VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

25
F4220-Server Management TABLE OF CONTENTS TOPICS CONTETS PAGE Contents i 1.0 Veritas NetBack-up 1 1.1 Introduction of Veritas NetBack-up 1 1.2 Characteristic 1 1.3 Feature of Veritas NetBack-up 2 1.4 How it Works 3 1.4.1 Diagram of NetBackup Vault manages the entire cycle of ape duplication and offsite vaulting 5 1.5 Actions Menu 6 1.5.1 Actions Menu 6 1.6 Backup Menu 7 1.6.1Diagram of Backup, Archive, and Restore – NetBackup 7 1.7 NetBackup Window 8 1.7.1 Diagram of NetBackup Window 8 2.0 Acronis True Image 9 2.1 Introduction 9 2.2 Characteristics 9 2.3 Feature of Acronis True Image 9 2.4 Step and Actions Menu 10 2.4.1 Diagram of Acronis True Image Home – main page 11 2.4.2 Diagram of Acronis True Image flow process 13 3.0 Norton Ghost 15.0 14 3.1 Introduction 14 3.2 Characteristic 14 3.3 Feature of Norton Ghost 15.0 15 3.4 How it Works 16 3.4.1 Diagram of Define Backup, Run Backup, Recover Data 17 1

description

Assignment Software Back-Up

Transcript of VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

Page 1: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

TABLE OF CONTENTS

TOPICS CONTETS PAGE

Contents i

1.0 Veritas NetBack-up 1

1.1 Introduction of Veritas NetBack-up 1

1.2 Characteristic 1

1.3 Feature of Veritas NetBack-up 2

1.4 How it Works 3

1.4.1 Diagram of NetBackup Vault manages the entire cycle of

ape duplication and offsite vaulting 5

1.5 Actions Menu 6

1.5.1 Actions Menu 6

1.6 Backup Menu 7

1.6.1Diagram of Backup, Archive, and Restore – NetBackup 7

1.7 NetBackup Window 8

1.7.1 Diagram of NetBackup Window 8

2.0 Acronis True Image 9

2.1 Introduction 9

2.2 Characteristics 9

2.3 Feature of Acronis True Image 9

2.4 Step and Actions Menu 10

2.4.1 Diagram of Acronis True Image Home – main page 11

2.4.2 Diagram of Acronis True Image flow process 13

3.0 Norton Ghost 15.0 14

3.1 Introduction 14

3.2 Characteristic 14

3.3 Feature of Norton Ghost 15.0 15

3.4 How it Works 16

3.4.1 Diagram of Define Backup, Run Backup, Recover Data 17

4.0 Differentiation between Veritas NetBack-up and Acronis True Image 18

References 19

1

Page 2: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

1.0 Veritas Netback-up

1.1 Introduction of Veritas Netback-up

Veritas NetBackup is an enterprise level heterogeneous(pelbagai) backup and recovery suite. It provides cross-platform backup functionality to a large variety of Windows, UNIX and Linux operating systems. Users can set up profiles to control what, when and how backups are duplicated, and when tapes will be shipped to and from the offsite vault to help ensure minimal data loss in the event of a disaster.

The NetBackup Browser is configured to work with a specific NetBackup client. When a user starts an operation using the NetBackup Browser, the browser software sends the appropriate messages to its designated NetBackup client. The software on the NetBackup client then communicates with the server and handles the client side of the operation. NetBackup client software enables server directed backup, archive, and restore operations on entire folders or individual files that reside on an NetBackup client. This software also allows performing user directed backup, archive, and restoring operations on your NetBackup client, without logging into the NetBackup master server.

In NetBackup terminology, the system that requires the backup or archive is the NetBackup client. The system that manages the storage and retrieval of the backup data is called the NetBackup master server.

1.2 Characteristic

Comprehensive Tape Rotation To facilitate disaster recovery, NetBackup Vault coordinates the movement of backup media (tapes) to and from an offsite storage facility, at minimal cost and maximum efficiency.

Fully Automated Preset vaulting profiles determine which backups are duplicated or sent offsite, and for how long they are retained. NetBackup Vault also automatically sends a backup of the NetBackup catalog (database) offsite, along with the regular backup tapes, to aid in the recovery process.

Vault Job Queue Automate disaster recovery preparations even further by enabling vault jobs to queue up inside of NetBackup and complete when resources are available.

Low Maintenance Tapes to be sent offsite are automatically ejected each day for tape-handling personnel to quickly package and ship.

2

Page 3: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

Offsite Media Tracking Onsite and offsite tape inventories are meticulously recorded and tracked in the NetBackup database, so you always know where a tape is supposed to be

Container Vaulting NetBackup Vault supports the vaulting of closed containers of backup media, providing the ability to track and report on media, the containers in which they reside, and the return dates of those media and containers.

Detailed Vault Reporting Like clockwork, daily pick list reports show which tapes need to be shipped offsite or returned onsite, making it easy to coordinate with offsite personnel and data storage vendors.

Report Consolidation and Granularity Generate a single detailed report and assign distribution granularity for reports.

1.3 Feature of Veritas NetBack-up

Full BackupWhen the NetBackup master server is configured to perform a full backup, NetBackup backs up all files in a specified folder or drive to a storage unit. The archive bit is cleared as each file is backed up. If the full backup fails, NetBackup will attempt another full backup at the same time each day until successfully completed. A successfully completed backup will include all files.

Cumulative-Incremental BackupWhen the NetBackup master server is configured to perform a cumulativeincrementalbackup, NetBackup backs up all files that have changed since the last successful full backup.Cumulative incremental backups can be configured to use either the datetime stamp or the archive bit. If the datetime stamp is used, the cumulativeincremental backup includes all files with a datetime stamp that are more recent than the last full backup. If the archive bit is used, the cumulative-incremental backup includes all files that have their archive bit set. Archive bits are not cleared on cumulative-incrementals.

Differential-Incremental BackupWhen the NetBackup master server is configured to perform a differentialincremental backup, NetBackup backs up all files that have changed since the last successful backup. Differential incremental backups can be configured to use either the datetime stamp or the archive bit. If the datetime stamp is used, the differentialincremental backup includes all files with a datetime stamp that are more recent than the last backup, full or incremental. If the archive bit is used, the differential-incremental backup includes all files that have their archive bit set. Archive bits are cleared on differential-incrementals if the file is successfully backed up.

3

Page 4: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

True Image BackupA True Image Backup takes place when the True Image Restore Information attribute has been set on the NetBackup master server. When this attribute is set, NetBackup collects additional information necessary to restore a folder to exactly what it was at the time of the full backup or incremental backup. Only those backups, performed with the True Image Recovery Informationattribute set on the NetBackup master server, can be used for the true imagerestore.

1.3.1 VERITAS NetBackupTM 6.0 Vault Option

1.4 How it Works

AUTOMATIC TAPE EJECTIONSIMPLIFIES MEDIA MANAGEMENTOne of the more challenging tasks involved with vault management is collecting the tapes to be sent offsite every day. Manually ejecting the correct tapes from a large robotic tape library is more difficult than it sounds when there are dozens or even hundreds of tapes to choose from. Too often, operations managers are forced to add this mundane and time-consuming activity to the large list of tasks their overworked staff is already responsible for, simply because they are usually the only people who can access the backup application and determine the right tapes to eject and send offsite. There’s a more efficient way with NetBackup Vault. Tape ejection is handled automatically based on preset profiles that determine which tapes should be sent offsite each day. NetBackup Vault takes full advantage of a robotic tape library’s cartridge access port (CAP), or media access port (MAP), and places the tapes to be vaulted in this

4

Page 5: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

holding area so tape-handling personnel can simply empty the tapes from the CAP or MAP and box them up for shipment. There is no need to first determine which tapes should be vaulted or to involve the operations staff.

TRACKING MEDIA OFFSITEBackup tapes are often one of the most overlooked security holes in any organization. When sent offsite, backup tapes become vulnerable and could fall into the wrong hands. It is crucial to know at all times which tapes have been sent offsite and where they are stored. Unfortunately, manually tracking dozens or even hundreds of tapes stored at multiple locations is cumbersome and virtually impossible to do with 100 percent accuracy, requiring endless bookkeeping and manual data entry. NetBackup Vault meticulously(dengan cermat) tracks the location of every tape by vault and slot number or container ID in the NetBackup database, as well as when each tape is set to expire, eliminating the need for clumsy spreadsheets and time-consuming data entry. NetBackup Vault can support any number of vaults for businesses that require multiple offsite storage locations.

VAULT REPORTINGNetBackup Vault includes a series of essential reports such as picking list for robot, return list from vault, various inventory lists, and the recovery report for use in recovery situations. These reports help communicate status between onsite and offsite locations, and provide an important way to coordinate directives with offsite data storage vendors.

For example, one of the most important reports, the pick list report, documents all the tapes that are transferred offsite for a particular day. NetBackup Vault automatically assigns offsite slot identifiers for use by the offsite vendor according to a numerical slot range allocation. Reports are generated manually or automatically, and results can be output in print, e-mail, or file formats, as well as electronic report formats supported by Iron Mountain’s SecureBase application.

5

Page 6: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

1.4.1 NetBackup Vault manages the entire cycle of ape duplication

and offsite vaulting.

#1-NetBackup Vault duplicates backups according the preset policies.

#2-NetBackup Vault automatically ejects tapes from the robotic tape library to be sent offsite.

#3-Tape are packaged and shipped to the offsite vault.

#4-NetBackup Vault records and tracks location and expiration of each tape.

#5-NetBackup Vault automatically e-mails report to offsite facility requesting tapes to be returned.

#6-Expired tapes are shipped back onsite.

#7-Tapes are loaded back

6

Page 7: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

1.5 Actions Menu

1.5.1 Actions menu

The commands on the Actions menu provide overall control of your NetBackup session.Backup Files and FoldersOpens the NetBackup Backup window. From this window, select files, folders, or registry keys to back up and then start a backup or archive operation.

Restore...Opens the submenu and provides access to the following commands.

Restore from BackupOpens a NetBackup Restore window. From this window, select files, folders, or registry keys saved during previous backups and start a restore operation.

Restore from Archived BackupOpens a NetBackup Restore (Archive) window. From this window, can select files, folders, or registry keys saved during previous archives and start a restore operation.

Restore from Raw Partition BackupOpens a NetBackup Restore (Raw Partition) window. From this window, can select raw partitions saved during previous rawpartitian backups and start a raw partition restore operation.

Restore From True Image BackupOpens a NetBackup Restore (True Image) window. From this window, can select files, folders, or registry keys saved duringprevious true image backups and start a true image restore operation.

Proxy Restore from BackupThis feature allows a user on a Windows NT machine to browse the backups of the local Windows NT machine. The remote user can select files, folders, or registry keys from the backup and restore to the remote machine. NetBackup will see all the requests as if they were coming from the remote Windows NT machine.

Proxy Restore from Archived BackupThis feature allows a user on a Windows NT machine to browse the archive backup of the local Windows NT machine. The remote user can select files, folders, or registry keys from the backup and restore to the remote machine. NetBackup will see all the requests as if they were coming from the remote machine.

7

Page 8: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

Proxy Restore from Raw Partition BackupThis feature allows a user on a Windows NT machine to browse the Raw Partitian backup of the local Windows NT machine. The remote user can select files, folders, or registry keys from thebackup and restore to the remote machine. NetBackup will see all the requests as if they were coming from the remote machine.

Proxy Restore from True Image BackupThis feature allows a user on a Windows NT machine to browse the True Image backup of the local Windows NT machine. The remote user can select files, folders, or registry keys from the backup and restore to the local machine. NetBackup will see all therequests as if they were coming from the remote machine.

1.6 Backup MenuThe Backup menu appears when the NetBackup Backup window is active. Thecommands on the Backup menu control backup operations.

1.6.1 Backup, Archive, and Restore - NetBackupBackup Marked Files...Opens the Backup Marked Files dialog box. User can also execute this command by clicking Backup on the NetBackup Backup window toolbar.

Specify NetBackup Machines...Opens the NetBackup Backup Options dialog box to the Servers property sheet.

Options... Opens the Options dialog box to the Backups property sheet.

Add to Exclude List Adds the selected files, folders, or registry keys to the Exclude File List.

Add to Include List Adds the selected files, folders, or registry keys to the Include File List.

8

Page 9: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

1.7 NetBackup Window

1.7.1 NetBackup Window

This window shows the files, folders, or registry keys you can mark for back up.Access this window:• From the Actions menu, click Backup Files and Folders• From the toolbar, click Browse BackupUser can position this window separately. User can also cascade, tile or minimize the window by using commands from the Window menu.

9

Page 10: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

2.0 Acronis True Image

2.1 Introduction

Acronis True Image Home solves all backup problems, ensuring the safety of all information on PC. Using it, user can back up selected files and folders, or entire disks and partitions.

If failures occur that block access to information or affect system operation, or if accidentally delete necessary files, it easily to restore the system and lost data.

The unique technology developed by Acronis and implemented in Acronis True Image Home allows to create exact, sector-by-sector disk backups, including all operating systems, applications and configuration files, software updates, personal settings and all of the data.

If want to install a new hard disk drive, Acronis True Image Home will help to transfer information from the old one in minutes, including operating systems, applications, documents and personal settings.

2.2 Characteristics

Acronis True Image Home stores only those hard disk parts that contain data (for supported file systems). Further, it does not back up swap file information (win386.swp under Windows 98/Me and pagefile.sys under Windows NT/2000/XP) and hiberfil.sys (a file that keeps RAM contents when the computer goes into hibernation). This reduces image size and speeds up image creation and restoration.

A partition image includes all files and folders independent of their attributes (including hidden and system files), boot record, FAT (file allocation table), root and the zero track of the hard disk with master boot record (MBR).

A disk image includes images of all disk partitions as well as the zero track with master boot record (MBR).

2.3 Feature of Acronis True Image

Acronis True Image Home can create full, incremental and differential backups.

1. A full backup contains all data at the moment of backup creation. It forms a base for further incremental or differential backup or is used as a standalone archive. A full backup has the shortest restore time as compared to incremental or differential ones.

2. An incremental backup file only contains data changed since the last full or incremental backup creation. Therefore, it is smaller and takes less time to create. But as it doesn’t contain all data, all the previous incremental backups and the initial full backup are required for restoration.

10

Page 11: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

3. A differential backup creates an independent file, containing all changes against the initial full archive. Generally, a differential backup will be restored faster than an incremental one, as it does not have to process through a long chain of previous backups.

A standalone full backup may be an optimal solution if the user often roll back the system to the initial state (like in a gaming club or Internet café, to undo changes made by the guests).

Alternatively, if user are interested in saving only the last data state to be able to restore it in case of system failure, consider the differential backup. It is particularly effective if data changes tend to be little as compared to the full data volume.

The same is true for incremental backup. In addition, it is most useful when need frequent backups and possibility to roll back to any of stored states.

4. Acronis Secure Zone

The Acronis Secure Zone is a special hidden partition for storing archives on the computer system itself. For archive security purposes, ordinary applications cannot access it.

Acronis Secure Zone is always available for archive creation as long as there is space for the backup file.

2.5 Step and Actions Menu

1. Acronis Startup Recovery Manager

How it works

The Acronis Startup Recovery Manager enables starting Acronis True Image Home without loading the operating system. With this feature, if the operating system won't load for some reason, it can run Acronis True Image Home by itself to restore damaged partitions. As opposed to booting from Acronis removable media, it will not need a separate media or network connection to start Acronis True Image Home.

2. Acronis Snap Restore

With this feature it can boot the OS on a crashed computer before the system is completely restored from an image, and start work seconds after the restoration is launched. The restoration will be continued in the background.

This feature is currently available for images being restored from the Acronis Secure Zone (see above). Naturally, Acronis Snap Restore cannot be used if the image contains no operating system (a logical partition or disk image) or when restoring file archives. Also, Snap Restore of Windows 98/Me systems is not supported.

11

Page 12: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

How it works

When the restoration procedure is started, Acronis True Image Home:

1. Finds the sectors in the image which contain system files, and restores these sectors first. Thus, the OS is restored and can be started in a very short timeframe.

2. Writes on the hard disk its own drivers, which intercept system queries to the files. When the user opens files or launches applications, the drivers receive the system queries and restore the sectors that are necessary for the current operation.

3. At the same time, Acronis True Image Home proceeds with the complete sector-by-sector image restoration in the background. However, the system requested sectors have the highest priority.

The main program window contains the menu, the toolbar, the sidebar, the Active Tasks pane and the main area. The main area contains operation icons, while the sidebar features Tools and Help panels.

2.5.1 Acronis True Image Home- main page

The Operations or Tools menu.

The main window contains operation icons divided into two groups.

The Task group contains the following operations:

12

Page 13: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

Backup - create a backup archive

Recovery - restore data from a previously created archive

Clone Disk - transfer the OS, applications and data from the old disk to the

new one.

Add New Disk - add a new disk for data storage leaving the OS and applications

on the old one.

The Tools group contains the following items:

Mount Image - connect a disk/partition image as a virtual drive

Unmount Image - disconnect the connected virtual drive

Validate Backup Archive - run the archive integrity checking procedure

Show Log - open the Log Viewer window

Manage Acronis Secure Zone - create, delete and resize a special hidden partition for

storing archives (Acronis Secure Zone)

Activate Acronis Startup

Recovery Manager - activate the boot restoration manager (F11 key).

Manage System Restore - turn on/off Microsoft Windows System Restore tool and

set its options directly from Acronis True Image Home.

Program menu

The program menu bar features the Operations, View, Tools and Help items.

The Operations menu contains a list of the available operations, including scheduling tasks.

The View menu contains items for managing the program window look:

Toolbars - contains commands that control toolbar icons

Common Task Bar - enables/disables the sidebar

Status Bar - enables/disables the status bar

Active tasks - enables/disables the Active Tasks pane at the bottom of the main area.

13

Page 14: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

2.5.2 Acronis True Image flow process.

14

Page 15: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

3.0 Norton Ghost 15.0

3.1 Introduction

Protect any kind of data to keep on computer by making a backup of data entire of the hard disk. Or, limit the backup to include only those files and folders that mean the most to user. The schedule backups to capture the changes automatically as a work from day to day. Or start a backup manually at any time. It easily to configure Norton Ghost to run a backup in response to specific events. For example, a backup can run when a particular application is started. Or, a backup can run when a specified amount of new data is added to the drive. Restore a file, folder, or an entire drive also can be done. This recovery process returns computer to a previous, functional state with the operating system, applications, and data files intact. Or accidentally delete a personal file get it back with a few steps.

Schedule the backups to run after hours when a computer is idle. When disaster strikes, Norton Ghost helps to recover a computer from the effects of many common problems, including

1. Virus attacks: Damage might be done before a virus is quarantined.2. Faulty software installations: Some software can negatively affect the computer’s performance, and slow it down to the point that programs or documents require too much time to open. But when installed, removing a program might not recover unintentional damage by the installation.3. Hard drive failure: Data can become corrupted on a system drive (typically C), making it impossible to start an operating system4. Files accidentally deleted or overwritten: Accidental deletion of files is common, but often costly.5. Corrupted files: Individual files and folders can become corrupted by viruses, or when a program used to modify them encounters an error.

3.2 Characteristics

1. Cold Imaging lets back-up computer files without installing Ghost.2. Blu-ray Disc allows to back up large amounts of data to high-capacity Blu-ray Disc - up

to 25 GB per disc (50 GB dual-layer).

3. Windows® 7 support including support for Bitlocker™ provides enhanced data protection through drive encryption and integrity checking.

4. Symantec ThreatCon integration leverages intelligence from Symantec’s industry-leading security research organization to automatically backup files whenever ThreatCon reaches a specified threat level.

15

Page 16: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

3.3 Feature of Norton Ghost 15.0

Upgrade your hard driveUse Norton Ghost to create a copy of hard disk before upgrading to another one. Create an image file on removable media, or clone directly to another computer using a network, USB, or parallel connection. For even greater flexibility, Norton Ghost supports Linux EXT2, as well as Microsoft FAT and NTFS file systems. Norton Ghost determines the partition sizes for the destination drive automatically. Once the hard disk is installed, restore saved files by cloning the old hard disk onto the new hard disk, or restoring a saved image file.

Back up and recover your computerUse Norton Ghost to create an image file of your computer on removable media, such as CD-R/RW, ZIP disks, and JAZ disks, and back up an entire hard disk or selected partitions. Use it for weekly backups or specific events, such as the installation of a new operating system. If it run out of space when backing up to a removable disk, Norton Ghost prompts to insert another disk or save to an alternate location. Once an image is created, use Norton Ghost to restore the hard disk or any of the partitions saved.

Clone disks at optimum speedNorton Ghost saves you time when:-Copying one hard drive onto another-Loading an image file from one hard drive to another when both drives are installed in the same computer.

1. Full system (disk image) computer backup easily backup everything on a hard drive or partition.

2. File and folder backup let’s back-up only the files and folders chosen, rather than backing up and entire disk.

3. File backup search finds and backs up only the types of files chosen, such as photos, MP3 files, and documents.

4. Incremental backup copies only files that have changed for fewer, faster backups.

5. Customizable, event-based backup triggers backups based on key events, such as when install a new program or when there are sudden increases in data storage.

6. Offsite backup copies recovery points to a FTP site for easier offsite backup management.

7. NAS backup gives the option of backing up files to network-attached storage devices.

8. Advanced compression automatically compresses files can store more files in less space.

9. Advanced encryption helps keep sensitive documents safe from prying eyes.

16

Page 17: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

10. System protection lets easily restore system, applications and files even when pc can’t restart the operating system.

11. Google Desktop™ integration makes data recovery even faster with searchable backup indexes.

12. LightsOut Restore lets you quickly restore the system without needing a bootable CD.

13. Remote management lets remotely control other Norton Ghost installations (12.0 and higher) on the local area network.

14. Scheduled P2V allows to automatically create a virtual disk from most recent backup.

15. Version support lets restore older disk images made with Ghost 10, 12 and 14.

16. Multiple storage options let back up to almost any media, including Blu-ray Disc®, CDR/RW and DVD+-R/RW drives, USB and FireWire® (IEEE 1394) devices, network drives, and Iomega® Zip® and Jaz® drives.

3.4 How it Works

While Norton Ghost does the work of backing up your files, folders, or entiredrives, user need to tell Norton Ghost what to backup, when to back it up, andwhere to put the backed up data.

Refer to diagram 3.4.1 Define Backup, Run Backup, and Recover Data for information how Norton Ghost process.

17

Page 18: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

3.4.1 Define Backup, Run Backup, Recover Data

4.0 Differentiation between Veritas NetBack-up and Acronis True Image

18

Page 19: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

Different between

Veritas NetBack-Up Acronis True Image1 Full Backup

-Is configured to perform a full backup, NetBackup backs up all files in a specified folder or drive to a storage unit.

-The archive bit is cleared as each file is backed up.

-A full backup contains all data at the moment of backup creation.

-It forms a base for further incremental or differential backup or is used as a standalone archive.

-A full backup has the shortest restore time as compared to incremental or differential ones.

2 Cumulative-Incremental Backup-Is configured to perform a cumulative incrementalbackup, NetBackup backs up all files that have changed since the last successful full backup.

-Cumulative incremental backups can be configured to use either the datetime stamp or the archive bit.

- If the archive bit is used, the cumulative-incremental backup includes all files that have their archive bit set. Archive bits are not cleared on cumulative-incrementals.

-An incremental backup file only contains data changed since the last full or incremental backup creation.

-It is smaller and takes less time to create.

3 Differential-Incremental Backup-Is configured to perform a differential incremental backup, NetBackup backs up all files that have changed since the last successful backup.

-Differential incremental backups can be configured to use either the datetime stamp or the archive bit.

-Archive bits are cleared on differential-incrementals if the file is successfully backed up.

-A differential backup creates an independent file, containing all changes against the initial full archive.

-A differential backup will be restored faster than an incremental one, as it does not have to process through a long chain of previous backups.

4 True Image Backup-A True Image Backup takes place when the True Image Restore Information attribute has been set on the NetBackup master server.

-Only those backups, performed with the True Image Recovery Information attribute set on the NetBackup master server, can be used for the true imagerestore.

The Acronis Secure Zone-Is a special hidden partition for storing archives on the computer system itself.

-Acronis Secure Zone is necessary for using Acronis Startup Recovery Manager and Acronis Snap Restore features

19

Page 20: VERITAS NetBackup™, Acronis True Image 9.0 Home, Norton Ghost 15.0.Back Up Software

F4220-Server Management

References

Web reference for Veritas NetBackup:1. http://en.wikipedia.org/wiki/NetBackup

2. http://seer.support.veritas.com/docs/278434.htm

Web reference for Acronis True Image:1. http://kb.acronis.com/content/3290

2. http://en.wikipedia.org/wiki/Acronis_True_Image

3. http://download.microsoft.com/download/2/b/9/2b99fd0d-5437-40d7-a430- 23e31cac7ece/Deployment_Cookbook.VS_Acronis_FINAL.doc

Web reference for Norton Ghost User Guide / Norton Ghost 15.0:1. http://servi.icis.pcz.pl/files/Ghost_guide.pdf

2. ftp://ftp.symantec.com/public/english_us_canada/products/ghost/10/manuals/ Ghost_10_User_Guide.pdf

3. http://www.symantec.com/norton/support/top_ts_issues.jsp? pvid=nghost_15&id=tech_issues&selected_nav=5

20