SlideShare a Scribd company logo
1 of 15
Getting Started With
MSP360 Managed Backup
Configuration and Best Practices
January 11th, 2024
● Introduction to MSP360 Managed Backup
● Configuration Best Practices
● Backup Scheduling
● Monitoring and Reporting
● Recovery and Restore
● Q&A
Agenda
● Reliable
● Secure
● Scalable
● Easy to use
● Cost effective
● Backup any data anywhere
What is Managed Backup?
MSP360 Backup
● The ultimate insurance policy
● Ransomware protection
● Peace of mind
● Cost efficient
● Smooth restorations
● Uninterrupted business processes
The Importance of a Well
Configured Backup
● Download directly to the computer - classic, but
not scalable
● Send link to the users via email - not very
convenient, and requires other people to do it
● Windows GPO script - not all computers belong
to a domain
● PowerShell script - needs RMM
● Network Discovery and Deployment - can work
everywhere! very easy and fast
● Install other MSP360 products from the single-
pane-of-glass - no need to go through the
installation again
Easy start with MSP360
● Create backup plans with Managed Console -
no need to connect to the endpoints
● Backup templates - create one golden image
and then spread it across computers in a
second
● System Engineer Assistance and Onboarding
service
Easy start with MSP360
● Key configuration parameters for Managed Backup
○ What to backup?
○ Where to backup?
○ How often to backup?
○ How long to store?
● Server and client setup
○ Use combo of File and Image-Based backups
● Considerations for different environments
○ 3-2-1 backup rule
○ Back up what you really need to restore
Configuration Best Practices
● The importance of backup scheduling
- defined by RPO
● How to setup automated backup
scheduling
○ Forever Forward Incremental
■ Saves up to 50% storage space
○ Recurring Incremental +
Periodical Full
■ otherwise you keep backups
Backup Scheduling
Backup Retention
● Storage cost depends on the backup
retention
● Different cases require different
retention
○ Accidental deletion - 1 week
○ Ransomware - 1 month
○ Compliancy - up to 7 years
● Use immutability
● Full backup is not scheduled
● Retention policy is not configured
● Storage specifications (early deletion fee)
Common Pitfalls to Avoid
● Successful restore:
○ Ensure the system has enough space to restore
○ Verify a stable connection
○ Restore only what you need first
○ Control the progress
○ Enable email notifications
Recovery and Restore
● Always test your backups
● Develop your documentation
● Enable email or push notifications
● Use lifecycle rules where applicable
● Periodically review settings of the plans
● Always use the latest version of the Agent
Tips For Successful
Backup Management
Q&A
RMM Connect
Backup

More Related Content

Similar to Getting Started With Managed Backup: Configuration Best Practices

WSO2Con ASIA 2016: Getting More 9s from Your Deployment
WSO2Con ASIA 2016: Getting More 9s from Your DeploymentWSO2Con ASIA 2016: Getting More 9s from Your Deployment
WSO2Con ASIA 2016: Getting More 9s from Your DeploymentWSO2
 
Scaling Monitoring At Databricks From Prometheus to M3
Scaling Monitoring At Databricks From Prometheus to M3Scaling Monitoring At Databricks From Prometheus to M3
Scaling Monitoring At Databricks From Prometheus to M3LibbySchulze
 
Training Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server MonitoringTraining Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server MonitoringOutSystems
 
Server fleet management using Camunda by Akhil Ahuja
Server fleet management using Camunda by Akhil AhujaServer fleet management using Camunda by Akhil Ahuja
Server fleet management using Camunda by Akhil Ahujacamunda services GmbH
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItStorage Switzerland
 
Exploring Alluxio for Daily Tasks at Robinhood
Exploring Alluxio for Daily Tasks at RobinhoodExploring Alluxio for Daily Tasks at Robinhood
Exploring Alluxio for Daily Tasks at RobinhoodAlluxio, Inc.
 
PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)David Timothy Strauss
 
Data Integrity - Patryk Hes
Data Integrity - Patryk HesData Integrity - Patryk Hes
Data Integrity - Patryk HesPROIDEA
 
PCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmarePCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmareSivaramakrishnan N MBA PMP
 
Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...
Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...
Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...Data Con LA
 
Unified Operations Vision
Unified Operations VisionUnified Operations Vision
Unified Operations VisionSteve Mushero
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdfAbhi Jain
 
Ireland Moot 2013 Admin Workshop Morning Session
Ireland Moot 2013 Admin Workshop Morning SessionIreland Moot 2013 Admin Workshop Morning Session
Ireland Moot 2013 Admin Workshop Morning SessionRemote-Learner UK
 
AWS Well Architected Framework in Summary
AWS Well Architected Framework in SummaryAWS Well Architected Framework in Summary
AWS Well Architected Framework in SummaryEwere Diagboya
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13jemtallon
 
hashdays 2012 Lightning Talk - Holistic Server Security
hashdays 2012 Lightning Talk - Holistic Server Securityhashdays 2012 Lightning Talk - Holistic Server Security
hashdays 2012 Lightning Talk - Holistic Server SecuritySean Rütschi
 
10 tips for continuous integration
10 tips for continuous integration10 tips for continuous integration
10 tips for continuous integrationVladimir Roudakov
 
Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019
Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019
Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019VMware Tanzu
 
MidCamp 2014 - A Perfect Launch, Every Time
MidCamp 2014 - A Perfect Launch, Every TimeMidCamp 2014 - A Perfect Launch, Every Time
MidCamp 2014 - A Perfect Launch, Every TimeSuzanne Aldrich
 
From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...
From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...
From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...VMware Tanzu
 

Similar to Getting Started With Managed Backup: Configuration Best Practices (20)

WSO2Con ASIA 2016: Getting More 9s from Your Deployment
WSO2Con ASIA 2016: Getting More 9s from Your DeploymentWSO2Con ASIA 2016: Getting More 9s from Your Deployment
WSO2Con ASIA 2016: Getting More 9s from Your Deployment
 
Scaling Monitoring At Databricks From Prometheus to M3
Scaling Monitoring At Databricks From Prometheus to M3Scaling Monitoring At Databricks From Prometheus to M3
Scaling Monitoring At Databricks From Prometheus to M3
 
Training Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server MonitoringTraining Webinar: Effective Platform Server Monitoring
Training Webinar: Effective Platform Server Monitoring
 
Server fleet management using Camunda by Akhil Ahuja
Server fleet management using Camunda by Akhil AhujaServer fleet management using Camunda by Akhil Ahuja
Server fleet management using Camunda by Akhil Ahuja
 
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix ItWebinar: 10 Reasons Why Backup Breaks and How to Fix It
Webinar: 10 Reasons Why Backup Breaks and How to Fix It
 
Exploring Alluxio for Daily Tasks at Robinhood
Exploring Alluxio for Daily Tasks at RobinhoodExploring Alluxio for Daily Tasks at Robinhood
Exploring Alluxio for Daily Tasks at Robinhood
 
PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)PHP at Density and Scale (Lone Star PHP 2014)
PHP at Density and Scale (Lone Star PHP 2014)
 
Data Integrity - Patryk Hes
Data Integrity - Patryk HesData Integrity - Patryk Hes
Data Integrity - Patryk Hes
 
PCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or NightmarePCI DSS v3.2 Implementation - Bliss or Nightmare
PCI DSS v3.2 Implementation - Bliss or Nightmare
 
Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...
Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...
Data Con LA 2018 - Enabling real-time exploration and analytics at scale at H...
 
Unified Operations Vision
Unified Operations VisionUnified Operations Vision
Unified Operations Vision
 
Security .NET.pdf
Security .NET.pdfSecurity .NET.pdf
Security .NET.pdf
 
Ireland Moot 2013 Admin Workshop Morning Session
Ireland Moot 2013 Admin Workshop Morning SessionIreland Moot 2013 Admin Workshop Morning Session
Ireland Moot 2013 Admin Workshop Morning Session
 
AWS Well Architected Framework in Summary
AWS Well Architected Framework in SummaryAWS Well Architected Framework in Summary
AWS Well Architected Framework in Summary
 
CISSP Week 13
CISSP Week 13CISSP Week 13
CISSP Week 13
 
hashdays 2012 Lightning Talk - Holistic Server Security
hashdays 2012 Lightning Talk - Holistic Server Securityhashdays 2012 Lightning Talk - Holistic Server Security
hashdays 2012 Lightning Talk - Holistic Server Security
 
10 tips for continuous integration
10 tips for continuous integration10 tips for continuous integration
10 tips for continuous integration
 
Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019
Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019
Pivotal Greenplum Cloud Marketplaces - Greenplum Summit 2019
 
MidCamp 2014 - A Perfect Launch, Every Time
MidCamp 2014 - A Perfect Launch, Every TimeMidCamp 2014 - A Perfect Launch, Every Time
MidCamp 2014 - A Perfect Launch, Every Time
 
From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...
From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...
From 10 Deploys Per Year to 4 Per Day at DBS Bank: How Pivotal Platform Can R...
 

More from MSP360

Seamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiSeamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiMSP360
 
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360
 
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...MSP360
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyMSP360
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...MSP360
 
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...MSP360
 
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...MSP360
 
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...MSP360
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360
 
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatCyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatMSP360
 
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber... A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...MSP360
 
What’s New at MSP360?
What’s New at MSP360?What’s New at MSP360?
What’s New at MSP360?MSP360
 
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksThe Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksMSP360
 
MSP360: Ransomware Prepper Guide
MSP360: Ransomware Prepper GuideMSP360: Ransomware Prepper Guide
MSP360: Ransomware Prepper GuideMSP360
 

More from MSP360 (16)

Seamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + WasabiSeamless Data Protection with MSP360 + Wasabi
Seamless Data Protection with MSP360 + Wasabi
 
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
MSP360 Managed Backup: Secure Data Protection for Microsoft 365 and Google Wo...
 
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...Getting Started with MSP360 Managed Backup:  Secure Your Data and Save Money ...
Getting Started with MSP360 Managed Backup: Secure Your Data and Save Money ...
 
The Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware EconomyThe Role of Backup and Recovery in the New Ransomware Economy
The Role of Backup and Recovery in the New Ransomware Economy
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros  Secure Your F...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Secure Your F...
 
MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2MSP360 Cybersecurity Master Class part 2
MSP360 Cybersecurity Master Class part 2
 
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
Cybersecurity 101 - A Masterclass in Securing MSPs and IT Pros Understand Hac...
 
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
Unraveling the Mystery of Cyber Insurance - MSP Guide to Cyber Insurance - Pr...
 
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...	The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
The Use (and Misuse) of AI in Cybersecurity: Exploring Two Sides of the Same...
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1MSP360 Sales Master Class Series Part 1
MSP360 Sales Master Class Series Part 1
 
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The HeatCyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
Cyber Attacks Are Heating Up, Let Wasabi and MSP360 Turn Down The Heat
 
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber... A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
A Brave New World - An Exploratory Look Into The Future of Hacking and Cyber...
 
What’s New at MSP360?
What’s New at MSP360?What’s New at MSP360?
What’s New at MSP360?
 
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware AttacksThe Role of Cyberstorage in Stopping Modern Ransomware Attacks
The Role of Cyberstorage in Stopping Modern Ransomware Attacks
 
MSP360: Ransomware Prepper Guide
MSP360: Ransomware Prepper GuideMSP360: Ransomware Prepper Guide
MSP360: Ransomware Prepper Guide
 

Recently uploaded

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024Lorenzo Miniero
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهMohamed Sweelam
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityVictorSzoltysek
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuidePixlogix Infotech
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewDianaGray10
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceSamy Fodil
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data SciencePaolo Missier
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptxFIDO Alliance
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfdanishmna97
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxMasterG
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe中 央社
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxFIDO Alliance
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxFIDO Alliance
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Paige Cruz
 

Recently uploaded (20)

Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
الأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهلهالأمن السيبراني - ما لا يسع للمستخدم جهله
الأمن السيبراني - ما لا يسع للمستخدم جهله
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
UiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overviewUiPath manufacturing technology benefits and AI overview
UiPath manufacturing technology benefits and AI overview
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptxCyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
Cyber Insurance - RalphGilot - Embry-Riddle Aeronautical University.pptx
 
Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Introduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptxIntroduction to FIDO Authentication and Passkeys.pptx
Introduction to FIDO Authentication and Passkeys.pptx
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptxHarnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
Harnessing Passkeys in the Battle Against AI-Powered Cyber Threats.pptx
 
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
Observability Concepts EVERY Developer Should Know (DevOpsDays Seattle)
 

Getting Started With Managed Backup: Configuration Best Practices

  • 1. Getting Started With MSP360 Managed Backup Configuration and Best Practices January 11th, 2024
  • 2. ● Introduction to MSP360 Managed Backup ● Configuration Best Practices ● Backup Scheduling ● Monitoring and Reporting ● Recovery and Restore ● Q&A Agenda
  • 3. ● Reliable ● Secure ● Scalable ● Easy to use ● Cost effective ● Backup any data anywhere What is Managed Backup?
  • 5. ● The ultimate insurance policy ● Ransomware protection ● Peace of mind ● Cost efficient ● Smooth restorations ● Uninterrupted business processes The Importance of a Well Configured Backup
  • 6. ● Download directly to the computer - classic, but not scalable ● Send link to the users via email - not very convenient, and requires other people to do it ● Windows GPO script - not all computers belong to a domain ● PowerShell script - needs RMM ● Network Discovery and Deployment - can work everywhere! very easy and fast ● Install other MSP360 products from the single- pane-of-glass - no need to go through the installation again Easy start with MSP360
  • 7. ● Create backup plans with Managed Console - no need to connect to the endpoints ● Backup templates - create one golden image and then spread it across computers in a second ● System Engineer Assistance and Onboarding service Easy start with MSP360
  • 8. ● Key configuration parameters for Managed Backup ○ What to backup? ○ Where to backup? ○ How often to backup? ○ How long to store? ● Server and client setup ○ Use combo of File and Image-Based backups ● Considerations for different environments ○ 3-2-1 backup rule ○ Back up what you really need to restore Configuration Best Practices
  • 9. ● The importance of backup scheduling - defined by RPO ● How to setup automated backup scheduling ○ Forever Forward Incremental ■ Saves up to 50% storage space ○ Recurring Incremental + Periodical Full ■ otherwise you keep backups Backup Scheduling
  • 10. Backup Retention ● Storage cost depends on the backup retention ● Different cases require different retention ○ Accidental deletion - 1 week ○ Ransomware - 1 month ○ Compliancy - up to 7 years ● Use immutability
  • 11. ● Full backup is not scheduled ● Retention policy is not configured ● Storage specifications (early deletion fee) Common Pitfalls to Avoid
  • 12. ● Successful restore: ○ Ensure the system has enough space to restore ○ Verify a stable connection ○ Restore only what you need first ○ Control the progress ○ Enable email notifications Recovery and Restore
  • 13. ● Always test your backups ● Develop your documentation ● Enable email or push notifications ● Use lifecycle rules where applicable ● Periodically review settings of the plans ● Always use the latest version of the Agent Tips For Successful Backup Management
  • 14. Q&A