Professional Documents
Culture Documents
Administrator's Guide
The software described in this book is furnished under a license agreement and may be used
only in accordance with the terms of the agreement.
Legal Notice
Copyright © 2009 Symantec Corporation. All rights reserved.
This Symantec product may contain third party software for which Symantec is required
to provide attribution to the third party (“Third Party Programs”). Some of the Third Party
Programs are available under open source or free software licenses. The License Agreement
accompanying the Software does not alter any rights or obligations you may have under
those open source or free software licenses. Please see the Third Party Legal Notice Appendix
to this Documentation or TPIP ReadMe File accompanying this Symantec product for more
information on the Third Party Programs.
The product described in this document is distributed under licenses restricting its use,
copying, distribution, and decompilation/reverse engineering. No part of this document
may be reproduced in any form by any means without prior written authorization of
Symantec Corporation and its licensors, if any.
THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS,
REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT,
ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO
BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL
OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING,
PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED
IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE.
The Licensed Software and Documentation are deemed to be commercial computer software
as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19
"Commercial Computer Software - Restricted Rights" and DFARS 227.7202, "Rights in
Commercial Computer Software or Commercial Computer Software Documentation", as
applicable, and any successor regulations. Any use, modification, reproduction release,
performance, display or disclosure of the Licensed Software and Documentation by the U.S.
Government shall be solely in accordance with the terms of this Agreement.
Symantec Corporation
350 Ellis Street
Mountain View, CA 94043
http://www.symantec.com
10 9 8 7 6 5 4 3 2 1
Technical Support
Symantec Technical Support maintains support centers globally. Technical
Support’s primary role is to respond to specific queries about product features
and functionality. The Technical Support group also creates content for our online
Knowledge Base. The Technical Support group works collaboratively with the
other functional areas within Symantec to answer your questions in a timely
fashion. For example, the Technical Support group works with Product Engineering
and Symantec Security Response to provide alerting services and virus definition
updates.
Symantec’s maintenance offerings include the following:
■ A range of support options that give you the flexibility to select the right
amount of service for any size organization
■ Telephone and Web-based support that provides rapid response and
up-to-the-minute information
■ Upgrade assurance that delivers automatic software upgrade protection
■ Global support that is available 24 hours a day, 7 days a week
■ Advanced features, including Account Management Services
For information about Symantec’s Maintenance Programs, you can visit our Web
site at the following URL:
www.symantec.com/techsupp/
Customer service
Customer service information is available at the following URL:
www.symantec.com/techsupp/
Customer Service is available to assist with the following types of issues:
■ Questions regarding product licensing or serialization
■ Product registration updates, such as address or name changes
■ General product information (features, language availability, local dealers)
■ Latest information about product updates and upgrades
■ Information about upgrade assurance and maintenance contracts
■ Information about the Symantec Buying Programs
■ Advice about Symantec's technical support options
■ Nontechnical presales questions
■ Issues that are related to CD-ROMs or manuals
Maintenance agreement resources
If you want to contact Symantec regarding an existing maintenance agreement,
please contact the maintenance agreement administration team for your region
as follows:
Symantec Early Warning Solutions These solutions provide early warning of cyber attacks, comprehensive threat
analysis, and countermeasures to prevent attacks before they occur.
Managed Security Services These services remove the burden of managing and monitoring security devices
and events, ensuring rapid response to real threats.
Consulting Services Symantec Consulting Services provide on-site technical expertise from
Symantec and its trusted partners. Symantec Consulting Services offer a variety
of prepackaged and customizable options that include assessment, design,
implementation, monitoring, and management capabilities. Each is focused on
establishing and maintaining the integrity and availability of your IT resources.
Educational Services Educational Services provide a full array of technical training, security
education, security certification, and awareness communication programs.
To access more information about Enterprise services, please visit our Web site
at the following URL:
www.symantec.com
Select your country or language from the site index.
Contents
How Continuous Protection Server works with Backup Exec ............... 131
Protecting your Exchange Servers with Continuous Protection Server
and Backup Exec .................................................................. 132
Protecting CPS with Backup Exec .................................................. 132
Configuring CPS for Backup Exec ............................................ 133
Backing up CPS with Backup Exec ............................................ 133
Restoring Continuous Protection Server with Backup Exec ........... 135
Monitoring CPS jobs in Backup Exec .............................................. 137
Understanding the credentials for using Backup Exec
SmartLink ..................................................................... 137
Setting up a SmartLink connection between CPS and Backup
Exec ............................................................................. 138
Viewing Backup Exec alerts .................................................... 140
Viewing Backup Exec job logs ................................................. 143
About CPS backup job log details ............................................. 143
Contents 11
Continuous Protection Server lets end users restore their own data through Backup
Exec Retrieve, a Web-based data-retrieval tool. End users can retrieve their own
files without IT assistance, and you do not need to install any software or clients
on their computers.
Continuous Protection Server is compatible with the following Symantec products:
Backup Exec (11d or later) for Windows Protects your application servers such as
Servers Microsoft Exchange, SQL, and the
Continuous Management Service. It also
provides long-term storage to various media.
Component Description
Business Servers The Business Servers store the data that users save during the course of their daily operations.
Once data is saved to the Business Server, the data can be backed up to a Protection Server.
The Business Servers must reside in the same Backup Group as the Protection Server. You
must install a Continuous Protection Agent on each Business Server.
Protection Server The Protection Server is the destination of the CPS backup data. It is typically installed at
a primary location or a central office. The Protection Server hosts the backup destinations
where snapshots are taken and indexed. More than one Protection Server can be installed
in the Backup Group.
Introducing Symantec Continuous Protection Server 15
Components of Continuous Protection Server
Component Description
Note: You can install only one Continuous Protection Server in a Backup Group. You must
install the Continuous Protection Server before you install any other components. Also, the
Continuous Protection Server should be installed on a server that has a fixed IP address.
Continuous The Continuous Protection Agent manages data collection during backup and restore jobs.
Protection Agent You must install it on all Business Servers and Protection Servers in the Backup Group.
Administration The Administration Console controls all aspects of CPS, including defining data sources and
Console destinations, creating backup and restore jobs, and defining backup and snapshot schedules.
Additionally, the Administration Console is used to view and respond to alerts, monitor
backup and restore jobs, and obtain product updates from Symantec.
Backup Exec Retrieve Backup Exec Retrieve allows workstation users to find and retrieve the files that were backed
up with CPS, without requiring any assistance from system administrators. Workstations
only require Web browsers to use this feature, so you do not need to install the Continuous
Protection Server software on the users’ workstations.
Users can browse all of their backed up files, or they can search for files by using full or
partial file names. They can also view and restore versions of backed up files.
Backup Exec This component lets users view the combined status of CPS and Backup Exec jobs in the
SmartLink Backup Exec Administration Console.
Remote Agent for Continuous Protection Server uses the Symantec Backup Exec Remote Agent for Windows
Windows Systems Systems (Remote Agent) to access System State information for backup and restore. Remote
(Remote Agent) Agent also enables Backup Exec to back up Protection Servers and the CMS to tape efficiently.
Remote Agent is not required when CPS is installed on Backup Exec because the server
already contains Remote Agent functionality. However, the Remote Agents that are used
by CPS and Backup Exec must be the same version (11d or later).
16 Introducing Symantec Continuous Protection Server
How Continuous Protection Server works
Component Description
Symantec LiveUpdate Symantec LiveUpdate is installed with the Administration Console. LiveUpdate notifies
administrators when updates to installed Symantec products become available for download.
LiveUpdate connects to the Symantec LiveUpdate server by the Internet.
End-User Workstations
(Connected to a local
Business Server)
Business Servers
(Local or Remote Offices)
(Continuous
Protection
5
Agent)
CPS
Admin
Console
3 6
Protection Server Continuous
Management
(Continuous Server
Copy Center
Protection
Agent)
4
2
Snapshots Web
and Server
Indexing
7
9
The following scenario provides an example of how you can use Continuous
Protection Server with Backup Exec to back up and restore data:
18 Introducing Symantec Continuous Protection Server
How Continuous Protection Server works
1 Users save files and folders to local file servers (Business Servers) as part of
their normal daily work. Business Servers are interconnected and together form
a common Backup Group.
3 You can use the Backup Job Wizard to create Continuous Protection Server
backup jobs to back up data from one or more Business Servers to a Protection
Server. When you create a job, you select the data to be backed up and the
schedule for the backup job. You can schedule CPS backup jobs to run at specific
times (periodically), as files incur any changes (continuously), or as needed (on
demand).
5 Users retrieve specific files and folders to their workstations by using Backup
Exec Retrieve. Users can select specific versions of their data to be restored.
6 If a system failure occurs at one or more Business Servers, the backed up data
can be quickly restored from the Protection Server to the Business Server.
See “About restoring data with Continuous Protection Server” on page 99.
7 After the data is backed up to the Protection Server, you can back up the data
to Backup Exec to archive the data to tape or disk for long-term storage.
8 If a system failure or data loss occurs at a Protection Server, Backup Exec can
quickly restore the data back to the Protection Server or back to a Business
Server.
See “Restoring Continuous Protection Server with Backup Exec” on page 135.
Introducing Symantec Continuous Protection Server 19
What you can do with Continuous Protection Server
9 The Backup Exec SmartLink component lets you view the status of Continuous
Protection Server backup jobs in the Backup Exec Job Logs and Alerts. This
option lets administrators determine the quality and completion of the
Continuous Protection Server jobs before or during the Backup Exec backup job.
Feature Description
Continuous data CPS backs up files on a network (LAN or WAN) and writes them immediately to a Protection
protection Server with no wait time. You do not need to take incremental or differential backups on
servers that are protected by CPS. This feature keeps productivity high while protecting
the organization’s information.
Byte-level protection Only the changed data is captured and protected. This granular (or byte-level) protection
reduces the amount of data moving across the network, thereby increasing efficiency.
Backup Exec Retrieve Backup Exec Retrieve allows workstation users to find and retrieve the files that were
backed up with CPS, without requiring any assistance from system administrators.
Workstations only require Web browsers to use this feature, so you do not need to install
the Continuous Protection Server software on the users’ workstations.
Full system restore Entire servers can be backed up, including system files. In the event of a system-wide failure,
such as a virus attack, Business Servers (sources) can be quickly restored to a previous
state.
Simultaneous backups Provides multi-streaming, which enables multiple file servers to be continuously backed
up at one time to a single Protection Server.
Administration The Administration Console enables users to define backup destinations, customize jobs,
Console view status, and learn of any issues that arise.
Point-in-time CPS leverages Volume Shadow Copy Service (VSS) snapshots to provide versioning of files.
snapshots This allows users or administrators to recover a previous version of a document. Snapshot
settings provide administrators with greater flexibility in managing and retaining snapshots.
SmartLink to Existing Symantec Backup Exec users can view some CPS activities from within the Backup
Symantec Backup Exec Exec Administration Console. For example, you can view logs for CPS backup jobs. You also
can use Backup Exec to move disk-based backups to tape for long-term storage.
Flexible backup Back up only the specific data you need. Save on system resources by backing up only the
options information that needs to be recovered.
20 Introducing Symantec Continuous Protection Server
About backup strategies and planning
Feature Description
Customized backup Back up files on demand, or schedule periodic and continuous backups to run automatically.
schedules
Bandwidth throttling Administrators can set the maximum amount of bandwidth to be used for continuous data
protection jobs.
Open file protection Continuous Protection Server protects open files during continuous protection.
Customized retention Retention properties define how long to keep daily, weekly, and monthly backups on disk.
properties
Auto job resume Automatically resumes a continuous protection job when lost connections are restored
without requiring intervention from an administrator.
Push installation Continuous Protection Agents can be push installed to remote servers from a central console.
IT resources do not need to be at that office or location where continuous protection is
installed or taking place.
Discovery Intuitive search capabilities enable users to find files by file name, modification date, specific
file type, or file size.
Scalable protection Information can be backed up from sources in the current network, as well as from new
servers as they are added to the Backup Group.
System State backup Continuous Protection Server captures system state information, reducing the time and
effort to recover server configuration information.
64-bit native support Supports 64-bit native processors for Business and Protection servers.
Settings Utility Includes a Settings utility where user-configurable registry settings can be managed.
Continuous protection Supports continuous protection of Microsoft Exchange servers to Backup Exec.
of Exchange
The main purpose of your backup strategy is to recover and restore information
as quickly as possible after a loss. Secondarily, you need to manage your resources
effectively to save money. A well-designed backup strategy plays a key role in
your ability to restore lost files quickly.
Regular Files that are backed up on a routine basis. You select the
days the backups are run and the time the backups begin.
For example, you can back up your personnel data each day,
Monday through Friday, at 5:00 P.M. Another example would
be to back up all of the Business Servers every Saturday,
beginning at 1:00 A.M.
Periodic Files that are backed up on certain days of the week and run
periodically on timed intervals. For example, you can back
up your sales proposals every hour, your development data
every three hours, your quality assurance data every four
hours, and so on.
Continuous Critical business files, such as customer data, that are backed
up continuously. Every time a file changes, the changes are
copied to the Protection Server. There is no wait time or
preset interval when the information is copied. The backup
takes place immediately, even while files are open.
Introducing Symantec Continuous Protection Server 23
Where to find more information
(CPSadmin_XX.pdf)
(CPSquick_xx.pdf)
Continuous Protection Installed and stored on the server, the Help file is accessible
Server Help files from the Administration Console.
(CPSconsole_XX.chm)
The “XX” in the filename indicates the language of the file. The choices are EN
(English), ES (Spanish), FR (French), IT (Italian), DE (German), JP (Japanese), KO
24 Introducing Symantec Continuous Protection Server
Where to find more information
Review the guidelines for installing See “Guidelines for installation” on page 26.
Continuous Protection Server for
information about the order in which
the components should be installed.
26 Installing Continuous Protection Server
Before you install
Run the Environment Check tool to See “Checking your environment before
check for issues that could affect the installation” on page 27.
installation.
If you are upgrading from a previous See “Upgrading to Continuous Protection Server
version, review the product 2010” on page 46.
documentation for any compatibility
issues that could affect the installation.
Review the Readme file for information See “File system filter driver compatibility”
about incompatible products that on page 29.
should be turned off or uninstalled
before you install Continuous
Protection Server.
Review the product documentation for See “Understanding the Continuous Protection
information about setting up the Server service account” on page 29.
service account for Continuous
Protection Server.
Verify that the systems on which you See “System requirements for the product”
want to install Continuous Protection on page 30.
Server and its components meet the
system requirements.
Configure your firewall to allow traffic See “Firewall support ” on page 33.
through the ports that are used by
Continuous Protection Server.
Although the Environment Check runs automatically during installation, you may
want to run it manually before installing Continuous Protection Server or before
backing up data with Continuous Protection Server.
28 Installing Continuous Protection Server
Before you install
4 Click Next.
5 If you checked Remote Environment Check in step 3, do one of the following:
■ To select the name of computer from a list, click Add Server From List.
Select the computer from the list, and then click Next.
■ To add the name of a computer manually, click Add Server Manually.
Type the name of the domain and the computer name, and then click OK.
Type the user name and password for this computer, and then click OK.
■ To remove the name of a computer from the list of computers on which
the Environment Check will run, select the computer from the list, and
then click Remove.
6 Review the results of the Environment Check, especially those items that
were flagged as Failed or Warning.
To save the results of the Environment Check, check Save Results To.
7 To change the location where the Environment Check results are saved, click
Change Path to browse to a new location.
8 Click Finish.
The account that is used must be valid on each node in the Backup Group. This
account may require establishing a Domain Trust relationship.
If a cross domain trust exists between the computers push installing from and to,
the account that is running from the installing computer must be present in the
local administrators group of the computer being push installed to.
When operating in a workgroup environment, all nodes in the backup group must
run in non-secure mode. (Pre and post-job scripts run under the service account,
although additional rights may be required.)
Component Requirements
Disk Space: Named Objects 100 MB or more depending on server configuration (minimum 1 GB recommended
if backing up System State)
UPS Uninterruptible power supply (UPS) such as battery backup power, recommended
Component Requirements
Supported Operating The Continuous Management Service and Protection Servers are supported on the
Systems following operating systems:
Volumes The Protection Server should have at least four separate volumes for ideal
performance, such as the following:
■ System volume
■ Journals volume
■ Backup destination volume
■ Snapshot storage volume for backup destination
UPS Uninterruptible power supply (UPS) such as battery backup power, recommended
Component Requirements
Supported Operating The Administration Console is supported on the following operating systems:
Systems
■ Microsoft Windows 2000 Professional with Service Pack 4
■ Microsoft Windows 2000 Server with Service Pack 4
■ Microsoft Windows 2000 Advanced Server with Service Pack 4
■ Microsoft Windows Server 2003 family (including R2, but not Data Center) with
Service Pack 1
■ Microsoft Windows XP Professional
■ Microsoft Windows XP Professional x64 Edition
■ Microsoft Windows Vista
■ Microsoft Windows Server 2008 and Windows Server 2008 R2, including Windows
Server Core
■ Microsoft Windows 7 (all versions)
Firewall support
Firewalls must be configured to allow the following ports through to support
Continuous Protection Server. CPS automatically creates a firewall exception list.
If any of the default port settings are changed on one computer, they must be
changed on all computers in the Continuous Protection Server Backup Group.
Warning: Incorrectly editing registry keys may severely damage your system.
Before making changes to the registry, you should back up any valued data on the
computer.
Table 2-5 lists the default port settings for Continuous Protection Server.
34 Installing Continuous Protection Server
System requirements for the product
Service Name Default Port Number Port Type Editable Registry Key
Service Name Default Port Number Port Type Editable Registry Key
139 TCP
Continuous Protection Server also uses the following ports on the local server:
■ 2638
■ 9000-9003
■ 10000
■ 13730
■ 14300
■ 20487
Because these ports are only used on the local server, it is not necessary (or
recommended) that they be opened through your firewall.
Installing Continuous Protection Server 35
What gets installed and where
Folder Description
ASA (Adaptive Server The ASA folder contains the Win32 and Charsets folders. The Win32 folder contains the
Anywhere) ASA database engine and its backup files, DBMS service, ASA support files, and ASA query
tool. The database backup (cpsDBBackup.exe) and validation (cpsDBValidate.exe) utilities
are also contained in this folder.
Autonomy Continuous Protection Server uses a third-party indexing service that is called Autonomy.
The Autonomy folder contains all the files and services that are used by the indexing service.
The Autonomy log files are also maintained in this folder.
Database The Database folder contains the Continuous Management Service (rms.db) and Continuous
Protection Agent (rsa.db) databases, their backup copies, and the related database files.
Drivers The Drivers folder contains the Continuous Protection Server filter driver.
Install The Install folder contains Continuous Protection Server, Remote Agent, and Symantec
LiveUpdate installation files for push installs.
Services The Services folder contains Continuous Protection Server service executable files and
associated support files.
Logs The Logs folder contains the Network Helper (ENL) log and trace logs.
36 Installing Continuous Protection Server
What gets installed and where
Backup Exec RxRMS The Continuous Management Service service is present only on the server
Continuous Protection hosting the Continuous Management Service. It manages the
Administration Service configuration for all Backup Exec Continuous Protection Agents in the
Backup Group.
Backup Exec RxRSA The Continuous Protection Agent service is present on all servers on
Continuous Protection which the Continuous Protection Agent is installed. It enables Continuous
Agent Protection Server to back up data from the server or move the backed-up
data on the server.
Backup Exec RepBrokerSvc Allows communication between Continuous Protection Server and Backup
Continuous Protection Exec to facilitate continuous protection of Microsoft Exchange transaction
Broker Service logs.
Backup Exec rxWriterSvc Communicates with Volume Shadow Services to save and store the
Continuous Protection Continuous Protection Server’s configuration information.
Configuration Writer
Backup Exec RxASA Controls the configuration database for all Continuous Protection Server
Continuous Protection information.
Database
Backup Exec RxNoService Captures system information and file share information.
Continuous Protection
System State Manager
Backup Exec ENL Enables the Continuous Management Service to group and discover
Continuous Protection Continuous Protection Agents and communicate with them.
Network Helper (ENL)
Registry entries
Continuous Protection Server adds the following registry keys:
■ HKLM\SOFTWARE\Symantec\Backup Exec CPS
Installing Continuous Protection Server 37
Performing an initial installation
The first step in creating a fully functional environment is configuring the server
that hosts the Continuous Management Service. Establishing the Continuous
Management Service is usually accomplished by performing an initial installation
from the installation media.
Continuous Protection Server application files that should be installed during the
initial installation include the Continuous Management Service and an
Administration Console. If the server hosting the Continuous Management Service
will also be a Business or Protection Server, a Continuous Protection Agent must
also be installed. Backup Exec Retrieve is also installed. The Remote Agent is
38 Installing Continuous Protection Server
Performing an initial installation
For more information, see the Microsoft article entitled “Network Load Balancing,
Windows 2000 Advanced Server” at the following URL:
www.microsoft.com
Administrator rights are required on the computer where the software is being
installed when performing a installation.
To perform an initial installation
1 Close all other programs that may be running.
2 If Autoplay is enabled, the Install should automatically launch when the -ROM
is inserted in the drive. If Autoplay is not enabled, double-click browser.exe
file from the -ROM or download directory.
3 Select the language, and then click OK.
4 The welcome screen for Backup Exec Continuous Protection Server provides
links to access various areas of the installation . After reviewing the various
product information, click Pre-installation.
5 Click Start the Backup Exec Continuous Protection Server Environment
Check, and then click Next.
Installing Continuous Protection Server 39
Performing an initial installation
To enter license keys manually In the License Key box, type the license key
number, and then click Add. Repeat this step
for each license key for each option or agent
you want to add.
To import license keys from a file Click Import, and then select the
cpssernum.xml file.
To install an evaluation version Leave the license key field blank, and then
continue with step 14.
The license keys you entered are saved to the cpssernum.xml file, located in
the Windows or WINNT directory.
40 Installing Continuous Protection Server
Performing an initial installation
Administration Console Check to install an Administration Console that allows for the management
and monitoring of activities within the Backup Group. This option will also
install Symantec LiveUpdate 3.0.
Settings Utility Check to install the Continuous Protection Server Settings Utility, which
allows changes to be made to various registry settings on this computer.
If it is not already installed, this option will also install .Net Framework
2.0.
Push install Support Check this option to install the files needed to push install other
components.
Continuous Management Service Check to install a Continuous Management Service, which must be installed
to create and manage the Backup Group.
The CMS must have a fixed IP address. If the IP address changes while the
CMS is running, the CMS and the Network Helper (ENL) service must be
restarted (for example, net stop RxRMS, net stop Network Helper, net start
RxRMS).
Continuous Protection Agent Check this option to install a Continuous Protection Agent on the computer.
Indexing Component Check this option to allow files stored on this server to be indexed and
searchable.
Backup Exec Remote Agent for Check this option to perform an install of the Remote Agent on the local
Windows Systems computer.
Installing Continuous Protection Server 41
Performing an initial installation
Exchange Protection Agent Check this option to allow for continuous protection of Microsoft Exchange
Servers.
If you cannot select this option, check your DNS for proper settings.
13 On the Backup Group screen, enter a name of the Backup Group and the name
of the Continuous Management Service, and then click Next.
When you click Next, you may be prompted with a Windows Security Alert
screen with options of Keep Blocking, Unblock, or Ask Me Later. This security
screen is displayed due to the installer looking for an existing Continuous
Management Service that already has the specified Backup Group name
registered. Select Unblock to continue.
14 On the Services screen, enter the credentials for the Backup Exec Continuous
Protection Server Service Account, including user name, password and
domain.
15 Click Next.
16 If a Continuous Management Service was selected for this installation and
the Continuous Management Service server has multiple NIC cards, the
Network Interface Selection screen is shown. Select the Network interface
to use for the Backup Group management and verify the displayed settings.
17 Click Next.
42 Installing Continuous Protection Server
Performing an initial installation
18 On the Support Folder screen, accept the default directories or change the
directories, and then click Next.
Note: You cannot protect a Business Server that runs Windows Server 2008 with
a Protection Server that runs Windows Server 2003. This configuration results
in loss of data.
Table 2-9 lists the operating systems to which you can push-install CPS
components if CMS is installed on a computer that runs Windows Server 2008.
Table 2-9 Components you can push-install from Windows Server 2008 and
Windows Server 2008 R2
Windows Server 2008 and Windows Server CPA or the Administration Console. You
2008 R2 cannot install the Administration Console
on a computer that runs the Windows Server
Core installation option of Windows Server
2008.
If CMS is installed on a computer that runs Windows Server 2003, you can
push-install the CPA and the Administration Console components to computers
that run various operating systems.
Table 2-10 lists the operating systems to which you can push-install CPS
components if CMS is installed on a computer that runs Windows Server 2003.
Table 2-10 Components you can push-install from Windows Server 2003
5 On the Select a Computer screen, type or browse to the name of the computer
on which to install the components. Alternatively, type the IP address for the
computer.
If the computer to which the components are installed is located on a different
subnet, naming services such as Dynamic Name Service (DNS) or Windows
Internet Naming Service (WINS) must be established across the routes for
proper product operation and communication to occur.
6 Click Next.
7 On the Select Components screen, select the components you want to install.
By default, all options are pre-selected for installation.
For optimal performance, some Continuous Protection Server components
should be installed in separate volumes from one another. The Journal Folder,
Indexing Component, Backup Destination, and System volume should all be
in separate volumes.
8 Click Next.
9 Enter the Credentials for the Backup Exec CPS Service Account, including
user name, password and domain.
10 Enter the License Key provided, and then click Next.
11 On the Local System Object Cache Path screen, select or browse to the
directory where Continuous Protection Server can store System Information
(System State and Shadow Copy Components) data to be backed up.
The Local System Object Cache is a holding area for the system information
and share information.
At a minimum, System Information will require at least 2 GB of disk space
(larger for Windows Server 2008). If the server performs additional roles,
such as also acting as a domain controller, more space is required.
12 Click Next.
13 On the Select Journal Path screen, select the default journal directory or
browse to another directory to hold the backup journals.
The Journal Folders contain the dynamic changes that occur during
continuous backups.
14 Click Next.
15 On the Select Indexing Database Path screen, select the default directory or
browse to another directory to hold the indexing database.
The indexing component holds indexes of the snapshots that are captured
on the Protection Server.
46 Installing Continuous Protection Server
Upgrading to Continuous Protection Server 2010
16 Click Next.
17 Type or browse to the installation path on the remote computer where the
services will be installed.
Installation must occur on one of the drives that are shown in the drop-down
list although the rest of the path may be modified.
18 Click Next.
19 If a Protection Agent is being installed, the server must be restarted for the
installation to complete. Select Restart the computer if required for this to
occur automatically at the end of the installation. If not, the system must be
manually restarted before this server is part of the Backup Group.
20 On the Push Install Summary screen, verify that the settings are satisfactory,
and then click Next.
21 On the Completing the Push Install CPS Components Wizard screen, click
Finish to begin the installation. A screen appears showing the installation
progress.
22 Verify that the Protection Agent was properly installed by noting that the
Business Server shows in the server list on the Servers tab. This step may
take some time due to the configuration and system restart.
The server you add to the Continuous Protection Server Backup Group must
be restarted. If you use Microsoft’s Shutdown Event Tracker, you must restart
the server manually after installation.
Note: When upgrading a CPS database, all job schedules are disabled to allow
Continuous Protection Agents to be upgraded before the Continuous Management
Service attempts to start the scheduled jobs. As soon as the Continuous Protection
Agents are upgraded, the job schedules must be re-enabled from the Console.
Feature Description
Menu bar You can access Continuous Protection Server features by using
the menu bar that appears across the top of the Administration
Console window. All features, menu options, wizards, and online
help can be accessed by using navigation buttons and links in the
Console. However, the menu bar offers a traditional approach to
using the program’s features. Some options are available only
after an item is selected.
Navigation bar The navigation bar groups together common that tasks you can
perform. It appears under the menu bar across the top of the
Administration Console window. The navigation bar buttons
always appear in the same place and in the same order.
Task pane The contents of the task pane change based on the view that you
select from the navigation bar. A list of tasks you can perform at
any given time appears on the left side of the Administration
Console window. Using the View menu, you can show or hide the
task pane at any time. Using the arrow, you can show or hide task
groupings within the task pane at any time as well.
Using the Administration Console 53
About the Administration Console views
Feature Description
Selection pane You can select the item that you want to work with from the
selection pane. After the item is selected, all associated features
are enabled. The selection pane appears to the right of the task
pane. However, if you hide the task pane, the selection pane
appears on the left side of the Administration Console window.
Preview pane In the Preview pane in the bottom-right corner of the window,
detailed information appears about the items that are selected in
the results pane. You can show or hide the Preview pane by using
the View menu or by dragging the divider to a new position.
Status bar The status bar provides computer processing information about
the task that is being performed. It appears across the bottom of
the Administration Console window. You can show or hide the
status bar at any time by using the View menu.
Overview view
You can access the Getting Started, CPS Assistant, or System Summary views
from the Overview view.
Table 3-2 describes the different views that are available in Overview.
View Description
Getting Started view This view provides information about the processes required to
set up and use Continuous Protection Server. The Getting Started
view also provides links to alerts and notifications, and product
updates and patches.
54 Using the Administration Console
About the Administration Console views
View Description
Continuous Protection This view provides links to information about the setup, use, and
Server Assistant view support of Continuous Protection Server.
The information desk provides links to a variety of information
such as the following:
System Summary view This view displays information about backup jobs, Continuous
Protection Server alerts, and backup servers. This view also
enables you to get a comprehensive summary of your Backup
Group and backup jobs.
Setup view
The Setup view lets you perform many of the functions of Continuous Protection
Server, including setting up servers, backup destinations, and backup jobs. You
can also create and view snapshots in this view.
Table 3-3 describes the common tasks that are available in the task pane of the
Setup view.
New backup Allows you to configure servers within the Backup Group to be
destination the Protection Servers of backup jobs.
New backup Allows you to use the Backup Destination Wizard to designate
destination using servers within the Backup Group as Protection Servers for backup
wizard jobs.
View snapshots Allows you to view the snapshot history for a given backup
destination by launching the Backup Destination Properties
window. This option is only available if a specific Backup
Destination is selected in the results pane.
Using the Administration Console 55
About the Administration Console views
Create snapshot now Allows you to create snapshots for the selected backup
destinations. This option is only available if a specific Backup
Destination is selected in the results pane.
New backup job Allows you to create a new backup job manually.
New backup job using Allows you to create a new backup job by using the New Backup
wizard Job Wizard.
License Keys Provides the license key information for the selected
server, including the type, the actual license key, and
the days remaining for evaluation and demonstration
keys. A text box is included to enter a new license key.
History Server Log Provides a log of activity for the specified server. The
log can be filtered to show entries for the last 24
hours, last 7 days, or all entries. The server history
log shows the date/time and description of each log
entry.
Snapshot Schedule Provides the schedule when snapshots are taken. The
schedule allows specific days of the week and snapshot
frequency to be specified.
Schedule Allows you to specify when the backup job will run.
The options are to run the job whenever a file changes,
according to a schedule, or manually.
Restore view
The Restore view lets you search for or select files to restore and is the best way
to restore large sets of files. You can filter the list of files by specific points in time
or view all versions of backed up files. If a small number of files need to be restored,
use Backup Exec Retrieve.
Alerts view
The Alerts view lets you respond to notification about the status of the Continuous
Protection Server jobs on all servers. In the event that a job does not run
successfully, you can read a message that alerts you to the problem encountered.
Various levels of errors, warnings, and information are built into Continuous
Protection Server to enable you to manage your backup jobs successfully.
58 Using the Administration Console
About the Administration Console views
Selecting Properties for the Alerts view provides detailed information on the
selected alerts.
Chapter 4
Configuring Continuous
Protection Server
This chapter includes the following topics:
■ Managing snapshots
5 Check Remove log records after (days) to define the number of days to save
the backup records.
6 Specify the number of days to keep the records.
7 Under Settings, click License Keys, and then define the options you want.
8 Under History, click Server Log, and then define the options you want.
Show entries Narrows the list of server log entries to the following:
■ All Entries
■ Last 7 Days
■ Last 24 Hours
Time Date and time the log record was written. The time is
converted to your local time for display purposes.
Description Information about the server log entry or a note for the
administrator, such as the number of days remaining in a
license period.
9 Click OK.
Server The server’s name, which comes from the system information
on the computer.
IP address The Internet Protocol (IP) address that is used by CPS when
communicating with this computer.
Installed Components Indicates whether a CMS, CPA, or both are installed on this
computer.
Time Zone Indicates the international time zone where this computer is
located.
Ports in use Indicates the ports that this server is currently using.
File System The file system that is used when formatting the volume (usually
NTFS).
Total Capacity The number of bytes of disk space that are associated with the
server.
Free Space The number of bytes of disk space that are currently available
for use on the server.
Note: You can move a Business Server that runs on Windows Server 2008 (or
Windows Server 2008 R2) to a backup group that runs on Windows Server 2008
(or Windows Server 2008 R2) only.
Configuring Continuous Protection Server 63
Managing the Continuous Protection Server Services
Start all services Starts all CPS services for the selected server
Stop all services Stops all CPS services for the selected server
Restart all services Stops all CPS services and then restart the services for the
selected server
4 Click OK.
4 Select the drive containing the backup destination. For example, “E:\”.
5 Click Settings.
The Volume should indicate the drive E:\.
6 Under Storage Area, select the volume where Shadow Storage should be
located.
For example, select “F:\”.
7 Optionally, you can modify the Maximum size of the storage area to
accommodate its intended use.
8 Click OK twice.
5 Click OK.
All backup jobs that are assigned to the destination must be deleted before deleting
the backup destination.
Additionally, although the backup destination directory and files remain on the
server, the CPS restore tools will not retrieve the data from these files. Neither
CPS restore jobs nor Backup Exec Retrieve can access a backup destination after
it has been deleted.
After a Protection Server is uninstalled, you must manually delete the data that
is contained in the backup destination. Be sure to note the location of the backup
destination data before uninstalling the Protection Server.
See “Managing backup destinations” on page 65.
To delete a backup destination
1 On the navigation bar, click Setup.
2 In the selection pane, click Backup Destinations.
3 In the results pane, right-click the backup destination, and then click Delete.
4 Select any of the following options:
Delete all snapshots associated with Deletes all snapshots automatically when the
this Backup Destination backup destination is deleted.
Open backup destination folder in Opens Windows Explorer so that data may be
explorer view deleted manually.
Managing snapshots
A snapshot is a consistent, point-in-time image of the contents of the backup
destination.
Note: Because snapshots are volume-based, any changes on the volume are
captured in the snapshot, including the CPS data. Therefore, to achieve maximum
performance, you should create a volume that contains only a backup destination.
Continuous backup jobs use a filter driver to capture changed bytes in the data
files on the source and move the changed bytes to the backup destination whenever
Configuring Continuous Protection Server 69
Managing snapshots
Run on these days Select the check box next to each day that you want the
snapshot to occur.
Run only at Select and define a specific time for the snapshot to occur.
Snapshot schedules are always shown in the local time of the user who is
creating the snapshot schedule. If snapshot schedules are created for servers
that are located in other time zones, the specified time must be converted to
your local time.
6 Click OK.
Configuring Continuous Protection Server 71
Managing snapshots
Keep each snapshot for The minimum duration that each snapshot is
retained.
and one daily for Retain a daily snapshot for this period of time. The
daily retained snapshot is the last snapshot of the
day.
and one weekly for Retain a weekly snapshot for this period of time. The
weekly retained snapshot is the last daily snapshot
on the last day of the week.
and one monthly for Retain a monthly snapshot for this period of time.
The monthly retained snapshot is the last daily
snapshot of the last day of the month.
If the volume becomes full, the operating system will delete snapshots.
6 Click OK.
Policy The snapshot retention policy expired and the snapshot was
automatically deleted.
External If the system is running out of disk space, the system might
automatically delete snapshots to free up space.
Configuring Continuous Protection Server 73
Managing snapshots
Not indexed Something went wrong during indexing and this snapshot has not
been indexed
Deleting snapshots
You can keep snapshots for a certain number of hours, days, weeks, or months
before being automatically deleted. You should define the retention period to
indicate the length of time that snapshots are retained. If you need to free hard
disk space on the destination, you can manually remove unnecessary snapshots.
Note: You can store snapshots up to a limit that is determined by your underlying
snapshot technology. This limit may vary considerably if alternative snapshot
providers are installed.
Snapshots that are associated with a given backup destination can also be deleted
when the backup destination itself is deleted.
See “Deleting backup destinations” on page 67.
To delete snapshots
1 On the navigation bar, click Setup.
2 In the selection pane, click Backup Destinations.
74 Configuring Continuous Protection Server
Configuring registry entries
3 In the results pane, right-click the backup destination, and then click
Properties.
4 In the Properties pane, under History, click Snapshots.
5 In the Available snapshots for backup destination list, select the snapshot,
and then click Delete.
6 Click Yes to confirm you want to delete the snapshot.
7 Click OK.
Setting Description
Servers pane The Servers selection pane shows all of the servers in the Backup
Group. Select a server to view the existing parameters and values
for that server.
Configuring Continuous Protection Server 75
Configuring registry entries
Setting Description
Refresh Lets you update the values in the Parameter pane after making
changes.
Help Lets you access the online help for the Settings Utility.
Restore Defaults Lets you restore all parameters to their original default values.
AlertGroomFrequency Specifies how often a grooming cycle will be run to remove outdated alerts from
the system. The 'DaysToKeepAlertItems' key sets the number of days an alert
will remain on a system before it is outdated.
AlwaysDoRegionAnalysis To cause CPS to use region analysis regardless of file size, set this string value
to 1 (default is 0).
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
76 Configuring Continuous Protection Server
Configuring registry entries
BroadcastAddress Specifies the IPv6 Multicast address where all discovery traffic is sent.
The default value is ff02:0:0:0:0:0:0:1, which signifies all nodes on the local link.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
BroadcastHops Specifies the maximum number of router hops for IPv6 discovery broadcasts.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
Changing this value requires that the CPS Database Service be restarted on the
server.
DaysToKeepAlertItems The number of days that alert items are kept on the server.
DaysToKeepDeletedSnapshots Specifies the number of days that deleted snapshot entries are kept on the server.
DelayDirChangeNotifications If set to 1, this parameter prevents the CPS filter driver from delaying the
completion of Directory Change Notifications. The only time it is necessary is
when the Windows “Services for Macintosh” (SFM) is running on the server where
CPS is installed. Under conditions of heavy usage, SFM may fail if this setting is
not made. However, there are no known issues with SFM after the setting is made.
The default value is 1. Set a value of 0 only when the Microsoft Services for
Macintosh is running on the system.
Although making this setting will allow SFM to run, it will also create a problem
for the Windows “Simple Mail Transport Protocol” (SMTP) service. It will prevent
SMTP from “picking up” (i.e., noticing the appearance of) new mail items in its
“pickup” folder. There is no way to get both SMTP and SFM working on the same
system where CPS is installed. The user must make a choice as to which Windows
service that will run.
DoEventLog If this value is set to 1, certain internal errors in CPS components will write an
entry in the Windows application event log. If it is set to 0, no event log entry
will be written.
EnableTimestamp If this value is set to 1, a timestamp is printed on each line of diagnostic trace
logs recorded by CPS components.
Changes to this value must be made on all computers in the Backup Group. In
addition, the Continuous Protection Agent Service must be restarted on all
computers.
FilteredIDList Specifies a list of status or alert IDs that will be filtered from the Alert Database.
The list should contain the IDs in either hexadecimal or decimal form separated
by either commas or semicolons. Only new alerts will be filtered from the Alert
Database after an addition to this list. No existing alerts will be removed from
the database.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
Gateway Either the host name, Fully Qualified Domain Name, or IP address of the ENL
master.
(ENL\Network.TCPIP)
The default value is usually the CMS name.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
Gateway Either the host name, Fully Qualified Domain Name, or IP address of the ENL
master.
(ENL\Network.UDPv6)
The default value is usually the CMS name.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
Gateway Specifies whether or not this server will act as a router for ENL network traffic.
(ENL\System) The default value is Yes for a CMS computer and No for all non-CMS computers
(except in special situations where a non-CMS may be used to route ENL traffic
to a CMS on another subnet).
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
Configuring Continuous Protection Server 79
Configuring registry entries
IndexingRoot Location of files that hold index information about the data that has been backed
up by CPS. The location must have at least 120 MB of free space (1GB or more
recommended).
Changing this value will require that the Continuous Protection Indexing Service
be restarted on the server. In addition, indexing files will be moved from their
previous location to the newly specified path.
JournalRoot Location of the dynamic changes of data during continuous backups. The location
must have at least 120 MB of free space (10 GB or more recommended).
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
LogOpenFileTableOncePerSet Controls whether the filter driver writes a table of open file entries into the first
outbound dynamic journal file only once (when a job starts), or writes this table
at the start of every new outbound journal file.
The default value is 0. Set to 1 if journal writing errors occur during continuous
backup jobs owing to an Open File Table (OFT) overflow, as can happen on systems
where a great many files are opened in rapid succession.
LogPath Location of the CPS trace log files. The location must have at least 100 MB of free
space. The location can be specified during installation, such as the following.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
LogPath Specifies the directory where the ENL logs (efc.log) will be written to.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
80 Configuring Continuous Protection Server
Configuring registry entries
LogText A complex hexadecimal mask used to specify the type of entries that will be
written to the 'EFC.log' file.
The default value is 0x00300100. A value of 0xFFFFFFFF signifies that All ENL
logging information will be written to the log file. This optional setting can be
useful in debugging situations, but will quickly create very large amounts of log
data.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
Master Specifies whether the ENL Service will start up in Master mode.
(located in ENL\System) The default value is Yes for a CMS computer and No otherwise.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
MaxDirSize The maximum number of files to show for a single directory in the Backup Exec
Retrieve ‘browse’ view.
MaxLogSize The maximum size (in bytes) that the diagnostic trace log can grow before a new
file is started.
Changing this value requires the ENL service and its dependent to be restarted.
MaxPacketSize Sets the maximum size for a UDP packet. Useful on networks that have a small
MTU.
(ENL\Network.TCPIP)
The default value is 5924.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
Configuring Continuous Protection Server 81
Configuring registry entries
MaxPacketSize Sets the maximum size for a UDP packet. Useful on networks that have a small
MTU.
(ENL\Network.UDPv6)
The default value is 5924.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
MaxRAPerCentChange To change the maximum percentage difference in file size for region analysis (in
percent). Larger values mean region analysis will still take place, even if file sizes
differ by a larger percentage.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
MinRASizeInKb To change the minimum file size for Region Analysis (in KB).
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
MsBetweenRallyChecks This parameter specifies the time that a job will attempt to be restarted after it
has failed.
NamedObjectsRoot Holding location for the System State and share information. The location should
have at least 100MB of free space (1GB or more recommended).
Changing this value requires that the Continuous Protection Agent Service and
Continuous Protection System State Manager Service must both be restarted on
the server. In addition, named objects files will be moved from their previous
location to the newly specified path.
Netgroup (ENL\System) The name of the CPS Backup Group that this computer is associated.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
82 Configuring Continuous Protection Server
Configuring registry entries
NeverDoRegionAnalysis To disable region analysis for all files, set this value to 1. When region analysis
is disabled, files are synchronized by copying the entire source file to the target
system. If both this value and “AlwaysDoRegionAnalysis” are set to 1, the
“AlwaysDoRegionAnalysis” value takes precedence.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
NumberOfLogs This parameter specifies the number of diagnostic trace log files to keep. When
the number of trace log files exceeds this number, older log files are deleted. Set
this value larger than the default value to preserve more logs, and contain more
job history.
OutboundJournalCleanupSize Size of the journal at which a switchover to the next journal may begin. This
value must be less than the journal size by at least 1MB.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
OutboundJournalNominalSize This parameter is the default size in bytes of an outbound journal file when it is
first created. The nominal size of journal files should be made larger than the
default size only when necessary to avoid job cancellations owing to Open File
Table (OFT) overflows.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
Configuring Continuous Protection Server 83
Configuring registry entries
PreferredAddress Specifies the IP address that the node will use when registering with the name
service. This value must be an IPv4 compatible IP address.
(ENL\Network.TCPIP)
The default value is an empty string.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
PreferredAddress Specifies the IP address that the node will use when registering with the name
service. This value must be an IPv6 compatible IP address.
(ENL\Network.UDPv6)
The default value is an empty string.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
PreferredNIC Specifies the NIC that will be used to find the preferred IP address if it is not
explicitly set through the PreferredAddress key. The preferred NIC is specified
(ENL\Network.TCPIP)
by the MAC address of the NIC.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
PreferredNIC Specifies the NIC that will be used to find the preferred IP address if it is not
explicitly set through the PreferredAddress key. The preferred NIC is specified
(ENL\Network.UDPv6)
by the MAC address of the NIC.
Changes to this value will require the ENL and dependent services, such as the
CMS, CPA, Broker Service, and Continuous Protection System State Manager
Service, to be restarted.
ReservedFreeDiskSpace If the amount of free disk space on the volume containing CPS journals falls below
this number of bytes, CPS jobs will be cancelled.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
84 Configuring Continuous Protection Server
Configuring registry entries
Changing this value must be made on all computers in the Backup Group. In
addition, the Continuous Protection Agent Service must be restarted on all
computers, and the Continuous Management Service must be restarted on the
CMS server.
Changing this value must be made on all computers in the Backup Group. In
addition, the Continuous Protection Agent Service must be restarted on all
computers.
Schedule Specifies the frequency with which the System State Manager Service regenerates
Named Object data.
SerializeIrpLogging Set this value to 1 to prevent the CPS filter driver from queueing too many i/o
requests for journaling.
The default value is 0. Set to 1 only on very slow, single-CPU systems if continuous
backup jobs are failing owing to journal writing errors.
Changing this value will require that the system be restarted.
ShareInfoAsSingleComponent Groups all shares for a business server under a single entry for faster display and
snapshot processing.
The default value is 0 for multiple components. Set to 1 for single component.
Socket Specifies the UDP port used by ENL. Changing this value affects both the IPv4
and IPv6 functions of the ENL service.
Changes to this value must be made on all computers in the Backup Group. In
addition, the ENL Service must be restarted on all computers.
Configuring Continuous Protection Server 85
Configuring registry entries
UsePrivateFindFileMethod Set this value to 0 to force CPS to use the standard Win32 methods of finding
files.
Changing this value requires that the Continuous Protection Agent Service be
restarted on the server.
Verbose Changes the amount of data that will be sent to the ENL logs. Default value is No.
A value of Yes will send much more detailed data to the ENL logs.
(ENL\System)
Changing this value requires the ENL service and its dependent to be restarted.
VolumeLevel This parameter controls the level of detail shown in diagnostic trace log messages.
A lower number means less detail.
5 Review the warning information, and then click OK to change the parameter
value.
6 Restart the services or computers as noted in the warning prompt.
Chapter 5
Backing up data
This chapter includes the following topics:
■ You can limit bandwidth so a job uses fewer resources. Advanced options are
available for setting bandwidth restrictions.
steps for creating a backup job manually or using the wizard are essentially the
same.
When you create a backup job, you can specify the following information:
■ Name and description of the backup job
■ Backup destination
■ Location of the data to be backed up
■ Schedule for the backup to occur
Before you can create a backup job, be sure that you have already defined a backup
destination.
See “Managing backup destinations” on page 65.
See “Adding a backup destination” on page 65.
All regular shares are backed up automatically by the backup job. The share backup
job backs up the information about the share, but not the underlying data for the
share. If you want to back up the data that the share points to, you must select
the folder containing that data when you configure the backup job. When you
select the folder containing the data, the share and the data are both backed up.
You can restore the data, the share information, or both.
The data in the tree view is selected for inclusion or exclusion, and the status is
reflected with icons.
Table 5-1 describes the status icons that are used in the tree view.
Everything under this directory is selected for backup. Anything new added
to this directory (or its subdirectories) is automatically selected for backup.
This directory is excluded from the backup. If this directory was previously
backed up, it is removed from the backup destination.
Some or all of the subdirectories of this node can be selected for backup.
Anything new added to this directory may or may not automatically be
backed up. For example, a folder may contain an exclude rule for *.exe. If
the file word.exe is added to the folder, it is not backed up, but the file
work.doc is backed up.
This node has not been selected for backup, and neither have any of its
subdirectories. Some subdirectories may have been excluded (see the red
‘x’), which causes them to be removed.
90 Backing up data
Creating CPS backup jobs
Backup rights are required to all referenced servers of a CPS backup job, including
the server hosting the Continuous Management Service.
To create a CPS backup job
1 On the navigation bar, click Setup.
2 In the task pane, under Backup Job Tasks, click New backup job using wizard.
3 Review the text on the Welcome to Backup Job Wizard screen, and then click
Next.
4 On the Name the Backup Job screen, type a name and optional description
for the backup job.
5 On the Select a Backup Destination screen, select one of the defined backup
destinations. This selection is the Protection Server where the data is backed
up.
6 On the Select Data to Back Up screen, select the information that you want
to back up.
7 On the Select When to Backup screen, designate when the backup should
occur.
Initiate the backup job manually Lets you back up the contents of the folder or
file on demand. This job will not start
automatically.
8 Verify that the backup job was created by observing that the Job shows on
the list of jobs from the Job Monitor.
Backing up data 91
Editing backup job configurations
Note: When files or directories are explicitly excluded, they are removed from the
backup destination. If files or directories are not selected, they are not removed.
You can add any combination of include and exclude filters to each backup
selection. This enables you to select files to back up whose names match an
arbitrary combination of patterns.
For example, if you want to exclude all tmp files from the backup, except for those
whose names contain the letter Q or the letter X, you can specify the following
list of filters:
■ Include *Q*.tmp
■ Include *X*.tmp
■ Exclude *.tmp
Be sure you specify the parameters in the right order. Parameters are applied
top-to-bottom as listed, and the first rule matching a file name is the one that is
used to decide whether or not to back up a file.
When initially adding a filter, you can enter a semi-colon delimited list to specify
multiple filters to add. Each item on the list is added as a separate filter. If you
later edit an existing filter, you are not able to add a semi-colon delimited list.
To include and exclude information from backup jobs
1 On the navigation bar, click Setup.
2 In the selection pane, click Backup Jobs.
3 In the results pane, right-click the backup job, and then click Properties.
4 Under Settings, click Backup Selections.
5 Expand the tree to expose the files that are selected for the backup job.
6 Right-click the file or folder that is selected for the backup job, and then click
Includes/Excludes.
7 Click Add.
Backing up data 93
Moving a backup job to a different backup destination
Apply to Subdirectories Select this option if the include or exclude filters apply
to subdirectories of the backup selection.
9 Click OK.
10 If you want to change the priority of a filter, select the filter, and then click
Move Up or Move Down.
11 Click OK.
12 On the Backup Job Properties dialog box, click OK.
Editing filters
You can edit the include and exclude filters to refine what gets backed up.
To edit filters
1 On the navigation bar, click Setup.
2 In the selection pane, click Backup Jobs.
3 In the results pane, right-click the job, and then click Properties.
4 Under Settings, click Backup Selections.
94 Backing up data
Moving a backup job to a different backup destination
5 Expand the tree to expose the files or folders that are selected for the backup
job.
6 Right-click the file or folder that is selected for the backup job, and then click
Includes/Excludes.
7 Select a filter, and then click Edit.
8 Select the appropriate options.
9 Click OK.
10 If you want to change the priority of a filter, select the filter, and then click
Move Up or Move Down.
11 Click OK.
12 On the Backup Job Properties dialog box, click OK.
Deleting filters
You can delete include and exclude filters that you no longer use.
To delete filters
1 On the navigation bar, click Setup.
2 In the selection pane, click Backup Jobs.
3 In the results pane, right-click the job, and then click Properties.
4 Under Settings, click Backup Selections.
5 Expand the tree to expose the files or folders that are selected for the backup
job.
6 Right-click the file or folder that is selected for the backup job, and then click
Includes/Excludes.
7 Select a filter, and then click Delete.
8 Confirm that you want to delete the selected filter.
9 Click OK.
10 On the Backup Job Properties dialog box, click OK.
Initiate the backup job manually Requires you to manually start the backup job
from the CPS Console.
6 Under Back up the selected files and folders, select According to a schedule.
7 Click Edit Schedule.
8 Select the options you want.
Run on these days Select the check box next to each day that you
want the snapshot to occur.
9 Click OK.
10 Click OK in the Backup Job Properties dialog box.
96 Backing up data
Moving a backup job to a different backup destination
Source server Select the server from which the files are copied
during the backup job.
Limit bandwidth usage to Select the bandwidth that is allocated to the backup
job process.
Network connection type Select the type of connection existing between the
Business Server and Protection Server.
8 Click OK.
9 Click OK in the Backup Job Properties dialog box.
Event Select when the script will run. Your choices are
Pre-backup or Post-backup.
Script Type the path to the script file that will run before
or after this backup job. If necessary, you can browse
to the file.
Cancel command if not Select the number of minutes before the backup job
completed within xx minutes is canceled if it is not completed.
Note: Restore selections are used for the current session only. If you end a session
without restoring selected files, the files must be selected again. Continuous
Protection Server refreshes the selections at the end of a session to ensure that
each user begins the restore job with a new record.
When an alternate restore destination path is chosen, be careful not to select any
path with data that needs to be saved. Continuous Protection Server overwrites
the data in the selected folder.
See “Protecting CPS with Backup Exec” on page 132.
See “About Backup Exec Retrieve” on page 105.
See “Restoring Continuous Protection Server with Backup Exec” on page 135.
100 Restoring data
Restoring files and folders
Note: If data has been backed up from a Business Server to a Protection Server,
and the Business Server is later deleted from the Backup Group, the data cannot
be restored, even to another Business Server.
Preserve folder structure Maintains the tree structure of the selected files
and folders during the restore. This check box is
selected for redirected restore jobs. If this option
is not selected, the contents of the restore folder
are added to the alternate restore folder.
5 Click OK.
6 Click OK to clear the confirmation message.
Note: You should not restore system information to servers other than the server
from which the information was originally backed up. Redirecting system
information restores to other servers will have unpredictable results.
System Information is captured once every four hours at 3:05 A.M., 7:05 A.M.,
11:05 A.M., 3:05 P.M., 7:05 P.M., and 11:05 P.M. If you attempt to restore System
102 Restoring data
Restoring System State to an Active Directory system
State data at or near these same times, the restore may fail because a System State
restore does not interrupt a System State data capture that is in progress. In this
case, the System State restore jobs should be started well before or about 10
minutes after the backup times.
See “About backing up System State and Shadow Copy Components” on page 88.
To restore system information
1 On the navigation bar, click Restore.
2 In the selection pane, select the System State or Shadow Copy Components.
3 In the task pane, under Restore Tasks, click Restore files.
4 Specify the options that you want.
5 Click OK.
6 Click OK to clear the confirmation message.
When the System Information is restored, the server will automatically
restart.
http://seer.entsupport.symantec.com/docs/278977.htm
To restore System State to an Active Directory system
1 On the navigation bar, click Restore.
2 In the selection pane, select System State.
3 In the task pane, under Restore Tasks, click Restore files.
4 Specify the options you want.
5 Click OK.
6 Click OK to clear the confirmation message. The computer will restart in
DSRM mode.
7 Log on using your DSRM password.
8 Double-click the symantec dsrm system state restore.bat file, which is located
on the Desktop. You can monitor the progress in the command window.
When the System State restore has completed, the server will automatically
restart back in normal mode.
Preserve folder structure Maintains the tree structure of the selected files
and folders during the restore. This check box is
enabled for redirected restore jobs.
8 Click OK.
9 Click OK to clear the confirmation message.
Chapter 7
Using Backup Exec Retrieve
This chapter includes the following topics:
■ Media server (for the files and the emails that the
Backup Exec Archiving Option archives).
■ Backup Exec System Recovery Manager server (for
files in recovery points that Backup Exec System
Recovery creates).
■ Continuous Management Service server (for the files
that Continuous Protection Servers back up).
■ Desktop and Laptop Option server (for the files that
the Backup Exec Desktop and Laptop Option backs
up).
6 End user Selects to search, browse, or view recent activity for files
or email.
8 End user Retrieves the selected file or email and saves it locally
on their computer or elsewhere.
Task Description
Table 7-2 What you can do with Backup Exec Retrieve (continued)
Task Description
Retrieve files and emails Lets end users retrieve and save a file or an
email message by using the Web browser's
Save As dialog box. Email messages are saved
with a .Msg file extension. Users can then
open the file in Microsoft Outlook.
Table 7-3 Requirement for installing Backup Exec Retrieve on a Web server
Component Requirement
RAM 2 GB
Table 7-4 Requirements for using Backup Exec Retrieve on end users'
computers
Component Requirement
Web address End users must know the following Web server address, and their
own user name and password to access Backup Exec Retrieve.
If the installation does not start Do the following in the order listed:
automatically
■ On the Windows desktop, click Start
> Run.
■ Type: <media drive letter>:\Setup.exe.
For example, e:\setup.exe.
■ Continue with next step.
9 Click Next.
Backup Exec Retrieve program files are installed in the default path that
appears on the Options page.
10 In the Destination panel, do one of the following:
To change the folder where the Backup Click Change to select a new folder.
Exec Retrieve files are installed
The default path is C:\Program
Files\Symantec\Backup Exec Retrieve\
Item Description
Data Type Identifies the data source type that you want
Backup Exec Retrieve to connect to.
Item Description
Problem Description
Users get a secure sockets Backup Exec Retrieve uses a Secure Sockets Layer certificate
layer (SSL) certificate to protect communication between the client and server.
warning in their browser Web browsers may warn users of problems with the site’s
when they go to the Backup security certificate. You can continue to the Web site. For
Exec Retrieve Web site. more information on resolving the warning, click
http://entsupport.symantec.com/umi/V-367-2-1.
Using Backup Exec Retrieve 119
Troubleshooting Backup Exec Retrieve
Problem Description
Selecting a file causes an When you select a file in Microsoft Internet Explorer, the
error in the application that file is saved to the Internet cache. Then, the program that
launches for viewing the file is required to open it is launched. If the Do not save
encrypted pages to disk option is selected in Internet
Explorer, then the file is not saved to the Internet cache.
However, the associated application is launched but it
cannot open the file. To fix this issue, deselect the option
in Internet Explorer (the option is the default on Windows
2003).
To deselect the option to save encrypted pages to disk
Users cannot log in with a Backup Exec Retrieve usually runs on a separate computer
local account from the original computer that was backed up. The only
authority for local accounts and passwords is the original
computer, which might not be available when you use
Backup Exec Retrieve. You must use a domain account to
log in and retrieve files using Backup Exec Retrieve. Backup
Exec Retrieve makes every effort to capture the domain
users and domain groups that are part of local groups.
Therefore, if your domain account is a member of the Local
Administrators group on your computer, you can retrieve
your files.
Problem Description
Unable to download a file If an end user cannot download a file from Backup Exec
when you use the computer Retrieve in Internet Explorer, enable automatic downloads
name or IP address of Backup in the browser.
Exec Retrieve in Internet To enable automatic downloads in Internet Explorer
Explorer
■ In Internet Explorer, click Tools > Internet Options.
■ In the Security tab, click Custom Level.
■ In the Security Settings - Internet Zone page, scroll to
Downloads > Automatic prompting for downloads.
■ Click Enable.
■ Click OK, and then click Yes to confirm the change.
■ Click OK to return to Internet Explorer.
Clicking the Backup Exec If Enhanced Security is enabled in Windows, you are
Retrieve in Internet Explorer prompted to add the Backup Exec Retrieve URL to Internet
results in a prompt to add the Explorer's trusted sites list. If you continue without adding
site to the trusted sites list. the URL to the trusted sites list, you are prompted to install
Silverlight, even if it already installed. If you try to install
Silverlight again, the installation fails. Symantec
recommends that you add the Backup Exec RetrieveURL to
Internet Explorer's trusted sites list.
To add the Backup Exec Retrieve URL to Internet Explorer's
trusted sites list:
Starting The job is attempting to start every job pair for the first time.
Errors and alerts indicate if one or more pairs were unable to start
or stopped before completing.
Running The starting phase has completed. That is, all job pairs have
attempted to start.
For a continuous job, the job remains in this state until the user
or schedule cancels the job.
Stopping The job is attempting to stop. The user or schedule has commanded
that each pair complete synchronization and then stop running.
Stopped The job has stopped and all pairs have completed synchronization.
A stopped job state does not affect the schedule of a job. That is,
the job will run at the next scheduled time.
Canceling The job is attempting to stop abruptly. That is, the user or schedule
has commanded that each pair stop running whether or not they
have achieved synchronization.
Canceled The job has canceled and all pairs have stopped running.
A canceled job state does not affect the schedule of a job. That is,
the job will run at the next scheduled time.
Column Description
Column Description
Job name The name that was given for the job.
Description
■ Backup
■ Restore
■ Exchange Log
Transfer Rate The instantaneous rate that the job is running. For example, 21
Kbytes/Second.
Transferred The cumulative rate since the job (or pair) started. For example,
21.3 MB
Errors Indicates whether errors are associated with the job. Possible
values are Yes or No.
Schedule Type Indicates the type of schedule that was designated for the job.
Last Start Time Indicates the time that the job was last started.
Table 8-3 identifies status information that is provided for job pair listings
(columns).
Column Description
Transfer Rate The instantaneous rate that the job is running. For example, 21
Kbytes/Second.
Monitoring CPS processes 125
Viewing a job report
Column Description
Transferred The cumulative rate since the job (or pair) started. For example,
21.3 MB
Start Time Indicates the time that the job pair was started.
Stop Time Indicates the time when the job pair last stopped.
Backup Job Header Contains a summary of the job at the time the report ran. It shows
the job name, description, type, state, last started time, and last
stopped time.
Backup Job Details Contains the job properties that define how the job was configured.
The Job Details boxes contain most of the job properties that are
found on the CPS Job Properties page.
Backup Job Selections Provides a list of the files and folders that are included and
excluded from the job.
Backup Job Pre/Post Displays any pre- or post-commands that were assigned to the
Commands job. The information that is provided includes the server name,
command, triggering event, whether the command is running
asynchronously, and the timeout period.
Backup Job Log Contains CPS job log entries for the period since the job last ran.
Job entries with warnings are displayed in orange text, and job
entries with associated errors are shown in red text. Jobs with
warnings or errors are also linked to the Symantec Support Web
site for possible solutions.
Backup Pair One Backup Pair box exists for each pair of the associated CPS
job. The title of the box is the name of the actual CPS pair. If there
is an exception associated with the pair, the box title contains the
state of the pair along with a description of the exception
condition.
Monitoring CPS processes 127
Managing CPS job alerts
Pair Header Contains a summary of the pair at the time the job was run. It
shows the source and destination server names, pair state, last
started time, last stopped time, destination consistency, and
destination latency.
Pair entries with warnings are displayed in orange text, and pair
entries with associated errors are shown in red text. Pairs with
warnings or errors are also linked to the Symantec Support Web
site for possible solutions.
When you view active alerts or alert history, you can change the order in which
the information displays. The list can be sorted in ascending or descending order
by any column.
You can also change the order in which the columns display to view the information
in order by the following:
■ Category
■ Job name
■ Message
■ Server name
■ Time alert received
■ Type
3 In the Alert History Filter box, click one of the alerts you want.
4 In the selection pane, select the alert to view details.
Alerts older than 30 days are removed by the system.
5 Click a column heading to sort the list in ascending or descending order.
6 Click and drag a column to a new position in the list, and then drop it into
place to change the order in which columns are displayed.
Time alert received Date and time the alert occurred. The time is the local
time of the server.
4 Click OK.
4 Click Yes.
Chapter 9
Using Continuous
Protection Server with
Backup Exec
This chapter includes the following topics:
created, you can add a new job or modify an existing job to capture CPS data from
the new server.
In the event of a system failure or data loss, Backup Exec enables you to restore
data to the CPS Protection Server or a Business Server in the Backup Group.
Additionally, SmartLink technology may be used to check the status of CPS backup
jobs, and then view any alerts in Backup Exec. Otherwise, CPS jobs can be
monitored independently through the CPS Administration Console.
Element Description
Continuous Protection The Continuous Protection Server node is the gateway to all CPS
Server data on the local server. The Continuous Protection Server or
Protected Resources root nodes could be selected for backup.
Protection Servers Protection Servers are listed in order by name and contain nodes
for the Business Servers on the local server.
Business Servers Business Servers are listed in order by name under the Backup
Destination node and contain nodes for CPS Backup data on the
local server.
from the available Business Servers. To keep critical business data only, selectively
choose information from specific volumes. Regular backups of the Protection
Server can help you restore your CPS environment in the event of a disaster.
Backing up snapshots
Snapshots are created by CPS using Microsoft Volume Shadow Copy Service (VSS).
They contain copies of the Backup Destination at various points in time. Depending
on your configuration, a snapshot of the CPS Backup Destination may contain
data from multiple Business Servers.
It is not necessary to select the root of the Continuous Protection Server node or
to back up snapshots regularly. Most of the data that is captured from snapshot
to snapshot is redundant because the majority of the data on the server does not
change between snapshots. Back up snapshots only as needed. For example, if a
server is running out of disk space, it might be prudent to back up the oldest
snapshot for archival.
Snapshot data should be backed up from the Continuous Protection Server node
on an as needed basis. This is because of the quantity of redundant data that the
snapshots typically contain.
Restoring the CMS includes restoring the CMS and Network Helper databases. If
the CMS is also a Protection Server, the CMS, CPA, indexing, and Network Helper
databases are restored.
All CPS configurations, including servers, backup destinations and jobs, that are
modified after the backup was created revert to their previous state when restored.
Note: Before restoring data from Backup Exec to CPS, stop all continuous jobs on
the CPS Protection Server and its associated Business Servers. In Continuous
Protection Server, change the scheduled jobs to manual, and then in Backup Exec,
restore the selected data.
You should also consider the following points when you restore Continuous
Protection Server from Backup Exec:
■ SmartLink enables communication between Continuous Protection Server and
Backup Exec for Windows Servers. That is, SmartLink enables backed up files
that are stored on the CPS destination to be backed up using Backup Exec.
Backup Exec users can restore those files from Backup Exec to a Continuous
Protection Server destination through the Backup Exec Administration Console.
Features in Microsoft Windows Server 2003, such as the VSS writer, are used
to back up and restore the files.
■ Restoring files from Backup Exec directly to a CPS source, bypassing the CPS
destination, can be performed under certain circumstances. For example, you
can restore files directly from Backup Exec to a CPS source running Windows
Server 2003.
■ When restoring CPS from Backup Exec, only the whole volume can be restored.
For more information about using Backup Exec Intelligent Disaster Recovery to
recover Continuous Protection Server, go to the following URL:
http://seer.entsupport.symantec.com/docs/278977.htm
Using Continuous Protection Server with Backup Exec 137
Monitoring CPS jobs in Backup Exec
Note: When creating a SmartLink association with Backup Exec, the Protection
Server must be specified using the actual name of the server and not an IP address.
Using Continuous Protection Server with Backup Exec 139
Monitoring CPS jobs in Backup Exec
10 Select the CPS jobs to be monitored, and then click Next to continue.
11 To reduce the number of CPS job log entries, select Limit Log Entries and
enter the maximum number of entries per individual CPS job and pair. Click
Next.
SmartLink determines the state of the CPS jobs and pairs, and enters the
states into the Backup Exec Log entries. By default, the CPS Log entries are
not limited between backups. This may result in a very large Backup Exec log
file.
12 Click Finish to transfer the CPS job information to the Backup Exec
pre-command.
You can verify that the pre-command was successfully associated with the
Backup Exec job by viewing the job properties in Backup Exec.
Type and category name All CPS-related alerts posted to Backup Exec are
Warnings (yellow icon) and indicate a problem.
Server name The name of the Backup Exec server being backed
up, which is also CPS’s Protection Server.
generates a Warning alert, and more than one alert can be generated during a
single run of SmartLink.
Table 9-2 describes the fatal alert messages and conditions.
SmartLink is unable to contact the Continuous SmartLink is unable to connect Check network connectivity and
Management Service (CMS). The server may to the CMS. that the CMS is running.
be down or a network issue may be preventing
SmartLink from contacting the CMS. No CPS
Backup data validation is possible.
SmartLink has failed to authenticate to the SmartLink cannot authenticate Verify credentials to CMS.
Continuous Management Service to the CMS.
See “Understanding the
<CMSservername>. No CPS Backup data
credentials for using Backup Exec
validation is possible. Check the user name
SmartLink” on page 137.
and password provided to SmartLink.
SmartLink is unable to contact the Continuous General failure CMS errors. This Attempt to restart the services,
Management Service (CMS) alert is a catch-all for and if not successful, contact
non-network and non-credentials Symantec Technical Support.
based errors.
CPS Backup Job <Cpsjobname> - SmartLink Failure to authenticate to a JCD Verify credentials to JCD server.
has failed to authenticate to the JCD Server indicates that SmartLink is
See “Understanding the
<JCDservername>. The Job and Pair Logs are unable to acquire log entries.
credentials for using Backup Exec
Unavailable. However, an alert is generated
SmartLink” on page 137.
because it is a correctable
configuration error.
CPS Backup Job <Cpsjobname> - SmartLink is JCD is unreachable, which has the Check network connectivity and
unable to contact the JCD Server same effect as the failure to that the JCD server is running
<JCDservername>. The server may be down or authenticate. properly.
a network issue may be preventing SmartLink
from contacting the JCD. The Job and Pair Logs
are Unavailable.
CPS Backup Job <Cpsjobname> - SmartLink is General failure for non-network Attempt to restart the JCD
unable to contact the JCD server < and non-credentials based JCD services, and if not successful,
JCDservername>. The Job and Pair Logs are errors. contact Symantec Technical
Unavailable. Support.
142 Using Continuous Protection Server with Backup Exec
Monitoring CPS jobs in Backup Exec
CPS Backup Job <invalidjobid> - Invalid CPS A specified CPS Job ID is invalid. Verify that the correct job ID has
Backup Job ID. This condition is a correctable been entered.
SmartLink configuration error
and thus generates a top-level
Alert.
CPS Backup Job <Invalidjobname> - Invalid A specified Job name is invalid. Verify that the correct job name
CPS Backup Job Name This condition is a correctable has been entered.
SmartLink configuration error
and thus generates a top-level
Alert.
CPS Backup Job <Cpsjobname> - The The CPS job is in an unknown Check the connectivity between
Continuous Management Service (CMS) and state. In this case, the CMS does the CMS and JCD, and verify that
the CPS Backup JCD server do not have not have the latest information each is running.
consistent Job State information. The actual regarding a job's run state.
state of Job is unknown.
CPS Backup Job <Cpsjobname> - Unable to get Unable to get Pair information. Check the connectivity between
pair information. the CMS and JCD, and verify that
each is running.
CPS Backup Job <Cpsjobname> - Unable to get Unable to get JCD information. Check the connectivity between
JCD information. the CMS and JCD, and verify that
each is running.
CPS Backup Job <Cpsjobname> - Unable to get Unable to get job log information. Check the connectivity between
job log details Information. the CMS and JCD, and verify that
each is running.
CPS Backup Job One or more pairs in one or Review the information for
<cpsjobname> - Exception in more of the CPS jobs are the Exceptions topic box.
One or More CPS Pairs. inconsistent.
See “Exceptions topic box”
on page 145.
Message Description
CPS Backup Jobs are complete or are This message appears if all CPS jobs have completed or are running without
running without errors. errors.
Exception in One or More CPS Backup If there are any problems with the CPS jobs or pairs, this message appears
Jobs. in the CPS Log. Additionally, the Exceptions topic box appears later in the
Job Log, which provides details on the specific problems that are encountered
in the CPS jobs.
The SmartLink Command Line Has This message appears when syntax errors are encountered in the SmartLink
Syntax Errors. command line. Additionally, if this message is posted, the Command Line
Syntax Error topic box appears later in the Job Log, which provides details
on the nature of the error.
SmartLink is unable to connect to the This error might occur for one of the following reasons:
Backup Exec server. (Server:
■ SmartLink may be invoked using invalid Backup Exec credentials, which
<servername> User: <username>
prevents SmartLink from connecting to Backup Exec. For example, this
Pwd: xxxx ... Error:
message appears if all CPS Jobs are good, but invalid Backup Exec
<errorcode>Errors
credentials were provided.
■ SmartLink was not able to acquire the Backup Exec job information from
Backup Exec.
Using Continuous Protection Server with Backup Exec 145
Monitoring CPS jobs in Backup Exec
Message Description
SmartLink is unable to contact the The server may be down or a network issue may prevent SmartLink from
Continuous Management Server. The contacting the CMS. No CPS Backup data validation is possible.
server may be down or a network
issue may be preventing SmartLink
from contacting the Continuous
Management Server. No backup data
validation on Protection Server is
possible.
SmartLink is unable to contact the The server may be down or a network issue may prevent SmartLink from
Continuous Management Server. contacting the CMS. No CPS Backup data validation is possible.
Exception Description
Goodness Criteria The criteria that are evaluated to determine the consistency of a
job are the following:
Job Name or ID Not This exception is given when one or more job names or IDs on the
Found SmartLink command line cannot be found on the CMS.
Invalid CPS Job An invalid job that is specified on the SmartLink command line
that does not exist in the CMS database.
Unknown Job State The JCD of a job and the CMS may be unsynchronized. Thus, there
is no way for SmartLink to get an authoritative measure of the
state of the job or any of the pairs in the job. Thus, the job in
question has an entry in the Exceptions error box but does not
have a “Continuous Protection Job” section.
Job Header Contains a summary of the job at the time SmartLink ran. It shows the job name, description,
type, state, last started time, and last stopped time.
Job Details Contains job properties that define how the job was configured when the SmartLink command
line was started. The Job Details boxes contain most of the job properties that are found on the
CPS Job Properties page.
Job Log Contains CPS job log entries for the period starting when the Backup Exec job last ran, and
ending with the current run.
Log entries are presented based on the following:
■ The log entries are sorted in the same order as the Backup Exec log entries. They are sorted
in descending order with the latest entries at the bottom of the log.
■ The date/time portions of CPS log entries are presented in the same format as the date/time
fields in the rest of the Backup Exec log (12 versus 24-hour clock, UTC versus local time,
international time format, and so forth.)
The number of entries is optionally configured with the -logLimit command line parameter.
Backup Pair One Backup Pair box exists for each pair of the associated CPS job. The title of the box is the
name of the actual CPS pair. If there is an exception associated with the pair, the box title
contains the state of the pair along with a description of the exception condition.
148 Using Continuous Protection Server with Backup Exec
Monitoring CPS jobs in Backup Exec
Pair Header Contains a summary of the pair at the time SmartLink ran. It shows the source and destination
server names, pair state, last started time, last stopped time, destination consistency, and
destination latency.
Destination latency can only be calculated when both servers in a pair are running Continuous
Protection Server version 10 or later.
Pair Log Contains CPS pair log entries for the time period starting from when the owning Backup Exec
job ran, and ending with the current run.
Log entries are presented based on the following:
■ The log entries are sorted in the same order as the Backup Exec log entries. They are sorted
in descending order with the latest entries at the bottom of the log.
■ The date/time portions of our log entries is presented in the same format as the date/time
fields in the rest of the Backup Exec log (12 versus 24 hour clock, UTC versus local time,
international time format, and so forth.)
The number of entries is optionally configured with the -logLimit command line parameter.
Chapter 10
Troubleshooting
Continuous Protection
Server
This chapter includes the following topics:
■ Component issues
■ Configuration issues
■ General issues
Issue Description
Workgroups and Symantec does not recommend or support mixing the servers hosting the Continuous
domains Management Service and Continuous Protection Agent between workgroups and domains.
Anti-spyware software Before you install CPS, you should disable any anti-spyware software. If you are prompted
for permission to install CPS, click Yes. This is particularly relevant for computers where
the Continuous Protection Agent was push installed, and their users tend to select the
Block option since they may not know what is being installed and may think it is spyware
from the Internet.
Push installing over If a cross-domain trust exists between the computers that you are installing from and to,
domain trust the account that is running from the installing computer must be present in the local
“administrators” group of the computer being push installed to.
NIC failure after If a NIC card fails after installing CPS, the registry key for the new NIC card must be
installing CPS updated for CPS to work properly.
Pathnames with Asian CPS fails to start if CPS has been installed in a directory whose pathname includes
characters characters from Asian languages, including Japanese, Chinese, and Korean. To avoid this
problem, either install CPS in the default installation directory or choose a directory
whose pathname, netgroup name and master server name only includes English characters
(a-z, A-Z, 0-9).
Network load balancing After installing Continuous Protection Server on a computer running Windows Server
service fails to start 2003, you might receive an error message that the Network Load Balancing Service failed
to start. Microsoft reports the cause as: “Although network Load Balancing (NLB) is not
currently installed, some NLB registry keys might be present in the registry.” Although
Microsoft Knowledge Base Article 268437 describes the problem as applying to Windows
2000 Advanced Server, the fix also works for Windows Server 2003.
For more information about network load balancing on Windows Server 2003, go to the
following URL:
www.microsoft.com/technet/prodtechnol/windows2000serv/support/nlbcontb.mspx
Issue Description
Uninstall and reinstall If CPS is uninstalled and reinstalled, information in the job logs
loses job history and pair and pair logs is not saved.
logs
For more information about this issue, go to the following URL:
http://seer.entsupport.symantec.com/docs/278649.htm
Troubleshooting Continuous Protection Server 151
Component issues
Component issues
Table 10-3 describes CPS administration console issues.
Issue Description
Administration Console The first time that you select a server to do a CPS restore, a wait
may run slowly when cursor appears and it may take several minutes before anything
first run is displayed. Nothing in the console indicates that anything is
happening and a user might think that nothing can be restored.
This delay is caused by the mounting of the snapshots as
volumes. The amount of time it takes to mount a snapshot is
proportional to the size of the snapshot.
Job name and description Consoles running on computers without the corresponding
are in a different language pack that is installed is not able to properly interpret
language than the the job name or description. For example, when a job name is
Administration Console created with Japanese characters, these characters show as
meaningless square boxes when the job is viewed on an English
Console. Be sure that the language packs are installed for all
languages of job names and descriptions that may be used in
the Console.
Issue Description
Recovering restore If a Business Server is deleted from the Backup Group, all restore
selections to a restored selections also disappear. If the deleted Business Server is
or replaced Business brought back into the Backup Group or another server is added
Server with the same name as the deleted server, a new CPS backup
job of at least one file can be created and run to resynchronize
the restore selections. This situation requires reinstalling the
Continuous Protection Agent and restarting the
replaced/restored server.
Configuration issues
Table 10-5 describes snapshot and indexing issues.
152 Troubleshooting Continuous Protection Server
General issues
Issue Description
Adjusting the free disk The ability to search for files is accomplished by a built-in
space for indexing indexing service. The indexing database requires 1 GB of free
disk space on the destination to search for files to restore or to
display a list of recent activity. The number of files with which
you work can vary widely. Without enough free disk space to
handle the number of files, the search is not performed and the
list of files that are found, or the list of recent activity, appears
empty.
MinFreeSpaceMB=XX
General issues
Table 10-6 describes processing efficiency issues.
Issue Description
Issue Description
System may run out of A chronic “nearly out of memory” condition may exist during
memory during intensive periods of intensive input/output processing.
input/output processing
To determine the state of the system
1 Start the Windows Task Manager.
http://seer.entsupport.symantec.com/docs/277876.htm
File system input/output An input/output deadlock can occur for the following reasons:
deadlocks may occur
■ CPS is used to continuously back up large databases.
when continuously
■ The input/output activity on these database files is high.
backing up large
database files ■ The host server has fewer than 4 logical CPUs (that is, 4
physical CPUs without hyperthreading, or 2 CPUs with
hyperthreading).
http://seer.entsupport.symantec.com/docs/277871.htm
Issue Description
Disabling CPS SNMP If the Windows SNMP service is installed on the computer when
support CPS was installed, CPS's SNMP support is automatically
installed.
http://seer.entsupport.symantec.com/docs/277856.htm
154 Troubleshooting Continuous Protection Server
Backup and restore job issues
Issue Description
Multiple pairs are CPS throttles the data transmission for all pairs at the
configured to run least-restrictive rate. For example, if a backup job is configured
between the same two to run between two nodes with the bandwidth limited to 20%
computers of a T1 line and another job is configured to run between the
same two computers with bandwidth limited to 50% of a T1 line,
the throughput of both jobs will be combined and run at a rate
of 50% of the T1 line. That is, each job will not run at the 50%
rate, but rather both jobs combined.
The free space on a CPS If the free space of a CPS database volume is exhausted, the
database volume is Sybase Adaptive Server Anywhere 9 server may assert and
exhausted refuse all new connections until the CPS services on that
computer are restarted.
CPS database backup and Database backup and restore capabilities are based on Volume
restore Shadow Copy Service (VSS) Writer Technology. The following
utilities can be used in lieu of using Backup Exec with VSS
capabilities for configuration database backups, or if the user
wants to perform manual backups and verification.
http://seer.entsupport.symantec.com/docs/277860.htm
Issue Description
Connection outages If the backup job is configured to use the schedule option
Whenever a file changes, it means the “continue backup after
synchronization” is turned on. In this configuration, the job can
become stalled in the running or expiring state if a connection
outage occurs under certain rare conditions.
Issue Description
CPS does not allow files CPS does not allow protected files on a Protection Server to be
on a Protection Servers restored to a different location on the Protection Server. To
to be restored to a move files to different locations on the Protection Server, use
different location on the the copy and paste features of Windows Explorer.
Protection Server
6 Repeat steps 1-5, but this time for the CMS DSN, if there is one.
7 Exit the ODBC Data Source Administrator.
The CMS and/or CPS services can now run.
You must now reconfigure the services for integrated logon.
8 Run the SetIntegratedLogin utility to re-enable integrated logons. For example,
SetIntegratedLogin Watchword.
The services will now run in integrated logon mode.
5 Modify the ODBC DSN for the CMS and the CPA to use standard logins.
See “Issues with integrated logon and database backups” on page 157.
The services can start.
6 SetIntegratedLogin (step 2) succeeds and the CMS and the CPA services will
now run in integrated login mode.
160 Troubleshooting Continuous Protection Server
Database maintenance utilities
Appendix A
Third-Party Legal Notices
This appendix includes the following topics:
■ ACE and TAO are governed under the same license provided below.
■ TAO
■ Apache Struts, Xerces C++ and Tomcat are governed under the same license
provided below
■ Apache Struts
■ Xerces C++
■ Tomcat
■ Blowfish Encryption
■ Curl/LibCurl
■ ICU
■ MD5
■ Open SSL
■ ReportCtrl.h.2.0.1
■ STLport
TAO
Douglas C. Schmidt and his research group at Washington University and
University of California, Irvine and Vanderbuilt Univerity.
TAO(TM) is copyrighted by Douglas C. Schmidt and his research group at
Washington University, University of California, Irvine, and Vanderbilt University
Copyright (c) 1993-2003, all rights reserved.
Copyright and Licensing Information for ACE(TM), TAO(TM), CIAO(TM), and
CoSMIC(TM):
ACE(TM), TAO(TM), CIAO(TM), and CoSMIC(TM) (henceforth referred to as "DOC
software") are copyrighted by Douglas C. Schmidt and his research group at
Washington University, University of California, Irvine, and Vanderbilt University,
Copyright (c) 1993-2004, all rights reserved. Since DOC software is open-source,
free software, you are free to use, modify, copy, and distribute--perpetually and
Third-Party Legal Notices 163
TAO
irrevocably--the DOC software source code and object code produced from the
source, as well as copy and distribute modified versions of this software.
You must, however, include this copyright statement along with code built using
DOC software. You can use DOC software in proprietary software and are under
no obligation to redistribute any of your source code that is built using DOC
software. Note, however, that you may not do anything to the DOC software code,
such as copyrighting it yourself or claiming authorship of the DOC software code,
that will prevent DOC software from being distributed freely using an open-source
development model. You needn't inform anyone that you're using DOC software
in your software, though we encourage you to let us know so we can promote your
project in the DOC software success stories.
DOC software is provided as is with no warranties of any kind, including the
warranties of design, merchantability, and fitness for a particular purpose,
noninfringement, or arising from a course of dealing, usage or trade practice.
Moreover, DOC software is provided with no support and without any obligation
on the part of Washington University, UC Irvine, Vanderbilt University, their
employees, or students to assist in its use, correction, modification, or
enhancement. A number of companies around the world provide commercial
support for DOC software, however. DOC software is Y2K-compliant, as long as
the underlying OS platform is Y2K-compliant.
Washington University, UC Irvine, Vanderbilt University, their employees, and
students shall have no liability with respect to the infringement of copyrights,
trade secrets or any patents by DOC software or any part thereof. Moreover, in
no event will Washington University, UC Irvine, or Vanderbilt University, their
employees, or students be liable for any lost revenue or profits or other special,
indirect and consequential damages.
The ACE, TAO, CIAO, and CoSMIC web sites are maintained by the DOC Group at
the Institute for Software Integrated Systems (ISIS) and the Center for Distributed
Object Computing of Washington University, St. Louis for the development of
open-source software as part of the open-source software community. By
submitting comments, suggestions, code, code snippets, techniques (including
that of usage), and algorithms, submitters acknowledge that they have the right
to do so, that any such submissions are given freely and unreservedly, and that
they waive any claims to copyright or ownership. In addition, submitters
acknowledge that any such submission might become part of the copyright
maintained on the overall body of code, which comprises the DOC software. By
making a submission, submitter agree to these terms. Furthermore, submitters
acknowledge that the incorporation or modification of such submissions is entirely
at the discretion of the moderators of the open-source DOC software projects or
their designees.
164 Third-Party Legal Notices
Apache Struts, Xerces C++ and Tomcat are governed under the same license provided below
Apache Struts
This para is intentionally added.
Xerces C++
This para is intentionally added.
Tomcat
Apache Software Foundation
Portions of this program contain components from the Apache Software
Foundation. These components are made available under the Apache License 2.0,
a copy of which is provided below.
License:
Apache License, Version 2.0, January 2004
http://www.apache.org/licenses/
TERMS AND CONDITIONS FOR USE, REPRODUCTION, AND DISTRIBUTION
Third-Party Legal Notices 165
Tomcat
Definitions.
“License” shall mean the terms and conditions for use, reproduction, and
distribution as defined by Sections 1 through 9 of this document.
“Licensor” shall mean the copyright owner or entity authorized by the copyright
owner that is granting the License.
“Legal Entity” shall mean the union of the acting entity and all other entities that
control, are controlled by, or are under common control with that entity. For the
purposes of this definition, “control” means (i) the power, direct or indirect, to
cause the direction or management of such entity, whether by contract or
otherwise, or (ii) ownership of fifty percent (50%) or more of the outstanding
shares, or (iii) beneficial ownership of such entity.
“You” (or “Your”) shall mean an individual or Legal Entity exercising permissions
granted by this License.
“Source” form shall mean the preferred form for making modifications, including
but not limited to software source code, documentation source, and configuration
files.
“Object” form shall mean any form resulting from mechanical transformation or
translation of a Source form, including but not limited to compiled object code,
generated documentation, and conversions to other media types.
“Work” shall mean the work of authorship, whether in Source or Object form,
made available under the License, as indicated by a copyright notice that is included
in or attached to the work (an example is provided in the Appendix below).
“Derivative Works” shall mean any work, whether in Source or Object form, that
is based on (or derived from) the Work and for which the editorial revisions,
annotations, elaborations, or other modifications represent, as a whole, an original
work of authorship. For the purposes of this License, Derivative Works shall not
include works that remain separable from, or merely link (or bind by name) to the
interfaces of, the Work and Derivative Works thereof.
“Contribution” shall mean any work of authorship, including the original version
of the Work and any modifications or additions to that Work or Derivative Works
thereof, that is intentionally submitted to Licensor for inclusion in the Work by
the copyright owner or by an individual or Legal Entity authorized to submit on
behalf of the copyright owner. For the purposes of this definition, "submitted"
means any form of electronic, verbal, or written communication sent to the
Licensor or its representatives, including but not limited to communication on
electronic mailing lists, source code control systems, and issue tracking systems
that are managed by, or on behalf of, the Licensor for the purpose of discussing
and improving the Work, but excluding communication that is conspicuously
166 Third-Party Legal Notices
Tomcat
Redistribution.
You may reproduce and distribute copies of the Work or Derivative Works thereof
in any medium, with or without modifications, and in Source or Object form,
provided that You meet the following conditions:
■ You must give any other recipients of the Work or Derivative Works a copy of
this License; and
■ You must cause any modified files to carry prominent notices stating that You
changed the files; and
■ You must retain, in the Source form of any Derivative Works that You
distribute, all copyright, patent, trademark, and attribution notices from the
Third-Party Legal Notices 167
Tomcat
Source form of the Work, excluding those notices that do not pertain to any
part of the Derivative Works; and
■ If the Work includes a "NOTICE" text file as part of its distribution, then any
Derivative Works that You distribute must include a readable copy of the
attribution notices contained within such NOTICE file, excluding those notices
that do not pertain to any part of the Derivative Works, in at least one of the
following places: within a NOTICE text file distributed as part of the Derivative
Works; within the Source form or documentation, if provided along with the
Derivative Works; or, within a display generated by the Derivative Works, if
and wherever such third-party notices normally appear. The contents of the
NOTICE file are for informational purposes only and do not modify the License.
You may add Your own attribution notices within Derivative Works that You
distribute, alongside or as an addendum to the NOTICE text from the Work,
provided that such additional attribution notices cannot be construed as modifying
the License. You may add Your own copyright statement to Your modifications
and may provide additional or different license terms and conditions for use,
reproduction, or distribution of Your modifications, or for any such Derivative
Works as a whole, provided Your use, reproduction, and distribution of the Work
otherwise complies with the conditions stated in this License.
Submission of Contributions.
Unless You explicitly state otherwise, any Contribution intentionally submitted
for inclusion in the Work by You to the Licensor shall be under the terms and
conditions of this License, without any additional terms or conditions.
Notwithstanding the above, nothing herein shall supersede or modify the terms
of any separate license agreement you may have executed with Licensor regarding
such Contributions.
Trademarks.
This License does not grant permission to use the trade names, trademarks, service
marks, or product names of the Licensor, except as required for reasonable and
customary use in describing the origin of the Work and reproducing the content
of the NOTICE file.
Disclaimer of Warranty.
Unless required by applicable law or agreed to in writing, Licensor provides the
Work (and each Contributor provides its Contributions) on an “AS IS” BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
implied, including, without limitation, any warranties or conditions of TITLE,
168 Third-Party Legal Notices
Blowfish Encryption
Limitation of Liability
In no event and under no legal theory, whether in tort (including negligence),
contract, or otherwise, unless required by applicable law (such as deliberate and
grossly negligent acts) or agreed to in writing, shall any Contributor be liable to
You for damages, including any direct, indirect, special, incidental, or consequential
damages of any character arising as a result of this License or out of the use or
inability to use the Work (including but not limited to damages for loss of goodwill,
work stoppage, computer failure or malfunction, or any and all other commercial
damages or losses), even if such Contributor has been advised of the possibility
of such damages.
Blowfish Encryption
Bruce Schneier
Copyright 2003 by George Anescu
The code in this project is Copyright 2003 by George Anescu. You have the right
to use and distribute the code in any way you see fit as long as this paragraph is
included with the distribution. No warranties or claims are made as to the validity
of the information and [Blowfish] code contained herein, so use it at your own
risk.
Third-Party Legal Notices 169
Curl/LibCurl
Curl/LibCurl
Daniel Stenberg
Copyright (c) 1996 - 2004, Daniel Stenberg, <daniel@haxx.se>.
All rights reserved.
Permission to use, copy, modify, and distribute this software for any purpose with
or without fee is hereby granted, provided that the above copyright notice and
this permission notice appear in all copies.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE
AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES
OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR
OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be
used in advertising or otherwise to promote the sale, use or other dealings in this
Software without prior written authorization of the copyright holder.
ICU
International Business Machines Corporation
Copyright (c) 1995-2003 International Business Machines Corporation and others.
All rights reserved.
ICU License - ICU 1.8.1 and later
COPYRIGHT AND PERMISSION NOTICE
Copyright (c) 1995-2003 International Business Machines Corporation and others.
All rights reserved.
Permission is hereby granted, free of charge, to any person obtaining a copy of
this software and associated documentation files (the “Software”), to deal in the
Software without restriction, including without limitation the rights to use, copy,
modify, merge, publish, distribute, and/or sell copies of the Software, and to permit
persons to whom the Software is furnished to do so, provided that the above
copyright notice(s) and this permission notice appear in all copies of the Software
and that both the above copyright notice(s) and this permission notice appear in
supporting documentation.
THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND,
EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES
OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
NONINFRINGEMENT OF THIRD PARTY RIGHTS. IN NO EVENT SHALL THE
COPYRIGHT HOLDER OR HOLDERS INCLUDED IN THIS NOTICE BE LIABLE FOR
ANY CLAIM, OR ANY SPECIAL INDIRECT OR CONSEQUENTIAL DAMAGES, OR
ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR
PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER
TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR
PERFORMANCE OF THIS SOFTWARE.
Except as contained in this notice, the name of a copyright holder shall not be
used in advertising or otherwise to promote the sale, use or other dealings in this
Software without prior written authorization of the copyright holder.
All trademarks and registered trademarks mentioned herein are the property of
their respective owners.
MD5
RSA Data Security, Inc.
Third-Party Legal Notices 171
Open SSL
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
Ronald L. Rivest
Copyright (C) 1991-2, RSA Data Security, Inc. Created 1991. All rights reserved.
License to copy and use this software is granted provided that it is identified as
the “RSA Data Security, Inc. MD5 Message-Digest Algorithm” in all material
mentioning or referencing this software or this function.
License is also granted to make and use derivative works provided that such works
are identified as “derived” from the RSA Data Security, Inc.
“MD5 Message-Digest Algorithm” in all material mentioning or referencing the
derived work.
RSA Data Security, Inc. makes no representations concerning either the
merchantability of this software or the suitability of this software for any
particular purpose. It is provided “as is” without express or implied warranty of
any kind.
These notices must be retained in any copies of any part of this documentation
and/or software.
Open SSL
The OpenSSL Project
Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
LICENSE ISSUES:
The OpenSSL toolkit stays under a dual license, i.e. both the conditions of the
OpenSSL License and the original SSLeay license apply to the toolkit. See below
for the actual license texts. Actually both licenses are BSD-style Open Source
licenses. In case of any license issues related to OpenSSL please contact
openssl-core@openssl.org.
OpenSSL License
Copyright (c) 1998-2003 The OpenSSL Project. All rights reserved.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
■ Redistributions of source code must retain the above copyright notice, this
list of conditions and the following disclaimer.
■ Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
172 Third-Party Legal Notices
Open SSL
SSL documentation included with this distribution is covered by the same copyright
terms except that the holder is Tim Hudson (tjh@cryptsoft.com).
Copyright remains Eric Young's, and as such any Copyright notices in the code
are not to be removed.
If this package is used in a product, Eric Young should be given attribution as the
author of the parts of the library used. This can be in the form of a textual message
at program startup or in documentation (online or textual) provided with the
package.
Redistribution and use in source and binary forms, with or without modification,
are permitted provided that the following conditions are met:
■ Redistributions of source code must retain the copyright notice, this list of
conditions and the following disclaimer.
■ Redistributions in binary form must reproduce the above copyright notice,
this list of conditions and the following disclaimer in the documentation and/or
other materials provided with the distribution.
■ All advertising materials mentioning features or use of this software must
display the following acknowledgement:
■ "This product includes cryptographic software written by Eric Young
(eay@cryptsoft.com)"
■ The word 'cryptographic' can be left out if the routines from the library being
used are not cryptographic related :-).
■ If you include any Windows specific code (or a derivative thereof) from the
apps directory (application code) you must include an acknowledgement:
■ "This product includes software written by Tim Hudson
(tjh@cryptsoft.com)"
THIS SOFTWARE IS PROVIDED BY ERIC YOUNG "AS IS" AND ANY EXPRESS OR
IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR
CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED
TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH
DAMAGE.
174 Third-Party Legal Notices
ReportCtrl.h.2.0.1
The licence and distribution terms for any publically available version or derivative
of this code cannot be changed. i.e. this code cannot simply be copied and put
under another distribution licence [including the GNU Public Licence.]
ReportCtrl.h.2.0.1
Maarten Hoeben
Copyright Maarten Hoeben
Author: Maarten Hoeben
E-mail: hamster@xs4all.nl
Implementation of the CReportCtrl and associated classes.
This code may be used in compiled form in any way you desire. This file may be
redistributed unmodified by any means PROVIDING it is not sold for profit without
the authors written consent, and providing that this notice and the authors name
and all copyright notices remains intact.
An email letting me know how you are using it would be nice as well.
This file is provided "as is" with no expressed or implied warranty.
The author accepts no liability for any damage/loss of business that this product
may cause.
STLport
Boris Fomitchev
Copyright 1999,2000 Boris Fomitchev
Boris Fomitchev grants Licensee a non-exclusive, non-transferable, royalty-free
license to use STLport and its documentation without fee.
By downloading, using, or copying STLport or any portion thereof, Licensee agrees
to abide by the intellectual property laws and all other applicable laws of the
United States of America, and to all of the terms and conditions of this Agreement.
Licensee shall maintain the following copyright and permission notices on STLport
sources and its documentation unchanged :
Copyright 1999,2000 Boris Fomitchev
This material is provided "as is", with absolutely no warranty expressed or implied.
Any use is at your own risk.
Permission to use or copy this software for any purpose is hereby granted without
fee, provided the above notices are retained on all copies. Permission to modify
Third-Party Legal Notices 175
Java 2 Runtime Environment
the code and to distribute modified code is granted, provided the above notices
are retained, and a notice that the code was modified is included with the above
copyright notice.
The Licensee may distribute binaries compiled with STLport (whether original or
modified) without any royalties or restrictions.
The Licensee may distribute original or modified STLport sources, provided that:
■ The conditions indicated in the above permission notice are met;
■ The following copyright notices are retained when present, and conditions
provided in accompanying permission notices are me :
■ Copyright 1994 Hewlett-Packard Company
■ Copyright 1996,97 Silicon Graphics Computer Systems, Inc.
■ Copyright 1997 Moscow Center for SPARC Technology.
Permission to use, copy, modify, distribute and sell this software and its
documentation for any purpose is hereby granted without fee, provided that the
above copyright notice appear in all copies and that both that copyright notice
and this permission notice appear in supporting documentation. Hewlett-Packard
Company makes no representations about the suitability of this software for any
purpose. It is provided "as is" without express or implied warranty.
Permission to use, copy, modify, distribute and sell this software and its
documentation for any purpose is hereby granted without fee, provided that the
above copyright notice appear in all copies and that both that copyright notice
and this permission notice appear in supporting documentation. Silicon Graphics
makes no representations about the suitability of this software for any purpose.
It is provided "as is" without express or implied warranty.
Permission to use, copy, modify, distribute and sell this software and its
documentation for any purpose is hereby granted without fee, provided that the
above copyright notice appear in all copies and that both that copyright notice
and this permission notice appear in supporting documentation. Moscow Center
for SPARC Technology makes no representations about the suitability of this
software for any purpose. It is provided "as is" without express or implied warranty.
DEFINITIONS.
"Software" means the identified above in binary form, any other machine readable
materials (including, but not limited to, libraries, source files, header files, and
data files), any updates or error corrections provided by Sun, and any user manuals,
programming guides and other documentation provided to you by Sun under this
Agreement. "Programs" mean Java applets and applications intended to run on
the Java 2 Platform, Standard Edition (J2SETM platform) platform on Java-enabled
general purpose desktop computers and servers.
LICENSE TO USE.
Subject to the terms and conditions of this Agreement, including, but not limited
to the Java Technology Restrictions of the Supplemental License Terms, Sun
grants you a non-exclusive, non-transferable, limited license without license fees
to reproduce and use internally Software complete and unmodified for the sole
purpose of running Programs. Additional licenses for developers and/or publishers
are granted in the Supplemental License Terms.
RESTRICTIONS.
Software is confidential and copyrighted. Title to Software and all associated
intellectual property rights is retained by Sun and/or its licensors. Unless
enforcement is prohibited by applicable law, you may not modify, decompile, or
reverse engineer Software. You acknowledge that Licensed Software is not designed
or intended for use in the design, construction, operation or maintenance of any
nuclear facility. Sun Microsystems, Inc. disclaims any express or implied warranty
of fitness for such uses. No right, title or interest in or to any trademark, service
Third-Party Legal Notices 177
Java 2 Runtime Environment
mark, logo or trade name of Sun or its licensors is granted under this Agreement.
Additional restrictions for developers and/or publishers licenses are set forth in
the Supplemental License Terms.
LIMITED WARRANTY.
Sun warrants to you that for a period of ninety (90) days from the date of purchase,
as evidenced by a copy of the receipt, the media on which Software is furnished
(if any) will be free of defects in materials and workmanship under normal use.
Except for the foregoing, Software is provided "AS IS". Your exclusive remedy
and Sun's entire liability under this limited warranty will be at Sun's option to
replace Software media or refund the fee paid for Software. Any implied warranties
on the Software are limited to 90 days. Some states do not allow limitations on
duration of an implied warranty, so the above may not apply to you. This limited
warranty gives you specific legal rights. You may have others, which vary from
state to state.
DISCLAIMER OF WARRANTY.
UNLESS SPECIFIED IN THIS AGREEMENT, ALL EXPRESS OR IMPLIED
CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY
IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR
PURPOSE OR NON-INFRINGEMENT ARE DISCLAIMED, EXCEPT TO THE EXTENT
THAT THESE DISCLAIMERS ARE HELD TO BE LEGALLY INVALID.
LIMITATION OF LIABILITY.
TO THE EXTENT NOT PROHIBITED BY LAW, IN NO EVENT WILL SUN OR ITS
LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR
SPECIAL, INDIRECT, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES,
HOWEVER CAUSED REGARDLESS OF THE THEORY OF LIABILITY, ARISING
OUT OF OR RELATED TO THE USE OF OR INABILITY TO USE SOFTWARE, EVEN
IF SUN HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. In no
event will Sun's liability to you, whether in contract, tort (including negligence),
or otherwise, exceed the amount paid by you for Software under this Agreement.
The foregoing limitations will apply even if the above stated warranty fails of its
essential purpose. Some states do not allow the exclusion of incidental or
consequential damages, so some of the terms above may not be applicable to you.
and updated versions of the Software from Sun ("Software Updates"), which may
require you to accept updated terms and conditions for installation. If additional
terms and conditions are not presented on installation, the Software Updates will
be considered part of the Software and subject to the terms and conditions of the
Agreement.
TERMINATION.
This Agreement is effective until terminated. You may terminate this Agreement
at any time by destroying all copies of Software. This Agreement will terminate
immediately without notice from Sun if you fail to comply with any provision of
this Agreement. Either party may terminate this Agreement immediately should
any Software become, or in either party's opinion be likely to become, the subject
of a claim of infringement of any intellectual property right. Upon Termination,
you must destroy all copies of Software.
EXPORT REGULATIONS.
All Software and technical data delivered under this Agreement are subject to US
export control laws and may be subject to export or import regulations in other
countries. You agree to comply strictly with all such laws and regulations and
acknowledge that you have the responsibility to obtain such licenses to export,
re-export, or import as may be required after delivery to you.
Third-Party Legal Notices 179
Java 2 Runtime Environment
GOVERNING LAW.
Any action related to this Agreement will be governed by California law and
controlling U.S. federal law. No choice of law rules of any jurisdiction will apply.
SEVERABILITY.
If any provision of this Agreement is held to be unenforceable, this Agreement
will remain in effect with the provision omitted, unless omission would frustrate
the intent of the parties, in which case this Agreement will immediately terminate.
INTEGRATION.
This Agreement is the entire agreement between you and Sun relating to its subject
matter. It supersedes all prior or contemporaneous oral or written communications,
proposals, representations and warranties and prevails over any conflicting or
additional terms of any quote, order, acknowledgment, or other communication
between the parties relating to its subject matter during the term of this
Agreement. No modification of this Agreement will be binding, unless in writing
and signed by an authorized representative of each party.
180 Third-Party Legal Notices
Java 2 Runtime Environment
in the applicable README file), (iii) you do not remove or alter any proprietary
legends or notices contained in or on the Redistributables, (iv) you only
distribute the Redistributables pursuant to a license agreement that protects
Sun's interests consistent with the terms contained in the Agreement, (v) you
agree to defend and indemnify Sun and its licensors from and against any
damages, costs, liabilities, settlement amounts and/or expenses (including
attorneys' fees) incurred in connection with any claim, lawsuit or action by
any third party that arises or results from the use or distribution of any and
all Programs and/or Software.
■ D. Java Technology Restrictions. You may not modify the Java Platform
Interface ("JPI", identified as classes contained within the "java" package or
any subpackages of the "java" package), by creating additional classes within
the JPI or otherwise causing the addition to or modification of the classes in
the JPI. In the event that you create an additional class and associated API(s)
which (i) extends the functionality of the Java platform, and (ii) is exposed to
third party software developers for the purpose of developing additional
software which invokes such additional API, you must promptly publish broadly
an accurate specification for such API for free use by all developers. You may
not create, or authorize your licensees to create, additional classes, interfaces,
or subpackages that are in any way identified as "java", "javax", "sun" or similar
convention as specified by Sun in any naming convention designation.
■ E. Source Code. Software may contain source code that, unless expressly
licensed for other purposes, is provided solely for reference purposes pursuant
to the terms of this Agreement. Source code may not be redistributed unless
expressly provided for in this Agreement.
■ F. Third Party Code. Additional copyright notices and license terms applicable
to portions of the Software are set forth in the
THIRDPARTYLICENSEREADME.txt file. In addition to any terms and conditions
of any third party opensource/freeware license identified in the
THIRDPARTYLICENSEREADME.txt file, the disclaimer of warranty and
limitation of liability provisions in paragraphs 5 and 6 of the Binary Code
License Agreement shall apply to all Software in this distribution.
For inquiries please contact: Sun Microsystems, Inc., 4150 Network Circle, Santa
Clara, California 95054, U.S.A. (LFI#135955/Form ID#011801)
182 Third-Party Legal Notices
Java 2 Runtime Environment
Appendix B
Maintaining accessibility
This appendix includes the following topics:
■ SPACEBAR changes the state of a check box that has focus. Typing a mnemonic
(if one is available) moves the focus to the check box and change its state.
■ Arrow keys move focus within radio buttons, list boxes, sliders, groups of
option controls, or groups of page tabs.
■ Items that cannot be changed are not visited by the TAB key sequence. Options
that are unavailable are grayed-out and can neither be selected nor given focus.
While the controls described here are typically found in dialog boxes, they also
can occur in other contexts. The same navigation standards apply.
List Boxes
List boxes display a column of available choices.
Different kinds of list boxes exist with additional navigation conventions such as
the following:
■ Drop-down list boxes by default show only the selected item. A small button
to the right of the control will show a downward-pointing arrow. Select the
arrow to display more items from the list box. If there are more choices than
can fit in the preset list box area, a slider appears along the side of the list box.
Show or hide the list using ALT+DOWN ARROW, ALT+UP ARROW, or F4. The
TAB key selects an item.
■ Extended selection list boxes support selecting single items, blocks of items,
or combinations of the two. After an item is selected, hold down
CTRL+navigation keys to select or clear additional items or blocks of items.
Table B-1 Keyboard shortcuts that are unique to Continuous Protection Server
ALT F The File menu expands. On the File menu, you can create new jobs,
devices and media, print selected items, view properties, or exit
Continuous Protection Server.
ALT E The Edit menu expands. On the Edit menu, you can rename, delete,
copy, and select items. In addition, you can work with selection lists
and search catalogs.
ALT V The View menu expands. On the View menu, you can change the
information that displays on the screen. The options on the View menu
change according to which item is selected on the navigation bar.
ALT T The Tools menu expands. The Tools menu provides many important
options for working with Continuous Protection Server, including
starting and stopping services, using device and media operations,
using Wizards, and setting default options.
ALT W The Window menu expands. Use the Window menu to move to a new
window or view.
ALT H The Help menu expands. Use the Help menu to access Continuous
Protection Server documentation and various Symantec Web sites.
Select secondary menu items by opening the main menu and using the UP or
DOWN ARROW key until the item you want to work with is highlighted. Press the
RIGHT ARROW key to open a submenu, and ENTER to select your choice.
Administration Console The interface that the administrator uses to manage operations in CPS, such as
setting backup destinations, creating backup or restore jobs, and monitoring CPS
processes and alerts.
administrator rights The credentials that enable a person to make systemwide changes to a domain or
computer, install programs, and access all files. The administrator user account
has full access to other user accounts. Administrator rights also enable the person
to manage user and group accounts, assign passwords, and grant permissions.
alert An event, such as a completed backup job, that usually requires some form of user
interaction or acknowledgment.
backup destination The location on a Protection Server where the files that are backed up from a
Business Server are stored. The destination is defined in the backup job properties.
Only one backup destination is allowed per volume.
Backup Exec Retrieve The gateway by which users access the Web Restore Server Component to retrieve
files. Backup Exec Retrieve uses Internet browsers (Internet Explorer 6.0 or later,
and others). CPS software is not required on the user workstations.
Backup Group A group of computers that are managed by a single Continuous Management
Service. Files can be backed up only to a Protection Server that is in the same
Backup Group as the Business Server.
backup job An operation that has been scheduled for processing by the Continuous
Management Service. For example, if you make selections and submit a backup
that is based on those selections, you have created a backup job. Jobs contain
source and destination information, settings, and a schedule. Every type of backup
job backs up the selected data and all regular shares.
backup schedule The specific days and times when backup jobs are run. These can be one-time
events, periodically run jobs, or continuous processes. Administrators can set or
change backup schedules in the CPS Administration Console.
backup schedule types This para is intentionally added.
backup strategies The procedures you implement for backing up your information on the network.
A good backup strategy requires minimal time to get your information back in
the event of a loss.
190 Glossary
Business Server A local or remote server where users save files and folders as part of their daily
work. A Business Server is the source of a backup job and must have a Continuous
Protection Agent installed.
CMS (Continuous The primary control of the Continuous Protection Server processes. The CMS
Management Service) maintains a database with all command and control information, and configures
the Protection Agents according to settings that are sent from the Administration
Console.
continuous backup A backup job that runs continuously, thereby allowing any changes to be backed
up as they occur.
CPA (Continuous The Continuous Protection Agent is a software collection that must be installed
Protection Agent) on each computer in a Backup Group. This agent uses a file system component
and file replication technology to enable continuous data protection between
computers in the Backup Group.
CPS Network Helper A CPS component that allows communications within Continuous Protection
Service Server and with Backup Exec. The Network Helper Service was formerly known
as the Enterprise Network Layer (ENL).
destination server The server in the Continuous Protection Server network to which information is
written during the job process. In a backup job, the information is copied from
the Business Servers (sources) to a Protection Server (destination).
EFS (Encrypting File A Microsoft Windows technology that lets you store information on disk in an
System) encrypted format. The encryption is enabled through the advanced file attributes.
CPS skips over files that are encrypted with EFS.
history file A file on the Continuous Management Service where snapshots are stored.
Continuous Protection Server stores each snapshot for 24 hours unless specified
otherwise in the retention settings.
Indexing component The Indexing component maintains a directory for the files that are available to
user file retrieval using the Web Restore Server Component and Backup Exec
Retrieve. The Indexing component is an optional feature and should be installed
on any server that will be accessed by users for file retrieval using Backup Exec
Retrieve. The Indexing component supports searches by file, file versions and
recent activity.
infrastructure The underlying foundation or basic framework of the Backup Group. Continuous
Protection Server runs on an infrastructure of Windows-based servers.
job A job defines what data is to be backed up, which server the data will be backed
up from and to, when the data will be backed up, and other settings. Similar jobs
are defined to restore the data.
job log The results of a job and are created when a job runs. You can review job logs to
find job errors and details.
Glossary 191
periodic backup A backup job that runs on timed intervals, such as Monday through Friday, every
12 hours.
permissions The credentials that enable a particular user to access a particular resource in a
shared network environment. For example, users are granted permissions to
access files, directories, and printers.
Protection Server A Protection Server is the destination of data that is backed up by CPS from
Business Servers.
regular backup A backup job that is run on a regular schedule, such as every Friday at 6:00 P.M.
Remote Agent for A CPS uses the Symantec Backup Exec Remote Agent for Windows Systems
Windows Systems (Remote Agent) to access System State information for backup and restore. Remote
Agent is an optional component and should be installed on any CPS Business
Server that needs to have its System State protected. Remote Agent should also
be installed on the Protection Server and Continuous Management Service if they
will be protected by Symantec Backup Exec.
restore job A job defines what data is to be restored, from what computers the data will be
restored from and back to, when the data will be restored, and other settings.
retention properties The length of time you want to save snapshots on the backup destination. You
can store snapshots up to a limit that is determined by your underlying snapshot
technology. For most installations, this limit is approximately 64 snapshots per
destination. This limit may vary considerably if alternative snapshot providers
are installed.
scheduled backup A backup job that runs on a set schedule. Three kinds of scheduled backup jobs
are used in Continuous Protection Server: regularly scheduled, periodically
scheduled, and continuous. Regularly scheduled backup jobs run on specific days
at a specific time, every week. Periodically scheduled backup jobs run on specific
days at timed intervals, such as every 12 hours. Continuously scheduled backup
jobs are ongoing.
service account The Windows user account under which the CPS services run.
shadow A point-in-time, fixed representation, or copy of a specified volume.
shadow storage A volume that is specified where snapshots are stored.
SmartLink A technology that integrates Backup Exec with other Symantec products, such as
CPS. SmartLink enables the status of backup jobs that are created in Continuous
Protection Server to display in the Backup Exec Administration Console.
snapshot A point-in-time, fixed representation, or copy of a specified volume.
source computer A server in the Continuous Protection Server Backup Group that contains the files
to be backed up. This computer must have a Continuous Protection Agent installed.
192 Glossary
storage space The disk drive space on the servers in the Continuous Protection Server Backup
Group. Storage space generally refers to available disk space.
strategic backup plan The philosophy of using multiple types of backup jobs to protect your
organization’s information. A strategic backup plan generally uses several layers
of backups to protect different types of information.
strategic naming The philosophy of naming files and backup destinations in a meaningful way.
conventions Rather than naming backup destinations sequentially such as Backup01, Backup02,
and Backup03, destination names are based on physical office locations, functional
business units, or other meaningful criteria. Therefore, when viewing a list of
backup destinations, the destinations are differentiated from each other and are
easier to find information.
system information The Windows operating system includes data that requires special handling to
protect and restore properly. This data, referred to as “system information” in
CPS, contains different information depending on the specific version of Windows
that is installed on the system. For Windows 2000 systems, this includes a set of
data that is called System State and that includes various operating system files
and registry information. For those systems that support Volume Shadow Copy
Services (VSS), the system information consists of key elements of Shadow Copy
Components including System State and Service State.
system resources The parts that make up or operate computer systems or networks such as client
computers, servers, printers, cables, modems, bandwidth, memory, or mother
boards. Resources are allocated to programs or processes while they are running.
System State backup A snapshot of system-specific data on the source that is comprised of the registry,
the COM+ Class Registration database, and start and system files. If the source is
a Certificate Services database, the Certificate Services database is also included.
If the server is a domain controller, the data also includes the Active Directory
services database and SYSVOL directory. The System State data is backed up and
restored only as a collection, never individually.
Web Restore Server The Web Restore Server component is a feature of the CMS that makes available
component versioned copies (snapshots) of files for user retrieval to their workstations.
Index
installation logs M
viewing 42 Master (ENL\System) parameter 80
installing Backup Exec Retrieve 113 MaxDirSize parameter 80
MaxLogSize (ENL) parameter 80
J MaxLogSize parameter 80
job details topic box 147 MaxPacketSize (Network.TCPIP) parameter 80
job ID MaxPacketSize (Network.UDPv6) parameter 81
not found 146 MaxRAPerCentChange parameter 81
job logs menu bar 52
job header 147 MinRASizeInKb parameter 81
SmartLink 143 monitoring processes 122
topic box 147 MsBetweenRallyChecks parameter 81
viewing 143
job monitor view 57 N
job name NamedObjectsRoot parameter 81
not found 146 navigation bar 52
job pairs NetBios 34
alerts 142 Network (ENL\System) parameter 81
description 122 Network Helper services 34, 36
exceptions 145 network load balancing service 38, 150
job report 125 network shares
job state restoring 103
unknown 146 NeverDoRegionAnalysis parameter 82
job states 122 NumberOfLogs parameter 82
job status 124
jobs
monitoring 122
O
Journal directory 42 OutboundJournalCleanupSize parameter 82
JournalRoot parameter 79 OutboundJournalNominalSize parameter 82
OutboundSyncJournalLimit parameter 82
L
latency
P
target 127, 148 pair header topic box 148
license keys 39 pair log topic box 148
limiting bandwidth 96 pair status 124
LiveUpdate 20 pairs
local system object cache 45 job 122
log entries parameters
limiting 140 tunable
parameter 147 AlertGroomFrequency 75
LogOpenFileTableOncePerSet parameter 79 AlwaysDoRegionAnalysis 75
LogPath (EFC) parameter 79 BroadcastAddress 76
LogPath parameter 79 BroadcastHops 76
logs changing values 85
viewing installation 42 ConnectionPooling 76
Logs directory 35 DaysToKeepAlertItems 76
LogText parameter 80 DaysToKeepDeletedSnapshots 76
DelayDirChangeNotifications 77
DoEventLog 77
Index 197
S SmartLink (continued)
Schedule parameter 84 job logs
scheduled backups summary messages 145
description 22 job topic box 143
schedules options topic box 146
changing 94 topic boxes
changing for snapshots 71 command-line syntax errors 145
continuous backups 88 CPS jobs 147
snapshots 70 exceptions 145
schedules for jobs job details 147
troubleshooting 90 job log 147
scripts 96 options 146
secured file access 106 pair header 148
security modes run log 146
domain 64 snapshots
workgroup 64 changing schedules 71
selection pane 53 creating 69
SerializeIrpLogging parameter 84 creating on demand 69
server properties 55 deleting 73
servers indexing state 73
managing properties 59 managing 68
moving between backup groups 62 reasons for deleting 72
service account 29 reindexing 152
Services retention 71
Administration Service 36 retention policies 69
Broker Services 36 scheduling 70
Configuration Writer 36 storing 71
database 36 viewing history 72
Network Helper 36 Socket parameter 84
Protection Agent 36 source properties 59
System State Manager 36 status
services manager 63 job and pair 124
setintegratedlogin utility 156 status bar 53
Settings Utility 20, 74 Symantec
setup view 54 knowledge base 24
setup view properties 55 LiveUpdate 20
Shadow Copy Components 88 Technical Support 23
Shadow Storage System Cache directory 42
changing location 66 System Information 102
ShareInfoAsSingleComponent parameter 84 system requirements
Silverlight hardware 31
deploying in your organization 113 minimum 30
SmartLink System State
alerts backup schedule 102
categories 140 Manager 36
credentials 137 restore to an Active Directory 102
description 137 restoring 101
fatal alerts 140 system summary view 54
job log descriptions 143
Index 199
T V
target latency 127, 148 Verbose (ENL) parameter 85
task pane 52 VolumeLevel parameter 85
tasks available in Backup Exec Retrieve 108
Technical Support 23 W
troubleshooting 149
Windows File Sharing 34
troubleshooting issues
workgroup
Administration Console 151
environment 30
anti-spyware software 150
security mode 64
Backup Exec compatibility 28
browsers supported 150
business servers 151
configuration 151
connection outages 155
CPS backup jobs 155
CPS components 151
CPS configurations 151
CPS restore jobs 155
database backup and restore 154, 156
database maintenance 155
database validationa nd repair 156
disk space for indexing 152
file system filter drivers 29
installation 150
network load balance 150
NIC failure 150
pathnames with Asian characters 150
processing efficiency 153
push installing over domain trust 150
services account 29
setintegratedlogin utility 156
snapshot schedules 90
SNMP support 153
system state backup and restore 155
uninstalling CPS 150
utility partitions 153
workgroups and domains 150
U
uninstallation
Business Server 48
Continuous Protection Server 47
destinations 47
sources 48
uninstalling 118
use case 106
UsePrivateFindFileMethod parameter 85