Backing Up The Database And Logs - Symantec 20032623 - Endpoint Protection Small Business Edition Implementation Manual

Implementation guide
Table of Contents

Advertisement

306
Preparing for disaster recovery

Backing up the database and logs

Step
Action
Step 2
Back up the disaster recovery file.
Step 3
Save the IP address and host name of the
management server to a text file (optional).
Step 4
Copy the files you backed up in the previous
steps to another computer.
Backing up the database and logs
High-level steps to prepare for disaster recovery (continued)
Table 22-1
See
Performing disaster recovery"
See
Backing up your license files"
See the knowledge base article called
the Symantec Endpoint Protection
Symantec recommends that you back up the database at least weekly. You should
store the backup file on another computer.
The backup file is saved in the following folder, by default:
Files\Symantec\Symantec Endpoint Protection Manager\data\backup
The backups are placed in a .zip file. By default, the backup database file is named
date_timestamp.zip, the date on which the backup occurs.
Note: Avoid saving the backup file in the product installation directory. Otherwise,
the backup file is removed when the product is uninstalled.
Description
The recovery file includes the encryption password, keystore
files domain ID, certificate files, license files, and port
numbers.
After you install the management server, copy the
compressed recovery file to another computer. By default,
the file is located in the following directory:
Drive:\\Program Files\Symantec\ Symantec
Endpoint Protection Manager\Server Private
Key Backup\recovery_timestamp.zip
If you have a catastrophic hardware failure, you must
reinstall the management server using the IP address and
host name of the original management server.
Add the IP address and host name to a text file that is called
Backup.txt.
Copy the backed up files to a computer in a secure location.
on page 311.
on page 66.
Best Practices for Disaster Recovery with
Manager.
Drive:\Program
.

Advertisement

Table of Contents
loading

This manual is also suitable for:

Endpoint protection small business edition

Table of Contents