HP BB118BV, StorageWorks Data Protector Express User Manual

Users Guide and Technical Reference
ii Data Protector Express User's Guide and Technical Reference
Copyright
Copyright © 2007 by Hewlett-Packard Development Company, L.P. May 2007
Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential damages in connection with the furnishing, performance, or use of this material.
This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated to another language without the prior written consent of Hewlett-Packard. The information contained in this document is subject to change without notice.
Windows®, Windows NT® and MS-DOS® are registered trademarks of Microsoft Corporation. NetWare® is a registered trademark of Novell, Inc. Btrieve is a registered trademark of Pervasive Software Inc. Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red Hat, Inc. Mandrake® is a registered trademark of MandrakeSoft S.A. SuSE® is a registered trademark of SuSE Linux. Debian® is a registered trademark of Software in the Public Interest, Inc. Slackware® is a registered trademark of Slackware Linux, Inc. SCO® is a registered trademark of Caldera International, Inc. UNIX® is a registered trademark of The Open Group. Solaris™ is a trademark of Sun Microsystems, Inc. SPARC® is a registered trademark of SPARC International, Inc. Products bearing SPARC trademarks are based on an architecture developed by Sun Microsystems, Inc. FreeBSD® is a registered trademark of FreeBSD Inc. and Walnut Creek CDROM. Netscape® is a registered trademark of Netscape Communications Corporation. Java™ is a trademark of Sun Microsystems, Inc. Adobe®, Acrobat® and Acrobat® Reader® are registered trademarks of Adobe Systems Incorporated. WinZip® is a registered trademark of WinZip Computing, Inc. Pentium® and Celeron® are registered trademarks of Intel Corporation. AMD-K6®, AMD Athlon™ and AMD Duron™ are trademarks or registered trademarks of Advanced Micro Devices, Inc.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information is provided ”as is” without warranty of any kind and is subject to change without notice. The warranties for Hewlett-Packard Company products are set forth in the express limited warranty statements for such products. Nothing herein should be construed as constituting an additional warranty.
www.hp.com
Trademarks
Windows® and Windows NT® are registered trademarks of Microsoft Corporation.
NetWare® is a registered trademark of Novell, Inc.
Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red Hat, Inc. SuSE® is a registered trademark of SuSE Linux Products GmbH, a Novell business.
Trademarks
Windows® and Windows NT® are registered trademarks of Microsoft Corporation.
NetWare® is a registered trademark of Novell, Inc.
Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red Hat, Inc. SuSE® is a registered trademark of SuSE Linux Products GmbH, a Novell business
Table of Contents
Before You Begin ....................................................................................................................... xvi
Documentation ..............................................................................................................................xvi
Printable documentation ..........................................................................................................................................xvi
Release notes .........................................................................................................................................................xvii
Online Help..............................................................................................................................................................xvii
Windows ........................................................................................................................................................... xvii
Non-Windows ................................................................................................................................................... xvii
Screen Shots........................................................................................................................................................... xvii
Features ..................................................................................................................................................................xvii
Customer Support ........................................................................................................................ xvii
Chapter 1: About Data Protector Express ................................................................................... 1
Backup basics ................................................................................................................................. 1
Typical backup and recovery operations ................................................................................................................... 1
Backup environment........................................................................................................................ 2
Backup devices.................................................................................................................................................... 2
Storage management catalog ............................................................................................................................. 3
Backup management program ............................................................................................................................ 4
Managing the Storage Management Catalog ............................................................................................................ 4
Objects................................................................................................................................................................. 4
Properties ............................................................................................................................................................ 4
Data Protector Express management domains................................................................................................... 4
Data Protector Express management domains and security .............................................................................. 5
Creating and running jobs ................................................................................................................................... 6
Chapter 2: Data Protector Express Workplace ........................................................................... 7
Starting Data Protector Express ...................................................................................................... 7
Logon Window................................................................................................................................. 8
Logging on the first time............................................................................................................................................. 8
Grace logons ....................................................................................................................................................... 9
Selecting a Data Protector Express management domain ........................................................................................ 9
User name and password ........................................................................................................................................ 10
Changing your password ......................................................................................................................................... 10
Logging out .............................................................................................................................................................. 11
Logging out and running scheduled jobs........................................................................................................... 11
Main Data Protector Express Window ........................................................................................... 12
Menu bar............................................................................................................................................................ 12
Desk bar ............................................................................................................................................................ 13
Toolbar............................................................................................................................................................... 14
Task and information panes .............................................................................................................................. 15
Detail viewing area ............................................................................................................................................ 15
Status bar .......................................................................................................................................................... 16
Customizing the main Data Protector Express window ................................................................. 17
Creating a custom desk bar ..................................................................................................................................... 17
Changing the icon associated with an object........................................................................................................... 17
Adding custom descriptions to objects..................................................................................................................... 18
Customizing profiles................................................................................................................................................. 18
Working with Objects in the Main Data Protector Express Window............................................... 19
Arranging objects ..................................................................................................................................................... 19
iii
iv Data Protector Express User's Guide and Technical Reference
Keyboard shortcuts .................................................................................................................................................. 19
Shortcut menus ........................................................................................................................................................ 20
Find button ............................................................................................................................................................... 20
Property pages .............................................................................................................................. 20
Opening property pages........................................................................................................................................... 21
Reports.......................................................................................................................................... 22
Types of reports ....................................................................................................................................................... 22
Additional reporting capabilities ............................................................................................................................... 22
Printing reports ......................................................................................................................................................... 23
Saving reports .......................................................................................................................................................... 23
Working with Data Protector Express wizards ............................................................................... 24
Available wizards ..................................................................................................................................................... 25
Backup job wizards............................................................................................................................................ 25
Restore job wizards ........................................................................................................................................... 25
Verify job wizards............................................................................................................................................... 25
Media job wizards .............................................................................................................................................. 26
D2D device wizards ........................................................................................................................................... 27
Disaster recovery wizards ................................................................................................................................. 27
Custom wizards........................................................................................................................................................ 27
Viewing optional features............................................................................................................... 28
Chapter 3: Creating Jobs with Data Protector Express ........................................................... 29
Overview........................................................................................................................................ 29
Backup jobs.............................................................................................................................................................. 29
Restore jobs ............................................................................................................................................................. 30
Verify jobs................................................................................................................................................................. 30
Media jobs ................................................................................................................................................................ 30
Disaster recovery jobs.............................................................................................................................................. 30
Job Group................................................................................................................................................................. 30
Jobs and Media view and the Job Status view .............................................................................. 31
Creating New Jobs ........................................................................................................................ 32
Creating jobs with wizards ....................................................................................................................................... 32
Creating new jobs from the Jobs and Media view ................................................................................................... 33
Creating new jobs by copying .................................................................................................................................. 35
Renaming, deleting, copying and moving jobs .............................................................................. 35
Creating job groups ....................................................................................................................... 36
Organizing jobs with folders........................................................................................................... 36
Types of folders........................................................................................................................................................ 37
Folders and job views .............................................................................................................................................. 37
Home, Admin, and Everyone folders ....................................................................................................................... 37
Everyone folder and permissions ...................................................................................................................... 38
Creating job folders .................................................................................................................................................. 38
Moving, renaming and deleting folders .................................................................................................................... 39
Modifying folders................................................................................................................................................ 39
Chapter 4: Permissions............................................................................................................... 41
Overview........................................................................................................................................ 41
Users and Groups ......................................................................................................................... 41
Everyone group ........................................................................................................................................................ 42
Effective Permissions .................................................................................................................... 43
Determining effective permissions ........................................................................................................................... 43
Examples of determining effective permissions....................................................................................................... 43
Table of Contents v
Effective permissions example #1 ..................................................................................................................... 43
Effective permissions example #2 ..................................................................................................................... 44
How moving objects affects permissions ................................................................................................................. 45
Types of Permission ...................................................................................................................... 46
Supervisor ................................................................................................................................................................ 47
Access...................................................................................................................................................................... 47
Create....................................................................................................................................................................... 47
Modify....................................................................................................................................................................... 48
Delete, Read and Write............................................................................................................................................ 48
Examples of Permissions .............................................................................................................. 48
Granting Permissions to Other Data Protector Express Users ...................................................... 50
Restricting user permissions .................................................................................................................................... 51
Chapter 5: Selecting Files and File Versions ............................................................................ 53
Backup Selection Concepts........................................................................................................... 53
Marking files for backup ........................................................................................................................................... 54
Selecting folders or selecting files ..................................................................................................................... 54
Selecting files with filters .......................................................................................................................................... 56
How selection filters work .................................................................................................................................. 56
Filters and shaded folders ................................................................................................................................. 56
Selecting changed files only..................................................................................................................................... 57
Automatically selecting new files for backup............................................................................................................ 57
Working with mapped drives .................................................................................................................................... 58
Working with VSS snapshots ................................................................................................................................... 59
Selecting Files for Backup Jobs..................................................................................................... 60
Applying filter criteria................................................................................................................................................ 60
Filter selection criteria .............................................................................................................................................. 61
Backup Range ................................................................................................................................................... 62
Modify Range..................................................................................................................................................... 62
Create Range .................................................................................................................................................... 62
Access Range.................................................................................................................................................... 62
Size Range ........................................................................................................................................................ 63
Version Range ................................................................................................................................................... 63
Wildcard Type.................................................................................................................................................... 64
Must Match ........................................................................................................................................................ 64
Cannot Match .................................................................................................................................................... 64
Required Attributes ............................................................................................................................................ 64
Exclude Attributes.............................................................................................................................................. 65
Allow Parents..................................................................................................................................................... 65
Allow Children.................................................................................................................................................... 65
Media ................................................................................................................................................................. 65
Restore Selection Concepts .......................................................................................................... 66
Selecting files for restoring....................................................................................................................................... 66
Selecting versions of files .................................................................................................................................. 68
Selecting versions of folders.............................................................................................................................. 69
Selecting folders compared to selecting files .................................................................................................... 71
Versions and filters ............................................................................................................................................ 71
Selecting files with filters .......................................................................................................................................... 71
How selection filters work .................................................................................................................................. 71
Changing the name and location of restored files ................................................................................................... 71
Selecting Versions of Files for Restore Jobs ................................................................................. 72
Applying filter criteria................................................................................................................................................ 72
Filter selection criteria .............................................................................................................................................. 73
vi Data Protector Express User's Guide and Technical Reference
Backup Range ................................................................................................................................................... 73
Modify Range..................................................................................................................................................... 74
Create Range .................................................................................................................................................... 74
Delete Range..................................................................................................................................................... 74
Access Range.................................................................................................................................................... 75
Size Range ........................................................................................................................................................ 75
Version Range ................................................................................................................................................... 75
Wildcard Type.................................................................................................................................................... 76
Must Match ........................................................................................................................................................ 76
Cannot Match .................................................................................................................................................... 76
Required Attributes ............................................................................................................................................ 77
Exclude Attributes.............................................................................................................................................. 77
Allow Parents..................................................................................................................................................... 77
Allow Children.................................................................................................................................................... 77
Media ................................................................................................................................................................. 77
Restoring Files with New Names and Locations............................................................................ 78
Restoring a file with a new name ............................................................................................................................. 78
Restoring files to a different folder ........................................................................................................................... 78
Restoring files to a new folder.................................................................................................................................. 79
Verify Selection Concepts.............................................................................................................. 80
Selecting files for verifying ....................................................................................................................................... 80
Selecting versions of files .................................................................................................................................. 82
Selecting folders compared to selecting files .................................................................................................... 83
Selecting files with filters .......................................................................................................................................... 84
How selection filters work .................................................................................................................................. 84
Selecting Versions of Files for Verify Jobs..................................................................................... 84
Applying filter criteria................................................................................................................................................ 85
Filter selection criteria .............................................................................................................................................. 85
Backup Range ................................................................................................................................................... 86
Modify Range..................................................................................................................................................... 86
Create Range .................................................................................................................................................... 87
Access Range.................................................................................................................................................... 87
Size Range ........................................................................................................................................................ 87
Version Range ................................................................................................................................................... 87
Wildcard Type.................................................................................................................................................... 88
Must Match ........................................................................................................................................................ 88
Cannot Match .................................................................................................................................................... 88
Required Attributes ............................................................................................................................................ 88
Exclude Attributes.............................................................................................................................................. 89
Allow Parents..................................................................................................................................................... 89
Allow Children.................................................................................................................................................... 89
Media ................................................................................................................................................................. 89
Chapter 6: Scheduling Jobs ....................................................................................................... 90
Overview........................................................................................................................................ 90
Choosing a Schedule Type............................................................................................................ 90
Non-scheduled backup jobs..................................................................................................................................... 92
Scheduled backup jobs ............................................................................................................................................ 92
Customizing Schedules ................................................................................................................. 92
Scheduling Restore Jobs............................................................................................................... 94
Scheduling Verify Jobs .................................................................................................................. 94
Backup Job Schedule Type Descriptions ...................................................................................... 94
Tips for Working with Scheduled Jobs........................................................................................... 94
Table of Contents vii
Running a failed rotation job again .......................................................................................................................... 94
Scheduling a job to run once only ............................................................................................................................ 95
Scheduling simple backup jobs................................................................................................................................ 95
Simple daily backup........................................................................................................................................... 96
Simple five-day rotation ..................................................................................................................................... 96
Chapter 7: Planning for Media Rotation .................................................................................... 98
Media Rotation Concepts .............................................................................................................. 98
A Sample Media Rotation ........................................................................................................................................ 99
Media Sets..................................................................................................................................... 99
Fixed Rotation Type Descriptions ............................................................................................................................ 99
Which Rotation Type to Select .................................................................................................... 100
Full data recovery period ................................................................................................................................. 100
Access to historical files .................................................................................................................................. 100
Minimum number of tapes or media................................................................................................................ 101
Deciding how frequently to overwrite media.................................................................................................... 101
Comparing rotation types ....................................................................................................................................... 101
Adding Media Rotation to a Backup Job...................................................................................... 103
Modifying Rotation Types ............................................................................................................ 104
Changing the tape set count............................................................................................................................ 105
Managing Backups with or Without Media Rotation .................................................................... 105
Determining the length of the full data recovery period................................................................................... 106
Incremental jobs and full data recovery........................................................................................................... 106
Chapter 8: Job Options ............................................................................................................. 107
Overview...................................................................................................................................... 107
Backup Job Options .................................................................................................................... 107
Log options ...................................................................................................................................................... 108
Span mode ...................................................................................................................................................... 110
Backup mode................................................................................................................................................... 110
Change mode .................................................................................................................................................. 110
Write mode ...................................................................................................................................................... 111
Auto Verify Mode ............................................................................................................................................. 111
Encryption/Compression ................................................................................................................................. 112
Backup options automatically updated ............................................................................................................ 113
Advanced options for backup jobs ......................................................................................................................... 113
Settings for all platforms .................................................................................................................................. 114
Settings for NetWare ....................................................................................................................................... 115
Settings for Windows ....................................................................................................................................... 116
Restore Job Options.................................................................................................................... 116
Restore files in use .......................................................................................................................................... 117
Log options ...................................................................................................................................................... 117
Advanced Options for Restore Jobs ............................................................................................ 118
All Platforms..................................................................................................................................................... 118
Settings for Windows ....................................................................................................................................... 118
Verify Job Options ....................................................................................................................... 118
Log Options ..................................................................................................................................................... 119
Verify Mode...................................................................................................................................................... 119
Advanced options for verify jobs...................................................................................................................... 120
Media Job Options....................................................................................................................... 120
Log options ...................................................................................................................................................... 120
Additional settings for media jobs .................................................................................................................... 120
viii Data Protector Express User's Guide and Technical Reference
Chapter 9: Running Jobs .......................................................................................................... 122
Overview...................................................................................................................................... 122
Job Status View........................................................................................................................... 123
Job Status details view........................................................................................................................................... 123
Running Scheduled Jobs............................................................................................................. 124
Automatically running scheduled jobs.................................................................................................................... 124
Security and scheduled jobs .................................................................................................................................. 125
Forcing scheduled jobs to run ................................................................................................................................ 126
How forcing jobs to run affects job settings ..................................................................................................... 126
How forcing jobs to run affects permissions.................................................................................................... 127
Viewing and printing scheduled job instructions .................................................................................................... 127
Running Unscheduled Jobs......................................................................................................... 128
Unscheduled job settings and permissions............................................................................................................ 128
Status property page ................................................................................................................... 128
Job status messages ............................................................................................................................................. 129
Job Logs ...................................................................................................................................... 130
Viewing job logs ..................................................................................................................................................... 131
Automatically printing job logs................................................................................................................................ 131
Emailing job logs .................................................................................................................................................... 132
Audit Logs.................................................................................................................................... 132
Chapter 10: Managing Devices and Media .............................................................................. 134
Backup Concepts ........................................................................................................................ 134
Disk-to-Disk Backups................................................................................................................... 135
Disk-to-Disk-to-Any Backups ....................................................................................................... 135
Creating a Virtual Library ............................................................................................................. 135
Moving Backups From a Virtual Library....................................................................................... 136
Devices view and Catalog view ................................................................................................... 139
Managing Devices with the Devices view.................................................................................... 141
Restarting failed devices ........................................................................................................................................ 141
Configuring physical devices ................................................................................................................................. 142
Viewing diagnostic information............................................................................................................................... 142
Restoring data from a virtual library ....................................................................................................................... 142
Devices view commands........................................................................................................................................ 142
Eject Media or Loader Magazine command.................................................................................................... 143
Rewind Media command ................................................................................................................................. 143
Retension Media command ............................................................................................................................. 143
Erase Media command.................................................................................................................................... 143
Format Media command.................................................................................................................................. 143
Import Media (into the catalog) command....................................................................................................... 144
Restore Catalog command .............................................................................................................................. 145
Clean Device command .................................................................................................................................. 146
Identify Media command ................................................................................................................................. 146
Sort Media command ...................................................................................................................................... 146
Testing a library or a device ................................................................................................................................... 146
Test results............................................................................................................................................................. 146
Element status ................................................................................................................................................. 146
Managing Media with the Jobs and Media View.................................................................................................... 147
Creating media folders .................................................................................................................................... 148
Deleting media folders ..................................................................................................................................... 148
Creating new media......................................................................................................................................... 149
Media passwords............................................................................................................................................. 150
Table of Contents ix
Deleting media................................................................................................................................................. 150
Media content .................................................................................................................................................. 151
Catalog View .......................................................................................................................................................... 151
Chapter 11: Working With Tape Libraries ............................................................................... 153
Overview...................................................................................................................................... 153
Installation Configuration and Licensing ...................................................................................... 153
Adding the Data Protector Express Drive Expansion License............................................................................... 154
How does Data Protector Express allocate licenses? ........................................................................................... 154
Viewing a Tape Library................................................................................................................ 154
Devices................................................................................................................................................................... 155
Import/Export Slots................................................................................................................................................. 155
Storage Slots.......................................................................................................................................................... 155
Barcodes and Cartridge Memory ........................................................................................................................... 156
Inventory Process .................................................................................................................................................. 156
Media Management..................................................................................................................... 157
Import Media .......................................................................................................................................................... 157
Sort Media .............................................................................................................................................................. 157
Insert Media ........................................................................................................................................................... 157
Remove Media ....................................................................................................................................................... 158
Reserving Slots ...................................................................................................................................................... 158
Backups and Rotation Types....................................................................................................... 158
Media guidelines .................................................................................................................................................... 159
A Note About Streaming ........................................................................................................................................ 159
Chapter 12: Tips, Techniques and Strategies ......................................................................... 160
Tips for Managing the Catalog..................................................................................................... 160
Where to locate the catalog ................................................................................................................................... 160
Accounting for catalog size .................................................................................................................................... 163
Backup server and machine platforms................................................................................................................... 163
Strategies for Faster Jobs............................................................................................................ 163
Organizing machines into workgroups................................................................................................................... 164
What Slows Down Tape Drives? ........................................................................................................................... 164
Maintaining the flow of data ................................................................................................................................... 164
Other factors that affect job speed ......................................................................................................................... 166
Working with Permissions............................................................................................................ 166
Checking the effective permissions of a user ........................................................................................................ 166
Using groups to handle complex security needs ................................................................................................... 167
Selecting Files for Jobs................................................................................................................ 167
Selecting files not previously backed up ................................................................................................................ 167
Selecting deleted files for restoring ........................................................................................................................ 168
Selecting versions from a specific job .................................................................................................................... 168
Selecting versions from specific media .................................................................................................................. 168
Restoring Tips ............................................................................................................................. 168
Restoring volumes for the latest date .................................................................................................................... 168
Restoring volumes for a specific date .................................................................................................................... 169
Copying a directory structure ................................................................................................................................. 170
Restoring files to a new or different folder ............................................................................................................. 170
Restoring files with new names.............................................................................................................................. 171
Other Tips.................................................................................................................................... 171
Moving data between operating systems............................................................................................................... 171
Setting up a library for automatic cleaning............................................................................................................. 172
x Data Protector Express User's Guide and Technical Reference
Chapter 13: Advanced Permissions and Security .................................................................. 174
Overview...................................................................................................................................... 174
About administrator permissions............................................................................................................................ 175
Adding New Users and Groups ................................................................................................... 176
New user or group folders...................................................................................................................................... 176
Setting up users ..................................................................................................................................................... 176
Logon Control page for users .......................................................................................................................... 176
Groups page for users ..................................................................................................................................... 178
Equivalencies................................................................................................................................................... 179
Permissions page for users ............................................................................................................................. 180
Setting up groups ................................................................................................................................................... 181
Members page................................................................................................................................................. 182
Permissions page for groups ........................................................................................................................... 182
Effective Permissions .................................................................................................................. 183
Calculating effective permissions........................................................................................................................... 183
Effective permissions algorithm ....................................................................................................................... 183
Permissions from multiple sources .................................................................................................................. 184
Examples of effective permissions......................................................................................................................... 184
Checking effective permissions.............................................................................................................................. 186
Permissions Reference................................................................................................................ 186
Read permission .................................................................................................................................................... 186
Write permission .................................................................................................................................................... 186
Delete permission .................................................................................................................................................. 187
Modify permission .................................................................................................................................................. 187
Create permission .................................................................................................................................................. 188
Access permission ................................................................................................................................................. 188
Supervisor permission............................................................................................................................................ 188
Chapter 14: Objects and Properties Reference ...................................................................... 190
Address page .............................................................................................................................. 191
Audit page ................................................................................................................................... 192
Command page ........................................................................................................................... 193
Communication page................................................................................................................... 194
Ping test........................................................................................................................................................... 194
Data Transfer test ............................................................................................................................................ 194
Status............................................................................................................................................................... 195
Configuration page ...................................................................................................................... 196
Device configuration .................................................................................................................... 196
Virtual library configuration .......................................................................................................... 197
Storage slot configuration ............................................................................................................ 198
Email settings .............................................................................................................................. 199
File system stream configuration ................................................................................................. 200
Microsoft Exchange Server configuration .................................................................................... 201
Microsoft SQL Server configuration............................................................................................. 202
Certificate services configuration page........................................................................................ 203
Connections page........................................................................................................................ 204
Control page ................................................................................................................................ 205
Device/Media page...................................................................................................................... 206
Device to be used ............................................................................................................................................ 206
Types of devices to use ................................................................................................................................... 207
Table of Contents xi
Media to be used ............................................................................................................................................. 207
Auto format information ................................................................................................................................... 207
Media options automatically updated..................................................................................................................... 208
Diagnostics page ......................................................................................................................... 209
Driver control page ...................................................................................................................... 210
Equivalencies page ..................................................................................................................... 211
Execution page............................................................................................................................ 213
General page............................................................................................................................... 215
Groups page or Members page................................................................................................... 219
Fields on the Groups page .............................................................................................................................. 219
Fields on the Members page ........................................................................................................................... 220
Logon Control page ..................................................................................................................... 221
Expiration......................................................................................................................................................... 221
Grace logons ................................................................................................................................................... 222
Password ......................................................................................................................................................... 222
Connection....................................................................................................................................................... 222
Logs page.................................................................................................................................... 224
Options page ............................................................................................................................... 226
Backup Mode................................................................................................................................................... 226
Auto Verify Mode ............................................................................................................................................. 227
Write Mode ...................................................................................................................................................... 227
Span Mode ...................................................................................................................................................... 227
Change Mode .................................................................................................................................................. 228
Encryption/Compression ................................................................................................................................. 228
Logging options ............................................................................................................................................... 230
Advanced options ............................................................................................................................................ 231
Job Group options ....................................................................................................................... 232
Modes .............................................................................................................................................................. 232
List of jobs to be executed ............................................................................................................................... 232
Log options ...................................................................................................................................................... 232
Media job options ........................................................................................................................ 233
Move Options page ..................................................................................................................... 235
Permissions page ........................................................................................................................ 236
Preferences page ........................................................................................................................ 238
Disable visual animations ................................................................................................................................ 238
Web browser.................................................................................................................................................... 238
Do not display watermark in views .................................................................................................................. 238
Single-click to open an item in views............................................................................................................... 238
Color palette .................................................................................................................................................... 239
Printer page ................................................................................................................................. 240
Query window and Selection Filters window................................................................................241
Schedule page............................................................................................................................. 244
Schedule settings ............................................................................................................................................ 244
Start Time ........................................................................................................................................................ 245
Rotation Settings ............................................................................................................................................. 245
End of Week .................................................................................................................................................... 246
End of Quarter ................................................................................................................................................. 246
Rotation Details ............................................................................................................................................... 246
View a sample rotation .................................................................................................................................... 246
Selection page............................................................................................................................. 247
File Selection Page ................................................................................................................................................ 247
xii Data Protector Express User's Guide and Technical Reference
Device or Media Selection Page ............................................................................................................................ 247
Status page ................................................................................................................................. 249
Stream Control page ................................................................................................................... 250
Storage page ............................................................................................................................... 252
Backup Stream ................................................................................................................................................ 252
Versions window.......................................................................................................................... 254
Available Versions ........................................................................................................................................... 254
Details.............................................................................................................................................................. 254
Appendix A - Using the Quick Access Application ................................................................ 256
Installing and running the Quick Access application.................................................................... 256
Viewing Data Protector Express status ....................................................................................... 256
Accessing Data Protector Express functions ............................................................................... 257
Jobs........................................................................................................................................................................ 257
Creating jobs.................................................................................................................................................... 258
Monitoring jobs ................................................................................................................................................ 258
Media...................................................................................................................................................................... 258
Alerts ...................................................................................................................................................................... 259
Logs........................................................................................................................................................................ 260
Settings .................................................................................................................................................................. 261
Login information ............................................................................................................................................. 261
Icon appearance .............................................................................................................................................. 261
Automatically start this application when the operating system starts ............................................................ 261
Automatically log in on startup......................................................................................................................... 261
Maximum number of menu items for Jobs, Alerts, or Logs submenus ........................................................... 262
Service settings ............................................................................................................................................... 262
Open Administrator ................................................................................................................................................ 262
Logout .................................................................................................................................................................... 262
Exit ......................................................................................................................................................................... 262
Appendix B - Configuring Email............................................................................................... 263
Configuring Email for the Data Protector Express management domain..................................... 263
Configuring Email for a Job ......................................................................................................... 263
Appendix C - About the Data Protector Express Service....................................................... 264
Microsoft Windows and the Data Protector Express Service ................................................................................ 264
Data Protector Express Service Controls ........................................................................................................ 264
NetWare and the Data Protector Express Agent ................................................................................................... 265
Running the Data Protector Express Agent .................................................................................................... 265
Stopping the Data Protector Express Agent.................................................................................................... 265
Linux and the Data Protector Express Daemon..................................................................................................... 265
Appendix D - Disaster Recovery .............................................................................................. 267
Disaster Recovery Concepts.................................................................................................................................. 267
Licensing ..................................................................................................................................... 268
What is OBDR? ...................................................................................................................................................... 268
Important guidelines .................................................................................................................... 268
Media...................................................................................................................................................................... 268
Replacing hardware ............................................................................................................................................... 269
Running recovery ................................................................................................................................................... 269
You should perform the disaster recovery operation on the failed computer after replacing the faulty hardware
that caused the system failure. ........................................................................................................................ 269
Table of Contents xiii
Windows only................................................................................................................................................... 269
Create the Disaster Recovery Backup......................................................................................... 270
Create full backup .................................................................................................................................................. 270
Create bootable media........................................................................................................................................... 271
From the GUI ................................................................................................................................................... 272
Troubleshooting disaster recovery backups .......................................................................................................... 272
When to create new bootable media ..................................................................................................................... 273
Testing Disaster Recovery Media................................................................................................ 273
Recovering From a Disaster ........................................................................................................ 275
Disaster recovery from CD or DVD ........................................................................................................................ 275
Disaster recovery from bootable media ................................................................................................................. 276
Recover System State (Windows only).................................................................................................................. 278
Troubleshooting recovering from a disaster........................................................................................................... 278
Using Disaster Recovery with Libraries ....................................................................................... 279
Using Disaster Recovery with Windows Active Directory ............................................................ 279
Appendix E - Troubleshooting Guide ...................................................................................... 280
Troubleshooting Backup Jobs ..................................................................................................... 280
When I run a backup job, it uses the backup device on my local machine instead of the one on the server. 280
My scheduled job is not running. ..................................................................................................................... 281
I have two tape drives, but it is only using one to run a job............................................................................. 281
How do I replace media in a rotation group?................................................................................................... 281
How can I tell when the next job will run and which media is required? ......................................................... 282
How can I determine which files were not backed up? ................................................................................... 282
Troubleshooting Restore Jobs..................................................................................................... 282
I can’t restore a backup to a different operating system. ................................................................................ 282
How can I restore data to a different file name?.............................................................................................. 282
How can I restore data to another location?.................................................................................................... 282
How can I restore all the files from a single version? ...................................................................................... 283
How can I determine which files are on particular media? .............................................................................. 283
When restoring, I get many alerts. What is wrong?......................................................................................... 283
Does Data Protector Express back up files as compressed? ......................................................................... 283
Troubleshooting Verify Jobs ........................................................................................................ 283
I occasionally get a ‘stream sync error’ when verifying media. ....................................................................... 283
Troubleshooting the Catalog........................................................................................................ 284
How do I select the location of the catalog in a network installation? ............................................................. 284
How do I create a Data Protector Express management domain? ................................................................. 284
When recovering from a backup server failure, does Data Protector Express recover all of the catalog
information? ..................................................................................................................................................... 284
Troubleshooting Error Messages................................................................................................. 284
Catalog corrupt appears during a backup or when adding a new object. ....................................................... 285
Unknown error appears when I restore files on Microsoft Windows. .............................................................. 286
Unable to create a directory appears when I restore files on Microsoft Windows. ......................................... 286
Appendix F - Navigation keys in the text user interface ........................................................ 287
Appendix G - Working with Microsoft Exchange Server........................................................ 289
Supported platforms .................................................................................................................... 289
Installing the Data Protector Express Agent for Microsoft Exchange........................................... 289
Activating the license ............................................................................................................................................. 289
Configuring a Microsoft Exchange Server ................................................................................... 290
Force Modes.................................................................................................................................................... 290
xiv Data Protector Express User's Guide and Technical Reference
About Working with Microsoft Exchange Server.......................................................................... 291
Microsoft Exchange and Windows NT ................................................................................................................... 291
Backup modes ....................................................................................................................................................... 291
Backup modes and circular logging................................................................................................................. 292
Restoring Microsoft Exchange Databases................................................................................... 292
Disaster Recovery with Microsoft Exchange Server .................................................................... 293
Appendix H - Working with Microsoft SQL Server.................................................................. 296
Overview...................................................................................................................................... 296
Supported platforms .................................................................................................................... 296
Installing the Data Protector Express Agent for Microsoft SQL Server........................................ 296
Activating the license ............................................................................................................................................. 297
Configuring the Microsoft SQL Server ......................................................................................... 297
Notes for Backup Jobs with Microsoft SQL Server ...................................................................... 298
Microsoft SQL Server Databases and the backup mode....................................................................................... 299
Backup modes ................................................................................................................................................. 299
Additional Conditions ....................................................................................................................................... 299
Using Data Protector Express with SQL Server’s Backup Routine ....................................................................... 299
Notes for Restore Jobs with Microsoft SQL Server ..................................................................... 299
Restoring Microsoft SQL Server databases and transaction logs ......................................................................... 300
Restoring Microsoft SQL Server databases with a new name .............................................................................. 300
Restoring Microsoft SQL Server 2000 and SQL Server 7 user databases .................................. 300
Restoring Microsoft SQL Server 2000 master databases............................................................ 301
Restoring Microsoft SQL Server 7 master databases.................................................................. 305
Appendix I - Working with Microsoft Data Protection Manager (DPM) ................................. 310
Overview...................................................................................................................................... 310
Installing the Data Protector Express Agent for Microsoft DPM................................................... 310
Activating the license................................................................................................................... 311
Backing up the DPM Application ................................................................................................. 311
Protecting Production Servers ..................................................................................................... 313
Restoring DPM files..................................................................................................................... 313
Using Disaster Recovery with the DPM server ............................................................................ 314
Appendix J - Protecting Microsoft Windows SharePoint Services Databases .................... 316
Overview...................................................................................................................................... 316
Installing the Data Protector Express Agent for Windows Component SQL Databases.............. 316
Protecting the Windows SharePoint Services Databases ........................................................... 317
Restoring Windows Component SQL Databases ........................................................................ 319
Using Disaster Recovery with the Windows SharePoint Services ...............................................320
Appendix K - Windows Component SQL Database Agent..................................................... 322
Overview...................................................................................................................................... 322
Installing the Data Protector Express Agent for Windows Component SQL Databases.............. 322
Protecting the Windows Component Database ........................................................................... 322
Restoring Windows Component SQL Databases ........................................................................ 324
Using Disaster Recovery with the Windows Component SQL Database Agent .......................... 325
Table of Contents xv
Appendix L - Data Protector Express Virtual Library Recovery ............................................328
Overview...................................................................................................................................... 328
Definitions.................................................................................................................................... 328
General Use ................................................................................................................................ 329
Known Limitations ....................................................................................................................... 331
Appendix M - Encryption .......................................................................................................... 332
Overview...................................................................................................................................... 332
Installation ................................................................................................................................... 333
Default encryption state ......................................................................................................................................... 333
Definitions.................................................................................................................................... 333
Cryptographic Algorithms ............................................................................................................ 333
Software ................................................................................................................................................................. 333
Hardware................................................................................................................................................................ 334
Passphrase.................................................................................................................................. 334
Passphrases and Data Protector Express catalog ................................................................................................ 334
Passphrase management ...................................................................................................................................... 334
General use ................................................................................................................................. 335
Encryption Options................................................................................................................................................. 335
Off .................................................................................................................................................................... 335
Automatic......................................................................................................................................................... 335
Software........................................................................................................................................................... 335
Hardware ......................................................................................................................................................... 335
Software Strength ............................................................................................................................................ 335
Encryption and Compression .......................................................................................................................... 336
Media Properties .................................................................................................................................................... 336
Media Import .......................................................................................................................................................... 337
Disaster Recovery ....................................................................................................................... 337
Recovering a system with an encrypted backup.................................................................................................... 337
Index ........................................................................................................................................... 338
Before You Begin
This User’s Guide and Technical Reference provides all of the information necessary to effectively implement and use all of the advanced features found in Data Protector Express. Information about installing Data Protector Express is available in the Installation Guide.
In this section
Documentation
Customer Support
Documentation
The following documentation is included with Data Protector Express to help you install and use all of Data Protector Express features and options.
NOTE: In the following sections:
<Lang> represents the language in which the document is written: eng (English), fre (French), ger (German), ita (Italian), jpn (Japanese) , spa (Spanish), kor (Korean), chs (Simplified Chinese), and cht (Traditional Chinese).
Printable documentation
The /doc directory on the Data Protector Express CD-ROM contains the following printable documentation:
Tutorial 1 – Registering and Installing Data Protector Express (Tutorial1.pdf): Contains basic
information to help you install and run Data Protector Express
Installation Guide (dpins<Lang>.pdf): Contains installation information for each supported platform.
User’s Guide and Technical Reference (dpusr<Lang>.pdf): Contains information for configuring
and using Data Protector Express.
Addendum (dpadd.pdf): Contains information on additional features (English only): This manual is
provided only when necessary.
NOTE: You can also download these documents from the Data Protector Express website www.hp.com/go/dataprotectorexpress.
If you require printed copies of these manuals, you can print the PDF files. They were designed to be printed two-sided and new chapters always begin on an odd-numbered page.
xvi
Before You Begin xvii
To view or print this documentation, Adobe Acrobat Reader (version 4.0 or higher) must be installed on your Windows or X Window (Linux) computer. If not currently installed, you can install it from the Adobe Acrobat Reader website at www.adobe.com/.
NOTE: Adobe Acrobat Reader does not offer versions for NetWare systems. Therefore, you can only view or print the Data Protector Express documentation on Windows or X Window (Linux) systems.
To print the documentation, open the appropriate file into Adobe Acrobat Reader. Choose Print Setup… from the File menu and set the proper options for your printer. Then choose Print… from the File menu and print the document.
Release notes
Release notes are included with every service pack. Before using Data Protector Express, please read and print the release notes for additional information. The release notes are available in both HTML (readme.htm) and text (readme.txt) formats in the root directory of the Data Protector Express CD­ROM.
Online Help
Windows
To view online help while using Data Protector Express, select Contents from the Help menu. The online help is displayed in a pop-up window.
For task-related or context-sensitive help while using Data Protector Express, select a topic in the Dynamic Help list.
Non-Windows
You can view online help from most Data Protector Express screens by pressing F1.
Screen Shots
The screen shots in this manual may not be identical to the interface you see when you use Data Protector Express. Any differences will be small and will not prevent you from using this documentation. Note that because of the customizable nature of the Data Protector Express graphical user interface that the components of the GUI may be in different locations and colors in the documentation compared to the product in use.
Features
If you have a Proliant Edition or Single Server Edition of Data Protector Express software, not all of the features described in this document will be available to you. This document describes all the features in Data Protector Express. Both Data Protector Express Single Server Edition and Data Protector Express Proliant Edition can be upgraded to Data Protector Express with the appropriate license key. Please contact your HP partner to purchase this upgrade.
Customer Support
Customers under a support contract may receive their support by phone or by submitting an email.
Country specific details on both options can be found at welcome.hp.com/country/us/en/wwcontact.html.
xviii Data Protector Express User's Guide and Technical Reference
If you require support and your support contract has expired, please contact your HP Partner or sales representative for information on obtaining a new HP Data Protector Express support contract
Chapter 1: About Data Protector Express
A backup and recovery system is an integral part of a company's data security. The ability to back up and restore business-critical data quickly and efficiently can mean the difference between survival and failure. Maintaining backups is often considered a tedious task, and many companies fail to protect their corporate data at all. Data Protector Express provides users with the capacity to back up and restore data across a network and the ability to administer a comprehensive backup plan. This section describes basic concepts of a backup and recovery system and presents how Data Protector Express provides a powerful, yet cost-effective and easy-to-use, management tool for protecting data on network file or application servers and PC desktops.
In this section
Backup basics
Backup environment
Backup basics
Whether your work environment consists of a single computer in a home or small office, several computers connected to a network server, or hundreds of computers connected to multiple network servers, a typical data protection plan involves at least the ability to back up and restore business files.
At a minimum, data that cannot be reloaded onto the system from installation disks, network-based security settings, company-generated databases should all be backed up for easy retrieval in the event of a data disaster. The important data might be a word processing file, e-commerce transactions, network user account and password information, and so on.
The data you protect and how long it remains available on storage media might depend on legal requirements for your industry or your own company policies. Whatever your data storage requirements might be, you should have a basic understanding of the types of backup operations and your own computer environment.
Typical backup and recovery operations
Backup: A backup is the process of copying a file or folder from its current location to a new location,
typically media loaded in a backup device. The original data remains intact in its current location. During the backup process, an attribute associated with each file, known as an archive attribute, is altered within the Data Protector Express Selection tree to indicate that the file was backed up. Archive attributes may function differently on different operating systems, so the Data Protector Express catalog also tracks file changes.
Data Protector Express runs backups in one of four backup modes:
1
2 Data Protector Express User's Guide and Technical Reference
Full: In full backup mode, the backup job copies all selected files in the job whether or not they have
changed. During a full backup, the archive attribute and Data Protector Express catalog record for each selected file is updated to indicate that it has been backed up during a full backup.
Differential: In differential mode, the backup job copies only those selected files that have changed
since the last full backup. The Data Protector Express catalog record for these files is updated but the archive attribute is not reset by this backup.
Incremental: In incremental mode, the backup job copies all selected files that have changed since the
last backup regardless of backup mode. The Data Protector Express catalog record and archive attribute for these files is updated to reflect this backup.
Copy: In copy mode, the backup job backs up all selected files, but has no effect on any future
scheduled backups. The archive attribute is not changed during this backup.
Restore: A restore is the process of copying data from backup media to its original location or to a new location in the event that the original location is damaged or unavailable. Restore operations can also retrieve data to a file or folder other than the original one.
Disaster recovery: Often defined as the ability to recover information systems quickly, disaster recovery is the process of automatically partitioning and formatting the hard drive, and restoring operating system data that allows a computer or network to restart normally. Disaster recovery and general restore operations can be combined to quickly restore both the operating system and business-critical data.
Backup environment
A complete network backup system consists of three parts: backup devices, a catalog, and a backup management program.
Backup devices
Data Protector Express works with your existing computer network. A network connects file or application servers and PC desktops together in order to allow various users to work together on projects and with common files. Networks also allow users to share peripheral devices, such as disk drives, printers, fax machines, and modems. Sharing devices across a network makes economic sense, since several systems can use a single device. Backup devices, such as tape drives, hard disks, NAS appliances, and CD or DVD recordable devices, which back up or copy files onto tape, disk, or other media, may also be shared. For more information about using backup devices in network environments, see Strategies for Faster Jobs on page 163.
Sharing a backup device makes operational as well as economic sense. Sharing devices lowers costs and makes it possible to centralize backup operations across the network. Further, a single user, such as the network administrator, can have primary responsibility for backing up all the file or application servers and PC desktops on the network.
Sharing a backup device or tape drive across a network also poses problems.
Security: Most networks have elaborate security systems that prevent access by unauthorized users to
sensitive or confidential data. However, unless you take protective measures, once these files are backed up onto tape or other media, any user in physical possession of the media can gain access to these files. Data Protector Express offers the ability to encrypt the information written to media. Data Protector Express uses a strong key to encrypt the data on the media, which provides an excellent protection of media outside the storage management domain. Although it is possible to physically
Chapter 1: About Data Protector Express
store the media in a secure location, a complete network backup system will help prevent unauthorized users from accessing confidential or classified information.
Tracking backed up files: While a single user may be able to find a file copied onto a CD or floppy
disk by manually searching through a stack of disks, this approach is unworkable for large networks. Without the appropriate software, locating a given occurrence of a file may be impossible, since there may be hundreds of thousands of files backed up on hundreds of media created over weeks or months.
Storage management catalog
To solve the problems of security and tracking files, Data Protector Express creates and manages a storage management catalog commonly referred to as the Data Protector Express catalog. The Data Protector Express catalog keeps track of used and available backup media and each file that is stored on that media. For each media, the catalog contains detailed information about the media, such as when it was created and who created it and about the files on the media, such as when they were backed up and on which media files are stored. For more information, see Tips for Managing the Catalog on page 160.
The Data Protector Express catalog also addresses issues surrounding security. Included in the catalog is information about which users can use or view which files. The catalog prevents unauthorized users from accessing files for which they have insufficient security rights. It tracks each user and ensures that only approved users have access to backup devices and files stored on the backup media. The following illustration shows the Security view of the Data Protector Express catalog.
4 Data Protector Express User's Guide and Technical Reference
Backup management program
Writing files to the backup media and managing the catalog requires an application program, such as Data Protector Express. Two of the most important functions of Data Protector Express are managing the catalog and creating and running jobs. Data Protector Express manages the catalog to keep track of files and to ensure security. Data Protector Express also creates and runs jobs, such as backup and restore jobs, which transfer files back and forth between backup devices (such as tape drives) and file or application servers or PC desktops.
Managing the Storage Management Catalog
Much of the power and usefulness of Data Protector Express comes from its extensive capabilities to manage the storage management catalog. There are three important concepts associated with the catalog: objects, properties and Data Protector Express management domains.
Objects
The catalog collects and organizes information about objects. An object is any file, machine, device, backup media or user about which Data Protector Express needs to store data. Examples of objects which Data Protector Express tracks in its catalog include backup media, tape drives, network servers, versions of files, backup jobs, custom templates, users, and so on.
Some objects can contain other objects within them. A simple example is a folder. It contains other objects within it, such as jobs, files, templates, user information, and so on. Data Protector Express also displays information about the contents of objects other than folders. When you view a list of the contents of the Data Protector Express management domain, you might see machines, networks, devices, libraries, and so on. Although not folders, these objects can contain other objects in them. For example, a library can contain storage slots, import/export slots, and so on. A network might contain file systems, network drives, printers, and attached backup devices.
Properties
The information about each object that Data Protector Express stores in its catalog are called properties. The properties of each object include important information about that object, such as what kind of object it is, who has security permissions to use it and its relationship to other objects. For more information on property pages, see Chapter 13 – Objects and Properties Reference on page 190.
For example, an individual backup media is an object in the Data Protector Express catalog. Some of the properties of that media stored in the catalog include its name, when it was created, who has security permissions to use the media and whether or not it can be erased.
Working with Data Protector Express objects and properties is easy. If you know how to use Windows Explorer, you already know most of what you need to use Data Protector Express.
Data Protector Express management domains
Data Protector Express may be licensed to support several catalogs. On a large network, it may be useful to have multiple catalogs, each addressing different data protection needs. For example, there may be a separate catalog for each work group or department, even though they are all on the same network.
If your network has several Data Protector Express catalogs, then you choose which catalog you wish to use by selecting a Data Protector Express management domain when you log on to Data Protector
Chapter 1: About Data Protector Express
Express. Choosing a Data Protector Express management domain is simply a way to select which catalog you wish to use.
Each Data Protector Express management domain is overseen by a Data Protector Express administrator. It is the Data Protector Express administrator’s job to manage the security and integrity of the files in his or her Data Protector Express management domain.
You can switch to a different domain each time you log on to Data Protector Express. You can also set up domains from the Data Protector Express Login screen.
In the Host Name field, enter the hostname or IP address of the machine on which the Data Protector Express management master server is located, then select OK.
NOTE: When you edit a domain, you cannot edit the master server name.
Data Protector Express management domains and security
Data Protector Express management domains also help ensure network security. Data Protector Express uses Data Protector Express management domains to promote security in two ways: first, by preventing users from working with more than one Data Protector Express management domain at a time and, second, by allowing file or application servers and PC desktops to be the member of only one Data Protector Express management domain. For more information, see Chapter 12 – Advanced Permissions and Security on page 174.
Note the following about machines, users, and Data Protector Express management domains:
File or application servers and PC desktops can only be the member of one—and only one—Data
Protector Express management domain. Because these machines belong to only one catalog, their peripherals, such as disk drives and backup devices, can belong to only one catalog.
Backup media created in one Data Protector Express management domain cannot be used in another
Data Protector Express management domain without following special procedures (e.g., importing media created on one Data Protector Express management domain into the Data Protector Express catalog of another Data Protector Express management domain). This ensures that there is no improper access to secure files and data.
Each Data Protector Express management domain must have at least one backup device , such as a
virtual library, tape library or CD device. This backup device can belong to only one Data Protector Express management domain; it cannot be shared among multiple storage domains. However, a Data Protector Express management domain could have multiple backup devices.
From one PC desktop, users can work in other Data Protector Express management domains besides
the storage domain to which their PC desktop belongs. This means they can administer jobs remotely for other Data Protector Express management domains besides the storage domain to which their PC desktop belongs. They cannot, however, work in more than one Data Protector Express management domain at the same time.
Users can work from other machines with other Data Protector Express management domains besides
the one to which their machine belongs. Their machine, along with its drives, peripherals and accompanying data, however, always remain in a single Data Protector Express management domain. That is, the data on their machine is always backed up and restored within a single Data Protector Express management domain. This helps to prevent the unauthorized sharing of data between Data Protector Express management domains that would occur if someone in a different storage domain were able to restore your data to their machine. Thus while users can work outside of their storage domain, the PC desktops and file or application servers they use always remain a part of the Data
6 Data Protector Express User's Guide and Technical Reference
Protector Express management domain that was selected when Data Protector Express was installed on the machine.
Creating and running jobs
Data Protector Express creates backup media and restores files with jobs. Working with backup devices and a network, Data Protector Express jobs either back up network file or application servers and PC desktops onto physical or virtual media or restore files from media onto file or application servers or PC desktops. When you want Data Protector Express to back up or restore a file, you create and run a job.
There are several kinds of jobs: backup, restore, verify, media, and disaster recovery. Every kind of job you create and run has six components: creating the job, permissions, selection, options, scheduling and running. Setting up media rotation is an additional feature that you may include in your backup jobs.
Creating the job: You begin by creating a job, either a backup, restore, verify, media, and disaster recovery job. Refer to Chapter 3 – Creating Jobs with Data Protector Express on page 29 for more information.
Permissions: In order to create a job, you must have permissions to the objects that job will work with. For example, to create a backup job, you must have permissions to the tape drive, the tape, and the files you will back up. If you wish to back up files on another PC desktop, you must have permissions to that PC desktop and to the files on that PC desktop. Individual users are assigned permissions by the Data Protector Express administrator, who is responsible for ensuring the security and integrity of the backup system. Refer to Chapter 4 - Permissions on page 41 for more information.
Selection: Once you have permissions to a file, you must select it to be included in your job. You might select all files, only a few files, or perhaps only a single file. You select files first by selecting them in the selection window and second by having Data Protector Express ‘sort’ them with filters, which apply additional selection criteria, such as date modified, type of file, and so on. Refer to Chapter 5 – Selecting Files and File Versions on page 53 for more information.
Options: After scheduling the job, you specify the job’s option settings. Some of the options you can specify include what backup device to use, what media to use, whether to automatically format the media, and so on. Refer to Chapter 8 – Job Options on page 107 for more information.
Scheduling: After selecting files, the job is scheduled to be run. A job may be scheduled to run later or to run immediately. It can be scheduled to run regularly or only once. Refer to Chapter 6 – Scheduling Jobs on page 90 and Chapter 7 – Planning for Media Rotation on page 98 for more information.
Media rotation: After selecting a schedule for a job, you must decide how to manage your media. Data Protector Express can manage your media automatically with default media rotation plans, or you can manage your media manually. Refer to Chapter 7 – Planning for Media Rotation on page 98 for more information.
Running the job: Finally, the job is run. Many scheduled jobs are run automatically by Data Protector Express, but you can manually run a job at any time. Refer to Chapter 9 – Running Jobs on page 122 for more information.
NOTE: When you recover the storage management catalog, jobs are placed on hold. To restart the jobs, select the jobs and select Continue from the command list.
Chapter 2: Data Protector Express Workplace
Data Protector Express is designed to be easy to use. This section will familiarize you with most Data Protector Express features, including keyboard shortcuts and mouse conventions.
NOTE: This manual documents the graphical user interface available on Windows and Linux systems running X Window. The console interface operates similarly on Windows, NetWare, and Linux systems.
In this section
Starting Data Protector Express
Starting Data Protector Express
Main Data Protector Express Window
Customizing the main Data Protector Express window
Working with Objects in the Main Data Protector Express Window
Starting Data Protector Express
After you have installed Data Protector Express, you start it like any other program.
Windows
To start Data Protector Express in Windows, double-click the Data Protector Express shortcut on the desktop.
You can also click the Start button and select Hewlett-Packard Company from the Programs (or All Programs) submenu. Then select Data Protector Express.
NetWare
To start Data Protector Express on a NetWare machine, access the server console. Then type dpAdmin. It is not necessary to specify a search path. For example, you can launch Data Protector Express on a NetWare computer by typing the following at a console prompt:
:
SERVER: dpAdmin
Linux
To start Data Protector Express on a Linux machine, open a terminal window. Then access the directory where you installed Data Protector Express. Type ./ dpadmin. For example:
7
8 Data Protector Express User's Guide and Technical Reference
[/usr/local/hp/dpx]# ./ dpadmin
To launch the CUI, type ./ dpadmin -c. For example:
[/usr/local/hp/dpx]# ./ dpadmin -c
Linux (X Window)
To start Data Protector Express on a Linux machine running X Window, open a terminal window. Then access the directory where you installed Data Protector Express. Type ./ dpadmin. For example:
[/usr/local/hp/dpx]# ./ dpadmin
On Linux systems, you can create a shortcut on your KDE or GNOME desktop. (See the Data Protector Express Installation Guide for more information.)
NOTE: If you are running Red Hat Enterprise Linux 4, you may see an error message (such as “libstdc++.so.5 could not be found”) when you start Data Protector Express. This is because the C++ library version that the application was built with is not present on these systems, and the latest version “libstdc++.so.6” is not backwards compatible. If you are using Red Hat Enterprise Linux 4, you can use an RPM package called "compat-libstdc++.rpm" to install the necessary library. This can also be achieved by installing the “Developer’s Tools” package from the Red Hat Enterprise Linux 4 installation CDs.
Logon Window
Each time you start Data Protector Express, you are shown the Data Protector Express Logon window.
To log on, you must select a Data Protector Express management domain and enter your user name and your password.
Logging on the first time
CAUTION: Data Protector Express administrators have unlimited access to all of the objects in the storage
management catalog. Any user who logs on as the Data Protector Express administrator will have complete access to all of the files and machines contained in the Data Protector Express management domain.
The default user name for the Data Protector Express administrator is Admin. There is no default password required for this user to log on.
Chapter 2: Creating Jobs with Data Protector Express 9
Your first security step should be to change the Data Protector Express administrator’s password. Refer to Changing your password on page 10 for instructions on changing your password.
Grace logons
Your Data Protector Express administrator may have set up your password to expire after a set period of time. For example, your password may expire after 60 days. This forces you to change your password regularly.
If your password has expired, Data Protector Express will prompt you to change your password. If you choose not to change your password, Data Protector Express may still let you log on, even with an expired password. Logging on with an expired password is called a grace logon. Your Data Protector Express administrator will determine how many grace logons you are allowed.
When your password has expired and you have used all of your grace logons, Data Protector Express will ask you to change your password when you log on.
Selecting a Data Protector Express management domain
When your Data Protector Express administrator set up Data Protector Express to run on your network, your PC desktop was assigned to a Data Protector Express management domain. Your PC desktop, along with its drives and peripherals, can only be a member of one Data Protector Express management
domain. The name of this storage domain is the default name that appears in the Domain list on the Logon window.
Normally, you should leave the default name in the list unchanged. This is because you will typically want to work with the Data Protector Express management domain to which your PC desktop belongs.
Occasionally, however, you may wish to work in a different storage domain. You might be asked by a co­worker or your Data Protector Express administrator, for example, to run a Data Protector Express job in a different Data Protector Express management domain.
To select a different Data Protector Express management domain
1. Use the drop-down menu to choose a Data Protector Express management domain from the Domain name list. (A list of possible Data Protector Express management domains will appear.)
2. Select the Data Protector Express management domain you wish to use and click OK.
NOTE: Although you can log on to different Data Protector Express management domains, you can only create and run jobs within a single Data Protector Express management domain. Further, you can only access files and devices in a single Data Protector Express management domain. This means, for example,
10 Data Protector Express User's Guide and Technical Reference
that you will be unable to restore files backed up from PC desktops in one Data Protector Express management domain to PC desktops in another Data Protector Express management domain. (If you need to share data from one Data Protector Express management domain to a different Data Protector Express management domain, see Import Media on page 144.)
User name and password
After selecting a Data Protector Express management domain, type in your User name and Password.
If you type your name or password incorrectly, you will be asked to re-enter your user name and password.
In order to log on, your Data Protector Express administrator must first assign you a user name and a password. If you are having difficulty logging on, ask your system administrator to specify again the exact spelling of the user name and password assigned to you.
NOTE: Passwords are case-sensitive; that is, the password USER1 is not the same as the password user1.
Changing your password
It is a good idea to regularly change your password, particularly if you are working with sensitive and important data.
To change your password
1. Open the Administration desk bar.
2. Select Security, and then click your User icon.
3. Open the User Password screen by either
Selecting Change Password… from the Commands task pane
Right-clicking the user and selecting Change Password… from the shortcut menu.
1. Type in your old password and then your new password.
2. Confirm your new password and then click OK.
When selecting a password, remember that some passwords are notoriously easy to break. For example, because many people use their birth date or the name of their spouse, these are not good choices for passwords.
Chapter 2: Creating Jobs with Data Protector Express 11
TIP: The Data Protector Express administrator can change a user’s password without knowing the user’s
current password. Data Protector Express does not even ask you to enter the old password. This is useful when the user has forgotten his or her password.
Logging out
On occasions you may want to change the Data Protector Express management domain you are using or want to log on as a different user. Although you could quit Data Protector Express and restart the program, it is quicker and faster to log on again without quitting Data Protector Express.
To log on again, choose Logout from the File menu. You will be presented with the Data Protector Express Logon window and asked to log on again.
Logging out and running scheduled jobs
Data Protector Express can run scheduled jobs even when no one is logged on. (Only scheduled jobs can be performed when no one is logged on to Data Protector Express.) For more information, see Running Scheduled Jobs on page 124.
When you leave your PC desktop, you may need to leave Data Protector Express open. In order to prevent unauthorized access to the network, log out of Data Protector Express before leaving your PC desktop. Any scheduled jobs will still run, but no unauthorized users will be able to work with Data Protector Express unless they can log on. (This requires that the Data Protector Express Service be installed and running).
NOTE: If the Data Protector Express service is installed and running, you can close Data Protector Express and your scheduled jobs will still run (see Appendix C - About the Data Protector Express Service on page 264 for more information).
12 Data Protector Express User's Guide and Technical Reference
Main Data Protector Express Window
You use the main Data Protector Express window to view, create and manipulate Data Protector Express objects, such as jobs and tapes.
In addition to the menu bar, the Data Protector Express window has the following parts: menu bar, desk bar, toolbar, task and information panes, the object detail area and the status bar.
Menu bar
Located at the top of the screen, the menu bar contains several menus that group together similar commands.
To invoke a command from a menu, open the menu and then select a command. The available menus are File, Edit, View, Window, and Help. For example, to locate and update your Data Protector Express license, select Licenses from the Help menu.
You will find the menus easy to use and intuitive. Most of the menu commands are discussed in detail later in this manual. Commands on these menus are often related to the current active object in the object
Loading...
+ 335 hidden pages