![]() You should also check that your various guest operating systems running within the environment can also be protected. Whichever one you choose, make sure the chosen backup solution supports your hypervisor. Hyper-V, VMware, and Linux virtualization all operate slightly differently. Each of these file types can be backed up and restored independently. Virtual Machines – A Virtual Machine (VM) usually consists of a virtual hard disk (VHD), which is a file hosting the VM’s OS, a second VHD that hosts the data for the application running inside the VM, and a configuration file which defines the settings for that VM.By restore settings, it effectively allows their user preferences to be copied to a different device. Since these usually result in separate backup files, it allows them to be individually restored. During this process, the configuration data and registry settings are being protected, and independently all the users’ files are being backed up. Operating Systems – It is possible to backup an operating system.Check out this blog for more information about how application-consistent backups work using Microsoft VSS. Generally, the application’s data is the most important, and this may have its native backup process or leverage an industry-wide solution to allow third-party solutions to perform a backup, like Microsoft Volume Shadow Copy Service (VSS). The former may include items like the user’s preferences or the application’s IP address. Applications – Most applications will allow you to separately backup the application’s settings and its data.Virtually all backup ISVs will support disk-level backup and recovery while supporting common storage optimizations like RAID, mirroring, and deduplication. Disks / Drives – Most enterprises will backup their applications at the disk or drive level as their smallest unit to simplify management.A computer’s registry is also an internal database, but this will usually get protected when the operating system is backed up. Most databases will have built-in backup tools, and third-party providers will usually support the most common databases like SQL Server. Databases – Databases usually have customizable backup policies since they can often contain business-critical data.In order to save space, it is usually possible to backup and recover specific items within the application, such as a single mailbox or message from an Exchange Server. You may want to create custom backup policies for specific files if they are important otherwise, they will usually get backed up when the entire disk or computer is backed up. Sometimes you can even restore files to different points in time by picking which backup you want to recover from. Operating systems like Windows or Windows Server will usually give you the option to automatically backup all of your files to a local disk or to a cloud service like Microsoft OneDrive. Files – Files are generally the smallest unit of backup, although individual blocks of the file can also be protected.Here are the most common components that enterprises should consider protecting, starting from smallest to largest. Components which can be Backed Up in the Enterprise This article introduces computer data backup for enterprises by explaining how it works and reviewing different planning considerations. There is no right strategy, so ultimately, it comes down to the organization’s priorities and budget. In contrast, others will make the decision based on how quickly they can recover after a disaster to minimize their downtime. Some organizations plan their backups based on the location of their datacenter(s), others will make the decision based on their existing storage providers, some look at the feature set or cost of the backup software. When planning your backup strategy, there may be dozens or even hundreds of variables that you will want to consider. Recovery allows you to restore that backup file to the original or new computer with the same information or state as when it was backed up. Still, subsequent backups can be much quicker as usually only the changes since the last backup are saved, which is used with an incremental or differential backup (these are discussed later). ![]() Usually, the initial backup will take longer since all the data must be captured. As the importance of data increases, so does the need to protect it using backup software and recover it if a disaster strikes.Ĭonceptually, a backup is fairly straightforward – it involves making a copy of a file, database, or computer and saving it as a backup file. ![]() Unfortunately, it is also much easier to lose all of your data than a stockpile of precious metals. ![]() Some argue that data has become the world’s most valuable commodity, worth even more to businesses than gold. ![]()
1 Comment
|
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |