COPYRIGHT Copyright 2010 by Tandberg Data. All rights reserved. This item and the information contained herein are the property of Tandberg Data. No part of this document may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language or computer language in any form or by any means, electronic, mechanical, magnetic, optical, chemical, manual, or otherwise, without the express written permission of Tandberg Data.
PRODUCT WARRANTY CAUTION The AccuVault 1U-4TB or 1U-8TB by Tandberg Data Corporation is warranted to be free from defects in materials, parts, and workmanship and will conform to the current product specification upon delivery. For the specific details of your warranty, refer to your sales contract or contact the company from which the library was purchased.
NOTES IV 1019662 PRODUCT MANUAL Preliminary
Contents AccuVault RDX Product Manual i About This Manual . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . vii 1 Product Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 AccuVault 1U System Components. . . . . . . . . . . . . . . . . . . . . . . . . . . 2 AccuGuard Enterprise Software Features. . . . . . . . . . . . . . . . . . . . . . . 3 AccuGuard Enterprise User Interface Overview . . . . . . . . . . . . . . . . . 6 Best Practices . . . . . . . . . . . .
5 Protection Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Creating Protection Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scheduling Protection Plans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Running, Editing, and Removing a Plan . . . . . . . . . . . . . . . . . . . . . . Viewing Protection Plan Results . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 63 64 68 6 Archived Data. . . . . . . . . . . . . . . . . . . . . . . .
ABOUT THIS MANUAL This manual describes how to set up and operate the AccuVault 1U-4TB or 1U-8TB and how to use AccuGuard Enterprise software to protect your data. NOTICE–This manual may contain some preliminary information that may change without notice. WHERE TO LOOK FOR INFORMATION Installation and software setup Read Chapter 1 for an overview of the AccuVault 1U’s features and components. Read Chapter 2 for information on how to install and setup the AccuVault 1U.
NOTES VIII 1019662 PRODUCT MANUAL Preliminary
1 PRODUCT OVERVIEW The Tandberg Data AccuVault 1U is a centrally-managed, LAN-attached, disk-based appliance that provides an affordable, all-in-one data protection solution for small-to-medium businesses with limited IT resources. The AccuVault 1U runs Windows Storage Server 2008 and comes installed with AccuGuard Enterprise data protection software.
CHAPTER 1—PRODUCT OVERVIEW ACCUVAULT 1U SYSTEM COMPONENTS The following illustration shows the front and back panel components of the AccuVault 1U. 2 1 DVD drive 8 Mouse connector (green) 2 1TB or 2 TB drives depending on model 9 Keyboard connector (purple) 3 Unit Identifier (UID) button 10 USB 2.
ACCUGUARD ENTERPRISE SOFTWARE FEATURES AccuGuard Enterprise is designed for use with hard-disk storage. Built on innovative deduplication technology, it virtually eliminates redundant data because unique data is stored only once. The effective storage capacity of the disk is significantly increased, making backup to disk fast, easy, and affordable.
CHAPTER 1—PRODUCT OVERVIEW PROTECTION PLANS A protection plan defines which data is to be archived, which store to save it in, and when the plan runs. A protection plan keeps track of all the selected items and, after its initial run, will store only new and changed information. At the same time, each plan run creates a full recovery point.
ARCHIVED DATA With the exception of purged data, your backup storage contains all versions of your stored files. The software detects, at a sub-file level, data that has changed between backups and stores only the unique data necessary to protect the versions of the files it encounters. It can reconstruct and restore all versions of files that have been protected.
CHAPTER 1—PRODUCT OVERVIEW ACCUGUARD ENTERPRISE USER INTERFACE OVERVIEW This section provides a general overview of the AccuGuard Enterprise. AccuGuard Enterprise interface uses a standard Microsoft Management Console (MMC) three-pane view. The left pane, or console tree, provides a hierarchical view of the whole system. By selecting the Archive Manager folder at the top of the console tree, you can manage areas that affect the overall system, such as managing license keys and checking for product updates.
STORES A store is a storage location targeted by local and remote protection plans for keeping archived data (common content) and associated cataloging information. After a store is created, it will appear in the Stores folder. From the Stores folder, you can see and manage storage that has been prepared for the software. Information such as the storage name, size of the storage, status (Available or Offline), and the drive designation of the disk are displayed in the status (center) pane.
CHAPTER 1—PRODUCT OVERVIEW Archive Action Description Search In addition to using the Restore action to explore and restore recovery points, you can search an archive by clicking its Search action. Refer to Using the Search Bar on page 72 for more information. Properties From the Properties action, you can define expiration settings for the archive that override the expiration settings of the parent store. See Store Expiration on page 52 for information about expiring data from a store.
Local Plan Action Description Event Viewer / View Log To aid in troubleshooting, this software records its activity in log files and writes significant events to the Windows Application Event Log. See Log Files on page 79 for more information. Clicking the Event Viewer action for local plans opens the Windows Event Viewer for the AccuVault 1U. Click the View Log action for local plans to see the commands that have run for local plans and store tasks.
CHAPTER 1—PRODUCT OVERVIEW Remote Computer Description Action History You can see the history for all plans for a remote computer by selecting the History action. Each time a plan runs or is restored, an entry is added to the history list. To view the run log for a given plan, select an entry from the history list. Next, click the View Log link located in the Result Details area. The run log for the selected entry appears. See also, Viewing Protection Plan Results on page 68.
GETTING THE MOST FROM ACCUGUARD ENTERPRISE As mentioned previously, AccuGuard Enterprise uses an advanced technology called data deduplication or capacity optimization. This technology reduces standard business data by as much as a twentieth of the original size of the data during backup to disk. It achieves this level of optimization by removing all redundant data from the files being archived and storing only the unique data over time while allowing virtually instant point-in-time restore of the data.
CHAPTER 1—PRODUCT OVERVIEW MANAGING USER ACCOUNTS Windows denies or grants access to its resources by means of user accounts. When running this software in a domain, create a domain user account solely for use by this software. Add the account to the Domain Admin Group, thereby allowing the account access to required resources. Specify this account from the Create Protection Plan (or store task) wizard schedule page, or in the Run as field of the scheduled task of each protection plan.
BACKING UP AND RESTORING CONFIGURATION SETTINGS Backing Up (Export) An off-site copy of your configuration settings should be saved to protect against site-wide disasters. In addition to your original installation media and your purchased license keys (if applicable), you should save the following: Installation directory \*.config \SystemExcludes.
CHAPTER 1—PRODUCT OVERVIEW NOTES 14 1019662 PRODUCT MANUAL Preliminary
2 INSTALLATION AND SETUP This chapter provides information on how to install and configure the AccuVault 1U and to create data protection plans for your network.
CHAPTER 2—INSTALLATION AND SETUP SOFTWARE SYSTEM REQUIREMENTS The following table lists the minimum system requirements for the remote clients that will be backed up by the AccuVault 1U: AccuGuard Enterprise Protected Clients Operating System Windows XP Professional, Windows Vista, Windows 7 Professional, Windows Server 2003, Windows Server 2003 R2, and Windows Server 2008 R2 Processor Single Core 1.
INSTALLATION OVERVIEW Here is an overview of the procedures provided in this chapter. You must complete the steps below to install and configure the AccuVault 1U and to create data protection plans for your network. Installation Step go to...
CHAPTER 2—INSTALLATION AND SETUP Screw pack Appliance bezel Bezel lock keys AccuGuard Enterprise license activation card Rackmount instructions, part number 1019660 STEP 2 — CONNECT NETWORK AND POWER CABLES 1. Connect the two AccuVault 1U ethernet network ports to ethernet network ports on a switch, hub, or router. Note: Two ethernet ports are recommended for efficient data throughput. 2. Connect the two power cords that are appropriate for your region to the AccuVault 1U.
Set Regional and Language options from the Windows Control Panel (if necessary). Note: All other links listed in the initial tasks screen are provided for your convenience. They are not required to run the AccuGuard Enterprise software. SETTING THE TIME ZONE To set the time zone to your region: 1. Click Set time zone from the AccuVault 1U initial tasks window. 2. Click the appropriate buttons to reset the date and time zone for your region. Click [OK] when you are finished.
CHAPTER 2—INSTALLATION AND SETUP . The following dialog box opens. 3. Select Internet Protocol Version 4 in the dialog box and click [Properties]. The following dialog box opens.
4. Select the “Use the following address” radio button. 5. Enter the IP address, subnet mask. and gateway. Also add the DNS server address. Click [OK]. 6. Follow the same steps to configure the second Local Area Connection address. CHANGING THE ACCUVAULT 1U COMPUTER NAME When you create a data protection plan, the AccuGuard Enterprise software refers to the AccuVault 1U full computer name when transferring data between the remote protected clients and the AccuVault 1U.
CHAPTER 2—INSTALLATION AND SETUP 2. Click [Change]. The Computer Name/Domain Change dialog box opens. 3. Type a name that uniquely identifies the AccuVault 1U on your network. Click [OK]. A dialog box opens alerting you that you must restart the server to apply changes. 4. Click [OK] to restart the server. Note: Do not add the domain at this time. Restart the server after adding the computer name, then return to the dialog box to add the domain.
3. Select the Domain radio button and type the network domain name. ! Important The remote computers that you intend to back up with the AccuVault 1U must be members of the same domain. A dialog box opens alerting you that you must restart the server to apply changes. 4. Click [OK] to restart the server. SETTING THE REGION AND LANGUAGE To set the region and language: 1. Go to Start Control Panel Region and Languages (or may be Regional and Language Options). 2.
CHAPTER 2—INSTALLATION AND SETUP 4. Type the following administrator password: Admin! Note: The administrator password is case sensitive and must be at least 6 alphanumeric characters, plus incorporate at least one additional special character, such as an exclamation or question mark. 5. Click [OK]. 6. Click [Yes] to connect to the AccuVault 1U. The Tandberg Data AccuVault 1U Initial Tasks screen and the Navigator Console open.
STEP 5 — VERIFY SYSTEM CONFIGURATION ON REMOTE CLIENTS Verify that the following Windows system configurations are enabled as described in the tables below. You must verify these system configuration settings for every remote computer client that you intend to back up with the AccuGuard software.
CHAPTER 2—INSTALLATION AND SETUP Table 2-4 Firewall Setting Exceptions XP Vista 7 Firewall Setting Exceptions File and print sharing Windows Server 2003, 2008 SQL Server Exchang e Server File Server Yes Yes Yes Yes Yes Yes Yes Remote administration exception added from command line.
STEP 6 — RUN THE ACCUGUARD ENTERPRISE SOFTWARE To run AccuGuard Enterprise, complete the steps in the following three sections: Obtain license keys Launch software Activate license keys OBTAIN LICENSE KEYS There are two license keys you must obtain and activate before you can use the AccuGuard software: The Enterprise key The Enterprise Remote Computers key To obtain the AccuGuard license keys: 1. Go to http://www.tandbergdata.com/login. 2.
CHAPTER 2—INSTALLATION AND SETUP LAUNCH ACCUGUARD SOFTWARE To launch the AccuGuard Enterprise software: 1. Click Start AccuGuard Data Protection Software located in the bottom-left corner of the AccuVault 1U initial tasks window. 2. If software updates are available, the Enterprise Update wizard opens to update the software. Click [Download] to start the process. Note: You can also verify you have the most current version of the software by clicking Check for Updates...
4. Click [Add]. The License Key dialog box opens. Type the Enterprise license key that you received via email. Click [OK]. A dialog box opens asking you if you want to activate the software now. 5. Click [Yes]. The AccuGuard software activation dialog box opens. 6. Select the Internet radio button to activate the software via the Internet. Click [Activate]. Note: If you do not have Internet access, select the Telephone radio button and contact Tandberg Data technical support for an activation PIN. 7.
CHAPTER 2—INSTALLATION AND SETUP STEP 7 — ADD REMOTE COMPUTERS A remote computer refers to any client (desktop, server, SQL Server, Exchange Server) that has data backed up by the AccuGuard Enterprise software. To add a remote computer: 1. Expand Remote Computers in the left-hand, tree pane. Click All Computers from the left pane. Click “Add Computer...” from the right-hand pane. The following screen opens: 2.
STEP 8 — CREATE A DATA PROTECTION PLAN Creating a data protection plan for a remote computer is a two-part process. This section describes the following: Adding a store Creating a data protection plan ADDING A STORE A store is a virtual storage location that contains archived, deduplicated data and its associated cataloging information. A single store can be targeted by one or more protection plans. Note: AccuGuard ships with a preconfigured store that you can use to get started.
CHAPTER 2—INSTALLATION AND SETUP 4. Click [Next]. Note: Make sure the checkbox “Allow remote computers to archive to this target” is selected. Otherwise, the store will not be available to the remote computer when you create a data protection plan. 5. Click [Prepare{Now] to prepare the store for data archival. Click [Next]. 6. Click [Finish]. CREATING A PROTECTION PLAN Once you have added a remote computer and a store, you can create a protection plan. To create a data protection plan: 1.
Note: The AccuGuard software detects whether the remote computer runs SQL Server or Microsoft Exchange. The options to select SQL Databases or Exchange Data only apply if the remote computer has SQL or Exchange installed. 3. Click [Add] from the Enter Folders to Protect dialog box. (These instructions assume you selected Files and Folders. If you selected SQL Databases or Exchange Data, the instructions are similar.) The Browse for Folder dialog opens. 4.
CHAPTER 2—INSTALLATION AND SETUP 8. Type a plan name. Click [Next]. The following Scheduled Task dialog box opens. 9. Choose a schedule plan. Click [Next]. 10. Click [Finish]. 11. Enter the user account password. Click [OK]. Note: If you changed the user who has permission to run the scheduled protection plan in the previous Scheduled Task dialog, enter that user account password. If you did not change the user, enter the administrator password for the remote computer.
3. Select one of the following: Files and Folders, SQL Databases, or Exchange Data. Note: The AccuGuard software detects whether the remote computer runs SQL Server or Microsoft Exchange. The options to select SQL Databases or Exchange Data only apply if the remote computer has SQL or Exchange installed. 4. Click [Add] from the Enter Folders to Protect dialog box. (These instructions assume you selected Files and Folders. If you selected SQL Databases or Exchange Data, the instructions are similar.
CHAPTER 2—INSTALLATION AND SETUP 9. Choose a schedule plan. Click [Next]. 10. Click [Finish]. 11. Enter the user account password. Click [OK]. Note: 36 If you changed the user who has permission to run the scheduled protection plan in the previous Scheduled Task dialog, enter that user account password. If you did not change the user, enter the administrator password for the AccuVault 1U.
3 REMOTE COMPUTERS A remote computer, in terms of this product, refers to a computer protected by this software that is not the AccuVault 1U server. The Remote Computers folder contains the remote computers (clients) section of the console tree. This folder has an All Computers group underneath for adding your remote computers to the software. Actions for Remote Computers include: Add Group.
CHAPTER 3—REMOTE COMPUTERS History. You can see the history for all plans for a remote computer by selecting the History action. Each time a plan runs or is restored, an entry is added to the history list. To view the run log for a given plan, select an entry from the history list. Next, click the View Log link located in the Result Details area. The run log for the selected entry appears. See also, Viewing Protection Plan Results on page 68. Restore.
4 STORE MANAGEMENT A store is a storage location targeted by local and remote protection plans for keeping archived data (common content) and associated cataloging information. After a store is created, it will appear in the Stores folder. From the Stores folder, you can see and manage storage that has been prepared for the software. Information such as the storage name, size of the storage, status (Available or Offline), and the drive designation of the disk are displayed in the status (center) pane.
CHAPTER 4—STORE MANAGEMENT After highlighting a store in the tree pane, you can display its Details, Usage History, Store Tasks, and Task History by clicking on the appropriate action in the Actions pane. This chapter contains the following sections: Adding Storage Using Existing Storage Removing Storage Creating Store Tasks Describing Store Actions Using Store Properties ADDING STORAGE A new installation of the software will not have any storage assigned to it.
If this is an existing store, the Prepare Store screen will have a Reconnect button. Otherwise, it will have a Prepare now button. Preparing a store creates the file and folder structure used by the software to store and track your protected data. Note: If the option is shown, the Use NTFS-only media layout (only for backward compatibility) checkbox should normally be left unchecked.
CHAPTER 4—STORE MANAGEMENT Click the Prepare now (or Reconnect) button. When the prepare or reconnect process is complete, the progress indicator will show Preparation Complete, and the Next button is enabled. Click Next to continue to the Store Added screen. The Store Added screen shows a high-level summary of the store configuration. Notice the Storage location value is :\ObjectStore{...}. This is a hidden system folder. The name that you entered is used in the AccuGuard interface.
USING EXISTING STORAGE You can reattach a store to this software if it had been removed with the Keep the data on the media for future use option. You can also add existing stores from another system in the same manner. To use an existing store, first click the Add a Store action, then choose the physical storage containing the store you wish to use. The software will detect that there are stores already on the physical storage and will enable the Use existing option.
CHAPTER 4—STORE MANAGEMENT The selected store is removed from the Stores folder in the console tree. All recovery points for protection plans associated with the storage are removed from the Explore page. PERMANENTLY DELETE THE DATA ON MEDIA When storage is permanently deleted from the software, the stored data is destroyed. You can reuse the media for new storage, but you will not be able to access any old data.
STORE COPY Store copy tasks allow you to copy the contents of one store to another. You can copy stores within the same AccuVault 1U system, or you can copy stores to or from another AccuVault 1U system. Before you create a store copy task, both stores, source and destination, must exist. The store copy task is associated with the store it is created from. This store can be the source store or the destination store.
CHAPTER 4—STORE MANAGEMENT On the Configure Recovery Points to Copy screen, you can choose to copy all recovery points or copy only the most recent recovery point. Make your choice, then click Next to continue. Enter a meaningful name for this task on the Copy Task Name screen, then click Next to continue to the Schedule Copy Task screen. You can schedule this task to run automatically or click Next to accept the No Schedule default.
Store Copy Usage Scenario Description Seeding a store from a remote site. This software employs source-based deduplication, in which data processing is distributed across a network of servers and only the deduplicated data is moved across a LAN or WAN to a store. If a large amount of deduplicated data has to travel across a slow WAN link during the baseline run of a system in a remote office, the baseline run time may be unacceptably long due to the bandwidth bottleneck.
CHAPTER 4—STORE MANAGEMENT 2. Add a store to the share at the remote site. In AccuGuard Enterprise, click the Stores folder and choose the Add a Store action. In the Add Store Wizard, select Network Drive, click the link to map a network drive (or add a network location). Map a drive to the share on the removable storage device, choosing a drive letter for the mapped drive and entering the UNC path to the share, e.g. \\\.
9. Reconnect AccuGuard Enterprise to the store. In AccuGuard Enterprise, select Stores. In the Actions pane, select Add a Store. If the store is located at the root of a removable USB device, in the Add Store Wizard, select Disk Drive, then select the drive letter of the USB device. Click Next. In the Storage Name window, select the Use existing radio button. The field becomes active, and you can then select the store on the USB device. Click OK.
CHAPTER 4—STORE MANAGEMENT STORE VERIFY To maintain store integrity, the software can verify the contents of a store and identify corrupt files sometimes caused by disk corruptions. If a corrupt file is found, it is moved to the store Quarantined Items folder. A quarantined item is no longer available from the store, but if the data is available on primary storage, it will automatically be replaced (repaired) in the store during the next protection plan run.
Note: As a safety precaution, the most recent ten restore points in an Archive will not expire even though they may meet the expiration criteria. You can change this setting from the Edit Settings action, but the minimum value allowed is one. To remove all restore points from an archive, you must delete the archive. Expired items can be removed (purged) from the recycle bin with a store purge task.
CHAPTER 4—STORE MANAGEMENT DESCRIBING STORE ACTIONS When a store is highlighted in the Stores folder of the console tree, the actions available include: Details. Choose the Details action to view details of the store, such as its physical location, status, capacity, free space, and share name. Usage History. The Usage History action lists tasks that have been run against the store. Statistics such as start and stop times and results are shown for each task.
USING STORE PROPERTIES From a store property page, you can control data retention settings, sharing, and bandwidth throttling. The following table describes store properties. Store Properties Description Expiration The default setting is to retain archived data indefinitely. This setting can be overridden from the Expiration tab of the store property page by changing the selected radio button from Infinite Retention to Number of days to keep recovery points.
CHAPTER 4—STORE MANAGEMENT NOTES 56 1019662 PRODUCT MANUAL Preliminary
5 PROTECTION PLANS Protection plans specify which data to protect and where to keep the protected data (which store to use). You can optionally set up a schedule to automatically run the plan.
CHAPTER 5—PROTECTION PLANS CREATING PROTECTION PLANS AccuGuard Enterprise allows you to create and save protection plans to archive your data on storage prepared for the software. A protection plan is made up of a plan type, selections relevant to the type, the store to use, and a schedule specifying when the plan runs. Local plans are protection plans that run on the local server and protect local data.
ADDING A FILES AND FOLDERS PROTECTION PLAN Note: Prior to creating a protection plan, you will need to create a store for keeping your archived data. See Chapter 4 on page 41 for more information. To create a protection plan for files and folders, select Create Protection Plan from either the Local Plans folder or from a remote computer located within the Remote Computers folder. Next, choose Files and Folders to begin the protection plan wizard for protecting files and folders.
CHAPTER 5—PROTECTION PLANS Give your plan a descriptive name, then click Next to continue to the Scheduled Task screen where you can set up a schedule to automatically run the plan. You can also specify a different user account for running the plan. See Scheduling Protection Plans for more information. Click Next to go to the final screen where you can review the settings. Click the Back button to change settings, or click Finish to close the protection plan wizard and create the plan.
Give your plan a descriptive name, then click Next to continue to the Scheduled Task screen where you can set up a schedule to automatically run the plan. You can also specify a different user account to run the plan. See Scheduling Protection Plans for more information. Click Next to go to the final screen where you can review the settings. Click the Back button to change settings, or click Finish to close the Add Exchange Protection Plan wizard and create the plan.
CHAPTER 5—PROTECTION PLANS On the Temporary Files screen, you can override the default Temporary Files folder location. The path specified is local to the server running the plan. The temporary files folder is the location used to build and stage objects before transfer to the store. By default the folder is located at C:\Documents and Settings\\Local Settings\Temp on the server being protected.
SCHEDULING PROTECTION PLANS Protection plans run on the computer as Windows Scheduled Tasks. When the Edit Schedule action for a plan is clicked, the standard Windows Task Scheduler is opened with some pre-filled settings for the plan. The Edit Schedule action allows you to run a protection plan as an alternate user. That is, a user account that is different from the user which is currently logged in to the computer where the software is installed.
CHAPTER 5—PROTECTION PLANS Schedule Action Settings Description Schedule Click the New button on the Schedule tab to edit the various scheduling fields. Use the Show multiple schedules option to set up multiple run times for the protection plan. You can create a single schedule for a plan that covers multiple days, times, and frequency of plan executions. The field Schedule Task specifies how often the scheduled task (your protection plan) runs.
RUNNING PROTECTION PLANS After creating a protection plan, the plan name and scheduling behavior that you specified is displayed in the Archive Manager. You can configure protection plans to run either as unscheduled or scheduled. An unscheduled plan can only be executed by clicking its Run action. A scheduled plan can be executed by waiting for the scheduled day and time to start the plan, or by clicking its Run action.
CHAPTER 5—PROTECTION PLANS The following table describes settings you can change specific to plan type.
Excluding File Types Your computer contains many types of files. The types of files may range from simple text files to word processing, spreadsheet, picture, project, music, video, and so on. When a protection plan runs for the first time, the software performs data compression and data deduplication on all the files specified by the protection plan and builds an index so that the current and subsequent plan runs will achieve the best data reduction possible. Some file formats do not compress well.
CHAPTER 5—PROTECTION PLANS REMOVING PROTECTION PLANS A protection plan can be removed by clicking its Delete Plan action. After clicking Delete Plan, you will be asked to confirm the action. From the confirmation dialog box, you can choose to delete the associated configuration file (this is checked by default) and the associated archive (this is not checked by default).
When the View Log link is opened, you will see a log file containing more detail. The log file includes statistics that require a couple of definitions: "Data reduction" - the ratio of "New and changed" data to the "Total stored" (total amount of data written to the disk for this run of the plan). "CCF Ratio" - the ratio of the "Protected data" (all of the data protected by the plan) to the "Total stored" (total amount of data written to the disk for this run of the plan).
CHAPTER 5—PROTECTION PLANS NOTES 70 1019662 PRODUCT MANUAL Preliminary
6 ARCHIVED DATA You can restore data from an archive, Local Plans folder, or protection plans configured for a remote computer by selecting the Restore action.
CHAPTER 6—ARCHIVED DATA FINDING A PROTECTION PLAN ARCHIVE TIME When you click on the protection plan (or archive) Restore action, a calendar showing the current day of the current month opens. Dates of the month that are in bold font are days when the protection plan has been run. Clicking on one of those dates will show the archive times that are available for that day. The Status column shows Available or Offline.
You can also perform a search for multiple files by entering characters along with a wildcard parameter. For example, you can search for word processing files by entering "*.doc" or search for spreadsheet files by entering "*.xls", and so on. You can narrow the search, using our "microsoft" example above, by entering "mic*.ppt", so that only filenames starting with "mic" and having the extension ".ppt" will be searched.
CHAPTER 6—ARCHIVED DATA EXPLORE A PLAN You can explore data from an archive, Local Plans folder, or protection plans configured for a remote computer by selecting the Restore action, selecting an archive time that is listed as Available in the Status column, and then clicking Explore at the bottom of the page. A Windows Explorer view of the archive recovery point appears. Click on the folder in the window just like you would in any Windows Explorer view and see your individual files.
Select the archive time you want to restore and the Explore and Restore buttons in the lower-right portion of the screen become active. Click Restore, and a Point in Time Restore dialog box appears. 2. Choose how to restore.
CHAPTER 6—ARCHIVED DATA Choose Missing files and files that are different if you want the restore operation to restore files that no longer exist in the folder (missing) and to replace files in the restore location regardless of whether the archived files are newer or older. You might choose this option if you are rebuilding a particular area of your hard disk. After choosing the options, click Restore, and the software will begin to restore the files.
To use the restored database files with Exchange, they must be recovered and reattached to the Exchange Server. For information on recovering and attaching databases to an Exchange Server, refer to the following links: http://technet.microsoft.com/en-us/library/aa998848(EXCHG.80).aspx http://support.microsoft.com/default.aspx/kb/824126 http://technet.microsoft.com/en-us/library/aa996168(EXCHG.65).
CHAPTER 6—ARCHIVED DATA NOTES 78 1019662 PRODUCT MANUAL Preliminary
A TROUBLESHOOTING To aid in troubleshooting, AccuGuard records its activity in log files and writes significant events to the Windows Application Event Log. See the Log Files section below for more information. See Remote Computer Connection Issues on page 81 for help with adding protection plans to remote computers. LOG FILES Two types of logs are used by AccuGuard Enterprise, internal component logs and protection plan logs.
APPENDIX A—TROUBLESHOOTING Log Type Description Plan logs Each time a plan is run, its results are appended to a log file: \Logs\.log. The most recent logging information can be found at the end of the file. By default only summary information is logged, but you can change the configuration Log Level setting to record more or less information. If a plan fails or completes with warnings, you should check its log file for details.
REMOTE COMPUTER CONNECTION ISSUES This section addresses the following scenario: In AccuGuard Enterprise, you add a remote computer that is a member of the domain. You are logged on to the AccuVault 1U with an account that has permission to connect to the remote computer from the network. After the remote computer is added, you click it and wait for communication to be established. Eventually, a yellow triangle appears in the remote computer icon.
APPENDIX A—TROUBLESHOOTING 2. Add the following exceptions to the firewall. Note: Some of these may not be listed for your firewall because this list was compiled from several different Windows operating systems. If the exception is listed on your computer, then add it as an exception to the firewall. If it is not listed, just continue to the next exception in the list below.
Test the WMI remote connection with WMI Tester. On the AccuVault 1U system, click Start, Run, then type WBEMTEST and try to connect to the remote computer by UNC path to the namespace, e.g. \\\root\cimv2 and click Connect. If you receive an error message, check that DCOM is running on the remote computer and check DCOM permissions with DCOMCNFG. Go to Start/Run and type dcomcnfg and click OK.
APPENDIX A—TROUBLESHOOTING NOTES 84 1019662 PRODUCT MANUAL Preliminary
B SPECIFICATIONS This appendix provides the following information about the AccuVault 1U: To view this information... go to...
APPENDIX B—SPECIFICATIONS PHYSICAL SPECIFICATIONS Dimensions (D x W x H) 650 mm x 437 mm x 43 mm (25.6 x 17.2 x 1.7 inches) Weight 19.1 kg (42 lbs.) Processor Intel Celeron E1500 2.20 GHz Memory 2 GB DDRII RAM HDD Capacity/Usable Capacity 4 TB (4 x 1TB)/2.5 TBa 8 TB (4 x 2 TB)/5.2 TBb HDD Configuration 4 x hot-swappable, RAID 5 LAN port 2 x Gigabit RJ-45 Ethernet port USB ports 2 x USB 2.
ENVIRONMENTAL SPECIFICATIONS Operating Temperature 10° to 35° C (50° to 95° F) Non-operating Temperature -40° to 70° C (-40° to 158° F) Operating Humidity 8% to 90% SEPTEMBER 2010 ACCUVAULT 1U Preliminary 87
APPENDIX B—SPECIFICATIONS NOTES 88 1019662 PRODUCT MANUAL Preliminary
C WARRANTY AND EULA INFORMATION This appendix provides the following warranty and license agreement information about the AccuVault 1U: Product Limited Warranty End User License Agreement (EULA) Basic End User License Agreement (EULA) Workgroup (AccuVault 1U-8TB only) SEPTEMBER 2010 ACCUVAULT 1U Preliminary 89
APPENDIX C—WARRANTY AND EULA INFORMATION PRODUCT LIMITED WARRANTY Tandberg Data Corporation (“Tandberg Data”) warrants to the original End User (“Purchaser”) that this computer product purchased from Tandberg Data or an authorized Tandberg Data dealer (“Product”) is free from manufacturing defects in material and workmanship for the applicable warranty period set forth below and as stated in the Product Specification, from the date of shipment to Tandberg Data's authorized dealer.
EXCEPT FOR THE EXPRESS WARRANTY STATED ABOVE, TANDBERG DATA MAKES NO OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED, WITH RESPECT TO THIS TANDBERG DATA PRODUCT. ALL IMPLIED WARRANTIES, INCLUDING THOSE OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE EXPRESSLY DISCLAIMED. TANDBERG DATA DOES NOT WARRANT THAT PRODUCT WILL MEET ALL OF PURCHASER'S REQUIREMENTS OR THAT OPERATION OF PRODUCTS WILL BE UNINTERRUPTED OR ERROR FREE.
APPENDIX C—WARRANTY AND EULA INFORMATION ADVANCED EXCHANGE SERVICE OPTION The ADvanced EXchange (ADEX) Service is available in many regions at no charge during the first year of the warranty period for customers needing a replacement unit at the time they receive a Return Material Authorization (RMA) number from Tandberg Data Service Support. See the Support section of the Tandberg Data web site (www.tandbergdata.com) for more details.
END USER LICENSE AGREEMENT — BASIC MICROSOFT SOFTWARE LICENSE TERMS WINDOWS STORAGE SERVER 2008 BASIC These license terms are an agreement between you and Tandberg Data. Please read them. They apply to the software included on this server. The software also includes any separate media on which you received the software. The software on this device includes software licensed from Microsoft Corporation or its affiliate.
APPENDIX C—WARRANTY AND EULA INFORMATION x x x x x x c. UDDI Services Windows Deployment Services Network File System (NFS) Distributed File System Replication (DFS-Replication) File Server Resource Manager iSCSI Target Limitation on Functions Supported by the Software. Tandberg Data licenses you to use the server software to support only the base functions as provided and installed on this server. You are not licensed to use the server to run or support i.
software you are using, and the language code of the device where you installed the software. Microsoft uses this information to make the Internet-based services available to you. x Windows Update Feature. You may connect new hardware to the device when you run the software. Your device may not have the drivers needed to communicate with that hardware. If so, the update feature of the software can obtain the correct driver from Microsoft and run it on your device. You can switch off this update feature.
APPENDIX C—WARRANTY AND EULA INFORMATION If you have questions about the VC-1 visual standard, please contact MPEG LA, L.L.C., 250 Steele Street, Suite 300, Denver, Colorado 80206; http://www.mpegla.com. 10. SECONDARY BOOT AND RECOVERY COPIES OF THE SOFTWARE. a. Secondary Boot Copy.
END USER LICENSE AGREEMENT — WORKGROUP (APPLIES TO 1U-8TB ONLY) MICROSOFT SOFTWARE LICENSE TERMS WINDOWS STORAGE SERVER 2008 WORKGROUP These license terms are an agreement between you and Tandberg Data. Please read them. They apply to the software included on this server. The software also includes any separate media on which you received the software. The software on this device includes software licensed from Microsoft Corporation or its affiliate.
APPENDIX C—WARRANTY AND EULA INFORMATION x x x c. Network Policy and Access Services UDDI Services Windows Deployment Services Limitation on Functions Supported by the Software. Tandberg Data licenses you to use the server software to support only the base functions as provided and installed on this server. You are not licensed to use the server to run or support i.
software can obtain the correct driver from Microsoft and run it on your device. You can switch off this update feature. x Digital Certificates. The software uses digital certificates. These digital certificates confirm the identity of Internet users sending X.509 standard encrypted information. The software retrieves certificates and updates certificate revocation lists. These security features operate only when you use the Internet. x Auto Root Update.
APPENDIX C—WARRANTY AND EULA INFORMATION If you have questions about the VC-1 visual standard, please contact MPEG LA, L.L.C., 250 Steele Street, Suite 300, Denver, Colorado 80206; http://www.mpegla.com. 9. SECONDARY BOOT AND RECOVERY COPIES OF THE SOFTWARE. a. Secondary Boot Copy.
INDEX A C AccuGuard Enterprise activating license keys 28 adding remote computers 29 adding stores 31 best practices 10 creating a local protection plan 34 creating protection plans 31 excluded files 4 features 3 in a domain environment 12 in a workgroup environment 12 obtaining license keys 27 user interface 6 using search bar to locate archived files 72 AccuVault configure Windows Storage Server 18 connecting via Remote Desktop 24 installation 17 to ?? network infrastructure 16 product limited warranty
INDEX L license keys activating 28 obtaining 27 log files, troubleshooting removing protection plans 68 removing storage 45 restoring Exchange storage groups 76 restoring protection plan files and folders restoring SQL Server databases 77 running a protection plan 65 79 M Microsoft Exchange protection plan 60 restoring files 76 Microsoft software license terms basic for Windows Storage Server 2008 93 workgroup for Windows Storage Server 2008 97 Microsoft SQL Server protection plan 61 restoring databases
INDEX T Tandberg Data, contacting iii troubleshooting log files 79 remote computer connections 81 U user interface overview 6 V verifying a store 52 viewing results 68 W warranty product limited warranty 90 product warranty caution iii Windows Storage Server basic end user license agreement 93 workgroup end user license agreement 97 Windows Storage Server, required settings 18 workgroup environment, running AccuGuard Enterprise 12 SEPTEMBER 2010 ACCUVAULT 1U Preliminary 103
INDEX Notes 104 1019662 PRODUCT MANUAL Preliminary