Hewlett-Packard Company makes no warranty of any kind with regard to this material, including, but not limited to, the implied warranties of
merchantability and fitness for a particular purpose. Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential
damages in connection with the furnishing, performance, or use of this material.
This document contains proprietary information, which is protected by copyright. No part of this document may be photocopied, reproduced, or translated to
another language without the prior written consent of Hewlett-Packard. The information contained in this document is subject to change without notice.
Windows®, Windows NT® and MS-DOS® are registered trademarks of Microsoft Corporation. NetWare® is a registered trademark of Novell, Inc. Btrieve
is a registered trademark of Pervasive Software Inc. Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red Hat, Inc.
Mandrake® is a registered trademark of MandrakeSoft S.A. SuSE® is a registered trademark of SuSE Linux. Debian® is a registered trademark of Software
in the Public Interest, Inc. Slackware® is a registered trademark of Slackware Linux, Inc. SCO® is a registered trademark of Caldera International, Inc.
UNIX® is a registered trademark of The Open Group. Solaris™ is a trademark of Sun Microsystems, Inc. SPARC® is a registered trademark of SPARC
International, Inc. Products bearing SPARC trademarks are based on an architecture developed by Sun Microsystems, Inc. FreeBSD® is a registered
trademark of FreeBSD Inc. and Walnut Creek CDROM. Netscape® is a registered trademark of Netscape Communications Corporation. Java™ is a
trademark of Sun Microsystems, Inc. Adobe®, Acrobat® and Acrobat® Reader® are registered trademarks of Adobe Systems Incorporated. WinZip® is a
registered trademark of WinZip Computing, Inc. Pentium® and Celeron® are registered trademarks of Intel Corporation. AMD-K6®, AMD Athlon™ and
AMD Duron™ are trademarks or registered trademarks of Advanced Micro Devices, Inc.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information is provided ”as is” without
warranty of any kind and is subject to change without notice. The warranties for Hewlett-Packard Company products are set forth in the express limited
warranty statements for such products. Nothing herein should be construed as constituting an additional warranty.
www.hp.com
Trademarks
Windows® and Windows NT® are registered trademarks of Microsoft Corporation.
NetWare® is a registered trademark of Novell, Inc.
Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red Hat, Inc. SuSE® is a registered trademark of SuSE Linux
Products GmbH, a Novell business.
Trademarks
Windows® and Windows NT® are registered trademarks of Microsoft Corporation.
NetWare® is a registered trademark of Novell, Inc.
Linux® is a registered trademark of Linus Torvalds. Red Hat® is a registered trademark of Red Hat, Inc. SuSE® is a registered trademark of SuSE Linux
Products GmbH, a Novell business
Table of Contents
Before You Begin ....................................................................................................................... xvi
Windows ........................................................................................................................................................... xvii
Non-Windows ................................................................................................................................................... xvii
Screen Shots........................................................................................................................................................... xvii
Features ..................................................................................................................................................................xvii
Customer Support ........................................................................................................................ xvii
Chapter 1: About Data Protector Express ................................................................................... 1
Backup management program ............................................................................................................................ 4
Managing the Storage Management Catalog ............................................................................................................ 4
Data Protector Express management domains................................................................................................... 4
Data Protector Express management domains and security .............................................................................. 5
Creating and running jobs ................................................................................................................................... 6
Chapter 2: Data Protector Express Workplace ........................................................................... 7
Starting Data Protector Express ...................................................................................................... 7
Logging on the first time............................................................................................................................................. 8
Selecting a Data Protector Express management domain ........................................................................................ 9
User name and password ........................................................................................................................................ 10
Changing your password ......................................................................................................................................... 10
Logging out .............................................................................................................................................................. 11
Logging out and running scheduled jobs........................................................................................................... 11
Main Data Protector Express Window ........................................................................................... 12
Menu bar............................................................................................................................................................ 12
Desk bar ............................................................................................................................................................ 13
Task and information panes .............................................................................................................................. 15
Detail viewing area ............................................................................................................................................ 15
Status bar .......................................................................................................................................................... 16
Customizing the main Data Protector Express window ................................................................. 17
Creating a custom desk bar ..................................................................................................................................... 17
Changing the icon associated with an object........................................................................................................... 17
Adding custom descriptions to objects..................................................................................................................... 18
Types of reports ....................................................................................................................................................... 22
Working with Data Protector Express wizards ............................................................................... 24
Available wizards ..................................................................................................................................................... 25
Media job wizards .............................................................................................................................................. 26
Restore jobs ............................................................................................................................................................. 30
Media jobs ................................................................................................................................................................ 30
Jobs and Media view and the Job Status view .............................................................................. 31
Creating New Jobs ........................................................................................................................ 32
Creating jobs with wizards ....................................................................................................................................... 32
Creating new jobs from the Jobs and Media view ................................................................................................... 33
Creating new jobs by copying .................................................................................................................................. 35
Renaming, deleting, copying and moving jobs .............................................................................. 35
Creating job groups ....................................................................................................................... 36
Organizing jobs with folders........................................................................................................... 36
Types of folders........................................................................................................................................................ 37
Folders and job views .............................................................................................................................................. 37
Home, Admin, and Everyone folders ....................................................................................................................... 37
Everyone folder and permissions ...................................................................................................................... 38
Users and Groups ......................................................................................................................... 41
Everyone group ........................................................................................................................................................ 42
Delete, Read and Write............................................................................................................................................ 48
Examples of Permissions .............................................................................................................. 48
Granting Permissions to Other Data Protector Express Users ...................................................... 50
Restricting user permissions .................................................................................................................................... 51
Chapter 5: Selecting Files and File Versions ............................................................................ 53
Marking files for backup ........................................................................................................................................... 54
Selecting folders or selecting files ..................................................................................................................... 54
Selecting files with filters .......................................................................................................................................... 56
How selection filters work .................................................................................................................................. 56
Filters and shaded folders ................................................................................................................................. 56
Automatically selecting new files for backup............................................................................................................ 57
Working with mapped drives .................................................................................................................................... 58
Working with VSS snapshots ................................................................................................................................... 59
Selecting Files for Backup Jobs..................................................................................................... 60
Backup Range ................................................................................................................................................... 62
Create Range .................................................................................................................................................... 62
Size Range ........................................................................................................................................................ 63
Version Range ................................................................................................................................................... 63
Must Match ........................................................................................................................................................ 64
Cannot Match .................................................................................................................................................... 64
Media ................................................................................................................................................................. 65
Selecting files for restoring....................................................................................................................................... 66
Selecting versions of files .................................................................................................................................. 68
Selecting versions of folders.............................................................................................................................. 69
Selecting folders compared to selecting files .................................................................................................... 71
Versions and filters ............................................................................................................................................ 71
Selecting files with filters .......................................................................................................................................... 71
How selection filters work .................................................................................................................................. 71
Changing the name and location of restored files ................................................................................................... 71
Selecting Versions of Files for Restore Jobs ................................................................................. 72
vi Data Protector ExpressUser's Guide and Technical Reference
Backup Range ................................................................................................................................................... 73
Create Range .................................................................................................................................................... 74
Size Range ........................................................................................................................................................ 75
Version Range ................................................................................................................................................... 75
Must Match ........................................................................................................................................................ 76
Cannot Match .................................................................................................................................................... 76
Media ................................................................................................................................................................. 77
Restoring Files with New Names and Locations............................................................................ 78
Restoring a file with a new name ............................................................................................................................. 78
Restoring files to a different folder ........................................................................................................................... 78
Restoring files to a new folder.................................................................................................................................. 79
Selecting files for verifying ....................................................................................................................................... 80
Selecting versions of files .................................................................................................................................. 82
Selecting folders compared to selecting files .................................................................................................... 83
Selecting files with filters .......................................................................................................................................... 84
How selection filters work .................................................................................................................................. 84
Selecting Versions of Files for Verify Jobs..................................................................................... 84
Backup Range ................................................................................................................................................... 86
Create Range .................................................................................................................................................... 87
Size Range ........................................................................................................................................................ 87
Version Range ................................................................................................................................................... 87
Must Match ........................................................................................................................................................ 88
Cannot Match .................................................................................................................................................... 88
Media ................................................................................................................................................................. 89
Chapter 6: Scheduling Jobs ....................................................................................................... 90
Scheduled backup jobs ............................................................................................................................................ 92
Scheduling Verify Jobs .................................................................................................................. 94
Backup Job Schedule Type Descriptions ...................................................................................... 94
Tips for Working with Scheduled Jobs........................................................................................... 94
Table of Contents vii
Running a failed rotation job again .......................................................................................................................... 94
Scheduling a job to run once only ............................................................................................................................ 95
Chapter 7: Planning for Media Rotation .................................................................................... 98
Media Rotation Concepts .............................................................................................................. 98
A Sample Media Rotation ........................................................................................................................................ 99
Media Sets..................................................................................................................................... 99
Fixed Rotation Type Descriptions ............................................................................................................................ 99
Which Rotation Type to Select .................................................................................................... 100
Full data recovery period ................................................................................................................................. 100
Access to historical files .................................................................................................................................. 100
Minimum number of tapes or media................................................................................................................ 101
Deciding how frequently to overwrite media.................................................................................................... 101
Changing the tape set count............................................................................................................................ 105
Managing Backups with or Without Media Rotation .................................................................... 105
Determining the length of the full data recovery period................................................................................... 106
Incremental jobs and full data recovery........................................................................................................... 106
Auto Verify Mode ............................................................................................................................................. 111
Advanced options for backup jobs ......................................................................................................................... 113
Settings for all platforms .................................................................................................................................. 114
Settings for NetWare ....................................................................................................................................... 115
Settings for Windows ....................................................................................................................................... 116
Restore files in use .......................................................................................................................................... 117
Advanced Options for Restore Jobs ............................................................................................ 118
All Platforms..................................................................................................................................................... 118
Settings for Windows ....................................................................................................................................... 118
Additional settings for media jobs .................................................................................................................... 120
viii Data Protector ExpressUser's Guide and Technical Reference
Chapter 9: Running Jobs .......................................................................................................... 122
Job Status View........................................................................................................................... 123
Job Status details view........................................................................................................................................... 123
Security and scheduled jobs .................................................................................................................................. 125
Forcing scheduled jobs to run ................................................................................................................................ 126
How forcing jobs to run affects job settings ..................................................................................................... 126
How forcing jobs to run affects permissions.................................................................................................... 127
Viewing and printing scheduled job instructions .................................................................................................... 127
Unscheduled job settings and permissions............................................................................................................ 128
Status property page ................................................................................................................... 128
Job status messages ............................................................................................................................................. 129
Restoring data from a virtual library ....................................................................................................................... 142
Eject Media or Loader Magazine command.................................................................................................... 143
Rewind Media command ................................................................................................................................. 143
Retension Media command ............................................................................................................................. 143
Erase Media command.................................................................................................................................... 143
Format Media command.................................................................................................................................. 143
Import Media (into the catalog) command....................................................................................................... 144
Identify Media command ................................................................................................................................. 146
Sort Media command ...................................................................................................................................... 146
Testing a library or a device ................................................................................................................................... 146
Test results............................................................................................................................................................. 146
Element status ................................................................................................................................................. 146
Managing Media with the Jobs and Media View.................................................................................................... 147
Creating media folders .................................................................................................................................... 148
Deleting media folders ..................................................................................................................................... 148
Creating new media......................................................................................................................................... 149
Media passwords............................................................................................................................................. 150
Media content .................................................................................................................................................. 151
Barcodes and Cartridge Memory ........................................................................................................................... 156
Inventory Process .................................................................................................................................................. 156
Media Management..................................................................................................................... 157
Import Media .......................................................................................................................................................... 157
Sort Media .............................................................................................................................................................. 157
Insert Media ........................................................................................................................................................... 157
Remove Media ....................................................................................................................................................... 158
Backups and Rotation Types....................................................................................................... 158
Media guidelines .................................................................................................................................................... 159
A Note About Streaming ........................................................................................................................................ 159
Chapter 12: Tips, Techniques and Strategies ......................................................................... 160
Tips for Managing the Catalog..................................................................................................... 160
Where to locate the catalog ................................................................................................................................... 160
Accounting for catalog size .................................................................................................................................... 163
Backup server and machine platforms................................................................................................................... 163
Strategies for Faster Jobs............................................................................................................ 163
Organizing machines into workgroups................................................................................................................... 164
What Slows Down Tape Drives? ........................................................................................................................... 164
Maintaining the flow of data ................................................................................................................................... 164
Other factors that affect job speed ......................................................................................................................... 166
Working with Permissions............................................................................................................ 166
Checking the effective permissions of a user ........................................................................................................ 166
Using groups to handle complex security needs ................................................................................................... 167
Selecting Files for Jobs................................................................................................................ 167
Selecting files not previously backed up ................................................................................................................ 167
Selecting deleted files for restoring ........................................................................................................................ 168
Selecting versions from a specific job .................................................................................................................... 168
Selecting versions from specific media .................................................................................................................. 168
Restoring volumes for the latest date .................................................................................................................... 168
Restoring volumes for a specific date .................................................................................................................... 169
Copying a directory structure ................................................................................................................................. 170
Restoring files to a new or different folder ............................................................................................................. 170
Restoring files with new names.............................................................................................................................. 171
Other Tips.................................................................................................................................... 171
Moving data between operating systems............................................................................................................... 171
Setting up a library for automatic cleaning............................................................................................................. 172
x Data Protector ExpressUser's Guide and Technical Reference
Chapter 13: Advanced Permissions and Security .................................................................. 174
About administrator permissions............................................................................................................................ 175
Adding New Users and Groups ................................................................................................... 176
New user or group folders...................................................................................................................................... 176
Setting up users ..................................................................................................................................................... 176
Logon Control page for users .......................................................................................................................... 176
Groups page for users ..................................................................................................................................... 178
Permissions page for users ............................................................................................................................. 180
Setting up groups ................................................................................................................................................... 181
Members page................................................................................................................................................. 182
Permissions page for groups ........................................................................................................................... 182
Permissions from multiple sources .................................................................................................................. 184
Examples of effective permissions......................................................................................................................... 184
Data Transfer test ............................................................................................................................................ 194
Device to be used ............................................................................................................................................ 206
Types of devices to use ................................................................................................................................... 207
Table of Contents xi
Media to be used ............................................................................................................................................. 207
Auto format information ................................................................................................................................... 207
Media options automatically updated..................................................................................................................... 208
General page............................................................................................................................... 215
Groups page or Members page................................................................................................... 219
Fields on the Groups page .............................................................................................................................. 219
Fields on the Members page ........................................................................................................................... 220
Logon Control page ..................................................................................................................... 221
Auto Verify Mode ............................................................................................................................................. 227
List of jobs to be executed ............................................................................................................................... 232
Web browser.................................................................................................................................................... 238
Do not display watermark in views .................................................................................................................. 238
Single-click to open an item in views............................................................................................................... 238
Color palette .................................................................................................................................................... 239
Start Time ........................................................................................................................................................ 245
End of Week .................................................................................................................................................... 246
End of Quarter ................................................................................................................................................. 246
xii Data Protector ExpressUser's Guide and Technical Reference
Device or Media Selection Page ............................................................................................................................ 247
Status page ................................................................................................................................. 249
Stream Control page ................................................................................................................... 250
Available Versions ........................................................................................................................................... 254
Monitoring jobs ................................................................................................................................................ 258
Login information ............................................................................................................................................. 261
Automatically start this application when the operating system starts ............................................................ 261
Automatically log in on startup......................................................................................................................... 261
Maximum number of menu items for Jobs, Alerts, or Logs submenus ........................................................... 262
Service settings ............................................................................................................................................... 262
Open Administrator ................................................................................................................................................ 262
What is OBDR? ...................................................................................................................................................... 268
Important guidelines .................................................................................................................... 268
You should perform the disaster recovery operation on the failed computer after replacing the faulty hardware
that caused the system failure. ........................................................................................................................ 269
Table of Contents xiii
Windows only................................................................................................................................................... 269
Create the Disaster Recovery Backup......................................................................................... 270
Create full backup .................................................................................................................................................. 270
From the GUI ................................................................................................................................................... 272
When to create new bootable media ..................................................................................................................... 273
Recovering From a Disaster ........................................................................................................ 275
Disaster recovery from CD or DVD ........................................................................................................................ 275
Disaster recovery from bootable media ................................................................................................................. 276
Recover System State (Windows only).................................................................................................................. 278
Troubleshooting recovering from a disaster........................................................................................................... 278
Using Disaster Recovery with Libraries ....................................................................................... 279
Using Disaster Recovery with Windows Active Directory ............................................................ 279
Appendix E - Troubleshooting Guide ...................................................................................... 280
Troubleshooting Backup Jobs ..................................................................................................... 280
When I run a backup job, it uses the backup device on my local machine instead of the one on the server. 280
My scheduled job is not running. ..................................................................................................................... 281
I have two tape drives, but it is only using one to run a job............................................................................. 281
How do I replace media in a rotation group?................................................................................................... 281
How can I tell when the next job will run and which media is required? ......................................................... 282
How can I determine which files were not backed up? ................................................................................... 282
Installing the Data Protector Express Agent for Microsoft Exchange........................................... 289
Activating the license ............................................................................................................................................. 289
Configuring a Microsoft Exchange Server ................................................................................... 290
Force Modes.................................................................................................................................................... 290
xiv Data Protector ExpressUser's Guide and Technical Reference
About Working with Microsoft Exchange Server.......................................................................... 291
Microsoft Exchange and Windows NT ................................................................................................................... 291
Installing the Data Protector Express Agent for Microsoft SQL Server........................................ 296
Activating the license ............................................................................................................................................. 297
Configuring the Microsoft SQL Server ......................................................................................... 297
Notes for Backup Jobs with Microsoft SQL Server ...................................................................... 298
Microsoft SQL Server Databases and the backup mode....................................................................................... 299
Default encryption state ......................................................................................................................................... 333
Off .................................................................................................................................................................... 335
Encryption and Compression .......................................................................................................................... 336
Media Properties .................................................................................................................................................... 336
Media Import .......................................................................................................................................................... 337
Recovering a system with an encrypted backup.................................................................................................... 337
Index ........................................................................................................................................... 338
Before You Begin
This User’s Guide and Technical Reference provides all of the information necessary to effectively
implement and use all of the advanced features found in Data Protector Express. Information about
installing Data Protector Express is available in the Installation Guide.
In this section
• Documentation
• Customer Support
Documentation
The following documentation is included with Data Protector Express to help you install and use all of
Data Protector Express features and options.
NOTE: In the following sections:
<Lang> represents the language in which the document is written: eng (English), fre (French), ger
(German), ita (Italian), jpn (Japanese) , spa (Spanish), kor (Korean), chs (Simplified Chinese), and cht
(Traditional Chinese).
Printable documentation
The /doc directory on the Data Protector Express CD-ROM contains the following printable
documentation:
•Tutorial 1 – Registering and Installing Data Protector Express (Tutorial1.pdf): Contains basic
information to help you install and run Data Protector Express
• Installation Guide (dpins<Lang>.pdf): Contains installation information for each supported platform.
• User’s Guide and Technical Reference (dpusr<Lang>.pdf): Contains information for configuring
and using Data Protector Express.
•Addendum (dpadd.pdf): Contains information on additional features (English only): This manual is
provided only when necessary.
NOTE: You can also download these documents from the Data Protector Express website
www.hp.com/go/dataprotectorexpress.
If you require printed copies of these manuals, you can print the PDF files. They were designed to be
printed two-sided and new chapters always begin on an odd-numbered page.
xvi
Before You Begin xvii
To view or print this documentation, Adobe Acrobat Reader (version 4.0 or higher) must be installed on
your Windows or X Window (Linux) computer. If not currently installed, you can install it from the
Adobe Acrobat Reader website at www.adobe.com/.
NOTE: Adobe Acrobat Reader does not offer versions for NetWare systems. Therefore, you can only view
or print the Data Protector Express documentation on Windows or X Window (Linux) systems.
To print the documentation, open the appropriate file into Adobe Acrobat Reader. Choose Print Setup…
from the File menu and set the proper options for your printer. Then choose Print… from the File menu
and print the document.
Release notes
Release notes are included with every service pack. Before using Data Protector Express, please read and
print the release notes for additional information. The release notes are available in both HTML
(readme.htm) and text (readme.txt) formats in the root directory of the Data Protector Express CDROM.
Online Help
Windows
To view online help while using Data Protector Express, select Contents from the Help menu. The online
help is displayed in a pop-up window.
For task-related or context-sensitive help while using Data Protector Express, select a topic in the
Dynamic Help list.
Non-Windows
You can view online help from most Data Protector Express screens by pressing F1.
Screen Shots
The screen shots in this manual may not be identical to the interface you see when you use Data Protector
Express. Any differences will be small and will not prevent you from using this documentation. Note that
because of the customizable nature of the Data Protector Express graphical user interface that the
components of the GUI may be in different locations and colors in the documentation compared to the
product in use.
Features
If you have a Proliant Edition or Single Server Edition of Data Protector Express software, not all of the
features described in this document will be available to you. This document describes all the features in
Data Protector Express. Both Data Protector Express Single Server Edition and Data Protector Express
Proliant Edition can be upgraded to Data Protector Express with the appropriate license key. Please
contact your HP partner to purchase this upgrade.
Customer Support
Customers under a support contract may receive their support by phone or by submitting an email.
Country specific details on both options can be found at welcome.hp.com/country/us/en/wwcontact.html.
xviii Data Protector ExpressUser's Guide and Technical Reference
If you require support and your support contract has expired, please contact your HP Partner or sales
representative for information on obtaining a new HP Data Protector Express support contract
Chapter 1: About Data Protector Express
A backup and recovery system is an integral part of a company's data security. The ability to back up and
restore business-critical data quickly and efficiently can mean the difference between survival and failure.
Maintaining backups is often considered a tedious task, and many companies fail to protect their
corporate data at all. Data Protector Express provides users with the capacity to back up and restore data
across a network and the ability to administer a comprehensive backup plan. This section describes basic
concepts of a backup and recovery system and presents how Data Protector Express provides a powerful,
yet cost-effective and easy-to-use, management tool for protecting data on network file or application
servers and PC desktops.
In this section
• Backup basics
• Backup environment
Backup basics
Whether your work environment consists of a single computer in a home or small office, several
computers connected to a network server, or hundreds of computers connected to multiple network
servers, a typical data protection plan involves at least the ability to back up and restore business files.
At a minimum, data that cannot be reloaded onto the system from installation disks, network-based
security settings, company-generated databases should all be backed up for easy retrieval in the event of a
data disaster. The important data might be a word processing file, e-commerce transactions, network user
account and password information, and so on.
The data you protect and how long it remains available on storage media might depend on legal
requirements for your industry or your own company policies. Whatever your data storage requirements
might be, you should have a basic understanding of the types of backup operations and your own
computer environment.
Typical backup and recovery operations
Backup: A backup is the process of copying a file or folder from its current location to a new location,
typically media loaded in a backup device. The original data remains intact in its current location. During
the backup process, an attribute associated with each file, known as an archive attribute, is altered within
the Data Protector Express Selection tree to indicate that the file was backed up. Archive attributes may
function differently on different operating systems, so the Data Protector Express catalog also tracks file
changes.
Data Protector Express runs backups in one of four backup modes:
1
2 Data Protector ExpressUser's Guide and Technical Reference
•Full: In full backup mode, the backup job copies all selected files in the job whether or not they have
changed. During a full backup, the archive attribute and Data Protector Express catalog record for
each selected file is updated to indicate that it has been backed up during a full backup.
•Differential: In differential mode, the backup job copies only those selected files that have changed
since the last full backup. The Data Protector Express catalog record for these files is updated but the
archive attribute is not reset by this backup.
•Incremental: In incremental mode, the backup job copies all selected files that have changed since the
last backup regardless of backup mode. The Data Protector Express catalog record and archive
attribute for these files is updated to reflect this backup.
•Copy: In copy mode, the backup job backs up all selected files, but has no effect on any future
scheduled backups. The archive attribute is not changed during this backup.
Restore: A restore is the process of copying data from backup media to its original location or to a new
location in the event that the original location is damaged or unavailable. Restore operations can also
retrieve data to a file or folder other than the original one.
Disaster recovery: Often defined as the ability to recover information systems quickly, disaster recovery is
the process of automatically partitioning and formatting the hard drive, and restoring operating system
data that allows a computer or network to restart normally. Disaster recovery and general restore
operations can be combined to quickly restore both the operating system and business-critical data.
Backup environment
A complete network backup system consists of three parts: backup devices, a catalog, and a backup
management program.
Backup devices
Data Protector Express works with your existing computer network. A network connects file or
application servers and PC desktops together in order to allow various users to work together on projects
and with common files. Networks also allow users to share peripheral devices, such as disk drives,
printers, fax machines, and modems. Sharing devices across a network makes economic sense, since
several systems can use a single device. Backup devices, such as tape drives, hard disks, NAS appliances,
and CD or DVD recordable devices, which back up or copy files onto tape, disk, or other media, may also
be shared. For more information about using backup devices in network environments, see Strategies for Faster Jobs on page 163.
Sharing a backup device makes operational as well as economic sense. Sharing devices lowers costs and
makes it possible to centralize backup operations across the network. Further, a single user, such as the
network administrator, can have primary responsibility for backing up all the file or application servers
and PC desktops on the network.
Sharing a backup device or tape drive across a network also poses problems.
•Security: Most networks have elaborate security systems that prevent access by unauthorized users to
sensitive or confidential data. However, unless you take protective measures, once these files are
backed up onto tape or other media, any user in physical possession of the media can gain access to
these files. Data Protector Express offers the ability to encrypt the information written to media. Data
Protector Express uses a strong key to encrypt the data on the media, which provides an excellent
protection of media outside the storage management domain. Although it is possible to physically
Chapter 1: About Data Protector Express
store the media in a secure location, a complete network backup system will help prevent
unauthorized users from accessing confidential or classified information.
•Tracking backed up files: While a single user may be able to find a file copied onto a CD or floppy
disk by manually searching through a stack of disks, this approach is unworkable for large networks.
Without the appropriate software, locating a given occurrence of a file may be impossible, since there
may be hundreds of thousands of files backed up on hundreds of media created over weeks or months.
Storage management catalog
To solve the problems of security and tracking files, Data Protector Express creates and manages a
storage management catalog commonly referred to as the Data Protector Express catalog. The Data
Protector Express catalog keeps track of used and available backup media and each file that is stored on
that media. For each media, the catalog contains detailed information about the media, such as when it
was created and who created it and about the files on the media, such as when they were backed up and
on which media files are stored. For more information, see Tips for Managing the Catalog on page 160.
The Data Protector Express catalog also addresses issues surrounding security. Included in the catalog is
information about which users can use or view which files. The catalog prevents unauthorized users from
accessing files for which they have insufficient security rights. It tracks each user and ensures that only
approved users have access to backup devices and files stored on the backup media. The following
illustration shows the Security view of the Data Protector Express catalog.
4 Data Protector Express User's Guide and Technical Reference
Backup management program
Writing files to the backup media and managing the catalog requires an application program, such as Data
Protector Express. Two of the most important functions of Data Protector Express are managing the catalog and creating and running jobs. Data Protector Express manages the catalog to keep track of files
and to ensure security. Data Protector Express also creates and runs jobs, such as backup and restore jobs,
which transfer files back and forth between backup devices (such as tape drives) and file or application
servers or PC desktops.
Managing the Storage Management Catalog
Much of the power and usefulness of Data Protector Express comes from its extensive capabilities to
manage the storage management catalog. There are three important concepts associated with the catalog:
objects, properties and Data Protector Express management domains.
Objects
The catalog collects and organizes information about objects. An object is any file, machine, device,
backup media or user about which Data Protector Express needs to store data. Examples of objects which
Data Protector Express tracks in its catalog include backup media, tape drives, network servers, versions
of files, backup jobs, custom templates, users, and so on.
Some objects can contain other objects within them. A simple example is a folder. It contains other
objects within it, such as jobs, files, templates, user information, and so on. Data Protector Express also
displays information about the contents of objects other than folders. When you view a list of the contents
of the Data Protector Express management domain, you might see machines, networks, devices, libraries,
and so on. Although not folders, these objects can contain other objects in them. For example, a library
can contain storage slots, import/export slots, and so on. A network might contain file systems, network
drives, printers, and attached backup devices.
Properties
The information about each object that Data Protector Express stores in its catalog are called properties.
The properties of each object include important information about that object, such as what kind of object
it is, who has security permissions to use it and its relationship to other objects. For more information on
property pages, see Chapter 13 – Objects and Properties Reference on page 190.
For example, an individual backup media is an object in the Data Protector Express catalog. Some of the
properties of that media stored in the catalog include its name, when it was created, who has security
permissions to use the media and whether or not it can be erased.
Working with Data Protector Express objects and properties is easy. If you know how to use Windows
Explorer, you already know most of what you need to use Data Protector Express.
Data Protector Express management domains
Data Protector Express may be licensed to support several catalogs. On a large network, it may be useful
to have multiple catalogs, each addressing different data protection needs. For example, there may be a
separate catalog for each work group or department, even though they are all on the same network.
If your network has several Data Protector Express catalogs, then you choose which catalog you wish to
use by selecting a Data Protector Express management domain when you log on to Data Protector
Chapter 1: About Data Protector Express
Express. Choosing a Data Protector Express management domain is simply a way to select which catalog
you wish to use.
Each Data Protector Express management domain is overseen by a Data Protector Express
administrator. It is the Data Protector Express administrator’s job to manage the security and integrity of
the files in his or her Data Protector Express management domain.
You can switch to a different domain each time you log on to Data Protector Express. You can also set
up domains from the Data Protector Express Login screen.
In the Host Name field, enter the hostname or IP address of the machine on which the Data Protector
Express management master server is located, then select OK.
NOTE: When you edit a domain, you cannot edit the master server name.
Data Protector Express management domains and security
Data Protector Express management domains also help ensure network security. Data Protector Express
uses Data Protector Express management domains to promote security in two ways: first, by preventing
users from working with more than one Data Protector Express management domain at a time and,
second, by allowing file or application servers and PC desktops to be the member of only one Data
Protector Express management domain. For more information, see Chapter 12 – Advanced Permissions
and Security on page 174.
Note the following about machines, users, and Data Protector Express management domains:
• File or application servers and PC desktops can only be the member of one—and only one—Data
Protector Express management domain. Because these machines belong to only one catalog, their
peripherals, such as disk drives and backup devices, can belong to only one catalog.
• Backup media created in one Data Protector Express management domain cannot be used in another
Data Protector Express management domain without following special procedures (e.g., importing
media created on one Data Protector Express management domain into the Data Protector Express
catalog of another Data Protector Express management domain). This ensures that there is no
improper access to secure files and data.
• Each Data Protector Express management domain must have at least one backup device , such as a
virtual library, tape library or CD device. This backup device can belong to only one Data Protector
Express management domain; it cannot be shared among multiple storage domains. However, a Data
Protector Express management domain could have multiple backup devices.
• From one PC desktop, users can work in other Data Protector Express management domains besides
the storage domain to which their PC desktop belongs. This means they can administer jobs remotely
for other Data Protector Express management domains besides the storage domain to which their PC
desktop belongs. They cannot, however, work in more than one Data Protector Express management
domain at the same time.
• Users can work from other machines with other Data Protector Express management domains besides
the one to which their machine belongs. Their machine, along with its drives, peripherals and
accompanying data, however, always remain in a single Data Protector Express management domain.
That is, the data on their machine is always backed up and restored within a single Data Protector
Express management domain. This helps to prevent the unauthorized sharing of data between Data
Protector Express management domains that would occur if someone in a different storage domain
were able to restore your data to their machine. Thus while users can work outside of their storage
domain, the PC desktops and file or application servers they use always remain a part of the Data
6 Data Protector ExpressUser's Guide and Technical Reference
Protector Express management domain that was selected when Data Protector Express was installed
on the machine.
Creating and running jobs
Data Protector Express creates backup media and restores files with jobs. Working with backup devices
and a network, Data Protector Express jobs either back up network file or application servers and PC
desktops onto physical or virtual media or restore files from media onto file or application servers or PC
desktops. When you want Data Protector Express to back up or restore a file, you create and run a job.
There are several kinds of jobs: backup, restore, verify, media, and disaster recovery. Every kind of job
you create and run has six components: creating the job, permissions, selection, options, scheduling and running. Setting up media rotation is an additional feature that you may include in your backup jobs.
Creating the job: You begin by creating a job, either a backup, restore, verify, media, and disaster recovery
job. Refer to Chapter 3 – Creating Jobs with Data Protector Express on page 29 for more information.
Permissions: In order to create a job, you must have permissions to the objects that job will work with.
For example, to create a backup job, you must have permissions to the tape drive, the tape, and the files
you will back up. If you wish to back up files on another PC desktop, you must have permissions to that
PC desktop and to the files on that PC desktop. Individual users are assigned permissions by the Data
Protector Express administrator, who is responsible for ensuring the security and integrity of the backup
system. Refer to Chapter 4 - Permissions on page 41 for more information.
Selection: Once you have permissions to a file, you must select it to be included in your job. You might
select all files, only a few files, or perhaps only a single file. You select files first by selecting them in the
selection window and second by having Data Protector Express ‘sort’ them with filters, which apply
additional selection criteria, such as date modified, type of file, and so on. Refer to Chapter 5 – Selecting
Files and File Versions on page 53 for more information.
Options: After scheduling the job, you specify the job’s option settings. Some of the options you can
specify include what backup device to use, what media to use, whether to automatically format the media,
and so on. Refer to Chapter 8 – Job Options on page 107 for more information.
Scheduling: After selecting files, the job is scheduled to be run. A job may be scheduled to run later or to
run immediately. It can be scheduled to run regularly or only once. Refer to Chapter 6 – Scheduling Jobs
on page 90 and Chapter 7 – Planning for Media Rotation on page 98 for more information.
Media rotation: After selecting a schedule for a job, you must decide how to manage your media. Data
Protector Express can manage your media automatically with default media rotation plans, or you can
manage your media manually. Refer to Chapter 7 – Planning for Media Rotation on page 98 for more
information.
Running the job: Finally, the job is run. Many scheduled jobs are run automatically by Data Protector
Express, but you can manually run a job at any time. Refer to Chapter 9 – Running Jobs on page 122 for
more information.
NOTE: When you recover the storage management catalog, jobs are placed on hold. To restart the jobs,
select the jobs and select Continue from the command list.
Chapter 2: Data Protector Express Workplace
Data Protector Express is designed to be easy to use. This section will familiarize you with most Data
Protector Express features, including keyboard shortcuts and mouse conventions.
NOTE: This manual documents the graphical user interface available on Windows and Linux systems
running X Window. The console interface operates similarly on Windows, NetWare, and Linux systems.
In this section
• Starting Data Protector Express
• Starting Data Protector Express
• Main Data Protector Express Window
• Customizing the main Data Protector Express window
• Working with Objects in the Main Data Protector Express Window
Starting Data Protector Express
After you have installed Data Protector Express, you start it like any other program.
Windows
To start Data Protector Express in Windows, double-click the Data Protector Express shortcut on the
desktop.
You can also click the Start button and select Hewlett-Packard Company from the Programs (or All
Programs) submenu. Then select Data Protector Express.
NetWare
To start Data Protector Express on a NetWare machine, access the server console. Then type dpAdmin. It
is not necessary to specify a search path. For example, you can launch Data Protector Express on a
NetWare computer by typing the following at a console prompt:
:
SERVER: dpAdmin
Linux
To start Data Protector Express on a Linux machine, open a terminal window. Then access the directory
where you installed Data Protector Express. Type ./ dpadmin. For example:
7
8 Data Protector ExpressUser's Guide and Technical Reference
[/usr/local/hp/dpx]# ./ dpadmin
To launch the CUI, type ./ dpadmin -c. For example:
[/usr/local/hp/dpx]# ./ dpadmin -c
Linux (X Window)
To start Data Protector Express on a Linux machine running X Window, open a terminal window. Then
access the directory where you installed Data Protector Express. Type ./ dpadmin. For example:
[/usr/local/hp/dpx]# ./ dpadmin
On Linux systems, you can create a shortcut on your KDE or GNOME desktop. (See the Data Protector
Express Installation Guide for more information.)
NOTE: If you are running Red Hat Enterprise Linux 4, you may see an error message (such as
“libstdc++.so.5 could not be found”) when you start Data Protector Express. This is because the C++
library version that the application was built with is not present on these systems, and the latest version
“libstdc++.so.6” is not backwards compatible. If you are using Red Hat Enterprise Linux 4, you can use
an RPM package called "compat-libstdc++.rpm" to install the necessary library. This can also be achieved
by installing the “Developer’s Tools” package from the Red Hat Enterprise Linux 4 installation CDs.
Logon Window
Each time you start Data Protector Express, you are shown the Data Protector Express Logon window.
To log on, you must select a Data Protector Express management domain and enter your user name and
your password.
Logging on the first time
CAUTION: Data Protector Express administrators have unlimited access to all of the objects in the storage
management catalog. Any user who logs on as the Data Protector Express administrator will have
complete access to all of the files and machines contained in the Data Protector Express management
domain.
The default user name for the Data Protector Express administrator is Admin. There is no default
password required for this user to log on.
Chapter 2: Creating Jobs with Data Protector Express 9
Your first security step should be to change the Data Protector Express administrator’s password. Refer to
Changing your password on page 10 for instructions on changing your password.
Grace logons
Your Data Protector Express administrator may have set up your password to expire after a set period of
time. For example, your password may expire after 60 days. This forces you to change your password
regularly.
If your password has expired, Data Protector Express will prompt you to change your password. If you
choose not to change your password, Data Protector Express may still let you log on, even with an
expired password. Logging on with an expired password is called a grace logon. Your Data Protector
Express administrator will determine how many grace logons you are allowed.
When your password has expired and you have used all of your grace logons, Data Protector Express will
ask you to change your password when you log on.
Selecting a Data Protector Express management domain
When your Data Protector Express administrator set up Data Protector Express to run on your network,
your PC desktop was assigned to a Data Protector Express management domain. Your PC desktop, along
with its drives and peripherals, can only be a member of one Data Protector Express management
domain. The name of this storage domain is the default name that appears in the Domain list on the
Logon window.
Normally, you should leave the default name in the list unchanged. This is because you will typically
want to work with the Data Protector Express management domain to which your PC desktop belongs.
Occasionally, however, you may wish to work in a different storage domain. You might be asked by a coworker or your Data Protector Express administrator, for example, to run a Data Protector Express job in
a different Data Protector Express management domain.
To select a different Data Protector Express management domain
1. Use the drop-down menu to choose a Data Protector Express management domain from the Domain
name list. (A list of possible Data Protector Express management domains will appear.)
2. Select the Data Protector Express management domain you wish to use and click OK.
NOTE: Although you can log on to different Data Protector Express management domains, you can only
create and run jobs within a single Data Protector Express management domain. Further, you can only
access files and devices in a single Data Protector Express management domain. This means, for example,
10 Data Protector ExpressUser's Guide and Technical Reference
that you will be unable to restore files backed up from PC desktops in one Data Protector Express
management domain to PC desktops in another Data Protector Express management domain. (If you need
to share data from one Data Protector Express management domain to a different Data Protector Express
management domain, see Import Media on page 144.)
User name and password
After selecting a Data Protector Express management domain, type in your User name and Password.
If you type your name or password incorrectly, you will be asked to re-enter your user name and
password.
In order to log on, your Data Protector Express administrator must first assign you a user name and a
password. If you are having difficulty logging on, ask your system administrator to specify again the
exact spelling of the user name and password assigned to you.
NOTE: Passwords are case-sensitive; that is, the password USER1 is not the same as the password user1.
Changing your password
It is a good idea to regularly change your password, particularly if you are working with sensitive and
important data.
To change your password
1. Open the Administration desk bar.
2. Select Security, and then click your User icon.
3. Open the User Password screen by either
• Selecting Change Password… from the Commands task pane
• Right-clicking the user and selecting Change Password… from the shortcut menu.
1. Type in your old password and then your new password.
2. Confirm your new password and then click OK.
When selecting a password, remember that some passwords are notoriously easy to break. For example,
because many people use their birth date or the name of their spouse, these are not good choices for
passwords.
Chapter 2: Creating Jobs with Data Protector Express 11
TIP: The Data Protector Express administrator can change a user’s password without knowing the user’s
current password. Data Protector Express does not even ask you to enter the old password. This is useful
when the user has forgotten his or her password.
Logging out
On occasions you may want to change the Data Protector Express management domain you are using or
want to log on as a different user. Although you could quit Data Protector Express and restart the
program, it is quicker and faster to log on again without quitting Data Protector Express.
To log on again, choose Logout from the File menu. You will be presented with the Data Protector
Express Logon window and asked to log on again.
Logging out and running scheduled jobs
Data Protector Express can run scheduled jobs even when no one is logged on. (Only scheduled jobs can
be performed when no one is logged on to Data Protector Express.) For more information, see Running Scheduled Jobs on page 124.
When you leave your PC desktop, you may need to leave Data Protector Express open. In order to prevent
unauthorized access to the network, log out of Data Protector Express before leaving your PC desktop.
Any scheduled jobs will still run, but no unauthorized users will be able to work with Data Protector
Express unless they can log on. (This requires that the Data Protector Express Service be installed and
running).
NOTE: If the Data Protector Express service is installed and running, you can close Data Protector Express
and your scheduled jobs will still run (see Appendix C - About the Data Protector Express Service on page
264 for more information).
12 Data Protector ExpressUser's Guide and Technical Reference
Main Data Protector Express Window
You use the main Data Protector Express window to view, create and manipulate Data Protector Express
objects, such as jobs and tapes.
In addition to the menu bar, the Data Protector Express window has the following parts: menu bar, desk
bar, toolbar, task and information panes, the object detail area and the status bar.
Menu bar
Located at the top of the screen, the menu bar contains several menus that group together similar
commands.
To invoke a command from a menu, open the menu and then select a command. The available menus are
File, Edit, View, Window, and Help. For example, to locate and update your Data Protector Express
license, select Licenses from the Help menu.
You will find the menus easy to use and intuitive. Most of the menu commands are discussed in detail
later in this manual. Commands on these menus are often related to the current active object in the object
Loading...
+ 335 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.