Recovery Solution™ 6.2 SP3 Reference Guide: Ltiris
Recovery Solution™ 6.2 SP3 Reference Guide: Ltiris
Notice
Altiris Recovery Solution 6.2 SP3 1994-2008 Altiris, Inc. All rights reserved. Information in this document: (i) is provided for informational purposes only with respect to products of Altiris or its subsidiaries (Products), (ii) represents Altiris' views as of the date of publication of this document, (iii) is subject to change without notice (for the latest documentation, visit our Web site at www.altiris.com/Support), and (iv) should not be construed as any commitment by Altiris. Except as provided in Altiris' license agreement governing its Products, ALTIRIS ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTIES RELATING TO THE USE OF ANY PRODUCTS, INCLUDING WITHOUT LIMITATION, WARRANTIES OF FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY THIRD-PARTY INTELLECTUAL PROPERTY RIGHTS. Altiris assumes no responsibility for any errors or omissions contained in this document, and Altiris specifically disclaims any and all liabilities and/or obligations for any claims, suits or damages arising in connection with the use of, reliance upon, or dissemination of this document, and/or the information contained herein. Altiris may have patents or pending patent applications, trademarks, copyrights, or other intellectual property rights that relate to the Products referenced herein. The furnishing of this document and other materials and information does not provide any license, express or implied, by estoppel or otherwise, to any foregoing intellectual property rights. No part of this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means without the express written consent of Altiris, Inc. Customers are solely responsible for assessing the suitability of the Products for use in particular applications or environments. Products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. *All other names or marks may be claimed as trademarks of their respective companies.
This product includes software developed by the Apache Software Foundation. Such software is subject to the below conditions. The Apache Software License, Version 1.1 Copyright (c) 1999-2004 The Apache Software Foundation. All rights reserved. Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met: 1. Redistributions of source code must retain the above copyright notice, this list of conditions and the following disclaimer. 2. Redistributions in binary form must reproduce the above copyright notice, this list of conditions and the following disclaimer in the documentation and/or other materials provided with the distribution. 3. The end-user documentation included with the redistribution, if any, must include the following acknowledgment: "This product includes software developed by the Apache Software Foundation (http://www.apache.org/)." Alternately, this acknowledgment may appear in the software itself, if and wherever such third-party acknowledgments normally appear. 4. The names "Xerces" and "Apache Software Foundation" must not be used to endorse or promote products derived from this software without prior written permission. For written permission, please contact apache@apache.org. 5. Products derived from this software may not be called "Apache", nor may "Apache" appear in their name, without prior written permission of the Apache Software Foundation. THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE SOFTWARE FOUNDATION OR ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OFUSE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ==================================================================== This software consists of voluntary contributions made by many individuals on behalf of the Apache Software Foundation and was originally based on software copyright (c) 1999, International Business Machines, Inc., http://www.ibm.com. For more information on the Apache Software Foundation, please see <http://www.apache.org/>.
Contents
Chapter 1: Introducing Recovery Solution . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
Recovery Solution Product Overview . . . . . . . . Recovery Solution Enterprise . . . . . . . . . . Local Recovery . . . . . . . . . . . . . . . . . . . . Local Recovery Pro . . . . . . . . . . . . . . . . . Integration with other Altiris Solutions . . . . . . Recovery Solution Documentation . . . . . . . . . Recovery Solution Terminology . . . . . . . . . . . Recovery Solution Architecture. . . . . . . . . . . . Familiarizing Yourself with the Altiris Console . . Altiris Console Overview . . . . . . . . . . . . . Recovery Solution Configuration Tools Recovery Solution Task Policies . . . . . Recovery Solution Reports . . . . . . . . . Resource Manager Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 14 15 15 15 16 17 19 21 21 22 23 23 24
Monitoring the Recovery Solution Job Queue . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49 Running Reports. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50 Running Recovery Solution Utilities. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
Managing Recovery Solution Servers . . . . . . . . . . . . . . Managing Cluster Users. . . . . . . . . . . . . . . . . . . . . . . . Configuring Communication Settings . . . . . . . . . . . . . . Recovery Solution Security Role Management . . . . . . . . . . . Security Role Management . . . . . . . . . . . . . . . . . . . . . Configuring Recovery Server to Only Run Server Jobs. . . . . . Scan for applied critical patches and Software Delivery tasks. Manage Lost Recovery Solution Agents . . . . . . . . . . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
. . . . . . . .
Rollback Data Dialog Box. . . . . . . . . . . . . . . . . . . . Storage Locations Dialog Box (local mode only) . . . . Location for stored data on the Recovery Agent . Adding Additional Storage Locations . . . . . . . . . Managing Additional Storage Locations . . . . . . . Managing the Temporary Retention Folder. . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
. . . . . .
Altiris Local Recovery Agent Registration fails . . . . . . . . . . . . . . . . . . . Error message appears during Recovery Agent Setup . . . . . . . . . . . . . . User account not validated . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setup does not run properly . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Applications will not start after agent install. . . . . . . . . . . . . . . . . . . . . User Account & Logon Problems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protected Computers Cannot Connect to Server . . . . . . . . . . . . . . . . . . . . . User Logon Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protected users cannot be authenticated . . . . . . . . . . . . . . . . . . . . . . . . . . Data Protection & Recovery Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . Snapshot & File Restore Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . Snapshot Schedule for Certain Computers do not Run . . . . . . . . . . . . . User Cannot Log On to Start Snapshot . . . . . . . . . . . . . . . . . . . . . . . . Job Cannot Be Submitted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Protected computer drives missing from snapshots. . . . . . . . . . . . . . . . User Cannot Browse Protected Files . . . . . . . . . . . . . . . . . . . . . . . . . . User Cannot Access a Different Account Via Web-Based File Recovery . . Snapshots Fail Because Server Clocks Are Not Synchronized . . . . . . . . . General Snapshot & Recovery Problems . . . . . . . . . . . . . . . . . . . . . . . Short File Names Restored Incorrectly on FAT32 Partition . . . . . . . . . . . Full System Recovery Troubleshooting . . . . . . . . . . . . . . . . . . . . . . . . . . . Disk space error appears during Full System Recovery disk creation . . . . Full System Recovery does not start properly . . . . . . . . . . . . . . . . . . . Error appears during Full System Recovery . . . . . . . . . . . . . . . . . . . . . Full System Recovery fails when creating disk structure . . . . . . . . . . . . Full System Recovery incomplete, but no error appears . . . . . . . . . . . . Problems occur after server upgrade. . . . . . . . . . . . . . . . . . . . . . . . . . Error appears after Full System Recovery . . . . . . . . . . . . . . . . . . . . . . Recovery Agent not working after Full System Recovery . . . . . . . . . . . . Files missing or outdated after Full System Recovery . . . . . . . . . . . . . . Full System Recovery stalls . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery CD-ROM failure . . . . . . . . . . . . . . . . . . . . . . . . . Full System Recovery and Windows 98 with Symantec Antivirus . . . . . . Cannot Cancel Restore of Folder. . . . . . . . . . . . . . . . . . . . . . . . . . . . . Norton AntiVirus Security Warning . . . . . . . . . . . . . . . . . . . . . . . . . . . Account Disabled After Full System Recovery . . . . . . . . . . . . . . . . . . . . Full System Recovery fails on HP NetServer LC2000 . . . . . . . . . . . . . . . Recovery Fails on Computers with Phoenix nForce 6A61CPAAC-00 BIOS . Rollback Troubleshooting. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Unable to see Desired Snapshot During a System Rollback . . . . . . . . . . Rollback Cannot Be Started From the Console . . . . . . . . . . . . . . . . . . . Job Cannot Be Submitted . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . After Rollback, User Is Prompted to Uninstall . . . . . . . . . . . . . . . . . . . . Rollback Fails . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . After Rollback, a Restored Drive Contains No Data . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
208 208 209 210 211 211 211 212 213 213 213 213 214 214 214 214 214 215 215 215 216 216 216 217 220 220 221 221 222 222 222 222 223 223 223 223 223 224 224 224 225 225 225 225 226
Troubleshooting: Snapshots. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Snapshot Options Unavailable . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Nothing Happens . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Erratic Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Snapshots Don't Run . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Scheduled or Automated Snapshot Doesn't Run . . . . . . . . . . . Troubleshooting: Snapshot on Logoff Doesn't Run . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Snapshot Stops Prematurely . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Recovery Solution Stops During a Snapshot or Restore . . . . . . Troubleshooting: Windows Installer Appears During Snapshots . . . . . . . . . . . . . . . . Troubleshooting: Snapshot Is Missing Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: File Restores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Cannot View Protected Files . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Protected File Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Cannot Find File Versions . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Protected File Versions Are the Same . . . . . . . . . . . . . . . . . . . Troubleshooting: Restored Files Are Incorrect Versions . . . . . . . . . . . . . . . . . . . Troubleshooting: Not Enough Space Available to Restore (FAT32) . . . . . . . . . . . Troubleshooting: Miscellaneous File Version Problems . . . . . . . . . . . . . . . . . . . . Troubleshooting: Web-Based File Recovery Logon Doesn't Appear . . . . . . . . . . . . . . Troubleshooting: Restore Crashes Windows Explorer . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Recovery Solution Freezes During File Search . . . . . . . . . . . . . . . . Troubleshooting: Restore Stops Prematurely . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Unknown Restore Type. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Other Issues Relating to Restoring Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Custom user names for message queues gets renamed into the GUID-like names Troubleshooting: Error Messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Messages in the Progress Dialog Box . . . . . . . . . . . . . . . . . . Troubleshooting: New Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Repeated Error . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Message Boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Job Could Not Be Submitted . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Drive Configuration Message . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: System Low on Registry Quota. . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Options. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Can't Open Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Options Are Unavailable . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Schedule Settings Cannot Be Displayed . . . . . . . . . . . . . . . . . . . . Troubleshooting: Event Logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Messages.dll Is Missing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Event Log Full . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Messages in the Event Logs . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Error Checklist. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Virus Warning During Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback Has Missing or Damaged Files . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback Disables Computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Rollback General Protection Fault Error Message . . . . . . . . . . . . . . Troubleshooting: DHCP Problems After Rollback . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: Other Issues . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: DCOM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Troubleshooting: FrontPage 98 Personal Web Server Conflict. . . . . . . . . . . . . . . . . . Troubleshooting: Logon Problems. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
230 231 231 231 232 232 233 234 234 235 235 236 236 237 237 238 238 238 238 238 238 239 239 239 240 240 240 240 241 241 242 242 242 243 243 243 244 244 244 244 245 245 246 246 246 247 247 248 248 248 248 249 250 250
10
Cannot Access Dialog Box Buttons . Connection Firewall . . . . . . . . . . . Fast User Switching . . . . . . . . . . . Unknown Solution . . . . . . . . . . . . Event Viewer. . . . . . . . . . . . . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
. . . . .
11
12
Chapter 1
Recovery Solution Product Overview (page 13) Integration with other Altiris Solutions (page 15) Recovery Solution Documentation (page 16) Recovery Solution Terminology (page 17) Recovery Solution Architecture (page 19) Familiarizing Yourself with the Altiris Console (page 21)
Redundant File Elimination (RFE): Patented technology filters out files that already exist in the Altiris recovery repository or Altiris partition, storing common files once across your entire organization (Recovery Solution only). Redundant Block Elimination (RBE): Patented technology that reduces data transmission size by transmitting and storing only the portions of each file that is different from the previous snapshot. HLZS data compression is the industry standard for lossless data compression.
These technologies work together to make the backup process as seamless and efficient as possible, and achieve compression ratios as high as 15:1, minimize network and CPU loads, and provide scalability to thousands of users per repository. Note For a list of new features for Recovery Solution 6.2 SP3, see the Recovery Solution Release Notes. There are three different versions of Recovery Solution:
13
! ! !
Recovery Solution Enterprise (page 14) Local Recovery (page 15) Local Recovery Pro (page 15)
Files are backed up to a Recovery Solution Cluster (server-based mode) Files are backed up to a dedicated partition on the local hard drive (local mode) Files are backed up to both the Recovery Solution Cluster and the local hard drive (mixed mode)
Recovery Solution is integrated with Altiris Notification Server that provides automated web-based reports, agent deployment, event processing, notification policies, and more. Additional product highlights include the following items:
!
Recovery Solution administrators can allow users to protect their own computers, or they can schedule automatic snapshots to ensure that the computers are always protected by receiving continuous scheduled backup. Administrators can also control user rights, preventing users from performing certain tasks (such as disabling the schedule). When rights are granted, users can perform many tasks at will, reducing helpdesk involvement. Recovery Solution provides full system protection. This means that not only are typical data files (such as word processing documents and spreadsheets) protected, but all of the programs installed on the computer and all of the user settings are also protected. Files that are encrypted, open, or locked can also be backed up. This allows the entire computer to be fully restored to an earlier state. If a user's snapshot is cancelled or interrupted, they do not need to restart it from the beginning. You can restart the snapshot from the failure point or break point. This feature provides users with the ability to recover from a broken connection with the server at the exact same place as when their connection was broken. This is especially useful to remote users. If a user's operating system becomes so damaged that the user cannot even start the computer, you can create Full System Recovery (FSR) disks that can be used to start the computer and repair the system. The data protection process is secure. Protected data is stored within special BLOB files which can be mirrored, and also be encrypted while in transit. No user can access another user's files.
14
The Recovery Solution Console lets you manage the cluster and all its protected computers from any location on the network. If multiple clusters are configured, they can all be administered from a single console.
Local Recovery
Altiris Local Recovery offers data and user-state protection for your organization's desktop and notebook computers. Local Recovery takes daily snapshots of computers automatically and stores backups locally in a hidden Altiris partition (known as local mode). Local Recovery is exceptionally end-user friendly. End users can initiate a backup or restore by simply right-clicking their mouse or pressing the F11 key in a pre-boot environment. By taking daily snapshots automatically, the solution works seamlessly and unobtrusively to protect your systems and data without impacting user productivity. Note Local Recovery runs only on computers manufactured by Altiris partners (HP/Compaq/ Dell).
Open and locked file support Aggregate and individual status reporting Support for all brands of computers Create Altiris Partition on any drive Install Recovery Agent on client computers based on Notification Server policies Agent settings can be managed from Notification Server Local Full System Recovery from DVD
15
computers to an improper state. However, administrators still have the right to roll back computers to any snapshot taken before or after the task or patch was applied. Altiris PC Transplant Solution integration allows administrators involved in operating system upgrades or hardware refreshes to perform migrations to the new or re-imaged hardware directly from the Recovery Server. This provides the quickest most direct form of migration to date. Recovery Solution integrates with Altiris Helpdesk Solution by providing embedded Smart Tasks in the Helpdesk console. These embedded tasks allow helpdesk workers to initiate remedial Recovery Solution tasks, such as starting a snapshot or restoring a file for the end-user. Companies using Recovery Solution can now download a free monitor pack (Altiris Monitor Pack for Altiris Infrastructure) for use in Altiris Monitor Solution. This free plug-in allows administrators to gather and observe real-time information concerning their Recovery Solution servers. Recovery Solution also provides a custom view plugin for Altiris Real-Time System Manager Solution. Therefore, it is possible to see Recovery Solution Agent status on a remote machine. Recovery Solution integrates with Deployment Solution 6.5 to allow administrators to perform Full System Recovery using PXE (Pre-Boot Execution Environment) over network. For more information, see Full System Recovery Using PXE on page 139. Please see the integrated products documentation for more information.
Release Notes The release notes contain a list of the new features and known issues in this version of the product. It also contains any last-minute information that are not included in the main documentation.
Recovery Solution Reference Guide The reference guide provides instructions the administrator. This guide is available in both Adobe .PDF and Microsoft HTML Help formats.
Recovery Solution Users Guide The users guide provides information about using the Recovery Agent. This guide is available in both Adobe .PDF and Microsoft HTML Help formats and provides users with instructions for protecting their computers.
Altiris Console and Recovery Agent Context Sensitive Help Click the help button to open the help.
Altiris product documentation is available in Microsoft HTML Help (.CHM) and Adobe Acrobat (.PDF) formats. Documentation files are installed in the following directory: C:\Program Files\Altiris\Notification Server\NSCap\Help
16
You can access documentation from the Altiris Console by clicking the following icons in the upper-right corner of the Altiris Console: Access the contextual online help by clicking the online help icon. Access an index of all help by clicking the index icon.
The complete and most current versions of documentation are available from the Altiris Knowledge Base, which is available from the Altiris support Web page at www.altiris.com/support.
baseline snapshot
The first Recovery Solution snapshot of a protected computer.
cluster
A logical group of computers that consist of Recovery Solution servers.
DCOM
Microsoft Distributed Component Object Model consists of a set of system files that Recovery Solution uses when communicating with the server. DCOM provides both flexibility and added security for many applications that run on a network.
17
partial snapshot
A snapshot of only the drives you select. You can choose to include or exclude any local hard drive on your computer, whether or not it has system information on it. Note Files and folders that are specified in the Excludes for protected computer are not included in the snapshot.
protected computer
A users computer (workstation, notebook, and so on) whose data is protected by installing the Recovery Agent.
Recovery Agent
The software that manages backing up and restoring files on the computer.
rollback
Restoring files as well as computers registry from a snapshot that restores computers to a previous state. Rollback is used to repair your operating system and applications when your computer is not functioning properly.
restore session
The actual transference of data from a snapshot to a computer.
server
The computer that stores the snapshots of the protected computers running in serverbased mode.
server authentication
In server-based mode, Windows domain security is used. Your normal Windows logon account is used to give you access to Recovery Solution. If multiple users log onto your computer, each persons account must have access rights to the server. Your administrator configures the access rights.
snapshot session
The actual transferring of data to a snapshot. If data from multiple drives are included in a snapshot at the same time, Recovery Solution considers each drive a separate snapshot session, even though it performs all the snapshots right away.
snapshots
Snapshots contain one or more backed up files.
storage location
The location used by Recovery Solution or Local Recovery to store protected data.
18
VPN
In a Virtual Private Network, the communications are encrypted between a remote computer (the VPN client) and the remote access VPN gateway (the VPN server) to which it connects. With a VPN, a protected computer can send data across a shared or public network in a manner that emulates a point-to-point private link.
19
Notification Server
DB
DB DB DB Recovery Administration
Load Balancer
Figure 1
20
Load Balancer
If Load Balancing is turned on for a given Recovery Solution Cluster, multiple Recovery Solution Servers can be set up. The protected computer at the time of backup or recovery communicates with the load balancer, which then assigns the session to a recovery server. All load balancing is done through either HTTP or HTTPS and requires that the load balancer keeps users attached to only one server for the whole session until the session is ended by the recovery server. Microsoft Network Load Balancer (NLB) (a software based load balancer for IIS servers) and F5 BIG-IP Blade Controller have been tested and are supported.
Protected Computers
Protected computers are end users computers, laptops, and enterprise data servers that are protected by Recovery Solution. Depending on system configuration, one of the following protocols are used for communication between protected system and the Recovery Server for backing up and restoring data: DCOM, HTTP, and HTTPS. Note If load balancing is used, only HTTP and HTTPS are supported.
21
The Altiris Console provides the following tools that help you manage Recovery Solution:
! ! ! !
Recovery Solution Configuration Tools (page 22) Recovery Solution Task Policies (page 23) Recovery Solution Reports (page 23) Resource Manager Tools (page 24)
Note The computer running the Altiris Console must be able to connect to the Recovery Servers on your network to perform the Recovery Solution tasks for those servers. Specifically, make sure that TCP ports 80 and 135 are open on the Recovery Servers for communication with the Altiris Console and that you can ping the servers using their DNS names and IP addresses. For proper operation of the Altiris Console on computers running Windows XP SP2, you must disable pop-up blocking. In Internet Explorer window, click Tools > Pop-up Blocker > Turn Off Pop-up Blocker.
Recovery Agent Rollout tasks policies Recovery Agent Rollout software package Recovery Agent specific collections
Default Recovery Agent Settings configuration page Default Local Recovery Agent Settings configuration page
Recovery Solution Cluster creation tools Recovery Solution Cluster nodes and configuration page Recovery Solution Server installation policies Upgrade and uninstall task policies Recovery Solution specific collections
22
Tasks
Convert encrypted files on FAT partitions Erase the protected computers partition table Manage Agent Setup package Restore data from Full System Recovery CD/DVD-ROMs Restore data using the Migrate utility Agent Settings Encryption/ Decryption Utility Altiris Partition Removing Utility
Link to information
Convert Encrypted Files on FAT Partitions (page 128) Full System Recovery incomplete, but no error appears (page 220) Manage Agent Setup Packages (page 127) Restoring Data From Full System Recovery Media (page 146) Restoring Data with the Migration Utility (page 130) AeXRSEnc Utility (page 279) BWINST Utility (page 288)
To access the Recovery Solution task policies, open the Altiris Console, click the Tasks tab, and then select Incident Resolution > Recovery Solution. For information on performing these tasks, click the policy and read the description and instructions in the right content pane. You can also click the links listed above.
23
View recovery-based information about individual client computers Perform recovery tasks on individual computers Create and view collections of computers
To view the Resource Manager for a computer, click the computer item in either a report or collection. From a collection, you can also right-click a computer to perform recovery tasks on that computer. For more information, see Viewing Recovery-related Information about Individual Computers Using the Resource Manager (page 114).
24
Part I
Installing Recovery Solution (page 26) Getting Started with Recovery Solution (page 46) Recovery Solution Agent Installation (page 51) Configuring Recovery Solution (page 75) Recovery Solution Tasks (page 114) Advanced Snapshot and Recovery Procedures (page 128) Using Recovery Solution Reports and Job Queue (page 153)
Part II contains chapters that explain how to use the Local Recovery Agent on client computers. Part III contains chapters that include troubleshooting and technical reference information.
25
Chapter 2
Recovery Solution Server Component Requirements (page 26) Recovery Solution Client Component Requirements (page 30) Installing Recovery Solution Server Components (page 34) Installing Recovery Solution Client Components (page 42) Upgrading Recovery Solution (page 42) Licensing Recovery Solution (page 44) Uninstalling Recovery Solution (page 44)
For information on installing the Recovery Agent, see Recovery Solution Agent Installation on page 51. For information on installing Local Recovery Pro, see Installing the Recovery Agent in Local Mode on page 60.
Description
! ! !
Windows Server 2003 Windows Server 2003 R2 Windows Server 2000 SP2 or later Microsoft SQL Server 2000 SP3 or later Microsoft SQL Server 2005 Microsoft IIS 5.0. This component is not installed by default with Windows 2000 or later. For Windows 2003, ASPNET needs to be enabled. Microsoft Internet Explorer 6.0 or later Altiris Agent 6.0 SP3 or later
SQL Database
! !
Microsoft Windows Internet Information Services (IIS) Web Browser Altiris Software
! !
26
For Recovery Agent requirements, see Recovery Agent Requirements (page 51). Note If you have previously installed Local Recovery Pro on this computer before Notification Server was installed, after you have installed Notification Server, you will need to reinstall Local Recovery Pro for it to be recognized by Recovery Solution. See also: Setting up Recovery Solution Prerequisite Components (page 27).
Configuring the Load Balancer (page 27) Configuring the SQL Database (page 28) Install the Altiris Agent (page 29)
The load balancer should be installed according to the installation instructions of the manufacturer.
All Recovery Solution Servers are connected to a network hub The network hub is connected to a programmable switch on your network Program the switched port address table with the Network Load Balancing virtual MAC address. Example: if your hub is plugged in to port 8 on your switch, program the switch that the Virtual MAC address is connected as port 8.
27
28
4. 5.
Select the discovery methods you want to use. You must select at least one method.
"
Select the Domain Browse List option to discover computers (including Windows 98) that are currently sharing files.
29
"
Select the Domain Membership option to discover computers that have trust accounts in the domain and are running Windows NT, 2000, XP, and 2003. This method will not find any Windows 98 computers.
6. 7.
Click Discover Now. After the discovery process completes, click Apply.
The computers in the specified domains are discovered and can be selected to receive the agent.
If you did not perform a computer discovery (because you only have a few computers on which you want to install the agent, such as during an evaluation) or you want to specify a computer manually, enter the name of the computer on which you want to install the agent in the field next to the Add button, and then click Add. Repeat this for all computers on which you want to install the agent. If you performed a computer discovery, click Select Computers. In the dialog that opens, select the computers to which you want to install the agent. Click OK. Note The fact that a computer can be discovered does not mean that you can push the agent to it. The computer must be running an operating system that supports having agents pushed to it.
"
5. 6. 7.
Click Install Altiris Agent. The Options page opens to let you set configuration properties for the Altiris Agent. Select the Show the Altiris Agent icon in the system tray option. Click Proceed with Install.
Requirements for Running the Recovery Agent in Server-based Mode (page 31) Requirements for Running the Recovery Agent in Local Mode (Local Recovery) (page 33)
30
Important Issues with Using the Recovery Agent and BootWorks Partitions (page 34)
Windows Vista (32-Bit or 64-Bit Edition) Windows Server 2003 (32-Bit or 64-Bit Edition) Windows XP Professional (32-Bit or 64-Bit Edition) Windows 2000 SP4 (Professional, Server, or Advanced Server) Windows 98 SE (Second Edition)
Note Multi-boot configurations are not supported. Additional Software Disk Space
!
Microsoft Internet Explorer 5.0 or later At least 10 MB of free disk space is required to store client software. Additional free disk space might be needed for DCOM and Dial-Up Networking updates required to use Recovery Solution. For Full System Snapshot with Full System Recovery capability: Requires additional free disk space (after installation) equivalent to the size of the Windows registry. (20 MB should be sufficient in most cases.) For recoveries (including Full System Recovery): Free disk space required is the greater of 1% of total disk space, or the size of the largest file on the drive. TCP/IP network or RAS connection Windows domain account for each user If you have a firewall, you must have ports 80, 137, and 43190 opened in order for the Recovery Agent to register with the Recovery Solution Server. 10 Mbit connection recommended for first snapshot 28 Kbit or faster connection for subsequent Full System Snapshot
Windows Networking
! ! !
Network Connection
! !
31
Other Hardware
Bootable CD-ROM or DVD-ROM drive, or CD-ROM or DVD-ROM drive and 3.5-inch 1.44 MB floppy drive Full System Recovery currently does not support the use of software RAID controllers. A limited number of hardware RAID adapters is supported. 800 x 600 or greater screen resolution 256 or more colors Altiris Agent 6.0 or later
Display
! !
Altiris Software
32
Requirements for Running the Recovery Agent in Local Mode (Local Recovery)
Minimum Requirements (Local Recovery and Local Recovery Pro)
Note The Standard version of Local Recovery can only be installed on computers manufactured by Altiris partners. Local Recovery cannot be installed and run on computers with AMD K6-2 processor. Operating System One of the following: Microsoft Windows 2000 SP4 Microsoft Windows XP Home Microsoft Windows XP Professional (32-Bit or 64-Bit Edition) Microsoft Windows Server 2003 (32-Bit or 64-Bit Edition) Microsoft Windows Vista (32-Bit or 64-Bit Edition) Disk Drives and Space The following drive types are supported by Local Recovery and Local Recovery Pro: IDE Serial ATA* SCSI* Note To run the Recovery Agent in local mode, you must have enough free space on the local hard drive to store your snapshots. We recommend that you have between 40% and 50% of your hard drive free of space. This free space must exist within the existing primary partition for Local Recovery. Non-partitioned free space is not required. The Altiris Partition requires contiguous free space on the drive. For best results, run a disk defragmentation utility on the drive before installing. If the drive does not have enough contiguous free space, you will get an error stating Altiris Recovery Agent failed to create initial image of the system. For more information, see Troubleshooting: Problems Installing the Local Partition in the Recovery Solution Reference Guide. Display
! !
The Local Mode Prerequisite Package contains the Recovery Agent Partition component and must be distributed to clients prior to running the Local Recovery Agent setup.
*For a list of supported devices, see Hard Disk Support on page 297.
33
Important Issues with Using the Recovery Agent and BootWorks Partitions
Note The following information only applies to Deployment Solution 6.1 or older. Newer versions of Deployment Solution are compatible with Recovery Agent. Recovery Solution, when configured to run in local snapshot mode, stores the contents of snapshots in the hidden Altiris Partition on the computers hard drive. If you use Altiris Deployment Solution, computers may already have an embedded BootWorks partition on the hard drive. Currently, it is not possible for an embedded BootWorks partition and the Altiris Partition to reside simultaneously on the same physical drive. If you have an embedded BootWorks partition and you want to install the Recovery Agent and create an Altiris Partition, you will have to first uninstall the BootWorks partition (otherwise the Recovery Agent installation will be stopped). If you wish to use a BootWorks partition and have computer backup and recovery capabilities, you must use Recovery Solution in server-based mode only. Caution If you have the Recovery Agent and the Altiris Partition installed on a computer, and then you install a BootWorks partition, the BootWorks partition will not recognize that the Altiris Partition exists and, without warning, will delete the Altiris Partition and all snapshot data and the space will be lost!
Uninstalling BootWorks
If you want to uninstall BootWorks so you can use an Altiris Partition, you can use one of the following methods:
! !
Using the bwinst -u command Using Boot Disk Creator to create a BootWorks Windows Uninstall Package that can be deployed to computers
For more information, see the Uninstall BootWorks section in the Altiris Deployment Solution Product Guide.
Installing Recovery Solution Program Files (page 34) Creating a Recovery Solution Cluster (page 36) Adding Recovery Solution Servers to a Recovery Cluster (page 40) After Server Installation Is Complete (page 41)
34
Caution Do not install an evaluation version of Recovery Solution on a computer that already has a licensed installation of the solution. Doing so might cause loss of protected data. Notes You must be logged onto the computer as a user with administrative rights in order to install the solution. The Windows computer name of the server must contain only letters (az), numerals (09), and the hyphen character (-), and it must be no more than 15 characters long. In addition, the DNS host name configured in TCP/IP properties must match the Windows computer name. Make sure that file sharing for Microsoft networks is enabled before you start Setup. During installation, if you see an error message indicating that Setup could not start the SQL ServerAgent service, then the service is already started. You must stop the service manually using Control Panel before you can continue the installation. If you configure Recovery Solution to use a different database server than the Notification Database server, and if the Recovery Solution DBMS is configured with a different collation than the Notification Server's DBMS, then some reports may not run properly. To avoid this problem, make sure the DBMS on each database server is configured to use the same default collation. If the server has an A4 Tech Mouse, make sure that the A4 drivers are installed. If you rely on the default Windows mouse drivers, Recovery Solution Server Setup might not be able to complete successfully. If an error appears saying that the installer has insufficient privileges, as a workaround, you can try clicking Retry in the error dialog.
Option 1: From the Altiris Console through the Solution Center Option 2: From the files downloaded from the Altiris Web site
2.
Start the installation: a. b. c. d. e. In the Altiris Console, click the Getting Started tab. Click Install Altiris Solutions from the Solution Center. At the top of the page, under the Available Solutions tab, click the Solutions button. Click Altiris Recovery Solution. Click Start.
This extracts the setup files and launches the installation wizard. 3. From the setup wizard Welcome page, click Next. To accept the license agreement, click I accept the terms in the license agreement and click Next.
35
4. 5.
To start the installation, click Install. After Recovery Solution has been installed, click Finish.
The program files will be installed on the computer. You must now create a Recovery Solution cluster even if you are going to have a single server. By default, after you have installed Recovery Solution, the Cluster Creation Wizard will open automatically. For more information, see Creating a Recovery Solution Cluster on page 36. Note If the Web page does not appear, you need to add the host name to the trusted sites for internet explorer.
c. d. 2.
Specify the cluster name. These values can be changed later. a. b. Enter a cluster name. This name will appear in the Altiris Console and will not be visible to client computers. Enter a cluster network address. This is how the cluster will be identified to client computers. If this will be a non-balanced cluster (containing only one Recovery Server), then you can use either a name (such as the Recovery Server computer name) or the server IP address. The name and the address can be the same if you choose to do so. If this will be a balanced cluster (containing more than one server), then enter the address of the virtual HTTP server created on the load balancer. For more information, see Configuring the Load Balancer on page 27.
36
c. d. e. 3.
(Optional) If you want to configure a balanced cluster, select the Enable cluster load balancing support checkbox. (Optional) Enter the IP address or DNS name of the load balancer. Click Next.
Specify the communication protocol. You can choose from three connection types:
" " "
If you are configuring a balanced cluster, you can only choose either HTTP or HTTPS. If you are using a non-balanced cluster, you can use any of the three. Generally, using DCOM can provide faster communication by as much as 10-20%. However, DCOM may not work well behind firewalls or on slow WAN connections. In those cases, HTTP is the preferred option. Notes This setting is for how the Cluster will communicate to the Client for the install of the Recovery Agent. The Agent can be configured to use a different protocol after install has completed. For HTTP and HTTPS, ports 8080 and 8081 should not be used as binding ports used by Recovery Solution if Altiris Deployment Server is installed on the same Notification Server. Both HTTP and DCOM are used for communication between Recovery Solution Server and Notification Server. 4. Enter the SQL server name that you want the Recovery Solution Database installed on. You can specify either a local or remote instance of a SQL server. Caution If you are using the Microsoft SQL 2005 Server, the sys.xp_cmdshell component is required before you can proceed creating the Recovery Cluster. To enable the component, go to SQL Server 2005 Surface Area Configuration > Surface Area Configuration for Features > xp_cmdshell and select the Enable xp_cmdshell checkbox. After the Recovery Cluster creation is complete, you can safely disable the component. Local Instance Notes By default, setup uses the default instance of the local SQL server (MSSQLSERVER). If the default instance of the local SQL server is not found, then the cluster creation wizard will try to enumerate non-default local SQL instances. If more than one nondefault instances is found, setup will use the first found instance and the user will be informed by a Multi-Instance SQL Server page. The SQL server instance that will be used will be displayed. The full SQL server name is specified in the following format:
37
<SQL Server_name>\<SQL instance name> For a default SQL server instance (MSSQLSERVER) the name of the SQL server is: <SQL Server_name> a.
" "
Select one of the following authentication modes that you use to connect to the SQL server: Windows authentication (logged on user) SQL Server login - particular SQL server user The specified account must have administrative rights for the selected SQL server. For more information, or if you get an error about Windows authentication, see Configuring the SQL Database on page 28.
b.
Click Next. If you get an error that the server cannot be found, click Back to go to the Connection Type page, and click Next again.
5.
Configure the database and data storage options. Caution Do not place the SQL Server database and log in a compressed or encrypted location. a. b. c. d. Accept the default database name or specify a new one. Specify the storage location and the size and location of your Recovery Solution database. The path must be local to the SQL Server computer. Specify the storage location and the size and location of your Recovery Solution log. The path must be local to the SQL Server computer. Specify the user name and password that will be used to connect to the Recovery database. Note If another cluster already exists on the server computer, the existing user name and password will be used. To change the existing Recovery database user credentials, see General Settings (page 97). Caution Two or more Recovery Solution clusters created on one or more server computers and connecting to the same SQL server must use the same Recovery database user credentials. e. Click Next.
6.
Configure data storage points and their size. a. b. Enter the data (blob) file size in Mb. The maximum size of a single data file is 2000 Mb. To add a storage location, click Add (you must specify at least one location). Data storage location. To use a data location on the same computer where Recovery Solution Server will be installed, enter a local path, such as C:\AeXRSData. To use a data location on a different computer, enter an IP
38
address, DNS name, or computer name where hard drive space will be used. The format for entering this information is \\<servername>\<sharename>\<directory>. Note A local server path cannot be used in a balanced cluster. Maximum space (Mb): Enter a maximum space limit (Mb), or enter 0 for unlimited. This is the maximum amount of space on this location to be used. Example: if you set a 1000 Mb maximum space limit and 200 Mb data file size, then 5 data files can be created on this location. If this is a remote location, provide authentication credentials. Notes Use domain (not local) user credentials, otherwise the storage location will be inaccessible. You probably do not have to specify credentials for local storage locations. A remote share permissions and folder security must be configured to allow full access to the user accessing the share. You must not add network storages located on computers from domains, which are not trusted by the Recovery Server domain. Also, do not use the credentials of users from the non-trusted domains to access the storage locations. Storage status will be reported Inaccessible after adding such storages. The reason is that Recovery Server cannot be impersonated under a user account from a nontrusted domain. c. d. 7. Click OK. Click Next.
AeXRS_Users Each member of this group will be given the access rights to protect its own data with Recovery Solution.
AeXRS_Managers Each member of this group will be given the access rights to other users data through Web Based File Recovery and Migration utility.
"
User Group is the name of Microsoft Domain Group to be used by Recovery Solutions Users are a list of the current users in that group. You can either add more users to or remove users from this group. a. To remove a user, highlight the user you want to remove and click remove. b. To add user or group, click add, see To add a user or domain group to a Recovery Solution Cluster (page 108).
"
39
c. Enable the Allow web-based restoration for all users option to allow for Web Based File Recovery to be available for all protected users after the cluster creation. d. Click Next. 8. 9. Review the Recovery Solution Server Summary to confirm your selections. To proceed with your selections, click Next.
10. To make any changes, click Back and change your selection options and then finish the wizard. After completing the wizard, an empty cluster is created. You must add at lease one server to the cluster. To see and manage the cluster settings, click the cluster node under the Recovery Cluster Configuration folder. For more information, see Recovery Solution Cluster Configuration (page 96).
40
2.
Click the Configuration tab, then select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. Click the Recovery Solution Server Install task. In the right content pane, select the cluster you want to add a server to. Click the Add Server icon.
3. 4. 5. 6. 7. 8. 9.
Select the computer you want to install as a Recovery Solution Server. Click OK. (Optional) To override default installation folders, click Installation Settings. Select the Cluster to install the server to.
10. Click Install Server. 11. You can accept the default installation settings or changes them. Click Proceed with Install. It will take a few minutes for the server component to install. The rollout page shows the status of the server rollout process. Click the Refresh the page. icon to refresh
Note If you install Recovery Server on Windows 2003 without a service pack, the Internet Sharing Configuration dialog box will appear during installation on the server computer asking you to give the C:\Program Files\Altiris\Recovery Solution\Server\Ahms.exe permission to edit this computers Internet Connection Protection settings. Click Yes to let the Altiris Recovery Server Host Manager (ping service) open the port 43190 in Windows Firewall. This port must be open during Recovery Server operations. After the installation is complete, the server will appear in the list of servers for the cluster under the Servers tab of the cluster properties page. Altiris Recovery Solution Server will also appear in the Add/Remove Programs list on the computer it was installed on.
41
here. AeXCRSS.log lists all the high and medium level operations that server setup performed. During installation, AeXCRSS.log is created in the temporary folder that is used for server installation (by default, C:\WINNT\Temp). After installation is complete, this file is copied to the folder where the Recovery Solution Server is installed (by default, C:\Program Files\Altiris\Recovery Solution\Server). You may want to open these files to verify that there are no error messages before continuing with your use of Recovery Solution.
Note By default, after you have installed Recovery Solution, the Recovery Solution Cluster Upgrade policy will open automatically after the completing of the Solution upgrade. See also: Upgrading Recovery Solution Clusters (page 42)
42
During the installation on Recovery Solution, a Recovery Solution Cluster Upgrade policy is created. Use this policy to perform the upgrade process.
To upgrade a cluster
1. 2. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. Click the Configuration tab, then click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Rollout. Click the Recovery Solution Cluster Upgrade node. (optional) Select After Cluster upgrade, automatically start Recovery Solution Server(s) upgrade. In the right pane, click Start Upgrading Clusters.
3. 4. 5.
The Cluster begins to upgrade. If the After Cluster upgrade, automatically start Recovery Solution Server(s) upgrade checkbox was selected, the servers also upgrade; otherwise, you must, otherwise you must upgrade the servers manually. When the upgrade is completed you will need to restart the computer. It will take a few minutes for the server component to install. To view the status of the server upgrade or to launch upgrade of the servers manually, see the Servers tab of the cluster properties page or the Recovery Solution Server Upgrade policy on the Configuration tab of the Altiris Console (Configuration > Solution Settings > Incident Management > Recovery Solution Clusters > Recovery Solution Cluster Configuration). Notes After Recovery Server is upgraded, Recovery Solution Agent needs to be upgraded on client computers. For details, see Upgrading Recovery Agent on page 66. If the server upgrade failed, you can restart the upgrade by executing Setup.exe from \\<NS Server>\NSCAP\Bin\Win32\X86\Recovery Server Package location. The Start Recovery Solution Server(s) upgrade will only create and activate a Recovery Solution Server software delivery policy that may arrive at the Recovery Solution Server computer after a delay (when the computer requests the configuration from the Notification Server). If you wish to speed up the policy delivery process, on the Recovery Solution Server computer, use the Altiris Agent to request the configuration (right-click on the Altiris Agent Icon, select the Altiris Agent details and then click Update Configuration). We do not recommend clicking Reboot the computer(s) with the Recovery Solution Server after a successful upgrade is completed if Recovery Solution Server is installed on the same machine with Notification Server or there are several Recovery Solution Clusters installed on the Notification Server. It is possible that the Notification Server computer restart during the Recovery Solution SQL database upgrade may corrupt the database.
43
Uninstalling a Recovery Solution Cluster (page 44) Uninstalling a Recovery Solution Server (page 44) Uninstalling the Recovery Solution (page 45)
Note We recommend uninstalling the Recovery Agent software from the client computers before uninstalling the solution. For details, see Uninstalling the Recovery Agent on page 73.
3. 4. 5. 6. 7.
44
Note This does not remove the BLOB files in the storage. You must manually delete the files after deleting the storage. All Recovery Servers attached to the cluster will be automatically uninstalled after the cluster removal.
3. 4. 5. 6.
For more information on uninstalling Notification Server components, see the Altiris Notification Server Help.
45
Chapter 3
Creating a Recovery Solution Cluster (page 47) Adding Recovery Solution Servers to Clusters (page 47) Installing the Recovery Agent (page 47) Configuring a Recovery Solution Cluster (page 49) Monitoring the Recovery Solution Job Queue (page 49) Running Reports (page 50) Running Recovery Solution Utilities (page 50) Verifying the Recovery Agent Installed (page 49)
Notification Server 6.0 SP3. Recovery Solution installed on the Notification Server. See Installing Recovery Solution (page 26). One or two client computers to be configured as protected computers. See Requirements for Running the Recovery Agent in Server-based Mode (page 31). Configure and install the Altiris Agent on the client computers. See Install the Altiris Agent (page 29).
46
Note The Altiris Agent is not required in order to install and use stand-alone Local Recovery or Local Recovery Pro Agent.
3. 4.
3.
47
Note The user should manually restart the computer before using the Recovery Agent. You can also configure the policy to force a restart if your choose. Each policy uses the Recovery Agent installation file, AgentSetup.exe, with various command-line switches. AgentSetup.exe is located in the following folder: C:\Program Files\Altiris\Notification Server\NSCap\Bin\Win32\X86\Recovery Agent Package
48
Several other collections available on the Configuration tab are useful for deploying Recovery Agent and tracking the agent status on client computers. These collections are located at Configuration > Solution Settings > Incident Management > Recovery Solution> Recovery Agent Rollout.
3.
For more information on configuring clusters, see Recovery Solution Cluster Configuration (page 96).
49
5.
Note You can see more details on a client job (like snapshot or rollback) by right-clicking on the job in the list and selecting Details from the drop-down menu.
Running Reports
Recovery Solution provides the following types of reports:
! ! !
For more information about reports, see Using Recovery Solution Reports and Job Queue (page 153).
Tasks
Convert encrypted files on FAT partitions Erase the protected computers partition table Manage Agent Setup package Restore data from Full System Recovery CD or DVD-ROMs Restore data using the Migrate utility
Link to information
Convert Encrypted Files on FAT Partitions (page 128) Erasing the Partition Table (page 146) Manage Agent Setup Packages (page 127) Restoring Data From Full System Recovery Media (page 146) Restoring Data with the Migration Utility (page 130)
50
Chapter 4
Recovery Agent Requirements (page 51) Recovery Agent Installation Options (page 51) Installing the Recovery Agent in Server-based Mode (page 52) Recovery Agent Reinstallation and Repair (page 59) Installing the Recovery Agent in Local Mode (page 60) Installing the Recovery Agent in Mixed Mode (page 65) Installing Recovery Agent Using an Image (page 66) Upgrading Recovery Agent (page 66) Using Recovery Agent Rollout Policies (page 67) Recovery Agent Setup Command-Line Switches (page 69) Uninstalling the Recovery Agent (page 73)
51
Installing the Recovery Agent in Server-based Mode on page 52 Registering the Recovery Agent in Server-based Mode on page 56 Installing the Recovery Agent in Local Mode on page 60 Installing the Recovery Agent in Mixed Mode on page 65 Installing Recovery Agent Using an Image on page 66
Upgrading Recovery Agent on page 66 Using Recovery Agent Rollout Policies on page 67 Recovery Agent Setup Command-Line Switches on page 69 Uninstalling the Recovery Agent on page 73
Recovery Agent Installation Policies (Push Installation) on page 53 Interactive Web-Based Agent Setup Wizard (Pull Installation) on page 53 Unattended Recovery Agent Installation on page 55
Before you actually deploy the Recovery Agent to users, we recommend that you install the software on one or more computers with typical configurations, then perform snapshots on these computers. This seeds the server with common files, making snapshots faster for other users. To learn more, see Data Protection Performance on page 254. Before deploying the Recovery Agent, you might want to complete the following items:
" "
Configuring Recovery Agent Settings (page 75) Full System Recovery Setup (page 133)
Notes You can cause the data protection components (which allow snapshots and recoveries) to be disabled by default for all protected computer installations. This might be useful if you want to deploy the software but not activate it immediately. To disable protected computers by default, click Disable Computers By Default on the RS Agent Install policy. For protected computers running 2000/XP/2003, a user with administrator rights on the protected computer must be logged on in order to install the Recovery Agent. No special rights are required to use the software after it is installed. For protected computers running Windows 98, usernames, passwords, and domain names cannot contain extended ANSI characters. These characters have character codes greater than 127 and are commonly used in non-English languages (Example: umlauts and characters with accents). They cannot be used with Recovery Solution
52
because of a limitation in the Microsoft DCOM security component. Make sure that the Windows domain authenticating user accounts do not have names that contain these characters, and that the usernames and passwords for Windows 98 users with access to Recovery Solution do not contain these characters either. The user who installed Recovery Agent on a protected computer can also re-install it if needed. If users encounter installation problems, see Troubleshooting User Installations on page 208. After the server is upgraded, each protected computer is automatically upgraded the next time it connects to the server. For more information, see Upgrading Recovery Agent on page 66.
53
Install the agent in Server-based mode (go to step 5) Install the agent in Local mode (go to step 6) Install the agent in Mixed mode (go to step 7)
For information on the different modes, see Recovery Solution Product Overview on page 13. 5. 6. To install the agent in server-based mode, select the Server-based mode checkbox. To install the agent in local mode, complete the following tasks: a. b. c. 7. 8. Select the Local mode checkbox. (Optional) Select the Create a partition to store your files automatically checkbox. Specify the drive and size of the Altiris Partition.
To install the agent in mixed mode, complete both steps 5 and 6. (Optional) Select additional setup options: a. b. After the agent is installed, the computer must be rebooted. You can specify whether or not to be prompted for the reboot. You can skip the initial default snapshot.
9.
If you are creating a Recovery Solution account for the first time, click Create New Account. If you are using an existing Recovery Solution account, click Re-Install Existing Account.
"
11. To install the agent and create a new account, do the following tasks: a. b. To download the wizard, click Install. Click Open or Run, not Save. Note After clicking Install, a Microsoft security warning may appear warning that the publisher could not be verified. Continue by clicking Run or Yes to download the AgentSetup.exe. Note that on Windows XP SP2, an additional warning might appear about the cab file. Continue by clicking Install.
54
The wizard installs the agent. c. After the agent is installed, click Finish to exit the wizard. To complete the installation, you must restart the computer. d. To restart the computer, click Yes. After, the computer has restarted, the Altiris Recovery Agent Registration page opens. e. f. g. To create a new account, enter an account login name and password. Enter a description of the computer. Click Register. The account is created as a Protected User and is associated to the protected computer. 12. To install the agent using an existing account, do the following tasks: a. b. c. d. e. Select the account login name of the account you want to re-install from the drop-down list. Enter the password for the account. Click Next. To download the wizard, click Install. To start the wizard, click Open or Run. The wizard installs the agent. f. When the agent is installed, click Finish to exit the wizard. To complete the installation, you must restart the computer. g. To restart the computer, click Yes.
55
Recovery Agent setup was launched with the correct command-line parameters. For details, see Recovery Agent Setup Command-Line Switches on page 69. 64-bit Recovery Agent installation package is not available from the default Recovery Server network share.
Creating and Registering a New Account (page 57) Reinstalling the Recovery Agent using an Existing Account (page 57) Changing the Server or Installation Type (page 58) Installing the Recovery Agent but the Server is not Available (page 59) Canceling the Registration Process (page 59)
56
3. 4. 5. 6.
If the account is not a member of the Altiris Recovery Solution users group, you will be prompted for your password.
57
Notes You can also reinstall Recovery Agent from the network share \\server\agent, where server is the name or IP address of the Recovery Solution Server computer, using the following command:
AgentSetup.exe /reinstall /comp:<reinstalled computer name> [/user:<user name of the reinstalled account> /pass:<password> /domain:<domain>]
For more information on other AgentSetup.exe command line switches, run AgentSetup.exe /? at command line prompt. Tip You can reinstall any Recovery Agent computer account with a user account from the Altiris Administrators group by executing the following command:
AgentSetup.exe /Reinstall /User:<Altiris Admin account> /Xpass:<encrypted Altiris Admin password> /Domain:<user domain> /Comp:<reinstalled computer name>
If the /Comp parameter is empty, the current computer name will be used. An encrypted password provided through the /Xpass parameter can be created using the XPassUtility available from the Altiris Support Services.
58
If a default account was created on the server, the computer will be protected, but the Recovery Agent Options dialog box will not be accessible until registration is completed. If a default account was not created on the server, your computer is not protected until registration is completed. The default account may not be created if there is a connection problem with the server, if there is insufficient information about the computer, and so on.
We recommend that you complete registration as soon as possible. If you have any questions, contact your Recovery Solution administrator.
Reinstallation
The user of a protected computer who originally installed the Recovery Agent or users who have used the Recovery Agent after it was installed can reinstall with that computers account. Note To prevent potential conflicts, reinstallation should only be performed with an account that has been uninstalled or that exists on a computer that can no longer run its installation of Recovery Solution. To reinstall from an installation package, you or the user can use the Web-based agent setup or specify command-line parameters for the Setup executable, AgentSetup.exe.
59
For more information, see Interactive Web-Based Agent Setup Wizard (Pull Installation) on page 53 or Recovery Agent Setup Command-Line Switches on page 69.
Repair
An agent repair might be required if some agent files are missing on the client computer. A repair does not change any settings, but just recopies agent files. It can be performed either from the command line - \reinstall parameter or using RS Agent Reinstall Rollout policy. For more information, see Using Recovery Agent Rollout Policies on page 67 or Recovery Agent Setup Command-Line Switches on page 69.
Distribute Local Mode Prerequisite Package (page 61) Install the Recovery Agent Software (page 62) Create a Partition to Store Your Files In (page 63) Perform the First Snapshot (page 64)
The first snapshot is taken in two different phases. The first phase is done in Linux using Altiris RapiDeploy. This creates a snapshot of the entire file system. In the event that your Windows operating system becomes unusable, you can restore the file system from the snapshot. The second phase is done in Windows. This makes all the files recoverable from within Windows. Caution The Altiris Partition requires contiguous free space on the drive. For best results, run a disk defragmentation utility on the drive before installing. If the drive does not have enough contiguous free space, you will get an error stating Altiris Recovery Agent failed to create initial image of the system. For more information, see Troubleshooting: Problems Installing the Local Partition (page 228) An Altiris Partition cannot be created on a computer that has the entire drive compressed. Individual files can be compressed without causing a problem. If the entire drive is compressed, compression will need to be temporarily turned off. To check if a drive is compressed, in Windows Explorer, right-click on the drive (Local Disk C:), and make sure the Compress drive to save disk space checkbox is cleared.
60
Notes Because this first snapshot is backing up all files, this will take several minutes. All subsequent snapshots are taken while running Windows. These snapshots will backup files that are new or changed, making the snapshots much faster. Windows allows you to set Compression and Encryption attributes to drives, folders, and files. Recovery Solution can back up and restore compressed and encrypted files. However, the initial snapshot performed in Linux and subsequent snapshots performed in Windows handle compressed and encrypted files differently. As a result, files that are compressed or encrypted before the Recovery Agent is installed will be backed up twice. If you have many compressed or encrypted files, this will take double the space to store snapshots of those files. We recommend that you turn compression and encryption off (or limit it to a small number of files) before you install the Recovery Agent. After the Recovery Agent is installed and the first snapshot is taken, you can turn compression and encryption on, and the Recovery Agent will make only one backup of those files.
61
Notes You must enable the RS Agent Local Mode Prerequisite Package Install policy before you can enable other local-mode install policies. You must enable the RS Agent Local Mode Prerequisite Package Install policy before you can set the Enable Local Recovery Agent option (see the Configure Users Rights and Permissions on page 92) in the Default Recovery Agent Settings policy. After the policy runs on client computers, the default package location is C:\Program Files\Altiris\Setup Files\Recovery Agent Local Mode Prerequisite Package. To reapply the RS Agent Local Mode Prerequisite Package Install policy on client computers that have already run the policy, click the Update button on the policy page. Clicking this button recreates the instance of the policy and enables the recurring rollout of a Local Mode Prerequisite package when, for example, a newer version of the package is available.
Using a Distribution Package Using Notification Server Policies (see Using Recovery Agent Rollout Policies on page 67)
The standard Recovery Agent installation file is AeXRSLocalAgent.exe. The Recovery Agent installation file for Local Recovery Pro is AeXLRPLocalAgent.exe.
62
1.
Locate the Recovery Agent distribution package. a. If you have already installed Recovery Solution on your Notification Server, the standard distribution file can be located in the following folder: C:\Program Files\Altiris\Notification Server\NSCap\Install\Recovery Server\Agent b. If you purchased Local Recovery Pro, copy and then open the package file on your Notification Server. This extracts and copies the setup files to the following folder: C:\Program Files\Altiris\Notification Server\NSCap\Install\Recovery Server\Agent It is intended that you will extract these files on your Notification Server. After the setup files are extracted, you can then distribute the actual setup file to any computer you want to install the Recovery Agent on. If you do not have a Notification Server, you can extract the files onto any computer.
2.
Distribute the installation file to the computers you want to install the Recovery Agent on. You can distribute the file using e-mail, a network share, CD, and so on.
3.
On the computer you want to install the Recovery Agent on, run the Recovery Agent installation file. The installation wizard runs and installs the agent program files. Note In case the Local Mode Prerequisite Package cannot be found in the default location or downloaded from http://www.solutionsam.com/imports/6_2/recovery during setup, the installation process will pause asking you to specify a URL, a network path or a local folder where the package file can be found. Click Rescan to rescan the possible locations again, or click Browse to locate the file and then click Next to proceed with installation. Click Finish. For information, see Distribute Local Mode Prerequisite Package on page 61.
4. 5.
Restart the computer. The computer is restarted, a file system check is performed on the computer, the computer is restarted again, and the Recovery Agent Partition Wizard is loaded.
63
recommended or specify a new size when creating the partition. The following table helps you with the Altiris Partition sizing.
Size
The recommended size of the Altiris Recovery Partition The maximum size of the Altiris Recovery Partition placed on the system drive The maximum size of the Altiris Recovery Partition placed on a non-system drive (additional or external drive) formatted with NTFS The maximum size of the Altiris Recovery Partition placed on a non-system drive (additional or external drive) formatted with FAT32 The minimum size of the Altiris Partition
Calculation
~40% of the total system hard disk drive 45% of the total system volume size 49% of the total volume size
70% of the space used on the system drive + 100MB (reserved for operations with the partition)
To create a partition
1. 2. From the Recovery Agent Partition Wizard introduction page, click Next. Select the existing partition that you want to create the Altiris Recovery Partition on. You can use any supported hard disk drive on the computer. For a list of supported hard disk drives, see Hard Disk Support on page 297. Set the size of the partition. Recovery Solution determines the size of the hard drive, and by default sets the partition size to 40% of the total drive space. To change the default partition size, a. b. c. 4. 5. 6. Click Change. Set the size of the partition by either entering a value in Megabytes or a percentage of the hard disk. Click OK.
3.
Click Next. To complete the installation and start the first snapshot, click Finish. After the files have been installed, click Yes to restart the computer.
64
When the first phase is completed, the computer will be restarted. You will be prompted to perform the second phase of the snapshot. This will make the files in your snapshot available for recovery through Windows. When the snapshot is completed, all the files on the computer are protected in a snapshot.
If the Recovery Agent is not installed in any mode If the Recovery Agent is already installed in server-based mode If the Recovery Agent is already installed in local mode
Use the Interactive Web-Based Agent Setup Wizard (Pull Installation) (page 53) and select the Mixed mode. Use AgentSetup.exe with /local parameter (see Recovery Agent Setup Command-Line Switches on page 69). Use any other method for installing in server-based mode, then follow the instructions in If the Recovery Agent is already installed in server-based mode (page 65).
"
"
65
Caution If you are using Deployment Solution, before you install the Recovery Agent in mixed mode, please read Important Issues with Using the Recovery Agent and BootWorks Partitions on page 34.
Make an image of the baseline computer. Caution Because the Recovery Agent uses Altiris RapiDeploy create the Altiris Partition, you must use RapiDeploy to image the computer and maintain the Altiris Partition.
3.
66
critical snapshots and snapshots from previous RS Agent installations checkbox. This will not display previous snapshots on the client's Rollback dialog. For more information, see Perform a Rollback on page 122. If the user logged onto the protected computer at the time of the automatic upgrade is not the user who originally installed the software, then the user sees a prompt asking for new credentials. If the logged-on user has never manually accessed the existing installation of Recovery Solution, then the account is added as a new user of the computers account. If the automatic upgrade of a Windows 2000/XP protected computer is interrupted (Example: if the computer is restarted during the upgrade), the software is unable to repair itself. If this happens, the user should reinstall Recovery Agent using the computers existing account. If Recovery Solutions Agent Install policy was enabled with schedule set to ASAP, then this policy becomes a run-once policy. After it is executed it will never be executed again in the future, even if policy is upgraded (or a package that this policy refers to). If an Upgrade does not happen try to schedule this policy to execute at a certain date/time, or to change its type to Manual and then run the policy manually. See also: Using Recovery Agent Rollout Policies on page 67.
Installs the Recovery Agent and creates an account to back up files to a Recovery Solution Server. Installs the agent and creates a local Altiris Recovery Partition to back up files locally. Note You must enable the RS Agent Local Mode Prerequisite Package Install policy before this policy can be enabled
67
RS Agent Promotion
If Local Recovery is installed on the client computer, you can promote it to Local Recovery Pro version with more functionality or mixed mode depending on the solution you have. Note You must enable the RS Agent Local Mode Prerequisite Package Install policy before this policy can be enabled.
Reinstalls the Recovery Agent to perform a repair. Removes the Recovery Agent from the protected computer. Upgrades older versions of the Recovery Agent to the current version. Note You must enable the RS Agent Local Mode Prerequisite Package Install policy before this policy can be enabled.
Each policy uses the Recovery Agent setup executable (AgentSetup.exe) with various command-line switches. AgentSetup.exe is located in the following folder on Notification Server computer: install path\Altiris\Notification Server\NSCap\Bin\Win32\X86\Recovery Agent Package By default, a Recovery Agent Rollout policy is configured to restart computers after it runs if no user is logged on. Otherwise, the logged-on user will be prompted to restart the computer manually, or restart will be performed automatically after an interval. Note You must install at least one Recovery Server before you can push the Recovery Agent installations.
68
Notes The users logged on the client computers will be shown the default computer restart prompt dialog that contains the countdown timer. If the user neither clicks Snooze nor Restart, the computer will be restarted automatically in 60 seconds. If no user is logged on at the target computer, the reboot will be performed automatically. The default reboot prompt will be shown or automatic reboot will be performed even if Recovery Agent rollout fails, if the Reboot computers checkbox was selected. 9. (For installation in server-based mode) To have the client computer installed but disabled, select the Disable computers by default checkbox.
10. (For installation in server-based mode) To have the client computer installed but skip the initial snapshot, select the Disable initial snapshot checkbox. 11. (For uninstall) To have the account deleted, click the Delete account from Recovery Solution cluster checkbox. All data backed up from the deleted account will be removed during the next space management job. 12. Select the collection that the policy will use. This is the group of computers the policy will be run on. 13. Select the policy scheduling options. For more information on configuring policies, see the Altiris Notification Server Help. 14. Click Apply.
/Silent switch option causes Agent setup progress dialog to be hidden from a user.
For silent registration upon Recovery Agent installation in server-based mode, you must specify valid /User, /Domain, and /Pass command-line parameter values. For silent installation in local mode, you must correctly specify /BWPart and /BWVolume parameters that cause automatic creation of Local Recovery partition.
69
The following are examples of syntax (with possible parameters) for using commandline switches:
New Installation agentsetup.exe [/Local] [/Server:<server name>[;http|https][;port number]] [/User:<username>] [/Domain:<domain>] [/Pass[:<password>] [/BWPart:<partition_size>] [/BWVolume:<volume>] [/RSLMPPackagePath:<pathname>][/Reboot] [/Silent] [/Disable] [/InitialSnapshot] Reinstallation agentsetup.exe /Reinstall [/Comp:<computer>] [/User:<username>] [/Domain:<domain>] [/Pass[:<password>]] [/ID:<computer ID>] [/Server:<server name>[;http|https][;port number]] [/Reboot] [/Silent] Support SMS during installation agentsetup.exe /SMS [/MIF:<mif file(no extension)>][/Reboot] [/Silent] Uninstall agentsetup.exe /Uninstall [/Delaccount] [/Reboot] [/Silent] Upgrade initiation agentsetup.exe /Upgrade [/Reboot] [/Silent] Repair installation agentsetup.exe /Reinstall [/Reboot] [/Silent] Local Agent installation agentsetup.exe /LocalOnly [/BWPart:<partition_size>] [/BWVolume:<volume>][/RSLMPPackagePath:<pathname>] [/Reboot] [/Silent]
70
Notes Command-line parameters are not case-sensitive, but any passwords specified are casesensitive. Unless the /Server parameter is specified, all protected user accounts are created on the server from which the setup package was made.
Parameter
Description
Specify the username, domain, and password of the user account for which Agent registration will be performed. If you supply valid credentials, Agent registration will be performed silently. Create a partition for Local Snapshot with the specified size. Example: /BWPart:10000 - to specify size in MB or /BWPart:80% - to specify the size as the percentage of the overall space.
Default Value
All invalid sizes will be skipped and the default behavior will be used.
/BWVolume
Create a partition for Local Snapshot on specified volume where <volume> is drive letter (Example: /BWVolume:D).
/ RSLMPPack agePath
Specify the full pathname of the Local Mode Prerequisite Package file (URL, UNC, or local path) placed in a non-default location. Note that the path cannot contain Unicode characters. (Example: / RSLMPPackagePath:\\server\share\alrfileXXXX.frm)
Deletes account from server in uninstall case (for server-based agent only). Disables account for protected user (for server-based agent only). Determines whether to perform an initial snapshot: 0 - Do not show initial snapshot dialog 1- Show initial snapshot dialog Install Agent in Mixed mode
71
Parameter
Description
Installs Agent in Local Snapshot mode only Specifies a Management Information Format (.MIF) file for use with SMS deployments. Do not include the .MIF file extension. Not required.
Default Value
No default value. If not specified, no .MIF file is used. No default value. If not specified, the user is prompted to restart the computer. No default value. If not specified, a new installation is performed. The default name is the name of the server from which the Setup package was created. The default protocol is DCOM. No default value. If not specified, the installation is interactive.
/Reboot
Specifies that Setup should automatically restart the computer after the installation is complete. Not required.
/ Reinstall
Specifies that this is a reinstallation of the software. Required only to continue using an existing account. This ensures that the user continues to have access to existing protected data on the server.
Not required. The name of the server that stores this protected computers account for Recovery Solution. This can be the Windows name, the full Internet DNS name, or the IP address of the server. You might have to specify the IP address if the server is on a different subnet from the protected computer. Optionally, you can specify the protocol to be used during Recovery Agent registration (HTTP or HTTPS) and the port number.
/Silent
Performs a silent installation of Recovery Agent. Note If you do not include the /Reboot parameter, the user must reboot the computer before Recovery Agent becomes functional. Not required.
72
Parameter
Description
Specifies that Setup is being distributed through Microsoft Systems Management Server (SMS). Required only for distribution through Microsoft SMS.
Default Value
No default value. If not specified, the Setup package is not configured for SMS.
/SMS
/ Uninstall /Upgrade
Using Windows Add/Remove Programs (page 73) Using Recovery Agent Policies to Uninstall the Recovery Agent Remotely (page 74)
73
Notes These options are applicable only to the uninstallation of the server-based Recovery Agent. This screen does not appear in case Recovery Server not available at the time of uninstall.
74
Chapter 5
Configuring Recovery Agent Settings (page 75) Recovery Solution Cluster Configuration (page 96) Recovery Solution Security Role Management (page 110) General Settings (page 97) Scan for applied critical patches and Software Delivery tasks (page 113) Manage Lost Recovery Solution Agents (page 113)
Creating Configuration Policies (page 75) Configuring Default Agent Settings (page 77)
75
Recovery Agent settings policy, we recommend that you create new configuration policies by cloning the existing policy and modifying the copy of the policy. Any settings changed within the original policy will change all other settings in cloned policies following the rules of inheritance. As a result, we strongly recommend working with multiple policies in the following way:
! ! !
Disable the Default Recovery Agent Settings (page 76) Clone the Default Recovery Agent Policy (page 76) Configure a Copy of Default Local Recovery Agent Settings (page 76)
2. 3. 4. 5.
This will create a policy called Copy of Default Local Recovery Agent Settings. You can rename this policy.
Snapshot Excludes
76
! ! ! ! ! ! ! ! ! ! ! ! !
Rollback Data Space Management Bandwidth Throttling Settings Connection Management Remote Access User Rights Miscellaneous Settings Health Alerts Settings Storage Space Limits Communication Settings Performance Settings Storage Management F11 Recovery Settings
Two of these trees, Excludes and Rollback Data, can be appended to at each level of inheritance. At any level of inheritance of this policy group for each of these eleven trees you can turn off the inheritance and inheritances will be started new for that tree within that policy group. These new settings are inherited to its children and grand children. Any change to a policy group will in real time affect its children and grandchildren.
To configure the Local Recovery Agent settings, use the Default Local Recovery Agent Settings policy. To configure the server-based Recovery Agent settings, use the Default Recovery Agent Settings policy.
"
Rather than modifying the existing Default Recovery Agent Settings policy directly, we recommend that you create new configuration policies by cloning the existing policy and modifying the copy of the policy. For more information, see Creating Configuration Policies (page 75). 4. 5. 6. 7. Under Policy Settings, select the Enable checkbox (this will enable the policy). Use the existing Notification Server collection or click the collection link to select a different or additional collections. Configure the default settings. Click Apply.
The following topics describe the default settings that you can configure.
77
Note The topic name defines whether it applies only to the Default Local Recovery Agent Settings policy (local mode only), server-based Default Recovery Agent Settings policy (server-based only), or both.
! ! ! ! ! ! ! ! ! !
Configure Snapshot Settings (page 78) Configure Excludes (page 81) Configure Rollback Data (page 87) Configure Space Management (page 88) Configure Throttling and Connection (server-based only) (page 90) Configure Remote Access (server-based only) (page 91) Configure Performance (local mode only) (page 92) Configure Storage Management (local mode only) (page 92) Configure Users Rights and Permissions (page 92) Configure Miscellaneous Settings (page 94)
Notes If you change the default Recovery Agent settings shortly after installing the agent on a client computer, the updated settings may not immediately get updated on the client computer. When the Recovery Agent is installed on a computer, it may take several minutes for the Notification Server to process all the database information about that computer. The time require depends on your settings (Example: see Automatic Collection Updating in Configuration > Server Settings > Notification Server Settings). After the Notification Server information is updated, then the new default settings will be applied the next time the agents settings are updated on the client computer.
78
Allow Recovery Agent to initiate scheduled snapshot While this option is disabled (by default), Recovery Server initiates snapshots by sending TCP/IP packets on clients 43189 port. This may not be acceptable in case client is behind a firewall. Select this box to initiate snapshots from the client side. Notes Scheduled snapshots initiated from the client may start with a short delay (up to 5 minutes). Client jobs started from the Altiris Console will work even in case 43189 port is closed. But the jobs (snapshot, restore, rollback) may be delayed up to 15 minutes.
"
As soon as user turns on the computer Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer is turned on. It is not necessary for a user to log onto the computer for the snapshot to start, but the computer must already have a physical connection to the network. Note The snapshot will not start immediatelly after logon. It starts after a 12-minute timeout in local mode or after a 10-minute timeout in network mode. This option is generally useful for desktop computers connected to a LAN. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer is turned on.
"
79
Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer is resumed (after having been suspended). Note The snapshot will not start immediatelly after resuming the computer. It starts after a 8-minute timeout in local mode or after a 6-minute timeout in network mode. This option is generally useful for laptop computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer is suspended and resumed.
"
As soon as user docks the computer Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer is docked. Note The snapshot will not start immediatelly after docking the computer. It starts after a 7-minute timeout in local mode or after a 5-minute timeout in network mode. This option is generally useful for laptop computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer is docked.
"
As soon as the computer idle state reaches Select this box to have Recovery Solution start the snapshot scheduled for each day as soon as the protected computer goes into an idle state. Specify the timeout (6 minutes in local mode or 4 minutes in network mode by default) in the field nearby. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the snapshot scheduled for the previous day has not yet been reached. A snapshot is not started if its scheduled time has passed, even if one did not take place during the scheduled time period. A snapshot runs only once each day, no matter how many times the computer goes into an idle state.
7.
Take snapshot when user is logging off Select this box to have Recovery Solution start a snapshot as soon as a user logs off, restarts, or shuts down the protected computer. At logoff time, the snapshot runs automatically after a short delay. Before it runs, the user has the chance to skip the snapshot. A snapshot will run again the next time a user logs off the computer.
80
Note The Windows registry setting that controls the application timeout should be set to at least 20000 (the value in milliseconds) on the protected computer in order to ensure that snapshots have time to start before Windows completes the logoff process. The registry value is HKEY_CURRENT_USER\Control Panel\Desktop\HungAppTimeout, which is a string value that is configurable per user.
"
Attempt to wake the Agent before a scheduled snapshot This option allows for computers that are sleeping (standby) to be woken up to have snapshots taken. This allows snapshots to be done after hours during low network usage times. This option is enabled by default and is configurable on the protected computers properties page. For Wake on LAN from standby to work properly, the NIC needs to support Wake on LAN and the Wake on LAN needs to be enabled in the NIC properties in MS Windows For Wake on LAN from hibernate\shutdown to work properly, the NIC and the motherboard should support Wake on LAN from shutdown\hibernate and Wake on LAN needs to be enabled in the BIOS. Note The protected computer is returned to standby when snapshot is completed.
"
Backup mount points, junction points and other reparse points (not the data they reference) Select this box to allow backup of NTFS reparse points, which is a new capability added to NTFS version 5 with the release of Windows 2000. Backup of the following reparse points is supported by default:
# # # #
Symbolic Links Junction Points Volume Mount Points Remote Storage Server (RSS)
Note Snapshot of reparse points allows you to restore only the reparse point objects, not the data they reference. If the referenced location or data is unavailable after restore, your reparse points may become non-functional 8. Click Apply.
Configure Excludes
Excluding Files From Snapshots
You do not want users to waste valuable server disk space by protecting unimportant files such as files in temporary folders and cache folders. You can apply exclude rules to file types, files, folders, and drives. You can set global rules that apply to a collection. You can also export an exclude list to import to other collections.
81
Using Exceptions
It is possible to add exceptions to the exclude list. For example, if you want to exclude all *.NSF files, but to include Names.NSF file, use the Edit exceptions list option .
The Exceptions enhancement lets you specify only the files that you want backed up instead of having tons of exclude filters. In other words, if you only support certain applications, then you know the filetypes to include in snapshots and just configure that instead of having every other file on the filter. Example: Using the enhanced exclude list you can specify a partial snapshot that will only capture *.DOC and *.XLS files on your drive. To enable the functionality, follow these steps: 1. In the Altiris Console, select Configuration tab > Solution settings > Incident management > Recovery Solution > Recovery Agent Settings > Default Recovery Agent Settings > Excludes tab. Add one or more drives into the Excludes list (for example, to exclude the whole drive C, enter C:\ without quotes). For details, see To exclude files (page 82) Add file extensions you want to include into snapshots to the exceptions list for the drive. For details, see To edit exceptions (page 83). After this, schedule a partial snapshot of the drive. For details, see Configure Snapshot Settings (page 78). The snapshot will now skip all data on the designated drive except the file extensions you added as an exception. For more information, see the following:
! ! !
2. 3. 4.
Exporting and Importing Exclude Lists (page 83) Files and Folders You Should Never Exclude (page 84) Examples of Files and Folders to Exclude (page 85)
To exclude files
1. 2. 3. Click the Excludes tab. You can decide whether or not to allow users to change their settings. For more information, see Configure Users Rights and Permissions on page 92. Configure exclusion options. The list shows the currently excluded items defined for all computer or groups you are viewing. If a folder icon appears next to an item, then this item is a folder. Files by this name are not excluded unless you add another item to the list and indicate that it is a file. The reverse is true if a file icon appears next to an item. 4. Click the to add a new item to the list, or select an item and click to edit.
A dialog box appears. Enter the file type, file, or folder you want to exclude; specify whether the path you entered is to a file or folder; and finally specify whether the path applies to all files or folders on a specific drive or on all drives. Enter each file, file type, or folder individually.
82
Notes Extended ANSI characters are casesensitive in the exclude list. Example: excluding the file type. To exclude all files on all drives, enter "*.*" and select Exclude everythere. If you select Exclude only this path and File type options, only the files in the specified folders will be excluded from snapshot; all subfolders will be included into snapshot. If you select Exclude only this path and Folder type options, all subfolders on the drive will be excluded (but not files in the root folder) will be excluded during the snapshot. You can use system environment variables when specifying the excluded items. Please note that user environment variables cannot be used. 5. Click OK. You can continue adding, editing, and removing excluded items as needed. 6. Click OK again to apply the new properties.
To edit exceptions
1. 2. Configure an exclude list using the steps listed under To exclude files on page 82. On the Excludes tab, select an item and click Edit exceptions list icon The list shows the current exceptions defined for excludes you are viewing. 3. Click the to add a new item to the list, or select an item and click to edit. .
The following dialog box appears. Enter the file type, file, or folder you wish to make exception for; specify whether the path you entered is to a file or folder; and finally specify whether the path applies to all files or folders on a specific drive or on all drives. Enter each file, file type, or folder individually. Note You can use system environment variables when specifying the exceptions. Please note that user environment variables cannot be used. 4. Click OK. You can continue adding, editing, and removing excluded items as needed. 5. Click OK again to apply the new properties.
83
Browse to the path where you want to save the Exclude List File (.ELF). Enter a name for the Exclude List File (.ELF). Click Save.
2. 3. 4. 5.
Browse to the path of the Exclude List File (.ELF) you want to use. Select the Exclude List File (.ELF). Click Open. The contents of the .ELF are added to the exclude list.
C:\, C:\DOS, C:\WINDOWS, and C:\WINNT These are boot and operating system folders necessary to start the computer. If the contents of these folders are excluded, Full System Recovery might be impossible. You should include all subfolders of the Windows folder, particularly the SYSTEM and SYSTEM32 subfolders. The only exceptions are the specific cache subfolders specified below, the contents of which you might want to exclude.
C:\BOOT.INI, C:\NTDETECT.COM, C:\NTLDR These files in the root folder are needed to start Windows 2000/XP.
*.BAT, *.COM, *.EXE These are program and command-line script files.
*.386, *.DLL, *.DRV, *.PNF, *.SYS, *.VXD These are system files needed for proper system configuration. If they are damaged, the computer might not start. Without them, Full System Recovery is impossible.
*.DOS, *.W40 On multi-boot computers, these files store information necessary to start the computer in other operating systems.
84
_RESTORE Folders by this name might be created in Windows Me and Windows XP, if the user performs a System Restore using the Windows System Restore tool. The folders contain information about past System Restores so that they can be undone. Recovery Solution provides similar but more flexible functionality with the rollback feature.
PAGEFILE.SYS This file is used to create virtual memory while Windows is running. It is usually stored in the root folder of drive C. Depending upon the computers configuration, the file can become quite large, although it does not contain any data that is saved between one Windows session and the next.
WIN386.SWP Like PAGEFILE.SYS, the file WIN386.SWP is used in Windows 98 to create virtual memory, and can become quite large. WIN386.SWP is a temporary file that Windows deletes whenever the computer is shut down or restarted. It is usually stored in the Windows folder.
386SPART.PAR This is the Windows 3.1 equivalent of WIN386.SWP. If users upgraded from Windows 3.1 to their current versions of Windows, 386SPART.PAR might still exist on their computers, even though it is no longer needed.
Disk compression container files When a protected computer is running a disk compression program, such as DriveSpace (included with Windows 95), Stacker, or SuperStore, you should exclude the container files that store the compressed information. (Example: a typical DriveSpace file is named DRVSPACE.000; a typical compressed Stacker file is STACVOL.DSK). Because the container files actually hold much of the data on an entire compressed drive, it is very likely that these files will change every day. It takes much longer for Recovery Solution to find the changes in such large files and copy the data than it takes to take a snapshot of the drive itself. Simply include the letter of the compressed drive, but exclude the container files, and all data is protected.
Hibernation files Some computers and operating systems support hibernation, which allows a user to effectively turn off the computer without losing any data in memory. This is accomplished by writing the data in memory to special hibernation files, which can become quite large. Protecting these files could significantly slow down snapshots, increase the strain on the network and the server, and in some cases prevent recoveries from working properly.
85
As long as users save their work before putting their computers into hibernation, the only contents of the hibernation files will be nonessential information, such as the current running applications, window positions, and view settings. Listed below are some of the hibernation files used by various systems.
" " " " " " !
HIBERFIL.SYS is used by Windows XP and Windows 2000. HIBRN8.DAT is used on Compaq notebooks. PM_HIBER.BIN is used on IBM notebooks. SAVE2DSK.BIN is used on IBM notebooks. TOSHIBER.DAT is used on Toshiba computers. VMMHIBER.W9X is used by Windows Me.
C:\TEMP Some computers use this folder as a storage place for temporary files.
~*.* Files that begin with a tilde ( ~ ) are usually temporary files.
Web browser cache As users browse the Web, the browser stores files, such as HTML documents and graphics files, in a cache folder on the computer. Over time, the cache folder can become quite large, sometimes containing thousands of files. These files are saved only to improve the speed of Web browsing; they are usually not needed by the browser or by users. If Microsoft Internet Explorer is the Web browser, the browser cache file is usually the TEMPORARY INTERNET FILES subfolder of the Windows folder. If the Web browser is Netscape Navigator, the browser cache is usually located somewhere within the Netscape Navigator folder.
*\MSDOWNLD.TMP Folders by this name are created and used by Microsoft Web sites when software is downloaded and installed from those sites. These folders are usually created in the root of a hard drive, and they might exist on multiple hard drives. They are not needed once the software installation is complete.
Internet history If Microsoft Internet Explorer is used, the HISTORY subfolder of the Windows folder contains information about Web sites that have been visited, allowing users to easily return to those sites at a later time. This information is generally not important.
*.GID, *.FTS, *.FTG Files with these extensions are usually cache files that get created automatically when a Help file is opened. These cache files do not store any information that is necessary to use Help.
*.BAK Files with this extension are typically backup files that applications create automatically while the main data files are being edited. A *.BAK file can sometimes
86
be used to restore the data in case the main file becomes corrupted, but since copies of the main data file are also being stored on the server, there should rarely be a need to include *.BAK files in snapshots.
!
RB001.CAB, RB002.CAB, RB003.CAB, RB004.CAB, RB005.CAB Some versions of Windows store registry backups using these file names. Since the registry is protected during Full System Snapshots, there should be no need to include the registry backup files as well.
C:Program Files\Altiris\Recovery Solution Agent\Data\C\*.DTF These cache files are used by Recovery Solution to help speed up snapshots. Recovery Solution will recreate them if necessary. If users have more than 1 hard disk drive, you might want to add the additional DATA subfolders DATA\D\*.DTF, DATA\E\*.DTF, and so forth, to exclude all these files. Caution You should not exclude all .DTF files everywhere (*.DTF). This file extension is also used by other applications.
A dialog box appears. Enter the file type, file, or folder you want to exclude; specify whether the path you entered is to a file or folder; and finally specify whether the path applies to all files or folders on a specific drive or on all drives. Enter each file, file type, or folder individually. Note Extended ANSI characters are casesensitive in the exclude list. Example: excluding the file type. 5. Click OK. You can continue adding, editing, and removing excluded items as needed.
87
6.
Browse to the path where you want to save the Exclude List File (.XML). Enter a name for the Exclude List File (.XML). Click Save.
Browse to the path of the Exclude List File (.XML) you want to use. Select the Exclude List File (.XML). Click Open. The contents of the .XML are added to the exclude list.
88
"
Issue warning when storage usage reaches The warning message will be displayed on clients.
"
Log event when a user exceeds warning level Select this box if you want to log the event when the level is exceeded.
#
Show message to the user Select this box if you want to show a message to the user when the level is exceeded.
3.
If you want to apply default rules to all files, then under Default Rules, check either or both of the following:
"
Delete snapshots older than This option deletes all files from the snapshots of the protected computers you have selected, after the amount of time you specify has elapsed.
"
Delete files after they have been deleted from a Protected Computer This option deletes only files that were included in a snapshot but that a protected computer has since deleted. The files are deleted from the snapshots only after the originals have been removed from the computers, and then only after the amount of time specified here has elapsed.
4.
Under Exception Rules, use the Add icon make exceptions to the default rules.
"
, Remove icon
to
You can specify exceptions at the folder or file level, and you can use wild cards to specify files of a specific type. You can specify as many exception rules as you wish. The exceptions always take precedence over the default rules. It does not matter whether the period of time you specify for the exception is longer or shorter than the default. However, if a particular file is included in more than one exception rule, it is kept for the longest length of time specified by any of the rules that contain it. Example: if you keep the folder C:\My Documents for 1 year and *.doc files for 2 years, then the file C:\My Documents\Status.doc is kept for 2 years. In each rule, you can select or clear the box labeled This item is critical for Rollback or FSR. Select this box to indicate that the item in this rule must be present in a snapshot in order for rollback or Full System Recovery to succeed. Once this item has been deleted from a snapshot, the snapshot no longer appears in the list of snapshots that are valid for rollback or Full System Recovery.
" "
"
Note By default, a rule is added for the file WINFAL.LOG to ensure that you do not accidentally remove it. This file is stored by Recovery Solution on each protected computer, and it contains a record of all the files needed to start the computer. You can change the rule, but remember that this file must be present in a snapshot if you intend to perform a Full System Recovery from the snapshot. 5. 6. When you have finished, click OK. Click Apply.
89
Limit snapshot speed to You can select the maximum network bandwidth used when taking snapshots.
"
Do not start snapshot if transfer rate is less than You can select the minimum network bandwidth used when taking snapshots.
"
Do not start automatic snapshots over WAN connection Select this box to restrict automatic scheduled snapshots from running when client computer is on the WAN, connected using Virtual Private Networking (VPN), or Remote Access Service (RAS).
#
Consider protected computer to be on WAN connection if the number of gateways between the computer and Recovery Solution Server is greater than Specify the number of hops that the signal sent from a protected computer to the server must perform in order for the protected computers location to be regarded as Wide Area Network (WAN). (Default: 2)
3.
Limit restore speed to You can select the maximum network bandwidth used when restoring files.
4.
Configure Connection Management. Your organization may have a large number of users running snapshots and restoring data on the cluster, so you will want to be sure the network does not come to a halt because too many users are accessing it simultaneously. You can limit the number of connections to the cluster during the day or night, and control network bandwidth using the Throttling tab.
5. 6.
Under Work time definition, specify when daytime starts and ends. Under Maximum simultaneous connections, specify throttling options for scheduled snapshots. Note These settings have no effect on server jobs (such as server space management).
"
Specify the maximum number of scheduled jobs that can be running at any one time during the day.
90
Daytime is defined with the Work time definition options on this tab. Nighttime is defined with the Work time definition options on this tab. 7. Under Manual jobs, specify throttling options for manual protected computer jobs. Manual jobs include snapshots started by users and recoveries (including Full System Recovery). Note These settings have no effect on server jobs (such as server space management). Daytime is defined with the Work time definition options on this tab. Nighttime is defined with the Work time definition options on this tab. 8. Click Apply.
Take each days snapshot as soon as I start remote access Select this box to have Recovery Solution start a snapshot as soon as the protected computer has a remote access connection. Note Changing this setting will only affect clients that have configured remote access connection (VPN or dial up).
Display a message before taking the snapshot Take each days snapshot as soon as computer connects to server Continue incomplete snapshot from the break point Skip Outlook files snapshot
5.
Click Apply.
91
Priority Level The priority level indicates how much of the computer resource, such as CPU and disk access, Recovery Agent will leave for other applications. The lower the setting the more resources for other applications.
4.
Click Apply.
Enter the path to the storage location. The following restrictions apply (otherwise the location will not be added):
" "
Additional storage location cannot reside on a system hard disk drive. Additional storage location must exist on clients to which the policy is applied.
5. 6. 7. 8.
If you want to limit the amount of disk space used then check Limit storage capacity to enter a maximum MB to use. Click OK. If you want to specify where the Temporary retention folder is to be located, enter the string. By default, it is located in the system temporary folder. Click Apply.
92
Perform manual snapshots Select this box to allow users of this computer to manually initiate snapshots.
"
Perform restore Select this box to allow users of this computer to perform restore.
"
Perform rollback Select this box to allow users of this computer to perform rollbacks.
"
Accelerate scheduled snapshots Select this box to allow users of this computer to manually initiate snapshots.
"
Enable Local Recovery Agent (server-based mode) Check this box to allow users of this computer to enable Local Recovery Agent functionality.
"
Manage Altiris Partition (local mode) Select this box to allow users of this computer to change the Altiris Partition settings.
"
Create Recovery DVD (local mode) Select this box to allow users of this computer to create Full System Recovery DVDs locally.
4.
Select or clear the User Permissions options you want. The following rights can be configured.
" " " " " " " " " " "
Allow to edit snapshot settings Allow to append snapshot excludes Allow to append rollback excludes Allow to edit space management settings Allow to edit performance settings (local mode) Allow to edit storage management settings (local mode) Allow to edit miscellaneous settings Allow to edit F11 recovery settings Allow to edit bandwidth throttling settings Communication settings (server-based mode) Remote access settings (server-based mode)
5.
Click Apply.
93
Display Settings Health Alerts Setting (server-based only) Communication Settings (server-based only) F11 Recovery Settings (local-mode only)
Notify user when a scheduled snapshot completes successfully Select this box if you want the user at the protected computer to see a message when snapshots that have been scheduled complete successfully.
"
Notify user when a scheduled snapshot fails Select this box if you want the user at the protected computer to see a message when a scheduled snapshot fails.
"
Notify user when disk configuration change(s) Select this box if you want a user at the protected computer to see a message after a drive configuration change. To ensure that all files are protected, the user or administrator should verify the computers schedule for snapshots as soon as possible after a drive configuration change. If the schedule is not updated, then files stored on new drives or drives for which drive letter assignments have changed might not get included in snapshots.
"
Show progress indication of the scheduled snapshot This option configures the status indicator dialog to be displayed during a snapshot. This option is disabled by default and is configurable on the protected computers properties page.
"
Show the Welcome Screen when I start Window This option configures the welcome screen to be displayed during login to windows. This option is enabled by default and is configurable on the protected computers properties page.
"
Show the status icon in the Welcome system tray This option configures the status icon to be displayed into the system tray. This option is enabled by default and is configurable on the protected computers properties page.
"
Show Recovery Agent options in Start Menu This options defines whether the Recovery Agent menu will be put in the Windows Start menu.
94
"
Show Recovery Agent desktop icon This option configures the Recovery Agent Icon will be put on the desktop of the protected computer. This option is enabled by default and is configurable on the protected computers properties page.
"
Hide client UI This option configures the status indicator dialog to not be displayed during a snapshot. This option is disabled by default and is configurable on the protected computers properties page.
"
User interface language This option configures the language to be displayed in the Recovery Agent on the protected computer. This option is disabled by default and is configurable on the protected computers properties page.
4.
Use encryption when communicating with the Server This option is disabled by default and is configurable on the protected computers properties page.
5.
Show health alert if a snapshot has not occurred in Select this box if you want the user at the protected computer to see a message when snapshots that have been scheduled complete successfully. The user will always see a message if a snapshot fails, whether or not this box is selected.
"
Show health alert if an upgrade has not occurred in Select this box if you want a user at the protected computer to see a message if the Recovery Solution Users software needs an upgrade.
6.
Connection type You can choose from three connection types for the protected computer to communicate to the Recovery Server:
DCOM HTTP HTTPS If you are using balanced cluster, you can either use HTTP or HTTPS. If you are using a non-balanced cluster, you can use any of the three. Generally, using DCOM can provide faster communication by as much as 10-20%. However, DCOM may not work well behind fire walls or on slow WAN connections. In those cases, HTTP will be the preferred option. The Recovery Server supports multiple protocols being used at the same time. It is possible to have a different protected computer use a different protocol, depending on the collection and policy that a protected computer is using.
"
Use Altiris Agent proxy settings for HTTP/HTTPS communication between Recovery Agent and Server
95
(enabled by default) Clear this checkbox if you do not want the Recovery Agent to use the Altiris Agent proxy settings (in case they are configured on the client computer) for HTTP/HTTPS communication with the server. Notes The Altiris Agent on client computers uses the proxy server settings configured through Windows Control Panel > Internet Options > Internet Properties > Connections tab > LAN Settings > Proxy server. The Recovery Server computer must be visible to the proxy server used by the client for communication.
"
Enable Altiris Recovery Agent to modify Windows Firewall settings Clear this checkbox if you do not want the Recovery Agent to modify Windows Firewall port exception rules on client computers. Note By default, when the Recovery Agent service starts on protected computers running Windows XP or Windows 2003 Server, it will add port 43189 to the Windows Firewall exceptions. On Windows XP and Windows 2003 client computers without a service pack or with SP1, the Internet Sharing Configuration dialog box will appear upon Altiris Recovery Agent service startup asking to give the C:\Program Files\Altiris\Recovery Solution Agent\AeXRSAgt.exe permission to edit Internet Connection Protection settings. The users must select Do not show this dialog again and then click Yes to let the Recovery Agent service modify the Windows Firewall exceptions. When the Recovery Agent service stops, the port 43189 will be removed from the Windows Firewall exceptions.
7.
Show F11 Recovery prompt Clear this box if you want the F11 Recovery prompt not to appear at the protected computer start.
"
Protect F11 Recovery with password Select this box if you want the user to be prompted for a password when launching the F11 Recovery. Specify the password in the Password field.
8.
Click Apply.
General Settings (page 97) Configuring Server Job Schedules (page 98) Configuring Event Notifications (page 101) Configuring Storage Management (page 101)
96
! ! !
Managing Recovery Solution Servers (page 106) Managing Cluster Users (page 108) Configuring Communication Settings (page 110)
For information on creating a cluster, see Creating a Recovery Solution Cluster (page 36).
4.
General Settings
Changing General Cluster Settings
1. 2. 3. Open the Altiris Console by clicking Start > Programs > Altiris > Altiris Console. Click the Configuration tab. In the left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. Click the cluster node. Click the General tab. Change the name of the cluster. Change the address of the cluster. Change the Recovery Solution database user credentials. Note If you have multiple cluster databases on the server, changing credentials for one them will affect the other clusters as well. Caution Two or more Recovery Solution clusters created on one or more server computers and connecting to the same SQL server must use the same Recovery database user credentials. 9. (optional) Select or clear Enable cluster load balancing support. If selected, the Cluster Address needs to be the virtual IP address of the load balancer.
4. 5. 6. 7. 8.
10. (optional) Enter or Change the IP Address of the Load Balancer. Note This is only used for F5 BIG-IP Blade Controller. 11. Click Apply.
97
Note If the storage locations are entered not using UNC paths, then you must change them from local paths to UNC paths before you uninstall the Recovery Server, otherwise you cannot change the cluster. Without an active Recovery Server, the storage type will not be changed in the Recovery Database.
Integrity check
This job checks to make sure that all of the data included in snapshots actually exists on the server. Recovery Solution verifies the presence of the data, but does not verify that the information is intact or recoverable. This job also updates statistics in the database in order to keep performance optimized The following options are available for the Integrity Check server job:
!
Delete lost protected data files Check this option to have the Integrity Check job delete the information about the protected data file in the database in case the file is missing from the raw storage.
Delete unrecoverable protected data files Check this box to have the Integrity Check job delete the information about the protected data file in the database in case the file is corrupted.
If integrity job finds a corrupted block, it will try do the following things: 1. 2. If there is more than one storage group, then integrity job will try looking for the valid block located in other storage groups. Integrity job will perform database cleanup. This involves database information that refers to the corrupted blob block and will be removed from the database. There are three cases:
"
File data block is corrupted - the entire file will be removed from the database, the user will not be able to restore the file or some of its revisions. Security data block is corrupted - only security record will be removed from the database, so user will not be able to restore file security for some files. Full system recovery block is corrupted - full system recovery blocks will be removed from the database, so user will not be able to perform full system recovery or rollback from the snapshots that refer to that full system recovery block, that snapshot will not be visible in data recovery wizard.
"
"
98
Note The same process runs during snapshot - if the agent that performs the snapshot tries reading the corrupted block, the references to this block will be removed from the database, and the agent should backup that data again. If data was corrupted, the file will be backed up again; if the security block is corrupted, the security descriptors will be backed up again. There is no handling for corrupted full system recovery blocks.
"
Perform CRC Select this box to have the Integrity Check job use Cyclical Redundancy Checking to verify that the data found matches the original data stored during snapshots. Recovery Solution checks the integrity of the information in the BLOB files. While a successful integrity check with CRC makes it likely that most files can be recovered, it does not guarantee that any individual file is actually recoverable, as it handles file corruptions the same way as integrity check without CRC. Using this option can cause the Integrity Check job take a very long time to run, so you should be selective when and how often you run it.
Blob data storage retention occurs according to the Server Space Management rules. Server space management job CPU throttling can be managed via the console.
99
You might want to use the Job Schedule Worksheet (page 274) to help you plan out appropriate times to run server jobs. 5. (Server Space Management Job only) Force deletion of the recently excluded files During the SSM job, this will cause the automatic deletion of any files or folders that have been configured by the user to be excluded. (Server Space Management Job only) Server space management job CPU throttling This is the maximum amount of server processing to be use for this job. (Server Space Management Job only) Storage Compaction Compaction is a form of compression used on NTFS volumes performed by Recovery Solution itself rather than the operating system. Compaction works by consolidating the empty space stored inside protected data (BLOB) files. In most cases the main benefits of compaction occur when protected data is deleted. Recovery Solution only applies compaction to the data during server space management and deletion jobs. (optional) Compact compressed volumes This will use compaction on operating system compressed volumes (optional) Minimum space to reclaim (% data file size): default is 50%. This option configures the minimum amount of unused space in a raw storage file (BLOB) that would trigger the compaction. The purpose of the Compaction is to reclaim space on non-compressed NTFS and FAT16/32 volumes. It also decreases the actual number of BLOBs, that is useful if you plan to backup BLOBs to tape. Decreasing the number of BLOB files is also good for the general file-system performance. Setting this option to a lower value, 10% for example, causes the Compaction to occur even if the amount of unused space is as low as 10% of the entire disk space occupied by a BLOB. A higher value set, 50% for example, makes the Server Space Management job reclaim unused space only when at least 50% of the entire BLOB file is empty. Thus a lower value reclaims more disk space to the prejudice of the speed of the job. On the contrary, a higher value makes the job complete faster while more free space is retained unused. An optimal value depends on the specific Server Space Management job schedule and the amount of data in raw storage. Note In most environments enabling Compaction or changing its settings will not result in any reduction of space utilization, as normally BLOBs are already compressed by NTFS compression. 10. Click Apply. In addition, any pending job in the job queue that is scheduled to run at a later time can be accelerated to run immediately. For more information, see Job Schedule Worksheet (page 274). Notes All server jobs runs on only one Recovery Solution Server and it is not fault tolerant. All server jobs run according to the time setting of the Recovery Solution Server that is the machine physically running the job.
6. 7.
8. 9.
100
4. 5. 6. 7. 8. 9.
4. 5. 6. 7.
101
after synchronization then all groups are synchronous updated and the system is mirrored. Note There must be one synchronous storage group in a cluster.
Storage Group
By default there is a Main Storage storage group. By adding additional storage groups you are mirroring the BLOB data. There are two types of mirrors that can be added synchronous and asynchronous. A synchronous mirror adds the data is update in the mirror at the same time the data is update in the Main Storage. Asynchronous mirror updates when the Storage Locations Synchronization server job runs which needs to be scheduled by the administrator. In case one mirror goes offline during snapshot (restore), snapshot continues to (from) another mirror. Space management and Integrity Check jobs work simultaneously with all mirrors. In case whole BLOB file created only on one mirror, then it is copied to other mirrors by Storage Locations Synchronization job. In case only some blocks were unsynchronized, then these blocks also synchronized by Synchronization job. There are three actions you can do to a storage group: add, edit and delete.
4. 5. 6. 7. 8. 9.
4. 5. 6. 7.
102
8. 9.
You can either change the name of the group or change updating between synchronous and asynchronous. Click Ok.
4. 5. 6.
Storage Location
In the Main Storage storage group there will be at least one storage location that was specified at installation of Recovery Solution. There are six actions you can do to the storage location: add, edit, enable, disable, move and delete.
4. 5. 6. 7. 8.
Enter a data storage location. This can be either an IP address, a DNS name, or a computer name where hard drive space will be used. The format for entering this information is \\<servername>\<sharename>\<directory>. Select Limit storage capacity to if you do not want to use all the free space on the specified drive. Enter a maximum space to be used (MB), or enter 0 for unlimited.
9.
10. If this is a remote location, provide authentication credentials. Notes Use domain (not local) user credentials, otherwise the storage location will be inaccessible. A remote share permissions and folder security must be configured to allow full access to the user accessing the share.
103
You must not add network storages located on computers from domains, which are not trusted by the Recovery Server domain. Also, do not use the credentials of users from the non-trusted domains to access the storage locations. Storage status will be reported Inaccessible after adding such storages. The reason is that Recovery Server cannot be impersonated under a user account from a non-trusted domain. 11. Click OK. 12. Click Apply.
4. 5. 6. 7. 8. 9.
You may edit the amount of storage space to use and authentication credentials. Click OK.
4. 5. 6. 7. 8. 9.
104
3. 4. 5. 6. 7. 8. 9.
Click Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. Click the cluster node. Click the Storage Management tab. Select the group you want to disable a storage location. Select the storage location you wish to disable. Click the Disable Storage Location icon group. Click Apply. above the list of storage locations for that
4. 5. 6. 7. 8. 9.
10. (optional) Click Disable the storage after its contents has been moved. 11. (optional) Click Delete the storage after its contents has been moved. 12. Select one
" " "
Move all This will move all the data from the one location to the other. Move an mount of storage from the totaled stored Move the ID in a range
Start Job Now will start the data file move now. Schedule job allows you to choose a data and start time frame for the job to be executed.
105
3.
Select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Configuration. Click the cluster node. Click the Storage Management tab. Select the group you want to delete a storage location. Select the storage location you wish to delete. Click the Delete Storage Location icon group. Click Apply. above the list of storage locations for that
4. 5. 6. 7. 8. 9.
Note You must manually delete the storage files after deleting a storage location.
3. 4. 5. 6. 7. 8. 9.
Select the computer you want to install as a Recovery Solution Server. Click OK. (Optional) To override default installation folders, click Installation Settings. Click Install Server.
10. You can accept the default installation settings or changes them. Click Proceed with Install. It will take a few minutes for the server component to install. The rollout page shows the status of the server rollout process. Click the Refresh the page. icon to refresh
After the installation is complete, the server will appear in the list of servers for the cluster under the Servers tab of the cluster properties page. Altiris Recovery Solution Server will also appear in the Add/Remove Programs list on the computer it was installed on.
106
The following information is displayed for each server for that cluster:
" " " "
Name of the server Domain which the server resides The IP address of the server The current status of the server
4. 5. 6. 7. 8.
107
2.
Click the Configuration tab. In teh left pane, select Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration. Click the Recovery Solution Server Uninstall task. Select the cluster which you want to uninstall a server from. Highlight the server you wish to uninstall. Click Uninstall Server. Click Yes.
3. 4. 5. 6. 7.
4. 5.
4. 5. 6. 7. 8. 9.
Check User if you wish to add a Domain User. Check Groups if you wish to add a Domain Group. Select where to search:
" "
10. Select type of query either Equals or Starts With. 11. Enter name or part of name to search for.
108
12. Click Find. 13. Highlight users to add. 14. Click Ok. 15. Click Apply.
4. 5. 6. 7. 8.
4. 5. 6.
4. 5. 6.
109
4. 5. 6. 7.
If you are configuring a balanced cluster, you can either use HTTP or HTTPS. If you are using a non-balanced cluster, you can use any of the three. Generally, using DCOM can provide faster communication by as much as 10-20%. However, DCOM may not work well behind firewalls or on slow WAN connections. In those cases, HTTP will be the preferred option. This setting is used when the cluster communicates to protected computers during the Recovery Agent installation and registration. The protocol may be different when the Recovery Agent communicates to the Recovery Server farther on. Configuration of transport protocol used after the installation can be configured on the Misc tab of Recovery Agent Settings policy. For more information on Recovery Solution Agent communication settings see Configure Miscellaneous Settings on page 94 Notes If you are using HTTP for communication the binding port will be the same port as communications between the Altiris Console and Recovery Servers If you are using HTTPS for communication the binding secure port will default to port 443 and can be change by the administrator if need. For HTTP and HTTPS ports 8080 and 8081 should not be used as binding ports used by Recovery Solution if Altiris Deployment Server is installed on the same Notification Server. Both HTTP and DCOM is used for communication between Recovery Solution Server and Notification Server.
110
Notification Server, roles are assigned access rights to various elements in the console. By default, setup creates new role named Altiris Recovery Solution Helpdesk Technicians, which applies specifically to the solution. Administrator can manage roles and assign each role its own set of Global Privileges in the Role Management window. Note For information on Altiris Console permissions, security and role management, see Altiris Notification Server Help. See also: Security Role Management (page 111).
Note There are a number of default roles in the Role Management window and each has its own set of Global Privileges. The following table lists the Recovery Solution global privileges and their default assignments.
Privilege
Manage Recovery Solution Agent Jobs
Description
Roles with this privilege can manage content and Recovery Solution Agent jobs which include start/cancel snapshots, restores, rollbacks.
Assigned roles
!
Altiris Administrators Altiris Recovery Solution Helpdesk Technicians Altiris Administrators Altiris Recovery Solution Helpdesk Technicians Altiris Administrators
Roles with this privilege can create media for Full System Recovery.
Roles with this privilege can start/ cancel Recovery Solution clusters' jobs.
111
Privilege
Manage Protected Computers
Description
Roles with this privilege can manage protected computers which include enable/disable accounts, manage users, and mark data for deletion. Roles with this privilege can run snapshots performed prior to a critical patch or a software update installation.
Assigned roles
!
Altiris Administrators
Altiris Administrators
Administrator can control roles access permissions for every Recovery Solution interface item in the Altiris Console by changing Security Descriptor Settings for the item. To see security settings for the item, click on the Security tab of Properties window accessible via the items right-click menu. Notes By default, Altiris Recovery Solution Helpdesk Technicians can only perform Recovery Agent Rollouts and have read-only access to the Recovery Agent Settings via the Altiris Console. For more information about Altiris Console permissions, security and role management, see Altiris Notification Server Help.
If you are planning to distribute client jobs among several servers, use the load balancer address to specify Recovery Solution Cluster address. Configure the load balancer properly to forward requests from the clients to the server. For additional information, see Configuring the Load Balancer on page 27. If you are planning to distribute server and client jobs between two servers, use the address of the server that will run client jobs.
"
2.
Add the new servers to the cluster. For instructions, see Adding Recovery Solution Servers to a Recovery Cluster on page 40. By default, all the servers can run both server and client jobs. The server dedication to running server or client jobs is determined by the value stored in the Role column of the Vault table found in the Recovery Solution database. You can use Microsoft SQL Server tools to modify the server role.
112
Caution Be extremely careful when modifying the Recovery Solution database. If you accidentally change or delete the wrong values, the solution may stop working properly. The following values can be assigned:
" " "
0 - the server is dedicated for snapshots 1 - the server is dedicated for server jobs 2 - the server accepts any kind of jobs
Example If you want some server to run only server jobs, change the value in the column Role for the server to 1. If you want some server to run only server jobs, change the value to 0.
3.
113
Chapter 6
General Recovery Solution Tasks in the Altiris Console (page 114) Viewing Recovery-related Information about Individual Computers Using the Resource Manager (page 114) Performing Basic Recovery Tasks (page 116) Manage Agent Setup Packages (page 127)
! !
Tasks
Agent Settings Decryption/ Encryption Utility Altiris Partition Removing Utility Convert encrypted files on FAT partitions Erase the protected computers partition table Manage Agent Setup package Restore data from Full System Recovery CD or DVD-ROMs Restore data using the Migrate utility
Link to information
AeXRSEnc Utility (page 279) BWINST Utility (page 288) Convert Encrypted Files on FAT Partitions (page 128) Erasing the Partition Table (page 146) Manage Agent Setup Packages (page 127) Restoring Data From Full System Recovery Media (page 146) Restoring Data with the Migration Utility (page 130)
To access the Recovery Solution task policies, open the Altiris Console, click the Tasks tab, and then click Tasks > Incident Management > Recovery Solution.
Viewing Recovery-related Information about Individual Computers Using the Resource Manager
You can use the Resource Manager to view recovery-based information about individual client computers. You can view the following information:
!
Summary Information:
" "
The cluster that files are backed up to The last snapshot start and end time
114
The snapshot status The number of files and amount of bytes backed up The space used to store backed up files
Inventory Information:
" " " " "
Name, version, and last update time of the Recovery Agent. Address of Recovery Solution Cluster the computer is connected to Altiris Partition: size, available space, amount of recovery data Size and date of image creation Recovery Agent database: size and last update time
Agent registration Snapshots started and completed Snapshots failed Service started Connection failures
Recovery Agent settings defined and customized by a user (not the administrator)
Notes Inventory information is available only after the Altiris Agent on the client computer has reported inventory data to the Notification Server. By default, inventory data is reported once daily. Only the settings defined by the user will be displayed (not the settings defined by the administrator).
b. c.
115
Running Server Jobs (page 116) Performing Recovery Tasks on Individual Computers Using the Resource Manager (page 117).
Delete Marked Items For information about this job, see Delete Marked Items on page 98.
Integrity Check For information about this job, see Integrity check on page 98.
Server Space Management For information about this job, see Server Space Management on page 99.
Storage Locations Synchronization For information about this job, see Storage Locations Synchronization on page 99. You can also delete all users snapshot data from data storage and from the Recovery Database by right-clicking the cluster name > Recovery Solution Tasks > Delete All User Data.
In addition, the following administration and client tasks are available through the cluster right-click menu (Configuration > Solution Settings > Incident Management > Recovery Solution Recovery Solution Clusters > Recovery Solution Cluster Configuration > (right-click a cluster) > Recovery Solution Tasks). These tasks apply to all clients installed on the Recovery Solution cluster.
!
Administration
" " "
Change Accounts Status Change Web Access Settings Mark Files for Deletion
116
"
Rollback
# #
" !
Snapshot Now...
Accelerate a Scheduled Snapshot (page 118) Create a Full System Recovery Image (page 118) Disable/Enable a Computer Account (page 118) Manage Full System Recovery Image (page 118) Manage Protected Data (page 118) Manage the Users of a Protected Computer (page 120) Mark the Client Computer Account to be Deleted (page 120) Mark Files for Deletion (page 120) Perform a Rollback (page 122) Perform a Snapshot Now (page 127)
Note Recovery tasks are available only after the Altiris Agent on the client computer has reported inventory data to the Notification Server. By default, inventory data is reported once daily. In case port 43189 port is closed, client jobs (such as snapshot, restore, rollback) initiated from the Altiris Console may start with a delay of up to 15 minutes. For details, see Configure Snapshot Settings on page 78.
2. 3.
117
You can also select a collection or one or more computers in a collection and choose Recovery Solution Tasks from the right-click menu to access a list of recovery tasks.
Note You can enable or disable all computers at once through the right-click context menu for a cluster or a collection of computers with Recovery Solution Agent installed: right-click the cluster name > Recovery Solution Tasks > Change Account's Status > Disable/ Enable Accounts.
Latest Version
118
Choose this option to display only the most recent snapshot of each file. Even files that were not included in the most recent snapshot are displayed, as long as they were in some previous snapshot.
!
All Versions Choose this option to display all snapshots of your files. If you're viewing all file details (View menu), the Snapshot Taken column shows the date and time that each snapshot was originally run. Note In some cases the time displayed under Snapshot Taken might be the only distinguishable difference between two or more versions of a file. This could happen if the file itself did not change between snapshots, but the properties of the file did. Example: Recovery Solution creates a new version of the file if the only change is in its NTFS security attributes.
If you have installed the Recovery Agent more than once (or if your software was automatically updated from the server), you might have the following additional options:
!
Snapshots From All Installations Choose this option to display protected files from all of your Recovery Agent installations. If you're viewing all file details (View menu), the Snapshot Taken column shows the date and time that each snapshot was originally run.
Snapshots From Current Installation Choose this option to display protected files only from your current Recovery Agent installation.
Snapshots From Previous Installations Choose this option to display protected files only from your previous Recovery Agent installations. If you're viewing all file details (View menu), the Snapshot Taken column shows the date and time that each snapshot was originally run.
Note If a particular file or folder originated on an NTFS drive, and you do not have at least read access to the file or folder, then you cannot see it in the list of protected files. However, if you restore a folder containing the secure item, the item will also be restored (but you still won't have access to open it).
119
5.
To delete data from a snapshot, click Delete. You can manually delete specific files and folders that were accidentally backed up to the server, or that you no longer need. Files are manually deleted in two stages.
"
You tell Recovery Solution which items you want to delete. This is known as marking the items for deletion. You schedule one or more times each week for Recovery Solution to actually delete the files. For more information, see Configuring Server Job Schedules on page 98.
"
6.
You tell Recovery Solution which items you want to delete. This is known as marking the items for deletion. You schedule one or more times each week for Recovery Solution to actually delete the files. For more information, see Configuring Server Job Schedules on page 98.
120
Notes You can use the Largest Files report in order to determine the files taking up most space on the server. For instructions, see Using Recovery Solution Reports and Job Queue on page 153. In order to prevent the server from backing up the files and folders marked for deletion, make sure to exclude these files and folders from future snapshots. For instructions, see Excluding Files From Snapshots on page 81.
This is a folder Choose this option to specify that the name you entered above is a folder rather than a file. Files by this name will not be deleted.
"
This is a file Choose this option to specify that the name you entered above is a file rather than a folder. Folders by this name will not be deleted.
"
This is a file type Choose this option to specify that the name you entered above is a file type or extension. All files with this extension will be deleted.
5.
Under Choose where to mark for deletion this folder or file select the locations from which you want the item to be deleted.
"
Exclude this folder or file name everywhere Choose this option to delete the item from every location on the server.
"
Exclude only this path on Choose this option to specify that the text you entered above should be treated as a path to a specific folder or file. If you choose this option but you specify only a folder or filename without a path, the folder or file is only deleted from the root of the drive. Example: if you type LOGFILE.TXT as the name of the item to delete, then choose Mark this path for deletion on, Recovery Solution deletes files such as C:\LOGFILE.TXT
121
and D:\LOGFILE.TXT (depending on your drive settings below). However, LOGFILE.TXT files found elsewhere on a drive are not deleted. Specify below which drives you want to delete the item from. All drives Choose this option to delete the above path from every drive. This drive only Choose this option to delete the above path only from a specific drive. Specify the drive letter in the box. 6. Click Ok.
Perform a Rollback
The rollback option lets you return a computer to the state it was in at the time of a Full System Snapshot. This is useful if a protected computer can be started but is not functioning properly. (If the computer cannot even be started, you need to use Full System Recovery instead.) A rollback can be performed by the administrator, or by the user (if the administrator has allowed it). Notes You can only roll back a computer if the disk configuration is the same as it was at the time of the snapshot you are recovering. Example: if drive letters were changed or drives were re-sized on the computer since the time of a snapshot, then you cannot roll the computer back to this point. You cannot roll back a Windows 2000/XP protected computer that uses disk volume sets, stripe sets, or fault-tolerant drives. Performing a rollback could cause some evaluation software to claim that it has expired, preventing further use of the software. Before rolling back a computer, Recovery Solution automatically runs a Full System Snapshot of the computer to ensure that the most recent files are protected. After the rollback, the user can restore any needed files that were overwritten by the rollback. If you do not need the extra level of data protection (Example: if the protected computers current data is already backed up somewhere) you can prevent the snapshot from running. To do so, modify the protected computers Windows registry to add or edit the following value: HKEY_LOCAL_MACHINE\SOFTWARE\Altiris\eXpress\Recovery Solution Agent\NoSnapshotRollback This is a DWORD value that should be set to either 0 (meaning the snapshot will be performed) or 1 (meaning the snapshot will be skipped). For additional rollback help, see Rollback Troubleshooting on page 224.
122
2. 3.
123
Choose this option to restore only those files required to run the operating system and installed applications. User data files are not restored. Note Recovery Solution determines if a file is considered user data by looking at the file extension. The list of user data file extensions is specified on the Rollback Data tab of the protected computers properties. All file extensions not listed here are considered to be system or application files, and are restored during any type of rollback. (The configuration of rollback data is available only to administrators through the console, not to protected computer users.) It is not always obvious from a files extension whether the file is a system file or a data file. Example: the .DAT file extension is used by some applications to store information that is actually part of the program, while other applications use it to store options or cached data, and still others use it as a default file extension for data files created by users. Before you start a rollback of system files only, you should examine the list of user data file extensions to be sure that they match the set of files that you consider to be user data. By default, Recovery Solution considers most files to be system data. This is done to ensure that the system works properly after the rollback. However, you might want to add data file extensions to the user data list (thereby preventing the rollback of these files) for the following reasons.
!
Files that are not excluded from the rollback are overwritten if an older version exists in the snapshot. Excluding files that do not need to be rolled back means that the rollback can be completed in a shorter amount of time.
Here are some examples of additional data file types you might want to specify. *.bmp (bitmaps) *.htm (HTML files) *.mp3 (compressed sound files) *.nsf (Lotus Notes mail files) *.txt (text files) *.wav (sound files) *.zip (compressed zip files) Restore all files (including your data files): Choose this option to restore data files as well as program files. All of your applications and settings will be returned to their previous state, and all of your data will be restored. Caution This option overwrites data files as well as program files. Some of your files might be overwritten with older versions.
124
Click Roll back master boot record if you want to restore the computers master boot record and the boot sectors of all primary partitions. The master boot record is necessary to start Windows. It contains information about the computers disk partitions and passes this information along to other programs in order to start the computer. The partition tables themselves are not rolled back by Recovery Solution, but the program that reads the partition information is. You might want to roll it back if you suspect that it has become damaged or infected by a virus. Note Some virus protection programs, such as Norton Antivirus 5.0, have an option to protect the computers boot code. If the protected computer has Norton Antivirus installed with this option turned on, and the master boot record has changed since the time of the snapshot being restored, then during the rollback Norton Antivirus prompts the user to accept or reject the rollback changes to the master boot record. Whether the user decides to accept or reject the change, the rollback continues normally but does not restore either the master boot record or the Windows registry. Caution If the file system of a drive has been changed since the snapshot selected for rollback (Example: from FAT to NTFS), then the drives boot sector is not restored during rollback. This could cause the drive to become unbootable after the rollback is complete.
Click Enable Rollback file deletion if you want to delete protected computer files that are not present in the snapshot you are rolling back to. Which files get deleted depends on what you choose to roll back. If you roll back only system and application files, then only system and application files that are not present in the snapshot are deleted. If you do not choose this option, no files are deleted during the rollback. Note You can set a default value for this option for each protected computer in the protected computers properties (Rollback Data tab). Note After the rollback is complete, a text file named DELETION.LOG, stored in the protected computers installation folder for Recovery Agent, contains information about which files were deleted.
5.
125
This selects the method you want to use to determine whether or not files have changed. An item is restored only if it is different from the protected copy on the server. Check file properties only (faster) Choose this option if you want Recovery Solution to check the properties (size, date/time) of each file to determine whether or not it has changed. If any of these file properties are different for the file on the protected computer than they are for the protected copy on the server, the file is restored. If all file properties are the same, the file on the protected computer is assumed to match the protected copy, and restoration of that file is skipped. Although unlikely, it is possible that two files can have the same file properties but contain different data. If you want to ensure that such files are restored, click Check all file data (more thorough). Check all file data (more thorough) Choose this option if you want Recovery Solution to check the contents each file to determine whether or not it has changed. This is a more thorough method than checking only the file properties, but if you choose this option, the rollback might take considerably longer.
6.
Click Ok to begin the rollback. Notes If you are rolling a computer to a state where protected files must be replaced, a Windows File Protection message may appear on the protected computer. If there is a user at the protected computer, the user should either cancel the prompt to restore files (choosing to keep the existing files), or simply ignore the prompt altogether. Certain error conditions that cause the rollback not to succeed might not report that condition back to the console. If the rollback seems to be running for an excessively long time, you should check the protected computer itself to see if any errors have occurred. An administrator can cancel the job from the console job queue. Depending on the files restored, the protected computer might need to be restarted at the end of the rollback process. If the protected computers drive configuration has changed since the time of the snapshot to which you are rolling back, then the old drive configuration is restored, but it is possible that one or more drives contains no data. To restore the data, perform a second rollback to the snapshot you chose for the first rollback. Temporary folders might have to be recreated manually. These are usually not included in snapshots and are therefore not restored to the protected computer. Certain applications might require the existence of temporary folders before they will work properly. In versions of Windows that include the System Restore feature, Recovery Solution creates a restore point before starting the rollback.
126
8. 9.
AgentSetup: you can only modify the package files Data1.cab: you can modify the package files or change the client splash screen.
11. Click Start. 12. Add and delete files as needed and click Finish.
127
Chapter 7
Convert Encrypted Files on FAT Partitions (page 128) Restoring a Users Data to a Different Computer (page 129) Full System Recovery (page 131) Using the Snapshot Command-Line (page 147) Using RSACmd.exe Utility (page 152)
128
Web-Based File Recovery (page 129) Reinstall Recovery Agent Using the Same Account (page 129) Restoring Data with the Migration Utility (page 130) Restoring Data From Full System Recovery Media (page 146)
Note Members of AeXRS_Managers group created during cluster setup can restore user data using Web-Based File Recovery and the Migration utility for any protected computer.
129
Restore data to a new or upgraded computer. Restore data to alternate media, such as a CD-ROM. Example: you can restore to a computer connected to a storage device such as a CD-ROM writer. Then use the CD-ROM writer software to write to the CD-ROM. This can be useful if the user is offsite and you need to ship data from the users desktop.
Note This utility allows you to migrate only data files. If you need to migrate a users entire system, including all application settings, you should use the full migration feature instead.
Ensure that Recovery Agent is installed. Ensure that the user is logged on appropriately. If this user has originally installed the Recovery Agent, then he or she will not be prompted to log on. Otherwise, this user will need to log on and supply a domain name as well.
3. 4. 5.
Copy AeXMigrt.exe from the floppy to the hard drive of the destination computer and run it. In the dialog box that opens, enter the users logon information. Click OK to continue. A dialog box shows all of the users snapshot data. Use the dialog box to select folders or files for restore and specify a location on the destination computer. If the user ran snapshots on more than one computer, each computer appears in the dialog box.
6.
When the restore is complete, remove the floppy from the destination computer and delete AeXMigrt.exe from the computers hard drive.
130
Caution Protect network security. Do not leave the utility on a users computer. The utility is for use when you need to restore data from a different protected computer, but with this capability, users might access data that you do not want them to.
Failure Messaging
If a failure occurs during a restore, information is provided in a log file. The log file is stored as C:\Program Files\Altiris\Recovery Soluiton Agent\Data\ CRA_Restore_<date of the restore>.log. You can open the log file in a text editor.
Full System Recovery Overview (page 131) Full System Recovery Setup (page 133) Full System Recovery Disk Creation (page 134) Full System Recovery Using PXE (page 139) Full System Recovery from USB Media (page 139) Running Full System Recovery (page 143) Restoring Data From Full System Recovery Media (page 146) Erasing the Partition Table (page 146)
Note Full System Recovery is also available for protected computers running Local Recovery Agent. For details, see Full System Recovery Options (page 189).
131
connection to the network. For those computers, alternatives such as rollback might take too long. See also:
! ! !
Full System Snapshots Are Necessary for Full System Recovery (page 132) What Happens During Full System Recovery (page 132) Constraints of Full System Recovery (page 132)
Recovery Solution performs the following steps during Full System Recovery.
! ! !
Partitions and formats the hard disk drives. Restores the basic operating system and settings. Restores the remaining data.
Full System Recovery can be performed from a Full System Snapshot that was done using previous versions of Recovery Solution. To use snapshots from earlier versions (back to 3.2), you must add all the user data to the CD/DVD-ROM image set.
132
Drives formatted with the NTFS file system are always recovered with the default allocation unit size of 512 bytes, regardless of the allocation unit size the drive originally had. Full System Recovery cannot be performed on a protected computer running disk compression software (such as DriveSpace or Stacker). Full System Recovery cannot be performed on a Windows 2000/XP protected computer that uses dynamic disks. For a list of RAID adapters certified for Full System Recovery, see Hard Disk Support on page 297. In general, Full System Recovery can only be performed on the same protected computer from which the Full System Snapshot was performed. In some cases Full System Recovery can be performed on a computer that is not the same as the originally protected computer, but there are limitations. Specifically, the recovered computer must match the originally protected computer in the following ways.
"
The hard disk adapter types must match. Example: if the original computer had an IDE hard disk adapter, the recovered computer cannot have a SCSI hard disk adapter. The network adapter cards must match. The drivers required to run the hardware must match. The hard disks on the recovered computer must be large enough to hold the protected drives; during Full System Recovery, Recovery Solution cannot separate files that were originally stored on the same drive.
Full System Recovery cannot re-create RAID configuration. So, before starting the Full System Recovery on a computer with RAID, you must ensure that the configuration is correct, or manually recreate the RAID configuration to be the same as it used to be at the time of the snapshot selected for Full System Recovery. The trial periods of shareware applications (like PerfectDisk, for example) can expire after Full System Recovery because of the license violation prevention mechanisms these applications use. Full System Recovery can be performed only with the same keyboard and mouse, which were used during snapshot selected for Full System Recovery. For example, Full System Recovery will not work if PS2-compatible mouse and keyboard were used during snapshot, but during FSR USB-compatible mouse and keyboard were attached.
133
Hardware and software required to create CDs or DVDs (for Full System Recovery from CD/DVD) Recovery Solution does not create CD/DVD-ROMs for you. You must create CD/ DVD-ROMs from the Full System Recovery images before you can recover the protected computer.
1 blank or reusable 3.5" 1.44 MB diskette (if the protected computer cannot boot from CD-ROM or DVD)
"
Make sure that the disk is blank or that you do not need any of the existing data on it. When the Full System Recovery is complete you no longer need the disk, so you can reuse it for future recoveries.
"
CD-ROM or DVD driver (if the protected computer cannot boot from CDROM or DVD, and its CD-ROM or DVD drive has a SCSI interface) for Full System Recovery from CD/DVD. The boot diskette supports most EIDE CD-ROM drives automatically. If the protected computer has a SCSI CD-ROM drive that requires drivers to be loaded before it can be accessed, you must add the drivers to the boot floppy disk. For more information, see Full System Recovery Disk Creation on page 134.
b. c.
134
computer and click Recovery Solution Tasks > FSR Tasks > Create FSR Image. 2. 3. 4. 5. 6. Click Specify path. Specify the share location where Full System Recovery images will be stored (see Full System Recovery Setup on page 133). Click Ok. Click Run FSR Wizard. Click an item from the Snapshot date drop-down list. The snapshot you choose determines which versions of the protected computers files are restored. To ensure that the most recent data is restored, choose Use latest snapshot data available at restore time. Notes The Snapshot date list does not include snapshots that are missing files due to server space management and snapshots containing corrupted data (in case this data was removed during Integrity Check job). If any date and time settings are different between the protected computer and the server, some older snapshots might not be available for Full System Recovery. To see all available snapshots, the following settings must be identical on the protected computer and the server: (1) the date and time; (2) the time zone; (3) the state of the option to automatically adjust the clock for Daylight Savings Time (whether this option is on or off). Full System Recovery can be performed from a Full System Snapshot that was done using previous versions of Recovery Solution. When you use snapshots from earlier versions, all user data will be included in the image. 7. 8. Under FSR media capacity, specify the type of media you are using. (Optional) To do the entire recovery from CD-ROM or DVD, select Include all user data on CD-ROM. Select this option if you want to do the entire recovery from CD-ROM or DVD. Otherwise, only the temporary operating system is stored on the CD-ROM or DVD, and Recovery Solution will connect to the server to restore the remaining data. Note Make sure that the network share for Full System Recovery has free disk space equal to the total size of the CD-ROM or DVD images plus the maximum amount of data for a single CD-ROM (up to 750 MB) or DVD, depending on the capacity of your blank media. Choosing this option makes the Use latest snapshot data available at restore time option equivalent to simply choosing the snapshot with the latest date from the list. If all the data is included on the CD-ROM or DVDs, Recovery Solution does not connect to the server during Full System Recovery. 9. (Optional) Password protect the image. If you include all the users data on the CD-ROM or DVD, select the Password protect CD-ROM. This prevents anyone from browsing the CD-ROM or DVD
135
contents and restoring files without performing Full System Recovery. Note that if only the temporary operating system is stored on the CD-ROM or DVD, this option is not available; at recovery time, the user must log on to the server to restore the remaining data anyway. a. b. Select the Account name. The is the domain account name of the user. Enter and confirm the account password.
10. Edit image description. You can edit the Image description field if you want to find this temporary operating system image later. 11. (Optional) Create boot floppy disk. If the protected computer is unable to start from CD-ROM or DVD, you can create a boot floppy disk. a. Modify the boot floppy image. You can add, delete, or edit the files that will be placed on the boot disk. To modify the image, click Modify Boot Floppy Image. SCSI CD-ROM Drivers The Full System Recovery boot floppy provides broad support for EIDE CD-ROM drives. However, if a protected computer uses a SCSI CD-ROM drive, a driver for that particular SCSI controller must be added to the Full System Recovery boot floppy. Which DOS SCSI driver (also known as ASPI Manager) to use depends on the manufacturer and model of the SCSI controller. Generally, adding DOS SCSI drivers to the Full System Recovery boot floppy involves the following:
"
Determine which SCSI driver to add to the boot floppy. Adaptec DOS SCSI drivers and information are available from Adaptecs FAQ page, at http://www.adaptec.com/worldwide/support/faqindex.html. LSI Logic (maker of Symbios brand products) provides DOS SCSI drivers and information on its web site, http://www.lsilogic.com/support/index.html. Many other SCSI controller manufacturers also provide DOS SCSI drivers for the products on their web sites.
"
In the root directory of the Full System Recovery boot floppy, locate the config.sys file. In that file, you will need to replace the EIDE CD-ROM driver information with the necessary lines to install the DOS SCSI CD-ROM drivers. Replace the line DEVICE=OAKCDROM.SYS /D:mscd001 as follows: For the Adaptec 2940U/UW controller:
136
Note Microsofts CD-ROM Extension MSCDEX.EXE is added automatically to the Full System Recovery boot floppy and set to execute from the AUTOEXEC.BAT file, with the line LH MSCDEX.EXE /D:mscd001. Note that the device name mscd001 matches the device name given with the /D switch used when loading the DOS SCSI drivers above. b. c. Insert a blank or removable 1.44 MB 3.5-inch floppy disk. Click Create Boot Floppy Disk.
12. Check temporary operating systems settings. When you choose a snapshot, Recovery Solution immediately checks the protected data to verify that it contains the information required to run Full System Recovery. Temporary operating system During Full System Recovery, Recovery Solution starts by installing just enough of the protected computers operating system to run Recovery Agent and securely communicate with the server. This temporary operating system consists mainly of files that Recovery Solution has detected as being required to start the protected computer. This set of files should be sufficient to start the computer. However, you have the option to add files from the protected computers snapshot to its temporary operating system. Click the Advanced button in the Protected Computer Settings area if you want to modify it, and then click Modify temporary OS contents. Note Make sure the temporary operating system fits on a single media (Example: one 650 MB or one 4GB DVD) . Otherwise, Full System Recovery will not succeed.
"
The Protected Computer Files file tree shows all of the files contained in the Full System Snapshot that you are recovering. The files with red check marks are included in the temporary operating system image. The folders with red check marks each contain one or more files that are included in the temporary operating system image. The green files and folders without check marks were added manually. The Temporary Operating System file tree shows all of the files currently contained in the temporary operating system that Recovery Solution will use to start the computer during Full System Recovery. Note If the protected computer had an LMHOSTS file specifying network access configurations, verify that this file is included in the list of temporary operating system files. Inclusion of this file ensures that the protected computer will retain its network configuration during recovery.
"
"
Use the Add and Remove buttons to modify the temporary operating system. You can select multiple items by holding down the CTRL (1 item at a time) and/ or SHIFT (range of items) key while making your selections. Choose Reset Image to put the temporary operating system image back to the default set of files detected by Recovery Solution.
"
13. You can also modify the following options in the Advanced settings dialog:
137
"
Dont restore the partition table and dont format the volumes if theyre already formatted Enabling this option may be useful in case Full System Recovery fails when recreating drives structure. See Using Full System Recovery Without Formatting Drives Option (page 145).
"
Dont delete source files after the ISO files creation Enabling this option may be useful in case the administrator wants to perform Full System Recovery from PXE or USB media.
"
Dont use compression in temporary OS CAB files Enabling this option may be useful in case data copying from FSR media fails in DOS mode.
14. Click OK to close the Advanced settings dialog window. 15. Click Start to begin creating the Full System Recovery disk. Progress information appears in the window as the disk is created. Note During this process, Recovery Solution creates large image files on the server. If you cancel the process, the files already created are not automatically deleted. You should delete them manually to conserve disk space. 16. Choose one of the following options to write Full System Recovery images to CD/ DVD-ROM.
"
Use a CD/DVD writer on a computer from which you can access the shared network folder for Full System Recovery. You need to find the image within the shared folder. Within the main folder you should see a folder with the name of the server. Beneath this are folders that have names in the format Computer_xxxx.IMG, where Computer is the name of the protected computer you are creating the CD/DVD-ROMs for, and xxxx is a number indicating the snapshot used (sequential from the oldest one on the server). The folder contains an ISO image file for each CD/DVD-ROM in the set.
"
Copy the images from the shared network folder to a location from which you can write it to a CD/DVD. You can do this from the Altiris Console. Select the protected computer, and from the Action menu or the context menu, click Full System Recovery, then Manage Images. Select the one you want, then click Copy To to copy the image to another location. Note Depending on the size of the image, the copying process could take a long time.
When the folder is accessible to your CD/DVD writer, you can begin making the CD/ DVD-ROMs. You can use any standard CD/DVD writing software to create a CD/ DVD-ROM from the image file.
138
Notes These files are CD-ROM images. To create CD-ROMs from these images, you must use the feature of your CD writing software that is specifically designed to extract the image information from a standard .ISO file and write it to a CD-ROM. The option is typically called something like Create CD From Image File. If you simply copy the file to the CD-ROM, it will not work for Full System Recovery. Some CD-ROM drives might not be able to read CD-ROMs that have not been finalized (or closed). This happens frequently with older NEC drives.* If you encounter problems such as error messages claiming that files or folders cannot be found, or if you find that the data on the CD-ROM cannot be browsed or manually restored, you might need to ensure that you finalize the discs in your CD writing software. The easiest way to do this is to create the CD-ROMs using the disc-atonce option. * Information courtesy of Andy McFaddens CD-Recordable FAQ (http:// www.cdrfaq.org).
The USB media must be bootable (most USB flash drives and hard disk drives are compatible). BIOS on target computer must support booting from a USB device.
139
USB drive must be properly formatted as bootable FAT16 partition before it can be used as Full System Recovery media. Full System Recovery floppy content and source Mini OS files (Full System Recovery image content) must be copied to the USB drive and specially modified. The selected snapshot size plus the size of Full System Recovery floppy files cannot exceed 2GB (FAT16 partition limitation).
Note Full System Recovery from USB media process is the same as the original Full System Recovery from CD/DVD-ROM. The only step that is omitted is the 30-second timeout at start-up when Full System Recovery prompts the user to press any key to initiate Full System Recovery, since the USB bootable media is not formatted by the Recovery Console Full System Recovery Wizard. See also: Preparing the USB media for Full System Recovery (page 140).
5.
Tip The Full System Recovery souce files can also be obtained from the ISO image file using a third-party ISO extraction utility.
140
For HP Drive Key or DiskOnKey USB Device, use Windows-based format utility found at http://h18000.www1.hp.com/support/files/serveroptions/us/download/ 20306.html. Use the FlashBoot utility (http://www.prime-expert.com/flashboot/). This utility supports formatting of both USB hard drives and memory sticks, performing all the steps that are required to make it bootable. Format the USB media manually (for example, see http://www.weethet.nl/english/ hardware_bootfromusbstick.php). Both methods let you create a bootable USB media with the boot OS (Free DOS, MS-DOS, Caldera DOS etc.).
autoexec.bat config.sys display.sys ega.cpi keyb.com mode.com pclean.exe readme.txt restore.dat rndm_dr.exe strings.ini vdisk.sys
141
2.
Modify and save the AUTOEXEC.BAT, CONFIG.SYS and RESTORE.DAT files (for example, using Notepad application) in the USB media root folder. a. AUTOEXEC.BAT. Remove all references to MSCDEX.EXE, Nwcache.exe and hardcoded paths. The file must look as follows:
@echo off mode con codepage prepare=((437)ega.cpi) mode con codepage select=437 rndm_dr.exe
b. CONFIG.SYS. Remove all references to oakcdrom.sys driver. The file must look as follows:
142
Finally, the USB drive content should look similar to the contents of the USB drive F on the picture (Free-DOS was used in this example, MS-DOS or Caldera DOS can be used as well)
143
Notes Some Toshiba computers cannot be recovered by booting from the floppy disk. For Toshiba computers, insert the first CD-ROM, then press the C key during bootup to force the computer to boot from the CD-ROM. Booting from the CD-ROM is the preferred solution for Toshiba computers, since it can take up to half an hour to boot from the floppy disk. Important In case of Full System Recovery from USB media, the computer BIOS must be configured to boot from the USB device. 3. A confirmation prompt with a countdown appears. To boot from Full System Recovery disk and begin the recovery, press any key. If you do not answer the prompt within the timeout period, the computer boots normally from the hard disk. To restart Full System Recovery, turn the computer off and back on again. Notes This confirmation prompt appears whenever the computer is started with Full System Recovery media in a bootable drive. For subsequent restarts during Full System Recovery, you should either remove the disks before the restart, or you should ignore the prompt and let the computer start normally. The confirmation prompt does not appear in case of Full System Recovery from USB media. 4. The Full System Recovery confirmation appears. To start the recovery, press F10. Recovery Solution partitions and formats the hard drives. It also installs the temporary operating system on the hard disk, and Windows Setup restarts the computer. This could take some time, depending on the size of the temporary operating system. Expect it to take up to 30 minutes for Windows 2000 computers. Note If the Full System Recovery fails in formatting the hard drives, see Using Full System Recovery Without Formatting Drives Option (page 145). 5. When prompted, remove the Full System Recovery disk. Recovery Solution restarts the computer and continues the Full System Recovery. 6. When prompted, you can choose to restore the remaining data either directly from the CD-ROM or over the network, from the Recovery Solution Server. If the data is not accessible from one of these places, the appropriate option is disabled, and you must choose the other one. If you are recovering from a CD-ROM that is not password protected, Full System Recovery continues automatically after 30 seconds, or you can click OK to continue immediately. Otherwise, specify the account information according to the recovery data source: If you are restoring data over the network, specify the account information of any authorized Recovery Solution user.
7.
144
If you are restoring data directly from CD-ROM, specify the account information of the user the administrator selected when he created the recovery CD-ROM set for this computer. If the CD-ROM set has been password-protected, you will also need the password that was assigned to the CD-ROM set at that time. 8. Recovery Solution restores the complete snapshot to the protected computer (from the Recovery Solution Server or from CD-ROM), and restarts the computer. Note If there are a large number of files on the CD-ROM set, data restore might be very slow, and might appear to be making no progress for some minutes. In this case, Full System Recovery has not failed; the process is simply slow. 9. Temporary folders might have to be recreated manually. These are usually not included in snapshots and are therefore not restored to the protected computer. Certain applications might require the existence of temporary folders before they will work properly.
After this, Full System Recovery will proceed as usual, but without drives formatting.
145
If you begin Full System Recovery by restarting the protected computer with the Full System Recovery disk or CD-ROM inserted, Norton AntiVirus might claim that it detects a boot sector virus, even though there is not one. To work around the virus error, remove the disk or CD-ROM, turn the computer off, then restart the computer with the Full System Recovery disk or CD-ROM already inserted. After Recovery Solution copies the temporary operating system files, you might see a Norton AntiVirus error regarding the file SYMEVNT.386. This happens because virus protection program files are not included in the temporary operating system. Press Enter to continue past this error and the Full System Recovery continues normally. After Full System Recovery is complete, you might see a Norton AntiVirus warning indicating that security resources have been tampered with. You can safely close and ignore this error. After Full System Recovery is complete, evaluation versions of Norton AntiVirus might claim that they are expired and stop working.
146
To fix the problem, you need to erase the partition table from the MBR. You can use the pclean.exe program installed with the console for this purpose. Pclean.exe is located on the Recovery Solution Server at C:\Program Files\Altiris\Recovery Solution\Console. You can also access it through the Altiris Console on the Tasks tab under Tasks > Incident Resolution > Recovery Solution > Erase Partition Table.
Note AeXCmd.exe runs manual snapshots. If additional snapshots are scheduled, they will still be performed. See also:
! !
Scheduling Snapshots with the Command-Line Interface (page 148) Command-Line Syntax (page 148)
147
Command-Line Syntax
The following usage scenarios are available using the AeXCmd command-line:
!
Partial snapshot. A partial snapshot does not include registry backup and FSR data collection. Rollbacks cannot be initiated to such snapshot.
aexcmd.exe /RunSnapshot [/AutoClose] [/Wait] [/Local] [/Folder:<path to folder>] [/File:<path to file>] [/Silent]
At least one parameter (/folder or /file) must be used, otherwise an error will be reported. You can specify one or more /folder and /file arguments. Example
148
Restore. By default, it restores the same data that was backed up during the snapshot.
Apply settings. This command can be used to reapply Recovery Agent settings on clients.
aexcmd.exe /ApplySettings
Parameters description
The command-line parameters are described below. Parameters are not case-sensitive.
/Runfullsnapshot /Runsnapshot
/rollback
Performs a rollback to latest full snapshot performed by AexCmd utility. By default, only system and application files will be restored. To restore all data, add the /AllData switch. Performs a restore of data from the latest snapshot performed by AeXCmd. Usage: /folder:<drive letter> Use the /folder:<drive letter> parameter to select a drive to restore. Example: if the previous snapshot included C: and D: drives, then using /Restore with /Folder:D: will start a restore of all data backed up from D: drive only.
/restore
/Wait
Specifies that the program should not exit until the snapshot is complete or returns an error code in the case of failure. In a batch file, this prevents any subsequent commands from running until the snapshot has finished. If this parameter is not specified, subsequent commands run while the snapshot is running.
/AutoClose
149
/Local
/NoReboot /Folder
/File /Archive
/Silent /AllData
/ApplySettings
In most cases, the /AutoClose and /Wait parameters should be used together. If the /Wait parameter is used alone, the restore or rollback process can stop, waiting for user input. When performing a full snapshot, you can limit the number of drives/volumes that are backed up by specifying them using the /folder parameter. By default, all volumes are backed up. The system and boot volumes will always be included in full snapshot.
Exit Codes
AeXCmd.exe returns exit codes that can be retrieved in a batch file by checking the ERRORLEVEL value. For more information about checking exit codes, see Windows Help.
Description
Success. Failure. The protected computer is disabled for snapshots and recoveries. Failure. Another task is already running on the protected computer. Failure. Recovery Agent must be upgraded before a snapshot can run. Invalid command line arguments. Failed to initialize MFC.
150
Description
Failed to initialize COM. Failed to initialize event chain. Failed to query mediator interface. Failed to obtain mediator state. Update is required. Error creating manual snapshot specification. Error submitting job. Job failed or was cancelled. Cannot reschedule job. Failed to query job queue interface. Failed to initiate scheduled job start. Failed to update job status. Created snapshot specification is empty. Created restore job specification is empty. Failed to obtain registered volumes list. Failed to obtain client key. Failed to obtain snapshot job data. Error creating restore specification. Failed to query DSSBS interface. Failed to query DSFileSystemView interface. Failed to submit rollback job. Failed to obtain client information. Failed to create metajob specification. Cannot read job key from registry. Rollback cannot be initiated from partial snapshot. Failed to obtain system folder. Failed to obtain client rights. Insufficient rights to perform rollback. Insufficient rights to perform restore. Insufficient rights to perform snapshot. Invalid context was selected for rollback/restore operation. Memory allocation error. Registry agent failed to restore registry. Failed to query DSFileSystem interface. The snapshot was critically retentioned.
151
The following are some examples of syntax (with possible parameters) for using RSACmd.exe utility with command-line switches. Note Command-line parameters are not case-sensitive.
Run full system snapshot rsacmd.exe /fullsnapshot Restore files RSACmd.exe /job :<path to XML file specifying items to restore> XML file format <?xml version=1.0 encoding=utf-8 ?> <Jobs> <Job type=restore> </Items <File Name=source file name Source=source folder path Dest=destination folder path/> </Items> </Job> </Jobs>
152
Chapter 8
Client Reports Client reports provide summaries of the data on the server. You can use this information to help you manage snapshots and recoveries. The following client reports are available:
" " " " " " " " " " "
Client Event History Clients with No Full Snapshot in Last N Days File Extensions Backed Up by Client File Recovery History Full System Recovery History Most Recent Recovery Solution Events Recovery Solution Clients by Version Recovery Solution Jobs in Last N Days Snapshot History Snapshot Status System Rollback History
Local Reports Local reports provide summaries of the data on the server. You can use this information to help you manage snapshots and recoveries. The following local reports are available:
" " " " " "
Computers by Agent Version Computers with Local Agent Computers with Potential Space Issues Computers without Local Agent Most Recent Recovery Solution Events Computers with Local Agent by Linux Kernel Version
Server Reports Server reports provide summaries of the data on the server. You can use this information to help you manage snapshots and recoveries. The following server reports are available:
" "
Cluster Space Usage Trend Computers with more than one Recovery Agents Settings Policy Applied
153
" " " " " " " " " " " " " !
Data Collector File Extensions Backed Up by Cluster Health Alerts Largest Files Search for a File Cluster Disk Space Currently Used Unsuccessful Jobs in Last N Days Users Users with Web Based File Recovery Access Users without Web Based File Recovery Access Clients Clients registered under default account Critical Software Bulletins
Note You can view details for a running client job. Right-click on a job in the list and select Details from the menu. No details are available for server jobs.
154
Part II
Getting Started with the Recovery Agent (page 156) Configuring the Recovery Agent (page 162) Advanced Recovery Agent Tasks (page 183)
155
Chapter 9
Manually Install the Recovery Agent (page 156) Take the Initial Snapshot (page 157) View Your Recovery Agent Options (page 157) Ensure Automatic Snapshots Are Taken Successfully (page 158) Take an Unscheduled Full System Snapshot (page 158) Take an Unscheduled Partial Snapshot (page 159) View and Restore Protected Files (page 159) Save and Restore Network Settings (page 161)
Notification Server 6.0 with SP3. Recovery Solution 6.2 SP3. One client computer running a supported Windows operating system with the Altiris Notification Server 6.0 Agent and the Recovery Agent 6.2 SP3 installed on it.
Server-based Mode In this mode, files are backed up to and restored from a Recovery Server.
156
"
Local Mode In this mode, files are backed up to and restored from your computer's hard disk. The Recovery Agent will create the Recovery Agent Partition where your snapshots will be stored. The partition is created inside the existing Windows partition.
3.
Select additional setup options: a. Select Do not prompt to reboot after Recovery Agent installation. Your computer will restart automatically. b. Select Skip the initial snapshot after the agent installation. By default, the Recovery Agent attempts to take a snapshot of the computer immediately after successful installation. If you select this option, the initial snapshot will not be started but your data will be backed up during the next scheduled snapshot or you can back them up manually.
4. 5. 6. 7.
Click Next. On the Select Installation Type page, click Create New Account to create a new account on the server. Click Next. Click Install and follow the instructions on the screen to complete the installation.
157
Note If the icon is not on the desktop, you might have moved it to your My Computer folder.
!
Option 2: Select Start > Programs > Altiris > Recovery Agent > Recovery Agent Options.
The best time for your snapshots to run is while you are not using your computer. Although you can continue using your computer while the snapshot is taken, we recommend taking snapshots when the computer is not being used because it degrades computer performance. If you use a portable computer in server-based mode, your snapshots will usually run when you connect to the network, regardless of the scheduled snapshot time.
"
Determine whether the Wake on LAN option is enabled on your computer (see Attempt to wake the client before a scheduled snapshot on page 31). If it is not, leave your computer on all the time. You can log out or use a password-protected screen saver to ensure security. Continue to use the regular backup features that come with programs (such as Microsoft Office) because Recovery Agent usually takes a snapshot of your computer once a day, so if something happens to your files just before your snapshot runs, you could still lose a whole days work.
158
2.
Click Full System Snapshot. The dialog box lists all the drives in your computer. Set or clear the check box next to any drive that you do not want to exclude or include in the snapshot. You cannot clear either the startup drive or the drive with the installed operating system. (Usually, they are both on drive C.)
3. 4.
Click OK to continue with the snapshot. In the Snapshot of Local Drive(s) dialog, click Start. The Altiris Recovery Agent Snapshot Progress dialog window appears.
159
All Versions Choose this option to display all snapshots of your files. If you are viewing all file details (View > Details), the Snapshot Taken column shows the date and time that each snapshot originally ran. Note In some cases, the time displayed in the Snapshot Taken column is the only way to distinguish the difference between two or more versions of a file. This happens if the file itself did not change between snapshots, but some properties of the file did. Example: Recovery Solution creates a new version of the file if the only change is in its NTFS security attributes.
"
Latest Version Only Choose this option to display the most recent snapshot of each file. Even files that were excluded in the most recent snapshot are displayed, as long as they were in a previous snapshot.
4.
If you have installed the Recovery Agent more than once (or if the software was automatically updated from the server), select from the following additional options:
"
Snapshots From All Installations (default) Choose this option to display protected files from all of your Recovery Agent installations.
"
Snapshots From Current Installation Choose this option to display protected files only from your current Recovery Agent installation.
"
Snapshots From Previous Installations Choose this option to display protected files only from your previous Recovery Agent installations.
Notes If you are viewing all file details (View > Details), the Snapshot Taken column shows the date and time that each snapshot originally ran. If a particular file or folder originated on an NTFS drive, and you do not have at least read access to the file or folder, then you cannot see it in the list of protected files. However, if you restore a folder containing the secure item, the item will also be restored (but you still will not have access to open it).
To restore files
You can restore any version of a file that is displayed. 1. 2. Browse the items in the snapshot. See To view protected files (page 159). Select the items to restore, and then drag the files to their destination on your local hard disk. Alternatively, you can right-click the selected items and click Restore.
160
If files or folders with the same name already exist at the destination, Recovery Solution lets you choose whether to replace them. The Restore Progress window appears, showing the status of the restore. 3. To cancel the restore, click Stop. When the restore finishes, the Stop button changes to Close. Click Close.
For information about other ways to restore files and computer settings in case of failure, see the following sections:
! ! !
Performing Rollbacks (page 39) Full System Recovery Options (page 41) Using Web-Based File Recovery (page 44)
161
Chapter 10
Function
Link
Displays status information about your See Snapshot and Restore snapshots and restores, and lets you Dialog Box on page 164. perform snapshot and restore tasks.
Snapshot Schedule Lists the schedule and settings for your See Snapshot Schedule Dialog automatic snapshots. Box on page 167. Administration (server-based mode only) General Lets you view and change preference settings. Go here to change your Recovery Agent description on the server. Lets you view log files related to your computers snapshots and restore jobs. Go here to create and remove the Altiris Recovery Partition for local snapshots. See Administration Dialog Box (server-based mode only) on page 169. See General Dialog Box on page 170.
Space Management These rules determine when old snapshots are automatically deleted. Misc Full System Recovery (local mode only) Lets you set miscellaneous snapshot and agent settings.
See Space Management Dialog Box on page 172 See Misc Dialog Box on page 173.
Lets you set Full System Recovery See Full System Recovery settings and launch the Recovery DVD Dialog Box on page 174. Wizard.
162
See Storage Locations Dialog Box (local mode only) on page 180.
2. 3.
Click one of the tabs in the dialog box to view or change settings. Make your changes and then click OK. Note After clicking OK, you should open the Options dialog box again to ensure that the Schedule tab AM/PM fields of the Start Time and End Time are correct. A known problem with the scheduling controls sometimes causes a PM time to be reset to AM.
163
Last Snapshot/Restore Status (page 164) Snapshot Options (page 164) Restore Options (page 165) Throttling Options (server-based mode only) (page 165) Performance Options (local mode only) (page 166) Snapshot Selection Wizard Dialog Box (page 166) Restore Selection Wizard Dialog Box (page 166)
Time
This box shows the date and time that your computers most recent snapshot or restore was run.
Description
This box shows a description of your computers most recent snapshot.
Status
This box indicates whether your computers most recent snapshot or restore succeeded or failed.
Snapshot Options
Snapshot options can be configured using the Misc tab. For more information, see Misc Dialog Box on page 173.
Snapshot
Click the Snapshot button to launch the Snapshot Selection Wizard that guides you through taking a snapshot. If this button is not available, then you do not have permission to perform a snapshot manually.
Accelerate
Click the Accelerate button to accelerate scheduled snapshot to be performed immediately See also: Snapshot Selection Wizard Dialog Box (page 166).
164
Restore Options
These options let you restore files from a snapshot of your computer.
Restore Files
Click the Restore Files button to restore one or more specific files, folders, or drives from the Recovery Solution Server.
Rollback
Click the Rollback button to open the Rollback dialog box and to return your entire computer to its state at the time of any previous Full System Snapshot. For more information, click Help. If this button is not available, then you do not have permission to perform a rollback. Contact your Recovery Solution administrator if you need to return your computer to a previous state. See also: Restore Selection Wizard Dialog Box (page 166).
Default Options
!
Use system defaults By selecting this check box, Recovery Solution will use the system defaults, which is unlimited bandwidth.
Limit snapshot speed to You can select the maximum network bandwidth used when taking snapshots.
Do not start snapshot if transfer rate is less than You can select the minimum network bandwidth used when taking snapshots. If this minimum bandwidth is not available, the current snapshot will be cancelled.
Do not start automatic snapshots over WAN connection Select this box to restrict snapshots from running when the client computer is on the WAN.
Limit restore speed to You can select the maximum network bandwidth used when restoring files.
165
Search
Click this button to search for specific files. Type the name of the file or folder to find. You can also search for multiple files that match a search pattern. Use standard wildcard characters, such as ? and *, to look for multiple files or folders.
Advanced Selection
Opens Windows Explorer so you can search for files yourself. You can take snapshots of files from within Windows Explorer by right clicking them and selecting Snapshot in the drop-down menu.
Search
Use this option to search for specific files. Type the name of the file or folder to find. You can also search for multiple files that match a search pattern. Use standard wildcard characters, such as ? and *, to look for multiple files or folders. Click this button to search for specific files.
Advanced Selection
Opens Windows Explorer so you can search for files yourself. You can restore files from within Windows Explorer by right clicking them and selecting Restore in the drop-down menu. For more information on rollbacks, see Rollback Dialog Box on page 39.
166
Enable Schedule Snapshots (local mode only) (page 167) Snapshot type (page 167) Start Time (page 167) Use System Defaults (page 169)
Snapshot type
Select the snapshot type you want to schedule.
Partial snapshot
Choose this option to have Recovery Solution include only the files and folders you select in the snapshot. You must specifically add files and folders to the snapshot, using the Add, Remove, and Edit buttons. Note Files and folders that are specified on the Exclude tab of the Recovery Agent Options for this computer are not included.
Start Time
Days
Select the box next to each day of the week that you want Recovery Solution to take a snapshot. The snapshot is started during the scheduled interval you choose below. Choose the time of day at which you want scheduled snapshots to start.
167
After
Choose the desired start time for scheduled snapshots. This is the earliest time at which the snapshot can occur on each scheduled day. Recovery Solution attempts to start the snapshot at this time. If the snapshot cannot be started at this time because the computer was turned off or off-line, Recovery Solution will keep trying until the latest start time you specify in the next field.
Before
Choose the latest time at which you want to allow scheduled snapshots. On each day, a snapshot is scheduled, Recovery Solution keeps attempting to start the snapshot until either it succeeds or the time you specify here is reached. If this time is reached and Recovery Solution has been unable to start the snapshot, no scheduled snapshot occurs on this day.
Conditions
The following settings control when a snapshot will occur. As soon as user turns on the computer: Select this box to have Recovery Solution start a days scheduled snapshot as soon as your computer is turned on. In server-based mode, it is not necessary to log onto the computer to take the snapshot, but your computer must already have a physical connection to the network. This option is generally useful for desktop computers connected to a LAN. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the previous days snapshot has not yet been reached. No snapshot is started if the scheduled snapshot time has passed, even if no snapshot took place during the scheduled period. Only one scheduled snapshot is taken each day, no matter how many times the computer is turned on. Note The snapshot will not start immediatelly after logon. It starts after a 12-minute timeout in local mode or after a 10-minute timeout in network mode. As soon as user resumes the computer: Select this box to have Recovery Solution start a days scheduled snapshot as soon as your computer is resumed after you have suspended it. This option is generally useful for notebook computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the previous days snapshot has not yet been reached. No snapshot is started if the scheduled snapshot time has passed, even if no snapshot took place during the scheduled time period. Only one scheduled snapshot is taken each day, no matter how many times the computer is suspended and resumed. Note The snapshot will not start immediatelly after logon. It starts after a 8-minute timeout in local mode or after a 6-minute timeout in network mode. As soon as user docks the computer: Select this box to have Recovery Solution start a days scheduled snapshot as soon as your computer is docked on the network. This option is generally useful for laptop computers. A snapshot is started only if there is one scheduled to take place at the same time or later on the same day, or if the end time for the previous days snapshot has not yet been reached. No snapshot is started if the scheduled snapshot time has passed, even if no snapshot took place during the scheduled time period. Only one scheduled snapshot is taken each day, no matter how many times the computer is docked.
168
Note The snapshot will not start immediatelly after logon. It starts after a 7-minute timeout in local mode or after a 5-minute timeout in network mode. As soon as computer goes into idle state: Select this box to have Recovery Solution start a days scheduled snapshot as soon as your computer goes idle. Note The snapshot will not start immediatelly after logon. It starts after a 6-minute timeout in local mode or after a 4-minute timeout in network mode.
Server name
This area displays the name of the Recovery Server that stores the snapshots of your computer. You cannot change this name here. To use a different server, you must uninstall and reinstall the Recovery Agent.
169
User Interface Language Preferences (page 170) Recovery Solution Logs (page 170) Altiris Recovery Partition for local snapshots (local mode only) (page 170) Connection Settings (server-based mode only) (page 171) Use System Defaults (page 172)
Event Log
Click this button to open the Event Viewer so you can view all logged Recovery Solution events. This information is provided in the event viewer.
Create
If no Altiris Recovery Partition exists, click this button to create a partition that local snapshots can be stored on. This enables the functionality of local snapshots.
170
To add additional storage resources, see Storage Locations Dialog Box (local mode only) on page 180.
Resize
If an Altiris Recovery Partition exists, click this button to delete the existing partition and create a new one. Caution If you have snapshots on this partition, all your local snapshots will be lost.
Data Removal
Click this button to launch the Recovery Solution Data Removal wizard to remove all user data from the Altiris Recovery Partition. This disables the functionality of local snapshots. Caution If you have snapshots on this partition, all your local snapshots will be lost.
Check Now
You can have Recovery Solution do a self-check of the Altiris Recovery Partition. This procedure requires the computer to be restarted.
Port
You can see the port number to be used for communication with Recovery Server.
Validation on the source of the data. Recovery Solution does a second check to ensure that files in your snapshot are really coming from your computer rather than from some other source, and that files you restore are really coming from the server. Data integrity checking. Recovery Solution verifies that the data are intact and free of errors, reducing the chances of data corruption. Data encryption. Encryption is especially useful if you are concerned about transmitting confidential data through connections that may not be secure, such as Dial-Up Networking (RAS) or the Internet. Snapshots, restores, and file information are encrypted during transmission only. The data stored on your computer and on the server are not encrypted.
171
Note On Windows 98 computers, only data that is transmitted to the server is encrypted, not data that comes from the server (Example: snapshots are encrypted, but recoveries are not). This is because of a limitation of Windows 98, which cannot receive encrypted DCOM data. Because of government regulations in France, no data encryption is performed if you are running Recovery Solution on a French version of Windows. However, this option still enables source validation and data integrity checking.
Default Rules (page 172) Exception Rules (page 173) Use System Defaults (page 173)
Default Rules
This area specifies the default space management rules that you want to apply to all files on your computer. You can make exceptions to these rules in the Exception Rules area below.
Delete files after they have been deleted from your computer
Specify the length of time for which the snapshot of the item should stay after the original copy has been deleted from your computer. If the original item is not deleted, then the snapshot copy will not be deleted either.
172
Exception Rules
This area specifies exceptions to the default rules that are configured above. You can make exceptions for any number of folders or files. The exceptions always override the default rules, regardless of whether the length of time you specify is longer or shorter than the default.
173
174
Snapshot type (page 167) Start Time (page 167) Use System Defaults (page 177)
Snapshot Type
Full System Snapshot
A snapshot of a computer that contains enough information to restore the computer in the event of a disaster. A Full System Recovery can only be performed from a Full System Snapshot. In addition to whatever files you select, a Full System Snapshot always contains the information about the computers disk partitions and drives and the
175
Windows registry. You can also include any additional data from local drives. A Full System Snapshot does not have to contain all of the computers files and folders.
Partial snapshot
Click this option to have Recovery Solution take a snapshot of only the drives you select. You can choose to include or exclude any local hard drive on your computer, whether or not it has system information on it. Note Files and folders that are specified on the Exclude tab of the Recovery Solution properties for this computer are not included in the snapshot.
Snapshot Settings
Take each days snapshot as soon as I start remote access
Select this box to have Recovery Solution take a days scheduled snapshot as soon as a remote connection is made to the network. This is the best way to guarantee that your data is protected. Even while connected to the network, portable and remote computers are often difficult for the server to reach because they frequently are not configured to use Domain Name System (DNS) names.
176
When you add or edit the excluded items, the following options are available:
! !
Files and Folders to Exclude Dialog Box (page 177) Exception from Exclude List (page 179)
177
! !
Choose the Type of Item to Exclude (page 178) Choose Where to Exclude This Folder or File (page 178)
Browse
Click the browse button to browse to the folder or the file you want to add to the list. This button is only available if you choose Exclude only this path under Choose where to exclude this folder or file. Otherwise, the Browse button is dimmed. The dialog box that appears when you choose Browse depends on the option you selected under Choose the type of item to exclude. If you specified that this is a folder, you will be able to browse for a folder here. If you specified that this is a file, then you can browse for a file.
This is a folder
Click this option to specify that the name you entered above is a folder rather than a file.
This is a file
Click this option to specify that the name you entered above is a file rather than a folder.
178
All drives
Choose this option to exclude the above path from every drive during Recovery Solution snapshots.
Folder or File Name (page 179) Choose the Type of Item to Include (page 179) Choose Where to Include This Folder or File (page 179)
Browse
Click the browse button to browse to the folder or the file you want to add to the list. This button is only available if you choose Include only this path under Choose where to include this folder or file. Otherwise, the Browse button is dimmed. The dialog box that appears when you choose Browse depends on the option you selected under Choose the type of item to include. If you specified that this is a folder, you will be able to browse for a folder here. If you specified that this is a file, then you can browse for a file.
This is a folder
Click this option to specify that the name you entered above is a folder rather than a file.
This is a file
Click this option to specify that the name you entered above is a file rather than a folder.
179
All drives
Choose this option to include the above path from every drive during Recovery Solution snapshots.
Location for stored data on the Recovery Agent (page 181) Adding Additional Storage Locations (page 181) Managing Additional Storage Locations (page 181) Managing the Temporary Retention Folder (page 182)
180
It cannot exist on a system hard disk drive (HDD0) It cannot be removable media, it must be a fixed hard drive It cannot be a network resource, it must be a local hard drive
181
Recovery Partition here. Instead, you must use the General Tab. For more information, see General Dialog Box on page 170. Click Edit to modify the properties of an additional storage location. Click Delete to remove an additional storage location. Note If data is on the location, you cannot delete it. Click Disable to prevent Recovery Solution from storing snapshots to that storage location.
182
Chapter 11
Excluding Files from Snapshots (page 183) Performing Rollbacks (page 187) Full System Recovery Options (page 189) Using Web-Based File Recovery (page 192)
Why Exclude Files? (page 183) Files and Folders You Should Never Exclude (page 183) Examples of Files and Folders to Exclude (page 184)
Snapshots and some restore operations are performed more quickly. Snapshots take up less space. Folder snapshots contain only the files you really need, making it easier to locate important data when you need to restore it.
183
*.INI
These are configuration settings.
*.DOS, *.W40
On multi-boot computers, these files store information necessary to start the computer in other operating systems.
_RESTORE
Folders with this name might be created in Windows XP if you perform a System Restore using the Windows System Restore tool. The folders contain information about past System Restores so that they can be undone. Recovery Solution provides similar but more flexible functionality with the rollback feature.
PAGEFILE.SYS
This file is used to create virtual memory while Windows is running. It is usually stored in the root folder of drive C. Depending upon the computers configuration, the file can become quite large, although it does not contain any data that is saved between one Windows session and the next.
WIN386.SWP
Like pagefile.sys, the file win386.swp is used in Windows 98 to create virtual memory, and can become quite large. The temporary file that Windows deletes whenever the computer is shut down or restarted is win386.swp. It is usually stored in the Windows folder.
386SPART.PAR
This is the Windows 3.1 equivalent of win386.swp. If you upgraded from Windows 3.1 to your current version of Windows, 386spart.par might still exist on your computer, even though it is no longer needed.
184
Hibernation files
Some computers and operating systems support hibernation that lets you turn off your computer without losing any data in memory. This is accomplished by writing the data in memory to special hibernation files, which can become quite large. Protecting these files could significantly slow down your snapshots, increase the strain on the network and the server, and in some cases prevent recoveries from working properly. You should always save your work before putting your computer into hibernation. As long as you do, the only contents of the hibernation files will be nonessential information such as the current running applications, window positions, and view settings. Listed below are some of the hibernation files used by various systems.
! ! ! ! !
hiberfil.sys is used by Windows XP and Windows 2000. hibrn8.dat is used on Compaq notebooks. pm_hiber.bin is used on IBM notebooks. save2dsk.bin is used on IBM notebooks. toshiber.dat is used on Toshiba computers.
C:\TEMP
Some computers use this folder as a storage place for temporary files.
C:\WINDOWS\TEMP or C:\WINNT\TEMP
This folder stores temporary files. Substitute your own Windows folder in this path if Windows was not installed in the default folder.
*.TMP
Files with this extension are usually temporary files.
~*.*
Files that begin with a tilde (~) are usually temporary files.
185
If Microsoft Internet Explorer is your Web browser, your browser cache file is usually the TEMPORARY INTERNET FILES subfolder of your Windows folder. If the Web browser is Netscape Navigator, the browser cache is usually located somewhere within the Netscape Navigator folder.
*\MSDOWNLD.TMP
Folders by this name are created and used by Microsoft Web sites when you download and install software from those sites. These folders are usually created in the root of a hard drive, and they might exist on multiple hard drives. They are not needed after the software installation is complete.
Internet history
If you use Microsoft Internet Explorer as your Web browser, the HISTORY subfolder of the Windows folder contains information about Web sites that you have visited, allowing you to easily return to those sites later. If you do not need this information, you can exclude it from your Recovery Solution snapshots.
*.BAK
Files with this extension are typically backup files that applications create automatically while the main data files are being edited. A *.BAK file can sometimes be used to restore the data in case the main file becomes corrupted, but because copies of the main data file are also being stored on the server, there should rarely be a need to include *.BAK files in snapshots.
186
Performing Rollbacks
This section describes how to roll back computers to a previous state. Rollback is used to repair your operating system and applications when your computer is not functioning properly. If you can start your operating system and open the Recovery Agent Options dialog, you can use the Rollback feature. To roll back the computer from Windows, open Recovery Agent Options (see View Your Recovery Agent Options on page 15). On the Snapshot and Restore tab, click Rollback (see Rollback Dialog Box on page 187). Note You can replace all the files on your computer with the files in your Full System Snapshot. This will replace all the files on your computer with the files that were copied during your initial snapshot. You can then use the Recovery Agent to restore files from a more current snapshot.
187
If you were previously running Microsoft Office 97 but upgraded to Microsoft Office 2000, you should try to avoid rolling back your computer to a point in time when you had Office 97 installed. This might cause some Office files to be restored incorrectly. If you must do this, you might need to reinstall Office after the rollback is complete. If you are running Windows 2000 with Service Pack 2, and you are to roll your computer back to a previous operating system, a Windows File Protection message might appear during the rollback. You can either cancel the prompt to restore Service Pack 2 files (choosing to keep the existing files), or simply ignore the prompt altogether. Do not restore the files. If you do, your computer will be in an indeterminate state and could stop working properly. Performing a rollback could cause some evaluation software to claim that it has expired, preventing you from continuing to use the software. If your computers drive configuration has changed since the time of the snapshot to which you are rolling back, then the rollback restores your old drive configuration, but it is possible that one or more of your drives contains no data after the rollback is complete. To restore the data, perform a second rollback to the same snapshot you chose for the first rollback. After the rollback is complete, you might have to re-create temporary folders manually. These are usually not included in snapshots and are therefore not restored to your computer. Certain applications might require the existence of temporary folders before they will work properly. In versions of Windows that include the System Restore feature, Recovery Solution creates a restore point before starting the rollback. Before rolling back your computer, Recovery Solution automatically takes a snapshot of your computer to ensure that your most recent files are protected. After the rollback, you can restore any files you need that were overwritten by the rollback. Snapshot list: Choose a snapshot to return to. Only Full System Snapshots are listed. Notes (server-based mode) If any date and time settings are different between your computer and the server, some older snapshots might not be available for rollback. To see all available snapshots, the following settings must be identical on your computer and the server: the date and time, the time zone, the state of the option to automatically adjust the clock for Daylight Savings Time (whether this option is on or off). The snapshots performed before an upgrade will not appear in the list. Items to restore: Choose which files you want to restore to your computer. Restore system and application files only: Choose this option to restore just operating system and application files. This type of rollback will not restore data files, which are determined by file name extension. If you are not sure whether any file you wish to restore is an application or data file, check Restore all files. Note You can specify which file types are considered to be user data files or documents and will not be rolled back or deleted on the Rollback Data tab (if your administrator allowed this through the Altiris Console). For details, see Rollback Data Dialog Box on page 37.
188
Restore all files (including your data files): Choose this option to restore data files as well as program files. All of your applications and settings will be returned to their previous state, and all of your data will be restored. Caution This option overwrites data files as well as program files. Some of your files might be overwritten with older versions. Roll back master boot record: (server-based mode only) Choose this option if you want to restore the computer's master boot record and the boot sectors of all primary partitions. The master boot record is necessary to start Windows. It contains information about the computer's disk partitions and passes this information along to other programs in order to start the computer. The partition tables themselves are not rolled back by Recovery Solution, but the program that reads the partition information is. You might want to roll it back if you suspect that it has become damaged or infected by a virus. Caution If the file system of a drive has been changed since the snapshot selected for rollback (Example: from FAT to NTFS), then the drive's boot sector is not restored during rollback. This could cause the drive from starting after the rollback is complete. Enable Rollback file deletion: Choose this option if you want to delete computer files that are not present in the snapshot you are rolling back to. Which files are deleted depends on what you choose to roll back. If you roll back only system and application files, then only system and application files that are not present in the snapshot are deleted. If you do not choose this option, no files are deleted during the rollback. Note After the rollback is complete, a text file named DELETION.LOG, stored in the computer's installation folder for Recovery Agent, contains information about which files were deleted. Continue: Click this button to continue with the rollback. See also: Rollback Error Dialog Box (page 189).
189
In the case where the operating system can start, a rollback is preferable because it requires less time. Note In server-based mode, you can use the server-based Full System Recovery Wizard to create the full system recovery CD/DVD-ROMs. This section contains the following topics:
! !
Local Full System Recovery from DVD-ROM (page 190) Using the F11 Option in Local Mode (page 192)
190
You can create a new full system snapshot or use an existing snapshot for Full System Recovery DVD creation. Creating a new snapshot ensures that the Full System Recovery DVD set contains all the latest data. Snapshots performed before an upgrade and some snapshots affected by the Storage Space Management job will not appear in the list of existing snapshots. You can password-protect your Full System Recovery DVD set. In this case, you will be prompted for a password on any attempt to start Full System Recovery or to restore data manually. The target folder for Full System Recovery images can be your local hard disk drive or, if there is not enough space, a network storage location. If there is not enough space, you can create the Full System Recovery images one by one burning each image as soon as it has been created and deleting it after burning. We recommend verifying the Full System Recovery images after burning. For that, use your DVD burning software feature or manually copy all data from DVD disks to a hard drive. Warning Protect your Full System Recovery media. If the Full System Recovery media becomes corrupted, the Full System Recovery process will fail and all data may be lost.
The Full System Recovery process must be started using the first created DVD disk in the Full System Recovery DVD set. After starting the computer from the Full System Recovery DVD, initiate the Full System Recovery on prompt by pressing F10 on the keyboard. If the Full System Recovery DVD set was password-protected, you will be prompted for a password. During the first phase, all fixed local hard disk drives will be reformatted and the original disk configuration will be restored. Then, the minimal set of Windows files will be copied and the restore process will continue. This phase may take up to 30 minutes. After a restart, all FAT32 partitions will be converted to NTFS if needed. Each FAT32to-NTFS conversion requires an additional computer restart. The computer will be restarted to Windows and all remaining user data will be restored. If the Full System Recovery DVD set contains more than one DVD disk, you will be prompted to insert the disks one by one, otherwise the whole Full System Recovery process can run unattended.
All fixed local hard disk drives are reformatted during the Full System Recovery process. The number and the size of hard disk drives must be the same as or larger than the number and the size of disks present at the moment of the full system snapshot selected for Full System Recovery. Full System Recovery DVD creation cannot be scheduled - you must launch it manually.
191
The Full System Recovery from DVD can be performed even in case of a stolen notebook or a totally destructed hardware. For that to occur, you must replace the computer with the same model and start it from the Full System Recovery DVD.
If the new drive is smaller than the original one, there may not be enough space for all of the data.
To recover files
1. Use Microsoft Internet Explorer 5.0 (or later) or Mozilla Firefox 2.0 to access http:// server/wbfr where server is the name or address of the Recovery Server. Notes If the server name contains the _ sign, you must use the server IP address (http:/ /IP address/wbfr) to access the Web Based File Recovery page. Recovery Solution administrator can change the address of the Web-Based File Recovery web site. 2. Enter valid Recovery user credentials when prompted.
192
3. 4.
Click the computer name in the list of protected computers. Select the files and follow the instructions on the screen to restore.
Notes For the Web-Based File Recovery feature to become available, Microsoft Internet Information Server (IIS) must be installed and running on the Recovery Server computer during server setup. If IIS was not installed on the server, or if Web-based file recovery was not automatically configured for any other reason, then it can be configured manually. The Recovery Solution administrator can disable the Web-based File Recovery access for users. Before accessing the Web-Based File Recovery page, you must ensure that the latest version of Microsoft Java Virtual Machine or Sun Java Runtime Environment is installed (downloadable at http://java.com/en/download/). Caution If a user runs Web-based file recovery from a computer that is accessible to other users, then when Web-based file recovery is complete, all browser windows should be closed in order to clear cached password information from the browser. If any browser windows remain open, then it may be possible for someone else to browse to the server without entering any credentials, and access the original users data.
Note If you are running Windows 98, Recovery Solution writes events to the Recovery Solution event log instead. For more information, see Using Recovery Solution Event Viewer on page 193. If you are in Windows 98, click Application from the Log menu to display the Application event log. , or Delete Event Log in the Windows 98 Recovery Solution Event Viewer, and on Windows 98 computers the file will be removed from your computer
193
Note If you are running Windows 2000/XP, Recovery Solution writes events to the Windows Application Event Log.
As a Recovery Solution event log file, readable in the Event Viewer. As a comma-delimited ASCII file formatted for importing into a database or a spreadsheet, readable in a text editor.
Saving the event log file under another name does not affect the current event log. If you want to start a new event log, you can rename the event log file. Recovery Solution automatically creates a new file with the default name when it needs to write another event. Note To save the log file with an extension other than .EVT or .TXT, choose the file type from the list, and then type the file name in quotation marks.
194
Delete Event Log is also on the Event Viewer toolbar. KEYBOARD: Del
View Menu
View Menu Toolbar
Shows or hides the Event Viewer toolbar. The toolbar contains buttons for common Event Viewer commands. Open: Opens an event log file. Save As: Saves the current event log to a new file. Print: Prints the current event log. Find: Searches for specific events. Filter Events: Limits what events are displayed in the Event Viewer window. Delete Log: Removes the current Recovery Solution event log from your computer. Event Details: Displays more detailed information about the selected event.
A brief help message: This area of the status bar displays brief help messages about commands as you work in the Event Viewer window. Example: if you rest the
195
mouse pointer on a toolbar icon or a menu command, you will see a description of that command in the status bar.
!
The total number of events the log currently contains: This area of the status bar displays the total number of events that the currently open event log contains. The total size of the event log file: This area of the status bar displays the total size (in KB) of the currently open event log file.
Find
Searches for specific events in the currently open event log. You can search on any combination of the event log fields. After finding an event, you can search for the next event that matches the same criteria by using the Find Next command. Find is also on the Event Viewer toolbar. KEYBOARD: Ctrl+F
Find Next
Searches for the next event that meets the criteria of your last search. KEYBOARD: F3
Event Details
Displays detailed information about the selected event. All information is read-only. Event Details is also on the Event Viewer toolbar. KEYBOARD: Enter You can also open the Details dialog box by double-clicking an event date in the list.
Refresh
Updates the information in the Event Viewer window. If events occur while the event log is open, you will need to click Refresh to force the Event Viewer to update the information. KEYBOARD: F5
196
Type
" " " " "
! ! ! ! !
Filter
To open this dialog box, click Filter in the Event Viewers View menu. Use this dialog box to limit the events displayed in the Event Viewer window. You can specify any combination of criteria listed below.
!
Type
" " " " "
! ! !
197
Source: The part of the program that caused the event. User: The username of the person who was logged on to the computer when the event occurred. Computer: The name of the computer on which the event occurred. Description: Detailed information about the event. System Error: An error message generated by the operating system that is associated with the event you are viewing. This field only appears if there is a system error associated with the event. It appears below the Description field. Close: Click this button to close the dialog box. Previous: Displays the details of the previous event in the list. (In the default sort order, this is the next chronological event.) This button shows the previous visible event. If events are filtered, you will not see the ones that are not being displayed. Next: Displays the details of the next event in the list. (In the default sort order, this is the previous chronological event.) This button shows the next visible event. If events are filtered, you will not see the ones that are not being displayed.
You just installed the Recovery Agent and no events have yet been logged. You recently renamed or deleted the event log.
The log file will be re-created the next time an event occurs.
198
Take each days snapshot as soon as user turns on the computer Take each days snapshot as soon as user resumes the computer Take each days snapshot as soon as user docks the computer
199
Part III
Recovery Solution Troubleshooting (page 201) Recovery Agent Troubleshooting (page 227) Technical Reference (page 253) Hard Disk Support (page 297)
200
Chapter 12
Troubleshooting Resources (page 201) Installation Troubleshooting (page 206) User Account & Logon Problems (page 211) Data Protection & Recovery Troubleshooting (page 213)
Troubleshooting Resources
This section describes other resources you can use when troubleshooting problems with Recovery Solution.
! ! !
Event Logs (page 201) Using the Windows 98 Event Viewer (page 202) File Version Details (page 205)
Event Logs
An event is an important occurrence that is caused by Recovery Solution or affects Recovery Solution in some way. Examples include security data and error messages. Different Recovery Solution components report information in several log files.
!
Recovery Solution Setup, Recovery Solution Cluster Creation Wizard and Altiris Console report events into the Notification Server log that you can view at http:// <server name>/Altiris/NS/LogView.asp. Recovery Solution Agent Setup logs events into the agent installation log (AexCRAS.log) found on client computer. Recovery Server Setup logs events into the server installation log (AexCRSS.log) found on the server computer in %ProgramFiles%\Altiris\Recovery Solution\Server folder by default.
Both Recovery Solution and Recovery Agent write events to an event log. In Windows 2000/XP, events are written to the Windows Application event log. System events might also affect or be affected by Recovery Solution. In Windows 9x/Me, events are written to an event log file maintained by Recovery Solution. Viewing the appropriate event logs is a good way to help troubleshoot Recovery Solution. You should make a note of the
201
information that gets logged when problems occur. This information can greatly assist systems engineers and any other technical support staff you might contact for help.
For details about an event, double-click it in the list, or highlight it and press ENTER. Note If an event reported by Recovery Solution is associated with a system event reported by Windows or an operating system component, then the System Event Code of the Windows event is reported along with the other event information. System events are documented by Microsoft. The system events associated with Recovery Solution are frequently reported by the following Windows components. The typical system event codes listed below are meant only as a guide; it is possible that these components could report other codes and that these codes could be reported by other components.
Windows Components
DCOM Windows RPC
Event Details (page 203) Finding Specific Events (page 203) Saving Events to Other Files (page 204) Clearing the Event Log (page 204) Automatically Overwriting Events (page 204)
202
Event Details
Some information about each event is displayed in the main Event Viewer window. For complete details on an event, select it in the list, then from the View menu, click Event Details. The following information is associated with each event.
!
Type The category into which this event falls. The following are the event types.
"
"
Warning A potential problem that might prevent the program from performing as expected.
"
Source This is the part of the program that caused the event.
User This is the user name of the person who was logged on to the computer when the event occurred.
Computer This is the name of the computer on which the event occurred.
System Error If an error message generated by the operating system is associated with this event, the system message is displayed here, below the main description. Otherwise, this field does not appear.
On the View menu, click Filter Events to limit the events displayed in the Event Viewer window. You can filter events based on any combination of the event log fields. Leave a field blank if you do not want to filter on it. On the View menu, click Find to search for specific events. You can search on any combination of the event log fields. Leave a field blank if you do not want to search on it.
203
After finding an event, you can search for the next event that matches the same criteria by using the Find Next command.
204
4. 5. 6. 7.
If you do not see an Overwrite Mode value in the right-hand pane, then click the Edit menu, click New and then click DWORD Value. Type Overwrite Mode. Select the Overwrite Mode value. From the Edit menu, click Modify. Under Value data, specify one of the following.
"
0 This tells the Event Viewer to overwrite events as needed. The log size will not exceed the maximum size specified by the Maximum Log Size registry value (default 128 KB).
"
1 This tells the Event Viewer to overwrite events that are older than the number of days specified in the Overwrite Days registry value.
"
2 This tells the Event Viewer to never overwrite log events. Caution If you specify this option, there is no limit to the size of the event log file. The file could eventually grow to fill all of the remaining space on the drive. If you want to keep all old events, you should periodically archive the event log file and delete it from the local drive.
8. 9.
Click OK. Repeat the above procedure to create or edit the following values as appropriate. Note While editing values, be sure you specify Decimal for the Base option, unless you truly intend to enter the numbers using hexadecimal notation.
"
If you chose to overwrite log events as needed and you want to change the maximum size for the log file, repeat the above procedure to create or edit the value named Maximum Log Size, and specify the maximum number of kilobytes (KB) you want the file to consume.
10. If you chose to have overwrite log events after a specified number of days, repeat the above procedure to create or edit the value named Overwrite Days, and specify the maximum number of days for which you want Recovery Solution to store events in the log.
205
Installation Troubleshooting
Use the information in this section to solve problems you might encounter while installing or getting started with Recovery Solution.
! !
Server Installation Troubleshooting (page 206) Troubleshooting User Installations (page 208)
After installation, W3SVC warnings appear in System event log (page 206) If Recovery Server uninstall encounters an error, uninstall rollback may fail (page 207) Altiris Recovery Server service error message after completing a Recovery Solution Server upgrade (page 207) Recovery Server upgrade hangs with Upgrade in progress status forever (page 207) Recovery Solution tasks are non-fuctional after aggregation of legacy servers (page 208) Altiris Recovery Solution Server cannot be installed because 8.3 file names creation is disabled (page 208)
206
C:\Program Files\Altiris\Notification Server\Client Recovery Server\Agent\AgentWeb and the shared Web folder for Web-based file recovery is: C:\Program Files\Altiris\Notification Server\Client Recovery Server\WBFR.
Try uninstalling Altiris Recovery Solution Server via Control Panel > Add/ Remove Programs on the Recovery Server machine. Initiate Recovery Server Install on the same machine from Altiris Console and try uninstalling later again.
"
Altiris Recovery Server service error message after completing a Recovery Solution Server upgrade
After the setup program for Recovery Solution Server is complete, you see the following error message in the server event log: Service 'Altiris Recovery Solution Server' (Altiris Recovery Solution Server) could not be installed. Verify that you have sufficient privileges to install system services. You should check the AeXCRSS.log file created by the server installation for the following message: Setup has detected that version of selected Altiris Recovery Solution Cluster is older than version of this Recovery Solution Server installation package. Note For instructions on locating the log file, see After Server Installation Is Complete on page 41. The error may occur, if the Microsoft Services MMC snap-in widow was open on the server during upgrade. This causes upgrade to fail when replacing the Recovery Solution Server service components. If this occurs, close the Services window and other running applications on the server and retry running the Recovery Solution Server Install.
207
Altiris Recovery Solution Server cannot be installed because 8.3 file names creation is disabled
8.3 file names creation must be enabled on a computer before installing the Recovery Solution server, otherwise the error "Altiris Recovery Server cannot be installed because 8.3 file names creation is disabled" will appear during installation. The '8.3 file names creation' can be enabled the following way:
Altiris Local Recovery Agent Registration fails (page 208) Error message appears during Recovery Agent Setup (page 208) User account not validated (page 209) Setup does not run properly (page 210) Applications will not start after agent install (page 211)
208
The server might be running an earlier version of Microsoft Internet Explorer. Internet Explorer 5.0 or later is required. The user might be running an earlier version of Microsoft Internet Explorer. Internet Explorer 5.0 or later is required. If Microsoft SQL Server on the server is running under the SYSTEM account or another account that is not part of the AeXRS_Users group on the server, this user must be added to AeXRS_Users before the Web installation can be accessed. An administrator can make this change using Web Console. "Page not found" error appears in browser when user tries to access Altiris Recovery Agent Setup Wizard or Web Based File Recovery page on Windows 2003 Server. To resolve this problem, change the status of Active Server Pages to Allowed in the Web Service Extension list in IIS 6.0. For more information about, visit the Microsoft Support Web Site.
Cannot read the Windows registry error This could happen if the Windows computer name of the server does not match the Domain Name System (DNS) host name in its TCP/IP properties. One of these names should be changed to match the other.
If the server is using Windows domain security, and the domain structure has been changed in such a way that a users original installation account or the domain containing it has been moved or renamed, then reinstallation requires one of the following.
"
For users reinstalling through the Web-based Setup wizard, an account with the users original username and password must exist in the domain containing the server, or in a trusted domain.
Under certain situations, a user might see a message saying that the installation cannot be performed because there is more than one protected computer with that user name. This could happen if the server is using Windows domain security and different accounts were reinstalled to the same computer. To resolve the conflict, an administrator must locate the users conflicting accounts within the console. This might be easiest to do using the Protected Users list. The administrator must then do one of the following.
" "
Rename the computer that is not being used for the reinstallation. Delete the account that is not being used for the reinstallation. This can be done by selecting the protected computer, then from the Action menu or the context menu, choosing Mark For Delete, then Computer Account. The account is deleted during the next deletion or server space management job. For instructions on scheduling these jobs, see Configuring Server Job Schedules on page 98.
209
Caution Deleting an account also deletes all protected data associated with that account. User with expired password is prompted to change it during Web installation, but then installation stops This appears to be an issue with the way Internet Explorer handles account authentication. If a users password has expired, it should be changed through Windows before installing Recovery Agent.
Check the available disk space on the users computer. There should be free space equal to at least 3 times the size of the installation files to allow for the creation of temporary files during the browser download and the installation. If there is not even enough disk space to download the file, browser limitations might prevent the problem from being reported, but the installation will fail to run.
If the user is running Windows 2000/XP, see the server detection problem description.
During SMS deployment, Setup runs twice This could happen during installation on a Windows 9x computer, if operating system components such as DCOM or Dial-Up Network need to be updated. To fix the problem, the person configuring SMS can do one of the following.
!
Create separate deployment packages for each operating system component, and deploy them before deploying Recovery Agent. This is the recommended fix, since deploying all components in the same package could potentially result in an incorrect installation status being reported to the SMS server. Make a change to the SMS program properties for the distribution package. On the General tab, for the After running option, click Program restarts the computer.
The automatic upgrade fails. The following are potential causes of this problem.
!
If the user who is logged on at the time the upgrade starts is not an authorized user of Recovery Solution, the upgrade might fail. To fix the problem, the user can be added to the user group for Recovery Solution (AeXRS_Users by default), or someone else can log onto the protected computer as a valid user of Recovery Solution, and let the upgrade run again. You can cause the upgrade to start by simply browsing the computers protected files. The Setup files for the upgrade are downloaded to the TEMP subfolder of the installed program files folder for Recovery Agent (C:\Program Files\Altiris\Recovery Solution Agent). If there is not enough disk space on this drive, the upgrade could fail. If Windows System Restore is used to return a protected computer to a point at which a previous version of Recovery Agent was installed, the automatic upgrade does not re-upgrade Recovery Solution to the current version. In this case, a reinstallation of Recovery Agent must be performed, using the computers existing account.
210
If the automatic upgrade of a Windows 2000/XP protected computer is interrupted (Example: if the computer is restarted during the upgrade), the software is unable to repair itself. If this happens, the user should reinstall Recovery Agent using the computers existing account. If you are upgrading from Recovery Solution version 2.2 or earlier, and the protected computers IP address has changed since its most recent contact with the server, then the server cannot contact the protected computer to start the upgrade. This is most likely to happen if the protected computer is configured to use a dynamic IP address. To correct the problem, an administrator can go to the server and run the RefreshClientsIP.exe file from the installed program files folder. This updates the IP addresses of all protected computers in the database. If you the upgrade is being done gradually (a few computers at a time), the program can be run as many times as needed until all protected computers have been upgraded. Before running it, the administrator must make sure that (1) the server specifies the correct settings for your DNS server in its TCP/IP properties (if applicable), and (2) each protected computers DNS host name matches its Windows computer name. Alternatively, a user at a protected computer can start a snapshot manually, which will cause the protected computer to send its updated information to the server.
After reinstallation from command line, Recovery Agent does not work This can occur if the server is running in Windows domain security mode, and no domain was specified as part of the installation command. In this case, it is impossible to configure Recovery Agent options or initiate a snapshot after reinstallation. To solve this problem, you can do either of the following:
!
Run the installation command again as described in Recovery Agent Setup Command Line, being sure to specify the domain parameter. Reinstall Recovery Agent using the Web-based Setup wizard.
Protected Computers Cannot Connect to Server (page 211) User Logon Issues (page 212) Protected users cannot be authenticated (page 213)
If the address of the cluster is changed, you must change the cluster address on the general tab of the Recovery Solution cluster configuration page (Configuration > Solution Settings > Incident Management > Recovery Solution > Recovery Solution Clusters > Recovery Solution Cluster Configuration).
211
If the protected computer connects to the server via a Dial-Up or Virtual Private Networking (VPN) connection, and any of these remote networking settings have recently changed on the computer, it might have affected the ability of the computer to communicate with the server. You can use Recovery Solution to return the settings to a previous state.
Each time a protected computer starts, Recovery Solution saves the computers Dial-Up Networking settings in a snapshot that is stored locally on the protected computer. These settings can be restored without making a connection to the server. To access snapshots of network settings, the user clicks Network Settings Snapshots from the context menu of the desktop or system tray icon for Recovery Solution. This opens a window from which snapshots can be managed. Before restoring settings, it is a good idea to first save the current settings so that they can also be restored if necessary. Then any previously saved settings can be restored.
!
The DCOM configuration of either the server or the protected computer might not be correct. For information about checking the DCOM configuration settings, see DCOM Configuration on page 266. If there is a firewall between a protected computer and the server, it must be configured to let DCOM traffic through. For documentation about DCOM and how it works with firewalls, visit the Microsoft Web site (http://www.microsoft.com).
Manual snapshots cannot be run. The user is prompted for logon information, but the credentials are never accepted. The user cannot browse protected files.
" "
The main folder in Windows Explorer cannot be expanded. Trying to open the protected files folder in its own window causes Windows to display an Action canceled Internet Explorer page.
When trying to view options for Recovery Solution, the user sees a message saying that the schedule settings cannot be displayed.
If a user encounters these problems, check the System event log on the server to see if the account is being locked out. If it is, you can change the users account so that it is not disabled and then have the user restart the protected computer. To prevent this problem in the future, you might consider changing the account policy to allow more bad logon attempts and/or to reduce the reset time.
212
Snapshot & File Restore Troubleshooting (page 213) Full System Recovery Troubleshooting (page 216) Rollback Troubleshooting (page 224)
Snapshot Schedule for Certain Computers do not Run (page 213) User Cannot Log On to Start Snapshot (page 214) Job Cannot Be Submitted (page 214) Protected computer drives missing from snapshots (page 214) User Cannot Browse Protected Files (page 214) User Cannot Access a Different Account Via Web-Based File Recovery (page 214) Snapshots Fail Because Server Clocks Are Not Synchronized (page 215) General Snapshot & Recovery Problems (page 215) Short File Names Restored Incorrectly on FAT32 Partition (page 215)
213
usually turn off the personal firewall. Assuming that the server is on the same network, this should allow all features to work properly. Note Internet Connection Sharing uses the Windows firewall by default, so if the protected computer uses Internet Connection Sharing then you could run into the same problem.
In Windows 2000/XP, one cause of this error is that the drive that contains the files being protected uses the NTFS file system, and the local SYSTEM account on the protected computer does not have full access to the drive. Recovery Solution uses this account to read and write data. To fix the problem, make sure that the SYSTEM account has access to the drive.
If multiple users report this problem at the same time, it might be an issue with the server. Try to restart the server, following the instructions in Stopping and Starting the Recovery Solution Server Service on page 289.
A hard drive is added to or removed from the computer. A drive is resized. A hard drive letter is changed. A drives file system is changed (Example: from FAT to NTFS).
214
The user has already accessed Web-based file recovery during the same Web browser session. Even if the user chooses the Log Off button, the credentials are not necessarily cleared from the browsers cache, so returning to the page might not require another logon.
The user is running Internet Explorer, and the users logon credentials for Windows are the same as those for Recovery Solution. In this case, Internet Explorer just uses the Windows credentials without prompting for a logon. If a logon prompt is required (Example: if the user wants to access protected files that are stored under a different account name), then the user can do one of the following.
" "
Log onto Windows using different credentials. Access Web-based file recovery using Netscape, which is available for free from the Netscape Web site (http://www.netscape.com).
215
Disk space error appears during Full System Recovery disk creation (page 216) Full System Recovery does not start properly (page 216) Error appears during Full System Recovery (page 217) Full System Recovery fails when creating disk structure (page 220) Full System Recovery incomplete, but no error appears (page 220) Problems occur after server upgrade (page 221) Error appears after Full System Recovery (page 221) Recovery Agent not working after Full System Recovery (page 222) Files missing or outdated after Full System Recovery (page 222) Full System Recovery stalls (page 222) Full System Recovery CD-ROM failure (page 222) Full System Recovery and Windows 98 with Symantec Antivirus (page 223) Cannot Cancel Restore of Folder (page 223) Norton AntiVirus Security Warning (page 223) Account Disabled After Full System Recovery (page 223) Recovery Fails on Computers with Phoenix nForce 6A61CPAAC-00 BIOS (page 224) Full System Recovery fails on HP NetServer LC2000 (page 223)
Disk space error appears during Full System Recovery disk creation
Make sure that the network share for Full System Recovery has free disk space equal to the total size of the CD/DVD-ROM images plus the maximum amount of data for a single CD/DVD-ROM (depending on the capacity of your blank CD/DVD media).
216
the hard disk. If this partition is not restored correctly, the temporary operating system might not be able to start. To correct the problem, you can use a disk partition tool such as PartitionMagic to restore the original partitions and drive letters. After you restart the computer Full System Recovery should continue from the point at which it stopped. Cannot log into temporary operating system when starting Full System Recovery There may be a problem with the temporary operating system copied to CD-ROM as part of the Full System Recovery image. A problem occurs when a Windows NT computer has non-English regional settings (stored in the systems .NLS files). If this is the case, it is impossible to log on, because the logon prompt does not accept keyboard input. This problem can be fixed by creating new Full System Recovery disks that include, in the temporary operating system, all of the .NLS files from the SYSTEM32 subfolder of the protected computers Windows folder (by default, C:\WINNT\SYSTEM32). You must then restart Full System Recovery using the new disks.
A hard disk has been removed from the protected computer since the time of the Full System Snapshot.
217
You are trying to restore to a different computer than the one from which the Full System Snapshot was run. The protected computer uses Windows 2000/XP disk volume sets or stripe sets. In this case, there must be physical disks on the recovered computer large enough to store the entire contents of the logical disks from the snapshot.
Cannot open partition information file. Recovery Solution cannot access the information about the computers file system. This might be because the data is invalid, or it might just be a temporary access problem. You should start the Full System Recovery again. If you attempt to continue from where you left off and you still see this message, you will have to restart the Full System Recovery from the beginning. Invalid volume information file. The Full System Recovery cannot continue because there is a problem with the information about your hard drives. This error usually appears if you have chosen to continue a Full System Recovery that you started previously. You might need to restart the Full System Recovery from the beginning. Cannot open volume information file. Recovery Solution cannot access the information about your computers hard drives. This might be because the data is invalid, or it might just be a temporary access problem. You should start the Full System Recovery again. If you attempt to continue from where you left off and you still see this message, you will have to restart the Full System Recovery from the beginning. Run-Time error R6003. Attempt to divide by 0 You might see this message in the following cases.
!
On computers with certain BIOS versions, if you attempt to recover from a bootable CD-ROM. Example: computers with American Megatrends AMIBIOS Version 1.00.04.DK0K cannot be recovered from bootable CD-ROM.
One possible work around is to use the console to create a bootable floppy disk, and restart the Full System Recovery from the floppy disk. However, this might not work on all BIOS versions. Disk Write Error. Could not write to disk %c. It is possible that part of the disk specified is damaged. You might try using a tool such as ScanDisk to mark the bad clusters as unusable. If there is enough disk space left over to recover the system, you can try again. Otherwise, you can install the operating system manually and perform a data-only Full System Recovery. You could also replace the hard disk with another one that is at least the same size as the original one and then run the Full System Recovery again. Original boot sector not found You might see this message on computers with a single SCSI drive and certain BIOS versions installed, if you attempt to recover from a bootable CD-ROM. One possible work
218
around is to use the console to create a bootable floppy disk, and restart the Full System Recovery from the floppy disk. ntldr not found If the protected computer has multiple SCSI hard disks, and the computer is configured in the BIOS to boot from one of these SCSI hard disks with an ID greater than 0, you cannot perform a Full System Recovery on the computer. If the computer will not boot, you must install the operating system manually. Then you can restore the data from the Full System Recovery CD-ROM. Cannot extract files to disk You might see this message if you are recovering from a CD-ROM set in which the temporary operating system spans more than 1 disc. To fix the problem, you must recreate the discs with a temporary operating system smaller than the capacity of a CDROM (650 MB). The same error can also appear in case of a bad CD media. The modem has detected an internal error You might see this message during Full System Recovery on the IBM ThinkPad 600E, along with options to restart or shut down the modem. Simply choose to shut down the modem, and the Full System Recovery should continue normally. D:\DISK1 is not accessible. Folder was moved or removed Some CD-ROM drives, notably certain NEC models, might not be able to read CD-ROMs that have not been finalized (or closed). If you encounter error messages claiming that files or folders cannot be found, you might need to finalize the CD-ROMs with your CD writing software. Some CD writing programs let you finalize discs that you have already written. If you do not have this option, you must create the discs again. In that case, the easiest way to finalize the discs is to create them using the disc-at-once option. System file errors If you see Windows errors relating to system files that cannot be replaced, or Windows Update errors relating to .DLLs, you might be attempting to recover the computer from a Full System Snapshot that was performed in the middle of the installation of a program. If a user installs a program that requires the computer to be restarted, but a Full System Snapshot is performed before the computer is restarted, you cannot recover the computer from this snapshot. Try creating a new Full System Recovery disk from a different snapshot. Service Control Manager and other Windows errors During the Windows part of Full System Recovery, you might see error messages relating to services not starting or files not being found. Often these messages appear because certain items specified in the Windows registry were not included in the temporary operating system being used to restore the computers files. The Full System Recovery should continue normally in the background, even if these messages appear. They should not appear when the Full System Recovery is complete. After the temporary operating system is installed, the protected computer cannot connect to the server to complete Full System Recovery If a network device driver was installed or updated just before the snapshot used for Full System Recovery, and the protected computer was not restarted between the driver installation and the snapshot, then it is possible that the required driver files were not included in the temporary operating system. This occurs because Recovery Solution only checks for required system files while the computer starts up. If the required files are
219
missing, the network card might not function correctly, and a connection to the server becomes impossible. The problem can sometimes be corrected by recreating Full System Recovery disks and adding the entire Windows folder to the temporary operating system. psAuthInfo or psAuthInfo->psAuthIdentityData is Null You might see this error if you chose a snapshot from a version of Recovery Solution earlier than 4.0 as the source for Full System Recovery. You can use snapshots from Recovery Solution 3.2 or later, but to do so you must include all user data on the CDROMs.
Im prompted to insert next CD-ROM, but it has already been inserted, or current CD-ROM is last of recovery set The most likely cause of this error is a bad CD. Try the following to resolve the problem.
!
Click Try Again in the dialog box that appears following the error message.
220
Recreate the CD-ROM that was being processed at the time of failure. This is not the CD-ROM that you inserted after the prompt, but the previous one. Be sure not to rerecord the data onto the faulty CD-ROM. Try to continue with the new CD-ROM.
Full System Recovery stops First make sure that the Full System Recovery has really stopped.
!
Check the status messages on the screen to see if Recovery Solution is in the middle of a task. Check the hard disk activity light on the computer casing to see if there data is being read from or written to the hard disk. Even after you are convinced that the system has stopped prematurely, wait 10 minutes to be sure.
If you are still convinced that the Full System Recovery has stopped before it is done, you can try the following.
!
Restart the computer. The Full System Recovery might continue normally once you restart. If the recovery does not continue, you might have to start over again. If you attempted a fully automatic Full System Recovery that failed, you can try a dataonly Full System Recovery.
221
During recovery, you are prompted to insert the next CD-ROM, but the CD-ROM being processed is the last in the recovery set.
222
During processing of a CD-ROM, you are prompted to insert the next CD-ROM in the recovery set. Upon insertion of the next CD-ROM, recovery fails.
Click the Try Again button in the Recovery Solution Full System Recovery error dialog box. Re-record the CD that was being processed at the time of failure. This is not the CD inserted after the prompt for the next CD, but the previous one. Data from the CD being read at the time of failure must be re-recorded onto a different CD.
Cannot find device that might be needed to run windows or windows application c:\progra~1\symantec\symevnt.386 Press any key
Pressing any key will boot Windows without problems
You have reinstalled Recovery Agent, but your computer is recovered to a point in time before you reinstalled. You have uninstalled Recovery Agent, and your computer is recovered using Recovery Solution Full System Recovery.
223
Rollback Troubleshooting
Certain error conditions that cause the rollback not to succeed might not report that condition back to the console. If the rollback seems to be running for an excessively long time, you should check the protected computer itself to see if any errors have occurred. You can cancel the job from the console job queue. The following are some specific errors you could encounter while trying to perform a rollback. Choose the item that best describes the problem you are having, or scroll down to browse the information.
! ! ! ! ! !
Unable to see Desired Snapshot During a System Rollback (page 224) Rollback Cannot Be Started From the Console (page 225) Job Cannot Be Submitted (page 225) After Rollback, User Is Prompted to Uninstall (page 225) Rollback Fails (page 225) After Rollback, a Restored Drive Contains No Data (page 226)
224
Rollback Fails
The following are potential causes of this problem.
!
If the server is running MSDE (the lite version of Microsoft SQL Server), then the number of SQL Server connections used by Recovery Solution should not be set to anything greater than 5. If too many simultaneous connections are allowed, certain tasks could fail. For instructions on setting the number of connections used by Recovery Solution, see Licensing Recovery Solution on page 44.
There might not be enough registry free space on the protected computer. Under Windows 2000/XP, Recovery Solution requires that a certain percentage of the space allocated for the registry be free in order for snapshots or rollback operations to work. If the registry quota is insufficient, the registry cannot be restored properly during rollback. To correct the problem, you must increase the maximum registry size so that there is enough free space for Recovery Solution to use. The change is made in the Virtual Memory dialog box along with the Windows paging file sizes. Start by following the recommendations published by Microsoft for increasing the maximum registry size. They are included in the Microsoft Knowledge Base article Q176083, which you can obtain from a number of Microsoft technical publications or from the Microsoft Web site (http://www.microsoft.com).
225
If rollback still fails, it might be necessary to increase the maximum registry size even more. You might find you need to increase the maximum registry size to as much as 50 MB.
226
Chapter 13
Troubleshooting: Install/Uninstall on page 227 Troubleshooting: Snapshots on page 230 Troubleshooting: Restoring Data on page 236 Troubleshooting: Error Messages on page 240 Troubleshooting: Options on page 243 Troubleshooting: Event Logs on page 244 Troubleshooting: Rollback on page 246 Troubleshooting: Other Issues on page 248
Troubleshooting: Install/Uninstall
What type of installation problem are you having?
!
When installing Local Recovery, I get an error stating that I am using non-supported devices. See Troubleshooting: Unsupported Devices on page 227. I cannot install the Altiris Partition for Local Recovery. See Troubleshooting: Problems Installing the Local Partition (page 228). I cannot update my Recovery Agent installation. See Troubleshooting: Cannot Update Recovery Agent on page 229. When I update Recovery Agent, my settings are lost. See Troubleshooting: Settings Not Saved During Update on page 229. After Uninstalling Recovery Agent, bad clusters still exist on hard drive. SeeTroubleshooting: Unusable Clusters after Uninstall on page 229 When Installing Recovery Agent fails with error unable to configure the settings. See Troubleshooting: Install fails with unable to configure the settings error on page 230
227
SCSI* (*Adaptec 3800/3900 series are supported, others are not) If your computer uses these devices, you will need to remove them before installing Local Recovery. If your computer does not use these devices, you may still get this error message. Some computers may have drivers loaded for devices that are not actually used in the computer. If you get this error message, but you are not using this devices, view your Windows Device Manager. If a driver for one of these devices is loaded, uninstall it, restart your computer, and try the installation again.
228
If the automatic update doesn't seem to work, make sure that you are logged on as an authorized user of Recovery Solution, then let the upgrade run again. You can cause the upgrade to start by simply browsing your protected files. To install the Recovery Agent on a Windows 2000/XP computer, you must be a member of the Administrators user group or have administrative rights on your computer. If you don't have administrative rights, ask the Recovery Solution administrator to install the software for you. If you get errors trying to install the Recovery Agent over an older version, try uninstalling the Recovery Agent first, then install the new version. In some cases Setup might prompt for a user name and password, but not accept them even if they are valid. This could occur if you are trying to reinstall from a command-line Setup package provided by your administrator, and you are not the original user who installed Recovery Agent on your computer. In this case, you need to specify user credentials on the command line as follows: AgentSetup.exe /Reinstall /Comp:computer /User:primary_username / GUser:your_username /Pass:your_password If your administrator provided other command-line switches to use, be sure to include them as well. The order that switches appear on the command line is not important.
You completely uninstall the software first, then reinstall it. Uninstalling the software removes all settings. If you want to update the software and keep your old settings, simply install it over the existing copy.
You install the software on a different computer from the one you originally installed it on. Some settings are stored on your computer rather than on the server, so even if you use the same account, those settings are not kept when you install the software on a different computer.
229
Troubleshooting: Snapshots
What happens when you try to take a snapshot?
!
The snapshot options are disabled or otherwise not available. See Troubleshooting: Snapshot Options Unavailable on page 231. I start a manual snapshot, but nothing happens. See Troubleshooting: Nothing Happens on page 231. I start a manual snapshot, but my computer locks up or otherwise fails to respond as expected. Troubleshooting: Erratic Behavior on page 231. I scheduled a timed or automated snapshot that does not appear to have been performed. See Troubleshooting: Snapshots Don't Run on page 232. The snapshot starts correctly, but stops before it is completed. See Troubleshooting: Snapshot Stops Prematurely on page 234. During the snapshot, the Windows Installer screen appears. See Troubleshooting: Windows Installer Appears During Snapshots on page 235. The snapshot does not contain all my files. See Troubleshooting: Snapshot Is Missing Files on page 235. I receive an error message while the snapshot is being taken. See Troubleshooting: Error Messages on page 240. I am prompted to log on, but then nothing happens. See Troubleshooting: Logon Problems on page 250 I am prompted to log on, but my user name and password are not accepted. See Troubleshooting: Logon Problems on page 250.
230
An administrator can disable snapshot and recovery activity on your computer. This might be done temporarily for maintenance purposes. If you want to take a snapshot of a specific file or folder, and you browse to the folder using Windows Explorer, you can start a snapshot by right-clicking the file or folder and clicking Snapshot from the menu. You can also select the file or folder and click File > Snapshot. In some cases, the Snapshot option is not available. This problem can occur if using a version of Windows Internet Explorer earlier than 6.0. To solve this problem, upgrade Internet Explorer to 6.0 or newer.
Under some circumstances, if you are starting a snapshot or restore, it might take up to several minutes for the progress window to appear, so it seems as if nothing is happening. If for some reason the server is not working properly, it might also be several minutes before an error message appears. You can check the availability of the server by looking at the Windows taskbar. The Recovery Agent system tray icon, usually located at the bottom right of your screen, displays a red mark if there is a problem contacting the server.
"
If the server is unavailable, contact your Recovery Solution administrator for further assistance. If the server is available, there might be a configuration problem. See Troubleshooting: Options on page 243.
"
If the progress window opens but does not continue, see Troubleshooting: Recovery Solution Stops During a Snapshot or Restore on page 234.
!
If you are using Windows XP and your computer is not part of a Windows domain, you might be running into problems with Fast User Switching. For more information, see Troubleshooting: Fast User Switching on page 252.
Legato Replica Replica for HP SureStore Tape Stac Replica Tape Timbuktu Enterprise 2.0 Build 635 Tivoli Data Protection for Workgroups
231
Scheduled snapshots. See Troubleshooting: Scheduled or Automated Snapshot Doesn't Run on page 232. Snapshot on logoff. See Troubleshooting: Snapshot on Logoff Doesn't Run on page 233.
Scheduled snapshots that are based on a time of day take place according to the internal clock of the server, not your computer. When scheduling your snapshots, you should allow for typical deviations in clock settings. Example: suppose your computer's clock reads 1:00 P.M., while the server's clock reads 1:10 P.M. If you schedule a snapshot to start at 1:05 P.M., you might expect it to run in 5 minutes, but it won't because according to the server 1:05 P.M. is already past. The snapshot won't run until the next scheduled day. For proper operation, the clocks on the Recovery Solution Servers and clients must be synchronized.
If you are running Windows XP or Windows Me, a connection firewall might be preventing the server from reaching your computer. For more information, see Troubleshooting: Connection Firewall on page 251. Your computer might have been off. You do not have to be logged on with a user name and password, but your computer must be on for a snapshot to be run. If you're running Windows 9x/Me, your computer must be started in Windows mode (not MS-DOS mode). To ensure that all your files are protected, you should reinstall the software as soon as possible after an upgrade to Windows. If you don't reinstall, then your scheduled or automated snapshots might not occur. The Recovery Solution administrator can limit the number of simultaneous connections to the server. If many scheduled snapshots are running at the same time, then some snapshots might get delayed because they are not all allowed to run at the same time. As long as the server is not constantly using the maximum number of connections throughout the entire scheduled time range for your snapshot, the snapshot should start (though probably not at the beginning of the time range). On the other hand, if many other protected computers are accessing the server constantly during the entire time range scheduled for your snapshot, the scheduled snapshot might not run on that day, and your computer won't take an automatic snapshot again until the next scheduled snapshot time. If you are allowed to change
232
your own snapshot schedule, you can increase the time range to give your snapshot a greater chance of being taken. If your snapshots are frequently skipped because of limited access to the server, you should notify the Recovery Solution administrator.
!
If there's a problem on the server or if the server is simply not running during your scheduled snapshot time, the snapshot won't start. A local-mode snapshot on event (such as log on, idle, resume, or dock) may fail to start in case HP Wireless Assistant 1.01 is installed on the computer. The workaround is to uninstall the HP Wireless Assistant software or to rely on automatic scheduled snapshots. You can still use the Snapshot on Logoff feature, as it is not affected by this issue.
Windows might be logging you off before the snapshot has a chance to run. This behavior is controlled with an application timeout registry setting that is different for each user on the computer. In most versions of Windows, the default for this timeout is long enough that it does not interfere with the snapshot on logoff timeout. However, in Windows XP and Windows 2000, the default timeout is too short. Recovery Solution automatically increases this timeout when Setup is run, but if the setting was subsequently changed, or if you are not the user who installed the software, then you might have to change the setting manually.
233
For additional troubleshooting information, see Troubleshooting: Snapshots Don't Run on page 232.
The Progress window stays on the screen for a long time without continuing. See Troubleshooting: Recovery Solution Stops During a Snapshot or Restore on page 234. Recovery Solution completes the snapshot, but the snapshot does not contain all of my files. See Troubleshooting: Snapshot Is Missing Files on page 235. Recovery Solution stops the snapshot and displays an error message. See Troubleshooting: Error Messages on page 240. The Progress window closes. See Troubleshooting: Unknown Solution on page 252. Something else happens. See Troubleshooting: Unknown Solution on page 252.
! !
If you're running a snapshot, check to see if the Close button is available. When a snapshot is complete, the Close button replaces the Stop button, and a Snapshot complete message appears. Sometimes the statistics mistakenly indicate that there is still more information to be copied, but this is not the case. Once the Close button becomes available, all files have been successfully included in the snapshot. Note Be careful not to close the window too soon. If you are running a snapshot on multiple drives, the progress is displayed separately for each drive and reaches 100% after each drive is finished. If more data still needs to be included, the button reads Stop, not Close, and if you choose it, the rest of the files will not included.
If you start a snapshot and the Close button becomes available but no files appear to have been protected (the percentage complete stays at 0%), you might be using the McAfee VirusScan Safe & Sound feature. If you use this feature to store backup files as protected volume files, your snapshots might not run successfully. The problem can be fixed by either turning off Safe & Sound, or by reconfiguring it to store backups as folders instead. If you are restoring many files, the message Initializing the list of items to restore. Please wait... might stay on the screen for a very long time. This is normal behavior. You can continue working in other programs while the restore process initializes. If you think your snapshot or restore is really stalled, try clicking the Stop button in the Progress window. (If you don't see a Stop button but you see a Close button, then the snapshot or restore is finished, and you can close the window.) If you cannot close the Progress window, close your other programs and restart your computer, then try the snapshot or restore again. If it still fails, contact the Recovery Solution administrator. There might be a problem with the server.
234
The files are excluded from the snapshot. A file might be excluded from a snapshot in any of the following ways.
"
By not including the drive in the snapshot. If performing a manual snapshot, make sure you select the drive on which you want to run a snapshot. For scheduled snapshot, make sure the drive is checked in the snapshot schedule options.
"
By excluding the file automatically from all snapshots (manual or scheduled). This is configured in the snapshot exclude options. There are a number of ways you that the exclude options might be configured to make Recovery Solution ignore a file during a snapshot. For more information, see the Snapshot Exclusion Notes in the Recovery Solution Users Guide.
Under certain conditions, Recovery Agent fails to backup files, which are locked or open. These conditions include the following:
"
Recovery Agent is running Windows 9x/Me. Recovery Agent for Windows 9x/Me does not include the OFM driver, hence, it does not provide open and locked file support.
"
Protected computer is running Local Recovery Agent. Local Recovery Agent does not provide support for open and locked files. Note Local Recovery Pro provides open and locked file support. For more information on the additional benefits of Local Recovery Pro, see Local Recovery Pro on page 15
"
OFM synchronization fails during snapshot. Sometimes, when the write activity rate spread is uneven among the protected computer multiple hard drives, the most active drives write operations may cause OFM synchronization to fail even though this particular drive was excluded from the snapshot. In this case, you need to change the OFMState value to enable OFM synchronization by volume (as opposed to the default synchronize the whole system setting).
235
Warning Before using Sync by volume option, make sure there are no databases or applications that span across multiple volumes in your environment.
!
If you start a snapshot and the Close button becomes available but no files appear to have been protected (the percentage complete stays at 0%), you might be using the McAfee VirusScan Safe & Sound feature. If you use this feature to store backup files as protected volume files, your snapshots might not run successfully. The problem can be fixed by either turning off Safe & Sound, or by reconfiguring it to store backups as folders instead.
I am trying to restore files by browsing my snapshot data. See Troubleshooting: File Restores on page 236. I am trying to perform a rollback. See Rollback Troubleshooting (page 224). I am trying to perform a Full System Recovery. See Full System Recovery Troubleshooting (page 216). I am trying to restore files with a Web browser. See Troubleshooting: Web-Based File Recovery Logon Doesn't Appear on page 238. I don't know the difference between the restore types. See Troubleshooting: Unknown Restore Type on page 240. Other Issues Relating to Restoring Data on page 240
! !
I cannot view my protected files. See Troubleshooting: Cannot View Protected Files on page 237. I'm having trouble understanding file versions or getting a particular file version. See Troubleshooting: Protected File Versions on page 237. I choose Restore or drag file snapshots to my computer, but nothing happens. See Troubleshooting: Nothing Happens on page 231. I am prompted to log on, but then nothing happens. See Troubleshooting: Logon Problems on page 250. I am prompted to log on, but my user name and password are not accepted. See Troubleshooting: Logon Problems on page 250. I cannot log on with a different account when using Web-based file recovery. See Troubleshooting: Web-Based File Recovery Logon Doesn't Appear on page 238. Windows Explorer crashes. See Troubleshooting: Restore Crashes Windows Explorer on page 239. Recovery Agent freezes during a search for files to restore. See Troubleshooting: Recovery Solution Freezes During File Search on page 239.
236
I choose Restore, but my computer locks up or otherwise fails to respond as expected. See Troubleshooting: Erratic Behavior. The restore process starts correctly, but stops before it is completed. See Troubleshooting: Restore Stops Prematurely on page 239. I receive an error message during the restore process. See Troubleshooting: Error Messages on page 240. I cannot restore a file larger than 4GB on a FAT32 disk. See Troubleshooting: Not Enough Space Available to Restore (FAT32) on page 238. I completed a manual restore, but some of the files I tried to restore are missing or damaged. Troubleshooting: Unknown Solution on page 252.
If a particular file or folder originated on an NTFS drive, and you do not have at least read access to the file or folder, then you cannot see it in the list of protected files. However, if you restore a folder containing the secure item, the item will also be restored (but you still won't have access to open it). It's possible that your account has been locked out from the server. Possible symptoms of this problem include the following.
" "
You cannot expand the Client Recovery Agent folder in Windows Explorer. Trying to open the Client Recovery Agent folder in its own window causes Windows to display an Action canceled Internet Explorer page.
An account lockout is most likely to occur if you are running Windows 9x/Me, and the server is authenticating users locally (not via a domain). In this case, the operating system on the server counts all Recovery Solution connections as invalid logon attempts. If you've restarted your computer several times in a row, you might have to wait until the account lockout expires, then restart your computer again in order to access Recovery Solution. Your administrator should be able to determine what the account lockout policy on the server is.
!
If you are using Windows XP and your computer is not part of a Windows domain, you might be running into problems with Fast User Switching. For more information, see Troubleshooting: Fast User Switching on page 252.
I don't know how to find the version I need. See Troubleshooting: Cannot Find File Versions on page 238. I cannot tell the difference between file versions. See Troubleshooting: Protected File Versions Are the Same on page 238. When I restore a folder, I get the wrong version of one or more files. See Troubleshooting: Restored Files Are Incorrect Versions on page 238. I have a different problem. See Troubleshooting: Miscellaneous File Version Problems on page 238.
237
238
The Web-based file recovery logon prompt might not appear if any of the following conditions are true.
!
You have already accessed Web-based file recovery during the same Web browser session. Even if you choose the Log Off button, your logon credentials are not necessarily cleared from the browser's cache, so returning to the page might not require another logon.
You are running Internet Explorer, and your logon credentials for Windows are the same as those for Recovery Solution. In this case, Internet Explorer just uses your Windows user name and password without prompting for a logon. If a logon prompt is required (Example: if you want to access protected files that are stored under a different account name), then you can do one of the following.
" "
Log onto Windows with a different user account. Access Web-based file recovery using Netscape, which is available for free from the Netscape Web site.
Recovery Solution stops the restore and displays an error message. See Troubleshooting: Error Messages (page 240).
239
Regular Restore You are performing a regular restore if your computer works, but you have lost some identifiable data that you need to retrieve from a snapshot. You are browsing your snapshot and restoring the files you need.
Rollback You are performing a rollback if you can start your computer, but it is not working properly and you want to return it to a previous state.
Full System Recovery You are performing a Full System Recovery if your files have become so damaged that your computer no longer works properly, and you have lost most or all of your data. You are restoring files by using a Full System Recovery disk created for you by the Recovery Solution administrator.
I am trying to restore files by browsing my snapshot data. See Troubleshooting: File Restores on page 236. I am trying to perform a rollback. See Performing Rollbacks in the Recovery Solution Users Guide. I am trying to perform a Full System Recovery. See Recovery Solution Full System Recovery in the Recovery Solution Users Guide.
The message appears in the Progress dialog box. See Troubleshooting: Error Messages in the Progress Dialog Box on page 241. The message pops up in its own window. See Troubleshooting: Error Message Boxes on page 242. I found the message in the event logs. See Troubleshooting: Error Messages in the Event Logs on page 246.
240
Yes, I was once able to perform this task successfully. See Troubleshooting: New Error. No, this error often appears when I perform this task. See Troubleshooting: Repeated Error.
First, try again. Sometimes temporary conditions on the network prevent normal communications from occurring, and a retry is all that's required. You might also find that restarting your computer makes the problem disappear. If you recently changed any settings (particularly network settings) or installed any new software on your computer, it's possible that Windows replaced some of the shared files required by Recovery Agent. If the files were replaced with older versions, then Recovery Agent might no longer work properly. Specifically, some programs replace the DCOM system files that Recovery Solution uses to communicate between your computer and the server, which could prevent you from running snapshots and restoring data. Ask your Recovery Solution administrator to help you get the correct files back on your computer. Note To minimize this problem, always keep the newer versions of files when given the choice. Windows usually asks whether or not you want to keep your existing version of a file when it is newer than the one being installed, and you should always choose Yes. Some programs (such as Internet Explorer 4.0 and the Windows 98 Upgrade) replace files without asking, so you might still see this problem occasionally. Windows 98 includes a Version Conflict Manager that you can use to restore files that were on your computer before you installed Windows 98.
If you recently installed FrontPage 98 Personal Web Server, you might need to change one of the default Personal Web Server settings to allow you to continue taking snapshots manually. For instructions, see Troubleshooting: FrontPage 98 Personal Web Server Conflict on page 250. If any network settings changed recently, Recovery Solution might not have the information it needs to communicate properly across the network. If you changed the network configuration of your own computer, you might try putting your settings back the way they were to see if it fixes the problem. If you're running certain versions of Windows, you can use Recovery Solution to do this. For details, see Saving and Restoring Network Settings in the Recovery Solution Users Guide. If your network administrator changed settings somewhere else on the network, or if anything on the Recovery Solution server was changed, you might ask if other Recovery Solution users are encountering problems as well. If they are, there's a good chance that the network change has something to do with the problem. You'll have to work with the network administrator or the Recovery Solution administrator to correct the problem.
241
If you haven't restarted your computer in a long time, restart it and try again. Sometimes restarting the computer clears temporary problems from memory. If you haven't successfully run a snapshot yet, try reinstalling Recovery Agent using your existing account. If you have FrontPage 98 Personal Web Server installed, you might need to change one of the default Personal Web Server settings to allow you to take snapshots manually. For instructions, see Troubleshooting: FrontPage 98 Personal Web Server Conflict on page 250.
The message says that the job could not be submitted. See Troubleshooting: Job Could Not Be Submitted on page 242. The message says that my computer's drive configuration has changed, but it hasn't. See Troubleshooting: Drive Configuration Message on page 243. The message says that the system is running low on registry quota. See Troubleshooting: System Low on Registry Quota on page 243. My virus protection program warns me about changes to my computer. See Troubleshooting: Virus Warning During Rollback on page 247. The message indicates a problem with an authentication service. See Troubleshooting: Options on page 243. The message indicates an error in the module tapeng.exe.
If your error message does not appear above, have you previously performed the same task without seeing this error?
!
Yes, I was once able to perform this task successfully. See Troubleshooting: New Error on page 241. No, this error often appears when I perform this task. See Troubleshooting: Repeated Error on page 242.
242
Troubleshooting: Options
What type of problem are you having with the options?
!
I can't open the Recovery Agent Options dialog box. See Troubleshooting: Can't Open Options. A message appears saying that my computer's drive configuration has changed, but it hasn't. See Troubleshooting: Drive Configuration Message on page 243. Some options don't appear and/or are disabled. See Troubleshooting: Options Are Unavailable. A message appears saying that the schedule settings cannot be displayed. See Troubleshooting: Schedule Settings Cannot Be Displayed. When I click the button to change my credentials, nothing happens. See Troubleshooting: Fast User Switching on page 252. I can't close the Recovery Agent Options dialog box. See Troubleshooting: Cannot Access Dialog Box Buttons on page 251.
243
I can't find the Recovery Agent icon. See Troubleshooting: Fast User Switching. Nothing happens. See Troubleshooting: Nothing Happens on page 231. I am prompted to log on, but then nothing happens. See Troubleshooting: Logon Problems. I am prompted to log on, but my user name and password are not accepted. See Troubleshooting: Logon Problems. I get a different error message. See Troubleshooting: Error Message Boxes on page 242.
Your version of Recovery Agent does not include the option you are looking for. Your computer might not have the required support installed for an option. Example: if you do not have Dial-Up Networking installed on your computer, the options for protecting your computer remotely do not appear. You might not have the rights to view or change some options. By default, some options are not available to you. Also, your Recovery Solution administrator can enable or disable certain options for you. If you see a message saying that your schedule settings cannot be displayed. See Troubleshooting: Schedule Settings Cannot Be Displayed on page 244. If you are using Windows XP and your computer is not part of a Windows domain, you might be running into problems with Fast User Switching. For more information, see Troubleshooting: Fast User Switching on page 252.
When I open the Event Viewer, I see an error regarding the file messages.dll. See Troubleshooting: Messages.dll Is Missing on page 245.
244
After installing Recovery Agent under Windows NT, I get frequent messages informing me that the event log is full. See Troubleshooting: Event Log Full on page 245. I don't understand the event messages. See Troubleshooting: Error Messages in the Event Logs on page 246. More information: Troubleshooting: Error Checklist on page 246.
Reinstall Recovery Agent using your existing account. Edit the Windows registry as follows. 1. 2. From the Windows Start menu, click Run. Type regedit.exe, then click OK. Caution Be extremely careful when editing the Windows registry. If you accidentally change or delete the wrong values, your computer could stop working properly. You might want to print the Registry Editor Help topic To restore the registry before making any changes. This topic describes how to revert to an old version of the registry if your computer won't start. 3. Browse to the following registry location. HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Eventlog\Applicat ion\Altiris CR Solution 4. 5. 6. In the list of values (usually on the right), select EventMessageFile. From the Edit menu, click Modify. Under Value data, enter the following. C:\Program Files\Altiris\Recovery Solution Agent\messages.dll 7. Click OK.
Clear the log each time you receive the message. You'll have the option of saving the log before you delete it. Change the Event Viewer settings to automatically overwrite events. If you do this, you won't have a chance to save old log information, but in most cases it is only the recent log information that is valuable.
245
Make sure the version of Recovery Agent you're running is the same as the version that's on the server. Your Recovery Solution administrator should have installation software for the correct version of Recovery Agent. If you're running Windows 9x/Me, your computer's network access control settings must be configured in one of the following ways. Choose any item for information about where these settings are located.
"
For User-level access control. See the Windows Help topic To control access by using a list of names for instructions. For the Windows NT domain name, be sure to specify the name of the domain that your computer logs onto.
"
For Share-level access control, with your network adapter bound to the TCP/IP protocol. See the Windows Help topic To control access by using passwords for instructions on setting up share-level access control. Windows Help also has information on binding an adapter to a protocol.
"
For Share-level access control, with NetBIOS over TCP/IP enabled. To enable NetBIOS over TCP/IP, do the following.
1. 2. 3. 4.
From the Windows Start menu, click Settings. Click Control Panel. Click the Network icon. On the Configuration tab, scroll down until you find the TCP/IP protocol, and select it. If you see more than one TCP/IP protocol, select the one that you use when running snapshots or restoring files with Recovery Solution.
5. 6. 7. 8.
Click Properties. Click the NetBIOS tab. Check the box labeled I want to enable NetBIOS over TCP/IP. Click OK.
Troubleshooting: Rollback
What happens when you try to perform the rollback?
!
I don't know how to perform a rollback. See Performing Rollbacks in the Recovery Solution Users Guide. I choose a snapshot to restore from, but nothing happens. See Troubleshooting: Nothing Happens on page 231.
246
The restore process starts correctly, but stops before it is completed. See Troubleshooting: Restore Stops Prematurely on page 239. My virus protection program warns me about changes to my computer. See Troubleshooting: Virus Warning During Rollback on page 247. I receive an error message during the restore process. See Troubleshooting: Error Messages on page 240. I completed a rollback, but some of the files I tried to restore are missing or damaged. See Troubleshooting: Rollback Has Missing or Damaged Files on page 247. I completed a rollback, then I received a message saying that my computer has been disabled. See Troubleshooting: Rollback Disables Computer on page 248. After rolling back my system, I see an error in the module tapeng.exe. See Troubleshooting: Rollback General Protection Fault Error Message on page 248. After Rollback, the DHCP server was not started and error 1811 is recorded in the event log. See Troubleshooting: DHCP Problems After Rollback on page 248. I need to restore data, but I can't start the computer. See Recovery Solution Full System Recovery Dialog Box in the Recovery Solution Users Guide.
If you are running Microsoft Office 97, a rollback might cause the Office Shortcut Bar icons to be incorrect. (They all show the same icon.) These are caused by outdated temporary files that remain on the computer after the rollback. To correct the problem, close the Office Shortcut Bar and delete the following files from your computer. They are located in the Office\Shortcut Bar subfolder of the folder containing your Microsoft Office program files (by default C:\Program Files\Microsoft Office).
" " "
Once the files have been deleted, the Office Shortcut Bar should display the correct icons.
247
If you were previously running Microsoft Office 97 but upgraded to Microsoft Office 2000, you should try to avoid rolling back your computer to a point in time when you had Office 97 installed. This might cause some Office files to be restored incorrectly. To correct the problem, you might need to reinstall Office. If your computer's drive configuration has changed since the time of the snapshot to which you are rolling back, then the rollback restores your old drive configuration, but it's possible that one or more of your drives contains no data after the rollback is complete. To restore the data, perform a second rollback to the same snapshot you chose for the first rollback.
Troubleshooting: DCOM on page 249 Troubleshooting: FrontPage 98 Personal Web Server Conflict on page 250 Troubleshooting: Logon Problems on page 250 Troubleshooting: Cannot Access Dialog Box Buttons on page 251 Troubleshooting: Connection Firewall on page 251 Troubleshooting: Fast User Switching on page 252 Troubleshooting: Unknown Solution on page 252 Troubleshooting: Event Viewer on page 252
248
Troubleshooting: DCOM
DCOM is a Windows component that Recovery Solution uses for communication between your computer and the server. Usually it is installed and configured automatically, and you don't have to do anything with it. However, installing or removing certain Windows components can result in configuration changes that prevent Recovery Solution from being able to use DCOM. The specific symptoms of DCOM configuration problems are different depending on which version of Windows you are running.
Windows 2000/XP
This section describes DCOM configuration problems you might encounter under Windows 2000 and Windows XP. Symptom Trying to view protected files or open the options window results in the error The authentication service is unknown (0x800706d3). Explanation It's likely that the remote procedure call (RPC) locator service has been removed from your computer. This is a communication service required for proper DCOM operation. The RPC service gets removed if you uninstall the Client for Microsoft Networks networking component. Solution You must reinstall Client for Microsoft Networks. To do so, see To add a network component in Windows Help. Once it is installed, you can disable it by clearing the checkbox next to it in the list. This prevents the client component from being used, but it does not remove the RPC files that DCOM applications require.
Windows 98 SE
This section describes DCOM configuration problems you might encounter under Windows 98 SE. Symptom When you try to view protected files or open the options window, nothing happens. Explanation It's likely that the Client for Microsoft Networks networking component has been removed from your computer. DCOM is frequently configured to use this networking component for communications. Solution You must reconfigure DCOM. To do this, run the file dcomcnfg.exe, which is usually located in the SYSTEM subfolder of your Windows folder. Click the Default Properties tab, then under Default Authentication Level, click (None). Click OK to apply the changes and close the window, then restart your computer.
249
If you entered your user name and password and nothing is happening, it might just be taking a while. Your connection to the server depends on various conditions. If nothing happens after several minutes, see the items below. If your user name and password are not accepted, make sure they are correct. Passwords are case-sensitive, so PASSWORD is not the same as password. If you keep getting prompted to reregister your computer or enter your logon information, and you are sure you have entered your user name and password correctly, it's possible that one of the following has happened:
"
The server software has been recently reinstalled. Restart your computer and try again. Your account has been locked out. This is most likely to happen if you are running Windows 9x/Me, and the server is authenticating users locally (not via a domain). In this case, the operating system on the server counts all Recovery Solution connections as invalid logon attempts. If you've restarted your computer several times in a row, you might have to wait until the account lockout expires, then restart your computer again in order to access Recovery Solution. Your administrator should be able to determine what the account lockout policy on the server is.
"
If the administrator has upgraded the copy of the console that is installed on the server, but has not yet upgraded the server software, you'll be unable to use Recovery Solution until the administrator completes the upgrade. You might want to let the administrator know that you are having problems. If you are running Windows 9x/Me and you log onto a Windows NT domain, make sure that your user name and password, as well as the name of the domain itself, do not contain extended ANSI characters. These characters have character codes greater than 127 and are commonly used in non-English languages (Example: umlauts and characters with accents). They cannot be used with Recovery Solution because of a limitation in the Microsoft DCOM security component. For more information, see Troubleshooting: DCOM on page 249. If your account contains such characters, you can do one of the following:
250
"
If you have another account without extended ANSI characters, you can uninstall Recovery Agent, log onto Windows using your other account, then reinstall Recovery Agent. If you do not have another account without extended ANSI characters, or if these characters are in the domain name itself, contact your administrator for help.
"
Certain networking and security components are required to be installed on your computer in order for Recovery Agent to work correctly. For more information, see Troubleshooting: DCOM on page 249.
If you still have problems, contact your Recovery Solution administrator for help.
If you are using an 800 x 600 screen resolution and displaying Large Fonts, you might need to move the Recovery Agent Options dialog box up a little bit on your screen before you can access the buttons. To do this, click the very bottom tip of the window title bar and drag it up as far as it will go. The buttons at the bottom should come into view.
! !
The 640 x 480 screen resolution is not supported. If you are running at this resolution, you should change to an 800 x 600 or higher resolution if possible. If you need to access the Recovery Agent Options dialog box buttons at a 640 x 480 resolution, you can use the following shortcut keys while the dialog box is displayed.
" "
Note Internet Connection Sharing uses the Windows firewall by default, so if you use Internet Connection Sharing then you could run into the same problem. If you are behind a corporate firewall, or on a VPN connection to a network that has a firewall, your computer is probably protected by that firewall and you can turn your personal firewall off. Assuming that the server is on the same network, this should allow all features to work properly. See also Firewall Configuration on page 271.
251
252
Chapter 14
Technical Reference
This section contains additional information about Recovery Solution.
! ! ! ! ! ! !
Product Limits (page 253) Performance Tips (page 254) Settings Information (page 257) Technical Information (page 276) Command Line Utilities (page 279) Stopping and Starting the Recovery Solution Server Service on page 289 Recovery Solution Infrastructure Backup and Restore (page 290)
Product Limits
Listed below are some of the known limits of Recovery Solution.
!
Data Protection & Recovery Limits The following restrictions apply to snapshots.
"
Recycle Bin files are automatically excluded from all snapshots. You cannot change this option. A maximum of 32767 versions of any one protected file can be stored on the cluster. On Windows 9x/Me protected computers, data that is transmitted to the server can be encrypted while in transit, but data that comes from the server cannot (i.e., snapshots are encrypted, but recoveries are not). This is because of a limitation of Windows 9x/Me, which cannot receive encrypted DCOM data.
"
"
Full System Recovery Limits The following restrictions apply to Full System Recovery.
"
Full System Recovery cannot be performed on a protected computer running disk compression software (such as DriveSpace or Stacker). Full System Recovery that copies data from the network might not work on Windows 95/98 computers that are using real-mode DOS drivers. Protected computers that were upgraded from Windows 3.1 to Windows 9x might be using such drivers. To perform Full System Recovery on these computers, you must either configure them to use Windows drivers, or include the real-mode drivers in the temporary operating system you place on CD-ROM. Alternatively, you can recover these computers completely from CD-ROM. Be sure to click the option to Include all user data on CD-ROM when creating the CD-ROM.
"
253
Performance Tips
Though not required to use Recovery Solution, the following information could help you get better performance from the product. The following topics are covered in this section:
! ! ! !
Data Protection Performance (page 254) Restore Performance (page 255) Changing DCOM Protocols (page 255) Configuring Microsoft Network Load Balancing (page 256)
You can help to improve the speed of baseline snapshots by seeding the cluster with files that exist on most users computers. Since Recovery Solution checks for the existence of each file on the cluster and only transfers it if is not already there, seeding the cluster with common operating systems, programs, and other files can reduce the amount of time that the initial snapshot takes for most or all protected computers. Seed the cluster just after you set it up, and before allowing users to take a snapshot. Many of the files being protected will then already exist on the cluster. Here are some examples of files you might want to initially add to the cluster.
"
Windows XP, Windows 2000, Windows NT, Windows Me, Windows 98, and Windows 95 installations. Applications used throughout your company, particularly those that take up moderate to large amounts of disk space. Common examples are Microsoft Office, Microsoft Internet Explorer, Netscape Communicator, and Lotus Notes. Common data files that might reside on many users hard disks.
"
"
If you seed the cluster with multiple protected computer installations, you should perform snapshots one at a time, allowing each one to complete before starting the next one. That way you are sure to get the maximum benefit from Redundant File Elimination and Redundant Block Elimination.
!
Try to avoid having a remotely connected computer be the first one to protect any particular application. Instead, protect a computer on the network that has this application installed to eliminate the need to transfer the application over a slow link. If snapshots are exceptionally slow for protected computers running Windows 2000/ XP, you might benefit from changing the primary DCOM protocol being used for communications. For more information, see Changing DCOM Protocols on page 255. If you are using Microsoft Network Load Balancing with Recovery Solution, snapshot performance can be improved by appropriately configuring your Network Load Balancing Cluster settings. For more information, see Configuring Microsoft Network Load Balancing on page 256. If your protected computers use HTTP protocol for communication with Recovery Server (for information, see Configuring Communication Settings on page 110), you can improve the performance of jobs on clients running Windows 98 SE and
254
Windows 2000, by clearing the Enable Integrated Windows Authentication (requires restart) checkbox in Windows Control Panel > Internet Options > Advanced tab > Security on client computers. In this case, a less secure (but more robust) NTLM protocol will be used for authentication with the server.
Restore Performance
Following are some tips you can use to ensure that recoveries run efficiently.
!
Over a dial-up connection, it is practical to restore up to a few tens of megabytes. For larger file sets, or for Full System Recovery, it makes more sense to ship user data on CDROM to the remote location. Alternatively, you can send the protected computer to a place where it can be connected at high speed to the server, and restore the data from there. If recoveries are exceptionally slow for protected computers running Windows 2000/ XP, you might benefit from changing the primary DCOM protocol being used for communications. For more information, see Changing DCOM Protocols on page 255.
On the protected computer, from the Windows Start menu, click Run. Enter DCOMCNFG.EXE. Do one of the following: Change the list of DCOM protocols used specifically for Recovery Solution. This is safer than changing the default DCOM protocols for the entire system. However, it involves a few more steps, and if Recovery Agent is ever uninstalled and reinstalled on the protected computer, the changes are lost and must be made again.
255
To change the list of protocols for Recovery Solution, do the following. a. b. c. d. On the Applications tab, in the Applications list, select Altiris Recovery Solution Agent. Click Properties. Click Endpoints. Click Add to add all missing protocols except Connection-oriented TCP/IP to the DCOM Protocols and endpoints list. This helps to ensure that a connection can be established even if something goes wrong with the TCP/IP communications. e. If Connection-oriented TCP/IP appears in the list but is not at the top, select it and click the Remove button. This is the only way to change its position in the list. If Connection-oriented TCP/IP does not appear in the list, add it to the list as follows. Click Add. In the Protocol Sequence list, click Connection-oriented TCP/IP. Click OK. Click OK to accept the changes.
f.
" " " " !
Change the default list of DCOM protocols for the entire system. Changing the default protocols for the system might give you similar advantages for other applications, but it might also cause problems for other applications that use DCOM and must use UDP for communications. In most cases, however, it should not matter which protocol is used. Example To change the list of default protocols, do the following: g. h. Click the Default Protocols tab. In the DCOM Protocols list, look for the item Connection-oriented TCP/IP. If you do not see it, add it to the list as follows.
" " "
Click Add. In the Protocol Sequence list, click Connection-oriented TCP/IP. Click OK. In the DCOM Protocols list, select Connection-oriented TCP/IP. Click the Move Up button repeatedly until Connection-oriented TCP/IP is at the top of the list.
i. j. 4. 5.
Click OK to save the changes and exit Distributed COM Configuration Properties. Restart the computer.
256
1. 2. 3.
Open Network Load Balancing Manager console for your cluster through Windows Start menu > Control Panel > Administrative Tools. Right-click cluster name in the Network Load Balancing Clusters list on the left and select Cluster Properties from the drop-down menu. In the Cluster Properties dialog window on the Port Rules tab select the Defined port rules for Recovery Solution and click the Edit button to open the Add/Edit Port Rule dialog window. Set Affinity to Single in the Filtering mode section. Click OK to save the settings and close the Add/Edit Port Rule dialog window. In the Cluster Properties dialog window go to Cluster Parameters tab and set Cluster operation mode to Multicast. Click OK to save settings and exit Network Load Balancing Manager.
4. 5. 6. 7.
Settings Information
This section contains additional information about settings created and used by Recovery Solution.
! ! ! ! ! ! ! ! ! !
User Account and Share Configuration (page 257) Microsoft SQL Server Settings (page 259) Event Log Configuration (page 261) Internet Information Server Configuration (page 261) ODBC Configuration (page 265) DCOM Configuration (page 266) RPC Dynamic Port Allocation (page 270) Firewall Configuration (page 271) Web-Based File Recovery Configuration (page 272) Job Schedule Worksheet (page 274)
257
Recovery Solution automatically creates the following user accounts and groups.
Description
Recovery Solution requires this special account for communicating (via DCOM) between the server and the protected computers. This account is given the minimum default rights assigned to users; it requires only the Access this computer from the network right to be used by Recovery Solution. The account is created locally on the server, so it cannot be used to access other computers on the domain. All the required accesses are configured through DCOM. This group is given the access rights to protect and restore files with Recovery Solution. You can change its name during Recovery Solution Server Setup, but not thereafter. By default, this group contains the Domain Users group, which means that all domain users have the necessary rights to protect their computers. Notes If you have users on trusted domains that you want to be able to use the server, you must add those users to the Domain Users group for the server or the AeXRS_Users group before they can use Recovery Solution. If the server is installed using local server security, this user group is granted the Log on locally right on the server, which is required for access to Web-based file recovery. If you do not intend to use Web-based file recovery, you can remove this right through Windows. If you want to restrict access to certain individual users, you will have to remove Domain Users from AeXRS_Users. Windows domains allow different types of user groups, including local and global. Because of the way the Windows security model works, you can simplify administration tasks by using a combination of local and global groups. Global groups can only contain users, but local groups can contain both users and global groups. For granting access, we recommend that you create a new global group in the domain, add the users to the global group, and then add the global group to the local group AeXRS_Users. This strategy offers you maximum flexibility in more complicated situationsyou get the ease of managing a global group for the individual users combined with the ease of adding other entire groups to the local AeXRS_Users group as appropriate. Example: if you begin your deployment by allowing access to a select group of pilot users (by creating a global group of those users and adding it to the AeXRS_Users local group), you can then easily expand by allowing access to one department at a time, simply by adding their department global groups to the AeXRS_Users local group.
258
Description
This group is given the rights to restore data for any client using the Migrate utility and Web-Based File Recovery. Members of this group have rights to perform certain Recovery Solution tasks through the Altiris Console.
Shared Folders
Recovery Solution Server Setup automatically creates a folder for Recovery Agent installation files and shares it so that users can easily install the software from this folder. By default, the folder is stored within the server program files folder.
Performance Enhancements
Currently, Recovery Solution Server Setup changes only the Max Worker Threads setting from its default. This change is based upon our experiences in two sets of early Beta deployments of the product. Max Worker Threads Configures the number of worker threads that are available to SQL Server processes. SQL Server makes use of the native thread services of the operating system. Instead of one worker thread, there are many. Each network that SQL Server simultaneously supports is supported by one or more threads, another thread handles database checkpoints, and a pool of threads handles all users. The max worker threads option allows you to control the number of threads allocated to the user pool. When the number of user connections is less than max worker threads, one thread handles each connection. However, if the number of connections exceeds max worker threads, thread pooling occurs. Additionally, if the configured value for worker threads is exceeded, the request is handled by the next worker thread that completes its current task. The default is 255. Microsoft Transact-SQL Reference Additional Information A worker thread performs a database operation on behalf of a client. While it may seem that one thread per connection is ideal for performance, an excessive number of threads will cause the server to spend more time simply managing the threads and can result in significant contention for CPU time among the threads. In a 1996 Compaq TPC-C benchmark with SQL Server 6.5 running on Windows NT 4.0, the optimal setting for max worker threads was 100, even with 5000 concurrent users.
259
Databases
Setup creates and configures databases as follows.
!
Recovery Solution Database The default name for this database is AeXRSDatabase, although during a custom installation you have the option to change it. Setup creates and configures the database as needed.
Database Backups Setup creates a backup device for the database. It also schedules regular backups of the database. For more information, see Job Schedule Worksheet on page 274.) Caution Make sure that the schedules for database backup and Recovery Server jobs (such as Server Space Management and Integrity Check) do not coincide; otherwise data storage corruption can occur.
Security
Setup makes the following changes to Microsoft SQL Server security settings.
!
SQL Login To limit any security risks, Recovery Solution creates its own Microsoft SQL Server login (named AeXRSDatabaseUser by default) that it uses whenever it needs to access the Recovery Solution database. This login is a member only of the db_owner fixed database role (not the sysadmin role as it used to be Recovery Solution 6.1 and earlier versions) in and has full access only to the Recovery Solution database. Its default password is password. Note The default password cannot be changed.
Authentication In Microsoft SQL Server 2000, the default authentication mode is Windows only. Recovery Solution Server Setup changes this to SQL Server and Windows to allow authentication via the SQL login created specifically for Recovery Solution.
Note For Recovery Solution to function properly, Notification Server admin must have dbo rights for Recovery Solution database.
260
Change Made
Event Log Wrapping: Overwrite Events as needed.
Reason
Prevents warning messages from appearing on the server when the event log fills up.
Application
Ensures that enough log entries are retained so that troubleshooting can be performed if necessary.
Application
Prevents warning messages from appearing on the server when the event log fills up. Recovery Solution Server uses this event log extensively, so it can fill up quickly.
We recommend that you leave these settings the way Setup has configured them.
261
The following virtual directories must exist in the IIS configuration on the server. Their settings must match those in the following table.
Agent
AsMext
LogFiles
WBFR
The AgentWeb subfolder of the shared Recovery Agent installation subfolder of the program installation folder. By default, this is C:\Program Files\Altiris\Recovery Solution\Server\Agent\ AgentWeb.
The ASMext subfolder of the shared Recovery Agent installation subfolder of the program installation folder. By default, this is C:\Program Files\Altiris\Reco very Solution\Server\ Agent\ASMext.
The LogFiles subfolder of the System32 subfolder of the Windows folder. By default, this is %WINDIR%\ System32\ LogFiles.
The folder where the Web-based file recovery program files are stored. If Web-based file recovery was configured automatically during installation of the server, then this is the folder that was specified for Webbased file recovery during Setup. By default, the folder is C:\Program Files\Altiris\Recovery Solution\Server\WBFR Read must be checked. Script must be selected.
Web access permissions Web application permissions Default Document(s) for Web Browsing
Read must be checked Execute (including scripts) must be selected. Enable Default Document must be checked, and Default.htm must be included as a default document.
Not required.
Enable Default Document must be checked, and Default.asp must be included as a default document.
262
Agent
AsMext
LogFiles
WBFR
Allow Anonymous Access must be checked. Integrated Windows authenticatio n (Windows 2000)
Allow Anonymous Access must be checked. Integrated Windows authentication (Windows 2000)
The SYSTEM user must have Full Access. The AeXRS_Manager s (or the name of your administrators group for Recovery Solution) must have Read access. The AeXRS_Users (or the name of your administrators group for Recovery Solution) must have Read access.
For Windows 2000, the folder and all contents must have the Allow inheritable permissions from parent to propagate to this object box cleared. The user group for Recovery Solution (by default AeXRS_Users) must have Read access to the main folder. The Everyone user group must have Full Access to the following contents.
All files in the Image subfolder. All files in the Image subfolder. All files in the Image subfolder. All *.class files. FileDownload.asp GetFiles.asp GetFolders.asp Global.asa LogOff.asp ServerUtils.asp Styles.css
263
AeXRSVault
The HTTPVault subfolder of the shared Recovery Agent installation subfolder of the program installation folder. By default, this is C:\Program Files\Altiris\Recovery Solution\Server\HTTPVault. Read must be checked Execute (including scripts) must be selected.
Web access permissions Web application permissions Default Document(s) for Web Browsing Web Authentication Methods Windows Folder Security Settings
Enable Default Document must be checked, and Default.htm must be included as a default document.
! ! ! !
Basic Authentication must be checked. Integrated Windows authentication (Windows 2000) The SYSTEM user must have Full Access. The AeXRS_Managers (or the name of your administrators group for Recovery Solution) must have Read, List, and Execute access. The AeXRS_Users (or the name of your administrators group for Recovery Solution) must have Read, List, and Execute access. The XUSR_RepNDM user must have Read, List, and Execute access.
Notes You can require users to establish an encrypted channel (https:// rather than http://) with your server before accessing the Web-based Setup Wizard or Web-Based File Recovery. The use of an encrypted channel, however, requires that the user's Web browser and your Web server both support the encryption scheme used to secure the channel. Before enabling encryption, you must install a valid server certificate. To require encryption in IIS, follow the procedure for enabling Secure Sockets Layer (SSL). For precise instructions, see the following topics in Internet Information Services section of Windows Help. Enabling Encryption Using Certificate Wizards Obtaining and Installing Server Certificates Configuring SSL
264
ODBC Configuration
During server setup, Recovery Solution configures Open Database Connectivity (ODBC) so that Recovery Solution can access its SQL Server databases. If you are having problems with Recovery Solution, you can verify that the configuration information is correct and update it yourself if necessary.
Click Add. Click SQL Server from the list and then click Finish.
5.
A wizard appears, walking you through the process of creating or modifying a data source to SQL Server. Set the values indicated below, and leave the defaults for any settings not mentioned here.
" " "
In the Name field, type AeXRSDatabaseDSN. In the Server field, type the name of the server, then click Next. Under How should SQL Server verify the authenticity of the login ID?, choose With SQL Server authentication using a login ID and password entered by the user. Make sure the checkbox labeled Connect to SQL Server to obtain default settings for the additional configuration options is checked, then enter the SQL user name for Recovery Solution (the default name is AeXRSDatabaseUser) and its password, and click Next. Click Change the default database to, then select the database for Recovery Solution (AeXRSDatabase) from the list. Note Check this box even if AeXRSDatabase already appears in the list.
"
"
Click Next. Click Finish. A confirmation screen appears next. Click the Test Data Source button to verify that the ODBC connection is working properly. You should then see a test results screen similar to the following.
6.
265
DCOM Configuration
For secure communications among the server, consoles, and protected computers, Recovery Solution uses the Microsoft Distributed Component Object Model (DCOM), which consists of a set of system files installed on each computer. DCOM is a common operating system component that provides both flexibility and added security for many applications that run on a network. Windows 2000/XP contains DCOM as part of the basic operating system. On Windows 9x computers, Recovery Agent automatically installs the latest version of DCOM if necessary. All Recovery Solution Setup programs configure DCOM as needed to run Recovery Solution. Caution In rare cases, the DCOM configuration might be changed so that Recovery Solution no longer works properly. This may happen when another, third-party, setup program has reinstalled or reconfigured DCOM improperly.
In the Console Tree, browse to Console Root/Component Services/ Computers/My Computer, and select it in the list. From the Action menu or the context menu, click Properties.
"
4. 5.
Click the Default Properties tab. Make sure the following default values are set.
" " "
Enable Distributed COM on this computer is checked. The Default Authentication Level setting is Connect. The Default Impersonation Level setting is Impersonate. This setting allows the server to use each protected computers network account to perform actions on behalf of the protected computer. It prevents a protected computer from potentially using the network credentials of the server itself to perform operations that it would not be able to perform on its own.
6.
!
Click the Default Security tab. Check the box labeled Enable remote connection. Click OK.
If the protected computer is running Windows XP, click OK to close the main DCOM properties dialog box, then in the Console Tree, expand My Computer/ DCOM Config. Scroll down the list until you see Altiris Recovery Solution Agent, and select that item.
"
266
In Windows XP, from the Action menu or the context menu, click Properties. In Windows 2000, click the Properties button.
Click the Security tab. Click the option to specify custom access permissions, then click the Edit button. Make sure that following users appear in the list, and are allowed access.
" "
INTERACTIVE SYSTEM
Note If you prefer, you can choose to use default permissions and then make the security changes described below in the main DCOM properties. However, we strongly recommend that you use custom permissions for the objects, since you might not want all COM objects to have the rights you will assign to Recovery Solution.
!
Configure the launch permissions to be the same as the access permissions you configured above. Click OK to close all open windows.
The local AeXRS_Managers group (or the name of your administrator group for Recovery Solution) INTERACTIVE SYSTEM
" "
Note If you prefer, you can choose to use default permissions and then make the security changes described below on the main tabs of the Distributed COM Configuration Properties window. However, we strongly recommend that you use custom permissions for the objects, since you might not want all COM objects to have the rights you will assign to Recovery Solution. 6. 7. 8. Click Use custom launch permissions, then click the Edit button and add the same users as you added for the access permissions in the previous step. Click OK until you get back to the main Distributed COM Configuration Properties window. In the DCOM Applications list, scroll down until you see Altiris Recovery Solution Server, and select that item.
267
Recovery Agent running on protected computers uses this object to communicate with the server. 9. Click the Properties button, then click the Security tab.
10. Click Use custom access permissions, then click the Edit button. Make sure that following users and groups appear here.
" " "
INTERACTIVE SYSTEM The local AeXRS_Managers group (or the name of your administrator group for Recovery Solution) The local AeXRS_Users group (or the name of your user group for Recovery Solution)
"
Click Use custom launch permissions, then click the Edit button. Make sure that following users appear here.
" "
INTERACTIVE SYSTEM
Caution Do not add XUSR_RepNDM or the AeXRS_Users local group to the Launch Permissions list. If you do, you will effectively lose control over when Recovery Solution is running. The reason is that this account is used automatically by all Recovery Agent installations. If it has launch permissions, then even if the service is stopped on the server, it will restart automatically as soon as a protected computer attempts to interact with the server. 11. Click OK until you get back to the main Distributed COM Configuration Properties window. 12. In the main Distributed COM Configuration Properties dialog box, click the Default Properties tab. 13. Make sure the following default values are set.
" " "
Enable Distributed COM on this computer is checked. The Default Authentication Level setting is Connect. The Default Impersonation Level setting is Impersonate.
This setting allows the server to use each protected computers network account to perform actions on behalf of the protected computer. It prevents a protected computer from potentially using the network credentials of the server itself to perform operations that it would not be able to perform on its own. 14. Click OK.
268
Abbreviations and acronyms Launch and activation permissions: LAct - Local Activation LL - Local Launch RAct - Remote Activation RL - Remote Launch Access permissions: LAcc - Local Access RAcc - Remote Access def - default lim - limit
LAct
def
LL
def
RAct
def
RL
def
LAct
lim
LL
lim
RAct
lim
RL
lim
LAcc
def
RAcc
def
LAcc
lim
RAcc
lim
X X X
X X X
X X X
X X X X X X X X X X X X
X X X
X X X X X
X X
AHMS {67B86D82-9B78-11D3-B597-00A0C91D0917}
LAct
X X X
LL
X X X
RAct
X X
RL
X X
LAcc
X X X
RAcc
X X
269
LAct
X X X X X
LL
X X
RAct
X X X X X
RL
X X
LAcc
X X
RAcc
X X
X X
X X
LAct
X X X
LL
X X X
RAct
X X X
RL
X X X
LAcc
X X X
RAcc
X X X
270
Firewall Configuration
To use Recovery Solution Server behind a firewall, a defined set of ports must be open to enable communication between the clients and the server. The following table lists these ports.
Protocol
TCP and UDP TCP TCP TCP UDP TCP
Port
135 (DCOM) 80 (HTTP) 443 (HTTPS) 43189 43190 >1024 (DCOM)
Direction
Both Both Both Inbound (to client) Inbound (to server) Both
When using DCOM for communication, you must open the port range (>1024) used for Remote Procedure Call (RPC) dynamic port allocation. For more information, see RPC Dynamic Port Allocation on page 270. Notes You must open port 80 in case you are using HTTP for communication between clients and Recovery Server. You must open port 443 in case you are using HTTPS for communication between clients and Recovery Server. You must open ports 135, 1024 and above in case you are using DCOM for communication between clients and Recovery Server. You do not have to open port 43189 inbound to client if you enable the Allow Recovery Agent to initiate scheduled snapshot option in the Agent Settings. For details, see Configure Snapshot Settings on page 78. By default, when the Recovery Solution Agent service starts on protected computers running Windows XP or Windows 2003 Server, it will add port 43189 to the Windows Firewall Exceptions list. This functionality is controlled through the Enable Altiris Recovery Agent to modify Windows Firewall settings checkbox. For details, see Configure Miscellaneous Settings on page 94.
271
Move the WBFR folder to an NTFS drive on the server. Convert the drive where the Web-based file recovery program files are stored to an NTFS drive. You can do this using the Windows CONVERT.EXE command-line program. Caution Conversion to NTFS is an irreversible action. After converting a drive to NTFS, you cannot go back to the FAT file system without destroying the data on the drive.
2.
On the server, open a command prompt and enter the following command. REGSVR32.EXE Web-based file recovery folder\WFEngine.dll Replace Web-based file recovery folder with the full path to the Web-based file recovery program files (by default, this is C:\Program Files\Altiris\Notification Server\Client Recovery Server\WBFR), but a different folder might have been specified during installation of the server.
3.
Open the Internet Service Manager program. Note In Windows 2000, the default Start menu shortcut is Start > Programs > Administrative Tools > Internet Services Manager.
4.
Create a new virtual directory for the Web-based file recovery folder as follows.
" "
In the Console Tree, select the Default Web Site item for the server. From the Action menu or the context menu, click New, then click Virtual Directory. Step through the wizard until you are prompted to specify an alias for the virtual directory, then specify one. The alias is the folder name that users will access when restoring files. To keep the configuration simple and consistent with the documentation, we recommend that you specify the default alias WBFR. After you have specified an alias, click Next.
"
"
Specify the full path to the folder containing the Web-based file recovery program files, then click Next. Accept the default access permissions, which should include Read and Script access, but nothing else. Click the Next and Finish buttons as necessary to complete the wizard.
"
5.
272
" "
In the Console Tree, select the virtual directory. From the Action menu or the context menu, click Properties. Do one of the following.
"
If the server is running Windows 2000, then on the Virtual Directory tab, change the Application Protection option to Low (IIS Process). Click the Documents tab. Make sure that the checkbox labeled Enable Default Document is checked, and that Default.asp appears as one of the default file names in the list. If it does not, add it using the Add button. Configure access to the virtual directory as follows.
"
" "
Click the Directory Security tab. Under Anonymous access and authentication control, click the Edit button. Clear the Anonymous access checkbox. You may also clear the box labeled Basic authentication (password is sent in clear text). Check the box labeled Integrated Windows authentication (Windows 2000). Click OK in all open dialog boxes until you return to the main Internet Service Manager window.
" "
" "
6.
Configure Windows security for the Web-based file recovery program files as follows. In the Web-based file recovery program files folder, open the properties for the following items, click the Security tab, and make sure that the Everyone group has Full Access rights to them. All files in the Image subfolder. The Image folder. All *.class files. FileDownload.asp GetFiles.asp GetFolders.asp Global.asa LogOff.asp ServerUtils.asp Styles.css When you have finished, click OK to close the Properties dialog box.
If the server is running Windows 2000, then for all files in both the main Web-based file recovery folder and the Images subfolder, click Properties/Security and clear the checkbox labeled Allow inheritable permissions from parent to propagate to this object, then click OK. Open the properties for the main Web-based file recovery program files folder, WBFR. Click the Security tab.
273
If the server is running Windows 2000, clear the checkbox labeled Allow inheritable permissions from parent to propagate to this object. Give the user group for Recovery Solution (by default AeXRS_Users) the Read access permission to the folder. You can remove any other access rights to the folder, although you might want to give yourself and/or other administrators full access. (Even if you do not, you can add the permissions later if the need arises.) When you have finished configuring the security permissions, click OK to close the Properties dialog box.
10. Open properties of the Default Web Site > WBFR. 11. Under the WBFR Properties page, change the application pool for the WBFR virtual directory to the newly created application pool. 12. Click OK to save the changes.
274
table below. The table also provides a sample schedule that you might wish to use as a guide.admin
Default Schedule
Actual Schedule
Sample
Typically Occur Daily Monday - Friday 8:00 A.M. to 5:00 P.M.
Scheduled Snapshots
Daily Monday - Friday 7:00 A.M. to 7:00 P.M. Daily Monday - Friday 5:00 A.M. to 7:00 A.M. Daily 7:00 A.M. to 8:00 A.M.
None
None
Database Backup
Deletion
None
275
Default Schedule
Weekly Sunday 1:00 A.M. to 11:59 P.M.
Actual Schedule
Sample
Weekly Sunday 1:00 A.M. to 1:00 P.M. Sunday after 5:00 P.M.
Idle Time
Integrity check
" " " "
checks the Altiris partition checks the databases integrity checks the BLOB files for consistency cleans up the corruptions in the database and BLOB files (if a BLOB cannot be repaired it will be deleted) optimizes the database for better performance
" !
deletes files which were selected by the user for deletion (the files in the golden image and the files marked as locked will be never deleted) deletes the files added to the Exclude list by the user deletes the revisions of the files according to the Storage Space Management rules defragments the BLOB files residing on the BootWorks partition
" "
"
Technical Information
This section contains miscellaneous technical information about Recovery Solution.
" "
Protected Computer IP Address Updates (page 277) How Recovery Works (page 277)
276
"
If the IP address change requires the protected computer to be restarted, then the update does not occur until the computer is restarted. If the IP address change does not require the protected computer to be restarted, then the IP address update happens automatically the next time any of the following events occurs.
" "
Approximately 510 minutes passes. Periodic updates are sent automatically. Recovery Agent is restarted. This normally occurs only when the computer is restarted, but it is also possible to restart Recovery Agent by stopping and starting the Control Panel service Altiris Recovery Solution Agent.
"
A Dial-Up Networking connection on the protected computer is started or disconnected. Snapshot on idle runs.
"
2.
277
Files are reconstructed quickly, so there is usually little time difference between Recovery Solution restore and a simple file copy. Recovery Solution does all of these things automatically. If a user restores an entire folder or a drive, Recovery Solution performs these actions for each restored file. The result is that the user gets complete copies of restored files as they were at the time of a snapshot. You can also use either rollback or Full System Recovery to return the files on the computer to their state at a selected point in time. This can be useful to reverse unwanted changes to the operating system and other important files. Users can also perform rollbacks themselves. Specific files can also be restored from Full System Recovery CD-ROMs if the protected computer is bootable. This can be useful if a remote user is not on the local network and needs to restore files quickly. A Full System Recovery CD-ROM can be passwordprotected, in which case an Recovery Solution user name and password are required to access the files on the CD-ROM. For more information on password-protection and access to CD-ROM data, see Full System Recovery Disk Creation on page 134.
278
Since files increase in size more frequently than they decrease, in many cases the size of the version being recovered is an adequate estimate of the largest file size. Example: Suppose 3 files are being recovered, with file sizes 200 KB, 250 KB, and 100 KB. If the 250 KB file has always been the largest file, and it was once 400 KB at the time of a snapshot, then use 400 KB as an estimate of the largest file size. 2. Add the sizes of any remaining files being recovered. Example: To 400 KB, add the sizes of the other two files (200 KB and 100 KB). The total amount of disk space needed to recover the files is 700 KB.
Local Recovery has a number of utilities, which you can use to work on Altiris partition. The following utilities are described:
! !
AeXRSEnc Utility
AeXRSEnc.exe utility lets administrator encrypt and decrypt the policy.cfg file that contains Recovery Agent settings on client computers. The utility is especially useful in case Recovery Solution is installed without Notification Server. In this case administrator can modify Recovery Agent setup package to contain custom agent settings. The recovery.xml file is an ASCII file that controls where the Recovery Agent stores its settings and accessibility to which tabs in the agent UI is controlled via password. This file is encrypted using Microsoft's implementation of RC2 algorithm with 40bit encryption key. This algorithm is widely used in a number of commercial software packages, including Lotus Notes, Microsoft Windows, Internet Explorer and Netscape Communication's Navigator and Communicator (refer to the RSA Data Security, Inc. web site at http://www.rsasecurity.com for more details on this algorithm). To replace the policy.cfg file in AgentSetup.exe package you can use the ASPack utility found in install path\Altiris\Recovery Solution\Console\Tools folder on the computer where Recovery Solution is installed.
AeXRSEnc.exe -e|-encrypt
To decrypt the recovery.cfg outputting the decrypted recovery.xml file in the current working directory, run:
279
AeXRSEnc.exe -d|-decrypt
For help, run:
<SnapshotSettings> - Snapshot and Snapshot Schedule settings <SnapshotExcludes> - Snapshot excludes <RollbackExcludes> - Rollback excludes <SpaceManagement> - Space Management settings
280
! ! !
<SpaceUsage> - Storage quota settings (server-based mode only) <HealthAlerts> - Health Alerts settings (server-based mode only) <BandwidthThrottling> - Bandwidth Throttling settings (server-based mode only) <MiscSettings> - Miscellaneous settings <ConnectionManagement> - Connection Management settings (server-based mode only) <UserRights> - User rights <RemoteAccessSettings> - Remote Access settings (server-based mode only) <TransportSettings> - Transport settings (server-based mode only) <HiddenTransportSettings> - Transport settings that depend on cluster network settings (server-based mode only) <StorageManagement> - Storage settings (local mode) <F11RecoverySettings> - F11 Recovery settings (local mode)
! !
! ! ! !
! !
The sub-categories contain two attributes (that exist only in policy.cfg file and absent in usrcfg.xml): permission and inherit. The permission attribute controls the settings behavior. The inherit attribute is not used by Recovery Agent, it was reserved for the Altiris Console usage only. The permission attribute can have one of the three values:
!
ReadOnly - the settings for this sub-category are taken from policy.cfg and cannot be modified by user from the Recovery Agent Options. Edit - the settings for this sub-category could be overridden by user settings modified from the Recovery Agent Options. The overridden settings are stored in usrcfg.xml. In case of Edit permission, the settings for current sub-category will be first looked up in usrcfg.xml and if they are absent then the settings will be taken from policy.cfg. Append - this attribute is used only for Snapshot and Rollback excludes. In case of the Append permission, the settings (list of excludes) are taken from policy.cfg and usrcfg.xml.
Caution We do not recommend manual modification of policy.cfg or usrcfg.xml files, because any misprint can cause the Recovery Agent to become totally unusable. The best practice is to modify the settings from the Altiris Console. Here is the example of how to modify the Hide client UI settings using the policy file:
!
Get the AeXRSEnc.exe utility and copy it to the Recovery Agent Config subfolder. Then run it using the following command line:
AeXRSEnc.exe -d
This will decrypt the policy.cfg file to policy.xml.
!
Find the HideClientUI tag that reflects the Hide client UI settings in the Altiris Console and modify this setting (set to enabled attribute to True) Check that XML file format is correct and readable by opening it using the Microsoft Internet Explorer. If XML file is correct, then delete policy.cfg file and run the following command line to encrypt policy.xml file to policy.cfg:
281
AeXRSEnc.exe -e
!
To force the Recovery Agent rereading policy.cfg file and to apply the modified setting, run the following command in the Recovery Agent folder:
AeXCmd.exe /ApplySettings
Here is the example how to modify the scheduled snapshot starts time:
! !
Decrypt the policy.cfg file using the AeXRSEnc.exe utility (like in previous example). Locate the <StartTime> tag inside the <SnapshotSettings> sub-category in policy.xml file. Modify the time inside the <StartTime> tag (please use the same time format). Check the policy.xml file and encrypt and apply it like in the previous example.
! !
The following figure shows sample policy.xml file settings. Note that to hide all Recovery Agent user interface elements, the enabled attribute of the <HideClientUI> tag must be True, and the following <CommonSettings> must be False:
! ! ! ! !
AeXMigrt.com Utility
The purpose of the AexMigrt.com utility installed with Recovery Solution into the folder install path\Altiris\Recovery Solution\Console\Tools on Notification Server computer is to let administrators automate retrieval of files from the Recovery Server for a client or a set of clients. This section contains the following topics:
! ! !
Overview (page 282) Command-line parameters (page 285) (with usage examples) Input XML files (page 287) (with usage examples)
Overview
The AeXMigrt.com utility runs on a computer where Recovery Agent installed and configured to connect to the Recovery Server to restore files from. Utility accesses the Recovery Server using the Recovery Agent, so the Recovery Agent must be fully functional (not disabled) on the computer. Note We recommend disabling scheduled snapshots and snapshots on events for the client, otherwise these snapshots can affect the utility workflow. The utility can run on Microsoft Windows 2000 and later platforms. It does not support Windows 98. The utility uses command-line parameters , the list of protected computers and the search mask supplied at run time to perform the following operations:
282
Authenticate on the Recovery Server to obtain the list of files for specified protected computers. Create a list of files that must be restored. Initiate restore operation using the Recovery Agent.
! !
Use cases
Administrator wants to locate and restore a particular file (including all revisions) from selected computers backing up to the Recovery Solution Server. The utility automatically creates folders for each computer where the file exists during the restore. When multiple revisions of the file exist then the incremental ID is added to the name of the file revision (myfile001.txt, myfile002.txt etc.). The destination folder can be a local drive or a network share.
Restore
The utility lets the user restore files or folders by their name, name mask or location. Also, it is possible to restore files from a particular date range. There is no UI available for the search pattern configuration all options must be provided using the commandline parameters or in an XML file. To search for files, the utility enumerates files that were backed up from a particular client to the Recovery Server and applies the specified mask to locate the required files. The search engine creates the list of files that fall under specific criteria specified by the user and will be restored. Note Specifying a more precise search mask will significantly decrease the search time. The utility performs an automated restore for files specified by the supplied mask and that were backed up from the specified computers to the Recovery Server. The utility accepts the file or folder name masks and the list of computers as input parameters, searches for these files on the Recovery Server and submits the restore job for the found items. The utility waits for the submitted job to complete complete and logs the resulting event into the activity log. The restore itself is performed by the Recovery Agent, using the list of found files. The utility creates the restore specification and submits the restore jobs to the Recovery Server. Depending on the number of files found, the utility submits either one or more restore jobs. In case of multiple jobs, utility submits them one by one, waiting for each job to complete. Destination folder for a restore operation must be provided using the command-line or the default one will be used. The default subfolder aex_restored is created in the location from where the utility has been launched.
283
So if the file "mymail.pst" has 10 revisions and "restore all revisions" parameter was specified, the restored folder will contain files: Mymail(001).pst Mymail(002).pst ... Mymail(010).pst All file creation and modification dates will be restored correctly for corresponding versions, and it is up to the user to find the required one.
Authentication
The utility accesses the Recovery Server under a logged-on user account or an account specified in the command-line parameters or the specified XML file. If the utility fails to access the Recovery Server using the specified credentials, it will log the corresponding entry into the log file. The utility accepts accounts from the AexRSUsers or AeXRSManagers groups. For an account from the AexRSUsers group, only files from protected computers that belong to the particular user can be restored. For accounts from the AeXRSManagers group, the files from all protected computers can be restored.
Utility executions start time Name of the currently logged user Name of the Recovery user selected to authenticate on Recovery server List of machines that are available for search Destination folder List of found files Any information about errors that occur during execution
Any internal utility errors that occur the execution will be logged to the activity log file. Any errors that occur during the restore job execution and the status of restore operation for found files will be logged into the Windows application log as usual.
284
Command-line parameters
The restore operation can be started by specifying the mandatory "/R" parameter. All other parameters are optional. The following table lists the parameters recognized the by utility.
Parameter
Description
Perfrom restore Specifies the particular client machine name or name mask to search files for. If not specified, utility will search files on all machines that can be accessed by user specified in logon dialog. Specifies the file name or file name mask to search for. More than one mask can be specified. Optional, if no masks (file or folder) specified, all files will be restored. Specifies the folder or folder mask to search for. More than one mask can be specified. Optional, if no masks (file or folder) specified, all files will be restored. Specifies that all revisions of found file must be restored. Optional, if not specified latest revisions of file(s) will be restored. Valid only for restore operation. Specifies an optional time based filter. Only file revisions that are newer than specified date will be restored. The utility will accept only one mask of this type but it can be used with "/ToDate". Valid only for restore operation. Specifies an optional time based filter. Only file revisions that are older than specified date will be restored. The utility will accept only one mask of this type but it can be used with "/FromDate". Valid only for restore operation. Specifies a full path to XML file with parameters for restore/deletion operation. If specified, the utility will obtain search masks and other parameters from XML file. NB! Parameters provided from command line will override parameters from XML file, except search masks and client machines that will be used as additional to one specified in XML. See Input XML files (page 287).
/R /M:<computer_name>
/File:<file_name>
/Folder:<folder_name>
/All
/FromDate:"MM/DD/YY
/ToDate:"MM/DD/YY
/XML:<full_path_to_xml>
285
Parameter
Description
Valid for restore operation, specifies a folder to restore found files into. Optional, if not specified, utility will restore found files into its current location subfolder aex_restored. The destination can be local, UNC path, or a mapped network location. Stops execution of previously started restore operation. Login name (DOMAIN\User) to authenticate on Recovery Server. Optional, if not specified, utility will try to authorize under currently logged user. Password to authenticate on Recovery Server. Optional, if not specified (but / Login was specified), empty password will be used. Ignored if "/Login" was not specified. Full path to log file that will be generated by utility. Optional, if not specified, utility will generate log file in folder where it resides. Displays a dialog with utility usage scenarios.
/Dest:<destination_folder>
/S /Login
/Pass
/L:<log_file_path>
/?
Usage examples
The following table gives some examples on how the restore operation can be configured from the command line.
Sample task
Search all clients and restore all found PST files Search all clients and restore all found Word and Excel documents Search client XRG200 for folder C:\Documents and restore its content. Search all clients and restore all found PST files into c:\tmp folder using ALTIRIS\Britney account with password "oops". Search all clients and restore all revisions of found PST files that were included in snapshots performed between 10/11/ 2006 and 10/12/2006. Cancel restore.
Command
AexMigrt.com /R /File:"*.pst" AexMigrt.com /R /File:"*.doc" / File:"*.xls" AexMigrt.com /R / Folder:"C:\Documents" / M"XRG200" AexMigrt.com /R /File:"*.pst" / Login:"ALTIRIS\Britney" / Pass:oops /Dest:"C:\tmp" AexMigrt.com /R /File:"*.pst" / All /FromDate:"10/11/2006" / ToDate:"10/12/2006" AexMigrt.com /S
286
<?xml version="1.0" encoding="utf-8"?> <Operations> <Operation type="restore" Dest="c:\Tmp" Login="ALTIRIS\Britney" Pass="oops" LogFile="C:\britney.log" FromDate="10/11/2006" ToDate="20/11/2006"> <Machines> <Machine Name="PC1"/> <Machine Name="PC2"/> <Machine Name="PC3"/> </Machines> <SearchItems> <Item type="File" Name="party.img"/> <Item type="File" Name="mail.pst"/> <Item type="Folder" Name="C:\photo*"/> </SearchItems> </Operation> </Operations> Sample XML file 2
The following sample XML file configures the utility to restore all revisions of two files "party.img" and "mail.pst" and all revisions of files in all folders on disk C: that starts with "Photo" that were modified between 10/11/2006 and 10/12/2006. This operation will be performed for all computers to which currently logged user has access. The Recovery Server will be accessed under currently logged-on user account. All activity logging will be performed into "C:\britney.log" file.
287
<?xml version="1.0" encoding="utf-8"?> <Operations> <Operation type="restore" Dest="c:\Tmp" LogFile="C:\britney.log" Versions="all" FromDate="10/11/2006" ToDate="10/12/2006"> <Machines> </Machines> <SearchItems> <Item type="File" Name="party.img"/> <Item type="File" Name="mail.pst"/> <Item type="Folder" Name="C:\photo*"/> </SearchItems> </Operation> </Operations> Overriding XML values with command-line parameters
It is possible to override parameters specified in XML file by providing corresponding parameters from command line: The following sentence executes the restore operation for the XML file specified above using "D:\restoredstuff" folder as destination.
BWINST Utility
Bwinst is a utility that is useful for removing an Altiris Partition in case the Altiris Partition remains after the software has been uninstalled. It is also useful for clearing out the marked bad sectors if the Altiris Partition is gone, but the bad sector marks remain. The Bwinst utility can be obtained from the Altiris Console > Tasks tab > Incident Resolution > Recovery Solution > Altiris Partition Removing Utility.
bwinst -rs -u -rs : operate on the Recovery Altiris Partition -u : uninstall the partition
288
-d<HDD number> : remove partitions from additional HDDs (-d1 (default) means
removing Altiris Partition from HDD0, -d2 from HDD1 etc.)
RECREATE Utility
Recreate is a collection of files that can be used to restore a system from RSDATA, when the disk with the original RSMAIN partition fails. Recreate will format a new disk, destroying any data thereon, and install a new RSMAIN Altiris Partition on that disk. This disk can then be used to access the RSDATA partition, and the data it holds. Recreate utility is usually needed if a user cannot boot from the hard drive on which Altiris partition was created. Otherwise, the user can simply boot from the disk drive containing the Altiris Partition instead. The Recreate utility is available per request from the Altiris Technical Support.
partmake.bat
Note If there is more than a single disk on the system, Recreate will prompt the user for the correct disk. After Recreate runs, restart the machine from the new RSMAIN disk. It will then boot to the Recovery partition and restore the user's data.
289
Note Altiris Recovery Solution Server service depends on the Altiris Recovery Server Host Manager (ping service). Stopping the Altiris Recovery Server Host Manager (ping service) also stops the Altiris Recovery Solution Server service. If you stop the Altiris Recovery Solution Server service by itself, the Altiris Recovery Server Host Manager will automatically restart the server service on start-up.
Recovery Solution Infrastructure (page 290) Backup (page 291) Restore (page 294)
The SQL Server computer with Notification Server Database. A Windows Server computer with Notification Server and Recovery Solution. Each Recovery Solution cluster can have its own SQL Server computer with Recovery Solution Database. Any number of Recovery Solution Server computers. Every such computer has its own local Windows group for Recovery Solution users; it also has ODBC DSN string for communication with the Recovery Solution Database computer.
290
Backup
Generally, to get a complete snapshot of an Recovery Solution 6.2 SP3 installation, you must back up the following pieces of information:
!
On computer with SQL Server that hosts the Notification Server Database:
"
The Notification Server Database. Either the complete database must be backed up, or only Recovery Solution-related data (see Notification Server Database Backup on page 291). "Linked Server" entries to SQL Server computers with Recovery Solution databases. SQL Server Enterprise Manager allows doing this easily via rightclick on "Linked Servers" node in the Enterprise Manager console, and selecting "Export List..." menu item. Note This step is only needed if the Notification Server database is located on a different SQL server rather than Recovery Solution database.
"
On computers with SQL Servers that host Recovery Solution databases (for all Recovery Solution clusters):
"
The Recovery Solution Database (see Recovery Solution Database Backup on page 292). AeXRSDatabaseUser login account This account can be seen under Security\Logins node in the Enterprise Manager console. Right click provides "Export List..." menu item.
"
For every Recovery Solution cluster, Recovery Solution data files must be backed up as well (see Data Files Backup on page 293). For clusters that use load balancers, load balancer configuration must be backed up. Since this information is balancer-dependent, there is no step-by-step instruction for backup procedure. Please refer to the specific load balancer's documentation.
Backup_All_RS_Clusters.sql - creates a backup database named RS_Backup_DB, then backs up all RS clusters-related data into that database. Restore_All_RS_Clusters.sql - restores information about all RS clusters from the RS_Backup_DB.
291
! ! !
Backup_Single_RS_Cluster.sql - backs up information about a single cluster. Restore_Single_RS_Cluster.sql - restores information about a single cluster. Create_RS_Backup_DB.sql - creates an empty RS_Backup_DB. Should be called before Backup_Single_RS_Cluster.sql in cases when there is no backup database.
Caution These scripts do not backup RS Agent Settings and RS Agent Rollout policies. So changes to these settings will be lost after restore. Notes Every script has a comment in the beginning, describing its usage. Before running Backup_Single_RS_Cluster.sql and Restore_Single_RS_Cluster.sql scripts, you must specify proper cluster GUID. To get the Recovery Solution cluster GUID, open Properties for the Recovery Solution cluster you want to back up in the Altiris Console.
292
e. f. g. h.
Under Backup, click Database - complete. Under Destination, click Add. In the Click Backup Destination dialog box, click File name. Specify the full path and file name. You can use the ... button to locate a path. The path is where the database backup will go. The file name is the file that you will have your backup software back up.
i. j. k. l. 3.
Click OK. Click Overwrite existing media. Click OK to start the backup. Have your backup software back up the file you created.
If the server is running MSDE: a. b. Open an MS-DOS style command prompt. Change to the BINN subfolder of the folder containing the MSDE program files. You can use a command such as the following. CD /D "D:\MSSQL7\BINN" c. Enter the following command. OSQL.EXE -U sa -P -n -Q "BACKUP DATABASE AeXCRDatabase TO DISK = 'e:\AeXCRDatabase.dat'" AeXRSDatabase is the default name of the database. If your installation of Recovery Solution uses a different database name, make the appropriate changes in the above command. The path and file name specified at the end can be modified to any appropriate location. This command could be scheduled through Windows Task Scheduler or the AT command-line program. Database backups can also be scheduled using a SQL script. For details, see the Microsoft knowledge base article Q241397, which is available on the Microsoft Web site (http://www.microsoft.com).
4.
Use your backup software to back up the protected data (BLOB) files. See Data Files Backup (page 293).
293
"
The main data file is AeXRSDatabase_Data.MDF, in a folder named AeXRSDatabase. You might have additional data files. Typically the next name would be AeXRSDatabase_Data.NDF. The log file is AeXRSDatabase_Log.LDF, in a folder named AeXRSLog.
"
"
2.
Restore
If only the Recovery Solution Database or the data files got corrupted, there is no need to restore the Notification Server Database. In such cases skip the "Notification Server Database Restore" section. Similarly, if only the Notification Server Database got corrupted, there is no need to restore the Recovery Solution databases or data files of Recovery Solution clusters. Note, however, that if the Notification Server Database is restored from an old backup, then the restored database will not contain information about recently created Recovery Solution clusters and their settings. The Recovery Solution can be restored using either of the two approaches:
294
3. 4. 5. 6. 7.
Recovery Solution SQL database should be restored using SQL Server tools. For information, see Recovery Solution Database Restore (page 295). Recovery Solution data files should be restored from backup to original location. See Data Files Restore (page 295). Recovery Solution Server should be installed to the same machine where it was originally installed. If Recovery Solution Database created on different SQL server than Notification Server database, then saved ODBC DSN string should be restored as well. You should also restore the AexRSDatabaseUser account backed up at step AeXRSDatabaseUser login account (page 291) if it is missing.
295
d. e. f. g. h. i. j. k. 4.
In the Details Pane, under Backup, click Restore database. For Restore, click From device, then click Select Devices. For Restore from, click Disk, then click Add. Specify the file name of the backed up database, then click OK. Click OK again to return to the Restore database screen. Click the Options tab. Click Force restore over existing database. Click OK.
If the server is running MSDE: a. b. Open an MS-DOS style command prompt. Change to the BINN subfolder of the folder containing the MSDE program files. You can use a command such as the following.
CD /D "D:\MSSQL7\BINN"
c. Enter the following commands.
OSQL.EXE -U sa -P -n -Q "DROP DATABASE AeXRSDatabase" OSQL.EXE -U sa -P -n -Q "RESTORE DATABASE AeXRSDatabase FROM DISK = 'e:\AeXRSDatabase.dat'"
AeXRSDatabase is the default name of the database. If your installation of Recovery Solution uses a different database name, make the appropriate changes in the above commands. The path and file name specified at the end should point to the existing database backup file. 5. 6. Once the database restoration is complete, restore the BLOB files back to their original location. Use Windows Control Panel to restart the Altiris Recovery Solution Server service.
296
Appendix A
297
ATP865
AIC-7896 AIC-7896/7 AIC-7899 AIC-7899A AIC-7899D AIC-7901 AIC-7901 AIC-7902 AIC-7902B ASC-29320 ASC-29320A ASC-29320ALP ASC-29320LP ASC-39320 ASC-39320 ASC-39320A ASC-39320D
298
LSI Logic
LSI53C1035 LSI53C1510 LSIFC909 PDC20268 PDC20268R PDC20269 PDC20271 PDC20275 PDC20276 PDC20318 QLA2100 Sil 3114
LSIFC919 LSIFC929
Promise Technology
SiS180
VSC7174
Caution RAID arrays must be configured on the supported RAID adapters prior to running any tasks.
RAID controllers supported for server-based Full System Recovery HP SmartArray 641 SmartArray 5i
Dell CERC SATA 6ch PERC 4/DC NVIDIA Silicon Image SATA 4 3112A PERC 4e/Si PERC 4/Di RAID
299
Index
A
access problems with 212 accounts for users 257 administration options 169 administrator 163 administrator settings 163 Administrators Guide 16 AeXRSEnc utility 279 Altiris Helpdesk 16 Altiris Monitor Solution 16 Altiris PC Transplant Solution integration with 152 Altiris Recovery Partition 17, 63, 64, 171 check for errors 171 manage 170 of event log contents 204 dial-up networking 175 disks for recovery 134 Distributed Component Object Model see DCOM 17 Distributed Component Object Model (DCOM) 255, 266 documentation 16 domain account 57 Domain Name System 176 DOS drivers and recovery 253 drive configuration changes 94, 95 overview 131 problems with 216 requirements for 132, 133 running 143 setup for 133 full system recovery 17, 189 full system snapshot 158 command line 152
G
groups for users 257
H
hard disks formatting during Full System Recovery 144 hard drives replacement of 213 help 16 hiding progress indicator 94, 94, 94, 95, 95, 95, 95
E
encrypted files files and encryption 253 encryption 171 errors during Setup 206 Event Details 198 event log clearing 204 configuration of 261 configuring 204 saving to file 204 event log file 194 event messages viewing 202 Event Viewer 197 searching 197 using 193 exclamation mark icon on protected computer 66 excluding files 183 excluding files from snapshots 81
B
bandwidth 90 bandwidth throttling 90, 165 baseline snapshot 17
I
installation 26 and new hard drives 213 errors 41 of Web-based file recovery 272 prerequisites 26 problems with 208 Recovery Agent 51 Recovery Agent Setup Wizard 54 Internet Information Server (IIS) 261 IP address of protected computers 277
C
CD-ROMs for recovery 134, 136 clearing the event log 204 clusters 14 command line and snapshots 147 configuration of DCOM 255, 266 of Full System Recovery 133 of IIS 261 of ODBC 265 connection troubleshooting 211
L
last snapshot 164 license 44 limits of recovery 132 of Recovery Solution 253 load balancing 14 local mode 14 Local Recovery 15 Local Recovery Pro 15 log file 194 logon problems 212 logs 170
D
data defining for rollback 80, 91 migrating 129, 146 migrating using PC Transplant Pro 131 recovering 131 database errors installing 206 DCOM 17, 171, 255, 266 DCOMCNFG.EXE 267 deletion
F
files excluding from snapshots 81 protected 159 restoring 160 files types restoring 180 filters for rollback data 80, 91 formatting hard disks during Full System Recovery 144 Full System Recovery creating disks for 134
300
M
manual snapshots 147 Microsoft Internet Information Server (IIS) 261 Microsoft Office 158 Microsoft Outlook 177 Microsoft SQL Server and ODBC 265 Microsoft Windows and recovery 137, 278 Migrate utility 130 migration using PC Transplant Pro 131 mirrored Blob files 14 mixed mode 14
preferences Recovery Agent 173 prerequisites 26 problems with Agent installation 208 with Full System Recovery 216 with rollback 224 with Setup 206 with snapshots 213 product overview 13 progress indicator hiding 94, 94, 94, 95, 95, 95, 95 properties of file exclusion 82, 87 protected computer 18 protected files 159 protocols for DCOM communications 255
requirements 26 restore command line 152 restore options 165 restore session 18 restoring file types 180 files 160 restoring files (see recovery) 277 restoring network settings 212 rollback 165 files 187 of network settings 212 problems with 224 rollbacks 18, 187 RSACmd.exe utility 152
N
network and bandwidth 90 network configuration restoring 212 network protocols for DCOM communications 255 network settings 161
S
scheduled snapshots conditions 199 on idle 199 view schedule for 158 schedules for server jobs 274 for snapshots 212 worksheets for 274 SCSI drives and Full System Recovery 136 server limiting connections to 90 server-based mode 14 settings updates in database 277 setup for Full System Recovery 133 of Web-based file recovery 272 silent snapshots 94, 94, 94, 95, 95, 95, 95 snapshot command line 147 schedule 158 snapshot conditions 168 snapshot session 18 snapshot types 167 snapshots and recovery 131 displayed 159 excluding files from 81 from applications 147 performance of 254 problems with 213 scheduled 199 scheduling 199 silent 94, 94, 94, 95, 95, 95, 95 speed of 254 Software Delivery 15 Solution Center 35
R
Real-Time System Manager 16 recovery 255 about 137, 277 and disk space 278 and DOS drivers 136, 253 creating disks for 134 over the Web 192, 272 problems with 216 requirements for 278 to a new computer 129, 146 Recovery Agent 18 existing account 57 Full System Recovery 174 installation 51 Installation Policies 48, 68 installation using Setup Wizard 54 installing 60 options 157 preferences 173 register 56 settings encryption utility 279 Recovery Agent options changing 162 viewing 157 Recovery Solution logs 170 Versions 160 Recovery Solution Server 58 Recycle Bin 253 Redundant Block Elimination (RBE) 278 Release Notes 16 remote access options 175 remote procedure call (RPC) RPC 255 removal of logged events 204 of Recovery Solution 44
O
Open Database Connectivity (ODBC) 265 operating systems temporary copies of 137, 278 options administration 169 for file exclusion 82, 87 for Full System Recovery 133 for recovery 134 performance 166 Recovery Agent 157, 157, 162 remote access 175 restore 165 options dialog box tabs 162 using 162 overview of Recovery Solution 13 overwriting logged events 204
P
partial snapshot 18 running 159 Patch Management Solution 15 PC Transplant Solution 16 performance of recovery 255 of snapshots 254, 254 performance of 255 performance options 166
301
T
temporary operating systems 137, 278 throttling bandwidth 90, 165 troubleshooting 227 Agent installation 208 Full System Recovery 216 logon problems 211, 212 rollback 224 Setup 206
U
uninstalling Recovery Solution 44 user accounts and groups 257
V
version information 205 Virtual Private Network see VPN 19 VPN 19, 175
W
Wake on LAN 81 Web-based file recovery 192, 272 Windows and recovery 137, 278 Windows Explorer perform snapshots through 158 wizards for web-based setup 53 worksheet job schedule 274
302