System Recovery 2013 Server Edition vs Small Business Edition?
Hi! On our good old Windows XP machines for backup and recovery in our small business we used Symantec's Norton Ghost and Acronis True Image. Now we are switching to Windows 8.1 and will also add a Windows Server 2012 R2 Essentials (the new Microsoft Small Business Server). Because Microsoft's built-in free backup cannot be configured with advanced options and does not seem to be very reliable we are now looking for a new and hopefully better small business (paid) solution. What we actually need is an imaging solution with backup tasks that can be targeted at lokal disks as well as network shares and USB disks attached to the server for offsite rotation. Automatic nightly backups through wake on LAN or BIOS wake up timer are needed, so the backup solution should be also able to turn off the PCs after backup. Unfortunately, it turns out that there are not any reliable solutions out there in 2014! We tested Acronis business products which turned out to have nice features but are very unreliable and unusable in the end. We tested ARCserve which is ok but cannot be configured much, it actually offers only a single backup task and does not have Win 8.1 support, although it claims to be certified for this OS already - they wanted to send me some internal beta patches but we did not accept this. And so finally we came to System Recovery 2013 which was actually not easy to find between all the other solutions on the market, maybe it is the lack of marketing information available... So we finally tested SSR 2013 SP2 on our Win 8.1 desktops and it seems to work fine - better than the other solutions. There are not many changes compared to Norton Ghost but it does its job, can be configured with advanced options and that's what we need. Now the problem with Symantec System Recovery 2013 is that there is too few information on this product and there is nobody to ask. You want to buy a product and there is no info - really annoying! In the key features you read about Win 8.1 / Server 2012 R2 support (and it seems to be available through SP2) but nobody seems to care to update this info in the system requirements on Symantec's website. Does not sound very promising for a business product. The situation is even worse when looking for information about the Server editions of SSR. There is a Server Edition and a Small Business Server Edition. But what is the difference? Can they backup Hyper-V virtual machines? From the host? From the guest? Is Windows Server 2012 R2 Essentials supported in the SBS edition? The Essentials Server is actually Microsoft's new small business server so it should... I requested a callback from Symantec here in Germany but nobody seems to care. It is also still unclear how many licenses I need. In the new Windows Server 2012 R2 Essentials Microsoft allows to install the OS on the physical host + on one free Hyper-V server VM. Is this Hyper-V VM also covered by the SSR Small Business Server Edition license? Do I need any additional agents if I need to backup from the physical server AND from whithin the virtual Hyper-V server (file level recovery is needed)? How much will it finally cost? I don't find any docs especially for the server editions and I don't see any clear Hyper-V licensing statements. Again, very disappointing for a business product. But maybe someone here can provide more info to help us in our decision? Thanks in advance. AnguelSolved2.1KViews3likes16CommentsCompleted with exceptions: system volume information
We have BE 2012 running on Windows 2008 R2 server. We are backing up 5 volumes located on the server. 4 of them are LUNs from P2000 g3 SAS, directly connected via SCSI cable. System seems them as DAS disks. I: LUN1 P: LUN2 L: LUN3 E: LUN4 D: Local volume (4 RAID5 disks) Shadows copies have been enabled on all volumes.I can browse/restore data . I have plenty free space left. I have limit set as well and it is far away of reaching it. Now for no particular reasons Backup Exec 2012 completed with exception for P: I: volumes with the following warning: - Snapshot Technology: Initialization failure on: "\\xxxxx-xxx\P:". Snapshot technology used: Microsoft Volume Shadow Copy Service (VSS). V-79-10000-11242 - VSS Snapshot error. Out of disk space, or could not find an NTFS volume while creating the snapshot. Microsoft Volume Shadow Copy Service (VSS) requires an NTFS volume with enough free disk space for each physical or virtual disk volume to cache the data that changes during the backup job. Consult the Microsoft documentation for more information. That what happens when I backup to tape (LTO5 via HP Utrium 3000). When destination is HDD, I can see the following (exception for I and P): Unable to open the item \\XXXXXX-XXX\I:\System Volume Information\{573950ac-d772-11e2-905b-984be107e958}{3808876b-c176-4e48-b7ae-04046e6cc752} - skipped. Unable to open the item \\XXXXXX-XXX\I:\System Volume Information\{58fa8a79-d38e-11e2-9f73-984be107e958}{3808876b-c176-4e48-b7ae-04046e6cc752} - skipped. Unable to open the item \\XXXXXX-XXX\I:\System Volume Information\{753d8583-d9c7-11e2-94dc-984be107e958}{3808876b-c176-4e48-b7ae-04046e6cc752} - skipped. Unable to open the item \\XXXXXX-XXX\I:\System Volume Information\{753d8dd8-d9c7-11e2-94dc-984be107e958}{3808876b-c176-4e48-b7ae-04046e6cc752} - skipped. Unable to open the item \\XXXXXX-XXX\I:\System Volume Information\{8a2652dd-d88f-11e2-905b-984be107e958}{3808876b-c176-4e48-b7ae-04046e6cc752} - skipped. Unable to open the item \\XXXXXX-XXX\I:\System Volume Information\{a89b127f-d51e-11e2-905b-984be107e958}{3808876b-c176-4e48-b7ae-04046e6cc752} - skipped. Volume E: (which is the LUN from the same P2000 box) is OK. All volumes have this folder in the root. That’s OK, that’s how MSS/VSS works. And that’s where shadow copies are held. So what’s wrong then?! It is definitely not P2000 box that cause the problem as E volume is OK. (I tried hardware provider (HP) for VSS as well btw, without any results.) Any ideas ? Thanks563Views3likes1CommentProtecting Hyper-V Virtual Machines on SMB using Backup Exec 20.4
Starting from Windows Server 2012, virtual machines in Hyper-V can be configured to use Server Message Block (SMB) 3.0 file shares as storage just like local volumes. By using SMB shares, storages for Hyper-V can be converged and operating costs can be reduced. Additional advantages of Scale-out file servers include continuously available file services, automatic load balancing and easy management of servers. Deploying Hyper-V over SMB shares from Scale-out file servers is an ideal solution for Hyper-V.7.8KViews2likes1CommentResources for the IT Consultant for SMB Professional
Hey Everyone, As an IT Professional, you want to make sure that you have what it takes to provide secure and protected environments for your clients. There are so many good resources around that I thought I would take a minute and share some with you. Here’s the quick guide to some valuable resources. For you:211Views2likes0CommentsBackup Exec 2012 health check guide
Hi, i'm a newbie to this backup exec 2012, and recently we have active contract on supporting this Backup Exec 2012. By supporting this, we need to perform health check or software preventive maintenance on the servers equipped with backup exec 2012 on quarterly basis. Just want to know that whether there are some guidelines or procedures/steps on what we need to include in the health check such as services, connections, patches? Please share with me if anyone know how to prepare a backup exec 2012 health check checklist in order to perform the preventive maintenance for the servers. Thanks1.6KViews2likes5CommentsSDRO 6.1: How to configure SQL Server for disaster recovery or migration to Microsoft Azure
Symantec Disaster Recovery Orchestrator 6.1 (SDRO) lets you configure your on-premises SQL Server 2008 R2 or 2012 instances for disaster recovery (DR) or migration to the Microsoft Azure cloud. You need to make identical SQL Server configurations, including users and privileges, on the on-premises and the cloud hosts. The Disaster Recovery Orchestrator Configuration Wizard lets you select the SQL Server instances that you want to configure for monitoring and the detail monitoring options as well. The wizard detects the application data folders and automatically selects them for replication. For more information, refer to the following guides: Symantec Disaster Recovery Orchestrator 6.1 Agent for Microsoft SQL Server 2008 R2 Configuration Guide Symantec Disaster Recovery Orchestrator 6.1 Agent for Microsoft SQL Server 2012 Configuration Guide Additional SDRO documentation can be found on the SORT website.519Views2likes0CommentsMonitoring machines
Good morning, It would not be important in similar forensic software security solution to point some strange movement in net for manual configuration? Would not it be nice to send this log to the administrator so that it has real science of what happens on their machines? The fact that even happens that the only security solution for password and disable it is discovered any protection software with password folder can hold a virus where this solution can not be detected due to have a password contained Performing a test in a given security software that will not mention the name says it the same as the high power of detection can not detect which way the folder with password there is a virus code that I created is not the same as new I sent them to the database and still is not detected because the folder containing password. In this case the solution would be important to periodically report to the administrator the steps that are being taken on all machines on your network because each machine would have this solution that would monitor every activity detecting managing such facilities that protect files with password and security does not detect your code simplest is that despite being in the database. Big hug859Views2likes2CommentsYou design your system
For better be your antivirus, two problems occur frequently: Lack of update. Inefficiency to block changes in the registry keys or writing to the system folder. For malware to install itself on the system successfully it needs basically two things, run and allowed to spread. Many users do not know, but as an administrative user, you have the power to destroy your system if you wish, as well as install whatever you want on it. When working on a computer as an administrative user, everything the user does is run with administrative powers and as such, you can modify any part of the operating system. hugs449Views2likes0CommentsRisks of fraud power increase in business
The risks of fraud in computer security or enterprise networks have grown considerably in Brazil and worldwide. Essas são algumas das conclusões de um estudo realizado pela Deloitte intitulado “Risk Intelligent governance in the age of cyber threats”. These are among the findings of a study conducted by Deloitte titled "Risk Intelligent governance in the age of cyber Threats." The study, which took into account other surveys to be drawn, points out that in 2011, organizations heard suffered an average of more than one successful cyberattack per week, which represents an increase of 44% compared to 2010. "Companies generally, should no longer be questioned about the possibility of such an attack happen. É bem provável que ele já esteja acontecendo”, destaca André Gargaro, sócio da área de Gestão de Riscos Empresariais da Deloitte. It is very likely that it is already happening, "says André Gargaro, a partner in the area of Enterprise Risk Management at Deloitte. The cyber attacks, the study indicates, may harm a business in various ways, from simple vandalizing the site, even to the shutdown of electronic fraud and intellectual property theft. In Brazil, Deloitte indicates, with the exception of the financial industry, preparation companies is still very reactive in relation to protection. Apenas depois da ocorrência de um evento considerável é que as corporações começam a se preocupar com medidas para evitar impactos de outros ataques. Only after the occurrence of an event is significant that corporations begin to worry about measures to avoid impacts to other attacks. "The ideal is to anticipate possible attacks through knowledge of their potential invaders and shapes how they act. As empresas precisam investir de forma mais eficiente em ferramentas, pessoas e processos”, aconselha Gargaro. Companies need to invest more efficiently in tools, people and processes, "advises Gargaro488Views2likes0Comments