SlideShare une entreprise Scribd logo
1  sur  20
Best Practices & Time-Saving
Techniques for Protecting Exchange




                         ©2011 Quest Software, Inc. All rights reserved.
Agenda
•   Challenges in protecting Exchange
•   Recommended best practices for protecting and
    recovering Exchange
•   Solutions for Exchange available today
•   Quest data protection solutions




                                                                                               1

                                             ©2011 Quest Software, Inc. All rights reserved.
Challenges
• Exponential data growth
• Email is increasingly seen as mission-critical
• Less tolerance for data loss and prolonged downtime
• Increasing number of requests to discover and recover
  data from within Exchange




                                                                                              2

                                            ©2011 Quest Software, Inc. All rights reserved.
Plan for The Unexpected
• Server Failure                    • Single Mail Item Loss
 – OS failure, hardware failure      – A user inadvertently hard-
                                       deletes an important mail item
• Database Failure
 – Database corruption or disk      • Site Disaster
   failure                           – Power outage, network
                                       outage, natural disaster
• Single Mailbox Loss
 – A mailbox is deleted and needs
   to be recovered




                                                                                                     3

                                                   ©2011 Quest Software, Inc. All rights reserved.
Gather Organizational Requirements
• Measure the value your organization places on its
  email data
• What are the acceptable levels of data loss?
• What is the acceptable length of time for service and
  data restoration?
• Where are my Exchange Servers located?




                                                                                             4

                                           ©2011 Quest Software, Inc. All rights reserved.
Exchange Protection Approaches




                                                                                   5

                                 ©2011 Quest Software, Inc. All rights reserved.
Set Recovery Objectives
• Recovery Time Objective (RTO)
 – The amount of time elapsed between a loss or disaster and the
   restoration of business operations. It is the time required to physically
   recover the data or application and have it ready for use


• Recovery Point Objective (RPO)
 – The point in time that recovered data will be recovered to.
 – For example, if you recover a file that was backed up yesterday then
   your recovery point is one day




                                                                                                            6

                                                          ©2011 Quest Software, Inc. All rights reserved.
Create a Service Level Agreement (SLA)
• Obtain agreement on objectives in the form of a SLA
• Include the following categories:
 – Availability
 – Hours of operation
 – Performance measures
 – Recovery parameters
 – Support parameters
 – Environmental dependencies and assumptions




                                                                                                  7

                                                ©2011 Quest Software, Inc. All rights reserved.
Protecting Exchange




     Your protection strategy
   should directly support your
      recovery requirements



                                                                            8

                          ©2011 Quest Software, Inc. All rights reserved.
High Availability
• Database Availability Groups (DAG)
 – New framework introduced in Exchange 2010
 – A group of mailbox servers (up to 16) that replicate to one another,
   providing database-level protection from outages
 – Uses Exchange Continuous Replication (logs shipping) and a subset of
   Windows failover clustering technologies to provide continuous HA and
   site resiliency




                                                                                                          9

                                                        ©2011 Quest Software, Inc. All rights reserved.
Backup
• Traditional Backup
 – Protection for information stores, individual storage groups, or
   individual databases
 – Enterprise protection for heterogeneous environments (centralized
   management and monitoring)
 – Target disk or tape



• Real-time Backup (Continuous Data Protection)
 – Watches all changes occurring during a defined period
 – An initial sync/seed of the data to be protected is created
 – All changes that occur after the initial sync/seed are captured and
   available for restore



                                                                                                           10

                                                         ©2011 Quest Software, Inc. All rights reserved.
Disaster Recovery
• Host-Based Replication
 – Cross-platform replication for applications like Microsoft Exchange, as
   well as Microsoft SQL, MySQL, and PostgreSQL residing in
   Windows, Linux, Solaris and Mac OS X environments
 – Centralized management and monitoring of replication


• Replication of Backup Copies
 – Replicates changes to protected datasets from one (or many) backup
   servers to another backup server




                                                                                                          11

                                                        ©2011 Quest Software, Inc. All rights reserved.
Recovering Exchange




    Clearly document and test
  recovery strategy to minimize
     the chance for mistakes



                                                                           12

                         ©2011 Quest Software, Inc. All rights reserved.
Elements of a Restore Strategy
Include the following in your restore strategy:
• Build a communications plan
 – Identify the personnel involved in disaster recovery efforts, their
   responsibilities and chain of command

• Set restore priorities
 – Prioritize what should be restored

• Provision a ―dial-tone‖ system
 – Allow users to send and receive new email before the historical email
   data has been fully restored

• Restore type
 – Use the recovery storage group to restore the data and merge the
   restored data into the ―dial-tone‖ database

                                                                                                            13

                                                          ©2011 Quest Software, Inc. All rights reserved.
Quest Data Protection Family
 FUNCTIONS                                                                                       PLATFORMS

    Identity           CAPABILITIES AND BENEFITS
  Management
                   •   Best-of-breed solutions that span physical, virtual,
                       and application-level data protection
  Performance
                   •   Heterogeneous platform support
   Monitoring
                   •   Reduce the amount of data required for backups
                       by 90% while gaining scalability
 Data Protection   •   Object and application-level recovery to ensure
                       availability and immediate access

 Development
                       PRODUCTS

   Migration



 Administration


                                PHYSICAL I VIRTUAL I CLOUD


                                                                                                                                14

                                                                              ©2011 Quest Software, Inc. All rights reserved.
Quest: A Leader in Data Protection
& Application Management

         • Linux Backup: NetVault Backup (IDC Japan)
  #1

         • Oracle Backup: NetVault Backup (DCIG Buyer’s Guide)
  #1
         • Purpose-built backup for VMware (in speed, scalability, and number of
  #1       customers)


         • Virtual Server Management Software Vendor: Quest Software (IDC US)
 Top 3

        • Worldwide Storage Management Software Vendor: Quest Software
 Top 10   (Gartner)



                                                                                                            15

                                                          ©2011 Quest Software, Inc. All rights reserved.
NetVault Backup
Cross-platform backup and recovery

• Extensive platform/application support
  – Unix, Windows, Linux. Mac OS
  – VMware ESX/ESXi, Hyper-V, Xen, KVM
  – Protection for 12 popular business applications

• Scalable yet simple
  – 50% faster recovery, 30% faster backup than comparable
    products
  – 45 minute install and setup

• Broad tape and disk support
• Bare Metal Recovery (BMR) agent




                                                                                                               16

                                                             ©2011 Quest Software, Inc. All rights reserved.
NetVault FastRecover
Real-time backup and instant recovery

• Patented FlashRestore™
  - Near instant recovery for Microsoft Exchange, as well as Oracle, SQL
    Server, and Windows file-system data

• Efficient replication for remote offices
  - Bandwidth-friendly replication supports ROBO disaster recovery scenarios

• Integrates with existing backup products
  • Export and back up NVFR datasets via CIFS

• Eliminates backup windows

• Recover data from any point in time—even down to the second!



                                                          NVFR Timeline Indicator
                                                                                                               17

                                                             ©2011 Quest Software, Inc. All rights reserved.
Recovery Manager for Exchange
Discover, Recover Individual Mail Items, Attachments & Conversations

• Find and retrieve message-level data in minutes from
  multiple sources
 • Exact items from a single-pass backup
 • Eliminates the need for both a database backup and a brick-level backup

• Perform federated, intelligent searches
 • Search multiple email data sources simultaneously
 • Search keywords in message body, ID, headers, message
   classes, categories, deleted items, conversation threads and attachment
   type and content

• Support for Backup Software
 • Find and retrieve data across Quest's NetVault Backup
   and NetVault FastRecover, native Microsoft backups
   and most major third-party backup software

                                                                                                             18

                                                           ©2011 Quest Software, Inc. All rights reserved.
http://www.quest.com/data-protection




                                       ©2011 Quest Software, Inc. All rights reserved.

Contenu connexe

Dernier

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

En vedette

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...DevGAMM Conference
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationErica Santiago
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellSaba Software
 

En vedette (20)

Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 
More than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike RoutesMore than Just Lines on a Map: Best Practices for U.S Bike Routes
More than Just Lines on a Map: Best Practices for U.S Bike Routes
 
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
Ride the Storm: Navigating Through Unstable Periods / Katerina Rudko (Belka G...
 
Barbie - Brand Strategy Presentation
Barbie - Brand Strategy PresentationBarbie - Brand Strategy Presentation
Barbie - Brand Strategy Presentation
 
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them wellGood Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
Good Stuff Happens in 1:1 Meetings: Why you need them and how to do them well
 

Best Practices: Protecting Microsoft Exchange

  • 1. Best Practices & Time-Saving Techniques for Protecting Exchange ©2011 Quest Software, Inc. All rights reserved.
  • 2. Agenda • Challenges in protecting Exchange • Recommended best practices for protecting and recovering Exchange • Solutions for Exchange available today • Quest data protection solutions 1 ©2011 Quest Software, Inc. All rights reserved.
  • 3. Challenges • Exponential data growth • Email is increasingly seen as mission-critical • Less tolerance for data loss and prolonged downtime • Increasing number of requests to discover and recover data from within Exchange 2 ©2011 Quest Software, Inc. All rights reserved.
  • 4. Plan for The Unexpected • Server Failure • Single Mail Item Loss – OS failure, hardware failure – A user inadvertently hard- deletes an important mail item • Database Failure – Database corruption or disk • Site Disaster failure – Power outage, network outage, natural disaster • Single Mailbox Loss – A mailbox is deleted and needs to be recovered 3 ©2011 Quest Software, Inc. All rights reserved.
  • 5. Gather Organizational Requirements • Measure the value your organization places on its email data • What are the acceptable levels of data loss? • What is the acceptable length of time for service and data restoration? • Where are my Exchange Servers located? 4 ©2011 Quest Software, Inc. All rights reserved.
  • 6. Exchange Protection Approaches 5 ©2011 Quest Software, Inc. All rights reserved.
  • 7. Set Recovery Objectives • Recovery Time Objective (RTO) – The amount of time elapsed between a loss or disaster and the restoration of business operations. It is the time required to physically recover the data or application and have it ready for use • Recovery Point Objective (RPO) – The point in time that recovered data will be recovered to. – For example, if you recover a file that was backed up yesterday then your recovery point is one day 6 ©2011 Quest Software, Inc. All rights reserved.
  • 8. Create a Service Level Agreement (SLA) • Obtain agreement on objectives in the form of a SLA • Include the following categories: – Availability – Hours of operation – Performance measures – Recovery parameters – Support parameters – Environmental dependencies and assumptions 7 ©2011 Quest Software, Inc. All rights reserved.
  • 9. Protecting Exchange Your protection strategy should directly support your recovery requirements 8 ©2011 Quest Software, Inc. All rights reserved.
  • 10. High Availability • Database Availability Groups (DAG) – New framework introduced in Exchange 2010 – A group of mailbox servers (up to 16) that replicate to one another, providing database-level protection from outages – Uses Exchange Continuous Replication (logs shipping) and a subset of Windows failover clustering technologies to provide continuous HA and site resiliency 9 ©2011 Quest Software, Inc. All rights reserved.
  • 11. Backup • Traditional Backup – Protection for information stores, individual storage groups, or individual databases – Enterprise protection for heterogeneous environments (centralized management and monitoring) – Target disk or tape • Real-time Backup (Continuous Data Protection) – Watches all changes occurring during a defined period – An initial sync/seed of the data to be protected is created – All changes that occur after the initial sync/seed are captured and available for restore 10 ©2011 Quest Software, Inc. All rights reserved.
  • 12. Disaster Recovery • Host-Based Replication – Cross-platform replication for applications like Microsoft Exchange, as well as Microsoft SQL, MySQL, and PostgreSQL residing in Windows, Linux, Solaris and Mac OS X environments – Centralized management and monitoring of replication • Replication of Backup Copies – Replicates changes to protected datasets from one (or many) backup servers to another backup server 11 ©2011 Quest Software, Inc. All rights reserved.
  • 13. Recovering Exchange Clearly document and test recovery strategy to minimize the chance for mistakes 12 ©2011 Quest Software, Inc. All rights reserved.
  • 14. Elements of a Restore Strategy Include the following in your restore strategy: • Build a communications plan – Identify the personnel involved in disaster recovery efforts, their responsibilities and chain of command • Set restore priorities – Prioritize what should be restored • Provision a ―dial-tone‖ system – Allow users to send and receive new email before the historical email data has been fully restored • Restore type – Use the recovery storage group to restore the data and merge the restored data into the ―dial-tone‖ database 13 ©2011 Quest Software, Inc. All rights reserved.
  • 15. Quest Data Protection Family FUNCTIONS PLATFORMS Identity CAPABILITIES AND BENEFITS Management • Best-of-breed solutions that span physical, virtual, and application-level data protection Performance • Heterogeneous platform support Monitoring • Reduce the amount of data required for backups by 90% while gaining scalability Data Protection • Object and application-level recovery to ensure availability and immediate access Development PRODUCTS Migration Administration PHYSICAL I VIRTUAL I CLOUD 14 ©2011 Quest Software, Inc. All rights reserved.
  • 16. Quest: A Leader in Data Protection & Application Management • Linux Backup: NetVault Backup (IDC Japan) #1 • Oracle Backup: NetVault Backup (DCIG Buyer’s Guide) #1 • Purpose-built backup for VMware (in speed, scalability, and number of #1 customers) • Virtual Server Management Software Vendor: Quest Software (IDC US) Top 3 • Worldwide Storage Management Software Vendor: Quest Software Top 10 (Gartner) 15 ©2011 Quest Software, Inc. All rights reserved.
  • 17. NetVault Backup Cross-platform backup and recovery • Extensive platform/application support – Unix, Windows, Linux. Mac OS – VMware ESX/ESXi, Hyper-V, Xen, KVM – Protection for 12 popular business applications • Scalable yet simple – 50% faster recovery, 30% faster backup than comparable products – 45 minute install and setup • Broad tape and disk support • Bare Metal Recovery (BMR) agent 16 ©2011 Quest Software, Inc. All rights reserved.
  • 18. NetVault FastRecover Real-time backup and instant recovery • Patented FlashRestore™ - Near instant recovery for Microsoft Exchange, as well as Oracle, SQL Server, and Windows file-system data • Efficient replication for remote offices - Bandwidth-friendly replication supports ROBO disaster recovery scenarios • Integrates with existing backup products • Export and back up NVFR datasets via CIFS • Eliminates backup windows • Recover data from any point in time—even down to the second! NVFR Timeline Indicator 17 ©2011 Quest Software, Inc. All rights reserved.
  • 19. Recovery Manager for Exchange Discover, Recover Individual Mail Items, Attachments & Conversations • Find and retrieve message-level data in minutes from multiple sources • Exact items from a single-pass backup • Eliminates the need for both a database backup and a brick-level backup • Perform federated, intelligent searches • Search multiple email data sources simultaneously • Search keywords in message body, ID, headers, message classes, categories, deleted items, conversation threads and attachment type and content • Support for Backup Software • Find and retrieve data across Quest's NetVault Backup and NetVault FastRecover, native Microsoft backups and most major third-party backup software 18 ©2011 Quest Software, Inc. All rights reserved.
  • 20. http://www.quest.com/data-protection ©2011 Quest Software, Inc. All rights reserved.

Notes de l'éditeur

  1. At Quest, we place the greatest value on RECOVERY!NetVault FastRecover delivers backup and FlashRestore™ MS Exchange, as well as Oracle, SQL Server and Windows file servers, enabling instant recovery after corruption or data loss. Patented technology delivers immediate availability of mission-critical applications with no need to wait for the full recovery before end users can resume activities. Its built-in replication feature can efficiently send backup data from one FastRecover server to another for enhanced DR protection at remote offices. You can also export and back up via CIFS. FastRecover integrates with Quest’s own NetVault Backup—as well as practically any other third-party backup software.