SlideShare a Scribd company logo
1 of 1457
Download to read offline
Symantec Backup Exec 15
Administrator's Guide
Documentation version: 15
Legal Notice
Copyright © 2015 Symantec Corporation. All rights reserved.
Last updated: February 5, 2015
Symantec, the Symantec Logo, the Checkmark Logo are trademarks or registered trademarks
of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may
be trademarks of their respective owners.
This Symantec product may contain third party software for which Symantec is required to
provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs
are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under those
open source or free software licenses. Please see the Third Party Legal Notice Appendix to
this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use, copying,
distribution, and decompilation/reverse engineering. No part of this document may be
reproduced in any form by any means without prior written authorization of Symantec
Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED
WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH
DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL
NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION
WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE
INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE
WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
Technical Support
Symantec Technical Support maintains support centers globally. Technical Support’s
primary role is to respond to specific queries about product features and functionality.
The Technical Support group also creates content for our online Knowledge Base.
The Technical Support group works collaboratively with the other functional areas
within Symantec to answer your questions in a timely fashion. For example, the
Technical Support group works with Product Engineering and Symantec Security
Response to provide alerting services and virus definition updates.
Symantec’s support offerings include the following:
■ A range of support options that give you the flexibility to select the right amount
of service for any size organization
■ Telephone and/or Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers software upgrades
■ Global support purchased on a regional business hours or 24 hours a day, 7
days a week basis
■ Premium service offerings that include Account Management Services
For information about Symantec’s support offerings, you can visit our website at
the following URL:
www.symantec.com/business/support/
All support services will be delivered in accordance with your support agreement
and the then-current enterprise technical support policy.
Contacting Technical Support
Customers with a current support agreement may access Technical Support
information at the following URL:
www.symantec.com/business/support/
Before contacting Technical Support, make sure you have satisfied the system
requirements that are listed in your product documentation. Also, you should be at
the computer on which the problem occurred, in case it is necessary to replicate
the problem.
When you contact Technical Support, please have the following information
available:
■ Product release level
■ Hardware information
■ Available memory, disk space, and NIC information
■ Operating system
■ Version and patch level
■ Network topology
■ Router, gateway, and IP address information
■ Problem description:
■ Error messages and log files
■ Troubleshooting that was performed before contacting Symantec
■ Recent software configuration changes and network changes
Licensing and registration
If your Symantec product requires registration or a license key, access our technical
support Web page at the following URL:
www.symantec.com/business/support/
Customer service
Customer service information is available at the following URL:
www.symantec.com/business/support/
Customer Service is available to assist with non-technical questions, such as the
following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and support contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs, DVDs, or manuals
Support agreement resources
If you want to contact Symantec regarding an existing support agreement, please
contact the support agreement administration team for your region as follows:
customercare_apac@symantec.comAsia-Pacific and Japan
semea@symantec.comEurope, Middle-East, and Africa
supportsolutions@symantec.comNorth America and Latin America
Technical Support ............................................................................................... 4
Chapter 1 Introducing Backup Exec 15 ............................................. 37
About Backup Exec ...................................................................... 37
How Backup Exec works ................................................................ 37
Chapter 2 Installation ........................................................................... 39
About the Backup Exec installation process and licensing options .......... 40
Backup Exec preinstallation checklist ............................................... 43
Running the Environment Check before installing or upgrading Backup
Exec .................................................................................... 44
Microsoft SQL Server 2008 Express Edition components installed with
Backup Exec ......................................................................... 46
Backup Exec’s standard features ..................................................... 47
System requirements for Backup Exec .............................................. 49
Installing Backup Exec by using the Installation Wizard ........................ 52
Installing additional Backup Exec options to the local Backup Exec
server .................................................................................. 62
Push-installing Backup Exec to remote computers .............................. 64
Methods for installing the Agent for Windows ..................................... 72
Push-installing the Agent for Windows to remote computers ............ 73
Installing updates to the Agent for Windows on remote
computers ....................................................................... 79
Installing the Agent for Windows in an Active Directory
network .......................................................................... 80
Using a command prompt to install the Agent for Windows on a
remote computer .............................................................. 84
Using a command script to install the Agent for Windows ................ 87
Installing the Remote Administrator ................................................. 88
Installing the Remote Administrator using the command line ........... 89
Running the Remote Administrator ............................................. 91
Installing Backup Exec using the command line (silent mode) ................ 94
Command line switches for silent mode installation of Backup
Exec .............................................................................. 94
Creating and using installation parameter files ............................ 103
Contents
Installing a trial version of Backup Exec agents and options ................. 104
About the installation log .............................................................. 104
Viewing the Installation Summary Report ......................................... 105
Repairing Backup Exec ................................................................ 106
Updating Backup Exec with LiveUpdate .......................................... 106
Viewing installed updates ............................................................. 109
Viewing license information ........................................................... 109
Backup Exec maintenance contract information ................................ 110
Updating expired maintenance contracts ................................... 110
Managing maintenance contract customer numbers .................... 111
About upgrading from previous versions of Backup Exec to Backup
Exec 15 .............................................................................. 111
Upgrade checklist for Backup Exec 2010 and earlier .................... 113
Using the Migration Report to determine how existing jobs changed
after an upgrade to Backup Exec 15 ................................... 115
Post-installation tasks .................................................................. 116
Uninstalling Backup Exec ............................................................. 117
Uninstalling Backup Exec using the command line ............................. 117
Uninstalling Backup Exec options from the local Backup Exec
server ................................................................................. 118
Chapter 3 Getting Started .................................................................. 120
About the Backup Exec Administration Console ................................ 120
Displaying the version information for Backup Exec ........................... 123
How to sort, filter, and copy information on the Backup Exec
Administration Console .......................................................... 123
Customizing views on the Backup Exec Administration Console ........... 125
Configuring the Home tab ............................................................. 126
Configuring the Symantec RSS Reader ........................................... 130
Creating a disaster preparation plan (DPP) ...................................... 131
Getting started with backups ......................................................... 133
Chapter 4 Backups ............................................................................... 136
How to prepare for your first backup with Backup Exec ....................... 138
Required user rights for backup jobs ............................................... 139
About the list of servers on the Backup and Restore tab ..................... 139
Adding servers that you want to back up to the list of servers on the
Backup and Restore tab ......................................................... 140
Removing servers from the list of servers on the Backup and Restore
tab ..................................................................................... 141
Creating a server group ............................................................... 142
Hiding or viewing server groups on the Backup and Restore tab ........... 143
8Contents
Adding servers to a server group ................................................... 143
Removing servers from a server group ............................................ 144
Editing a server group .................................................................. 144
Moving servers to the Retired Servers server group ........................... 145
Moving retired servers back to the All Servers server group ................. 146
Removing server groups from Backup Exec ..................................... 146
Backing up data ......................................................................... 146
How Backup Exec backs up and restores volumes that are enabled
for deduplication in Windows ............................................. 156
How Backup Exec backs up and restores Microsoft Virtual Hard
Disk (vhd) files ............................................................... 157
About selecting data to back up .................................................... 157
Changing the order in which backup sources are backed up ................ 163
Excluding files from backups ......................................................... 166
Including specific files with a backup job's backup selections ............... 169
About backing up critical system components ................................... 171
Backup Exec Shadow Copy Components file system ......................... 175
Backup methods in Backup Exec ................................................... 176
Configuring backup methods for backup jobs ................................... 184
How Backup Exec determines if a file has been backed up .................. 187
Configuring Backup Exec to automatically delete files after a
backup ............................................................................... 190
Configuring network options for backup jobs ..................................... 192
Running the next scheduled backup job before its scheduled
time ................................................................................... 193
Editing backup definitions ............................................................. 194
Testing credentials for backup sources ............................................ 199
Replacing the credentials for a backup source .................................. 200
Creating new credentials for a backup source ................................... 201
Deleting retired or unused backup sources from the Credentials
pane .................................................................................. 202
How job scheduling works in Backup Exec ....................................... 203
Including a specific date in the schedule for a backup job .................... 204
Preventing backup jobs from running on a specific date ...................... 206
Viewing all scheduled backup jobs on a calendar .............................. 207
Adding a stage to a backup definition .............................................. 207
Editing a stage ........................................................................... 209
Duplicating backup sets or a job history manually .............................. 209
Running a test run job manually ..................................................... 214
Verifying backed up data manually ................................................. 215
Copying data from a virtual tape library to a physical tape device using
DirectCopy to tape ................................................................ 217
9Contents
Chapter 5 Restores ............................................................................... 219
Methods for restoring data in Backup Exec ...................................... 220
Searching for data to restore ......................................................... 222
Restoring data from a server, a backup set, a backup job, or a storage
device ................................................................................ 222
Restoring file system data ............................................................ 226
Performing a complete online restore of a Microsoft Windows
computer ............................................................................ 227
Restoring System State ............................................................... 228
Installing a new Windows Server domain controller into an existing
domain by using a redirected restore ........................................ 230
Restoring Backup Exec Shadow Copy Components .......................... 232
Restoring utility partitions or Unified Extensible Firmware Interface
system partitions .................................................................. 233
About restoring encrypted data ...................................................... 234
About restoring NetWare SMS volume backups to non-SMS volumes
with Backup Exec ................................................................. 234
Canceling a restore job ................................................................ 234
How Backup Exec catalogs work ................................................... 235
Configuring default options for catalogs ..................................... 236
Cataloging backup sets ................................................................ 238
Chapter 6 Job management and monitoring .................................. 240
How to monitor and manage jobs in Backup Exec ............................. 240
About the Job Monitor .................................................................. 242
Viewing job activity details for active jobs ................................... 244
Canceling an active job .......................................................... 244
Holding jobs ........................................................................ 245
Removing the hold on jobs ..................................................... 246
Holding the job queue ............................................................ 247
Removing the hold on the job queue ......................................... 247
Running a scheduled job immediately ....................................... 248
Changing the priority for a scheduled job ................................... 249
Deleting scheduled jobs ......................................................... 250
About the Job History .................................................................. 251
Viewing the history of a job ..................................................... 252
Deleting a job from the Job History ........................................... 252
Running a job from the Job History ........................................... 253
Viewing the job log ..................................................................... 254
Finding text in the job log ........................................................ 254
Printing the job log ................................................................ 256
Saving the job log ................................................................. 256
10Contents
Linking from the job log to the Symantec Technical Support
website ......................................................................... 257
How to use job logs with vertical applications .............................. 257
Configuring default job log options ............................................ 258
Error-handling rules for failed or canceled jobs .................................. 259
Creating a custom error-handling rule ....................................... 260
Enabling or disabling error-handling rules .................................. 261
Deleting a custom error-handling rule ........................................ 261
Enabling an error-handling rule for a failed job ............................ 262
Custom error-handling rule for recovered jobs ............................ 262
About the cluster failover error-handling rule ............................... 263
List of job statuses in Backup Exec ................................................. 264
Setting job status and recovery options ........................................... 269
Chapter 7 Alerts and notifications .................................................... 272
Alerts and notifications in Backup Exec ........................................... 273
Where to find alerts in Backup Exec ............................................... 274
Enabling active alerts and alert history to display on the Home
tab ..................................................................................... 276
Active alerts properties .......................................................... 277
Viewing the alert history for a server or a storage device ..................... 278
Deleting an alert from alert history .................................................. 278
Copying alert text to a document or email ........................................ 279
Filtering alerts ............................................................................ 279
Viewing the job log from an alert .................................................... 280
Responding to active alerts ........................................................... 280
Clearing all informational alerts manually ......................................... 281
Setting up notification for alerts ...................................................... 281
Configuring email or text message notification for alerts ...................... 282
Adding recipients for notification .................................................... 284
Adding a recipient group for alert notifications ................................... 286
Removing a recipient from a group ........................................... 287
Disabling email or text message alert notification for a recipient ............ 287
Editing recipient notification properties ............................................ 288
Deleting recipients ...................................................................... 288
Configuring alert categories .......................................................... 289
Assigning recipients to receive notifications for specific alert
categories ........................................................................... 291
Sending a notification when a job completes .................................... 291
Notification options for jobs ..................................................... 292
Disabling notifications for a specific alert category ............................. 292
Configuring default alert settings .................................................... 293
11Contents
Enabling or disabling pop-up alerts ................................................. 294
SNMP traps for Backup Exec alerts ................................................ 295
Installing and configuring the SNMP system service ..................... 298
Installing the Windows Management Instrumentation performance
counter provider ............................................................. 298
Installing the Windows Management Instrumentation provider for
SNMP .......................................................................... 299
Uninstalling the Windows Management Instrumentation
performance counter provider ........................................... 299
Uninstalling the Windows Management Instrumentation provider
for SNMP ...................................................................... 299
Chapter 8 Disk-based and network-based storage ....................... 300
Features and types of disk-based storage and network-based
storage ............................................................................... 300
Storage trending statuses for disk storage and virtual disks ................. 303
Setting low disk space thresholds on disk-based storage .................... 304
Configuring disk storage ............................................................... 305
Changing the location of a disk storage device ............................ 307
Editing disk storage properties ................................................. 308
How to restore data from a reattached or reinserted disk-based storage
device ................................................................................ 314
Configuring disk cartridge storage .................................................. 315
Editing disk cartridge properties ............................................... 316
Editing disk cartridge media properties ...................................... 320
How data lifecycle management (DLM) deletes expired backup sets
on disk-based storage ........................................................... 322
Backup sets .............................................................................. 329
Changing the expiration date of backup sets on disk-based
storage ......................................................................... 332
Retaining backup sets on disk-based storage to prevent them
from expiring .................................................................. 333
Releasing retained backup sets on disk-based storage ................. 334
Viewing the contents or properties of backup sets ....................... 335
Chapter 9 Legacy backup-to-disk folders ........................................ 337
Legacy backup-to-disk folders ...................................................... 337
Changing the name or description of a legacy backup-to-disk
folder ........................................................................... 338
Changing the buffered read setting for a legacy backup-to-disk
folder ........................................................................... 338
Changing the location of a legacy backup-to-disk folder ................ 339
12Contents
Recreating a legacy backup-to-disk folder and its contents ............ 340
Restoring data from a legacy backup-to-disk folder ...................... 340
Chapter 10 Tape storage ....................................................................... 343
Support for tape drives and robotic libraries ...................................... 344
About the Virtual Tape Library Unlimited Drive Option ........................ 345
About the Library Expansion Option ............................................... 345
Adding or replacing devices with the Hot-swappable Device
Wizard ................................................................................ 345
Installing Symantec tape device drivers .......................................... 347
Editing tape drive properties .......................................................... 348
Viewing tape drive statistics .......................................................... 353
Robotic libraries in Backup Exec .................................................... 353
Requirements for setting up robotic library hardware .................... 354
Inventorying robotic libraries when Backup Exec services
start ............................................................................. 355
Configuring barcode rules for a robotic library ............................ 355
Initializing a robotic library when the Backup Exec service
starts ............................................................................ 359
Defining a cleaning slot ......................................................... 360
Editing robotic library properties ............................................... 360
Creating robotic library partitions .................................................... 361
Changing the name of a robotic library partition ........................... 363
Adding or removing tape drives in a robotic library partition ........... 363
Reassigning a slot base number for robotic libraries ..................... 363
Editing robotic library slot properties ......................................... 364
Removing or reconfiguring robotic library partitions ...................... 365
Managing tapes ......................................................................... 366
Default media sets ................................................................ 367
Overwrite protection periods and append periods in media
sets ............................................................................. 370
Creating media sets for tapes .................................................. 374
Changing the overwrite protection period or the append period for
a media set ................................................................... 377
Changing the name and description of a media set ...................... 379
Changing the media vault or vaulting periods for a media set
................................................................................... 379
Deleting a media set .............................................................. 380
Renaming a media set ........................................................... 380
Media overwrite protection levels for tape media ......................... 380
Overwriting allocated or imported tape media ............................. 381
13Contents
How Backup Exec searches for overwritable media in tape drives
................................................................................... 381
Viewing tapes that are used by a job ......................................... 384
Labeling tape media .................................................................... 384
About labeling imported tape media ......................................... 386
How barcode labels become media labels for tapes ..................... 386
Renaming a tape media label ................................................. 387
How WORM media is used in Backup Exec ..................................... 387
Default media vaults .................................................................... 388
Changing the name or description of a media vault ...................... 389
Creating media vault rules to move tape media to and from media
vaults ........................................................................... 390
Updating the tape media location in media vaults ........................ 391
Deleting a media vault ........................................................... 391
Moving tape media to a vault ................................................... 392
Retiring damaged tape media ....................................................... 392
Deleting tape media .................................................................... 393
Erasing tape or disk cartridge media ............................................... 393
About cataloging tape or disk cartridge media that contains encrypted
backup sets ......................................................................... 395
Associating tape media with a media set ......................................... 395
Editing tape media properties ........................................................ 396
Tape media rotation strategies ....................................................... 398
Chapter 11 Storage device pools ......................................................... 402
Creating storage device pools ....................................................... 402
Specifying a default selection method for a device in a storage device
pool ................................................................................... 405
Viewing jobs, job histories, and active alerts for a storage device
pool ................................................................................... 405
Adding or removing devices in a storage device pool ......................... 406
Chapter 12 Storage operations ............................................................ 407
About storage operation jobs ......................................................... 408
Storage tab overview in Backup Exec ............................................. 409
Using the Configure Storage wizard ................................................ 412
Viewing details for multiple storage devices ...................................... 415
Sending a notification when a scheduled storage operation job
completes ........................................................................... 416
Scheduling a storage operation job ................................................ 416
Editing global settings for storage ................................................... 423
Sharing storage devices ............................................................... 432
14Contents
Deleting a storage device ............................................................. 433
Changing the state of a storage device to online ............................... 434
Renaming a storage device .......................................................... 434
Viewing jobs, job histories, backup sets, and active alerts for storage
devices ............................................................................... 435
Cataloging a storage device .......................................................... 435
Scanning a storage device ........................................................... 436
Inventorying a storage device ........................................................ 437
Inventorying and cataloging a storage device ................................... 438
Pausing and unpausing a storage device ......................................... 438
Disabling and enabling a storage device .......................................... 439
Initializing a robotic library ............................................................ 439
Formatting a tape as a WORM tape ................................................ 440
Retensioning a tape .................................................................... 440
Formatting a tape in a tape drive .................................................... 440
Ejecting media from a disk cartridge or tape drive .............................. 441
Cleaning a robotic library drive ...................................................... 442
Importing media to Backup Exec ................................................... 443
Exporting media and expired media ................................................ 450
Locking and unlocking the robotic library’s front portal ........................ 453
Backup Exec server and storage device states ................................. 459
Chapter 13 Conversion to virtual machines ...................................... 463
How conversion of physical computers to virtual machines works in
Backup Exec ....................................................................... 463
Requirements for conversion to virtual machine jobs .......................... 471
Converting to a virtual machine simultaneously with a backup job ......... 472
Converting to a virtual machine after a backup job ............................. 477
Adding a conversion to virtual machine stage to a backup job .............. 483
Converting to a virtual machine from a point in time ........................... 488
Creating a one-time conversion to a virtual machine .......................... 490
Setting default options for conversion to virtual machine jobs ............... 494
Chapter 14 Configuration and settings .............................................. 498
Changing default backup job settings .............................................. 500
Configuring schedules for backup jobs ............................................ 504
Configuring storage options for backup jobs ..................................... 512
Configuring automatic test run jobs for backup jobs ........................... 518
Configuring automatic verify operations for backup jobs ...................... 519
Configuring delayed catalog operations to improve backup
performance ........................................................................ 521
Configuring Advanced Open File options for backup jobs .................... 525
15Contents
Configuring checkpoint restart ....................................................... 528
Configuring Backup Exec to work with Symantec Endpoint
Protection ........................................................................... 530
Configuring pre/post commands for backup jobs ............................... 532
Configuring file and folder options for backup jobs ............................. 537
Setting default schedule options for rule-based jobs and run now
jobs ................................................................................... 544
Excluding dates from the backup schedule for all backups .................. 547
Removing dates from the list of excluded dates ................................. 549
Exporting a list of dates that are excluded from all backups to another
server ................................................................................. 550
Changing the default preferences .................................................. 550
Configuring the default setting for backing up multiple servers or
applications ......................................................................... 551
Configuring database maintenance and security ............................... 552
Exporting the Backup Exec Database encryption key ......................... 555
Refreshing Backup Exec Database encryption keys ........................... 557
Configuring encryption for the connection to the Backup Exec
Database ............................................................................ 558
Scheduling Backup Exec to check logon accounts ............................. 562
Configuring Backup Exec to discover data to back up ......................... 563
Adding discovered servers to the list of servers in Backup Exec ........... 565
Backup networks ........................................................................ 566
Changing network and security options for Backup Exec ..................... 568
Using Backup Exec with firewalls ................................................... 570
Backup Exec ports ................................................................ 572
Backup Exec listening ports .................................................... 574
About enabling a SQL instance behind a firewall ......................... 575
Using encryption with Backup Exec ................................................ 575
Encryption key management ......................................................... 578
Creating encryption keys .............................................................. 579
Replacing an encryption key ......................................................... 581
Deleting encryption keys .............................................................. 582
Granular Recovery Technology ...................................................... 583
Setting default Granular Recovery Technology (GRT) options .............. 589
DBA-initiated job templates ........................................................... 590
Creating DBA-initiated job templates ............................................... 591
Editing DBA-inititated job templates ................................................ 592
Deleting DBA-initiated job templates ............................................... 592
Storage options for DBA-initiated jobs ....................................... 593
General options for DBA-initiated jobs ....................................... 598
Network options for DBA-initiated jobs ...................................... 598
Duplicate job settings for DBA-initiated jobs ............................... 599
16Contents
Backup Exec logon accounts ........................................................ 603
Creating a Backup Exec logon account ..................................... 605
Editing a Backup Exec logon account ....................................... 607
Changing the password for a Backup Exec logon account ............. 609
Replacing a Backup Exec logon account ................................... 609
Deleting a Backup Exec logon account ...................................... 610
Changing your default Backup Exec logon account ...................... 611
Creating a new Backup Exec System Logon Account ................... 612
Copying logon account information to another Backup Exec
server ........................................................................... 613
Testing logon accounts .......................................................... 613
Starting and stopping Backup Exec services .................................... 614
Changing the credentials for a service account ................................. 614
Changing startup options for Backup Exec services ........................... 616
Configuring audit logs .................................................................. 617
Viewing the audit log ................................................................... 618
Removing entries from the audit log ................................................ 618
Saving an audit log to a text file ..................................................... 619
Copying configuration settings to another Backup Exec server ............. 619
Viewing server properties ............................................................. 620
Chapter 15 Reports ................................................................................ 622
Reports in Backup Exec ............................................................... 622
Running a report now .................................................................. 624
Scheduling a report ..................................................................... 624
Creating a custom report .............................................................. 626
Adding or removing fields on a custom report ............................. 630
Changing filters for a custom report .......................................... 631
Changing the way data is grouped or sorted in a custom
report ........................................................................... 633
Changing graph options in custom reports ................................. 634
Previewing custom reports ...................................................... 634
Copying a custom report ........................................................ 635
Saving a report ........................................................................... 635
Printing a report from the Backup Exec Report Viewer ........................ 636
Viewing completed reports ............................................................ 636
Editing a report ........................................................................... 637
Re-running a completed report ...................................................... 637
Deleting a report ........................................................................ 637
Setting defaults for standard and custom reports ............................... 638
Viewing report properties .............................................................. 639
List of Backup Exec standard reports .............................................. 640
17Contents
Alert History report ................................................................ 645
Alert History By Backup Exec Server report ................................ 646
Archive Job Success Rate report ............................................. 646
Archive Selections by Archive Rules and Retention Categories
report ........................................................................... 647
Audit Log report .................................................................... 648
Backup Job Success Rate report ............................................. 648
Backup Recommendations report ............................................ 648
Backup Resource Success Rate report ..................................... 649
Backup Sets by Media Set report ............................................. 649
Backup Size By Resource report .............................................. 650
Daily Device Utilization report .................................................. 651
Deduplication Device Summary report ...................................... 652
Deduplication Summary report ................................................ 653
Device Summary report ......................................................... 653
Disk Storage Summary report ................................................. 654
Error-Handling Rules report .................................................... 655
Event Recipients report .......................................................... 656
Exchange Mailbox Group Archive Settings report ........................ 657
Failed Archive Jobs report ...................................................... 657
Failed Backup Jobs report ...................................................... 658
File System Archive Settings report .......................................... 659
Jobs Summary report ............................................................ 659
Managed Backup Exec Servers report ...................................... 660
Media Audit report ................................................................ 662
Media Errors report ............................................................... 663
Media Required for Recovery report ......................................... 663
Media Summary report .......................................................... 664
Media Vault Contents report .................................................... 664
Move Media to Vault report ..................................................... 665
Operations Overview report .................................................... 666
Overnight Archive Summary report ........................................... 668
Overnight Summary report ...................................................... 669
Problem Files report .............................................................. 670
Recently Written Media report ................................................. 671
Resource Protected Recently report ......................................... 671
Resource Risk Assessment report ............................................ 672
Restore Set Details by Resource report ..................................... 673
Retrieve Media from Vault report .............................................. 673
Robotic Library Inventory report ............................................... 674
Scheduled Server Workload report ........................................... 675
Scratch Media Availability report .............................................. 675
Test Run Results report .......................................................... 676
18Contents
Vault Store Usage Details report .............................................. 677
Vault Store Usage Summary report .......................................... 678
Chapter 16 Troubleshooting Backup Exec ........................................ 679
Troubleshooting hardware-related issues in Backup Exec ................... 680
How to get more information about alerts and error messages ............. 684
Troubleshooting backup issues in Backup Exec ................................ 684
Troubleshooting failed components in the SAN ................................ 687
Troubleshooting offline storage devices in a SAN ....................... 687
Finding hardware errors in a SAN ............................................ 689
Resetting the SAN ................................................................ 690
Bringing storage devices online after an unsafe device removal
event in a SAN ............................................................... 691
How to improve Backup Exec's performance .................................... 691
Accessing Symantec Online .......................................................... 692
Searching the Symantec Knowledge Base ....................................... 693
Contacting Backup Exec Technical Support ..................................... 693
Using Symantec Remote Assistance .............................................. 694
Managing your Backup Exec support cases ..................................... 694
About Backup Exec diagnostic tools ............................................... 694
Running the Symantec Help Tool (SymHelp) .................................... 695
Generating a diagnostic file for troubleshooting Backup Exec ............... 696
Command line switches for a diagnostic file ............................... 697
Running the begather utility to troubleshoot Backup Exec components
on Linux servers ................................................................... 700
Using the Backup Exec Debug Monitor for troubleshooting .................. 701
About the Backup Exec debug tool ................................................. 701
Chapter 17 Using Backup Exec in cluster environments ................ 702
About Backup Exec and clusters .................................................... 703
Requirements for clustering Backup Exec in a Microsoft Cluster Server
environment ........................................................................ 703
How Backup Exec works in a Microsoft Cluster Server
environment ........................................................................ 705
Requirements for installing Backup Exec on a Microsoft Cluster
Server ................................................................................ 705
Installing Backup Exec on a Microsoft Cluster Server ........................ 707
Upgrading Backup Exec on a Microsoft cluster ................................. 708
Installing additional Backup Exec options on a Microsoft cluster .......... 708
Uninstalling Backup Exec from a Microsoft cluster ............................. 709
Creating storage device pools for Microsoft Cluster Servers ................ 709
Specifying a different failover node ................................................. 710
19Contents
Designating a new central administration server in a Microsoft Cluster
Server ................................................................................ 711
Configurations for Backup Exec and Microsoft Cluster Servers ............. 713
Two-node cluster with locally attached storage devices ................. 714
Two-node cluster with tape devices on a shared SCSI bus ............ 715
Configuring a shared SCSI bus for tape devices .......................... 716
Multi-node clusters on a fibre channel SAN with the Central Admin
Server Option ................................................................ 718
Using the Central Admin Server Option with Microsoft clusters and a
storage area network ............................................................. 719
About backing up Microsoft Cluster Servers ..................................... 720
About restoring data to a Microsoft cluster ....................................... 721
Disaster recovery of a cluster ........................................................ 721
Using Simplified Disaster Recovery to prepare for disaster recovery
of a cluster .................................................................... 722
Recovering nodes on the cluster using Simplified Disaster
Recovery ...................................................................... 723
Recovering Backup Exec on a Microsoft cluster using Simplified
Disaster Recovery .......................................................... 724
Recovering the entire cluster using a manual disaster recovery
procedure ..................................................................... 724
Restoring the Microsoft Cluster Server data files ............................... 725
Recovering all shared disks in a Microsoft cluster .............................. 726
Recovering Backup Exec in a Microsoft cluster ................................. 727
Changing the Quorum disk signature for clusters on Windows Server
2003 .................................................................................. 727
Manually joining two cluster disk groups and resynchronizing
volumes .............................................................................. 728
Troubleshooting clusters .............................................................. 728
Chapter 18 Simplified Disaster Recovery .......................................... 730
About Simplified Disaster Recovery ................................................ 730
Requirements for using Simplified Disaster Recovery ........................ 731
Preparing computers for use with Simplified Disaster Recovery ............ 734
How to ensure that backups are enabled for Simplified Disaster
Recovery ............................................................................ 738
How Simplified Disaster Recovery uses disaster recovery information
files .................................................................................... 740
Setting or changing the alternate location for the disaster recovery
information file ..................................................................... 742
Changing the default path for the disaster recovery information
files .............................................................................. 743
20Contents
Disaster recovery information file data paths .............................. 743
Creating a Simplified Disaster Recovery disk image ........................... 745
Contents of the Simplified Disaster Recovery disk image .............. 755
User scenarios when a user starts the Create Recovery Disk
Wizard .......................................................................... 756
Preparing to recover from a disaster by using Simplified Disaster
Recovery ............................................................................ 757
Hardware replacement during disaster recovery .......................... 758
Prepare to recover IBM computers with Simplified Disaster
Recovery ...................................................................... 759
Recovering a computer with Simplified Disaster Recovery ................... 760
Recovery notes for using Simplified Disaster Recovery with storage
pools and storage spaces ................................................. 766
Recovery notes for using Simplified Disaster Recovery with
Exchange, SQL, SharePoint, CASO, Hyper-V hosts, and the
Deduplication Option ....................................................... 769
Advanced Disk Configuration on the Recover This Computer
Wizard ................................................................................ 770
Appendix A Symantec Backup Exec Agent for Windows ................. 774
About the Agent for Windows ........................................................ 774
Requirements for the Agent for Windows ......................................... 775
Stopping and starting the Agent for Windows .................................... 776
Establishing a trust between the Backup Exec server and a remote
computer ............................................................................ 777
About the Backup Exec Agent Utility for Windows .............................. 777
Starting the Backup Exec Agent Utility ...................................... 778
Viewing the activity status of the remote computer in the Backup
Exec Agent Utility ........................................................... 779
Viewing the activity status of the remote computer from the system
tray .............................................................................. 779
Starting the Backup Exec Agent Utility automatically on the remote
computer ...................................................................... 780
Setting the refresh interval on the remote computer ..................... 780
About publishing the Agent for Windows to Backup Exec
servers ......................................................................... 781
Adding Backup Exec servers that the Agent for Windows can
publish to ...................................................................... 781
Editing Backup Exec server information that the Agent for Windows
publishes to ................................................................... 782
Removing Backup Exec servers that the Agent for Windows can
publish to ...................................................................... 783
21Contents
Configuring database access for Oracle operations ..................... 784
Removing a security certificate for a Backup Exec server that has
a trust with the Agent for Windows ..................................... 786
Using the Backup Exec Agent Utility Command Line Applet ................. 786
Backup Exec Agent Utility Command Line Applet switches .................. 787
Appendix B Symantec Backup Exec Deduplication Option ............ 791
About the Deduplication Option ..................................................... 792
Deduplication methods for Backup Exec agents ................................ 794
Requirements for the Deduplication Option ...................................... 795
Installing the Deduplication Option ................................................. 800
Configuring an OpenStorage device ............................................... 801
Editing the properties of an OpenStorage device ............................... 803
Specifying a Backup Exec server that has proximity to a shared
OpenStorage device ............................................................. 805
Creating or importing deduplication disk storage ............................... 806
Editing the properties of a deduplication disk storage device .......... 808
Changing the password for the logon account for deduplication
disk storage ................................................................... 813
Selecting storage devices for direct access sharing ........................... 814
Editing server properties for direct access .................................. 815
Changing the location of a deduplication disk storage device ............... 816
Sharing a deduplication device between multiple Backup Exec
servers ............................................................................... 818
How to use client-side deduplication ............................................... 818
How to set up backup jobs for deduplication ..................................... 819
Using optimized duplication to copy deduplicated data between
OpenStorage devices or deduplication disk storage devices .......... 820
Copying deduplicated data to tapes ................................................ 823
Using deduplication with encryption ................................................ 823
Restoring a deduplication disk storage device or deduplicated
data ................................................................................... 824
Disaster recovery of deduplication disk storage devices ..................... 824
Disaster recovery of OpenStorage devices ....................................... 825
Appendix C Symantec Backup Exec Agent for VMware ................... 827
About the Agent for VMware ......................................................... 827
Requirements for using the Agent for VMware .................................. 828
Using the Agent for VMware with Windows Server 2012 ..................... 829
About installing the Agent for VMware ............................................. 830
Adding VMware vCenter Servers and ESX/ESXi hosts to the list of
servers on the Backup and Restore tab ..................................... 830
22Contents
Viewing details about VMware resources ......................................... 831
Installing the Agent for Windows on VMware virtual machines .............. 832
Push-installing the Agent for Windows to VMware virtual
machines ............................................................................ 833
Backing up VMware data .............................................................. 834
Setting default backup options for virtual machines ...................... 839
How Backup Exec automatically backs up new VMware virtual
machines during a backup job .......................................... 843
Using Granular Recovery Technology (GRT) with the Agent for
VMware ........................................................................ 843
How delayed cataloging works with VMware virtual machine
backups ........................................................................ 846
Restoring VMware virtual machines and vmdk files ............................ 848
Appendix D Symantec Backup Exec Agent for Microsoft
Hyper-V .......................................................................... 855
About the Agent for Microsoft Hyper-V ............................................ 855
Requirements for using the Agent for Microsoft Hyper-V ..................... 857
About installing the Agent for Microsoft Hyper-V ................................ 859
Using the Agent for Hyper-V with Windows Server 2012/2012 R2 ......... 860
Disk space optimization with the Agent for Hyper-V ........................... 863
Adding a Hyper-V host to the list of servers on the Backup and Restore
tab ..................................................................................... 864
Viewing details about Hyper-V resources ......................................... 865
Installing the Agent for Windows on Hyper-V virtual machines .............. 866
Push-installing the Agent for Windows to Hyper-V virtual
machines ............................................................................ 867
Backing up Microsoft Hyper-V virtual machines ................................. 868
Setting default backup options for Hyper-V ................................. 873
How Backup Exec automatically protects new virtual machines
during a backup job ......................................................... 875
Using Granular Recovery Technology (GRT) with the Agent for
Hyper-V ........................................................................ 876
About backing up and restoring highly available Hyper-V virtual
machines ...................................................................... 878
How delayed cataloging works with Hyper-V virtual machine
backups ........................................................................ 878
Restoring Microsoft Hyper-V virtual machines ................................... 880
23Contents
Appendix E Symantec Backup Exec Agent for Microsoft SQL
Server ............................................................................. 885
About the Agent for Microsoft SQL Server ........................................ 885
Requirements for using the SQL Agent ........................................... 887
About installing the SQL Agent ...................................................... 888
Backup strategies for SQL ............................................................ 888
Adding SQL Servers to the list of servers on the Backup and Restore
tab ..................................................................................... 890
Configuring Backup Exec to run a consistency check before every SQL
backup ............................................................................... 890
Using snapshot technology with the SQL Agent ................................ 891
Using database snapshots for SQL Server ....................................... 892
Backing up SQL databases and transaction logs ............................... 894
Setting default backup options for SQL Server ............................ 906
Restoring SQL databases and transaction logs ................................. 916
Restoring the SQL master database ......................................... 918
Restarting SQL using database copies ...................................... 919
Disaster recovery of a SQL Server ................................................. 921
Manual recovery of a SQL Server ............................................ 923
Appendix F Symantec Backup Exec Agent for Microsoft
Exchange Server .......................................................... 924
About the Backup Exec Exchange Agent ......................................... 925
Requirements for using the Exchange Agent .................................... 926
Granting permissions on the Exchange Server to enable database
backups and restores, and Granular Recovery Technology
operations ........................................................................... 930
About installing the Exchange Agent ............................................... 934
Adding Exchange Servers and database availability groups to the list
of servers on the Backup and Restore tab .................................. 935
Managing preferred server configurations for Microsoft Exchange
Database Availability Groups .................................................. 935
Recommended configurations for Exchange .................................... 938
Requirements for accessing Exchange mailboxes ............................ 939
Backup strategies for Exchange ..................................................... 940
How Granular Recovery Technology works with the Exchange
Information Store ................................................................. 942
Snapshot and offhost backups with the Exchange Agent ..................... 944
Backing up Exchange data ........................................................... 946
Setting default backup options for Exchange Server ..................... 952
Restoring Exchange data ............................................................. 957
24Contents
Disaster recovery of an Exchange Server ........................................ 963
Appendix G Symantec Backup Exec Agent for Microsoft
SharePoint .................................................................... 965
About the Agent for Microsoft SharePoint ........................................ 966
About installing the Agent for Microsoft SharePoint ............................ 966
Requirements for the Agent for Microsoft SharePoint ......................... 966
Using the Agent for Microsoft SharePoint with SharePoint Server
2010/2013 and SharePoint Foundation 2010/2013 ...................... 967
Using the Agent for Microsoft SharePoint with SharePoint Server 2007
and Windows SharePoint Services 3.0 ...................................... 968
Adding a Microsoft SharePoint server farm to the list of servers on the
Backup and Restore tab ......................................................... 969
Backing up Microsoft SharePoint data ............................................. 969
Setting default backup options for SharePoint ............................. 973
Restoring Microsoft SharePoint data ............................................... 976
Disabling or enabling communication between a Microsoft SharePoint
web server and Backup Exec .................................................. 978
Viewing or changing SharePoint farm properties ............................... 979
Disaster recovery of Microsoft SharePoint 2010/2013 data .................. 980
Disaster recovery of Microsoft SharePoint 2007 data ......................... 984
Appendix H Symantec Backup Exec Agent for Oracle on
Windows or Linux Servers ......................................... 987
About the Backup Exec Oracle Agent ............................................. 987
About installing the Oracle Agent ................................................... 988
Configuring the Oracle Agent on Windows computers and Linux
servers ............................................................................... 989
Configuring an Oracle instance on Windows computers ................ 990
Viewing an Oracle instance on Windows computers ..................... 994
Editing an Oracle instance on Windows computers ...................... 995
Deleting an Oracle instance on Windows computers .................... 996
Enabling database access for Oracle operations on Windows
computers ..................................................................... 996
Configuring an Oracle instance on Linux servers ......................... 999
Viewing an Oracle instance on Linux servers ............................ 1001
Editing an Oracle instance on Linux servers ............................. 1002
Deleting an Oracle instance on Linux servers ............................ 1002
Enabling database access for Oracle operations on Linux
servers ....................................................................... 1003
About authentication credentials on the Backup Exec server .............. 1004
25Contents
Setting authentication credentials on the Backup Exec server for
Oracle operations ......................................................... 1005
Deleting an Oracle server from the Backup Exec server’s list of
authentication credentials ............................................... 1006
About Oracle instance information changes .................................... 1007
About backing up Oracle databases .............................................. 1007
About backing up Oracle RAC databases ................................. 1009
About performing a DBA-initiated backup job for Oracle .............. 1010
Oracle backup options ......................................................... 1011
About restoring Oracle resources ................................................. 1012
About DBA-initiated restore for Oracle ..................................... 1015
Oracle restore options ......................................................... 1016
About redirecting a restore of Oracle data ................................ 1016
Oracle advanced restore options ........................................... 1017
Performing a redirect restore of an Oracle 12c database using
Backup Exec ............................................................... 1018
Requirements for recovering the complete Oracle instance and
database using the original Oracle server ........................... 1022
Recovering the complete Oracle instance and database using the
original Oracle server ..................................................... 1022
Requirements for recovering the complete Oracle instance or
database to a computer other than the original Oracle
server ......................................................................... 1023
Recovering the complete Oracle instance or database to a
computer other than the original Oracle server .................... 1024
Best practices for Backup Exec 15 Agent for Oracle on Windows or
Linux Servers ..................................................................... 1025
Appendix I Symantec Backup Exec Agent for Enterprise
Vault ............................................................................. 1028
About the Agent for Enterprise Vault ............................................. 1028
Requirements for the Enterprise Vault Agent ................................... 1032
About installing the Enterprise Vault Agent ..................................... 1033
About backup methods for Enterprise Vault backup jobs ................... 1033
Enterprise Vault backup options ............................................. 1036
About backing up Enterprise Vault components ............................... 1037
About consistency checks for Enterprise Vault databases and
Compliance and Discovery Accelerator databases ..................... 1040
Restoring Enterprise Vault .......................................................... 1040
Enterprise Vault restore options ............................................. 1042
About restoring individual files and folders with the Enterprise
Vault Agent .................................................................. 1045
26Contents
About automatic redirection of Enterprise Vault components under
an Enterprise Vault server ............................................... 1045
Redirecting a restore for an Enterprise Vault component ............. 1046
Configuring Enterprise Vault to use the name of the new SQL Server
that holds the Directory database ........................................... 1048
Best practices for the Enterprise Vault Agent .................................. 1050
About the Backup Exec Migrator for Enterprise Vault ........................ 1050
Backup Exec Migrator for Enterprise Vault requirements ............. 1051
How the Backup Exec Migrator works ..................................... 1051
About using staged migrations with Backup Exec and the Backup
Exec Migrator ............................................................... 1055
About Backup Exec Migrator events ........................................ 1056
About Backup Exec Migrator logs ........................................... 1056
About deleting files migrated by Backup Exec Migrator ............... 1057
Configuring the Backup Exec Migrator ..................................... 1058
About viewing migrated Enterprise Vault data ........................... 1066
About retrieving migrated Enterprise Vault data ......................... 1067
About the Partition Recovery Utility ......................................... 1068
Enterprise Vault logon account ..................................................... 1071
Enterprise Vault options .............................................................. 1072
Appendix J Symantec Backup Exec Agent for Lotus
Domino ......................................................................... 1073
About the Agent for Lotus Domino Server ...................................... 1074
Lotus Domino Agent requirements ................................................ 1074
About installing the Lotus Domino Agent on the Backup Exec
server ............................................................................... 1076
About the Lotus Domino Agent and the Domino Attachment and Object
Service (DAOS) .................................................................. 1076
Best practices for restoring the missing .nlo files ........................ 1077
Viewing Lotus Domino databases ................................................ 1078
About backing up Lotus Domino databases .................................... 1078
About selecting backup options for Lotus Domino databases ....... 1080
Lotus Domino Agent backup options ....................................... 1080
About automatic exclusion of Lotus Domino files during
volume-level backups .................................................... 1081
About supported Lotus Domino database configurations ............. 1081
About Lotus Domino transaction logs ...................................... 1082
About restoring Lotus Domino databases ....................................... 1083
Restoring Lotus Domino databases ........................................ 1084
Lotus Domino Agent restore options ....................................... 1086
About redirecting restore jobs for Lotus Domino databases .......... 1088
27Contents
About redirecting the restore of DAOS NLO files ........................ 1089
How to prepare for disaster recovery on a Lotus Domino server .......... 1089
Recovering a Lotus Domino server from a disaster .......................... 1089
About disaster recovery of a Lotus Domino server using archive
logging ............................................................................. 1091
Disabling the monitor change journal ............................................ 1091
Recovering the Lotus Domino server, databases, and transaction logs
when archive logging is enabled ............................................ 1092
Re-enabling the monitor change journal ......................................... 1093
Recovering a Lotus Domino server that uses circular logging ............. 1094
Appendix K Symantec Backup Exec Agent for Microsoft Active
Directory ...................................................................... 1096
About the Agent for Microsoft Active Directory ................................. 1096
Requirements for the Agent for Microsoft Active Directory ................. 1097
About backing up Active Directory and ADAM/AD LDS ..................... 1098
Editing options for Active Directory and ADAM/AD LDS backup
jobs ............................................................................ 1099
Microsoft Active Directory backup job options ........................... 1101
About restoring individual Active Directory and ADAM/AD LDS
objects .............................................................................. 1102
Appendix L Symantec Backup Exec Central Admin Server
Option ........................................................................... 1105
About the Central Admin Server Option ......................................... 1106
Requirements for installing CASO ................................................ 1108
How to choose the location for CASO storage and media data .......... 1109
About installing the Central Admin Server Option ............................. 1111
Push-installing a managed Backup Exec server from the central
administration server ..................................................... 1112
Managed Backup Exec Server Configuration options .................. 1118
Installing a managed Backup Exec server across a firewall ......... 1119
Upgrading an existing CASO installation ........................................ 1122
Changing a Backup Exec server to a central administration
server ............................................................................... 1124
Changing a Backup Exec server to a managed Backup Exec
server ............................................................................... 1125
Deleting a managed Backup Exec server from a CASO
environment ....................................................................... 1128
Renaming a central administration server ....................................... 1130
Renaming a managed Backup Exec server .................................... 1130
28Contents
How to reduce network traffic in CASO .......................................... 1132
CASO distributed, centralized, and replicated catalog locations .......... 1132
Changing the settings for a managed Backup Exec server ................. 1134
What happens when CASO communication thresholds are
reached ............................................................................ 1145
Enabling or disabling communications between the managed
Backup Exec server and the central administration
server ......................................................................... 1146
Alerts and notifications in CASO ................................................... 1146
Enabling managed Backup Exec servers to use any available network
interface card .................................................................... 1147
About job delegation in CASO ..................................................... 1148
About copying jobs instead of delegating jobs in CASO ............... 1148
About adding storage devices in a CASO environment ..................... 1149
How data lifecycle management (DLM) works in a CASO
environment ....................................................................... 1149
Obtaining media audit information for a managed Backup Exec
server ............................................................................... 1150
How to use Backup Exec server pools in CASO ............................. 1150
Selecting a Backup Exec server pool for backups ...................... 1151
Creating a Backup Exec server pool ....................................... 1152
Adding managed Backup Exec servers to a Backup Exec server
pool ........................................................................... 1152
Deleting a Backup Exec server pool ........................................ 1153
Removing a managed Backup Exec server from a Backup Exec
server pool .................................................................. 1153
How centralized restore works in CASO ......................................... 1154
How CASO restores data that resides on multiple storage
devices ....................................................................... 1155
About recovering failed jobs in CASO ............................................ 1156
Pausing or resuming a managed Backup Exec server ...................... 1158
Stopping or starting Backup Exec services for a managed Backup
Exec server ....................................................................... 1158
Viewing managed Backup Exec server properties ............................ 1159
Viewing the settings for a central administration server ..................... 1162
Disaster recovery in CASO ......................................................... 1164
Troubleshooting CASO .............................................................. 1165
Running the Backup Exec Utility for CASO operations ...................... 1167
Uninstalling Backup Exec from the central administration server ........ 1167
Uninstalling Backup Exec from a managed Backup Exec server ......... 1168
29Contents
Appendix M Symantec Backup Exec Advanced Disk-based
Backup Option ............................................................ 1169
About the Advanced Disk-based Backup Option .............................. 1169
How to use synthetic backups in place of recurring full backups .......... 1170
Configuring off-host backup options for a backup job ........................ 1171
Setting default backup options for the Advanced Disk-based Backup
Option .............................................................................. 1173
About true image restore for synthetic backups ............................... 1175
How to use off-host backup to process remote computer backups on
the Backup Exec server ........................................................ 1177
Troubleshooting off-host backups ................................................. 1180
Appendix N Symantec Backup Exec NDMP Option ......................... 1184
Features of the NDMP Option ...................................................... 1184
Requirements for using the NDMP Option ...................................... 1185
About installing the NDMP Option ................................................. 1186
Adding NDMP servers to Backup Exec .......................................... 1186
Sharing the tape drives on NDMP servers between multiple Backup
Exec servers ...................................................................... 1188
NDMP backup options for NDMP servers ....................................... 1188
NDMP server backup selections .................................................. 1190
How to use patterns to exclude files and directories from an NDMP
server backup .................................................................... 1191
Supported configurations for duplicating data from NDMP
servers ............................................................................. 1193
About restoring and redirecting restore data for NDMP servers ........... 1193
NDMP server restore options ................................................. 1194
Setting the default backup options for the NDMP Option ................... 1197
Viewing the properties of an NDMP server ..................................... 1198
NDMP server properties ....................................................... 1198
Viewing storage properties for an NDMP server .............................. 1199
Storage properties for an NDMP server ................................... 1199
Appendix O Symantec Backup Exec Agent for Linux ...................... 1201
About the Agent for Linux ........................................................... 1202
About open files and the Agent for Linux ........................................ 1202
Requirements for the Agent for Linux ............................................ 1202
About installing the Agent for Linux ............................................... 1203
Installing the Agent for Linux ................................................. 1204
About the Backup Exec operators (beoper) group for the Agent
for Linux ...................................................................... 1206
30Contents
About establishing trust for a remote Linux computer in the Backup
Exec list of servers ............................................................. 1207
Establishing trust and adding a remote Linux computer to the
Backup Exec list of servers ............................................. 1208
Adding additional Backup Exec servers to which the Agent for Linux
can publish information ........................................................ 1208
About configuring the Agent for Linux ............................................ 1209
Excluding files and directories from all backup jobs for Linux
computers ......................................................................... 1210
Editing configuration options for Linux computers ............................ 1210
Configuration options for Linux computers ................................ 1211
About backing up a Linux computer by using the Agent for Linux ........ 1218
Linux backup options ........................................................... 1219
About backing up and restoring Novell Open Enterprise Server
(OES) components ....................................................... 1220
About restoring data to Linux computers ........................................ 1222
About restoring Novell OES components ................................. 1222
Restore job options for Linux computers .................................. 1222
Editing the default backup job options for Linux computers ................ 1223
Default backup job options for Linux computers ......................... 1224
Uninstalling the Agent for Linux .................................................... 1225
Manually uninstalling the Agent for Linux ................................. 1226
Run-time scripts to remove when manually uninstalling the Agent
for Linux ...................................................................... 1227
Starting the Agent for Linux daemon ............................................. 1228
Stopping the Agent for Linux daemon ............................................ 1229
Troubleshooting the Agent for Linux .............................................. 1229
Appendix P Symantec Backup Exec Agent for Mac ........................ 1235
About the Agent for Mac ............................................................. 1236
Requirements for the Agent for Mac .............................................. 1236
About the Backup Exec admin group on Macintosh systems .............. 1236
Creating the Backup Exec admin group manually on Macintosh
systems ...................................................................... 1237
About installing the Agent for Mac ................................................ 1238
Installing the Agent for Mac ................................................... 1238
Uninstalling the Agent for Mac ..................................................... 1241
Manually uninstalling the Agent for Mac ................................... 1242
About configuring the Agent for Mac ............................................. 1243
Editing configuration options for Macintosh computers ................ 1244
Configuration options for Macintosh computers ......................... 1244
Starting the Agent for Mac .......................................................... 1249
31Contents
Stopping the Agent for Mac ........................................................ 1250
About establishing trust for a remote Macintosh system in the Servers
list .................................................................................... 1250
Establishing trust and adding a remote Macintosh computer to
the Backup Exec Servers list ........................................... 1250
Adding additional Backup Exec servers to which the Agent for Mac
can publish information ........................................................ 1251
About backing up data by using the Agent for Mac ........................... 1252
Editing the default backup options for Macintosh systems ............ 1252
About excluding files and directories from backup jobs for
Macintosh computers ..................................................... 1254
About restoring Macintosh systems ............................................... 1255
Macintosh restore options ..................................................... 1255
Troubleshooting the Agent for Mac ............................................... 1255
Appendix Q Symantec Backup Exec Remote Media Agent for
Linux ............................................................................. 1257
About the Remote Media Agent for Linux ...................................... 1258
How the Remote Media Agent for Linux works ................................ 1259
Requirements for the Remote Media Agent for Linux ........................ 1260
About open files and the Remote Media Agent for Linux .................... 1261
About installing the Remote Media Agent for Linux ........................... 1261
Installing the Remote Media Agent for Linux ............................. 1262
Uninstalling the Remote Media Agent for Linux ............................... 1265
Starting the Remote Media Agent for Linux daemon ......................... 1266
Stopping the Remote Media Agent for Linux daemon ....................... 1266
About establishing trust for a Remote Media Agent for Linux computer
in the Backup Exec list of servers .......................................... 1267
Establishing trust and adding a Remote Media Agent for Linux
computer to the Backup Exec list of servers ........................ 1267
Adding additional Backup Exec servers to which Remote Media Agent
for Linux can publish ............................................................ 1268
Finding simulated tape library files ................................................ 1268
About the Backup Exec operators (beoper) group for the Remote Media
Agent for Linux ................................................................... 1269
Creating the Backup Exec operators (beoper) group manually for
the Remote Media Agent for Linux .................................... 1270
About adding a Linux server as a Remote Media Agent for Linux ....... 1270
Adding a Linux server as a Remote Media Agent for Linux .......... 1271
Remote Media Agent for Linux options .................................... 1271
Changing the port for communications between the Backup Exec server
and the Remote Media Agent for Linux .................................... 1273
32Contents
About creating storage device pools for devices attached to the Remote
Media Agent for Linux ......................................................... 1273
Editing properties for the Remote Media Agent for Linux .................. 1274
Remote Media Agent for Linux properties ................................. 1274
Deleting a Remote Media Agent for Linux from the Backup Exec list
of servers .......................................................................... 1275
Sharing a Remote Media Agent for Linux between multiple Backup
Exec servers ...................................................................... 1275
About backing up data by using the Remote Media Agent for
Linux ................................................................................ 1276
About restoring data by using the Remote Media Agent for Linux ........ 1276
About the Tape Library Simulator Utility ......................................... 1277
Creating a simulated tape library .................................................. 1278
Simulated Tape Library options .............................................. 1279
Viewing simulated tape libraries properties ..................................... 1279
Simulated tape library properties ............................................ 1280
Deleting a simulated tape library .................................................. 1280
Managing simulated tape libraries from the command line ................. 1281
Command line switches for the Tape Library Simulator Utility ............. 1282
Troubleshooting the Remote Media Agent for Linux ......................... 1283
Appendix R Symantec Backup Exec Storage Provisioning
Option ........................................................................... 1286
Features of the Storage Provisioning Option ................................... 1287
Requirements for the Storage Provisioning Option ........................... 1288
About installing the Storage Provisioning Option .............................. 1288
Viewing storage array components in Backup Exec .......................... 1289
Configuring a storage array by using the Configure Storage
Wizard .............................................................................. 1289
Editing properties for a storage array and its physical disks ................ 1291
About the Any Virtual Disk Storage device pool in the Storage
Provisioning Option ............................................................. 1291
About virtual disks in the Storage Provisioning Option ....................... 1292
Editing default options for a virtual disk on a storage array ........... 1294
Configuring a virtual disk on a storage array ............................ 1299
Editing properties for unconfigured virtual disks on a storage
array .......................................................................... 1299
Editing properties of virtual disks on storage arrays .................... 1300
Adding a hot spare by using the Configure Storage Wizard ................ 1305
Changing a hot spare by using the Configure Storage Wizard ............ 1306
Detecting a new storage array ..................................................... 1306
Renaming a virtual disk or storage array ........................................ 1307
33Contents
Identifying the physical disks of a virtual disk by using the blink
feature .............................................................................. 1308
Troubleshooting the Storage Provisioning Option ............................. 1309
Appendix S Symantec Backup Exec Archiving Option ................... 1310
About the Archiving Option .......................................................... 1311
Requirements for both the Exchange Mailbox Archiving Option and
the File System Archiving Option ............................................ 1312
Requirements for the Exchange Mailbox Archiving Option ........... 1314
Requirements for the File System Archiving Option .................... 1317
About granting permissions on the Exchange Server for the
Backup Exec service account in the Archiving Option .......... 1318
How to calculate disk space requirements for the Exchange
Mailbox Archiving Option ................................................ 1324
How to calculate disk space requirements for the File System
Archiving Option ........................................................... 1327
Installing the Backup Exec Archiving Option ................................... 1330
About using the command line to install the Backup Exec
Exchange Mailbox Archiving Option .................................. 1331
About the Internet Information Services (IIS) 7.0 role services
installed by Backup Exec ................................................ 1331
About uninstalling or reinstalling the Archiving Option ................. 1333
About installing Enterprise Vault on a Backup Exec server on
which the Archiving Option is installed ............................... 1334
About Enterprise Vault services for the Archiving Option ............. 1334
Repairing the Backup Exec Archiving Option ............................ 1335
How the Archiving Option works ................................................... 1335
Types of data not included in archive jobs ................................ 1336
Best practices for the Archiving Option .......................................... 1337
About creating an archive job ...................................................... 1338
Viewing the servers that have archiving jobs ............................. 1339
Setting archive job options .................................................... 1339
Editing default settings for the Archiving Option ............................... 1344
Default settings for the Archiving Option .................................. 1344
About single instance storage of archived items .............................. 1347
Enabling single instance storage of archived items ..................... 1348
About synchronizing archive permissions and settings ...................... 1348
About vault stores in the Archiving Option ...................................... 1349
Editing or viewing vault store properties ................................... 1350
Vault store properties ........................................................... 1350
About deleting an Archiving Option vault store .......................... 1351
Deleting a vault store ........................................................... 1352
34Contents
About vault store partitions in the Archiving Option ........................... 1352
Editing vault store partition properties ...................................... 1353
Vault store partition properties ............................................... 1353
About archives in the Archiving Option .......................................... 1354
Editing archive properties ..................................................... 1354
Deleting an archive ............................................................. 1355
Archive properties ............................................................... 1355
About Archiving Option operation entries in the audit log ................... 1356
About Exchange mailbox groups in archive jobs .............................. 1356
Managing Exchange mailbox groups ....................................... 1357
Manage mailbox groups options ............................................. 1358
Mailbox group options for mailbox group details ........................ 1359
About deleting archived data from its original location ....................... 1361
About archive settings in the Archiving Option ................................. 1361
Manage Archive Settings options ........................................... 1361
Archive Settings Details ....................................................... 1362
About retention categories for archived items ............................ 1364
About managing index locations in the Backup Exec Archiving
Option .............................................................................. 1368
Viewing index locations ........................................................ 1369
Adding a new index location .................................................. 1369
Deleting an index location ..................................................... 1370
Opening or closing an index location ....................................... 1370
Manage Index Locations options ............................................ 1371
About restoring items from the archives ......................................... 1372
About searching for data in the archives ........................................ 1373
About deleting data from the archives ............................................ 1373
Deleting data from the archives .............................................. 1374
Delete from Archive options .................................................. 1374
About backing up and restoring the Archiving Option components from
a remote Backup Exec server ................................................ 1375
Preventing the deletion of expired archived items from an archive ....... 1375
About backing up Archiving Option components .............................. 1375
Archive Option backup options ............................................... 1378
About consistency checks for Archiving Option databases ........... 1379
About disabling backup mode for Archiving Option
components ................................................................. 1379
About restoring an Archiving Option component .............................. 1380
About running the Backup Exec Utility to complete redirected
restores of Archiving Option components ........................... 1381
Running the Backup Exec Utility to complete a redirected restore
of the Archiving Option databases .................................... 1382
35Contents
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide
Symantec Backup Exec 15 Administrator's Guide

More Related Content

What's hot

TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
 
Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Symantec
 
Migration guide sep12.1 (1)
Migration guide sep12.1 (1)Migration guide sep12.1 (1)
Migration guide sep12.1 (1)omerch
 
Implementation guide sep12.1
Implementation guide sep12.1Implementation guide sep12.1
Implementation guide sep12.1eduhost
 
vxfs_admin_51sp1_hpux
vxfs_admin_51sp1_hpuxvxfs_admin_51sp1_hpux
vxfs_admin_51sp1_hpuxE. Balauca
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15Symantec
 
TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...
TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...
TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...Symantec
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Symantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guideSymantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guideSymantec
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guideAndrey Karpov
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized DesktopIT Masterclasses
 
Symantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management GuideSymantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management GuideSSLRenewals
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverFernando Alves
 
Tideway Software Identification
Tideway   Software IdentificationTideway   Software Identification
Tideway Software IdentificationPeter Grant
 
How Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingHow Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingMicrosoft TechNet
 
Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideAndrey Karpov
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentationAndrey Karpov
 

What's hot (20)

TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsTECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large Installations
 
Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?Why Backup Exec for Virtualization?
Why Backup Exec for Virtualization?
 
Migration guide sep12.1 (1)
Migration guide sep12.1 (1)Migration guide sep12.1 (1)
Migration guide sep12.1 (1)
 
Implementation guide sep12.1
Implementation guide sep12.1Implementation guide sep12.1
Implementation guide sep12.1
 
vxfs_admin_51sp1_hpux
vxfs_admin_51sp1_hpuxvxfs_admin_51sp1_hpux
vxfs_admin_51sp1_hpux
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
 
Sace client guide
Sace client guideSace client guide
Sace client guide
 
TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...
TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...
TECHNICAL WHITE PAPER: Bare Metal & Dissimilar Hardware Recovery with Backup ...
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Symantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guideSymantec Backup Exec 2014 licensing guide
Symantec Backup Exec 2014 licensing guide
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
 
Windows 7 Optimized Desktop
Windows 7 Optimized DesktopWindows 7 Optimized Desktop
Windows 7 Optimized Desktop
 
Symantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management GuideSymantec CryptoExec for WHMCS - Installation and Management Guide
Symantec CryptoExec for WHMCS - Installation and Management Guide
 
Canada Windows 7 Tour
Canada Windows 7 TourCanada Windows 7 Tour
Canada Windows 7 Tour
 
Datasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media serverDatasheet nbu 5230 appliance vs media server
Datasheet nbu 5230 appliance vs media server
 
Seyed Salehi
Seyed SalehiSeyed Salehi
Seyed Salehi
 
Tideway Software Identification
Tideway   Software IdentificationTideway   Software Identification
Tideway Software Identification
 
How Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve SupportingHow Microsoft Technologies And Windows Vista Improve Supporting
How Microsoft Technologies And Windows Vista Improve Supporting
 
Hpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guideHpe Data Protector troubleshooting guide
Hpe Data Protector troubleshooting guide
 
Data Protection overview presentation
Data Protection overview presentationData Protection overview presentation
Data Protection overview presentation
 

Similar to Symantec Backup Exec 15 Administrator's Guide

13170117 vx vm-troubleshooting-guide
13170117 vx vm-troubleshooting-guide13170117 vx vm-troubleshooting-guide
13170117 vx vm-troubleshooting-guideuseratul
 
Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...webhostingguy
 
Cm peoplesoft admin
Cm peoplesoft adminCm peoplesoft admin
Cm peoplesoft adminGururaj Iyer
 
Netbackup intallation guide
Netbackup intallation guideNetbackup intallation guide
Netbackup intallation guiderajan981
 
Service desk release_enu
Service desk release_enuService desk release_enu
Service desk release_enugauravneo_007
 
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330Symantec
 
Control m ibm info shpere data stage control module
Control m ibm info shpere data stage control moduleControl m ibm info shpere data stage control module
Control m ibm info shpere data stage control moduleGururaj Iyer
 
User manual m-series-m300_
User manual m-series-m300_User manual m-series-m300_
User manual m-series-m300_Chelie Trangia
 
Aoc usas-s4ir
Aoc usas-s4irAoc usas-s4ir
Aoc usas-s4irlaonap166
 
데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼
데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼
데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼HION IT
 
데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼
데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼
데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼HION IT
 
Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]
Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]
Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]Gia sư Đức Trí
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint ProtectionMindRiver Group
 
Qt install guide
Qt install guideQt install guide
Qt install guidebondugula
 
Qt install guide
Qt install guideQt install guide
Qt install guidebondugula
 
SONY-VIO VPCF 12 series laptop user guide
SONY-VIO VPCF 12 series laptop user guideSONY-VIO VPCF 12 series laptop user guide
SONY-VIO VPCF 12 series laptop user guidetayyabmubarikqu
 
System Client Details
System Client DetailsSystem Client Details
System Client DetailsSyAM Software
 

Similar to Symantec Backup Exec 15 Administrator's Guide (20)

13170117 vx vm-troubleshooting-guide
13170117 vx vm-troubleshooting-guide13170117 vx vm-troubleshooting-guide
13170117 vx vm-troubleshooting-guide
 
Ngh 15 user_guide
Ngh 15 user_guideNgh 15 user_guide
Ngh 15 user_guide
 
Smsmse6.5 exchange2007 2010
Smsmse6.5 exchange2007 2010Smsmse6.5 exchange2007 2010
Smsmse6.5 exchange2007 2010
 
Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...Symantec Enterprise Security Manager™ Modules for MySQL ...
Symantec Enterprise Security Manager™ Modules for MySQL ...
 
Cm peoplesoft admin
Cm peoplesoft adminCm peoplesoft admin
Cm peoplesoft admin
 
spnt_5.58_gsg
spnt_5.58_gsgspnt_5.58_gsg
spnt_5.58_gsg
 
Netbackup intallation guide
Netbackup intallation guideNetbackup intallation guide
Netbackup intallation guide
 
Service desk release_enu
Service desk release_enuService desk release_enu
Service desk release_enu
 
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
TECHNICAL BRIEF▶NetBackup Appliance AutoSupport for NetBackup 5330
 
Control m ibm info shpere data stage control module
Control m ibm info shpere data stage control moduleControl m ibm info shpere data stage control module
Control m ibm info shpere data stage control module
 
User manual m-series-m300_
User manual m-series-m300_User manual m-series-m300_
User manual m-series-m300_
 
Aoc usas-s4ir
Aoc usas-s4irAoc usas-s4ir
Aoc usas-s4ir
 
데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼
데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼
데이타맥스프린터 Datamax H-Class 열전사감열 RFID 산업용 바코드프린터 매뉴얼
 
데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼
데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼
데이타맥스프린터 Datamax M-Class 열전사감열 산업용 범용바코드프린터 매뉴얼
 
Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]
Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]
Ncomputing m300-giai-phap-tieti-kiem[ncomputing.123vietnam.vn]
 
Symantec Endpoint Protection
Symantec Endpoint ProtectionSymantec Endpoint Protection
Symantec Endpoint Protection
 
Qt install guide
Qt install guideQt install guide
Qt install guide
 
Qt install guide
Qt install guideQt install guide
Qt install guide
 
SONY-VIO VPCF 12 series laptop user guide
SONY-VIO VPCF 12 series laptop user guideSONY-VIO VPCF 12 series laptop user guide
SONY-VIO VPCF 12 series laptop user guide
 
System Client Details
System Client DetailsSystem Client Details
System Client Details
 

More from Symantec

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 

More from Symantec (20)

Symantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of BroadcomSymantec Enterprise Security Products are now part of Broadcom
Symantec Enterprise Security Products are now part of Broadcom
 
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...
 
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec Webinar | National Cyber Security Awareness Month: Protect IT
Symantec Webinar | National Cyber Security Awareness Month: Protect IT
 
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec Webinar | National Cyber Security Awareness Month: Secure IT
Symantec Webinar | National Cyber Security Awareness Month: Secure IT
 
Symantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec Webinar | National Cyber Security Awareness Month - Own IT
Symantec Webinar | National Cyber Security Awareness Month - Own IT
 
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)
 
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CK
 
Symantec Mobile Security Webinar
Symantec Mobile Security WebinarSymantec Mobile Security Webinar
Symantec Mobile Security Webinar
 
Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 

Recently uploaded

Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfBrain Inventory
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?AmeliaSmith90
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampVICTOR MAESTRE RAMIREZ
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024Mind IT Systems
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeNeo4j
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIIvo Andreev
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdfMeon Technology
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionsNirav Modi
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptkinjal48
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilVICTOR MAESTRE RAMIREZ
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyRaymond Okyere-Forson
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageDista
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfTobias Schneck
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsJaydeep Chhasatia
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Incrobinwilliams8624
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorShane Coughlan
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntelliSource Technologies
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxAutus Cyber Tech
 

Recently uploaded (20)

Why Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdfWhy Choose Brain Inventory For Ecommerce Development.pdf
Why Choose Brain Inventory For Ecommerce Development.pdf
 
How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?How Does the Epitome of Spyware Differ from Other Malicious Software?
How Does the Epitome of Spyware Differ from Other Malicious Software?
 
Deep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - DatacampDeep Learning for Images with PyTorch - Datacamp
Deep Learning for Images with PyTorch - Datacamp
 
Top Software Development Trends in 2024
Top Software Development Trends in  2024Top Software Development Trends in  2024
Top Software Development Trends in 2024
 
IA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG timeIA Generativa y Grafos de Neo4j: RAG time
IA Generativa y Grafos de Neo4j: RAG time
 
JS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AIJS-Experts - Cybersecurity for Generative AI
JS-Experts - Cybersecurity for Generative AI
 
online pdf editor software solutions.pdf
online pdf editor software solutions.pdfonline pdf editor software solutions.pdf
online pdf editor software solutions.pdf
 
eAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspectionseAuditor Audits & Inspections - conduct field inspections
eAuditor Audits & Inspections - conduct field inspections
 
Webinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.pptWebinar_050417_LeClair12345666777889.ppt
Webinar_050417_LeClair12345666777889.ppt
 
Generative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-CouncilGenerative AI for Cybersecurity - EC-Council
Generative AI for Cybersecurity - EC-Council
 
AI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human BeautyAI Embracing Every Shade of Human Beauty
AI Embracing Every Shade of Human Beauty
 
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales CoverageSales Territory Management: A Definitive Guide to Expand Sales Coverage
Sales Territory Management: A Definitive Guide to Expand Sales Coverage
 
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdfARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
ARM Talk @ Rejekts - Will ARM be the new Mainstream in our Data Centers_.pdf
 
Kawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in TrivandrumKawika Technologies pvt ltd Software Development Company in Trivandrum
Kawika Technologies pvt ltd Software Development Company in Trivandrum
 
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software TeamsYour Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
Your Vision, Our Expertise: TECUNIQUE's Tailored Software Teams
 
Salesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptxSalesforce AI Associate Certification.pptx
Salesforce AI Associate Certification.pptx
 
Enterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze IncEnterprise Document Management System - Qualityze Inc
Enterprise Document Management System - Qualityze Inc
 
OpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS CalculatorOpenChain Webinar: Universal CVSS Calculator
OpenChain Webinar: Universal CVSS Calculator
 
Introduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptxIntroduction-to-Software-Development-Outsourcing.pptx
Introduction-to-Software-Development-Outsourcing.pptx
 
ERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptxERP For Electrical and Electronics manufecturing.pptx
ERP For Electrical and Electronics manufecturing.pptx
 

Symantec Backup Exec 15 Administrator's Guide

  • 1. Symantec Backup Exec 15 Administrator's Guide
  • 2. Documentation version: 15 Legal Notice Copyright © 2015 Symantec Corporation. All rights reserved. Last updated: February 5, 2015 Symantec, the Symantec Logo, the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This Symantec product may contain third party software for which Symantec is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this Symantec product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in Commercial Computer Software or Commercial Computer Software Documentation", as applicable, and any successor regulations. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.
  • 3. Symantec Corporation 350 Ellis Street Mountain View, CA 94043 http://www.symantec.com
  • 4. Technical Support Symantec Technical Support maintains support centers globally. Technical Support’s primary role is to respond to specific queries about product features and functionality. The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates. Symantec’s support offerings include the following: ■ A range of support options that give you the flexibility to select the right amount of service for any size organization ■ Telephone and/or Web-based support that provides rapid response and up-to-the-minute information ■ Upgrade assurance that delivers software upgrades ■ Global support purchased on a regional business hours or 24 hours a day, 7 days a week basis ■ Premium service offerings that include Account Management Services For information about Symantec’s support offerings, you can visit our website at the following URL: www.symantec.com/business/support/ All support services will be delivered in accordance with your support agreement and the then-current enterprise technical support policy. Contacting Technical Support Customers with a current support agreement may access Technical Support information at the following URL: www.symantec.com/business/support/ Before contacting Technical Support, make sure you have satisfied the system requirements that are listed in your product documentation. Also, you should be at the computer on which the problem occurred, in case it is necessary to replicate the problem. When you contact Technical Support, please have the following information available: ■ Product release level ■ Hardware information
  • 5. ■ Available memory, disk space, and NIC information ■ Operating system ■ Version and patch level ■ Network topology ■ Router, gateway, and IP address information ■ Problem description: ■ Error messages and log files ■ Troubleshooting that was performed before contacting Symantec ■ Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/business/support/ Customer service Customer service information is available at the following URL: www.symantec.com/business/support/ Customer Service is available to assist with non-technical questions, such as the following types of issues: ■ Questions regarding product licensing or serialization ■ Product registration updates, such as address or name changes ■ General product information (features, language availability, local dealers) ■ Latest information about product updates and upgrades ■ Information about upgrade assurance and support contracts ■ Information about the Symantec Buying Programs ■ Advice about Symantec's technical support options ■ Nontechnical presales questions ■ Issues that are related to CD-ROMs, DVDs, or manuals
  • 6. Support agreement resources If you want to contact Symantec regarding an existing support agreement, please contact the support agreement administration team for your region as follows: customercare_apac@symantec.comAsia-Pacific and Japan semea@symantec.comEurope, Middle-East, and Africa supportsolutions@symantec.comNorth America and Latin America
  • 7. Technical Support ............................................................................................... 4 Chapter 1 Introducing Backup Exec 15 ............................................. 37 About Backup Exec ...................................................................... 37 How Backup Exec works ................................................................ 37 Chapter 2 Installation ........................................................................... 39 About the Backup Exec installation process and licensing options .......... 40 Backup Exec preinstallation checklist ............................................... 43 Running the Environment Check before installing or upgrading Backup Exec .................................................................................... 44 Microsoft SQL Server 2008 Express Edition components installed with Backup Exec ......................................................................... 46 Backup Exec’s standard features ..................................................... 47 System requirements for Backup Exec .............................................. 49 Installing Backup Exec by using the Installation Wizard ........................ 52 Installing additional Backup Exec options to the local Backup Exec server .................................................................................. 62 Push-installing Backup Exec to remote computers .............................. 64 Methods for installing the Agent for Windows ..................................... 72 Push-installing the Agent for Windows to remote computers ............ 73 Installing updates to the Agent for Windows on remote computers ....................................................................... 79 Installing the Agent for Windows in an Active Directory network .......................................................................... 80 Using a command prompt to install the Agent for Windows on a remote computer .............................................................. 84 Using a command script to install the Agent for Windows ................ 87 Installing the Remote Administrator ................................................. 88 Installing the Remote Administrator using the command line ........... 89 Running the Remote Administrator ............................................. 91 Installing Backup Exec using the command line (silent mode) ................ 94 Command line switches for silent mode installation of Backup Exec .............................................................................. 94 Creating and using installation parameter files ............................ 103 Contents
  • 8. Installing a trial version of Backup Exec agents and options ................. 104 About the installation log .............................................................. 104 Viewing the Installation Summary Report ......................................... 105 Repairing Backup Exec ................................................................ 106 Updating Backup Exec with LiveUpdate .......................................... 106 Viewing installed updates ............................................................. 109 Viewing license information ........................................................... 109 Backup Exec maintenance contract information ................................ 110 Updating expired maintenance contracts ................................... 110 Managing maintenance contract customer numbers .................... 111 About upgrading from previous versions of Backup Exec to Backup Exec 15 .............................................................................. 111 Upgrade checklist for Backup Exec 2010 and earlier .................... 113 Using the Migration Report to determine how existing jobs changed after an upgrade to Backup Exec 15 ................................... 115 Post-installation tasks .................................................................. 116 Uninstalling Backup Exec ............................................................. 117 Uninstalling Backup Exec using the command line ............................. 117 Uninstalling Backup Exec options from the local Backup Exec server ................................................................................. 118 Chapter 3 Getting Started .................................................................. 120 About the Backup Exec Administration Console ................................ 120 Displaying the version information for Backup Exec ........................... 123 How to sort, filter, and copy information on the Backup Exec Administration Console .......................................................... 123 Customizing views on the Backup Exec Administration Console ........... 125 Configuring the Home tab ............................................................. 126 Configuring the Symantec RSS Reader ........................................... 130 Creating a disaster preparation plan (DPP) ...................................... 131 Getting started with backups ......................................................... 133 Chapter 4 Backups ............................................................................... 136 How to prepare for your first backup with Backup Exec ....................... 138 Required user rights for backup jobs ............................................... 139 About the list of servers on the Backup and Restore tab ..................... 139 Adding servers that you want to back up to the list of servers on the Backup and Restore tab ......................................................... 140 Removing servers from the list of servers on the Backup and Restore tab ..................................................................................... 141 Creating a server group ............................................................... 142 Hiding or viewing server groups on the Backup and Restore tab ........... 143 8Contents
  • 9. Adding servers to a server group ................................................... 143 Removing servers from a server group ............................................ 144 Editing a server group .................................................................. 144 Moving servers to the Retired Servers server group ........................... 145 Moving retired servers back to the All Servers server group ................. 146 Removing server groups from Backup Exec ..................................... 146 Backing up data ......................................................................... 146 How Backup Exec backs up and restores volumes that are enabled for deduplication in Windows ............................................. 156 How Backup Exec backs up and restores Microsoft Virtual Hard Disk (vhd) files ............................................................... 157 About selecting data to back up .................................................... 157 Changing the order in which backup sources are backed up ................ 163 Excluding files from backups ......................................................... 166 Including specific files with a backup job's backup selections ............... 169 About backing up critical system components ................................... 171 Backup Exec Shadow Copy Components file system ......................... 175 Backup methods in Backup Exec ................................................... 176 Configuring backup methods for backup jobs ................................... 184 How Backup Exec determines if a file has been backed up .................. 187 Configuring Backup Exec to automatically delete files after a backup ............................................................................... 190 Configuring network options for backup jobs ..................................... 192 Running the next scheduled backup job before its scheduled time ................................................................................... 193 Editing backup definitions ............................................................. 194 Testing credentials for backup sources ............................................ 199 Replacing the credentials for a backup source .................................. 200 Creating new credentials for a backup source ................................... 201 Deleting retired or unused backup sources from the Credentials pane .................................................................................. 202 How job scheduling works in Backup Exec ....................................... 203 Including a specific date in the schedule for a backup job .................... 204 Preventing backup jobs from running on a specific date ...................... 206 Viewing all scheduled backup jobs on a calendar .............................. 207 Adding a stage to a backup definition .............................................. 207 Editing a stage ........................................................................... 209 Duplicating backup sets or a job history manually .............................. 209 Running a test run job manually ..................................................... 214 Verifying backed up data manually ................................................. 215 Copying data from a virtual tape library to a physical tape device using DirectCopy to tape ................................................................ 217 9Contents
  • 10. Chapter 5 Restores ............................................................................... 219 Methods for restoring data in Backup Exec ...................................... 220 Searching for data to restore ......................................................... 222 Restoring data from a server, a backup set, a backup job, or a storage device ................................................................................ 222 Restoring file system data ............................................................ 226 Performing a complete online restore of a Microsoft Windows computer ............................................................................ 227 Restoring System State ............................................................... 228 Installing a new Windows Server domain controller into an existing domain by using a redirected restore ........................................ 230 Restoring Backup Exec Shadow Copy Components .......................... 232 Restoring utility partitions or Unified Extensible Firmware Interface system partitions .................................................................. 233 About restoring encrypted data ...................................................... 234 About restoring NetWare SMS volume backups to non-SMS volumes with Backup Exec ................................................................. 234 Canceling a restore job ................................................................ 234 How Backup Exec catalogs work ................................................... 235 Configuring default options for catalogs ..................................... 236 Cataloging backup sets ................................................................ 238 Chapter 6 Job management and monitoring .................................. 240 How to monitor and manage jobs in Backup Exec ............................. 240 About the Job Monitor .................................................................. 242 Viewing job activity details for active jobs ................................... 244 Canceling an active job .......................................................... 244 Holding jobs ........................................................................ 245 Removing the hold on jobs ..................................................... 246 Holding the job queue ............................................................ 247 Removing the hold on the job queue ......................................... 247 Running a scheduled job immediately ....................................... 248 Changing the priority for a scheduled job ................................... 249 Deleting scheduled jobs ......................................................... 250 About the Job History .................................................................. 251 Viewing the history of a job ..................................................... 252 Deleting a job from the Job History ........................................... 252 Running a job from the Job History ........................................... 253 Viewing the job log ..................................................................... 254 Finding text in the job log ........................................................ 254 Printing the job log ................................................................ 256 Saving the job log ................................................................. 256 10Contents
  • 11. Linking from the job log to the Symantec Technical Support website ......................................................................... 257 How to use job logs with vertical applications .............................. 257 Configuring default job log options ............................................ 258 Error-handling rules for failed or canceled jobs .................................. 259 Creating a custom error-handling rule ....................................... 260 Enabling or disabling error-handling rules .................................. 261 Deleting a custom error-handling rule ........................................ 261 Enabling an error-handling rule for a failed job ............................ 262 Custom error-handling rule for recovered jobs ............................ 262 About the cluster failover error-handling rule ............................... 263 List of job statuses in Backup Exec ................................................. 264 Setting job status and recovery options ........................................... 269 Chapter 7 Alerts and notifications .................................................... 272 Alerts and notifications in Backup Exec ........................................... 273 Where to find alerts in Backup Exec ............................................... 274 Enabling active alerts and alert history to display on the Home tab ..................................................................................... 276 Active alerts properties .......................................................... 277 Viewing the alert history for a server or a storage device ..................... 278 Deleting an alert from alert history .................................................. 278 Copying alert text to a document or email ........................................ 279 Filtering alerts ............................................................................ 279 Viewing the job log from an alert .................................................... 280 Responding to active alerts ........................................................... 280 Clearing all informational alerts manually ......................................... 281 Setting up notification for alerts ...................................................... 281 Configuring email or text message notification for alerts ...................... 282 Adding recipients for notification .................................................... 284 Adding a recipient group for alert notifications ................................... 286 Removing a recipient from a group ........................................... 287 Disabling email or text message alert notification for a recipient ............ 287 Editing recipient notification properties ............................................ 288 Deleting recipients ...................................................................... 288 Configuring alert categories .......................................................... 289 Assigning recipients to receive notifications for specific alert categories ........................................................................... 291 Sending a notification when a job completes .................................... 291 Notification options for jobs ..................................................... 292 Disabling notifications for a specific alert category ............................. 292 Configuring default alert settings .................................................... 293 11Contents
  • 12. Enabling or disabling pop-up alerts ................................................. 294 SNMP traps for Backup Exec alerts ................................................ 295 Installing and configuring the SNMP system service ..................... 298 Installing the Windows Management Instrumentation performance counter provider ............................................................. 298 Installing the Windows Management Instrumentation provider for SNMP .......................................................................... 299 Uninstalling the Windows Management Instrumentation performance counter provider ........................................... 299 Uninstalling the Windows Management Instrumentation provider for SNMP ...................................................................... 299 Chapter 8 Disk-based and network-based storage ....................... 300 Features and types of disk-based storage and network-based storage ............................................................................... 300 Storage trending statuses for disk storage and virtual disks ................. 303 Setting low disk space thresholds on disk-based storage .................... 304 Configuring disk storage ............................................................... 305 Changing the location of a disk storage device ............................ 307 Editing disk storage properties ................................................. 308 How to restore data from a reattached or reinserted disk-based storage device ................................................................................ 314 Configuring disk cartridge storage .................................................. 315 Editing disk cartridge properties ............................................... 316 Editing disk cartridge media properties ...................................... 320 How data lifecycle management (DLM) deletes expired backup sets on disk-based storage ........................................................... 322 Backup sets .............................................................................. 329 Changing the expiration date of backup sets on disk-based storage ......................................................................... 332 Retaining backup sets on disk-based storage to prevent them from expiring .................................................................. 333 Releasing retained backup sets on disk-based storage ................. 334 Viewing the contents or properties of backup sets ....................... 335 Chapter 9 Legacy backup-to-disk folders ........................................ 337 Legacy backup-to-disk folders ...................................................... 337 Changing the name or description of a legacy backup-to-disk folder ........................................................................... 338 Changing the buffered read setting for a legacy backup-to-disk folder ........................................................................... 338 Changing the location of a legacy backup-to-disk folder ................ 339 12Contents
  • 13. Recreating a legacy backup-to-disk folder and its contents ............ 340 Restoring data from a legacy backup-to-disk folder ...................... 340 Chapter 10 Tape storage ....................................................................... 343 Support for tape drives and robotic libraries ...................................... 344 About the Virtual Tape Library Unlimited Drive Option ........................ 345 About the Library Expansion Option ............................................... 345 Adding or replacing devices with the Hot-swappable Device Wizard ................................................................................ 345 Installing Symantec tape device drivers .......................................... 347 Editing tape drive properties .......................................................... 348 Viewing tape drive statistics .......................................................... 353 Robotic libraries in Backup Exec .................................................... 353 Requirements for setting up robotic library hardware .................... 354 Inventorying robotic libraries when Backup Exec services start ............................................................................. 355 Configuring barcode rules for a robotic library ............................ 355 Initializing a robotic library when the Backup Exec service starts ............................................................................ 359 Defining a cleaning slot ......................................................... 360 Editing robotic library properties ............................................... 360 Creating robotic library partitions .................................................... 361 Changing the name of a robotic library partition ........................... 363 Adding or removing tape drives in a robotic library partition ........... 363 Reassigning a slot base number for robotic libraries ..................... 363 Editing robotic library slot properties ......................................... 364 Removing or reconfiguring robotic library partitions ...................... 365 Managing tapes ......................................................................... 366 Default media sets ................................................................ 367 Overwrite protection periods and append periods in media sets ............................................................................. 370 Creating media sets for tapes .................................................. 374 Changing the overwrite protection period or the append period for a media set ................................................................... 377 Changing the name and description of a media set ...................... 379 Changing the media vault or vaulting periods for a media set ................................................................................... 379 Deleting a media set .............................................................. 380 Renaming a media set ........................................................... 380 Media overwrite protection levels for tape media ......................... 380 Overwriting allocated or imported tape media ............................. 381 13Contents
  • 14. How Backup Exec searches for overwritable media in tape drives ................................................................................... 381 Viewing tapes that are used by a job ......................................... 384 Labeling tape media .................................................................... 384 About labeling imported tape media ......................................... 386 How barcode labels become media labels for tapes ..................... 386 Renaming a tape media label ................................................. 387 How WORM media is used in Backup Exec ..................................... 387 Default media vaults .................................................................... 388 Changing the name or description of a media vault ...................... 389 Creating media vault rules to move tape media to and from media vaults ........................................................................... 390 Updating the tape media location in media vaults ........................ 391 Deleting a media vault ........................................................... 391 Moving tape media to a vault ................................................... 392 Retiring damaged tape media ....................................................... 392 Deleting tape media .................................................................... 393 Erasing tape or disk cartridge media ............................................... 393 About cataloging tape or disk cartridge media that contains encrypted backup sets ......................................................................... 395 Associating tape media with a media set ......................................... 395 Editing tape media properties ........................................................ 396 Tape media rotation strategies ....................................................... 398 Chapter 11 Storage device pools ......................................................... 402 Creating storage device pools ....................................................... 402 Specifying a default selection method for a device in a storage device pool ................................................................................... 405 Viewing jobs, job histories, and active alerts for a storage device pool ................................................................................... 405 Adding or removing devices in a storage device pool ......................... 406 Chapter 12 Storage operations ............................................................ 407 About storage operation jobs ......................................................... 408 Storage tab overview in Backup Exec ............................................. 409 Using the Configure Storage wizard ................................................ 412 Viewing details for multiple storage devices ...................................... 415 Sending a notification when a scheduled storage operation job completes ........................................................................... 416 Scheduling a storage operation job ................................................ 416 Editing global settings for storage ................................................... 423 Sharing storage devices ............................................................... 432 14Contents
  • 15. Deleting a storage device ............................................................. 433 Changing the state of a storage device to online ............................... 434 Renaming a storage device .......................................................... 434 Viewing jobs, job histories, backup sets, and active alerts for storage devices ............................................................................... 435 Cataloging a storage device .......................................................... 435 Scanning a storage device ........................................................... 436 Inventorying a storage device ........................................................ 437 Inventorying and cataloging a storage device ................................... 438 Pausing and unpausing a storage device ......................................... 438 Disabling and enabling a storage device .......................................... 439 Initializing a robotic library ............................................................ 439 Formatting a tape as a WORM tape ................................................ 440 Retensioning a tape .................................................................... 440 Formatting a tape in a tape drive .................................................... 440 Ejecting media from a disk cartridge or tape drive .............................. 441 Cleaning a robotic library drive ...................................................... 442 Importing media to Backup Exec ................................................... 443 Exporting media and expired media ................................................ 450 Locking and unlocking the robotic library’s front portal ........................ 453 Backup Exec server and storage device states ................................. 459 Chapter 13 Conversion to virtual machines ...................................... 463 How conversion of physical computers to virtual machines works in Backup Exec ....................................................................... 463 Requirements for conversion to virtual machine jobs .......................... 471 Converting to a virtual machine simultaneously with a backup job ......... 472 Converting to a virtual machine after a backup job ............................. 477 Adding a conversion to virtual machine stage to a backup job .............. 483 Converting to a virtual machine from a point in time ........................... 488 Creating a one-time conversion to a virtual machine .......................... 490 Setting default options for conversion to virtual machine jobs ............... 494 Chapter 14 Configuration and settings .............................................. 498 Changing default backup job settings .............................................. 500 Configuring schedules for backup jobs ............................................ 504 Configuring storage options for backup jobs ..................................... 512 Configuring automatic test run jobs for backup jobs ........................... 518 Configuring automatic verify operations for backup jobs ...................... 519 Configuring delayed catalog operations to improve backup performance ........................................................................ 521 Configuring Advanced Open File options for backup jobs .................... 525 15Contents
  • 16. Configuring checkpoint restart ....................................................... 528 Configuring Backup Exec to work with Symantec Endpoint Protection ........................................................................... 530 Configuring pre/post commands for backup jobs ............................... 532 Configuring file and folder options for backup jobs ............................. 537 Setting default schedule options for rule-based jobs and run now jobs ................................................................................... 544 Excluding dates from the backup schedule for all backups .................. 547 Removing dates from the list of excluded dates ................................. 549 Exporting a list of dates that are excluded from all backups to another server ................................................................................. 550 Changing the default preferences .................................................. 550 Configuring the default setting for backing up multiple servers or applications ......................................................................... 551 Configuring database maintenance and security ............................... 552 Exporting the Backup Exec Database encryption key ......................... 555 Refreshing Backup Exec Database encryption keys ........................... 557 Configuring encryption for the connection to the Backup Exec Database ............................................................................ 558 Scheduling Backup Exec to check logon accounts ............................. 562 Configuring Backup Exec to discover data to back up ......................... 563 Adding discovered servers to the list of servers in Backup Exec ........... 565 Backup networks ........................................................................ 566 Changing network and security options for Backup Exec ..................... 568 Using Backup Exec with firewalls ................................................... 570 Backup Exec ports ................................................................ 572 Backup Exec listening ports .................................................... 574 About enabling a SQL instance behind a firewall ......................... 575 Using encryption with Backup Exec ................................................ 575 Encryption key management ......................................................... 578 Creating encryption keys .............................................................. 579 Replacing an encryption key ......................................................... 581 Deleting encryption keys .............................................................. 582 Granular Recovery Technology ...................................................... 583 Setting default Granular Recovery Technology (GRT) options .............. 589 DBA-initiated job templates ........................................................... 590 Creating DBA-initiated job templates ............................................... 591 Editing DBA-inititated job templates ................................................ 592 Deleting DBA-initiated job templates ............................................... 592 Storage options for DBA-initiated jobs ....................................... 593 General options for DBA-initiated jobs ....................................... 598 Network options for DBA-initiated jobs ...................................... 598 Duplicate job settings for DBA-initiated jobs ............................... 599 16Contents
  • 17. Backup Exec logon accounts ........................................................ 603 Creating a Backup Exec logon account ..................................... 605 Editing a Backup Exec logon account ....................................... 607 Changing the password for a Backup Exec logon account ............. 609 Replacing a Backup Exec logon account ................................... 609 Deleting a Backup Exec logon account ...................................... 610 Changing your default Backup Exec logon account ...................... 611 Creating a new Backup Exec System Logon Account ................... 612 Copying logon account information to another Backup Exec server ........................................................................... 613 Testing logon accounts .......................................................... 613 Starting and stopping Backup Exec services .................................... 614 Changing the credentials for a service account ................................. 614 Changing startup options for Backup Exec services ........................... 616 Configuring audit logs .................................................................. 617 Viewing the audit log ................................................................... 618 Removing entries from the audit log ................................................ 618 Saving an audit log to a text file ..................................................... 619 Copying configuration settings to another Backup Exec server ............. 619 Viewing server properties ............................................................. 620 Chapter 15 Reports ................................................................................ 622 Reports in Backup Exec ............................................................... 622 Running a report now .................................................................. 624 Scheduling a report ..................................................................... 624 Creating a custom report .............................................................. 626 Adding or removing fields on a custom report ............................. 630 Changing filters for a custom report .......................................... 631 Changing the way data is grouped or sorted in a custom report ........................................................................... 633 Changing graph options in custom reports ................................. 634 Previewing custom reports ...................................................... 634 Copying a custom report ........................................................ 635 Saving a report ........................................................................... 635 Printing a report from the Backup Exec Report Viewer ........................ 636 Viewing completed reports ............................................................ 636 Editing a report ........................................................................... 637 Re-running a completed report ...................................................... 637 Deleting a report ........................................................................ 637 Setting defaults for standard and custom reports ............................... 638 Viewing report properties .............................................................. 639 List of Backup Exec standard reports .............................................. 640 17Contents
  • 18. Alert History report ................................................................ 645 Alert History By Backup Exec Server report ................................ 646 Archive Job Success Rate report ............................................. 646 Archive Selections by Archive Rules and Retention Categories report ........................................................................... 647 Audit Log report .................................................................... 648 Backup Job Success Rate report ............................................. 648 Backup Recommendations report ............................................ 648 Backup Resource Success Rate report ..................................... 649 Backup Sets by Media Set report ............................................. 649 Backup Size By Resource report .............................................. 650 Daily Device Utilization report .................................................. 651 Deduplication Device Summary report ...................................... 652 Deduplication Summary report ................................................ 653 Device Summary report ......................................................... 653 Disk Storage Summary report ................................................. 654 Error-Handling Rules report .................................................... 655 Event Recipients report .......................................................... 656 Exchange Mailbox Group Archive Settings report ........................ 657 Failed Archive Jobs report ...................................................... 657 Failed Backup Jobs report ...................................................... 658 File System Archive Settings report .......................................... 659 Jobs Summary report ............................................................ 659 Managed Backup Exec Servers report ...................................... 660 Media Audit report ................................................................ 662 Media Errors report ............................................................... 663 Media Required for Recovery report ......................................... 663 Media Summary report .......................................................... 664 Media Vault Contents report .................................................... 664 Move Media to Vault report ..................................................... 665 Operations Overview report .................................................... 666 Overnight Archive Summary report ........................................... 668 Overnight Summary report ...................................................... 669 Problem Files report .............................................................. 670 Recently Written Media report ................................................. 671 Resource Protected Recently report ......................................... 671 Resource Risk Assessment report ............................................ 672 Restore Set Details by Resource report ..................................... 673 Retrieve Media from Vault report .............................................. 673 Robotic Library Inventory report ............................................... 674 Scheduled Server Workload report ........................................... 675 Scratch Media Availability report .............................................. 675 Test Run Results report .......................................................... 676 18Contents
  • 19. Vault Store Usage Details report .............................................. 677 Vault Store Usage Summary report .......................................... 678 Chapter 16 Troubleshooting Backup Exec ........................................ 679 Troubleshooting hardware-related issues in Backup Exec ................... 680 How to get more information about alerts and error messages ............. 684 Troubleshooting backup issues in Backup Exec ................................ 684 Troubleshooting failed components in the SAN ................................ 687 Troubleshooting offline storage devices in a SAN ....................... 687 Finding hardware errors in a SAN ............................................ 689 Resetting the SAN ................................................................ 690 Bringing storage devices online after an unsafe device removal event in a SAN ............................................................... 691 How to improve Backup Exec's performance .................................... 691 Accessing Symantec Online .......................................................... 692 Searching the Symantec Knowledge Base ....................................... 693 Contacting Backup Exec Technical Support ..................................... 693 Using Symantec Remote Assistance .............................................. 694 Managing your Backup Exec support cases ..................................... 694 About Backup Exec diagnostic tools ............................................... 694 Running the Symantec Help Tool (SymHelp) .................................... 695 Generating a diagnostic file for troubleshooting Backup Exec ............... 696 Command line switches for a diagnostic file ............................... 697 Running the begather utility to troubleshoot Backup Exec components on Linux servers ................................................................... 700 Using the Backup Exec Debug Monitor for troubleshooting .................. 701 About the Backup Exec debug tool ................................................. 701 Chapter 17 Using Backup Exec in cluster environments ................ 702 About Backup Exec and clusters .................................................... 703 Requirements for clustering Backup Exec in a Microsoft Cluster Server environment ........................................................................ 703 How Backup Exec works in a Microsoft Cluster Server environment ........................................................................ 705 Requirements for installing Backup Exec on a Microsoft Cluster Server ................................................................................ 705 Installing Backup Exec on a Microsoft Cluster Server ........................ 707 Upgrading Backup Exec on a Microsoft cluster ................................. 708 Installing additional Backup Exec options on a Microsoft cluster .......... 708 Uninstalling Backup Exec from a Microsoft cluster ............................. 709 Creating storage device pools for Microsoft Cluster Servers ................ 709 Specifying a different failover node ................................................. 710 19Contents
  • 20. Designating a new central administration server in a Microsoft Cluster Server ................................................................................ 711 Configurations for Backup Exec and Microsoft Cluster Servers ............. 713 Two-node cluster with locally attached storage devices ................. 714 Two-node cluster with tape devices on a shared SCSI bus ............ 715 Configuring a shared SCSI bus for tape devices .......................... 716 Multi-node clusters on a fibre channel SAN with the Central Admin Server Option ................................................................ 718 Using the Central Admin Server Option with Microsoft clusters and a storage area network ............................................................. 719 About backing up Microsoft Cluster Servers ..................................... 720 About restoring data to a Microsoft cluster ....................................... 721 Disaster recovery of a cluster ........................................................ 721 Using Simplified Disaster Recovery to prepare for disaster recovery of a cluster .................................................................... 722 Recovering nodes on the cluster using Simplified Disaster Recovery ...................................................................... 723 Recovering Backup Exec on a Microsoft cluster using Simplified Disaster Recovery .......................................................... 724 Recovering the entire cluster using a manual disaster recovery procedure ..................................................................... 724 Restoring the Microsoft Cluster Server data files ............................... 725 Recovering all shared disks in a Microsoft cluster .............................. 726 Recovering Backup Exec in a Microsoft cluster ................................. 727 Changing the Quorum disk signature for clusters on Windows Server 2003 .................................................................................. 727 Manually joining two cluster disk groups and resynchronizing volumes .............................................................................. 728 Troubleshooting clusters .............................................................. 728 Chapter 18 Simplified Disaster Recovery .......................................... 730 About Simplified Disaster Recovery ................................................ 730 Requirements for using Simplified Disaster Recovery ........................ 731 Preparing computers for use with Simplified Disaster Recovery ............ 734 How to ensure that backups are enabled for Simplified Disaster Recovery ............................................................................ 738 How Simplified Disaster Recovery uses disaster recovery information files .................................................................................... 740 Setting or changing the alternate location for the disaster recovery information file ..................................................................... 742 Changing the default path for the disaster recovery information files .............................................................................. 743 20Contents
  • 21. Disaster recovery information file data paths .............................. 743 Creating a Simplified Disaster Recovery disk image ........................... 745 Contents of the Simplified Disaster Recovery disk image .............. 755 User scenarios when a user starts the Create Recovery Disk Wizard .......................................................................... 756 Preparing to recover from a disaster by using Simplified Disaster Recovery ............................................................................ 757 Hardware replacement during disaster recovery .......................... 758 Prepare to recover IBM computers with Simplified Disaster Recovery ...................................................................... 759 Recovering a computer with Simplified Disaster Recovery ................... 760 Recovery notes for using Simplified Disaster Recovery with storage pools and storage spaces ................................................. 766 Recovery notes for using Simplified Disaster Recovery with Exchange, SQL, SharePoint, CASO, Hyper-V hosts, and the Deduplication Option ....................................................... 769 Advanced Disk Configuration on the Recover This Computer Wizard ................................................................................ 770 Appendix A Symantec Backup Exec Agent for Windows ................. 774 About the Agent for Windows ........................................................ 774 Requirements for the Agent for Windows ......................................... 775 Stopping and starting the Agent for Windows .................................... 776 Establishing a trust between the Backup Exec server and a remote computer ............................................................................ 777 About the Backup Exec Agent Utility for Windows .............................. 777 Starting the Backup Exec Agent Utility ...................................... 778 Viewing the activity status of the remote computer in the Backup Exec Agent Utility ........................................................... 779 Viewing the activity status of the remote computer from the system tray .............................................................................. 779 Starting the Backup Exec Agent Utility automatically on the remote computer ...................................................................... 780 Setting the refresh interval on the remote computer ..................... 780 About publishing the Agent for Windows to Backup Exec servers ......................................................................... 781 Adding Backup Exec servers that the Agent for Windows can publish to ...................................................................... 781 Editing Backup Exec server information that the Agent for Windows publishes to ................................................................... 782 Removing Backup Exec servers that the Agent for Windows can publish to ...................................................................... 783 21Contents
  • 22. Configuring database access for Oracle operations ..................... 784 Removing a security certificate for a Backup Exec server that has a trust with the Agent for Windows ..................................... 786 Using the Backup Exec Agent Utility Command Line Applet ................. 786 Backup Exec Agent Utility Command Line Applet switches .................. 787 Appendix B Symantec Backup Exec Deduplication Option ............ 791 About the Deduplication Option ..................................................... 792 Deduplication methods for Backup Exec agents ................................ 794 Requirements for the Deduplication Option ...................................... 795 Installing the Deduplication Option ................................................. 800 Configuring an OpenStorage device ............................................... 801 Editing the properties of an OpenStorage device ............................... 803 Specifying a Backup Exec server that has proximity to a shared OpenStorage device ............................................................. 805 Creating or importing deduplication disk storage ............................... 806 Editing the properties of a deduplication disk storage device .......... 808 Changing the password for the logon account for deduplication disk storage ................................................................... 813 Selecting storage devices for direct access sharing ........................... 814 Editing server properties for direct access .................................. 815 Changing the location of a deduplication disk storage device ............... 816 Sharing a deduplication device between multiple Backup Exec servers ............................................................................... 818 How to use client-side deduplication ............................................... 818 How to set up backup jobs for deduplication ..................................... 819 Using optimized duplication to copy deduplicated data between OpenStorage devices or deduplication disk storage devices .......... 820 Copying deduplicated data to tapes ................................................ 823 Using deduplication with encryption ................................................ 823 Restoring a deduplication disk storage device or deduplicated data ................................................................................... 824 Disaster recovery of deduplication disk storage devices ..................... 824 Disaster recovery of OpenStorage devices ....................................... 825 Appendix C Symantec Backup Exec Agent for VMware ................... 827 About the Agent for VMware ......................................................... 827 Requirements for using the Agent for VMware .................................. 828 Using the Agent for VMware with Windows Server 2012 ..................... 829 About installing the Agent for VMware ............................................. 830 Adding VMware vCenter Servers and ESX/ESXi hosts to the list of servers on the Backup and Restore tab ..................................... 830 22Contents
  • 23. Viewing details about VMware resources ......................................... 831 Installing the Agent for Windows on VMware virtual machines .............. 832 Push-installing the Agent for Windows to VMware virtual machines ............................................................................ 833 Backing up VMware data .............................................................. 834 Setting default backup options for virtual machines ...................... 839 How Backup Exec automatically backs up new VMware virtual machines during a backup job .......................................... 843 Using Granular Recovery Technology (GRT) with the Agent for VMware ........................................................................ 843 How delayed cataloging works with VMware virtual machine backups ........................................................................ 846 Restoring VMware virtual machines and vmdk files ............................ 848 Appendix D Symantec Backup Exec Agent for Microsoft Hyper-V .......................................................................... 855 About the Agent for Microsoft Hyper-V ............................................ 855 Requirements for using the Agent for Microsoft Hyper-V ..................... 857 About installing the Agent for Microsoft Hyper-V ................................ 859 Using the Agent for Hyper-V with Windows Server 2012/2012 R2 ......... 860 Disk space optimization with the Agent for Hyper-V ........................... 863 Adding a Hyper-V host to the list of servers on the Backup and Restore tab ..................................................................................... 864 Viewing details about Hyper-V resources ......................................... 865 Installing the Agent for Windows on Hyper-V virtual machines .............. 866 Push-installing the Agent for Windows to Hyper-V virtual machines ............................................................................ 867 Backing up Microsoft Hyper-V virtual machines ................................. 868 Setting default backup options for Hyper-V ................................. 873 How Backup Exec automatically protects new virtual machines during a backup job ......................................................... 875 Using Granular Recovery Technology (GRT) with the Agent for Hyper-V ........................................................................ 876 About backing up and restoring highly available Hyper-V virtual machines ...................................................................... 878 How delayed cataloging works with Hyper-V virtual machine backups ........................................................................ 878 Restoring Microsoft Hyper-V virtual machines ................................... 880 23Contents
  • 24. Appendix E Symantec Backup Exec Agent for Microsoft SQL Server ............................................................................. 885 About the Agent for Microsoft SQL Server ........................................ 885 Requirements for using the SQL Agent ........................................... 887 About installing the SQL Agent ...................................................... 888 Backup strategies for SQL ............................................................ 888 Adding SQL Servers to the list of servers on the Backup and Restore tab ..................................................................................... 890 Configuring Backup Exec to run a consistency check before every SQL backup ............................................................................... 890 Using snapshot technology with the SQL Agent ................................ 891 Using database snapshots for SQL Server ....................................... 892 Backing up SQL databases and transaction logs ............................... 894 Setting default backup options for SQL Server ............................ 906 Restoring SQL databases and transaction logs ................................. 916 Restoring the SQL master database ......................................... 918 Restarting SQL using database copies ...................................... 919 Disaster recovery of a SQL Server ................................................. 921 Manual recovery of a SQL Server ............................................ 923 Appendix F Symantec Backup Exec Agent for Microsoft Exchange Server .......................................................... 924 About the Backup Exec Exchange Agent ......................................... 925 Requirements for using the Exchange Agent .................................... 926 Granting permissions on the Exchange Server to enable database backups and restores, and Granular Recovery Technology operations ........................................................................... 930 About installing the Exchange Agent ............................................... 934 Adding Exchange Servers and database availability groups to the list of servers on the Backup and Restore tab .................................. 935 Managing preferred server configurations for Microsoft Exchange Database Availability Groups .................................................. 935 Recommended configurations for Exchange .................................... 938 Requirements for accessing Exchange mailboxes ............................ 939 Backup strategies for Exchange ..................................................... 940 How Granular Recovery Technology works with the Exchange Information Store ................................................................. 942 Snapshot and offhost backups with the Exchange Agent ..................... 944 Backing up Exchange data ........................................................... 946 Setting default backup options for Exchange Server ..................... 952 Restoring Exchange data ............................................................. 957 24Contents
  • 25. Disaster recovery of an Exchange Server ........................................ 963 Appendix G Symantec Backup Exec Agent for Microsoft SharePoint .................................................................... 965 About the Agent for Microsoft SharePoint ........................................ 966 About installing the Agent for Microsoft SharePoint ............................ 966 Requirements for the Agent for Microsoft SharePoint ......................... 966 Using the Agent for Microsoft SharePoint with SharePoint Server 2010/2013 and SharePoint Foundation 2010/2013 ...................... 967 Using the Agent for Microsoft SharePoint with SharePoint Server 2007 and Windows SharePoint Services 3.0 ...................................... 968 Adding a Microsoft SharePoint server farm to the list of servers on the Backup and Restore tab ......................................................... 969 Backing up Microsoft SharePoint data ............................................. 969 Setting default backup options for SharePoint ............................. 973 Restoring Microsoft SharePoint data ............................................... 976 Disabling or enabling communication between a Microsoft SharePoint web server and Backup Exec .................................................. 978 Viewing or changing SharePoint farm properties ............................... 979 Disaster recovery of Microsoft SharePoint 2010/2013 data .................. 980 Disaster recovery of Microsoft SharePoint 2007 data ......................... 984 Appendix H Symantec Backup Exec Agent for Oracle on Windows or Linux Servers ......................................... 987 About the Backup Exec Oracle Agent ............................................. 987 About installing the Oracle Agent ................................................... 988 Configuring the Oracle Agent on Windows computers and Linux servers ............................................................................... 989 Configuring an Oracle instance on Windows computers ................ 990 Viewing an Oracle instance on Windows computers ..................... 994 Editing an Oracle instance on Windows computers ...................... 995 Deleting an Oracle instance on Windows computers .................... 996 Enabling database access for Oracle operations on Windows computers ..................................................................... 996 Configuring an Oracle instance on Linux servers ......................... 999 Viewing an Oracle instance on Linux servers ............................ 1001 Editing an Oracle instance on Linux servers ............................. 1002 Deleting an Oracle instance on Linux servers ............................ 1002 Enabling database access for Oracle operations on Linux servers ....................................................................... 1003 About authentication credentials on the Backup Exec server .............. 1004 25Contents
  • 26. Setting authentication credentials on the Backup Exec server for Oracle operations ......................................................... 1005 Deleting an Oracle server from the Backup Exec server’s list of authentication credentials ............................................... 1006 About Oracle instance information changes .................................... 1007 About backing up Oracle databases .............................................. 1007 About backing up Oracle RAC databases ................................. 1009 About performing a DBA-initiated backup job for Oracle .............. 1010 Oracle backup options ......................................................... 1011 About restoring Oracle resources ................................................. 1012 About DBA-initiated restore for Oracle ..................................... 1015 Oracle restore options ......................................................... 1016 About redirecting a restore of Oracle data ................................ 1016 Oracle advanced restore options ........................................... 1017 Performing a redirect restore of an Oracle 12c database using Backup Exec ............................................................... 1018 Requirements for recovering the complete Oracle instance and database using the original Oracle server ........................... 1022 Recovering the complete Oracle instance and database using the original Oracle server ..................................................... 1022 Requirements for recovering the complete Oracle instance or database to a computer other than the original Oracle server ......................................................................... 1023 Recovering the complete Oracle instance or database to a computer other than the original Oracle server .................... 1024 Best practices for Backup Exec 15 Agent for Oracle on Windows or Linux Servers ..................................................................... 1025 Appendix I Symantec Backup Exec Agent for Enterprise Vault ............................................................................. 1028 About the Agent for Enterprise Vault ............................................. 1028 Requirements for the Enterprise Vault Agent ................................... 1032 About installing the Enterprise Vault Agent ..................................... 1033 About backup methods for Enterprise Vault backup jobs ................... 1033 Enterprise Vault backup options ............................................. 1036 About backing up Enterprise Vault components ............................... 1037 About consistency checks for Enterprise Vault databases and Compliance and Discovery Accelerator databases ..................... 1040 Restoring Enterprise Vault .......................................................... 1040 Enterprise Vault restore options ............................................. 1042 About restoring individual files and folders with the Enterprise Vault Agent .................................................................. 1045 26Contents
  • 27. About automatic redirection of Enterprise Vault components under an Enterprise Vault server ............................................... 1045 Redirecting a restore for an Enterprise Vault component ............. 1046 Configuring Enterprise Vault to use the name of the new SQL Server that holds the Directory database ........................................... 1048 Best practices for the Enterprise Vault Agent .................................. 1050 About the Backup Exec Migrator for Enterprise Vault ........................ 1050 Backup Exec Migrator for Enterprise Vault requirements ............. 1051 How the Backup Exec Migrator works ..................................... 1051 About using staged migrations with Backup Exec and the Backup Exec Migrator ............................................................... 1055 About Backup Exec Migrator events ........................................ 1056 About Backup Exec Migrator logs ........................................... 1056 About deleting files migrated by Backup Exec Migrator ............... 1057 Configuring the Backup Exec Migrator ..................................... 1058 About viewing migrated Enterprise Vault data ........................... 1066 About retrieving migrated Enterprise Vault data ......................... 1067 About the Partition Recovery Utility ......................................... 1068 Enterprise Vault logon account ..................................................... 1071 Enterprise Vault options .............................................................. 1072 Appendix J Symantec Backup Exec Agent for Lotus Domino ......................................................................... 1073 About the Agent for Lotus Domino Server ...................................... 1074 Lotus Domino Agent requirements ................................................ 1074 About installing the Lotus Domino Agent on the Backup Exec server ............................................................................... 1076 About the Lotus Domino Agent and the Domino Attachment and Object Service (DAOS) .................................................................. 1076 Best practices for restoring the missing .nlo files ........................ 1077 Viewing Lotus Domino databases ................................................ 1078 About backing up Lotus Domino databases .................................... 1078 About selecting backup options for Lotus Domino databases ....... 1080 Lotus Domino Agent backup options ....................................... 1080 About automatic exclusion of Lotus Domino files during volume-level backups .................................................... 1081 About supported Lotus Domino database configurations ............. 1081 About Lotus Domino transaction logs ...................................... 1082 About restoring Lotus Domino databases ....................................... 1083 Restoring Lotus Domino databases ........................................ 1084 Lotus Domino Agent restore options ....................................... 1086 About redirecting restore jobs for Lotus Domino databases .......... 1088 27Contents
  • 28. About redirecting the restore of DAOS NLO files ........................ 1089 How to prepare for disaster recovery on a Lotus Domino server .......... 1089 Recovering a Lotus Domino server from a disaster .......................... 1089 About disaster recovery of a Lotus Domino server using archive logging ............................................................................. 1091 Disabling the monitor change journal ............................................ 1091 Recovering the Lotus Domino server, databases, and transaction logs when archive logging is enabled ............................................ 1092 Re-enabling the monitor change journal ......................................... 1093 Recovering a Lotus Domino server that uses circular logging ............. 1094 Appendix K Symantec Backup Exec Agent for Microsoft Active Directory ...................................................................... 1096 About the Agent for Microsoft Active Directory ................................. 1096 Requirements for the Agent for Microsoft Active Directory ................. 1097 About backing up Active Directory and ADAM/AD LDS ..................... 1098 Editing options for Active Directory and ADAM/AD LDS backup jobs ............................................................................ 1099 Microsoft Active Directory backup job options ........................... 1101 About restoring individual Active Directory and ADAM/AD LDS objects .............................................................................. 1102 Appendix L Symantec Backup Exec Central Admin Server Option ........................................................................... 1105 About the Central Admin Server Option ......................................... 1106 Requirements for installing CASO ................................................ 1108 How to choose the location for CASO storage and media data .......... 1109 About installing the Central Admin Server Option ............................. 1111 Push-installing a managed Backup Exec server from the central administration server ..................................................... 1112 Managed Backup Exec Server Configuration options .................. 1118 Installing a managed Backup Exec server across a firewall ......... 1119 Upgrading an existing CASO installation ........................................ 1122 Changing a Backup Exec server to a central administration server ............................................................................... 1124 Changing a Backup Exec server to a managed Backup Exec server ............................................................................... 1125 Deleting a managed Backup Exec server from a CASO environment ....................................................................... 1128 Renaming a central administration server ....................................... 1130 Renaming a managed Backup Exec server .................................... 1130 28Contents
  • 29. How to reduce network traffic in CASO .......................................... 1132 CASO distributed, centralized, and replicated catalog locations .......... 1132 Changing the settings for a managed Backup Exec server ................. 1134 What happens when CASO communication thresholds are reached ............................................................................ 1145 Enabling or disabling communications between the managed Backup Exec server and the central administration server ......................................................................... 1146 Alerts and notifications in CASO ................................................... 1146 Enabling managed Backup Exec servers to use any available network interface card .................................................................... 1147 About job delegation in CASO ..................................................... 1148 About copying jobs instead of delegating jobs in CASO ............... 1148 About adding storage devices in a CASO environment ..................... 1149 How data lifecycle management (DLM) works in a CASO environment ....................................................................... 1149 Obtaining media audit information for a managed Backup Exec server ............................................................................... 1150 How to use Backup Exec server pools in CASO ............................. 1150 Selecting a Backup Exec server pool for backups ...................... 1151 Creating a Backup Exec server pool ....................................... 1152 Adding managed Backup Exec servers to a Backup Exec server pool ........................................................................... 1152 Deleting a Backup Exec server pool ........................................ 1153 Removing a managed Backup Exec server from a Backup Exec server pool .................................................................. 1153 How centralized restore works in CASO ......................................... 1154 How CASO restores data that resides on multiple storage devices ....................................................................... 1155 About recovering failed jobs in CASO ............................................ 1156 Pausing or resuming a managed Backup Exec server ...................... 1158 Stopping or starting Backup Exec services for a managed Backup Exec server ....................................................................... 1158 Viewing managed Backup Exec server properties ............................ 1159 Viewing the settings for a central administration server ..................... 1162 Disaster recovery in CASO ......................................................... 1164 Troubleshooting CASO .............................................................. 1165 Running the Backup Exec Utility for CASO operations ...................... 1167 Uninstalling Backup Exec from the central administration server ........ 1167 Uninstalling Backup Exec from a managed Backup Exec server ......... 1168 29Contents
  • 30. Appendix M Symantec Backup Exec Advanced Disk-based Backup Option ............................................................ 1169 About the Advanced Disk-based Backup Option .............................. 1169 How to use synthetic backups in place of recurring full backups .......... 1170 Configuring off-host backup options for a backup job ........................ 1171 Setting default backup options for the Advanced Disk-based Backup Option .............................................................................. 1173 About true image restore for synthetic backups ............................... 1175 How to use off-host backup to process remote computer backups on the Backup Exec server ........................................................ 1177 Troubleshooting off-host backups ................................................. 1180 Appendix N Symantec Backup Exec NDMP Option ......................... 1184 Features of the NDMP Option ...................................................... 1184 Requirements for using the NDMP Option ...................................... 1185 About installing the NDMP Option ................................................. 1186 Adding NDMP servers to Backup Exec .......................................... 1186 Sharing the tape drives on NDMP servers between multiple Backup Exec servers ...................................................................... 1188 NDMP backup options for NDMP servers ....................................... 1188 NDMP server backup selections .................................................. 1190 How to use patterns to exclude files and directories from an NDMP server backup .................................................................... 1191 Supported configurations for duplicating data from NDMP servers ............................................................................. 1193 About restoring and redirecting restore data for NDMP servers ........... 1193 NDMP server restore options ................................................. 1194 Setting the default backup options for the NDMP Option ................... 1197 Viewing the properties of an NDMP server ..................................... 1198 NDMP server properties ....................................................... 1198 Viewing storage properties for an NDMP server .............................. 1199 Storage properties for an NDMP server ................................... 1199 Appendix O Symantec Backup Exec Agent for Linux ...................... 1201 About the Agent for Linux ........................................................... 1202 About open files and the Agent for Linux ........................................ 1202 Requirements for the Agent for Linux ............................................ 1202 About installing the Agent for Linux ............................................... 1203 Installing the Agent for Linux ................................................. 1204 About the Backup Exec operators (beoper) group for the Agent for Linux ...................................................................... 1206 30Contents
  • 31. About establishing trust for a remote Linux computer in the Backup Exec list of servers ............................................................. 1207 Establishing trust and adding a remote Linux computer to the Backup Exec list of servers ............................................. 1208 Adding additional Backup Exec servers to which the Agent for Linux can publish information ........................................................ 1208 About configuring the Agent for Linux ............................................ 1209 Excluding files and directories from all backup jobs for Linux computers ......................................................................... 1210 Editing configuration options for Linux computers ............................ 1210 Configuration options for Linux computers ................................ 1211 About backing up a Linux computer by using the Agent for Linux ........ 1218 Linux backup options ........................................................... 1219 About backing up and restoring Novell Open Enterprise Server (OES) components ....................................................... 1220 About restoring data to Linux computers ........................................ 1222 About restoring Novell OES components ................................. 1222 Restore job options for Linux computers .................................. 1222 Editing the default backup job options for Linux computers ................ 1223 Default backup job options for Linux computers ......................... 1224 Uninstalling the Agent for Linux .................................................... 1225 Manually uninstalling the Agent for Linux ................................. 1226 Run-time scripts to remove when manually uninstalling the Agent for Linux ...................................................................... 1227 Starting the Agent for Linux daemon ............................................. 1228 Stopping the Agent for Linux daemon ............................................ 1229 Troubleshooting the Agent for Linux .............................................. 1229 Appendix P Symantec Backup Exec Agent for Mac ........................ 1235 About the Agent for Mac ............................................................. 1236 Requirements for the Agent for Mac .............................................. 1236 About the Backup Exec admin group on Macintosh systems .............. 1236 Creating the Backup Exec admin group manually on Macintosh systems ...................................................................... 1237 About installing the Agent for Mac ................................................ 1238 Installing the Agent for Mac ................................................... 1238 Uninstalling the Agent for Mac ..................................................... 1241 Manually uninstalling the Agent for Mac ................................... 1242 About configuring the Agent for Mac ............................................. 1243 Editing configuration options for Macintosh computers ................ 1244 Configuration options for Macintosh computers ......................... 1244 Starting the Agent for Mac .......................................................... 1249 31Contents
  • 32. Stopping the Agent for Mac ........................................................ 1250 About establishing trust for a remote Macintosh system in the Servers list .................................................................................... 1250 Establishing trust and adding a remote Macintosh computer to the Backup Exec Servers list ........................................... 1250 Adding additional Backup Exec servers to which the Agent for Mac can publish information ........................................................ 1251 About backing up data by using the Agent for Mac ........................... 1252 Editing the default backup options for Macintosh systems ............ 1252 About excluding files and directories from backup jobs for Macintosh computers ..................................................... 1254 About restoring Macintosh systems ............................................... 1255 Macintosh restore options ..................................................... 1255 Troubleshooting the Agent for Mac ............................................... 1255 Appendix Q Symantec Backup Exec Remote Media Agent for Linux ............................................................................. 1257 About the Remote Media Agent for Linux ...................................... 1258 How the Remote Media Agent for Linux works ................................ 1259 Requirements for the Remote Media Agent for Linux ........................ 1260 About open files and the Remote Media Agent for Linux .................... 1261 About installing the Remote Media Agent for Linux ........................... 1261 Installing the Remote Media Agent for Linux ............................. 1262 Uninstalling the Remote Media Agent for Linux ............................... 1265 Starting the Remote Media Agent for Linux daemon ......................... 1266 Stopping the Remote Media Agent for Linux daemon ....................... 1266 About establishing trust for a Remote Media Agent for Linux computer in the Backup Exec list of servers .......................................... 1267 Establishing trust and adding a Remote Media Agent for Linux computer to the Backup Exec list of servers ........................ 1267 Adding additional Backup Exec servers to which Remote Media Agent for Linux can publish ............................................................ 1268 Finding simulated tape library files ................................................ 1268 About the Backup Exec operators (beoper) group for the Remote Media Agent for Linux ................................................................... 1269 Creating the Backup Exec operators (beoper) group manually for the Remote Media Agent for Linux .................................... 1270 About adding a Linux server as a Remote Media Agent for Linux ....... 1270 Adding a Linux server as a Remote Media Agent for Linux .......... 1271 Remote Media Agent for Linux options .................................... 1271 Changing the port for communications between the Backup Exec server and the Remote Media Agent for Linux .................................... 1273 32Contents
  • 33. About creating storage device pools for devices attached to the Remote Media Agent for Linux ......................................................... 1273 Editing properties for the Remote Media Agent for Linux .................. 1274 Remote Media Agent for Linux properties ................................. 1274 Deleting a Remote Media Agent for Linux from the Backup Exec list of servers .......................................................................... 1275 Sharing a Remote Media Agent for Linux between multiple Backup Exec servers ...................................................................... 1275 About backing up data by using the Remote Media Agent for Linux ................................................................................ 1276 About restoring data by using the Remote Media Agent for Linux ........ 1276 About the Tape Library Simulator Utility ......................................... 1277 Creating a simulated tape library .................................................. 1278 Simulated Tape Library options .............................................. 1279 Viewing simulated tape libraries properties ..................................... 1279 Simulated tape library properties ............................................ 1280 Deleting a simulated tape library .................................................. 1280 Managing simulated tape libraries from the command line ................. 1281 Command line switches for the Tape Library Simulator Utility ............. 1282 Troubleshooting the Remote Media Agent for Linux ......................... 1283 Appendix R Symantec Backup Exec Storage Provisioning Option ........................................................................... 1286 Features of the Storage Provisioning Option ................................... 1287 Requirements for the Storage Provisioning Option ........................... 1288 About installing the Storage Provisioning Option .............................. 1288 Viewing storage array components in Backup Exec .......................... 1289 Configuring a storage array by using the Configure Storage Wizard .............................................................................. 1289 Editing properties for a storage array and its physical disks ................ 1291 About the Any Virtual Disk Storage device pool in the Storage Provisioning Option ............................................................. 1291 About virtual disks in the Storage Provisioning Option ....................... 1292 Editing default options for a virtual disk on a storage array ........... 1294 Configuring a virtual disk on a storage array ............................ 1299 Editing properties for unconfigured virtual disks on a storage array .......................................................................... 1299 Editing properties of virtual disks on storage arrays .................... 1300 Adding a hot spare by using the Configure Storage Wizard ................ 1305 Changing a hot spare by using the Configure Storage Wizard ............ 1306 Detecting a new storage array ..................................................... 1306 Renaming a virtual disk or storage array ........................................ 1307 33Contents
  • 34. Identifying the physical disks of a virtual disk by using the blink feature .............................................................................. 1308 Troubleshooting the Storage Provisioning Option ............................. 1309 Appendix S Symantec Backup Exec Archiving Option ................... 1310 About the Archiving Option .......................................................... 1311 Requirements for both the Exchange Mailbox Archiving Option and the File System Archiving Option ............................................ 1312 Requirements for the Exchange Mailbox Archiving Option ........... 1314 Requirements for the File System Archiving Option .................... 1317 About granting permissions on the Exchange Server for the Backup Exec service account in the Archiving Option .......... 1318 How to calculate disk space requirements for the Exchange Mailbox Archiving Option ................................................ 1324 How to calculate disk space requirements for the File System Archiving Option ........................................................... 1327 Installing the Backup Exec Archiving Option ................................... 1330 About using the command line to install the Backup Exec Exchange Mailbox Archiving Option .................................. 1331 About the Internet Information Services (IIS) 7.0 role services installed by Backup Exec ................................................ 1331 About uninstalling or reinstalling the Archiving Option ................. 1333 About installing Enterprise Vault on a Backup Exec server on which the Archiving Option is installed ............................... 1334 About Enterprise Vault services for the Archiving Option ............. 1334 Repairing the Backup Exec Archiving Option ............................ 1335 How the Archiving Option works ................................................... 1335 Types of data not included in archive jobs ................................ 1336 Best practices for the Archiving Option .......................................... 1337 About creating an archive job ...................................................... 1338 Viewing the servers that have archiving jobs ............................. 1339 Setting archive job options .................................................... 1339 Editing default settings for the Archiving Option ............................... 1344 Default settings for the Archiving Option .................................. 1344 About single instance storage of archived items .............................. 1347 Enabling single instance storage of archived items ..................... 1348 About synchronizing archive permissions and settings ...................... 1348 About vault stores in the Archiving Option ...................................... 1349 Editing or viewing vault store properties ................................... 1350 Vault store properties ........................................................... 1350 About deleting an Archiving Option vault store .......................... 1351 Deleting a vault store ........................................................... 1352 34Contents
  • 35. About vault store partitions in the Archiving Option ........................... 1352 Editing vault store partition properties ...................................... 1353 Vault store partition properties ............................................... 1353 About archives in the Archiving Option .......................................... 1354 Editing archive properties ..................................................... 1354 Deleting an archive ............................................................. 1355 Archive properties ............................................................... 1355 About Archiving Option operation entries in the audit log ................... 1356 About Exchange mailbox groups in archive jobs .............................. 1356 Managing Exchange mailbox groups ....................................... 1357 Manage mailbox groups options ............................................. 1358 Mailbox group options for mailbox group details ........................ 1359 About deleting archived data from its original location ....................... 1361 About archive settings in the Archiving Option ................................. 1361 Manage Archive Settings options ........................................... 1361 Archive Settings Details ....................................................... 1362 About retention categories for archived items ............................ 1364 About managing index locations in the Backup Exec Archiving Option .............................................................................. 1368 Viewing index locations ........................................................ 1369 Adding a new index location .................................................. 1369 Deleting an index location ..................................................... 1370 Opening or closing an index location ....................................... 1370 Manage Index Locations options ............................................ 1371 About restoring items from the archives ......................................... 1372 About searching for data in the archives ........................................ 1373 About deleting data from the archives ............................................ 1373 Deleting data from the archives .............................................. 1374 Delete from Archive options .................................................. 1374 About backing up and restoring the Archiving Option components from a remote Backup Exec server ................................................ 1375 Preventing the deletion of expired archived items from an archive ....... 1375 About backing up Archiving Option components .............................. 1375 Archive Option backup options ............................................... 1378 About consistency checks for Archiving Option databases ........... 1379 About disabling backup mode for Archiving Option components ................................................................. 1379 About restoring an Archiving Option component .............................. 1380 About running the Backup Exec Utility to complete redirected restores of Archiving Option components ........................... 1381 Running the Backup Exec Utility to complete a redirected restore of the Archiving Option databases .................................... 1382 35Contents