxASA Backup Exec
Continuous Protection Database
Captures system information and file share information. RxNoService
Backup Exec
Continuous Protection System State Manager
Enables the Continuous Management Service to group and discover Continuous Protection Agents and communicate with them. ENL
Backup Exec
Continuous Protection Network Helper (ENL)
Registry entries
Continuous Protection Server adds the following registry keys:
■ HKLM\SOFTWARE\Symantec\Backup Exec CPS
Installing Continuous Protection Server
What gets installed and where
This location stores information about the journal directories, Continuous Protection Server installation path, Continuous Management Service database installation directory, Continuous Protection Server parameters, and Continuous Protection Server build details.
■ HKLM\SYSTEM\CurrentControlSet\Services\
This location stores information about the Continuous Protection Server database technology (Adaptive Server Anywhere, version 9), file system filter driver, file system journal writer driver, and the file system recognizer driver configuration.
Registry entries can be changed using the Settings Utility. See“Accessing the Settings Utility”on page 74.
Performing an initial installation
A typical and fully functional Continuous Protection Server Backup Group includes the following components:
■ A server that has the Continuous Management Service, the Continuous Protection Agent, and the Administration Console installed. This server becomes the central management point in the Backup Group.
■ A Continuous Protection Agent on each Business and Protection Server with the Indexing Component installed on each Protection Server.
■ Any number of Administration Consoles.
Note:The Continuous Management Service components can be installed on a Backup Exec server or on a stand-alone server. If Continuous Protection Server is installed on Backup Exec, then that Backup Exec installation must be upgraded to Backup Exec 2010. If Continuous Protection Server is installed on a stand-alone server, then the latest version of the Remote Agent is also installed. A Remote Agent is not installed on Backup Exec.
The first step in creating a fully functional environment is configuring the server that hosts the Continuous Management Service. Establishing the Continuous Management Service is usually accomplished by performing an initial installation from the installation media.
Continuous Protection Server application files that should be installed during the initial installation include the Continuous Management Service and an
Administration Console. If the server hosting the Continuous Management Service will also be a Business or Protection Server, a Continuous Protection Agent must also be installed. Backup Exec Retrieve is also installed. The Remote Agent is
37 Installing Continuous Protection Server
installed optionally during the initial installation with a Continuous Protection Agent. Symantec LiveUpdate is installed automatically with an Administration Console.
Firewalls need to be manually reconfigured for installation media and push installation. Alternatively, firewalls can be turned off during the installation process.
See“Firewall support ”on page 33.
See“Understanding the Continuous Protection Server service account”on page 29. To use the versioning capabilities of Backup Exec Retrieve, Protection Servers must be running Windows Server 2003.
See“System requirements for Continuous Management Service and Protection Servers”on page 31.
Note:After installing Continuous Protection Server on a computer running Windows Server 2003, you might receive an error message that the Network Load Balancing Service failed to start. Microsoft reports the cause as: “Although network Load Balancing (NLB) is not currently installed, some NLB registry keys might be present in the registry.” Although Microsoft Knowledge Base Article 268437 describes the problem as applying to Windows 2000 Advanced Server, the fix also works for Windows Server 2003.
For more information, see the Microsoft article entitled “Network Load Balancing, Windows 2000 Advanced Server” at the following URL:
www.microsoft.com
Administrator rights are required on the computer where the software is being installed when performing a installation.
To perform an initial installation
1
Close all other programs that may be running.2
If Autoplay is enabled, the Install should automatically launch when the -ROM is inserted in the drive. If Autoplay is not enabled, double-click browser.exe file from the -ROM or download directory.3
Select the language, and then click OK.4
The welcome screen for Backup Exec Continuous Protection Server provides links to access various areas of the installation . After reviewing the various product information, click Pre-installation.5
Click Start the Backup Exec Continuous Protection Server EnvironmentCheck, and then click Next. Installing Continuous Protection Server
Performing an initial installation
6
Select either Local Environment Check or Remote environment check.7
Do one of the following:■ If the Environment Check does not reveal any issues that may prevent a successful installation of Continuous Protection Server, click Finish.
■ If the Environment Check reveals issues that may prevent a successful installation of Continuous Protection Server, correct the issues before attempting to install again.
8
Select Start the Backup Exec Continuous Protection Server Installation to install Continuous Protection Server, and then click Next.Continuous Protection Server will determine whether the computer is a 32-bit or 64-bit server and install the appropriate version of the software.
9
Review the Continuous Protection Server Installation Wizard welcome screen, and then click Next.10
Read and accept the license agreement on the License Agreement screen, and then click Next.11
Select one of the following methods to enter license keys, and then click Next. In the License Key box, type the license key number, and then click Add. Repeat this step for each license key for each option or agent you want to add.To enter license keys manually
Click Import, and then select the cpssernum.xml file.
To import license keys from a file
Leave the license key field blank, and then continue with step14.
To install an evaluation version
The license keys you entered are saved to the cpssernum.xml file, located in the Windows or WINNT directory.
39 Installing Continuous Protection Server
12
On the Local Features screen, select the Continuous Protection Server components that you want to install, and then click Next.Check to install an Administration Console that allows for the management and monitoring of activities within the Backup Group. This option will also install Symantec LiveUpdate 3.0.
Administration Console
Check to install the Continuous Protection Server Settings Utility, which allows changes to be made to various registry settings on this computer. Settings Utility
If it is not already installed, this option will also install .Net Framework 2.0.
Check this option to install the files needed to push install other components.
Push install Support
x86 Support to install components needed to push-install to 32-bit computers.
x64 Support to install components needed to push-install to 64-bit computers.
Check to install a Continuous Management Service, which must be installed to create and manage the Backup Group.
Continuous Management Service
Only one Continuous Management Service may be installed in each Backup Group, and it must be installed before other Continuous Protection Server components.
The CMS must have a fixed IP address. If the IP address changes while the CMS is running, the CMS and the Network Helper (ENL) service must be restarted (for example, net stop RxRMS, net stop Network Helper, net start RxRMS).
Additionally, if protection agents exist on subnets different from the CMS, the CMS should be registered with the Domain Name Service (DNS). Check this option to install a Continuous Protection Agent on the computer. Continuous Protection Agent
A Continuous Protection Agent must be installed on all computers that will act as Business Servers or Protection Servers.
Check this option to allow files stored on this server to be indexed and searchable.
Indexing Component
Check this option to perform an install of the Remote Agent on the local computer.
Backup Exec Remote Agent for Windows Systems
Installing Continuous Protection Server
Performing an initial installation
Check this option to allow for continuous protection of Microsoft Exchange Servers.
An Exchange Protection Agent with the Continuous Management Service and a Continuous Protection Agent must be installed on the Backup Exec media server.
An Exchange Protection Agent must be installed with the Remote Agent and a Continuous Protection Agent on the Microsoft Exchange system. If you cannot select this option, check your DNS for proper settings. Exchange Protection Agent
13
On the Backup Group screen, enter a name of the Backup Group and the name of the Continuous Management Service, and then click Next.When you click Next, you may be prompted with a Windows Security Alert screen with options of Keep Blocking, Unblock, or Ask Me Later. This security screen is displayed due to the installer looking for an existing Continuous Management Service that already has the specified Backup Group name registered. Select Unblock to continue.
14
On the Services screen, enter the credentials for the Backup Exec Continuous Protection Server Service Account, including user name, password and domain.15
Click Next.16
If a Continuous Management Service was selected for this installation and the Continuous Management Service server has multiple NIC cards, the Network Interface Selection screen is shown. Select the Network interface to use for the Backup Group management and verify the displayed settings.17
Click Next.41 Installing Continuous Protection Server
18
On the Support Folder screen, accept the default directories or change the directories, and then click Next.Select or browse to the directory where Continuous Protection Server can store System Information (System State and Shadow Copy Components) data to be backed up. The System Cache is a holding area for the system information and share information.
At a minimum, System information requires at least 5 GB of disk space. If the server performs additional roles, such as also acting as a domain controller, more space is required.
System Cache Directory
Select the default journal directory or browse to another directory to hold the backup journals. The Journal Folders contain the dynamic changes of the data that occur during continuous backups.
Journal Directory
Select the default directory or browse to another directory to hold the indexing database. The indexing component holds indexes of the snapshots that are captured on the Protection Server.
Indexing Directory
You should install these directories on separate volumes.
19
On the Ready to Install the Program screen, review the selections, and then click Install.20
Following the Continuous Protection Server installation, you are prompted to restart the computer. Click Yes to complete the installation.If a Continuous Protection Agent was inst