SlideShare a Scribd company logo
1 of 40
Download to read offline
Symantec Backup Exec Blueprints 1
Symantec Backup Exec Blueprints
Blueprint for Large Installations
Backup Exec Technical Services
Backup & Recovery Technical Education Services
Symantec Backup Exec Blueprints 2
Notice
This Backup Exec Blueprint presentation includes example diagrams that contain objects
that represent applications and platforms from other companies such as Microsoft and
VMware. These diagrams may or may not match or resemble actual implementations
found in end user environments. Any likeness or similarity to actual end user
environments is completely by coincidence.
The goal of the diagrams included in this blueprint presentation is not to recommend
specific ways in which to implement applications and platforms from other companies
such as Microsoft and VMware, but rather to illustrate Backup Exec best practices only.
For guidelines and best practices on installing and configuring applications and
platforms from other companies, please refer to best practice documentation and other
resources provided by those companies.
Symantec Backup Exec Blueprints
Preface/disclaimer
• Blueprints Help Customers Avoid Common Challenges/Pitfalls
• Each Blueprint Contains:
‒ Recommended Configuration: Best-practice implementation example
‒ Life Preservers: Best practices and pitfalls to avoid
• Use Blueprints to:
‒ Present the Backup Exec best practice implementation example
‒ Highlight key “life preserver” guidelines to avoid problems
Symantec Backup Exec Blueprints 3
Symantec Backup Exec Blueprints
How to use
4
Introduction
Key terms and principles
Symantec Backup Exec Blueprints
Symantec Backup Exec Blueprints 5
Backup Exec 15 Enterprise Server Option
Key component of large environment protection
• Central Admin Server Option (CASO)
– Management of large/distributed Backup Exec environments
– Centralized management and monitoring
– Load balancing of backup operations
– Centralization of backup data
– Offsite disaster recovery management
• Advanced Disk Backup Option (ADBO)
– Synthetic backups
– True Image Restore
– Off host backups
Symantec Backup Exec Blueprints 6
Backup Exec 15 Enterprise Server Option
Central administration server capabilities
• Centralization of Information
– Monitor the status of managed Backup Exec servers (MBES)
– Ensure backup devices are online and operational
• Active Alerts
– Enables administrators to quickly identify and drill-down to problems
– Focus on high priority tasks and resolve problems quickly
• Server Grouping
– Group servers by any desired attribute
– Quickly filter views to specific servers rather than sort through long list
• Compliance and Auditing
Symantec Backup Exec Blueprints 7
Backup Exec 15 Enterprise Server Option
Managed Backup Exec servers
• Backup Exec Server Centrally Managed by a CAS
• Will Have Access to One or More Backup Devices
– Locally attached
– Accessible via LAN/SAN
– Shared from other MBES
• Processes Backup and Restore Tasks
– Assigned from CAS
– Assigned by local administrator
• Can Be Configured in ‘Pools’ for Load Balancing
Symantec Backup Exec Blueprints 8
Backup Exec 15 Enterprise Server Option
Configuring device and media information
• Relates to Management of Backup Devices Attached to an MBES
• Can Be Managed Centrally by CAS or Locally by MBES
• Configuration Has Direct Impact on CAS/MBES Bandwidth
Requirements
– Whether connection must be persistent
– Whether connection must be low-latency
Symantec Backup Exec Blueprints 9
Backup Exec 15 Enterprise Server Option
Device and media information managed by MBES
Device and Media Local to the MBES (Remote Site Configuration)
Persistent network connection required -
Low latency connection required -
Backup devices centrally managed by the CAS -
MBES can be centrally monitored from the CAS 
Backup and restore tasks can be copied to the MBES from the CAS 
Backup and restore tasks can be dispatched centrally from CAS -
Backup and restore tasks can be configured locally on MBES 
Symantec Backup Exec Blueprints 10
Backup Exec 15 Enterprise Server Option
Device and media information managed by CAS
Device and Media Local Centralized on the CAS (Same Site Configuration)
Persistent network connection required 
Low latency connection required 
Backup devices centrally managed by the CAS 
MBES can be centrally monitored from the CAS 
Backup and restore tasks can be copied to the MBES from the CAS 
Backup and restore tasks can be dispatched centrally from CAS 
Backup and restore tasks can be configured locally on MBES 
Symantec Backup Exec Blueprints 11
Backup Exec 15 Enterprise Server Option
Optimized duplication
• Copying of Data between OpenStorage (OST) Devices
• Transfer is Optimized; Only Unique Blocks Transferred
• Enables Offsite Disaster Recovery and Other Use Cases
• Requires a Central Administration Server (CAS)
Optimized Data Transfer
Primary Site Secondary Site
Backup Exec 2014
CAS
Backup Exec 2014
MBES
12
Example Diagrams and Life Preservers
Getting the most out of Backup Exec in large environments
Symantec Backup Exec Blueprints
Disaster Recovery (DR) Site
Central Administration Server located at DR site; command/control console
Deduplication Disk Device at DR site receives Optimized Duplication data
Optional tape device at DR site can be used for “tape out” operations
Example Diagram: Large Installation
High-level best practices
Symantec Backup Exec Blueprints 13
Production Data Center
Disaster Recovery (DR) Site
Production Data Center
Managed Backup Exec Servers at Production Data Center for local backups
Dedicated backup network improves backup performance and reliability
VMware infrastructure protected using Agent for VMware and Hyper-V
Applications on standalone hardware protected using GRT-backups
Optional tape device at Data Center can be used for “tape out” operations
SAN storage used by Backup Exec for Deduplication Disk Device location
SAN fabric leveraged for VMware virtual machine backups
Virtual machine data store located on SAN storage
FC SAN (10 Gigabit)
Production Network (10 Gigabit)WAN (100 Megabit)DR Site (10 Gigabit)
Backup Network (10 Gigabit)
Deduplication Store
Physical Servers
Exchange (DAG)
SQL (Cluster)
Virtual Hosts
VMware
~50 VMs
Backup Exec
64-bit
MBES(s)
Opt-Dupe Source
Tape Library
Backup Stage 1
2 – 4 Drives
Backup Stage 2
Backup Exec
CAS
Deduplication Store
Opt-Dupe Target
Backup Stage 3
Console
1
1
4 3
2
21
8
6
5
1
2
2 3
Other Notes
WAN latency and reliability critical to Optimized Duplication
Transfer drives for seeding of Optimized Duplication data at DR site
2
3
2
3
4
5
6
7
8
1
1
2
Agent for
Windows
Tape Library
Backup Stage 4
File Servers
Domain Controllers
Virtual Machines
~50 VMs
SQL Databases
SAN Storage 7
SAN HBA
Example Diagram: Optimized Duplication
High-level best practices
Symantec Backup Exec Blueprints 14
Production Network (10 Gigabit)WAN (100 Megabit)DR Site (10 Gigabit)
Backup Exec - MBES
Opt-Dupe Target
Console
1
Production Data CenterDisaster Recovery (DR) Site
Command/Control
Catalogs
Dedupe Disk Device
Opt-Dupe Source
Dedupe Disk Device
Device/Media Info
Backup Exec - CAS
Optimized Duplication High-level Best Practices
Place the Central Administration Server (CAS) at the Disaster Recovery (DR) site
Seed the Deduplication Disk Device attached to the CAS at the DR site
Configure Device and Media Information to be managed centrally at the CAS
Connection between sites can optionally be secured using a VPN solution (enables “in flight” security)
Ensure a “round trip” latency of 250ms (preferably much better) is achievable between sites
Minimize packet loss and other networking issues as much as possible
For larger environments, use of distributed catalogs is generally recommended
Use of static IP addresses for the CAS and MBESs in the environment can help overcome DNS issues
OST-compliant appliances can be used for Optimized Duplication (source and/or target)
1
2
3
4
5
6
7
8
Only Unique
Blocks Transferred
2
2
3
4 5 6
7
88
9
9
9
Symantec Backup Exec Blueprints 15
Life Preservers: Large Installations
Optimized duplication
• Seed Deduplication Disk Device on the CAS (DR site)
– Option 1: Transfer drive (PCS Planning and Deployment Guide p. 29)
– Option 2: Seed OS files (PCS Planning and Deployment Guide p. 28)
• Use Dedicated Volume for Deduplication Disk Storage Device
• Catalog and SQL Database Recommendations
– Catalog and SQL file locations should be distributed (separate disks/LUNs)
– In very large environments, use full SQL 2008
• Verify CAS Server Can Ping the MBES
• Site-to-site Optimized Duplication Jobs Can Impact WAN Links
– Modifying config file can reduce bandwidth used by Optimized Duplication
– http://www.symantec.com/docs/TECH165599
Symantec Backup Exec Blueprints 16
Life Preservers: Large Installations
Optimized duplication
• MBES Should Have Minimum of 8 GB of RAM
– 8 GB RAM = up to 5 TB of deduplicated data
• CAS Minimum Recommendations
– http://www.symantec.com/docs/HOWTO73231
– http://www.symantec.com/docs/HOWTO73627
– CAS sizing tool: http://www.symantec.com/docs/TECH205843
• Before Recovery from Deduplicated Backup Set
– Inventory/catalog media on destination server before recovery from
duplicated backup set
• Exclude Deduplication Disk Storage Device from Antivirus Scans
– If an antivirus scanner deletes/quarantines files from the deduplication disk
storage device, access to the device may be disabled
– Schedule BE processes and antivirus scans to avoid conflicts
Symantec Backup Exec Blueprints 17
Life Preservers: Large Installations
Optimized duplication
• OST Plug-in
– Install vendor-provided OST license when using third party appliance with
Backup Exec
• Domain Considerations
– Have all Backup Exec servers in same domain or ensure trust between
domains
• Backup Exec Tuning and Performance Guide
– http://www.symantec.com/docs/DOC5481
• Backup Exec Device Limits/CAS Requirements Calculator
– http://www.symantec.com/docs/TECH205843
• Cloud Backup Time Calculator:
– http://www.symantec.com/docs/TECH172473
• Private Cloud Services Planning and Deployment Guide
– http://www.symantec.com/docs/TECH172464
Symantec Backup Exec Blueprints 18
Life Preservers: Large Installations
Optimized duplication
• RAID Caching
– Do not enable RAID caching on disk hosting deduplication disk storage device
• Do Not Delete Files from Inside Deduplication Disk Storage Device
• Do Not Use Backup Exec Server Pools with Standalone Backups
– Prevents duplicate data from being hosted on multiple backup servers
– See article: http://www.symantec.com/docs/HOWTO74447
• Direct Access Sharing
– Limit number of remote computers enabled for direct access sharing with
other Backup Exec servers
• Create separate backup and verify jobs and schedules
– Helps meet backup windows
Symantec Backup Exec Blueprints 19
Life Preservers: Large Installations
Optimized duplication
• Network Performance (Latency) Considerations
– Maintain persistent, high-bandwidth link between CAS and MBES(s)
– Ensure less than one percent (1%) packet loss during transmissions
– Ensure a destination “round trip” latency of 250ms or better
– Connection problems can impact job success rates
• Additional Best Practice Resources
– Ensure NIC and HBA drivers are up to date
– http://www.symantec.com/docs/HOWTO21788
– http://www.symantec.com/docs/TECH60559
– Additional Backup Exec best practice documents are located here.
Example Diagram: Applications
High-level best practices
Symantec Backup Exec Blueprints 20
Application Protection High-level Best Practices
Leverage a separate network for backups (prevents saturation, improves performance)
Protect the Active Directory infrastructure in addition to application components
Enable Granular Recovery Technology for optimal recovery flexibility
Ensure all required Backup Exec logon account permissions are configured properly
Uniquely named mailbox required for Exchange Granular Recovery
For high-availability configurations, protect the passive copy of servers/databases
When firewall access is required, ensure ports are configured properly
Do not store backups to the same disk that contains databases/logs
Production Network (10 Gigabit)
Backup Network (10 Gigabit)
Mailbox Mailbox
Active DB Passive DB
Client Access
Agent for
Windows
1
Domain Contr.
2
4
7
3
7
1
2
3
4
5
6
7
8
SQL (Active) SQL (Passive)
Exchange DAG SQL Cluster
SAN Shared
Storage
SQL DatabasesAgent for
Windows
3
4
5 6 6
8
Symantec Backup Exec Blueprints 21
Life Preservers: Exchange
General best practices
• Place Transaction Logs on Separate Physical Disk from
Database
– If database is damaged, transaction logs will be a recovery resource
• Avoid Making Exchange Server a Domain Controller
– Simplifies recovery; Active Directory won’t need to be recovered first
• For Exchange 2010/2013, Use a DAG With At Least One
Passive Database Copy for Each Database
– For more than one passive copy, second passive copy should use log replay
delay of 24 hours
• For Exchange 2010/2013, 64-bit Backup Exec Server
Required
– Exchange 2010/2013 Management tools must be installed on Backup Exec
server
Symantec Backup Exec Blueprints 22
Life Preservers: Exchange
Rights and permissions: Agent for Windows
• Physical Exchange Servers
– Agent for Windows should be installed on the Exchange server
• Exchange 2010/2013 Database Availability Groups (DAGs)
– Agent for Windows should be installed on each mailbox server
• Agent for Windows
– Must be run under ‘Local System’ account on the Exchange server as well
as the Backup Exec server
– File versions of the Agent for Windows on the Backup Exec server and on
the Exchange server should match
Symantec Backup Exec Blueprints 23
Life Preservers: Exchange
Rights and permissions: Backup Exec logon account
• Minimal Permissions required for Backing Up Exchange 2010
and Microsoft Exchange 2013:
http://www.symantec.com/docs/TECH212113
• Backup Exec Must Have Access to a Uniquely Named Mailbox
• Unique Mailbox Must Be Activated
– http://www.symantec.com/docs/TECH24691
• Backup Exec Logon Account:
– For Exchange 2007, needs to be a member of ‘Organization Administrator’ group
– For Exchange 2010 and 2013, needs to have the ‘Organization Management’ role
– Needs to be member of the local computers Administration group on the
Exchange servers
Symantec Backup Exec Blueprints 24
Life Preservers: Exchange
Protecting the Exchange Information Store (1/2)
• For Full Backups, Enable Granular Recovery Technology
– Allows granular object restore without requiring separate mailbox backup
• For GRT-enabled Backup, Change Default Staging Location on
the Backup Exec Server to a Non-system Volume
– This volume should possess the same disk sector size as the volume used for
Exchange transaction log storage on the Exchange server
• Ensure that Scheduled Maintenance for the Information Store
Does Not Run at Same Time as the Database Backup
Symantec Backup Exec Blueprints 25
Life Preservers: Exchange
Protecting the Exchange Information Store (2/2)
• Use a Separate Backup Network if Possible
– Optionally ensure backups occur during non-peak hours
• Run Exchange Backup Jobs Separately from Other Backup Jobs
• Back Up Active Directory on a Regular Basis
• Run a Backup After Making Changes to System Settings or
Application Settings
• For Exchange 2007, Select Individual Storage Groups for Backup
Rather Than Individual Databases
• To Perform Incremental and Differential Backups of Storage
Groups, Ensure that Circular Logging is Not Enabled
Symantec Backup Exec Blueprints 26
Life Preservers: SQL
General best practices
• Backup Recommendations
– Use weekly full database backups, daily differential database backups, and
transaction log backups as necessary
• Use the Checksum Feature to Check Database Integrity
• Perform Test Restores Periodically
• Use the Copy Only Option for Unscheduled Backup Operations
• Use Encryption to Ensure Data Security
• SQL Native Compression and Deduplication
– Do not use SQL native compression if you are planning to use Backup Exec
Deduplication technology
Symantec Backup Exec Blueprints 27
Life Preservers: SQL
Performance
• Schedule Backup Jobs when Database Activity is Low
• Avoid Full Database Backups During Peak Hours or when
Database Activity on the Server is High
• Consider D2D2T (disk to disk to tape) Backup Strategies for
Optimal Backup and Restore Performance
• Use Tape-based Devices for Long-term Retention
• Do Not Store Backups to the Same Disk that Holds Database
Files or Log Files
Example Diagram: VMware
High-level best practices
Symantec Backup Exec Blueprints 2828
VMware Protection High-level Best Practices
Leverage a separate network for NBD/LAN backups, if possible
Use SAN Transport for backups whenever possible
Store backups to deduplication to optimize backup storage
Use image-level agent-assisted backups for Windows VMs
1
2
3
4
5
6
7
8
vSphere Host 3 vSphere Host 4vSphere Host 2vSphere Host 1vCenter Server Backup Exec
64-bit
MBES(s)
SAN HBA
Linux VMs Windows VMs
File Servers
Domain Controllers
Custom Apps
Windows VMs
File Servers
Domain Controllers
Windows VMs
File Servers
Domain Controllers
VMware
Infrastructure
Agent for Windows on
all Windows VMs
Agent for Linux on all
Linux VMs
DeduplicationStore
SAN Transport
FC SAN (10 Gigabit)
Backup Network (10 Gigabit)
Production Network (10 Gigabit)
SAN StorageSAN Storage
Datastore 1 Datastore 2
1
2
3
4
5
6
7
8
Consider legacy agent-based backups for Linux VMs
Use the VSS Provider installed with Agent for Windows for Windows VMs
When available, discover and select VMs for backup via vCenter server
Connect Backup Exec server to SAN (access LUNs with VM datastores)
Symantec Backup Exec Blueprints 29
Life Preservers: VMware
General best practices (1/2)
• Virtual Machines with RDM Physical Compatibility Mode Disks
– Agent for VMware/Hyper-V can’t protect RDM Physical Compatibility Mode disks
– Virtual compatibility mode RDM disks are automatically included in the backup of a
guest virtual machine. However, Backup Exec can only restore the virtual compatibility
mode RDM disks or file data on an RDM disk through redirected restore.
– Use the Agent for Windows/Linux to protect them using traditional backups
• Virtual Machines Configured With GPT Disks
– Backup Exec 15 supports file and folder-level GRT, and application-level GRT
backups and restores of virtual machines that have GPT partitioned disks.
• Virtual Machines Configured With Fault Tolerance
– Agent for VMware/Hyper-V cannot protect Fault Tolerant virtual machines
– Fault Tolerance must be disabled first
Symantec Backup Exec Blueprints 30
Life Preservers: VMware
General best practices (2/2)
• General Backup Strategy Recommendations
– Seven-day rotation incremental and differential backups, where a full backup
is run on the 7th day
– Use the Deduplication Option to optimize backup storage
• Windows 2012/R2 Running as a VMware Virtual Machine
– Windows 2012/R2 Virtual Machines with ReFS Volumes
Backup and recovery of virtual machines with ReFS volumes, including granular recovery, is supported. A
Backup Exec server running on Windows 2012 or later is required.
– Windows 2012/R2 Virtual Machines with Deduplication Volumes
Backup and recovery of virtual machines with Deduplication volumes, including granular recovery, is supported.
A Backup Exec server running on Windows 2012 or later is required.
– Virtual Machines Using Dynamic Disks
– Backup and recovery of virtual machines using GPT Dynamic Disks is supported; however, granular recovery
is not.
– Backup and recovery of virtual machines using MBR Dynamic Disks is supported; including granular recovery
(except RAID 5)
– Virtual Machines Using Storage Spaces
Backup and recovery of virtual machines using Storage Spaces is supported; however, granular recovery is not.
Symantec Backup Exec Blueprints 31
Life Preservers: VMware
Performance
• VADP Buffer Settings
– VADP buffer settings can be tuned to improve performance
– See tech note: http://www.symantec.com/docs/TECH185691
• General VMware Performance Guidelines and Expectations
– For SAN-based backups, install Backup Exec on a physical machine
– Backup Exec server I/O performance is generally more important than CPU
performance
– See tech note: http://www.symantec.com/docs/TECH125455
32
Job and Device Management
Managing backup jobs and devices in large environments
Symantec Backup Exec Blueprints
Symantec Backup Exec Blueprints 33
Jobs and Devices: Large Installations
Job type and frequency
• Full, Differential, and Incremental Backups Supported for
Physical and Virtual Backups
• Full Backups Offer a Restore Performance Advantage
– One backup to restore
– If backup windows and storage are not an issue, use full backups
• Incremental/Differential Backups Offer a Backup Performance
Advantage
– Only delta changes captured
– If backup windows and/or storage are a challenge, use differential or
incremental backups
Symantec Backup Exec Blueprints 34
Jobs and Devices: Large Installations
Job type and frequency
• Consider Weekly Full Backups and Daily Incremental Backups as
‘Standard’ Protection Policy
• Schedule Disk-to-tape (D2T) to Occur Over the Weekend After
Full Backup
• D2T Stage Can Happen Outside Standard Backup Window
– It’s an operation that involves backup server and tape drive only
– Can be done at any time; no required ‘handle’ to protected servers
• Deduplication Can Greatly Optimize Secondary Disk Storage
– Additional processing overhead for deduplication calculations
– Processing overhead can be handled by client or server
Symantec Backup Exec Blueprints 35
Jobs and Devices: Large Installations
Tape and disk management
• Disk-to-disk-to-tape (D2D2T) Commonly Used and
Recommended Backup Methodology
– Disk-to-disk (D2D) stage represents open “handle” to protected server(s)
– Disk-to-tape (D2T) stage is performed only by backup server + tape drive
– D2D2T approach offers combination of speed and two-level protection
• Disk as First Backup Stage Advantages:
– Can greatly increase backup performance
– Can greatly increase non-DR restore performance
– Local disk backup can be leveraged for restore in most cases
– Offsite tape backup can be leveraged for disaster recovery cases
Symantec Backup Exec Blueprints 36
Jobs and Devices: Large Installations
Tape and disk management
• Infinite Setting For the Overwrite Protection Period For All Tape
Media and Disk Cartridge Media:
– Backup data may consume tape and disk cartridge media capacity quickly
– Tape and disk cartridge media do not become recyclable automatically
• You must specify when to overwrite each media
• Create New Media Sets With the Append and Overwrite Protection
Periods that Accommodate Your Needs
– When overwrite protection periods expire, tape media and disk cartridge
media are recyclable and Backup Exec has access to overwritable media
• Overwrite Tape and Disk Cartridge Media Periodically to Keep the
Media Family at a Manageable Size
– Allows Backup Exec to rebuild the catalog if necessary
– You can use a media rotation strategy so that media is periodically
overwritten, or select the option Overwrite media when you run a full backup
Symantec Backup Exec Blueprints 37
Jobs and Devices: Large Installations
Load balancing
• Leverage Backup Exec Server Pools to Load Balance Backup
Operations Across Large Environments
– Server pools: see admin guide p. 1143
• Backup Server Pools:
– Prevent bottlenecks resulting from backup tasks waiting for a specific
managed Backup Exec server to become available
– Devices/device pools on included Backup Exec servers become available for
task delegation
– Central administration server itself can participate in backup server pools
– Backup task can be processed by other managed Backup Exec servers in
the pool allowing task processing to continue Storage device pools
Symantec Backup Exec Blueprints 38
Jobs and Devices: Large Installations
Load balancing
• Leverage Storage Device Pools to Load Balance Backup Operations
Across Large Environments
– Storage device pools: see admin guide p. 451
• Storage Device Pools Prevent Bottlenecks Resulting From Tasks
Waiting for a Specific Storage Device to Become Available
– If a specific storage device is unavailable or offline, the backup task can be
processed by another storage device in the same pool
– Allows task processing to continue and prevents operational bottlenecks
• Backup Device Pools:
– Devices in a pool must be of the same type (all tape or all disk)
– Storage device pools can be configured in standalone (unmanaged)
configurations or in managed Backup Exec server configurations
– Storage device pools can consist of devices attached to the same server or of
devices attached to different servers
Symantec Backup Exec Blueprints 39
Jobs and Devices: Large Installations
Data life cycle management
• To Reclaim Disk Space Before Backup Sets Expire
– You can delete backup sets manually in Backup Exec
– Do not use Windows Explorer or command prompt to delete backup files
– By default, the data lifecycle management process runs every four hours
• To Prevent a Backup Set From Expiring
– You can manually retain it
– Backup Exec automatically retains all dependent backup sets as well
– When you no longer want to retain a backup set, you must release it so that
data lifecycle management can manage the retention period for it
• Backup Scheduling
– Avoid adding too many incremental backups between full backups
– The data lifecycle management process must search through each backup set
to check dependencies
– More incrementals = longer the DLM process
Symantec Backup Exec Blueprints 40
Thank You!
Backup Exec Product Management

More Related Content

What's hot

Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideSymantec
 
Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Symantec
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverFernando Alves
 
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & ReplicationVMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & ReplicationSuministros Obras y Sistemas
 
How-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierHow-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierSolarWinds
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15Symantec
 
X-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellen
X-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellenX-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellen
X-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellenNEXTtour
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperSymantec
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicySymantec
 
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...Principled Technologies
 
Symantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guideSymantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guideSymantec
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012asedha
 
Microsoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition PresentationMicrosoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition PresentationMicrosoft Private Cloud
 
.Next 2017 Updates
.Next 2017 Updates.Next 2017 Updates
.Next 2017 UpdatesNEXTtour
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds
 
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014Symantec
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Paula Koziol
 
VMworld Europe 2014: What's New in vSphere?
VMworld Europe 2014: What's New in vSphere?VMworld Europe 2014: What's New in vSphere?
VMworld Europe 2014: What's New in vSphere?VMworld
 
Efficient and versatile hardware management with Dell PowerEdge VRTX
Efficient and versatile hardware management with Dell PowerEdge VRTXEfficient and versatile hardware management with Dell PowerEdge VRTX
Efficient and versatile hardware management with Dell PowerEdge VRTXPrincipled Technologies
 

What's hot (20)

Backup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance GuideBackup Exec 15 Tuning and Performance Guide
Backup Exec 15 Tuning and Performance Guide
 
Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
 
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & ReplicationVMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
VMware Recovery: 77x Faster! NEW ESG Lab Review, with Veeam Backup & Replication
 
How-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made EasierHow-To: WSUS Reporting Made Easier
How-To: WSUS Reporting Made Easier
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
 
X-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellen
X-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellenX-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellen
X-Tour: Hochverfuegbare Anwendungen mit Nutanix bereitstellen
 
Backup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paperBackup exec 2014 deduplication option white paper
Backup exec 2014 deduplication option white paper
 
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent PolicyTECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
TECHNICAL BRIEF▶ NetBackup 7.6 VMware Virtual Machine Intelligent Policy
 
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...
Nimboxx HCI AU-110x: A scalable, easy-to-use solution for hyperconverged infr...
 
Symantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guideSymantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guide
 
VMWare Forum Winnipeg - 2012
VMWare Forum Winnipeg  - 2012VMWare Forum Winnipeg  - 2012
VMWare Forum Winnipeg - 2012
 
Microsoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition PresentationMicrosoft SQL Server - Benefits of Enterprise Edition Presentation
Microsoft SQL Server - Benefits of Enterprise Edition Presentation
 
.Next 2017 Updates
.Next 2017 Updates.Next 2017 Updates
.Next 2017 Updates
 
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
SolarWinds Patch Manager - How does it compare to SCCM Patch Management?
 
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
ESG Lab Review▶ Protecting Virtual Environments with Symantec Backup Exec 2014
 
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
Implementing a Disaster Recovery Solution using VMware Site Recovery Manager ...
 
VMworld Europe 2014: What's New in vSphere?
VMworld Europe 2014: What's New in vSphere?VMworld Europe 2014: What's New in vSphere?
VMworld Europe 2014: What's New in vSphere?
 
Operational Management Challenges for Converged Infrastructure
Operational Management Challenges for Converged Infrastructure Operational Management Challenges for Converged Infrastructure
Operational Management Challenges for Converged Infrastructure
 
Efficient and versatile hardware management with Dell PowerEdge VRTX
Efficient and versatile hardware management with Dell PowerEdge VRTXEfficient and versatile hardware management with Dell PowerEdge VRTX
Efficient and versatile hardware management with Dell PowerEdge VRTX
 

Viewers also liked

Paragon Software - Overview - Driving Incremental Business with Paragon - Par...
Paragon Software - Overview - Driving Incremental Business with Paragon - Par...Paragon Software - Overview - Driving Incremental Business with Paragon - Par...
Paragon Software - Overview - Driving Incremental Business with Paragon - Par...Jonny Sacks
 
Paragon Automotive interview questions and answers
Paragon Automotive interview questions and answersParagon Automotive interview questions and answers
Paragon Automotive interview questions and answersccarebe72
 
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013Google
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recoveryhunny garg
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesSpiceworks
 

Viewers also liked (6)

Paragon Software - Overview - Driving Incremental Business with Paragon - Par...
Paragon Software - Overview - Driving Incremental Business with Paragon - Par...Paragon Software - Overview - Driving Incremental Business with Paragon - Par...
Paragon Software - Overview - Driving Incremental Business with Paragon - Par...
 
Paragon Innovations
Paragon InnovationsParagon Innovations
Paragon Innovations
 
Paragon Automotive interview questions and answers
Paragon Automotive interview questions and answersParagon Automotive interview questions and answers
Paragon Automotive interview questions and answers
 
CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013CommVault Intro SureSkills Simpana 10 Event 2013
CommVault Intro SureSkills Simpana 10 Event 2013
 
03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
Disaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup StrategiesDisaster Recovery & Data Backup Strategies
Disaster Recovery & Data Backup Strategies
 

Similar to TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations

WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15
WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15
WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15Symantec
 
Backup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationBackup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationSymantec
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...Symantec
 
Cloud computing 3702
Cloud computing 3702Cloud computing 3702
Cloud computing 3702Jess Coburn
 
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld
 
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...VMworld
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMwareDevansh Chowdhary
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60minPeter De Tender
 
Best Practices For Virtualised Share Point T02 Brendan Law Nathan Mercer
Best Practices For Virtualised Share Point T02 Brendan Law Nathan MercerBest Practices For Virtualised Share Point T02 Brendan Law Nathan Mercer
Best Practices For Virtualised Share Point T02 Brendan Law Nathan MercerFlamer
 
Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...
Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...
Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...LarryZaman
 
DR-to-the-Cloud Best Practices
DR-to-the-Cloud Best PracticesDR-to-the-Cloud Best Practices
DR-to-the-Cloud Best PracticesRackspace
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentationSymantec
 
VMworld Europe 2014: Virtual SAN Best Practices and Use Cases
VMworld Europe 2014: Virtual SAN Best Practices and Use CasesVMworld Europe 2014: Virtual SAN Best Practices and Use Cases
VMworld Europe 2014: Virtual SAN Best Practices and Use CasesVMworld
 
VMworld 2013: How SRP Delivers More Than Power to Their Customers
VMworld 2013: How SRP Delivers More Than Power to Their Customers VMworld 2013: How SRP Delivers More Than Power to Their Customers
VMworld 2013: How SRP Delivers More Than Power to Their Customers VMworld
 
Emc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_pointEmc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_pointxKinAnx
 
Emc sql server 2012 overview
Emc sql server 2012 overviewEmc sql server 2012 overview
Emc sql server 2012 overviewsolarisyougood
 
VMware Performance Troubleshooting
VMware Performance TroubleshootingVMware Performance Troubleshooting
VMware Performance Troubleshootingglbsolutions
 
Hyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksHyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksAmit Gatenyo
 
Using Snap Clone with Enterprise Manager 12c
Using Snap Clone with Enterprise Manager 12cUsing Snap Clone with Enterprise Manager 12c
Using Snap Clone with Enterprise Manager 12cPete Sharman
 

Similar to TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations (20)

WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15
WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15
WHITE PAPER▶ Blueprint for Optimized Duplication with Backup Exec 15
 
Backup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ DeduplicationBackup Exec Blueprints▶ Deduplication
Backup Exec Blueprints▶ Deduplication
 
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
TECHNICAL WHITE PAPER▶Symantec Backup Exec 2014 Blueprints - Optimized Duplic...
 
Cloud computing 3702
Cloud computing 3702Cloud computing 3702
Cloud computing 3702
 
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data CenterVMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
VMworld 2013: Maximize Database Performance in Your Software-Defined Data Center
 
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
VMworld 2013: VMware Disaster Recovery Solution with Oracle Data Guard and Si...
 
les12.pdf
les12.pdfles12.pdf
les12.pdf
 
PHDVirtual Backups for VMware
PHDVirtual Backups for VMwarePHDVirtual Backups for VMware
PHDVirtual Backups for VMware
 
NICConf 2015 - azure disaster recovery in 60min
NICConf 2015 -  azure disaster recovery in 60minNICConf 2015 -  azure disaster recovery in 60min
NICConf 2015 - azure disaster recovery in 60min
 
Best Practices For Virtualised Share Point T02 Brendan Law Nathan Mercer
Best Practices For Virtualised Share Point T02 Brendan Law Nathan MercerBest Practices For Virtualised Share Point T02 Brendan Law Nathan Mercer
Best Practices For Virtualised Share Point T02 Brendan Law Nathan Mercer
 
Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...
Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...
Business_Continuity_Planning_with_SQL_Server_HADR_options_TechEd_Bangalore_20...
 
DR-to-the-Cloud Best Practices
DR-to-the-Cloud Best PracticesDR-to-the-Cloud Best Practices
DR-to-the-Cloud Best Practices
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
 
VMworld Europe 2014: Virtual SAN Best Practices and Use Cases
VMworld Europe 2014: Virtual SAN Best Practices and Use CasesVMworld Europe 2014: Virtual SAN Best Practices and Use Cases
VMworld Europe 2014: Virtual SAN Best Practices and Use Cases
 
VMworld 2013: How SRP Delivers More Than Power to Their Customers
VMworld 2013: How SRP Delivers More Than Power to Their Customers VMworld 2013: How SRP Delivers More Than Power to Their Customers
VMworld 2013: How SRP Delivers More Than Power to Their Customers
 
Emc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_pointEmc vspex customer_presentation_private_cloud_virtualized_share_point
Emc vspex customer_presentation_private_cloud_virtualized_share_point
 
Emc sql server 2012 overview
Emc sql server 2012 overviewEmc sql server 2012 overview
Emc sql server 2012 overview
 
VMware Performance Troubleshooting
VMware Performance TroubleshootingVMware Performance Troubleshooting
VMware Performance Troubleshooting
 
Hyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and TricksHyper-V Best Practices & Tips and Tricks
Hyper-V Best Practices & Tips and Tricks
 
Using Snap Clone with Enterprise Manager 12c
Using Snap Clone with Enterprise Manager 12cUsing Snap Clone with Enterprise Manager 12c
Using Snap Clone with Enterprise Manager 12c
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZABSYZ Inc
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencessuser9e7c64
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtimeandrehoraa
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecturerahul_net
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsChristian Birchler
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxRTS corp
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Rob Geurden
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Natan Silnitsky
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfAlina Yurenko
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 

Recently uploaded (20)

Salesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZSalesforce Implementation Services PPT By ABSYZ
Salesforce Implementation Services PPT By ABSYZ
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Patterns for automating API delivery. API conference
Patterns for automating API delivery. API conferencePatterns for automating API delivery. API conference
Patterns for automating API delivery. API conference
 
SpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at RuntimeSpotFlow: Tracking Method Calls and States at Runtime
SpotFlow: Tracking Method Calls and States at Runtime
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
Understanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM ArchitectureUnderstanding Flamingo - DeepMind's VLM Architecture
Understanding Flamingo - DeepMind's VLM Architecture
 
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving CarsSensoDat: Simulation-based Sensor Dataset of Self-driving Cars
SensoDat: Simulation-based Sensor Dataset of Self-driving Cars
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptxReal-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
Real-time Tracking and Monitoring with Cargo Cloud Solutions.pptx
 
Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...Simplifying Microservices & Apps - The art of effortless development - Meetup...
Simplifying Microservices & Apps - The art of effortless development - Meetup...
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
Taming Distributed Systems: Key Insights from Wix's Large-Scale Experience - ...
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdfGOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
GOING AOT WITH GRAALVM – DEVOXX GREECE.pdf
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 

TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations

  • 1. Symantec Backup Exec Blueprints 1 Symantec Backup Exec Blueprints Blueprint for Large Installations Backup Exec Technical Services Backup & Recovery Technical Education Services
  • 2. Symantec Backup Exec Blueprints 2 Notice This Backup Exec Blueprint presentation includes example diagrams that contain objects that represent applications and platforms from other companies such as Microsoft and VMware. These diagrams may or may not match or resemble actual implementations found in end user environments. Any likeness or similarity to actual end user environments is completely by coincidence. The goal of the diagrams included in this blueprint presentation is not to recommend specific ways in which to implement applications and platforms from other companies such as Microsoft and VMware, but rather to illustrate Backup Exec best practices only. For guidelines and best practices on installing and configuring applications and platforms from other companies, please refer to best practice documentation and other resources provided by those companies. Symantec Backup Exec Blueprints Preface/disclaimer
  • 3. • Blueprints Help Customers Avoid Common Challenges/Pitfalls • Each Blueprint Contains: ‒ Recommended Configuration: Best-practice implementation example ‒ Life Preservers: Best practices and pitfalls to avoid • Use Blueprints to: ‒ Present the Backup Exec best practice implementation example ‒ Highlight key “life preserver” guidelines to avoid problems Symantec Backup Exec Blueprints 3 Symantec Backup Exec Blueprints How to use
  • 4. 4 Introduction Key terms and principles Symantec Backup Exec Blueprints
  • 5. Symantec Backup Exec Blueprints 5 Backup Exec 15 Enterprise Server Option Key component of large environment protection • Central Admin Server Option (CASO) – Management of large/distributed Backup Exec environments – Centralized management and monitoring – Load balancing of backup operations – Centralization of backup data – Offsite disaster recovery management • Advanced Disk Backup Option (ADBO) – Synthetic backups – True Image Restore – Off host backups
  • 6. Symantec Backup Exec Blueprints 6 Backup Exec 15 Enterprise Server Option Central administration server capabilities • Centralization of Information – Monitor the status of managed Backup Exec servers (MBES) – Ensure backup devices are online and operational • Active Alerts – Enables administrators to quickly identify and drill-down to problems – Focus on high priority tasks and resolve problems quickly • Server Grouping – Group servers by any desired attribute – Quickly filter views to specific servers rather than sort through long list • Compliance and Auditing
  • 7. Symantec Backup Exec Blueprints 7 Backup Exec 15 Enterprise Server Option Managed Backup Exec servers • Backup Exec Server Centrally Managed by a CAS • Will Have Access to One or More Backup Devices – Locally attached – Accessible via LAN/SAN – Shared from other MBES • Processes Backup and Restore Tasks – Assigned from CAS – Assigned by local administrator • Can Be Configured in ‘Pools’ for Load Balancing
  • 8. Symantec Backup Exec Blueprints 8 Backup Exec 15 Enterprise Server Option Configuring device and media information • Relates to Management of Backup Devices Attached to an MBES • Can Be Managed Centrally by CAS or Locally by MBES • Configuration Has Direct Impact on CAS/MBES Bandwidth Requirements – Whether connection must be persistent – Whether connection must be low-latency
  • 9. Symantec Backup Exec Blueprints 9 Backup Exec 15 Enterprise Server Option Device and media information managed by MBES Device and Media Local to the MBES (Remote Site Configuration) Persistent network connection required - Low latency connection required - Backup devices centrally managed by the CAS - MBES can be centrally monitored from the CAS  Backup and restore tasks can be copied to the MBES from the CAS  Backup and restore tasks can be dispatched centrally from CAS - Backup and restore tasks can be configured locally on MBES 
  • 10. Symantec Backup Exec Blueprints 10 Backup Exec 15 Enterprise Server Option Device and media information managed by CAS Device and Media Local Centralized on the CAS (Same Site Configuration) Persistent network connection required  Low latency connection required  Backup devices centrally managed by the CAS  MBES can be centrally monitored from the CAS  Backup and restore tasks can be copied to the MBES from the CAS  Backup and restore tasks can be dispatched centrally from CAS  Backup and restore tasks can be configured locally on MBES 
  • 11. Symantec Backup Exec Blueprints 11 Backup Exec 15 Enterprise Server Option Optimized duplication • Copying of Data between OpenStorage (OST) Devices • Transfer is Optimized; Only Unique Blocks Transferred • Enables Offsite Disaster Recovery and Other Use Cases • Requires a Central Administration Server (CAS) Optimized Data Transfer Primary Site Secondary Site Backup Exec 2014 CAS Backup Exec 2014 MBES
  • 12. 12 Example Diagrams and Life Preservers Getting the most out of Backup Exec in large environments Symantec Backup Exec Blueprints
  • 13. Disaster Recovery (DR) Site Central Administration Server located at DR site; command/control console Deduplication Disk Device at DR site receives Optimized Duplication data Optional tape device at DR site can be used for “tape out” operations Example Diagram: Large Installation High-level best practices Symantec Backup Exec Blueprints 13 Production Data Center Disaster Recovery (DR) Site Production Data Center Managed Backup Exec Servers at Production Data Center for local backups Dedicated backup network improves backup performance and reliability VMware infrastructure protected using Agent for VMware and Hyper-V Applications on standalone hardware protected using GRT-backups Optional tape device at Data Center can be used for “tape out” operations SAN storage used by Backup Exec for Deduplication Disk Device location SAN fabric leveraged for VMware virtual machine backups Virtual machine data store located on SAN storage FC SAN (10 Gigabit) Production Network (10 Gigabit)WAN (100 Megabit)DR Site (10 Gigabit) Backup Network (10 Gigabit) Deduplication Store Physical Servers Exchange (DAG) SQL (Cluster) Virtual Hosts VMware ~50 VMs Backup Exec 64-bit MBES(s) Opt-Dupe Source Tape Library Backup Stage 1 2 – 4 Drives Backup Stage 2 Backup Exec CAS Deduplication Store Opt-Dupe Target Backup Stage 3 Console 1 1 4 3 2 21 8 6 5 1 2 2 3 Other Notes WAN latency and reliability critical to Optimized Duplication Transfer drives for seeding of Optimized Duplication data at DR site 2 3 2 3 4 5 6 7 8 1 1 2 Agent for Windows Tape Library Backup Stage 4 File Servers Domain Controllers Virtual Machines ~50 VMs SQL Databases SAN Storage 7 SAN HBA
  • 14. Example Diagram: Optimized Duplication High-level best practices Symantec Backup Exec Blueprints 14 Production Network (10 Gigabit)WAN (100 Megabit)DR Site (10 Gigabit) Backup Exec - MBES Opt-Dupe Target Console 1 Production Data CenterDisaster Recovery (DR) Site Command/Control Catalogs Dedupe Disk Device Opt-Dupe Source Dedupe Disk Device Device/Media Info Backup Exec - CAS Optimized Duplication High-level Best Practices Place the Central Administration Server (CAS) at the Disaster Recovery (DR) site Seed the Deduplication Disk Device attached to the CAS at the DR site Configure Device and Media Information to be managed centrally at the CAS Connection between sites can optionally be secured using a VPN solution (enables “in flight” security) Ensure a “round trip” latency of 250ms (preferably much better) is achievable between sites Minimize packet loss and other networking issues as much as possible For larger environments, use of distributed catalogs is generally recommended Use of static IP addresses for the CAS and MBESs in the environment can help overcome DNS issues OST-compliant appliances can be used for Optimized Duplication (source and/or target) 1 2 3 4 5 6 7 8 Only Unique Blocks Transferred 2 2 3 4 5 6 7 88 9 9 9
  • 15. Symantec Backup Exec Blueprints 15 Life Preservers: Large Installations Optimized duplication • Seed Deduplication Disk Device on the CAS (DR site) – Option 1: Transfer drive (PCS Planning and Deployment Guide p. 29) – Option 2: Seed OS files (PCS Planning and Deployment Guide p. 28) • Use Dedicated Volume for Deduplication Disk Storage Device • Catalog and SQL Database Recommendations – Catalog and SQL file locations should be distributed (separate disks/LUNs) – In very large environments, use full SQL 2008 • Verify CAS Server Can Ping the MBES • Site-to-site Optimized Duplication Jobs Can Impact WAN Links – Modifying config file can reduce bandwidth used by Optimized Duplication – http://www.symantec.com/docs/TECH165599
  • 16. Symantec Backup Exec Blueprints 16 Life Preservers: Large Installations Optimized duplication • MBES Should Have Minimum of 8 GB of RAM – 8 GB RAM = up to 5 TB of deduplicated data • CAS Minimum Recommendations – http://www.symantec.com/docs/HOWTO73231 – http://www.symantec.com/docs/HOWTO73627 – CAS sizing tool: http://www.symantec.com/docs/TECH205843 • Before Recovery from Deduplicated Backup Set – Inventory/catalog media on destination server before recovery from duplicated backup set • Exclude Deduplication Disk Storage Device from Antivirus Scans – If an antivirus scanner deletes/quarantines files from the deduplication disk storage device, access to the device may be disabled – Schedule BE processes and antivirus scans to avoid conflicts
  • 17. Symantec Backup Exec Blueprints 17 Life Preservers: Large Installations Optimized duplication • OST Plug-in – Install vendor-provided OST license when using third party appliance with Backup Exec • Domain Considerations – Have all Backup Exec servers in same domain or ensure trust between domains • Backup Exec Tuning and Performance Guide – http://www.symantec.com/docs/DOC5481 • Backup Exec Device Limits/CAS Requirements Calculator – http://www.symantec.com/docs/TECH205843 • Cloud Backup Time Calculator: – http://www.symantec.com/docs/TECH172473 • Private Cloud Services Planning and Deployment Guide – http://www.symantec.com/docs/TECH172464
  • 18. Symantec Backup Exec Blueprints 18 Life Preservers: Large Installations Optimized duplication • RAID Caching – Do not enable RAID caching on disk hosting deduplication disk storage device • Do Not Delete Files from Inside Deduplication Disk Storage Device • Do Not Use Backup Exec Server Pools with Standalone Backups – Prevents duplicate data from being hosted on multiple backup servers – See article: http://www.symantec.com/docs/HOWTO74447 • Direct Access Sharing – Limit number of remote computers enabled for direct access sharing with other Backup Exec servers • Create separate backup and verify jobs and schedules – Helps meet backup windows
  • 19. Symantec Backup Exec Blueprints 19 Life Preservers: Large Installations Optimized duplication • Network Performance (Latency) Considerations – Maintain persistent, high-bandwidth link between CAS and MBES(s) – Ensure less than one percent (1%) packet loss during transmissions – Ensure a destination “round trip” latency of 250ms or better – Connection problems can impact job success rates • Additional Best Practice Resources – Ensure NIC and HBA drivers are up to date – http://www.symantec.com/docs/HOWTO21788 – http://www.symantec.com/docs/TECH60559 – Additional Backup Exec best practice documents are located here.
  • 20. Example Diagram: Applications High-level best practices Symantec Backup Exec Blueprints 20 Application Protection High-level Best Practices Leverage a separate network for backups (prevents saturation, improves performance) Protect the Active Directory infrastructure in addition to application components Enable Granular Recovery Technology for optimal recovery flexibility Ensure all required Backup Exec logon account permissions are configured properly Uniquely named mailbox required for Exchange Granular Recovery For high-availability configurations, protect the passive copy of servers/databases When firewall access is required, ensure ports are configured properly Do not store backups to the same disk that contains databases/logs Production Network (10 Gigabit) Backup Network (10 Gigabit) Mailbox Mailbox Active DB Passive DB Client Access Agent for Windows 1 Domain Contr. 2 4 7 3 7 1 2 3 4 5 6 7 8 SQL (Active) SQL (Passive) Exchange DAG SQL Cluster SAN Shared Storage SQL DatabasesAgent for Windows 3 4 5 6 6 8
  • 21. Symantec Backup Exec Blueprints 21 Life Preservers: Exchange General best practices • Place Transaction Logs on Separate Physical Disk from Database – If database is damaged, transaction logs will be a recovery resource • Avoid Making Exchange Server a Domain Controller – Simplifies recovery; Active Directory won’t need to be recovered first • For Exchange 2010/2013, Use a DAG With At Least One Passive Database Copy for Each Database – For more than one passive copy, second passive copy should use log replay delay of 24 hours • For Exchange 2010/2013, 64-bit Backup Exec Server Required – Exchange 2010/2013 Management tools must be installed on Backup Exec server
  • 22. Symantec Backup Exec Blueprints 22 Life Preservers: Exchange Rights and permissions: Agent for Windows • Physical Exchange Servers – Agent for Windows should be installed on the Exchange server • Exchange 2010/2013 Database Availability Groups (DAGs) – Agent for Windows should be installed on each mailbox server • Agent for Windows – Must be run under ‘Local System’ account on the Exchange server as well as the Backup Exec server – File versions of the Agent for Windows on the Backup Exec server and on the Exchange server should match
  • 23. Symantec Backup Exec Blueprints 23 Life Preservers: Exchange Rights and permissions: Backup Exec logon account • Minimal Permissions required for Backing Up Exchange 2010 and Microsoft Exchange 2013: http://www.symantec.com/docs/TECH212113 • Backup Exec Must Have Access to a Uniquely Named Mailbox • Unique Mailbox Must Be Activated – http://www.symantec.com/docs/TECH24691 • Backup Exec Logon Account: – For Exchange 2007, needs to be a member of ‘Organization Administrator’ group – For Exchange 2010 and 2013, needs to have the ‘Organization Management’ role – Needs to be member of the local computers Administration group on the Exchange servers
  • 24. Symantec Backup Exec Blueprints 24 Life Preservers: Exchange Protecting the Exchange Information Store (1/2) • For Full Backups, Enable Granular Recovery Technology – Allows granular object restore without requiring separate mailbox backup • For GRT-enabled Backup, Change Default Staging Location on the Backup Exec Server to a Non-system Volume – This volume should possess the same disk sector size as the volume used for Exchange transaction log storage on the Exchange server • Ensure that Scheduled Maintenance for the Information Store Does Not Run at Same Time as the Database Backup
  • 25. Symantec Backup Exec Blueprints 25 Life Preservers: Exchange Protecting the Exchange Information Store (2/2) • Use a Separate Backup Network if Possible – Optionally ensure backups occur during non-peak hours • Run Exchange Backup Jobs Separately from Other Backup Jobs • Back Up Active Directory on a Regular Basis • Run a Backup After Making Changes to System Settings or Application Settings • For Exchange 2007, Select Individual Storage Groups for Backup Rather Than Individual Databases • To Perform Incremental and Differential Backups of Storage Groups, Ensure that Circular Logging is Not Enabled
  • 26. Symantec Backup Exec Blueprints 26 Life Preservers: SQL General best practices • Backup Recommendations – Use weekly full database backups, daily differential database backups, and transaction log backups as necessary • Use the Checksum Feature to Check Database Integrity • Perform Test Restores Periodically • Use the Copy Only Option for Unscheduled Backup Operations • Use Encryption to Ensure Data Security • SQL Native Compression and Deduplication – Do not use SQL native compression if you are planning to use Backup Exec Deduplication technology
  • 27. Symantec Backup Exec Blueprints 27 Life Preservers: SQL Performance • Schedule Backup Jobs when Database Activity is Low • Avoid Full Database Backups During Peak Hours or when Database Activity on the Server is High • Consider D2D2T (disk to disk to tape) Backup Strategies for Optimal Backup and Restore Performance • Use Tape-based Devices for Long-term Retention • Do Not Store Backups to the Same Disk that Holds Database Files or Log Files
  • 28. Example Diagram: VMware High-level best practices Symantec Backup Exec Blueprints 2828 VMware Protection High-level Best Practices Leverage a separate network for NBD/LAN backups, if possible Use SAN Transport for backups whenever possible Store backups to deduplication to optimize backup storage Use image-level agent-assisted backups for Windows VMs 1 2 3 4 5 6 7 8 vSphere Host 3 vSphere Host 4vSphere Host 2vSphere Host 1vCenter Server Backup Exec 64-bit MBES(s) SAN HBA Linux VMs Windows VMs File Servers Domain Controllers Custom Apps Windows VMs File Servers Domain Controllers Windows VMs File Servers Domain Controllers VMware Infrastructure Agent for Windows on all Windows VMs Agent for Linux on all Linux VMs DeduplicationStore SAN Transport FC SAN (10 Gigabit) Backup Network (10 Gigabit) Production Network (10 Gigabit) SAN StorageSAN Storage Datastore 1 Datastore 2 1 2 3 4 5 6 7 8 Consider legacy agent-based backups for Linux VMs Use the VSS Provider installed with Agent for Windows for Windows VMs When available, discover and select VMs for backup via vCenter server Connect Backup Exec server to SAN (access LUNs with VM datastores)
  • 29. Symantec Backup Exec Blueprints 29 Life Preservers: VMware General best practices (1/2) • Virtual Machines with RDM Physical Compatibility Mode Disks – Agent for VMware/Hyper-V can’t protect RDM Physical Compatibility Mode disks – Virtual compatibility mode RDM disks are automatically included in the backup of a guest virtual machine. However, Backup Exec can only restore the virtual compatibility mode RDM disks or file data on an RDM disk through redirected restore. – Use the Agent for Windows/Linux to protect them using traditional backups • Virtual Machines Configured With GPT Disks – Backup Exec 15 supports file and folder-level GRT, and application-level GRT backups and restores of virtual machines that have GPT partitioned disks. • Virtual Machines Configured With Fault Tolerance – Agent for VMware/Hyper-V cannot protect Fault Tolerant virtual machines – Fault Tolerance must be disabled first
  • 30. Symantec Backup Exec Blueprints 30 Life Preservers: VMware General best practices (2/2) • General Backup Strategy Recommendations – Seven-day rotation incremental and differential backups, where a full backup is run on the 7th day – Use the Deduplication Option to optimize backup storage • Windows 2012/R2 Running as a VMware Virtual Machine – Windows 2012/R2 Virtual Machines with ReFS Volumes Backup and recovery of virtual machines with ReFS volumes, including granular recovery, is supported. A Backup Exec server running on Windows 2012 or later is required. – Windows 2012/R2 Virtual Machines with Deduplication Volumes Backup and recovery of virtual machines with Deduplication volumes, including granular recovery, is supported. A Backup Exec server running on Windows 2012 or later is required. – Virtual Machines Using Dynamic Disks – Backup and recovery of virtual machines using GPT Dynamic Disks is supported; however, granular recovery is not. – Backup and recovery of virtual machines using MBR Dynamic Disks is supported; including granular recovery (except RAID 5) – Virtual Machines Using Storage Spaces Backup and recovery of virtual machines using Storage Spaces is supported; however, granular recovery is not.
  • 31. Symantec Backup Exec Blueprints 31 Life Preservers: VMware Performance • VADP Buffer Settings – VADP buffer settings can be tuned to improve performance – See tech note: http://www.symantec.com/docs/TECH185691 • General VMware Performance Guidelines and Expectations – For SAN-based backups, install Backup Exec on a physical machine – Backup Exec server I/O performance is generally more important than CPU performance – See tech note: http://www.symantec.com/docs/TECH125455
  • 32. 32 Job and Device Management Managing backup jobs and devices in large environments Symantec Backup Exec Blueprints
  • 33. Symantec Backup Exec Blueprints 33 Jobs and Devices: Large Installations Job type and frequency • Full, Differential, and Incremental Backups Supported for Physical and Virtual Backups • Full Backups Offer a Restore Performance Advantage – One backup to restore – If backup windows and storage are not an issue, use full backups • Incremental/Differential Backups Offer a Backup Performance Advantage – Only delta changes captured – If backup windows and/or storage are a challenge, use differential or incremental backups
  • 34. Symantec Backup Exec Blueprints 34 Jobs and Devices: Large Installations Job type and frequency • Consider Weekly Full Backups and Daily Incremental Backups as ‘Standard’ Protection Policy • Schedule Disk-to-tape (D2T) to Occur Over the Weekend After Full Backup • D2T Stage Can Happen Outside Standard Backup Window – It’s an operation that involves backup server and tape drive only – Can be done at any time; no required ‘handle’ to protected servers • Deduplication Can Greatly Optimize Secondary Disk Storage – Additional processing overhead for deduplication calculations – Processing overhead can be handled by client or server
  • 35. Symantec Backup Exec Blueprints 35 Jobs and Devices: Large Installations Tape and disk management • Disk-to-disk-to-tape (D2D2T) Commonly Used and Recommended Backup Methodology – Disk-to-disk (D2D) stage represents open “handle” to protected server(s) – Disk-to-tape (D2T) stage is performed only by backup server + tape drive – D2D2T approach offers combination of speed and two-level protection • Disk as First Backup Stage Advantages: – Can greatly increase backup performance – Can greatly increase non-DR restore performance – Local disk backup can be leveraged for restore in most cases – Offsite tape backup can be leveraged for disaster recovery cases
  • 36. Symantec Backup Exec Blueprints 36 Jobs and Devices: Large Installations Tape and disk management • Infinite Setting For the Overwrite Protection Period For All Tape Media and Disk Cartridge Media: – Backup data may consume tape and disk cartridge media capacity quickly – Tape and disk cartridge media do not become recyclable automatically • You must specify when to overwrite each media • Create New Media Sets With the Append and Overwrite Protection Periods that Accommodate Your Needs – When overwrite protection periods expire, tape media and disk cartridge media are recyclable and Backup Exec has access to overwritable media • Overwrite Tape and Disk Cartridge Media Periodically to Keep the Media Family at a Manageable Size – Allows Backup Exec to rebuild the catalog if necessary – You can use a media rotation strategy so that media is periodically overwritten, or select the option Overwrite media when you run a full backup
  • 37. Symantec Backup Exec Blueprints 37 Jobs and Devices: Large Installations Load balancing • Leverage Backup Exec Server Pools to Load Balance Backup Operations Across Large Environments – Server pools: see admin guide p. 1143 • Backup Server Pools: – Prevent bottlenecks resulting from backup tasks waiting for a specific managed Backup Exec server to become available – Devices/device pools on included Backup Exec servers become available for task delegation – Central administration server itself can participate in backup server pools – Backup task can be processed by other managed Backup Exec servers in the pool allowing task processing to continue Storage device pools
  • 38. Symantec Backup Exec Blueprints 38 Jobs and Devices: Large Installations Load balancing • Leverage Storage Device Pools to Load Balance Backup Operations Across Large Environments – Storage device pools: see admin guide p. 451 • Storage Device Pools Prevent Bottlenecks Resulting From Tasks Waiting for a Specific Storage Device to Become Available – If a specific storage device is unavailable or offline, the backup task can be processed by another storage device in the same pool – Allows task processing to continue and prevents operational bottlenecks • Backup Device Pools: – Devices in a pool must be of the same type (all tape or all disk) – Storage device pools can be configured in standalone (unmanaged) configurations or in managed Backup Exec server configurations – Storage device pools can consist of devices attached to the same server or of devices attached to different servers
  • 39. Symantec Backup Exec Blueprints 39 Jobs and Devices: Large Installations Data life cycle management • To Reclaim Disk Space Before Backup Sets Expire – You can delete backup sets manually in Backup Exec – Do not use Windows Explorer or command prompt to delete backup files – By default, the data lifecycle management process runs every four hours • To Prevent a Backup Set From Expiring – You can manually retain it – Backup Exec automatically retains all dependent backup sets as well – When you no longer want to retain a backup set, you must release it so that data lifecycle management can manage the retention period for it • Backup Scheduling – Avoid adding too many incremental backups between full backups – The data lifecycle management process must search through each backup set to check dependencies – More incrementals = longer the DLM process
  • 40. Symantec Backup Exec Blueprints 40 Thank You! Backup Exec Product Management