Best Practices & Time-SavingTechniques for Protecting Exchange                         ©2011 Quest Software, Inc. All righ...
Agenda•   Challenges in protecting Exchange•   Recommended best practices for protecting and    recovering Exchange•   Sol...
Challenges• Exponential data growth• Email is increasingly seen as mission-critical• Less tolerance for data loss and prol...
Plan for The Unexpected• Server Failure                    • Single Mail Item Loss – OS failure, hardware failure      – A...
Gather Organizational Requirements• Measure the value your organization places on its  email data• What are the acceptable...
Exchange Protection Approaches                                                                                   5        ...
Set Recovery Objectives• Recovery Time Objective (RTO) – The amount of time elapsed between a loss or disaster and the   r...
Create a Service Level Agreement (SLA)• Obtain agreement on objectives in the form of a SLA• Include the following categor...
Protecting Exchange     Your protection strategy   should directly support your      recovery requirements                ...
High Availability• Database Availability Groups (DAG) – New framework introduced in Exchange 2010 – A group of mailbox ser...
Backup• Traditional Backup – Protection for information stores, individual storage groups, or   individual databases – Ent...
Disaster Recovery• Host-Based Replication – Cross-platform replication for applications like Microsoft Exchange, as   well...
Recovering Exchange    Clearly document and test  recovery strategy to minimize     the chance for mistakes               ...
Elements of a Restore StrategyInclude the following in your restore strategy:• Build a communications plan – Identify the ...
Quest Data Protection Family FUNCTIONS                                                                                    ...
Quest: A Leader in Data Protection& Application Management         • Linux Backup: NetVault Backup (IDC Japan)  #1        ...
NetVault BackupCross-platform backup and recovery• Extensive platform/application support  – Unix, Windows, Linux. Mac OS ...
NetVault FastRecoverReal-time backup and instant recovery• Patented FlashRestore™  - Near instant recovery for Microsoft E...
Recovery Manager for ExchangeDiscover, Recover Individual Mail Items, Attachments & Conversations• Find and retrieve messa...
http://www.quest.com/data-protection                                       ©2011 Quest Software, Inc. All rights reserved.
Upcoming SlideShare
Loading in …5
×

Best Practices: Protecting Microsoft Exchange

786 views

Published on

In this educational webcast, Quest will share the latest best practices and time-saving techniques for protecting Microsoft Exchange data. You’ll learn proven ways to streamline your backup practices, restore items directly from backup, and quickly recover your Exchange environment.

http://www.Quest.com/Data-Protection

Published in: Technology
0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total views
786
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
12
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide
  • At Quest, we place the greatest value on RECOVERY!NetVault FastRecover delivers backup and FlashRestore™ MS Exchange, as well as Oracle, SQL Server and Windows file servers, enabling instant recovery after corruption or data loss. Patented technology delivers immediate availability of mission-critical applications with no need to wait for the full recovery before end users can resume activities. Its built-in replication feature can efficiently send backup data from one FastRecover server to another for enhanced DR protection at remote offices. You can also export and back up via CIFS. FastRecover integrates with Quest’s own NetVault Backup—as well as practically any other third-party backup software.
  • Best Practices: Protecting Microsoft Exchange

    1. 1. Best Practices & Time-SavingTechniques for Protecting Exchange ©2011 Quest Software, Inc. All rights reserved.
    2. 2. Agenda• Challenges in protecting Exchange• Recommended best practices for protecting and recovering Exchange• Solutions for Exchange available today• Quest data protection solutions 1 ©2011 Quest Software, Inc. All rights reserved.
    3. 3. Challenges• Exponential data growth• Email is increasingly seen as mission-critical• Less tolerance for data loss and prolonged downtime• Increasing number of requests to discover and recover data from within Exchange 2 ©2011 Quest Software, Inc. All rights reserved.
    4. 4. Plan for The Unexpected• Server Failure • Single Mail Item Loss – OS failure, hardware failure – A user inadvertently hard- deletes an important mail item• Database Failure – Database corruption or disk • Site Disaster failure – Power outage, network outage, natural disaster• Single Mailbox Loss – A mailbox is deleted and needs to be recovered 3 ©2011 Quest Software, Inc. All rights reserved.
    5. 5. Gather Organizational Requirements• Measure the value your organization places on its email data• What are the acceptable levels of data loss?• What is the acceptable length of time for service and data restoration?• Where are my Exchange Servers located? 4 ©2011 Quest Software, Inc. All rights reserved.
    6. 6. Exchange Protection Approaches 5 ©2011 Quest Software, Inc. All rights reserved.
    7. 7. Set Recovery Objectives• Recovery Time Objective (RTO) – The amount of time elapsed between a loss or disaster and the restoration of business operations. It is the time required to physically recover the data or application and have it ready for use• Recovery Point Objective (RPO) – The point in time that recovered data will be recovered to. – For example, if you recover a file that was backed up yesterday then your recovery point is one day 6 ©2011 Quest Software, Inc. All rights reserved.
    8. 8. Create a Service Level Agreement (SLA)• Obtain agreement on objectives in the form of a SLA• Include the following categories: – Availability – Hours of operation – Performance measures – Recovery parameters – Support parameters – Environmental dependencies and assumptions 7 ©2011 Quest Software, Inc. All rights reserved.
    9. 9. Protecting Exchange Your protection strategy should directly support your recovery requirements 8 ©2011 Quest Software, Inc. All rights reserved.
    10. 10. High Availability• Database Availability Groups (DAG) – New framework introduced in Exchange 2010 – A group of mailbox servers (up to 16) that replicate to one another, providing database-level protection from outages – Uses Exchange Continuous Replication (logs shipping) and a subset of Windows failover clustering technologies to provide continuous HA and site resiliency 9 ©2011 Quest Software, Inc. All rights reserved.
    11. 11. Backup• Traditional Backup – Protection for information stores, individual storage groups, or individual databases – Enterprise protection for heterogeneous environments (centralized management and monitoring) – Target disk or tape• Real-time Backup (Continuous Data Protection) – Watches all changes occurring during a defined period – An initial sync/seed of the data to be protected is created – All changes that occur after the initial sync/seed are captured and available for restore 10 ©2011 Quest Software, Inc. All rights reserved.
    12. 12. Disaster Recovery• Host-Based Replication – Cross-platform replication for applications like Microsoft Exchange, as well as Microsoft SQL, MySQL, and PostgreSQL residing in Windows, Linux, Solaris and Mac OS X environments – Centralized management and monitoring of replication• Replication of Backup Copies – Replicates changes to protected datasets from one (or many) backup servers to another backup server 11 ©2011 Quest Software, Inc. All rights reserved.
    13. 13. Recovering Exchange Clearly document and test recovery strategy to minimize the chance for mistakes 12 ©2011 Quest Software, Inc. All rights reserved.
    14. 14. Elements of a Restore StrategyInclude the following in your restore strategy:• Build a communications plan – Identify the personnel involved in disaster recovery efforts, their responsibilities and chain of command• Set restore priorities – Prioritize what should be restored• Provision a ―dial-tone‖ system – Allow users to send and receive new email before the historical email data has been fully restored• Restore type – Use the recovery storage group to restore the data and merge the restored data into the ―dial-tone‖ database 13 ©2011 Quest Software, Inc. All rights reserved.
    15. 15. Quest Data Protection Family FUNCTIONS PLATFORMS Identity CAPABILITIES AND BENEFITS Management • Best-of-breed solutions that span physical, virtual, and application-level data protection Performance • Heterogeneous platform support Monitoring • Reduce the amount of data required for backups by 90% while gaining scalability Data Protection • Object and application-level recovery to ensure availability and immediate access Development PRODUCTS Migration Administration PHYSICAL I VIRTUAL I CLOUD 14 ©2011 Quest Software, Inc. All rights reserved.
    16. 16. Quest: A Leader in Data Protection& Application Management • Linux Backup: NetVault Backup (IDC Japan) #1 • Oracle Backup: NetVault Backup (DCIG Buyer’s Guide) #1 • Purpose-built backup for VMware (in speed, scalability, and number of #1 customers) • Virtual Server Management Software Vendor: Quest Software (IDC US) Top 3 • Worldwide Storage Management Software Vendor: Quest Software Top 10 (Gartner) 15 ©2011 Quest Software, Inc. All rights reserved.
    17. 17. NetVault BackupCross-platform backup and recovery• Extensive platform/application support – Unix, Windows, Linux. Mac OS – VMware ESX/ESXi, Hyper-V, Xen, KVM – Protection for 12 popular business applications• Scalable yet simple – 50% faster recovery, 30% faster backup than comparable products – 45 minute install and setup• Broad tape and disk support• Bare Metal Recovery (BMR) agent 16 ©2011 Quest Software, Inc. All rights reserved.
    18. 18. NetVault FastRecoverReal-time backup and instant recovery• Patented FlashRestore™ - Near instant recovery for Microsoft Exchange, as well as Oracle, SQL Server, and Windows file-system data• Efficient replication for remote offices - Bandwidth-friendly replication supports ROBO disaster recovery scenarios• Integrates with existing backup products • Export and back up NVFR datasets via CIFS• Eliminates backup windows• Recover data from any point in time—even down to the second! NVFR Timeline Indicator 17 ©2011 Quest Software, Inc. All rights reserved.
    19. 19. Recovery Manager for ExchangeDiscover, Recover Individual Mail Items, Attachments & Conversations• Find and retrieve message-level data in minutes from multiple sources • Exact items from a single-pass backup • Eliminates the need for both a database backup and a brick-level backup• Perform federated, intelligent searches • Search multiple email data sources simultaneously • Search keywords in message body, ID, headers, message classes, categories, deleted items, conversation threads and attachment type and content• Support for Backup Software • Find and retrieve data across Quests NetVault Backup and NetVault FastRecover, native Microsoft backups and most major third-party backup software 18 ©2011 Quest Software, Inc. All rights reserved.
    20. 20. http://www.quest.com/data-protection ©2011 Quest Software, Inc. All rights reserved.

    ×