Module 12
Implementing Business Continuity
and Disaster Recovery
Module Overview
• Data Protection Overview
• Implementing Windows Server Backup
• Implementing Server and Data Recovery
Lesson 1: Data Protection Overview
• Identifying Recovery Requirements
• What Are Service Level Agreements?
• Overview of Enterprise Data Protection Strategies
• Mitigation Strategies
• Best Practices when Implementing a Data
Protection Strategy
Identifying Recovery Requirements
1. Defining organization critical resources
2. Identifying risks associated with those critical
resources
3. Identifying the time needed to complete the recovery
4. Developing a protection strategy
Identify your data protection options by:
What Are Service Level Agreements?
SLAs define responsibilities of the service
provider
SLA components include:
• Hours of operation
• Service availability
• RPO and RTO
• Retention objectives
• System performance
Overview of Enterprise Data Protection
Strategies
You need strategies for recovering:
• Data
• Services
• Servers
• Sites
• Offsite backups
Mitigation Strategies
Problem Mitigation strategy
The media where a copy of the
backup data is store becomes
corrupted
Have at least two copies of your
backup data
An administrator has accidentally
deleted an OU that contains many
user and computer objects
Protect OUs from accidental
deletion, especially after
migrations
A server in a branch office where
important files are located has
failed
Use DFS Replication to replicate
files from branch offices to central
data centers
The virtualization infrastructure
where business servers are located
is unavailable
Avoid deploying all critical servers,
such as domain controllers, on the
same virtual infrastructure
A major outage in a data center
has occurred
Deploy a secondary data center
that will contain replicas of most of
the critical servers in your primary
data center
Best Practices when Implementing a Data
Protection Strategy
To implement a data protection strategy , you should:
• Perform a risk assessment plan
• Discuss the risks you evaluated with your business managers, and
create a data protection strategy and disaster mitigation strategy
• Ensure that each organization has its own data protection plan
• Document all steps that should be performed in a recovery
scenario
• Test your recovery plan on regular basis, in an isolated, non-
production environment.
• Evaluate your data protection strategy on a regular basis, and
update your data protection strategy depending on your
evaluation outcome
Lesson 2: Implementing Windows Server Backup
• What Needs to Be Backed Up?
• Backup Types
• Backup Technologies
• Planning Backup Capacity
• Planning Backup Security
• What Is Windows Server Backup?
• Demonstration: Configuring a Scheduled Backup
• What Is Windows Azure Backup?
• Considerations for an Enterprise Backup Solution
• What Is Data Protection Manager?
What Needs to Be Backed Up?
When planning your backup strategy, ensure that you:
• Determine the critical resources
• Verify your backups
• Confirm that backups are secure
• Ensure that compliance and regulatory responsibilities are
met
Backup Types
•A full backup is a block-level replica of all blocks
on all the server’s volumes
•An incremental backup is a copy of only those
blocks that have changed since the last full or
incremental backup
Backup Technologies
•The VSS backup technology solves data
consistency issues by creating shadow copies
•You can also use streaming backups for older
applications that are not VSS-aware
•Hyper-V replica provides you with a disaster
recovery option by replicating a consistent copy
of a virtual machine to another server or site.
Planning Backup Capacity
When planning for backup capacity, consider the
following:
• Space requirements for a full backup
• Space requirements for an incremental backup
• Amount of time required to back up
• Backup frequency
• Backup retention
Planning Backup Security
When planning your backup security, consider
the following:
• Backups contain all organizational data
• Access to backup media means access to all data
• Windows Server Backup does not encrypt backups
• Keep backup media in a secure location
What Is Windows Server Backup?
You can use Windows Server Backup to:
• Back up full server (all volumes)
• Back up selected volumes
• Back up selected items
• Perform a bare-metal recovery
• Perform a system state
• Back up individual files and folders
• Exclude selected files or file types during backup
• Select from more storage locations for the backup
Demonstration: Configuring a Scheduled Backup
In this demonstration, you will see how to
configure Windows Server Backup to perform a
scheduled backup of specific folders that
includes a filter to exclude specific file types
Considerations for an Enterprise Backup Solution
Considerations for an enterprise backup solution
are:
• What is the theoretical RPO of the product?
• How quick is RTO recovery?
• Does the solution provide centralized backup?
• Is the solution supported by vendors?
• What is the recovery point capacity?
What Is Data Protection Manager?
DPM:
• Allows you to centralize backups
• Offers 15-minute snapshots of servers and clients
• Can store backup data on SANs and export to tape
• Can back up remote sites
• Can be used as part of a backup-to-cloud strategy
• Supports Microsoft products
Lesson 3: Implementing Server and Data
Recovery
• Options for Server Recovery
• Options for Server Restore with Windows RE
• Options for Data Recovery
• Demonstration: Using Windows Server Backup to
Restore a Folder
• Restoring with Windows Azure Backup
Options for Server Recovery
The options for server recovery include:
• Files and folders
• Applications and data
• Volumes
• Operating system
• Full server
• System state
• BCDEdit allows you to edit the BCD Store to modify
boot options
• Safe mode boots computer with minimal services and
drivers
• Last known good configuration is the most recent set of
driver and registry settings from a successful startup.
Options for Server Restore with Windows RE
•Windows RE allows you to recover server
images or volumes from local disk or network
share
You can enter Windows RE, when:
• You boot from install media
• You press F8
• Successive boot failures or unexpected shutdowns
occur
Options for Data Recovery
The four options for recovering data include:
• Allowing users to recover their own data
• Recovering data to an alternate location
• Recovering data to the original location
• Performing a full volume recovery
Demonstration: Using Windows Server Backup
to Restore a Folder
In this demonstration, you will see how to use
the Recovery Wizard to restore a folder
Restoring with Windows Azure Backup
When restoring files by using Windows Azure Online
Backup, perform the following steps:
1. Select the server
2. Locate the files you want to recover from backup
3. Choose the restore location
4. Select an option for copy creation
Restore
Lab: Implementing Windows Server Backup and
Restore
• Exercise 1: Backing Up Data on a Windows Server
2012 R2 Server
• Exercise 2: Restoring Files Using Windows Server
Backup
Logon Information
Virtual machines: 20412C-LON-DC1,
20412C-LON-SVR1
User name AdatumAdministrator
Password: Pa$$w0rd
Estimated Time: 60 minutes
Lab Scenario
Much of the data that is stored on the A. Datum
Corporation’s network is extremely valuable to the
organization. Losing this data would be a significant loss
to the organization. Additionally, many of the servers that
are running on the network provide extremely valuable
services for the organization, which means that losing
these servers for a significant time would also result in
losses to the organization. Because of the significance of
the data and services, it is critical that they can be restored
in the event of disaster. A. Datum is considering backing
up critical data to a cloud-based service. A. Datum is also
considering this as an option for small branch offices that
do not have a full data center infrastructure.
Lab Scenario
As one of the senior network administrators at A. Datum,
you are responsible for planning and implementing a data-
protection solution that will ensure that critical data and
services can be recovered in the event of any type of failure.
You need to implement a backup-and-restore process that
can recover lost data and services.
Lab Review
• You are concerned about business-critical data
that is located on your company's servers. You
want to perform backups every day, but not
during business hours. What should you do?
• Users report that they can no longer access data
that is located on the server. You connect to the
server, and you realize that the shared folder
where users were accessing data is missing. What
should you do?

MCSA 70-412 Chapter 12

  • 1.
    Module 12 Implementing BusinessContinuity and Disaster Recovery
  • 2.
    Module Overview • DataProtection Overview • Implementing Windows Server Backup • Implementing Server and Data Recovery
  • 3.
    Lesson 1: DataProtection Overview • Identifying Recovery Requirements • What Are Service Level Agreements? • Overview of Enterprise Data Protection Strategies • Mitigation Strategies • Best Practices when Implementing a Data Protection Strategy
  • 4.
    Identifying Recovery Requirements 1.Defining organization critical resources 2. Identifying risks associated with those critical resources 3. Identifying the time needed to complete the recovery 4. Developing a protection strategy Identify your data protection options by:
  • 5.
    What Are ServiceLevel Agreements? SLAs define responsibilities of the service provider SLA components include: • Hours of operation • Service availability • RPO and RTO • Retention objectives • System performance
  • 6.
    Overview of EnterpriseData Protection Strategies You need strategies for recovering: • Data • Services • Servers • Sites • Offsite backups
  • 7.
    Mitigation Strategies Problem Mitigationstrategy The media where a copy of the backup data is store becomes corrupted Have at least two copies of your backup data An administrator has accidentally deleted an OU that contains many user and computer objects Protect OUs from accidental deletion, especially after migrations A server in a branch office where important files are located has failed Use DFS Replication to replicate files from branch offices to central data centers The virtualization infrastructure where business servers are located is unavailable Avoid deploying all critical servers, such as domain controllers, on the same virtual infrastructure A major outage in a data center has occurred Deploy a secondary data center that will contain replicas of most of the critical servers in your primary data center
  • 8.
    Best Practices whenImplementing a Data Protection Strategy To implement a data protection strategy , you should: • Perform a risk assessment plan • Discuss the risks you evaluated with your business managers, and create a data protection strategy and disaster mitigation strategy • Ensure that each organization has its own data protection plan • Document all steps that should be performed in a recovery scenario • Test your recovery plan on regular basis, in an isolated, non- production environment. • Evaluate your data protection strategy on a regular basis, and update your data protection strategy depending on your evaluation outcome
  • 9.
    Lesson 2: ImplementingWindows Server Backup • What Needs to Be Backed Up? • Backup Types • Backup Technologies • Planning Backup Capacity • Planning Backup Security • What Is Windows Server Backup? • Demonstration: Configuring a Scheduled Backup • What Is Windows Azure Backup? • Considerations for an Enterprise Backup Solution • What Is Data Protection Manager?
  • 10.
    What Needs toBe Backed Up? When planning your backup strategy, ensure that you: • Determine the critical resources • Verify your backups • Confirm that backups are secure • Ensure that compliance and regulatory responsibilities are met
  • 11.
    Backup Types •A fullbackup is a block-level replica of all blocks on all the server’s volumes •An incremental backup is a copy of only those blocks that have changed since the last full or incremental backup
  • 12.
    Backup Technologies •The VSSbackup technology solves data consistency issues by creating shadow copies •You can also use streaming backups for older applications that are not VSS-aware •Hyper-V replica provides you with a disaster recovery option by replicating a consistent copy of a virtual machine to another server or site.
  • 13.
    Planning Backup Capacity Whenplanning for backup capacity, consider the following: • Space requirements for a full backup • Space requirements for an incremental backup • Amount of time required to back up • Backup frequency • Backup retention
  • 14.
    Planning Backup Security Whenplanning your backup security, consider the following: • Backups contain all organizational data • Access to backup media means access to all data • Windows Server Backup does not encrypt backups • Keep backup media in a secure location
  • 15.
    What Is WindowsServer Backup? You can use Windows Server Backup to: • Back up full server (all volumes) • Back up selected volumes • Back up selected items • Perform a bare-metal recovery • Perform a system state • Back up individual files and folders • Exclude selected files or file types during backup • Select from more storage locations for the backup
  • 16.
    Demonstration: Configuring aScheduled Backup In this demonstration, you will see how to configure Windows Server Backup to perform a scheduled backup of specific folders that includes a filter to exclude specific file types
  • 17.
    Considerations for anEnterprise Backup Solution Considerations for an enterprise backup solution are: • What is the theoretical RPO of the product? • How quick is RTO recovery? • Does the solution provide centralized backup? • Is the solution supported by vendors? • What is the recovery point capacity?
  • 18.
    What Is DataProtection Manager? DPM: • Allows you to centralize backups • Offers 15-minute snapshots of servers and clients • Can store backup data on SANs and export to tape • Can back up remote sites • Can be used as part of a backup-to-cloud strategy • Supports Microsoft products
  • 19.
    Lesson 3: ImplementingServer and Data Recovery • Options for Server Recovery • Options for Server Restore with Windows RE • Options for Data Recovery • Demonstration: Using Windows Server Backup to Restore a Folder • Restoring with Windows Azure Backup
  • 20.
    Options for ServerRecovery The options for server recovery include: • Files and folders • Applications and data • Volumes • Operating system • Full server • System state • BCDEdit allows you to edit the BCD Store to modify boot options • Safe mode boots computer with minimal services and drivers • Last known good configuration is the most recent set of driver and registry settings from a successful startup.
  • 21.
    Options for ServerRestore with Windows RE •Windows RE allows you to recover server images or volumes from local disk or network share You can enter Windows RE, when: • You boot from install media • You press F8 • Successive boot failures or unexpected shutdowns occur
  • 22.
    Options for DataRecovery The four options for recovering data include: • Allowing users to recover their own data • Recovering data to an alternate location • Recovering data to the original location • Performing a full volume recovery
  • 23.
    Demonstration: Using WindowsServer Backup to Restore a Folder In this demonstration, you will see how to use the Recovery Wizard to restore a folder
  • 24.
    Restoring with WindowsAzure Backup When restoring files by using Windows Azure Online Backup, perform the following steps: 1. Select the server 2. Locate the files you want to recover from backup 3. Choose the restore location 4. Select an option for copy creation Restore
  • 25.
    Lab: Implementing WindowsServer Backup and Restore • Exercise 1: Backing Up Data on a Windows Server 2012 R2 Server • Exercise 2: Restoring Files Using Windows Server Backup Logon Information Virtual machines: 20412C-LON-DC1, 20412C-LON-SVR1 User name AdatumAdministrator Password: Pa$$w0rd Estimated Time: 60 minutes
  • 26.
    Lab Scenario Much ofthe data that is stored on the A. Datum Corporation’s network is extremely valuable to the organization. Losing this data would be a significant loss to the organization. Additionally, many of the servers that are running on the network provide extremely valuable services for the organization, which means that losing these servers for a significant time would also result in losses to the organization. Because of the significance of the data and services, it is critical that they can be restored in the event of disaster. A. Datum is considering backing up critical data to a cloud-based service. A. Datum is also considering this as an option for small branch offices that do not have a full data center infrastructure.
  • 27.
    Lab Scenario As oneof the senior network administrators at A. Datum, you are responsible for planning and implementing a data- protection solution that will ensure that critical data and services can be recovered in the event of any type of failure. You need to implement a backup-and-restore process that can recover lost data and services.
  • 28.
    Lab Review • Youare concerned about business-critical data that is located on your company's servers. You want to perform backups every day, but not during business hours. What should you do? • Users report that they can no longer access data that is located on the server. You connect to the server, and you realize that the shared folder where users were accessing data is missing. What should you do?

Editor's Notes

  • #2 Presentation: 60 minutes  Lab: 60 minutes After completing this module, the students will be able to: Describe recovery solutions. Implement the Windows Server Backup feature in Windows Server® 2012 R2. Implement server and data recovery. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 20412C_12.pptx. Important: We recommend that you use Office PowerPoint 2007 or newer to display the slides for this course. If you use PowerPoint Viewer or an earlier version of Office PowerPoint, some features of the slides might not display correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations. Practice performing the labs. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. As you prepare for this class, it is imperative that you complete the labs yourself so that you understand how they work, and the concepts that are covered in each. This will allow you to provide meaningful hints to students who may get stuck in a lab, and it also will help guide your lecture to ensure that you cover the concepts that the labs cover.
  • #3 Briefly describe the module content.
  • #4 Mention the importance of data for every organization. Data has to be manually created, and unless it is protected properly, must be recreated in the same manner in which it was generated. Stress that if data is not properly protected, it can be lost forever, which may lead to negative implications such as companies losing their customers or even their business. Explain that data protection is a methodology, and that based on specific needs, organizations will develop different data protection strategies.
  • #5 Explain each of the steps that you use to identify you data protection options, and include multiple examples of the resources that could be considered critical for organizations. Mention that defining critical resources involves not only IT employees, but also business managers and other high-level decision makers. Business managers should also be introduced to the risks process, and they should understand how any failure can impact business. Business managers also need to decide which applications are critical for their business. Decision makers will decide about recovery times, which will help IT employees develop data protection strategies.
  • #6 Discuss service level agreement (SLA) components, and ask the students to share their opinions about how these components should be implemented in organizations.
  • #7 Discuss the different types of enterprise data protection strategies. Focus on different strategies for small, medium, and large organizations. Ask the students how they would design different data protection strategies for different types of organizations.
  • #8 Analyze the mitigation strategies for different scenarios. Invite the students to share their opinions or suggestions about mitigation strategies that differ from the ones that are listed on the slide.
  • #9 Invite the students to discuss data protection best practices. Stress the importance of planning, even if an organization has never experienced a disaster.
  • #10 Describe the importance of backup. Emphasize the need for backups, because backups are the only way that you can bring data back if there is data loss. Stress that before they start backing up data, the students must define critical data that has to be backed up, such as infrastructure services—,including Dynamic Host Configuration Protocol (DHCP), Domain Name System (DNS), and Active Directory® Domain Services (AD DS)—and company critical data, including file servers, Microsoft SQL Server® databases, and Microsoft Exchange Server® databases.
  • #11 Discuss the following questions with the students: How do you determine which servers that you need to back up when you have limited resources? How do you determine which data is critical, how often it needs to be backed up, and how long it needs to be kept? How do you verify that data is backed up correctly? How often do you perform recovery testing? How do you align compliance and regulatory requirements with the technical capabilities of your backup solution? Familiarize yourself with the legal requirements of the country in which you are teaching this course, and/or perhaps the requirements of the industries in which the students work.
  • #12 Explain to the students that a full backup reproduces all of the hard-disk blocks on the backup target, while an incremental backup only backs up the blocks that have changed since the last backup. Mention that using incremental backups in this way helps save space compared to file-level incremental backups. Unlike previous versions of Windows Server Backup, where you needed to search for both the full and incremental backups, the new Windows Server Backup version stores all backups in the same location. By default, more organizations perform full backups followed by incremental backups. Windows Server Backup requires a full backup every 14 days for automatic backups. The process is automated, so you do not choose to do one backup type or the other. Manual backups are always full backups. You can perform full restores from any combination of full and incremental backups.
  • #13 Explain that there are different types of backup technologies developed by Microsoft and other vendors. There are also different types of backup hardware.
  • #14 Explain that you must balance the cost to back up everything with the cost of recovery if failure occurs. Discuss the following considerations: Amount of space dedicated to backup file storage. Discuss total backup capacity and requirements of a daily backup. Amount of space required to store a backup delta. This depends on the change in data over time. Frequent backups means little change, while less frequent backups means more data change. Time required to back up data. Volume shadow copy services (VSS) reduces the time required to back up data by allowing backup snapshots. However, that data still needs to be written to a backup device. How often should backups be performed? Frequent backups require greater capacity, but improve recovery point object (RPO). Ask the students how often backups are taken at their sites. Length of time for which backup should be maintained. How long you must retain backup data influences your backup capacity. Ask the students how long they are currently maintaining backup data at their organizations. You might not need to back up the operating system on every server if you already have standardized procedures for restoring the operating system. However, you likely will want to back up the application and service data, and the configuration that runs on that particular operating system.
  • #15 Discuss the backup security considerations. Ask the students the following questions: How do organizations protect the security of their backup data? How do you control access to backups when users who have access to backups also have access to organizational data, and these users can restore the data from outside the organization? Where are your organization’s backups stored, and how secure is the location? What are your organization’s long-term storage locations?
  • #16  Describe the functionality of Windows Server Backup. Remind the students that Windows Server Backup is a basic backup solution and that it has limitations that are best addressed by deploying an Enterprise backup solution such as Data Protection Manager (DPM), which is covered later in this lesson.
  • #17 Preparation Steps You must have the 20412C-LON-DC1 and 20412C-LON-SVR1 virtual machines running to complete this demonstration. Sign in to the virtual machines as Adatum\Administrator with the password Pa$$w0rd. To prepare for this demonstration, you need to install the Windows Server Backup feature on LON-SVR1. For detailed steps on how to install Windows Server Backup, refer to the Lab Exercise 1, Task 1. Demonstration Steps Switch to LON-SVR1. On LON-SVR1, in the Server Manager, click Tools, and then click Windows Server Backup. Click Local Backup, and then in the Actions pane, click Backup Schedule. In the Backup Schedule Wizard, on the Getting Started page, click Next. On the Select Backup Configuration page, click Custom, and then click Next. On the Select Items for Backup page, click Add Items. Expand Local disk (C:), select the HR Data check box, and then click OK. Click Advanced Settings. Click Add Exclusion, click C:\HR Data\Old HR file.txt, and then click OK. Click OK to close the Advanced Settings dialog box. Click Next. On the Specify Backup Time page, next to Select time of day, select 1:00 AM, and then click Next. On the Specify Destination Type page, click Backup to a shared network folder, and then click Next. Review the warning, and then click OK. On the Specify Remote Shared Folder page, in the Path text box, type \\LON-DC1\Backup, and then click Next.
  • #18 Ensure that the students understand that when they consider the purchase of an advanced enterprise backup solution, their organization needs to factor issues such as RPO, recovery time objective (RTO), centralized backup, and vendor support, with issues such as cost. The cost of protecting data should not exceed the cost to the business of losing that data. If an organization spends $50,000 protecting data that would only cost $30,000 if lost, then they have overinvested in their backup solution. When you look at a backup solution, determine whether the cost of a solution that offers you a better RPO meets your organizational needs. Some products offer up-to-the-minute recovery, but cost substantially more than products that might only be able to recover to the last 15 minutes. Whether that extra cost is worth it depends on organizational constraints and requirements. Questions to ask include: Is central backup required? How will backup be managed at the enterprise? What are the reporting capabilities of the product? Does the solution use approved vendor backup techniques, or undocumented APIs to back up critical software?
  • #19 Discuss these features of the DPM solution: Allows you to centralize backups. Offers 15-minute snapshots of servers and clients. Can store backup data on storage area networks (SANs) and export to tape. Can back up remote sites. Can be used as part of a backup-to-cloud strategy. Supports Microsoft products. DPM does not support non-Microsoft products, so it may be unsuitable for heterogeneous environments in which non-Microsoft workloads are present.
  • #20 Describe the importance of the restore process. Emphasize the importance of documentation and well-defined steps for restore, because organizations’ management will expect critical data to be restored in the shortest time possible. Therefore, having a well-developed restore strategy is important. Stress the importance of testing backup-and-restore procedures, even if no data has ever been lost. Remind the students that procedure testing should be applied in a non-production, test environment. Also, stress that it is very important for administrators to have knowledge of backup software and hardware.
  • #21 Describe the options for server recovery. Describe the scenarios in which you should select each option. Also, instruct the students that they should develop a recovery strategy based on the organization’s business needs. Describe how to use BCDEdit to configure the boot configuration store. Explain that the students might use BCDEdit to create alternate boot entries, change boot order, or enable boot debugging. You can find more information about BCDEdit Command-Line Options on the following TechNet web page: http://go.microsoft.com/fwlink/?LinkID=386646
  • #22 Describe the Windows RE environment and how you can force a computer to start in the Windows RE. Describe the limitations regarding disk size when you perform a server or volume restore.
  • #23 Describe the options for data recovery. Describe the scenarios in which you should select each option for data recovery. You can learn more about Windows RE by consulting the following TechNet web page, Windows Recovery Environment (Windows RE) Technical Reference: http://go.microsoft.com/fwlink/?LinkID=386647.
  • #24 At the end of the demonstration revert 20412C-LON-DC1 and 20412C-LON-SVR1. Preparation Steps You must have the 20412C-LON-DC1 and 20412C-LON-SVR1 virtual machines to complete this demonstration. Sign in on the virtual machines with the username Adatum\Administrator and the password Pa$$word. You must also have completed all previous demonstrations. If you are short on time, you can choose to skip this demonstration. Demonstration Steps On LON-SVR1, open Windows Explorer, browse to drive C, and then delete the HR Data folder. From the Server Manager, start Windows Server Backup, and then click Recover. In the Recovery Wizard, on the Getting Started page, click A backup stored on another location, and then click Next. On the Specify Location Type page, click Remote shared folder, and then click Next. On the Specify Remote Folder page, type \\LON-DC1\Backup, and then click Next. On the Select Backup Date page, click Next. On the Select Recovery Type page, click Next. On the Select Items to Recover page, expand LON-SVR1, click Local Disk (C:) drive, and in the right pane, click HR Data, and then click Next. On the Specify Recovery Options page, under Another Location, type C:\, and then click Next. On the Confirmation page, click Recover. On the Recovery Progress page, click Close. In Windows Explorer, browse to drive C, and ensure that the HR Data folder is restored.
  • #25 Describe the steps the students would use to restore files by using Windows Azure Backup. Discuss the scenarios in which it would be more appropriate to perform restores by using an online solution rather than storing backup media onsite.
  • #26 Exercise 1: Backing Up Data on a Windows Server 2012 R2 Server The LON-SVR1 server contains financial data that must be backed up on a regular basis. This data is critical to the organization. You decided to use Windows Server Backup to back up critical data. You will to install this feature and configure scheduled backups. Instructor Note: Explain that the lab scenario is just for classroom purposes and that typically, the students would usually not store backup files on a domain controller. During this exercise, discuss real-world scenarios that would include dedicated backup servers, different backup media and hardware, and different backup strategies. You might also discuss a scenario in which organizations are backed up locally using a Microsoft-supported backup tool, and then the backups are further backed up by using the corporate backup tool. This scenario provides the benefit that a server can be restored quickly if the backup volume is still working. Exercise 2: Restoring Files Using Windows Server Backup To ensure that the financial data can be restored, you must validate the procedure for restoring the data to an alternate location.
  • #29 Question You are concerned about business-critical data that is located on your company's servers. You want to perform backups every day, but not during business hours. What should you do? Answer You should perform a scheduled backup that runs every day after business hours, for example at 1 A.M. Question Users report that they can no longer access data that is located on the server. You connect to the server, and you realize that the shared folder where users were accessing data is missing. What should you do? Answer You should restore the folder by using Windows Server Backup.