Backup Exec 15 provides powerful data protection for VMware environments through three key capabilities:
1. It integrates directly with VMware vSphere through the vStorage APIs, allowing for high-performance full, differential, and incremental backups of virtual machines without requiring agents inside the VMs or a proxy server.
2. From a single backup, it allows recovery of an entire virtual machine, individual files and folders within VMs, or applications and application objects through granular recovery technology.
3. It utilizes various storage optimization techniques including block-level deduplication, changed block tracking, and block-level optimization to reduce backup storage requirements and backup times for virtual machine data.
The values of server virtualization are well understood today. Customers implement
server virtualization to increase server utilization, handle peak loads efficiently,
decrease total cost of ownership (TCO), and streamline server landscapes.
Similarly, storage virtualization helps to address the same challenges as server
virtualization. Storage virtualization also expands beyond the boundaries of physical
resources and helps to control how IT infrastructures adjust to rapidly changing
business demands. Storage virtualization benefits customers through improved
physical resource utilization and improved hardware efficiency, as well as reduced
power and cooling expenses. In addition, consolidation of resources obtained
through virtualization offers measurable returns on investment for today’s
businesses. Finally, virtualization serves as one of the key enablers of cloud
solutions, which are designed to deliver services economically and on demand.
Efficient Data Protection in VMware environments. You will learn about the basics of data protection in VMware environments and you will also find sample configurations and recommendations including Symantec Backup Exec / NetBackup, Fujitsu ETERNUS LT and Fujitsu ETERNUS CS800.
Veeam Backup & Replication - What’s New in 6.5Veeam Software
Virtualization changes everything—especially what you can
do with backup. Veeam® recognized the disruptive power
of virtualization early on, and designed a solution from the
ground up specifically for the new platform.
“Backup Exec 2014 is nearly three times faster
than Backup Exec 2010, and I can manage it in
about three to four hours per week—about one third
the time our previous version required.”
Paul Flatt
Infrastructure and Support Manager
Mitre 10 NZ
(read more on next to be shared Mitre10NZ Study Case...)
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
This Backup Exec Blueprint presentation includes example diagrams that contain objects that represent applications and platforms from other companies such as Microsoft and VMware. These diagrams may or may not match or resemble actual implementations found in end user environments. Any likeness or similarity to actual end user environments is completely by coincidence.
The goal of the diagrams included in this blueprint presentation is not to recommend specific ways in which to implement applications and platforms from other companies such as Microsoft and VMware but rather to illustrate Backup Exec best practices only.
For guidelines and best practices on installing and configuring applications and platforms from other companies, please refer to best practice documentation and other resources provided by those companies.
The values of server virtualization are well understood today. Customers implement
server virtualization to increase server utilization, handle peak loads efficiently,
decrease total cost of ownership (TCO), and streamline server landscapes.
Similarly, storage virtualization helps to address the same challenges as server
virtualization. Storage virtualization also expands beyond the boundaries of physical
resources and helps to control how IT infrastructures adjust to rapidly changing
business demands. Storage virtualization benefits customers through improved
physical resource utilization and improved hardware efficiency, as well as reduced
power and cooling expenses. In addition, consolidation of resources obtained
through virtualization offers measurable returns on investment for today’s
businesses. Finally, virtualization serves as one of the key enablers of cloud
solutions, which are designed to deliver services economically and on demand.
Efficient Data Protection in VMware environments. You will learn about the basics of data protection in VMware environments and you will also find sample configurations and recommendations including Symantec Backup Exec / NetBackup, Fujitsu ETERNUS LT and Fujitsu ETERNUS CS800.
Veeam Backup & Replication - What’s New in 6.5Veeam Software
Virtualization changes everything—especially what you can
do with backup. Veeam® recognized the disruptive power
of virtualization early on, and designed a solution from the
ground up specifically for the new platform.
“Backup Exec 2014 is nearly three times faster
than Backup Exec 2010, and I can manage it in
about three to four hours per week—about one third
the time our previous version required.”
Paul Flatt
Infrastructure and Support Manager
Mitre 10 NZ
(read more on next to be shared Mitre10NZ Study Case...)
TECHNICAL BRIEF▶ Backup Exec 15 Blueprint for Large InstallationsSymantec
This Backup Exec Blueprint presentation includes example diagrams that contain objects that represent applications and platforms from other companies such as Microsoft and VMware. These diagrams may or may not match or resemble actual implementations found in end user environments. Any likeness or similarity to actual end user environments is completely by coincidence.
The goal of the diagrams included in this blueprint presentation is not to recommend specific ways in which to implement applications and platforms from other companies such as Microsoft and VMware but rather to illustrate Backup Exec best practices only.
For guidelines and best practices on installing and configuring applications and platforms from other companies, please refer to best practice documentation and other resources provided by those companies.
This White Paper describes the EMC Backup-as-a-Service (BaaS) solution based on EMC Avamar, EMC Data Protection Advisor, and EMC HomeBase, which allows service providers to deliver backup services for cloud and traditional hosted environments, reduce storage space, increase backup speeds, and provide portal-based backup management.
Symantec Corp. (Nasdaq: SYMC) today announced it will deliver a new approach for modernizing backup and recovery, a process that has become unnecessarily complicated and expensive as organizations’ data stores grow exponentially. Compared to traditional backup, Symantec’s approach enables 100 times faster backup, eases management and simplifies recovery if a disaster occurs, helping customers realize significant cost savings while better protecting their business information.
This ESG Lab review documents hands-on testing of Symantec Backup Exec 2014, with a focus on ease of management and flexible recovery options for virtual machine backups.
Server virtualization has become a mainstream deployment due to its proven benefits: physical server consolidation, cost reduction, efficiency, and flexibility. However, it can throw a monkey wrench into data protection processes. Backup administrators must manage physical and virtual servers, consolidated workloads, and multiple hypervisors—while often lacking virtualization skills and training. 1 In addition, the ease of spinning up new VMs can leave administrators unaware of unprotected assets, resulting in data vulnerabilities.
ESG recently asked IT professionals at both midmarket and enterprise organizations about their challenges in protecting virtualized environments. In terms of all virtual server data protection challenges, the ability to validate both backup and recovery success topped the list, closely followed by recoverability of data (Figure 1).2 Other top challenges included response times for troubleshooting, gaps in protection, and simplified views across the virtual infrastructure.
This technical paper discusses the deployment of a VMware environment and best practices in using IBM Scale Out Network Attached Storage (SONAS) for its primary storage. To know more about the Network Attached Storage, visit http://ibm.co/SH8WJo.
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Software
Veeam Backup & Replication is much more than backup – it provides fast, flexible, and reliable recovery of virtualized applications and data. We bring backup and replication together in a single solution to reinvent data protection and deliver the #1 VM backup for VMware vSphere and Hyper-V environments. This poster provides a high-level overview of the architecture of Veeam Backup & Replication running in a VMware environment.
New Features in PSP2 for SANsymphony™-V10 Software-defined Storage Platform and DataCore™ Virtual SAN. New enhancements include OpenStack support, deduplication and compression, veeam backup integration and random write accelerator.
Upgrading from WinS 2008/2008 R2 to WinS 2012iTawy Community
- Why Upgrade to Windows Server 2012?
- Operating System Hardware and Disk Space Requirements
- Supported Windows Clients and Servers
- Supported In-Place Upgrade Paths
- Functional Levels, Operation Master Roles, Active Directory Considerations
- Migration Tools for Windows Server 2012
- Hyper-V and Virtual Machines Considerations
- Summary
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Symantec
Convert-to-Virtual, Backup-to-Virtual, and Point-in-Time Conversions with Backup Exec 2014
Backup Exec 2014 continues to invest in virtualization technology. Features included in the Backup Exec 2014 product help administrators solve the problem of moving physical servers to a virtual environment and also give administrators unique tools for leveraging virtualization technology for disaster recovery. These features are the ability to perform automated conversions of physical servers to a virtual machine replica, perform automated conversions of physical servers – using existing backup sets – to a virtual machine replica, and perform “ad hoc” or on-demand conversions of physical server backups to a virtual machine replica.
Convert to Virtual (P2V)
The Backup Exec 2014 P2V feature allows administrators to configure backup definitions for physical servers that protect the server by both storing backup data to the Backup Exec server and creating a virtual machine replica of the server on an available VMware or Hyper-V host.
For backup definitions configured with a P2V task, the backup operation and the virtual machine replica operation occur in parallel.
Backup to Virtual (B2V)
A Backup Exec 2014 backup definition configured with a B2V task is similar to a backup definition configured with a P2V task; however, B2V jobs run the backup and virtual machine replica operations serially, meaning the backup operation runs first, and the virtual replica portion runs immediately afterwards or on a different schedule.
Point-in-Time Virtual Conversions
Another method of creating a virtual machine replica of physical servers using Backup Exec 2014 is the ad hoc or Point-in-Time method. This method is not scheduled, and is not directly associated with any particular backup definition. It simply enables an administrator to create a virtual machine replica, on demand, of any physical machine that has been backed up to a Backup Exec server using an SDR-enabled backup.
The P2V, B2V, and Point-in-Time conversion features of Backup Exec 2014 can be used by administrators to move physical servers to a virtual environment permanently for migration purposes, or temporarily for testing or quick failover.
Backup exec 2014 deduplication option white paperSymantec
This white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Deduplication Option and make related decisions.
The attached white paper includes the following topics:
● Business Value
● Exchange Protection Methods and Technology
● Backup Exec & Exchange High Availability Configurations
● Exchange Recovery Methods & Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting ● Exchange
● Exchange Protection Notes and Best Practices
● Additional Resources
Modern Data Management and Protection Challenges
Customers of all types and sizes are seeking new and innovative ways to overcome challenges associated with data growth and storage management. While these challenges are not necessarily new, they continue to become more complex and more difficult to overcome due to the following:
Pace of data growth has accelerated
Location of data has become more disperse
Linkages between data sets have become more complex
Data and storage management challenges are compounded by the need for companies to protect critical data assets against disaster through backup and recovery solutions. In order to maintain backups of critical data assets, additional secondary storage resources are required. This additional layer of backup storage must be implemented wherever backups occur, including central data centers and remote offices.
This White Paper describes the EMC Backup-as-a-Service (BaaS) solution based on EMC Avamar, EMC Data Protection Advisor, and EMC HomeBase, which allows service providers to deliver backup services for cloud and traditional hosted environments, reduce storage space, increase backup speeds, and provide portal-based backup management.
Symantec Corp. (Nasdaq: SYMC) today announced it will deliver a new approach for modernizing backup and recovery, a process that has become unnecessarily complicated and expensive as organizations’ data stores grow exponentially. Compared to traditional backup, Symantec’s approach enables 100 times faster backup, eases management and simplifies recovery if a disaster occurs, helping customers realize significant cost savings while better protecting their business information.
This ESG Lab review documents hands-on testing of Symantec Backup Exec 2014, with a focus on ease of management and flexible recovery options for virtual machine backups.
Server virtualization has become a mainstream deployment due to its proven benefits: physical server consolidation, cost reduction, efficiency, and flexibility. However, it can throw a monkey wrench into data protection processes. Backup administrators must manage physical and virtual servers, consolidated workloads, and multiple hypervisors—while often lacking virtualization skills and training. 1 In addition, the ease of spinning up new VMs can leave administrators unaware of unprotected assets, resulting in data vulnerabilities.
ESG recently asked IT professionals at both midmarket and enterprise organizations about their challenges in protecting virtualized environments. In terms of all virtual server data protection challenges, the ability to validate both backup and recovery success topped the list, closely followed by recoverability of data (Figure 1).2 Other top challenges included response times for troubleshooting, gaps in protection, and simplified views across the virtual infrastructure.
This technical paper discusses the deployment of a VMware environment and best practices in using IBM Scale Out Network Attached Storage (SONAS) for its primary storage. To know more about the Network Attached Storage, visit http://ibm.co/SH8WJo.
Veeam Backup & Replication v8 for VMware — General OverviewVeeam Software
Veeam Backup & Replication is much more than backup – it provides fast, flexible, and reliable recovery of virtualized applications and data. We bring backup and replication together in a single solution to reinvent data protection and deliver the #1 VM backup for VMware vSphere and Hyper-V environments. This poster provides a high-level overview of the architecture of Veeam Backup & Replication running in a VMware environment.
New Features in PSP2 for SANsymphony™-V10 Software-defined Storage Platform and DataCore™ Virtual SAN. New enhancements include OpenStack support, deduplication and compression, veeam backup integration and random write accelerator.
Upgrading from WinS 2008/2008 R2 to WinS 2012iTawy Community
- Why Upgrade to Windows Server 2012?
- Operating System Hardware and Disk Space Requirements
- Supported Windows Clients and Servers
- Supported In-Place Upgrade Paths
- Functional Levels, Operation Master Roles, Active Directory Considerations
- Migration Tools for Windows Server 2012
- Hyper-V and Virtual Machines Considerations
- Summary
Physical to Virtual (P2V) & Backup to Virtual (B2V) Conversions with Backup E...Symantec
Convert-to-Virtual, Backup-to-Virtual, and Point-in-Time Conversions with Backup Exec 2014
Backup Exec 2014 continues to invest in virtualization technology. Features included in the Backup Exec 2014 product help administrators solve the problem of moving physical servers to a virtual environment and also give administrators unique tools for leveraging virtualization technology for disaster recovery. These features are the ability to perform automated conversions of physical servers to a virtual machine replica, perform automated conversions of physical servers – using existing backup sets – to a virtual machine replica, and perform “ad hoc” or on-demand conversions of physical server backups to a virtual machine replica.
Convert to Virtual (P2V)
The Backup Exec 2014 P2V feature allows administrators to configure backup definitions for physical servers that protect the server by both storing backup data to the Backup Exec server and creating a virtual machine replica of the server on an available VMware or Hyper-V host.
For backup definitions configured with a P2V task, the backup operation and the virtual machine replica operation occur in parallel.
Backup to Virtual (B2V)
A Backup Exec 2014 backup definition configured with a B2V task is similar to a backup definition configured with a P2V task; however, B2V jobs run the backup and virtual machine replica operations serially, meaning the backup operation runs first, and the virtual replica portion runs immediately afterwards or on a different schedule.
Point-in-Time Virtual Conversions
Another method of creating a virtual machine replica of physical servers using Backup Exec 2014 is the ad hoc or Point-in-Time method. This method is not scheduled, and is not directly associated with any particular backup definition. It simply enables an administrator to create a virtual machine replica, on demand, of any physical machine that has been backed up to a Backup Exec server using an SDR-enabled backup.
The P2V, B2V, and Point-in-Time conversion features of Backup Exec 2014 can be used by administrators to move physical servers to a virtual environment permanently for migration purposes, or temporarily for testing or quick failover.
Backup exec 2014 deduplication option white paperSymantec
This white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Deduplication Option and make related decisions.
The attached white paper includes the following topics:
● Business Value
● Exchange Protection Methods and Technology
● Backup Exec & Exchange High Availability Configurations
● Exchange Recovery Methods & Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting ● Exchange
● Exchange Protection Notes and Best Practices
● Additional Resources
Modern Data Management and Protection Challenges
Customers of all types and sizes are seeking new and innovative ways to overcome challenges associated with data growth and storage management. While these challenges are not necessarily new, they continue to become more complex and more difficult to overcome due to the following:
Pace of data growth has accelerated
Location of data has become more disperse
Linkages between data sets have become more complex
Data and storage management challenges are compounded by the need for companies to protect critical data assets against disaster through backup and recovery solutions. In order to maintain backups of critical data assets, additional secondary storage resources are required. This additional layer of backup storage must be implemented wherever backups occur, including central data centers and remote offices.
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15Symantec
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery time and recovery point objectives (RTO and RPO) by reducing the time it takes to back up and recover your data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and granular application objects. Protect one to thousands of virtual machines and servers all from the same user console for optimal performance and efficiency.
On demand, flexible and scalable Cloud hosting and DRaaS solutions, built on high-end IBM server and storage infrastructure and hosted in our UK based Tier 3 data centres.
Protecting Microsoft Exchange with the NEW Backup Exec 15Symantec
Email has become an indispensable way of communicating and transferring data in the modern electronic age. In the year 2010, it was estimated that almost 300 billion emails were sent each day, and around 90 trillion emails were sent every year. Considering the rate at which data continues to increase year-over-year, the number of emails sent today is likely significantly greater. Email is used for many forms of communication, including business critical communications for companies of all sizes.
Companies rely heavily upon email systems to conduct day-to-day business operations, and any significant period where access to email is lost is considered to be highly intolerable.
Microsoft Exchange
All email solutions used by modern businesses are based upon a server infrastructure hosting an email software system. Whether hosted locally on physical or virtualized servers, hosted by a partner, or hosted in the cloud, these email software systems support the incredible amount of email transmissions that happen every day, and can be implemented in many different sizes and configurations. Perhaps the most common and popular email system used in the industry today is Microsoft Exchange.
Because Microsoft Exchange plays such a critical role in the ability for organizations to conduct day-to-day business, it’s equally critical that companies employ protection solutions that enable them to quickly and easily recover their Exchange system should a data loss or disaster event occur.
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery time and recovery point objectives (RTO and RPO) by reducing the time it takes to backup and recover your data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and granular application objects. Protect one to thousands of virtual machines and servers all from the same user console for optimal performance and efficiency.
Webinar NETGEAR - Acronis & Netgear, demo di soluzione di Disaster Recovery e...Netgear Italia
Demo di una soluzione di Disaster Recovery e Backup per sistemi di virtualizzazione. L'ambiente utilizzato contempla l'utilizzo di un hypervisor vmware con Acronis per Vmware, 2 ReadyDATA ( 1 RDD516 ed 1 RD5200) come soluzioni di storage per i datastore, quali repository del backup e soluzione per il disaster recovery.
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeSymantec
This highly technical, yet still quite understandable white paper is intended to assist technical personnel as they design and implement Backup Exec™ 2014 and the Agent for Microsoft Exchange and make related decisions. The business value of the Agent for Microsoft Exchange will also be discussed in this white paper.
This white paper includes the following topics:
Business Value
● Exchange Protection Methods and Technology
● Backup Exec and Exchange High Availability Configurations
● Exchange Recovery Methods and Technology
● Managing Backup Exec Rights and Permissions in Exchange Environments
● Example Backup Exec Configurations for Protecting Exchange Exchange Protection Notes and Best Practices
● Additional Resources
Email is Business Critical
Email has become an indispensable way of communicating and transferring data in the modern electronic age. In the year 2010, it was estimated that almost 300 billion emails were sent each day, and around 90 trillion emails were sent every year. Considering the rate at which data continues to increase year-over-year, the number of emails sent today is likely significantly greater. Email is used for many forms of communication, including business critical communications for companies of all sizes.
Companies rely heavily upon email systems to conduct day-to-day business operations, and any significant period where access to email is lost is considered to be highly intolerable.
Microsoft Exchange
All email solutions used by modern businesses are based upon a server infrastructure hosting an email software system. Whether hosted locally on physical or virtualized servers, hosted by a partner, or hosted in the cloud, these email software systems support the incredible amount of email transmissions that happen every day, and can be implemented in many different sizes and configurations. Perhaps the most common and popular email system used in the industry today is Microsoft Exchange.
Because Microsoft Exchange plays such a critical role in the ability for organizations to conduct day-to-day business, it’s equally critical that companies employ protection solutions that enable them to quickly and easily recover their Exchange system should a data loss or disaster event occur.
Hitachi Virtual Infrastructure Integrator (Virtual V2I) is a VMware vCenter plugin plus associated software. It provides data management efficiency for large VM environments. Specifically, the latest release addresses virtual machine backup and recovery and cloning services. Customer want to leverage storage based snapshots as it is scalable, more granular backup from hours between backups to minutes resulting in improved RPO. VMworld 2015.
This white paper describes features introduced in EMC Avamar to extend VMware vCloud Director's service delivery and Virtual Data Center capabilities to include BaaS.
Historically backups have been defined and referenced by the hostname of the physical system being protected. This has worked well when the relationship between the physical host and the operating system was a direct, one to one relationship. Backup processing impact was limited to each physical client and the biggest concern was saturating the network with backup traffic. This was easily managed by limiting the number of simultaneous client backups via a simple setting within the NetBackup policy.
Virtual machine technologies have changed this physical hardware dynamic. Dozens of operating systems (virtual machines) can now reside on a single physical (ESX) host connected to a single storage LUN with network access through a single NIC. When using traditional policy configurations, backup processing randomly occurs with no regard to the physical location of each virtual machine. As backups progress, a subset of ESX servers can be heavily impacted with active backups while other ESX systems sit idly waiting for their virtual machines to be protected. The effect of this is that backups tend to be slower than they need to be and backup processing impact on the ESX servers tends to be random and lopsided. Standard backup policy definitions simply do not translate well into virtual environments.
The NetBackup Virtual machine Intelligent Policy (VIP) feature is designed to solve this problem and more. With Virtual machine Intelligent Policy, backup processing can be automatically load balanced across the entire virtual machine environment. No ESX server is unfairly taxed with excessive backup processing and backups can be significantly faster. Once configured, this load balancing automatically detects changes in the virtual machine environment and automatically compensates backup processing based on these changes. Virtual machine Intelligent Policy places virtual machine backups on autopilot.
Symantec Enterprise Security Products are now part of BroadcomSymantec
Symantec Enterprise Security Products are now part of Broadcom. The consumer division of Symantec Corp. is now NortonLifeLock Inc. -- a standalone company dedicated to consumer cyber safety.
Symantec Webinar | National Cyber Security Awareness Month: Fostering a Secur...Symantec
Youth in foster care face unique risks to their identity.In this webinar we discuss the risks, as well as tips for better protection. Watch on demand here: https://symc.ly/2N8cELV.
Symantec Webinar | National Cyber Security Awareness Month: Protect ITSymantec
Learn how to protect your data during Symantec's National Cyber Security Awareness Month webinar with the Identity Theft Resource Center and Infolock.To watch on demand https://symc.ly/2VMMWQX.
Symantec Webinar | National Cyber Security Awareness Month: Secure ITSymantec
Symantec, TechSoup and the Michigan Small Business Development Center share how to apply added layers of security to your devices and online accounts. Watch on-demand recording here: https://symc.ly/33ifcxo.
Symantec Webinar | National Cyber Security Awareness Month - Own ITSymantec
View this webinar from Symantec and NCSAM partners, the National PTA, Connect Safety and the National Cyber Security Alliance, to learn how to protect the devices you use day to day.
Watch on demand here: https://symc.ly/2nLyXyB
Symantec Webinar: Preparing for the California Consumer Privacy Act (CCPA)Symantec
On January 1, 2020, one of the strictest privacy laws in the US, the California Consumer Privacy Act (CCPA), will come into effect. What should governance, risk and compliance executives know in order to prepare for CCPA? Watch the on demand recording here: https://symc.ly/2Pn7tvW.
Symantec Webinar | How to Detect Targeted Ransomware with MITRE ATT&CKSymantec
Experts from Symantec and MITRE explore the latest research and best practices for detecting targeted ransomware in your environment.
Watch on-demand webinar here: https://symc.ly/2L7ESFI.
This webinar will explore the less-discussed topics of a mobile security strategy that everyone should understand – before it’s too late. Watch on-demand here: https://symc.ly/2z6hUsM.
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
There is an art to securely using cloud apps and services, including SaaS, PaaS, and IaaS. In this Symantec webcast, hear from Steve Riley, a Gartner senior director analyst who focuses on public cloud security, and Eric Andrews, Symantec’s vice president of cloud security, as they share best practices with practical tips for deploying CASB. Watch here: https://symc.ly/2QTyUec.
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
This webinar to shares insight into how an Advanced Threat Assessment does root analysis to uncover unknown, unique threats happening in your environment. Watch here: https://symc.ly/2W52MoA
Learn if you’ve got the right security strategy, and investment plan, to protect your organization and ensure regulatory compliance with the General Data Protection Regulation (GDPR). Watch now here: https://symc.ly/2VMNHIm
2019 Symantec Internet Security Threat Report (ISTR): The New Threat Landscape presented by Kevin Haley, Director Product Management, Security Technology & Response, Symantec. Watch webinar recording here: https://symc.ly/2FJ9T18.
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
Gain valuable insight whether you’re well on your way to Zero Trust implementation or are just considering it. Watch the original webinar here https://www.symantec.com/about/webcasts?commid=347274.
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
First-hand insights on the newest cloud-delivered endpoint security solutions. Hear from Joakim Liallias, Symantec and special guest speakers Sundeep Vijeswarapu from PayPal and top industry analyst Fernando Montenegro, 451 Research. Listen here: https://symc.ly/2UY2TlS.
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
Learn how Symantec Endpoint Protection & Response (EDR) and the MITRE ATT&CK framework can expose and thwart persistent adversaries like APT28 otherwise known as Fancy Bear. Watch Webinar here: https://symc.ly/2WyPD8I
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
Quarkus Hidden and Forbidden ExtensionsMax Andersen
Quarkus has a vast extension ecosystem and is known for its subsonic and subatomic feature set. Some of these features are not as well known, and some extensions are less talked about, but that does not make them less interesting - quite the opposite.
Come join this talk to see some tips and tricks for using Quarkus and some of the lesser known features, extensions and development techniques.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
A Comprehensive Look at Generative AI in Retail App Testing.pdfkalichargn70th171
Traditional software testing methods are being challenged in retail, where customer expectations and technological advancements continually shape the landscape. Enter generative AI—a transformative subset of artificial intelligence technologies poised to revolutionize software testing.
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Globus
The Earth System Grid Federation (ESGF) is a global network of data servers that archives and distributes the planet’s largest collection of Earth system model output for thousands of climate and environmental scientists worldwide. Many of these petabyte-scale data archives are located in proximity to large high-performance computing (HPC) or cloud computing resources, but the primary workflow for data users consists of transferring data, and applying computations on a different system. As a part of the ESGF 2.0 US project (funded by the United States Department of Energy Office of Science), we developed pre-defined data workflows, which can be run on-demand, capable of applying many data reduction and data analysis to the large ESGF data archives, transferring only the resultant analysis (ex. visualizations, smaller data files). In this talk, we will showcase a few of these workflows, highlighting how Globus Flows can be used for petabyte-scale climate analysis.
Exploring Innovations in Data Repository Solutions - Insights from the U.S. G...Globus
The U.S. Geological Survey (USGS) has made substantial investments in meeting evolving scientific, technical, and policy driven demands on storing, managing, and delivering data. As these demands continue to grow in complexity and scale, the USGS must continue to explore innovative solutions to improve its management, curation, sharing, delivering, and preservation approaches for large-scale research data. Supporting these needs, the USGS has partnered with the University of Chicago-Globus to research and develop advanced repository components and workflows leveraging its current investment in Globus. The primary outcome of this partnership includes the development of a prototype enterprise repository, driven by USGS Data Release requirements, through exploration and implementation of the entire suite of the Globus platform offerings, including Globus Flow, Globus Auth, Globus Transfer, and Globus Search. This presentation will provide insights into this research partnership, introduce the unique requirements and challenges being addressed and provide relevant project progress.
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Enterprise Resource Planning System includes various modules that reduce any business's workload. Additionally, it organizes the workflows, which drives towards enhancing productivity. Here are a detailed explanation of the ERP modules. Going through the points will help you understand how the software is changing the work dynamics.
To know more details here: https://blogs.nyggs.com/nyggs/enterprise-resource-planning-erp-system-modules/
Top Features to Include in Your Winzo Clone App for Business Growth (4).pptxrickgrimesss22
Discover the essential features to incorporate in your Winzo clone app to boost business growth, enhance user engagement, and drive revenue. Learn how to create a compelling gaming experience that stands out in the competitive market.
May Marketo Masterclass, London MUG May 22 2024.pdfAdele Miller
Can't make Adobe Summit in Vegas? No sweat because the EMEA Marketo Engage Champions are coming to London to share their Summit sessions, insights and more!
This is a MUG with a twist you don't want to miss.
Code reviews are vital for ensuring good code quality. They serve as one of our last lines of defense against bugs and subpar code reaching production.
Yet, they often turn into annoying tasks riddled with frustration, hostility, unclear feedback and lack of standards. How can we improve this crucial process?
In this session we will cover:
- The Art of Effective Code Reviews
- Streamlining the Review Process
- Elevating Reviews with Automated Tools
By the end of this presentation, you'll have the knowledge on how to organize and improve your code review proces
Custom Healthcare Software for Managing Chronic Conditions and Remote Patient...Mind IT Systems
Healthcare providers often struggle with the complexities of chronic conditions and remote patient monitoring, as each patient requires personalized care and ongoing monitoring. Off-the-shelf solutions may not meet these diverse needs, leading to inefficiencies and gaps in care. It’s here, custom healthcare software offers a tailored solution, ensuring improved care and effectiveness.
We describe the deployment and use of Globus Compute for remote computation. This content is aimed at researchers who wish to compute on remote resources using a unified programming interface, as well as system administrators who will deploy and operate Globus Compute services on their research computing infrastructure.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Enhancing Project Management Efficiency_ Leveraging AI Tools like ChatGPT.pdfJay Das
With the advent of artificial intelligence or AI tools, project management processes are undergoing a transformative shift. By using tools like ChatGPT, and Bard organizations can empower their leaders and managers to plan, execute, and monitor projects more effectively.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamtakuyayamamoto1800
In this slide, we show the simulation example and the way to compile this solver.
In this solver, the Helmholtz equation can be solved by helmholtzFoam. Also, the Helmholtz equation with uniformly dispersed bubbles can be simulated by helmholtzBubbleFoam.
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
WHITE PAPER▶ Protecting VMware Environments with Backup Exec 15
1. TECHNICALWHITEPAPER:BACKUPEXECTM15
PROTECTINGVMWAREENVIRONMENTS
Backup ExecTM
15 Technical White Paper
Technical White Papers are designed to introduce Symantec partners and end users
to key technologies and technical concepts that are associated with the Symantec
Backup and Recovery product family. The information within a Technical White
Paper will assist partners and end users as they design and implement data
protection solutions based on Symantec Backup and Recovery products.
Technical White Papers are authored and maintained by the Symantec Backup and
Recovery Technical Services group.
Protecting VMware
Environments
3. 3
Contents
Introduction.............................................................................................................................................. 4
Business Value .......................................................................................................................................... 5
Underlying Technical Principles................................................................................................................ 9
Virtualized Application Protection.......................................................................................................... 15
Virtual Machine Recovery Options......................................................................................................... 17
Improved Usability for Virtual Environments......................................................................................... 19
Backup Exec Management Plug-in for VMware..................................................................................... 20
Example VMware Configurations........................................................................................................... 22
Performance Recommendations............................................................................................................ 23
Notes and Best Practices ........................................................................................................................ 26
For More Information............................................................................................................................. 27
4. 4
Introduction
This white paper is intended to assist partners and end users as they design and implement Backup Exec™ 15 in
VMware environments and make related decisions. The business value of Backup Exec™ 15 in VMware
environments is also covered.
This white paper includes the following topics:
• Business Value
• Underlying Technical Principles
• Virtualized Application Protection
• Virtual Machine Recovery Options
• Improved Usability for Virtual Environments
• Backup Exec Management Plug-in for VMware
• Example VMware Configurations
• Performance Recommendations
• Notes and Best Practices
Note: For step-by-step instructions for installing and managing Backup Exec™ 15 and the Agent for VMware and Hyper-
V, refer to the Symantec Backup Exec™ 15 Administrator’s Guide available here: TECH205797.
5. 5
Business Value
Virtualization technology has been widely adopted by organizations of all sizes to optimize critical IT assets,
such as data and application servers. As a result of this virtualization trend, companies are looking for efficient
and effective ways to back up and recover their virtual servers and the critical applications that many of these
virtual machines host, such as Microsoft Exchange®, SQL Server®, SharePoint®, and Active Directory®.
Because virtual host servers are used by many companies to virtualize production servers, the loss of a
production virtual host can cost an organization more than losing a standalone physical server, since a single
virtual host can be responsible for multiple virtual servers. A lost virtual host can impact productivity for hours
or days while the IT administrator struggles to recover or repair the virtualization infrastructure.
Market leaders in virtualization technology include the VMware vSphere platform and the Microsoft Hyper-V
platform. Modern backup and recovery solutions designed specifically for VMware and Hyper-V environments
are critical to helping organizations quickly recover in the event of a disaster, whether it occurs at the virtual
host level, the virtual machine level, the application level, or the file/folder level.
Backup Solutions Designed Specifically for Virtual Environments
Administrators responsible for the backup and recovery of virtualized environments understand the frustration
and difficulty associated with backup technologies that are not specifically designed to protect virtual
infrastructures. Administrators who rely on legacy, misfit solutions to protect their virtual resources face
several challenges, such as the following:
• Performance impacts from agent-based backups inside virtual machines competing for resources
• Downtime resulting from having to shut down virtual machines to protect them completely
• Slow file-by-file backups that repeatedly capture redundant data in each virtual machine
• Lengthy restore processes of an entire virtual machine to recover a single file
• Separate backups for virtualized applications like Microsoft Exchange®, SQL Server®, and SharePoint®
• Lack of ability to leverage different data transport paths depending on the needs of an environment
• Storage management problems from storing backups of large virtual disk files, such as VMDK files
Backup Exec™ 15 and key virtual features, such as Backup Exec’s integrated V-Ray technology, are designed
specifically to protect virtual environments and solve the problems listed above.
Integration with the Latest Virtualization Technology
A significant advantage of Backup Exec™ 15 in virtual environments is direct integration with the VMware
virtual platform. This integration enables advanced functionality built specifically for the optimized protection
of VMware environments.
VMware vSphere Integration
Backup Exec™ 15 integrates with VMware’s vStorage APIs for Data Protection (VADP) to eliminate important
challenges associated with the backup of VMware virtual machines and to provide faster backup performance
with less overall storage consumption. This is accomplished through the following:
Support for the Latest VMware vSphere Environments
• vSphere 6.0 (will be supported within 60 days of official release)
• vSphere 5.5 and 5.1
For an authoritative list of platforms and applications supported by Backup Exec™ 15, please refer to the Backup Exec Software
Compatibility List available here: TECH205797
6. 6
VMware VADP Integration
• Enables backup of all virtual machines
• Provides backup of VMware virtual machines over SAN infrastructures
• Eliminates the need to shut down virtual machines in order to protect them
VMware Changed Block Tracking Support
• Enables full, differential, and incremental backups of VMware virtual machines
• Full backups: capture full point-in-time backups of the virtual machine
• Differential backups: back up of only what has changed since the last full backup
• Incremental backups: back up of only what has changed since the last backup
VMware Block Optimization Support
• Intelligent skipping of unused blocks within a virtual disk file
• Greatly reducing backup sizes and increasing backup speed
Integrated Granular Recovery Technology
From a single-pass backup of a virtual machine, recover:
• An entire virtual machine
• Individual files and folders*
• Entire applications*
• Granular application objects*
*For an authoritative list of platforms and applications supported by Backup Exec™ 15, please refer to the Backup Exec Software
Compatibility List available here: TECH205797
Advanced Data Deduplication Support
• Support for deduplication of VMware virtual machine backups
• Advanced stream handler enables increased deduplication efficiency of VMDK files and their contents
• Significant reduction of disk backup storage requirements
Integration with Microsoft’s VSS API
• Leverages VSS writers within each Windows-based virtual machine
• Enables Microsoft best-practice protection of applications such as Exchange®, SQL Server®, and SharePoint®
• Support for “VSS Full” and “VSS Copy” backup operations
• Application quiescence and log truncation
Complete Virtual and Physical Protection in a Single Solution
Backup Exec™ 15 delivers a cost-effective and state-of-the-art solution for the protection of VMware
environments. This includes the following:
• Image-level protection of VMware virtual machines
• Comprehensive protection of virtual systems and physical systems in a single backup solution
7. 7
• Support for disk, tape, and cloud storage targets
• Integration with VMware’s vStorage APIs for optimized backup and recovery processes
• Granular file and application object recovery of VMware virtual machine backups
• Storage optimization through advanced data deduplication technology
Figure 1: Protection for Physical and Virtual Environments
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your
entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery
time and recovery point objectives (RTO and RPO) by reducing the time it takes to back up and recover your
data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and
granular application objects. Protect one to thousands of virtual machines and servers all from the same user
console for optimal performance and efficiency.
• Powerful: Improve the performance of your backup and recovery with Backup Exec; a solution that
enables fast, reliable backup and recovery of data and systems at every level and includes advanced
integration with the most recent releases of VMware and Hyper-V. Backup Exec can also help solve
your growing data challenges, regardless of how much that data changes. Avoid lengthy downtime and
remain within critical backup windows with Backup Exec.
• Flexible: Not every backup solution has the flexibility to protect your environment while also delivering
agile recovery. Backup Exec protects both virtual and physical architectures and can back up anything
to virtually any storage device and can restore anywhere. From VMs, to entire servers, applications or
single files and folders, Backup Exec is the single solution for all of your needs.
• Easy to use: Complex backup and recovery products can be inefficient, time consuming, and expensive
to manage. Through intuitive wizards and insightful dashboards, Backup Exec is easy to implement, use
and manage, whether you are upgrading from a previous version or switching from a competitive
product.
Save time and money, secure confidential data and help ensure all your critical information is always protected
and easily recoverable with Backup Exec.
9. 9
Underlying Technical Principles
VMware Resource Discovery
When configuring Backup Exec™ 15 to protect VMware resources using the Agent for VMware and Hyper-V,
virtual machines can be added to the backup infrastructure in either of the following ways:
• vSphere ESX/ESXi servers – Individual vSphere ESX/ESXi servers can be added by entering the vSphere
hostname or IP address into the Backup Exec interface.
• vCenter servers – Environments with multiple vSphere ESX/ESXi servers managed by a vCenter server
can be added by connecting to the vCenter server that automatically discovers all the virtual machines
in the vCenter environment.
Backup Exec™ 15 uses VMware Web Services for most communications with vCenter servers, including
vSphere ESX/ESXi host and virtual machine discovery operations. The VMware vSphere Web Services SDK was
specifically designed to allow management applications to integrate with the vSphere platform.
Figure 2: VMware Virtual Machine Discovery Diagram
Dynamic Inclusion
The dynamic inclusion feature automatically discovers virtual machines that are added after backup jobs are
configured and automatically includes those virtual machines in the next backup job. New virtual machines are
discovered at job run time and are automatically protected.
This dynamic inclusion capability applies to all new virtual machines that are added to a vSphere ESX/ESXi
server after one or more Backup Exec jobs have been configured to protect virtual machines on that vSphere
ESX/ESXi server.
When Administrators do not want certain new virtual machines to be protected by Backup Exec or by a specific
backup job they can exclude those virtual machines by using the Backup Exec console to edit the
corresponding backup job.
Virtual Machine Backup Methods
When protecting VMware environments with Backup Exec™ 15, partners and customers have the option to
protect virtual machines using any of the following methods:
• Agentless backups (file server virtual machines) – this method captures image-level, snapshot backups
of virtual machines associated with the vSphere ESX/ESXi server without a local Backup Exec agent
present within the virtual machine; this method enables full virtual machine recovery and granular file
and folder recovery.
10. 10
• Agent-assisted backups (Windows virtual machines hosting Microsoft applications) – This method
captures image-level backups of virtual machines and also includes additional application protection
and recovery functionality, including full application recovery and granular application recovery.
Advanced application recovery capabilities are enabled by the Agent for Windows being installed on
the virtual machine.
Note: An agent-assisted backup is not an agent-based backup; backups are still image-level, snapshot backups
captured through VMware VADP processes. The presence of the Agent for Windows within the virtual machine
is leveraged for discovery of the application and the collection of application metadata required for granular
recovery operations.
• Agent-based backups (virtual machines with unique attributes) – This method captures backups
through a local agent installed on the virtual machine, and essentially treats the virtual machine like a
standalone physical server.
This method is recommended in situations where image-level backups are not optimal, such as when
protecting virtual machines configured with Physical Compatibility Mode RDM disks.
Agentless, agent-assisted, and agent-based backups can be mixed and matched to meet the needs of an
environment. For example, a partner or customer may choose to protect all Windows virtual machines using
agent-assisted backups while protecting Linux-based virtual machines using agent-based backups.
Backup Data Transport Modes
A transport mode is the physical data path used for moving virtual machine backup data to the Backup Exec
server.
The following transport modes are supported by Backup Exec:
Transport Mode Description
SAN Uses shared storage connections for data transfers to a physical Backup Exec server
HOTADD Backup Exec server installed on a virtual machine
NBD Uses the LAN/ethernet for data transfers to a Backup Exec server
NBDSSL Uses the encrypted LAN/ethernet for data transfers to a Backup Exec server
While capturing backups of VMware virtual machines, Backup Exec™ 15 leverages integration with the
VMware vStorage APIs for Data Protection (VADP), enabling the utilization of “advanced transport mode”. This
means that for each virtual machine that is protected by Backup Exec, VMware will determine all the available
ways through which the requested backup data can be transported to the Backup Exec server. After a data
request is generated by Backup Exec, VMware returns a list of transport modes (SAN, NBD, HOTADD, etc) that
are supported and available. Based on this list and the selections supplied by the user within Backup Exec, a
transport mode is selected.
For SAN environments, it is important to note that if Backup Exec is unable to acess the SAN during a backup
operation, it will revert to other available data paths, such as NBD (LAN), in order to complete the job
successfully.
Users can select one or more transport modes from a list within the Backup Exec interface and adjust the
priority of the modes (move up/move down in screenshot below).
The transport mode options can be found by editing the virtual machine backup job and navigating to the
Virtual Machines option on the left pane:
11. 11
Figure 3: VMware Transport Mode Options
If incorrect or unexpected transport modes are being used for backup operations, as a troubleshooting step,
disable all transport modes except the desired transport mode. If the job fails, review the job logs for a better
understanding of the root cause.
VMware VADP Integration
Backup Exec™ 15 fully integrates with VMware’s vStorage APIs for Data Protection (VADP) and provides a
number of key capabilities, including the following:
• High overall backup performance, particularly in SAN-based environments
• Changed-block tracking for fast block-level incremental or differential backups
• Block optimization, which ignores unused virtual disk blocks, improves performance, and lowers
backup storage requirements
• Backup and recovery support of both thin and thick-provisioned virtual disks
• Template virtual machine backup
No Proxy Server Required
The protection of VMware virtual machines using the Agent for VMware and Hyper-V does not require a proxy
server. Backup data is moved directly to the Backup Exec server for storage.
The VMware vStorage APIs for Data Protection (VADP) eliminate the need for a proxy server to mediate
between a vSphere ESX/ESXi host and the Backup Exec server. Symantec and VMware work closely together to
ensure that performance impacts during backup are minimal.
Storage Optimization Features
Backup Exec™ 15 includes multiple storage optimization technologies that offer scaled benefits to partners and
customers looking to control backup storage costs. These include the following:
• Block optimization
• Differential and incremental backups
• Data deduplication
When used together, these storage optimization features greatly reduce backup data requirements to only a
small fraction of what they would be without these optimization technologies.
Block Optimization
Virtual disks, like physical disks, always contain some free space. The amount of free space within a virtual disk
can vary; in the case of some virtual machines, a large percentage of the disk may be free or unused.
Backup Exec™ 15 includes block optimization technology that enables the intelligent identification of empty
space within a virtual disk file and the protection of only used portions of the virtual disk. For example, if a
12. 12
virtual disk file has a total capacity of 40 GB but contains only 15 GB of actual data, Backup Exec captures only
15 GB of data during a full backup job. This accelerates backups and reduces backup storage requirements.
Figure 4: Block Optimization Diagram
Incremental and Differential Backups
Backup Exec™ 15 supports changed block tracking (CBT) for VMware environments. This means that Backup
Exec can track the changes that have occurred against a virtual machine since the last backup operation at the
block level, and capture only the block-level changes since the last backup (incremental) or since the last full
backup (differential).
Differential and incremental backups capture significantly less data than full backups. As a result, incremental
and differential backups reduce backup windows and reduce the amount of required backup storage when
protecting VMware virtual machines.
Figure 5: Changed Block Tracking Diagram
Data Deduplication
Backup Exec™ 15 also supports the deduplication of VMware virtual machine backups. The Deduplication
Option enables block-level deduplication of all backups stored in a Backup Exec deduplication disk storage
device, generally resulting in a 9-to-1 or greater reduction in storage consumption for backup data.
Note: The actual reduction in disk storage requirements as a result of the deduplication of VMware virtual machine
13. 13
backups will vary depending on a number of factors, such as the selected retention period for the backups, the type of
data within the VMware virtual machines, and so on.
For an estimate of how well VMware virtual machine backups will deduplicate in a specific environment, the Backup
Exec Deduplication Assessment Tool (part of the Backup Exec Partner Toolkit) may be used. This tool is available free of
charge, and does not require Backup Exec to be installed or present in the environment being evaluated.
Backup Exec Partner Toolkit
The Deduplication Option includes intelligent stream handlers for VMware virtual disk files (VMDK) enabling
further storage savings when using both the Agent for VMware and Hyper-V and the Deduplication Option
together. The Deduplication Option and associated virtual disk stream handler technology will be discussed in
further detail later in this document.
VMware Storage Distributed Resource Scheduling
The vSphere platform’s SDRS capabilities allow virtual administrators to simplify management of datastores
through the introduction of datastore clusters, also referred to as storage pods. In addition, depending upon
settings defined by the administrator, SDRS has the capability to automatically move virtual machine disk files
to different datastores within a cluster to optimize performance, without interrupting virtual machine
operations. This feature works synchronously with other VMware technologies, such as vMotion.
Figure 6: VMware Storage Distributed Resource Scheduling Diagram
Backup Exec™ 15 fully supports virtual machines that are located within a datastore cluster and enabled for
SDRS.
If a virtual machine is being actively backed up by Backup Exec or is having data restored to it at the time an
SDRS event for that virtual machine occurs, Backup Exec places a temporary lock on the virtual machine,
delaying the SDRS event until after the operation has completed and the associated virtual machine snapshot
has been removed. After the backup is complete, the virtual machine is unlocked and the SDRS event proceeds
normally. Backup Exec does not remove SDRS attributes from a virtual machine during backup or restore
operations.
In addition, administrators can restore virtual machines to the cluster level or to specific datastores within a
cluster.
vSAN Datastores
The new vSAN feature introduced by VMware is a software-defined storage solution that offers high resiliency,
performance, and scalability while simplifying storage provisioning and management. vSAN is built directly into
the VMware hypervisor, and can be enabled and managed from the familiar vSphere Web Client.
14. 14
Figure 7: vSAN Diagram
Backup Exec™ 15 fully supports virtual machines that are located on a vSAN datastore both for backup and
recovery.
VMware Virtual Volumes
Another new software-defined storage technology from VMware is Virtual Volumes. Instead of a VMFS
datastore, a Virtual Volume represents a pool of available storage resources that can be utilized by a VMware
infrastructure for hosting virtual machines. Virtual Volumes offer administrators a number of benefits, such as
the following:
• Simplifies Storage Operations - Adds automation, removes complexity, speeds up provisioning, and
simplifies management.
• Simplifies Delivery of Storage Service Levels – Provides administrators with finer control of storage
resources and data services.
• Improves Resource Utilization - Improves precision of storage resource consumption.
Backup Exec™ 15 fully supports virtual machines that are located on a VMware Virtual Volume both for backup
and recovery, using VADP-integrated methods.
15. 15
Virtualized Application Protection
VSS Support
Backup Exec™ 15 supports online backups of VMware virtual machines that host Microsoft applications and
that utilize Microsoft’s VSS framework.
VSS-aware applications such as these are protected as part of a normal image-level backup of the entire virtual
machine. This process leverages VSS to capture a consistent snapshot of the virtual machine and the VSS-
aware applications that it hosts. This VSS snapshot process also automatically truncates transaction logs for
Exchange, Active Directory, and SQL. These virtual machines are not taken offline during this process; normal
operations continue.
Backup Exec™ 15 supports both “VSS Full” and “VSS Copy” backup operations. By default, “VSS Full” backups
are performed. Administrators can adjust this setting in the ‘Virtual Machines’ backup options section of the
Backup Exec™ 15 user interface.
Note: For performing online backups of VMware virtual machines, VMware Tools must be installed on the virtual
machines that host applications for enhanced VSS provider support.
Note: Without installing the Agent for Windows on the virtual machine hosting the VSS-aware application, the virtual
machine is still protected using VSS and the application inside the virtual machine continues to be backed up in a
consistent state. However, recovery options are limited to restoring the entire virtual machine or granular files and
folders.
Advanced Application Protection and Recovery
Advanced protection and recovery of applications that have been virtualized in a VMware environment can be
enabled by combining the Agent for Applications and Databases with the Agent for VMware and Hyper-V.
When these agents are combined, advanced protection and recovery capabilities are enabled through agent-
assisted backups. This agent-assisted configuration continues to provide single-pass, image-level backup
protection of the virtual machines hosting applications in a VMware environment.
This agent-assisted configuration also allows for additional application protection capabilities to be enabled,
such as automatic virtualized application discovery and granular application object recovery capabilities.
Because of these critical additional features enabled by the Agent for Applications and Databases, Symantec
recommends using this agent with the Agent for VMware and Hyper-V when protecting virtualized applications
in a VMware environment.
Without the addition of the Agent for Applications and Databases, and without installing the Agent for
Windows on each virtual machine hosting an application, backups become standard agentless VMware virtual
machine backups. In this configuration, the recovery capabilities are limited to full virtual machine recovery
and granular file and folder recovery.
Note: When the Agent for Windows is not installed on a virtual machine, files and folders cannot be restored directly
back to that virtual machine. The files and folders being recovered first must be restored to another accessible location
and then moved back to the target virtual machine using other methods.
Streamlined SQL Log Truncation
Backup Exec™ 15 includes a simplified approach to the truncation of SQL transaction logs where SQL is running
as a virtual machine in a VMware or Hyper-V environment. A check box option within the Backup Exec user
16. 16
interface includes an additional process to back up and truncate SQL transaction logs, further streamlining this
process for administrators.
Figure 8: Streamlined SQL Log Truncation Options
Non-VSS Compliant Virtual Machines and Applications
Platforms and applications that are not VSS compliant, such as many versions of Linux, cannot be effectively
protected using VSS-integrated processes. If such non-VSS-compliant virtual machines are protected using the
Agent for VMware and Hyper-V and image-level backups, such backups will be captured without knowledge of
any applications that may reside within the virtual machine. The virtual machines remain online and functional
during the snapshot and backup process; however, the backups are crash-consistent.
Administrators using Backup Exec™ 15 to protect virtual machines that are not VSS-compliant should consider
using agent-based backups, leveraging the Agent for Windows or the Agent for Linux. Using the Agent for
Windows or the Agent for Linux to protect non-VSS-compliant virtual machines helps to ensure that the virtual
machines, as well as the applications they contain, are backed up effectively.
17. 17
Virtual Machine Recovery Options
Backup Exec™ 15 supports a wide range of recovery options for VMware virtual machines. Each of these
recovery options is possible from a single-pass, image-level backup operation. No additional or separate
backup pass is required to achieve additional levels of granular restore.
Note: For virtualized applications, granular application recovery can only be enabled by combining the Agent for
VMware and Hyper-V with the Agent for Applications and Databases, and by installing the Agent for Windows to the
virtual machines hosting applications in the VMware environment.
Full Virtual Machine Recovery
Backup Exec™ 15 supports full recovery of VMware virtual machines. This includes all elements of a virtual
machine, such as the virtual disk files and any other virtual machine-related files. During a full virtual machine
recovery operation, virtual disk files are completely recovered, including the operating system, applications,
and data. Integration with the Microsoft VSS service ensures that VSS-aware applications, such as Exchange
and SQL, hosted on VSS-aware platforms, such as Windows 2008/R2 and Windows 2012/R2, are completely
recovered.
A virtual machine can be recovered to the original VMware host or can be redirected to an alternate host.
Note: To redirect a virtual machine to an alternate VMware host during recovery, the alternate host must also be
licensed for the Agent for VMware and Hyper-V.
Virtual Disk Configurations and Support
Backup Exec™ 15 supports the protection of VMware virtual machines configured with either thick or thin
virtual disks. On recovery, the administrator can recover a VMware virtual machine with either a thick or thin
virtual disk, and can therefore change the virtual disk type during a recovery operation (e.g. thick to thin or
thin to thick).
Application Recovery
For virtual machines hosting Exchange, SQL, SharePoint, and Active Directory, full recovery at the application
level is also supported by Backup Exec™ 15, but only when the Agent for VMware and Hyper-V is combined
with the Agent for Applications and Databases and the Agent for Windows is installed on the virtual machine
hosting the application. This allows administrators to recover a full application instance if a full virtual machine
recovery is not necessary or is not intended.
Exchange, SQL, SharePoint, and Active Directory backups are fully VSS-compliant in accordance with Microsoft
best practices, ensuring that the applications operate and function correctly after recovery.
Note: Application-level recovery is not supported for virtualized applications in a distributed configuration when
protecting the virtual machines using image-level VADP backups through the Agent for VMware and Hyper-V.
Granular Application Recovery
Backup Exec™ 15 enables administrators to recover granular application objects from single-pass backups of
VMware virtual machines when the Agent for VMware and Hyper-V is combined with the Agent for
Applications and Databases and the Agent for Windows is installed on the virtual machine hosting the
application. For example, the granular application objects that can be recovered in this configuration include
Exchange mailboxes, emails, attachments, and calendar items, Active Directory objects such as user and
computer objects, SharePoint documents, SQL databases, and more.
18. 18
Important: A separate database-level or object-level backup is not required for granular application recovery; the same
single-pass, image-level backup is harvested for granular application object recovery operations.
Figure 9: Granular Recovery for Virtualized Applications
Note: Granular application recovery is not supported for virtualized applications in a distributed configuration when
protecting the virtual machines using image-level VADP backups through the Agent for VMware and Hyper-V.
Granular File and Folder Recovery
Backup Exec™ 15 also supports granular file and folder recovery from VMware virtual machine backups
captured using the Agent for VMware and Hyper-V. The recovery is performed from the same single-pass,
image-level backups used for other recovery options.
It is not necessary to have the Agent for Windows installed on a VMware virtual machine to enable granular
file and folder recovery. However, having the Agent for Windows installed on the virtual machine is required in
order to recover files and folders directly to the source virtual machine.
Optionally, if the Agent for Windows is not installed on the original machine from which backups were
captured, files and folders can be recovered to a local directory on the Backup Exec server and moved back to
the original virtual machine using other methods.
19. 19
Improved Usability for Virtual Environments
New Lower Pane Feature
Backup Exec™ 15 includes an improved usability experience for administrators protecting virtual environments.
This feature – commonly referred to as the Details pane view – enables administrators to view additional
details about a virtual host in the Backup and Restore tab of the Backup Exec™ 15 user interface.
Interactive View
This Details pane is associated with virtual hosts and represents a current view of the target virtual host and
the folders and virtual machines it contains, and can be refreshed as required. From the Details pane, recovery
operations can be directly initiated for those virtual machines that have been backed up at least once by
Backup Exec.
Figure 10: Details Pane View for Virtual Hosts
This feature further streamlines the overall experience for Backup Exec™ 15 administrators protecting critical
virtual infrastructures.
20. 20
Backup Exec Management Plug-in for VMware
Overview
The Backup Exec Management Plug-in for VMware allows administrators of VMware virtual environments that
are protected by Backup Exec™ 15 to utilize the vSphere client application to perform status monitoring and
virtual machine validation tasks without having to visit the Backup Exec server console. The Backup Exec
Management Plug-in for VMware provides the administrator with the following capabilities:
• Monitor backup status of VMware virtual machines protected by Backup Exec.
• View resource-centric backup status of protected virtual machines.
• Perform virtual machine validation tasks.
The information that is displayed in the vSphere client interface is retrieved from the Backup Exec server that
controls the backup jobs protecting VMware virtual machines.
The Backup Exec Management Plug-in for VMware is installed on a system that also runs the VMware vSphere
client, and supports both vCenter server environments and standalone vSphere ESX/ESXi hosts. The Backup
Exec management information is displayed within the context of the vSphere client application on a separate
Symantec Backup Exec tab.
The Backup Exec Management Plug-in for VMware requires VMware vSphere 4.0 or later components.
Note: For more information on the versions of Backup Exec and VMware vSphere that are supported by this
management plug-in, please refer to the Backup Exec Software Compatibility list, available here: TECH205797
Login
Users of the Backup Exec Management Plug-in for VMware will be required to log in to the associated Backup
Exec server. This can be done by specifying the server’s hostname or IP address. The credentials must
represent a user who is a member of the Backup Exec Operators group.
Monitoring
In the plug-in display, the administrator can view all the Backup Exec backup jobs that protect virtual machines
in the VMware environment. For environments with multiple Backup Exec servers running jobs that protect
VMware virtual machines, the administrator can connect to one Backup Exec server at a time to monitor the
status of VMware backup jobs processed by that server.
Additional views are also offered, such as a view that displays unprotected virtual machines or a view that
displays virtual machines that are protected by a different Backup Exec server.
21. 21
Figure 11: Backup Exec Management Plug-in for VMware
Note: For additional information on supported platforms and other requirements for the Virtual Machine Validator,
please refer to the Backup Exec Software Compatibility List available here: TECH205797
22. 22
Example VMware Configurations
Configurations of Backup Exec™ 15 in virtual environments vary depending on the size, configuration, and
complexity of the virtual environment that is being protected. In this section, we will review some basic
configuration examples for VMware environments.
Basic VMware Environment with a Single vSphere ESX/ESXi Server
In this example, Backup Exec™ 15 is protecting a single vSphere ESX/ESXi server with a small number of virtual
machines. Backup Exec is installed on a separate physical server, because this usually offers the best
performance. Optionally, Backup Exec could be installed as another guest virtual machine on the vSphere
ESX/ESXi host.
This example also shows the virtual machines being protected as residing on a shared SAN storage array. When
a vSphere configuration utilizes shared SAN storage, and the Backup Exec server is connected to the SAN
infrastructure, VMware virtual machine backup data can be transported to the backup destination over the
SAN, which can offer significant performance benefits.
Figure 12: Basic VMware Environment with a Single vSphere ESX/ESXi Server
Advanced VMware vCenter Environment (Multiple vSphere ESX/ESXi Hosts)
In this example, Backup Exec™ 15 is protecting a more complex VMware vSphere environment that includes
multiple vSphere ESX/ESXi servers and a vCenter server. In configurations such as these, Backup Exec can
protect virtual machines through the vCenter server itself and it is not necessary to perform operations at the
vSphere ESX/ESXi server level.
This example also shows the virtual machines being protected as residing on a shared SAN storage array. When
a vSphere configuration utilizes shared SAN storage and the Backup Exec server is connected to the SAN
infrastructure, transporting data over the SAN can offer significant performance benefits.
Figure 13: Advanced VMware vCenter Environment
23. 23
Performance Recommendations
Tape Backup Devices
In most – but not all – environments, larger block and buffer sizes will yield better performance.
The host bus adapter (HBA) and HBA driver being used in a backup environment govern what block and buffer
sizes are available for optimization. The screenshot below highlights the area of the Backup Exec™ 15 user
interface where block and buffer values can be customized for a specific tape drive.
Figure 14: Block and Buffer Settings
Note: To avoid issues when using older tape devices or tape devices from different hardware manufacturers, please
review the following tech note: TECH64105
Disk Backup Devices
In most – but not all – environments, larger block and buffer sizes will yield better performance.
Deduplication Disk Storage Devices
For deduplication disk storage devices hosted on NTFS volumes local to the Backup Exec server, the NTFS
cluster size can impact performance. For optimal performance, consider placing the deduplication disk storage
device on an NTFS volume formatted with a cluster size of 64 KB.
VADP Buffer Settings
Buffer settings associated with VADP (VMware) backups captured by Backup Exec can be adjusted by
modifying the values of several registry keys on the Backup Exec server. Modifying the values of these registry
keys may result in improved performance for VMware backups using SAN transport mode or NDB mode.
Please review the following tech note for more information: TECH185691
Note: The tech note above was originally written for Backup Exec 2010, but the information it contains also applies to
Backup Exec™ 15.
24. 24
GRT Catalog Operation Scheduling
Backup Exec™ 15 now allows administrators to configure schedules for when GRT cataloging operations must
be performed. Managing the GRT catalog operation schedule improves backup performance by allowing these
operations to occur at a later time, separate from the backup jobs with which they are associated.
SAN-based Backup Guidance
Configuring SAN-based VMware backups with Backup Exec™ 15 and the Agent for VMware and Hyper-V is
simple with the following guidelines:
• Zone the LUNs that contain the VMFS data store such that the Backup Exec server can see and access
them.
• On the Backup Exec server, ensure that the automount disable and automount scrub
commands have been run to disable automatic drive letter assignment.
• As a result of the automount disable and automount scrub commands having been run, the
VMFS datastore LUNs will appear in Windows Disk Administrator (on the Backup Exec server) as
“unknown”; do not attempt to mount, partition, or format these disks.
Backup performance will be largely determined by the slowest component of the entire backup data path from
the vSphere ESX/ESXi Server to the Backup Exec storage location (i.e. Tape or Disk). These components are:
• vSphere ESX/ESXi server system resources: CPU (GHz)
• vSphere ESX/ESXi system disk I/O capabilities (Gbps)
• Network type (Fiber Channel 1/2/4/8GB, iSCSI, 1/10GB Ethernet, and so on)
• Backup Exec server system resources
General VMware Performance Guidelines and Expectations
Here are some basic guidelines that should be followed when designing a VMware environment to be
protected by Backup Exec and configured for optimal performance:
• For SAN-based backups, consider installing Backup Exec on a standalone physical server.
• The internal bus of the Backup Exec server should be fast enough to support the I/O devices that are
connected to it.
If multiple I/O ports are used, a system with multiple internal buses should be considered to support
the additional I/O.
• Backup Exec server I/O performance is generally more important than CPU performance.
For example, a 2 GB Fiber connection should be able to transfer backup data at a nominal transfer rate
of 140 MB/second.
Backups over Gigabit Ethernet will likely be much slower, while 4/8 GB Fiber Channel connections and
newer iSCSI configurations should be significantly faster.
Note: For more information, see the following tech note: TECH125455
Recommended Number of Virtual Machines to Protect with a Single Backup Exec Server
There is no programmatic limit to the number of virtual machines that a single Backup Exec server can protect.
This is highly dependent on the size of the VMDK files for each virtual machine and the physical backup
25. 25
infrastructure. In large environments, multiple Backup Exec servers can be used to optimize performance
across the infrastructure.
Backup Strategy Recommendations
Symantec recommends using a seven-day rotation to protect VMware virtual machines with incremental or
differential backups, where a full backup is run on the seventh day to avoid long incremental/differential
backup chains.
Symantec also recommends using the Backup Exec™ 15 Deduplication Option with the Agent for VMware and
Hyper-V. This will significantly reduce backup storage requirements associated with virtual machine backups.
26. 26
Notes and Best Practices
Virtual Machines Configured with RDM Physical Compatibility Mode Disks
Backup Exec™ 15 and the Agent for VMware and Hyper-V cannot protect Raw Device Mapping (RDM) Physical
Compatibility Mode disks using image-level backups.
Physical Compatibility Mode RDM disks bypass the vSphere storage infrastructure and the VMFS file system,
and cannot have a snapshot taken through vStorage API processes. Physical Compatibility Mode RDM disks in
this configuration are skipped automatically during backup job processing. Associated backup jobs are
displayed as successful with exceptions.
To fully protect virtual machines configured with Physical Compatibility Mode RDM disks, the Backup Exec
Agent for Windows or Agent for Linux must be installed on the virtual machines to protect them using agent-
based backups.
Virtual Machines Configured with Fault Tolerance
Backup Exec™ 15 does not support using the Backup Exec Agent for VMware and Hyper-V to protect vSphere
Fault Tolerant virtual machines.
Virtual machines which ar enabled for Fault Tolerance are not supported for snapshots. The Backup Exec Agent
for VMware and Hyper-V uses snap-based backups via the vStorage APIs for Data Protection (VADP) to protect
VMware virtual machines, and therefore cannot protect virtual machines with Fault Tolerance enabled. The
only way to back up a virtual machine that is enabled with Fault Tolerance using the Backup Exec Agent for
VMware and Hyper-V is to break the Fault Tolerance, run the backup, then re-enable Fault Tolerance.
The workaround for protecting Fault Tolerant virtual machines without breaking the Fault Tolerance is to
install the Agent for Windows on that virtual machine and protect it like a standalone physical machine using
agent-based backups.
Windows 2012/R2 Running as a VMware Virtual Machine
Backup Exec™ 15 can protect and recover Windows 2012/R2 virtual machines running in a VMware
environment. This includes support for agent-less, agent-assisted, and agent-based backup methods.
For agent-based backups:
• The Backup Exec server must be installed on a Windows 2012/R2 server
• Data deduplication volume data is backed up and recovered in fully hydrated or un-optimized form.
• Data captured from ReFS volumes can only be restored to ReFS volumes.
• WinRE volumes must be mounted (e.g. drive letter assignment) to be protected.
27. 27
For More Information
Link Description
www.symantec.com/business/backup-exec-for-windows-servers Backup Exec Family Landing Page
www.symantec.com/business/products/whitepapers.jsp?pcid=pcat_business_cont&pvid=57_1 Backup Exec White Papers
www.symantec.com/business/products/datasheets.jsp?pcid=2244&pvid=57_1 Datasheets, Solution Briefs
TECH205797 Backup Exec Compatibility Docs
www.backupexec.com/configurator Backup Exec Product Configurator
www.backupexec.com/skugenerator SKU Generator and BEST Tool