SlideShare a Scribd company logo
Direct-SAN-Access with CBT (80x Faster)
Built-in Compression and Deduplication
Compressed/
De-duplicated
Backup File
VMware vPowerTM
vPower NFS
Backup StorageVMWare DataStores
Within 3 minutes!
Storage vMotion
Compressed/
De-duplicated
Backup File
VMware vPowerTM
Backup Storage
VM
OS
App
Report
Verification Job
VMWare DataStores
Production Network Isolated Network
Proxy
Veeam Backup Proxy
• IP
masquerading
• DHCP Server
• Multiple NIC’s
• Internet Access
• Manual IP or
DHCP
• Linux Proxy
AIR Wizard
vPower NFS
Compressed/
De-duplicated
Backup File
Backup Storage
vPowerTM
VMWare DataStores
VMware
Traditional Requirements:
 Expensive Agents
 Staging Area for back-up extracts.
Traditional Steps:
1. Find backup file storing EDB restore point.
2. Check for a drive with sufficient disk space for the restore. The available
space must be at least the size of the Exchange IS.
3. On the target drive, create a folder called: Exchange Restore.
4. Open “insert well-known competitor name here”, and go to Devices. Right-
click Backup-to-Disk Folders, and choose: New Backup-to-Disk Folder.
Give it the name: Exchange Restore, and point it to the target drive and
folder. Click OK.
5. Go to Job Setup, select the job that runs for the site, and under Backup
Tasks, choose: New job to duplicate backup sets. Choose OK.
6. Browse the server concerned, and under Microsoft Information
Store, choose the Information Store you want to stage to disk. You need to
select the date/media.
7. Choose the new Backup-to-Disk folder created for this purpose, and click
Run Now. Let the job complete.
8. Make a note of the name of the image created by this job (Devices -->
Backup-to-Disk Folders --> Exchange Restore).
9. Click the Restore tab in GUI. When the “Welcome to the Restore Wizard”
screen shows, deselect the tab to “Always launch the Restore Wizard from
the Restore Button”, and click Next.
10. Under Selections, choose View by Media, and chose the image created in
the duplication job.
11. Find the user’s mailbox that needs to be restored, open the mailbox, and
click Top of Information Store.
12. From here, individual emails, contacts and folders can be restored.
13. Select what needs to be restored.
14. Click Resource Credentials, and then Test All to make sure that the
security credentials are correct,
15. Click Run Now.
16. Go to Job Monitor, and the job should run successfully.
Production Site DR Site
NEW LUN
• Filter:
• Zero Blocks
• Duplicate Blocks
• Page File Blocks
• Compress
• Optimize
Re-IP
Re-vSwitch
• Failover
• Fail Back to Production
• Undo Failover
• Permanent Failover
Get Veeam
in the lab!
Veeam presentation
Veeam presentation
Veeam presentation
Veeam presentation
Veeam presentation
Veeam presentation

More Related Content

What's hot

03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
hunny garg
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
Madhu Bala
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
Tehmina Gulfam
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
Jennifer Graham
 
NetApp & Storage fundamentals
NetApp & Storage fundamentalsNetApp & Storage fundamentals
NetApp & Storage fundamentals
Shashidhar Basavaraju
 
VMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project PresentationVMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project Presentation
Rabbah Adel Ammar
 
Emc isilon overview
Emc isilon overview Emc isilon overview
Emc isilon overview
solarisyougood
 
Managing ESXi - Tools and Techniques
Managing ESXi - Tools and TechniquesManaging ESXi - Tools and Techniques
Managing ESXi - Tools and Techniques
Christopher Janoch
 
Veeam backup and replication
Veeam backup and replicationVeeam backup and replication
Veeam backup and replication
bluechipper
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
Lahiru Danushka
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
Henry Osborne
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
mrscjrobertson
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
Muhammad Ahad
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
Andrey Karpov
 
Veritas Managed Backup Services Presentation
Veritas Managed Backup Services PresentationVeritas Managed Backup Services Presentation
Veritas Managed Backup Services Presentation
Ideba
 
Nutanix
NutanixNutanix
Nutanix
rosslili
 
White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview   White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview
EMC
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
Rakesh Kadu
 
Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage Technology
Lopamudra Das
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
Yogeshwaran R
 

What's hot (20)

03 backup-and-recovery
03 backup-and-recovery03 backup-and-recovery
03 backup-and-recovery
 
VMware Overview
VMware OverviewVMware Overview
VMware Overview
 
Presentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyyPresentation on backup and recoveryyyyyyyyyyyyy
Presentation on backup and recoveryyyyyyyyyyyyy
 
Vce vxrail-customer-presentation new
Vce vxrail-customer-presentation newVce vxrail-customer-presentation new
Vce vxrail-customer-presentation new
 
NetApp & Storage fundamentals
NetApp & Storage fundamentalsNetApp & Storage fundamentals
NetApp & Storage fundamentals
 
VMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project PresentationVMware Vsphere Graduation Project Presentation
VMware Vsphere Graduation Project Presentation
 
Emc isilon overview
Emc isilon overview Emc isilon overview
Emc isilon overview
 
Managing ESXi - Tools and Techniques
Managing ESXi - Tools and TechniquesManaging ESXi - Tools and Techniques
Managing ESXi - Tools and Techniques
 
Veeam backup and replication
Veeam backup and replicationVeeam backup and replication
Veeam backup and replication
 
Virtual Machines - Virtual Box
Virtual Machines  - Virtual BoxVirtual Machines  - Virtual Box
Virtual Machines - Virtual Box
 
Disk and File System Management in Linux
Disk and File System Management in LinuxDisk and File System Management in Linux
Disk and File System Management in Linux
 
Backup strategy
Backup strategyBackup strategy
Backup strategy
 
10. compute-part-1
10. compute-part-110. compute-part-1
10. compute-part-1
 
Hpe Data Protector installation guide
Hpe Data Protector installation guideHpe Data Protector installation guide
Hpe Data Protector installation guide
 
Veritas Managed Backup Services Presentation
Veritas Managed Backup Services PresentationVeritas Managed Backup Services Presentation
Veritas Managed Backup Services Presentation
 
Nutanix
NutanixNutanix
Nutanix
 
White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview   White Paper: EMC Isilon OneFS — A Technical Overview
White Paper: EMC Isilon OneFS — A Technical Overview
 
Storage Management in Linux OS.ppt
Storage Management in Linux OS.pptStorage Management in Linux OS.ppt
Storage Management in Linux OS.ppt
 
Basics of storage Technology
Basics of storage TechnologyBasics of storage Technology
Basics of storage Technology
 
VMWARE ESX
VMWARE ESXVMWARE ESX
VMWARE ESX
 

Similar to Veeam presentation

Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protection
subtitle
 
Using MMS to Build New Environments
Using MMS to Build New EnvironmentsUsing MMS to Build New Environments
Using MMS to Build New Environments
MongoDB
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
Symantec
 
Scale Your Data Tier with Windows Server AppFabric
Scale Your Data Tier with Windows Server AppFabricScale Your Data Tier with Windows Server AppFabric
Scale Your Data Tier with Windows Server AppFabric
Wim Van den Broeck
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
naaaaz
 
Active Directory Security Assessment ADSA
Active Directory Security Assessment ADSAActive Directory Security Assessment ADSA
Active Directory Security Assessment ADSA
Carrie Tran
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
Stephen Rose
 
NTC 324 Enhance teaching - snaptutorial.com
NTC 324  Enhance teaching - snaptutorial.comNTC 324  Enhance teaching - snaptutorial.com
NTC 324 Enhance teaching - snaptutorial.com
DavisMurphyA65
 
The Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup ExperiencesThe Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup Experiences
glbsolutions
 
Cis 206 i lab 2 backing up and restoring data
Cis 206 i lab 2 backing up and restoring dataCis 206 i lab 2 backing up and restoring data
Cis 206 i lab 2 backing up and restoring data
acece556
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
Symantec
 
WordPress Development Environments
WordPress Development Environments WordPress Development Environments
WordPress Development Environments
Ohad Raz
 
Manual 70-410 _Yves
Manual 70-410 _YvesManual 70-410 _Yves
Manual 70-410 _Yves
Yves Mukusa
 
3 Ways to Expand a Virtual Disk in VMware or VirtualBox
3 Ways to Expand a Virtual Disk in VMware or VirtualBox3 Ways to Expand a Virtual Disk in VMware or VirtualBox
3 Ways to Expand a Virtual Disk in VMware or VirtualBox
Dash Milly
 
Epm 1 2_2_instl_config
Epm 1 2_2_instl_configEpm 1 2_2_instl_config
Epm 1 2_2_instl_config
Deeksha Gupta
 
John Heeder user guide sample 2
John Heeder user guide sample 2John Heeder user guide sample 2
John Heeder user guide sample 2
John Heeder
 
BP501 - Building and deploying custom IBM sametime connect client installatio...
BP501 - Building and deploying custom IBM sametime connect client installatio...BP501 - Building and deploying custom IBM sametime connect client installatio...
BP501 - Building and deploying custom IBM sametime connect client installatio...
Carl Tyler
 
system state backup restore
system state backup restoresystem state backup restore
system state backup restore
ssuser1eca7d
 
ABCs of docker
ABCs of dockerABCs of docker
ABCs of docker
Sabyrzhan Tynybayev
 
000 252
000 252000 252
000 252
ambrevan87
 

Similar to Veeam presentation (20)

Modern Data Protection
Modern Data ProtectionModern Data Protection
Modern Data Protection
 
Using MMS to Build New Environments
Using MMS to Build New EnvironmentsUsing MMS to Build New Environments
Using MMS to Build New Environments
 
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
A Step-By-Step Disaster Recovery Blueprint & Best Practices for Your NetBacku...
 
Scale Your Data Tier with Windows Server AppFabric
Scale Your Data Tier with Windows Server AppFabricScale Your Data Tier with Windows Server AppFabric
Scale Your Data Tier with Windows Server AppFabric
 
rgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab recordrgpv 7th sem for it & cs Cloud computing lab record
rgpv 7th sem for it & cs Cloud computing lab record
 
Active Directory Security Assessment ADSA
Active Directory Security Assessment ADSAActive Directory Security Assessment ADSA
Active Directory Security Assessment ADSA
 
Sdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint FinalSdwest2008 V101 F Dpowerpoint Final
Sdwest2008 V101 F Dpowerpoint Final
 
NTC 324 Enhance teaching - snaptutorial.com
NTC 324  Enhance teaching - snaptutorial.comNTC 324  Enhance teaching - snaptutorial.com
NTC 324 Enhance teaching - snaptutorial.com
 
The Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup ExperiencesThe Pensions Trust - VM Backup Experiences
The Pensions Trust - VM Backup Experiences
 
Cis 206 i lab 2 backing up and restoring data
Cis 206 i lab 2 backing up and restoring dataCis 206 i lab 2 backing up and restoring data
Cis 206 i lab 2 backing up and restoring data
 
NetBackup Appliance Family presentation
NetBackup Appliance Family presentationNetBackup Appliance Family presentation
NetBackup Appliance Family presentation
 
WordPress Development Environments
WordPress Development Environments WordPress Development Environments
WordPress Development Environments
 
Manual 70-410 _Yves
Manual 70-410 _YvesManual 70-410 _Yves
Manual 70-410 _Yves
 
3 Ways to Expand a Virtual Disk in VMware or VirtualBox
3 Ways to Expand a Virtual Disk in VMware or VirtualBox3 Ways to Expand a Virtual Disk in VMware or VirtualBox
3 Ways to Expand a Virtual Disk in VMware or VirtualBox
 
Epm 1 2_2_instl_config
Epm 1 2_2_instl_configEpm 1 2_2_instl_config
Epm 1 2_2_instl_config
 
John Heeder user guide sample 2
John Heeder user guide sample 2John Heeder user guide sample 2
John Heeder user guide sample 2
 
BP501 - Building and deploying custom IBM sametime connect client installatio...
BP501 - Building and deploying custom IBM sametime connect client installatio...BP501 - Building and deploying custom IBM sametime connect client installatio...
BP501 - Building and deploying custom IBM sametime connect client installatio...
 
system state backup restore
system state backup restoresystem state backup restore
system state backup restore
 
ABCs of docker
ABCs of dockerABCs of docker
ABCs of docker
 
000 252
000 252000 252
000 252
 

More from dvmug1

V mware
V mwareV mware
V mware
dvmug1
 
S3
S3S3
S3
dvmug1
 
Hp
HpHp
Hp
dvmug1
 
E g innovations
E g innovationsE g innovations
E g innovations
dvmug1
 
Nimble storage
Nimble storageNimble storage
Nimble storage
dvmug1
 
Andrew bettany slides
Andrew bettany slidesAndrew bettany slides
Andrew bettany slides
dvmug1
 
10 zig
10 zig10 zig
10 zig
dvmug1
 
Vmug azure vm_chris guestslides
Vmug azure vm_chris guestslidesVmug azure vm_chris guestslides
Vmug azure vm_chris guestslides
dvmug1
 
Freeform dynamics
Freeform dynamicsFreeform dynamics
Freeform dynamics
dvmug1
 
10 zig presentation
10 zig presentation10 zig presentation
10 zig presentation
dvmug1
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
dvmug1
 

More from dvmug1 (12)

V mware
V mwareV mware
V mware
 
S3
S3S3
S3
 
Hp
HpHp
Hp
 
E g innovations
E g innovationsE g innovations
E g innovations
 
Nimble storage
Nimble storageNimble storage
Nimble storage
 
Andrew bettany slides
Andrew bettany slidesAndrew bettany slides
Andrew bettany slides
 
10 zig
10 zig10 zig
10 zig
 
Vmug azure vm_chris guestslides
Vmug azure vm_chris guestslidesVmug azure vm_chris guestslides
Vmug azure vm_chris guestslides
 
Freeform dynamics
Freeform dynamicsFreeform dynamics
Freeform dynamics
 
10 zig presentation
10 zig presentation10 zig presentation
10 zig presentation
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 
Vmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicroVmug birmingham mar2013 trendmicro
Vmug birmingham mar2013 trendmicro
 

Recently uploaded

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
TIPNGVN2
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
Data structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdfData structures and Algorithms in Python.pdf
Data structures and Algorithms in Python.pdf
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 

Veeam presentation

  • 1.
  • 2.
  • 3.
  • 4.
  • 5.
  • 6.
  • 7.
  • 8.
  • 9. Direct-SAN-Access with CBT (80x Faster) Built-in Compression and Deduplication
  • 10.
  • 11.
  • 12. Compressed/ De-duplicated Backup File VMware vPowerTM vPower NFS Backup StorageVMWare DataStores Within 3 minutes! Storage vMotion
  • 13. Compressed/ De-duplicated Backup File VMware vPowerTM Backup Storage VM OS App Report Verification Job VMWare DataStores
  • 14. Production Network Isolated Network Proxy Veeam Backup Proxy • IP masquerading • DHCP Server • Multiple NIC’s • Internet Access • Manual IP or DHCP • Linux Proxy AIR Wizard vPower NFS Compressed/ De-duplicated Backup File Backup Storage vPowerTM VMWare DataStores VMware
  • 15.
  • 16. Traditional Requirements:  Expensive Agents  Staging Area for back-up extracts. Traditional Steps: 1. Find backup file storing EDB restore point. 2. Check for a drive with sufficient disk space for the restore. The available space must be at least the size of the Exchange IS. 3. On the target drive, create a folder called: Exchange Restore. 4. Open “insert well-known competitor name here”, and go to Devices. Right- click Backup-to-Disk Folders, and choose: New Backup-to-Disk Folder. Give it the name: Exchange Restore, and point it to the target drive and folder. Click OK. 5. Go to Job Setup, select the job that runs for the site, and under Backup Tasks, choose: New job to duplicate backup sets. Choose OK. 6. Browse the server concerned, and under Microsoft Information Store, choose the Information Store you want to stage to disk. You need to select the date/media. 7. Choose the new Backup-to-Disk folder created for this purpose, and click Run Now. Let the job complete. 8. Make a note of the name of the image created by this job (Devices --> Backup-to-Disk Folders --> Exchange Restore). 9. Click the Restore tab in GUI. When the “Welcome to the Restore Wizard” screen shows, deselect the tab to “Always launch the Restore Wizard from the Restore Button”, and click Next. 10. Under Selections, choose View by Media, and chose the image created in the duplication job. 11. Find the user’s mailbox that needs to be restored, open the mailbox, and click Top of Information Store. 12. From here, individual emails, contacts and folders can be restored. 13. Select what needs to be restored. 14. Click Resource Credentials, and then Test All to make sure that the security credentials are correct, 15. Click Run Now. 16. Go to Job Monitor, and the job should run successfully.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21. Production Site DR Site NEW LUN • Filter: • Zero Blocks • Duplicate Blocks • Page File Blocks • Compress • Optimize Re-IP Re-vSwitch • Failover • Fail Back to Production • Undo Failover • Permanent Failover
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.

Editor's Notes

  1. 20130129 r1
  2. Additional source: 2008 Trends in Backup and Data Protection; April 2, 2008; Forrester Research, Inc.
  3. Source: Why we’re still resisting virtual backup best practices; November 8, 2010; http://itknowledgeexchange.techtarget.com/server-virtualization/why-were-still-resisting-virtual-backup-best-practices/