HP Data Protector A.06.11 Integration Manual page 6

For microsoft applications sql server, sharepoint portal server, exchange server, and volume shadow copy service
Hide thumbs Also See for Data Protector A.06.11:
Table of Contents

Advertisement

Restoring to another client .................................................................... 115
Restoring using the CLI ............................................................................... 116
Troubleshooting .............................................................................................. 117
Before you begin ...................................................................................... 117
Checks and verifications ............................................................................ 117
Problems .................................................................................................. 119
Protector ......................................................................... 123
Introduction .................................................................................................... 123
Integration concepts ........................................................................................ 124
Configuring the integration ............................................................................... 125
Prerequisites ............................................................................................. 125
Limitations ................................................................................................ 126
Before you begin ...................................................................................... 126
Cluster-aware clients .................................................................................. 126
Configuring Exchange Server users ............................................................. 126
Configuring Exchange servers .................................................................... 126
Checking the configuration ........................................................................ 127
Backup .......................................................................................................... 128
Creating backup specifications ................................................................... 128
Modifying backup specifications ................................................................. 132
Scheduling backup specifications ................................................................ 132
Scheduling example ........................................................................... 132
Previewing backup sessions ........................................................................ 133
Using the Data Protector GUI ............................................................... 133
Using the Data Protector CLI ................................................................ 134
What happens during the preview? ...................................................... 134
Starting backup sessions ............................................................................ 134
Using the Data Protector GUI ............................................................... 134
Using the Data Protector CLI ................................................................ 135
Restore ........................................................................................................... 135
Before you begin ...................................................................................... 135
Restoring using the Data Protector GUI ........................................................ 135
Restoring using the Data Protector CLI .......................................................... 142
Restore examples ................................................................................ 144
Monitoring sessions ......................................................................................... 145
Performance tuning .......................................................................................... 145
Troubleshooting ............................................................................................... 147
Before you begin ...................................................................................... 147
Checks and verifications ............................................................................ 147
Problems .................................................................................................. 148
6

Advertisement

Table of Contents
loading

Table of Contents