SlideShare a Scribd company logo
1 of 20
Download to read offline
TECHNICALWHITEPAPER:BACKUPEXECTM15
PROTECTINGMICROSOFTSHAREPOINT
Backup ExecTM
15 Technical White Paper
Technical White Papers are designed to introduce Symantec partners and end users
to key technologies and technical concepts that are associated with the Symantec
Backup and Recovery product family. The information within a Technical White
Paper will assist partners and end users as they design and implement data
protection solutions based on Symantec Backup and Recovery products.
Technical White Papers are authored and maintained by the Symantec Backup and
Recovery Technical Services group.
Protecting Microsoft
SharePoint
2
3
Contents
Introduction.............................................................................................................................................. 4
Business Value .......................................................................................................................................... 5
Underlying Principles................................................................................................................................ 8
Backup Strategies for Microsoft SharePoint .......................................................................................... 12
Performance Recommendations............................................................................................................ 17
For More Information............................................................................................................................. 18
4
Introduction
This white paper is intended to assist technical personnel as they design and implement Backup Exec™ 15 and
the Agent for Applications and Databases to protect servers hosting Microsoft SharePoint, and make related
decisions. The business value of the Agent for Applications and Databases for Microsoft SharePoint servers will
also be touched upon in this white paper.
This white paper includes the following topics:
 Business Value
 Underlying Principles
 Backup Strategies for Microsoft SharePoint
 Best practices and Performance Factors
Note: For step by step instructions for installing and managing Backup Exec™ 15 and the Agent for Applications and
Databases to protect servers hosting Microsoft SharePoint, refer to the Backup Exec™ 15 Administrator’s Guide
available here: TECH205797.
5
Business Value
Microsoft SharePoint
Collaboration can be defined as the hosting and sharing of information within an organization or between a
business and their customers. Today, as organizations grow, collaboration applications and tools have become
a critical need for companies of all sizes. Microsoft’s SharePoint products are designed to improve
organizational effectiveness, enable comprehensive content management and search capabilities, including
business process sharing and information sharing across boundaries for better business insight.
Microsoft’s SharePoint products provide a simple web mechanism for management and abstraction of
information from the web server, with the ultimate goal of enabling business users to leverage web features
without having to understand technical aspects of web development.
The Need for Backup Solutions Designed for Microsoft SharePoint
Ensuring the content within a SharePoint infrastructure is safely protected can be a critical component to a
company’s ongoing success. The loss of SharePoint data could result in delays in effective communications
both internally and externally – leading to losses in productivity and revenues. Today’s information and
technology administrators need reliable, easy to manage, and efficient backup and recovery solutions to
protect their SharePoint intellectual property.
SharePoint Protection Challenges and Objectives
Administrators responsible for the backup and recovery of SharePoint environments understand the
challenges associated with backup technologies that are not specifically designed to protect SharePoint
servers. A modern and reliable backup strategy for Microsoft SharePoint provides an essential safeguard to
help protect critical data.
Objectives of performing SharePoint backups include:
 Recovering lost data in the event of a disaster
 Recovering unintentionally deleted content
 Minimizing the amount of data lost as the result of a disaster
 Moving data between installations as part of a hardware or software upgrade
 Minimizing the downtime cost of a SharePoint infrastructure being offline
It is important for administrators to choose what to protect and recover in a SharePoint environment. Business
requirements will help in making the determination of which SharePoint components to protect, and the
granularity with which they need to be recovered.
Typically customers use the Agent for Applications and Databases for three types of SharePoint recovery:
 Granular Recovery of individual SharePoint objects, such as files and list items.
 Recovery of a SharePoint component or database
 Full recovery of a SharePoint environment
Backup Exec™ 15 and Microsoft SharePoint
Backup Exec™ 15 and the Agent for Applications and Databases include features and capabilities designed
specifically to protect SharePoint environments and solve each of the problems listed above. The Agent for
Applications and Databases enables backup administrators to perform proper and intelligent backup and
restore operations, which incorporate online, non-disruptive SharePoint protection as part of everyday backup
routines.
6
When you use the Agent for Application and Databases to protect Microsoft SharePoint, you can back up and
restore the following:
 Web applications and their associated databases
 Individual documents that are contained in libraries
 Sites and sub-sites (Individual objects and their versions can be restored)
 Lists and list items (Individual objects and their versions can be restored)
 Restore Security Permissions on individual objects
 Configuration database
 Service applications
 Single Sign-on databases
 Shared Service Providers
Complete SharePoint Protection in a Single Solution
The Agent for Applications and Databases delivers state-of-the-art technology for the protection of growing
Microsoft SharePoint environments, including the following:
 User-friendly interface
 Centralized management of large or distributed environments
 Integrated data reduction technologies using the Deduplication Option
 Scheduled, on-line backups of SharePoint servers
 Comprehensive backup support for physical or virtualized SharePoint Servers
 Granular recovery of SharePoint components, such as individual documents or document versions
 Redirected restore of SharePoint databases to any SQL instance available on the network
 Redirected restore of web applications to a remote SharePoint farm
 Redirected restore of individual items to a folder location
 Redirected restore of granular SharePoint objects to a different site or farm
Figure 1: Example SharePoint Backup Configurations
Symantec Backup Exec
Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your
entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery
time and recovery point objectives (RTO and RPO) by reducing the time it takes to backup and recover your
data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and
7
granular application objects. Protect one to thousands of virtual machines and servers all from the same user
console for optimal performance and efficiency.
 Powerful: Improve the performance of your backup and recovery with Backup Exec; a solution that
enables fast, reliable backup and recovery of data and systems at every level and includes advanced
integration with the most recent releases of VMware and Hyper-V. Backup Exec can also help solve
your growing data challenges, regardless of how much that data changes. Avoid lengthy downtime and
remain within critical backup windows with Backup Exec.
 Flexible: Not every backup solution has the flexibility to protect your environment while also delivering
agile recovery. Backup Exec protects both virtual and physical architectures and can backup anything
to virtually any storage device and can restore anywhere. From VMs, to entire servers, applications or
single files and folders, Backup Exec is the single solution for all of your needs.
 Easy to use: Complex backup and recovery products can be inefficient, time consuming, and expensive
to manage. Through intuitive wizards and insightful dashboards, Backup Exec is easy to implement, use
and manage, whether you are upgrading from a previous version or switching from a competitive
product.
Save time and money, secure confidential data and help ensure all your critical information is always protected
and easily recoverable with Backup Exec.
8
Underlying Principles
Supported SharePoint Versions
Backup Exec supports all major versions of Microsoft SharePoint, including the following:
SharePoint Version Supported by Backup Exec
SharePoint Server 2007 
SharePoint Server 2010 
SharePoint Server 2013 
Windows SharePoint Foundation 2010 
Windows SharePoint Services (WSS) 3.0 
Note: For a complete list of supported software platforms and applications, please refer to the Backup Exec Software
Compatibility List (SCL) available here: TECH205797.
Components Used to Protect SharePoint
The Backup Exec Server
The primary component used to protect and recover Microsoft SharePoint is the Backup Exec server. The
Backup Exec server interacts with the SharePoint system to prepare the system for backup, to capture backup
data selections, to store backup sets to the target storage device, and to perform recovery operations.
The Agent for Windows
For physical SharePoint servers, the Backup Exec Agent for Windows is installed to the physical SharePoint
servers to identify, capture, and transmit SharePoint backup data to the Backup Exec server for storage. For
SharePoint 2007 and later (SharePoint 2003 does not have a VSS writer), SharePoint backup data is captured
through VSS snapshots and transmitted by the Agent for Windows to the Backup Exec server over the NDMP
protocol, using a secure (TSL/SSL) and trusted connection.
For virtualized SharePoint servers on the VMware vSphere or Microsoft Hyper-V platforms, the virtual
machines hosting SharePoint are protected using image-level backups through snapshot interactions with the
virtual host. In these virtualized configurations, the Agent for Windows can be installed on the SharePoint
virtual machine to enable application discovery and metadata collection, allowing for granular application
recovery features for virtualized SharePoint servers. Protection of virtualized SharePoint servers without the
Agent for Windows installed is also supported, but without the Agent for Windows installed to the virtual
machine, recovery options are limited to full virtual machine recovery and file/folder recovery.
The Agent for Applications and Databases
When protecting either physical or virtualized SharePoint servers with Backup Exec, a license for the Agent for
Applications and Database is required before Backup Exec can perform backup and recovery operations of
SharePoint application data.
9
Figure 2: Enabling the Agent for Applications and Databases
Whether the Agent for Applications and Databases license is included or purchased separately depends on the
Backup Exec version that is being used. For example, the standard Backup Exec™ 15 product allows customers
to pick and choose the different agents and options they need to protect their environment, while the Backup
Exec™ 15 Capacity Edition includes unlimited use of the Agent for Applications and Databases in its core
license.
It’s important to note that the Agent for Applications and Databases does not represent a true software agent
that needs to be pushed or installed to a physical SharePoint server in order to protect it; the license simply
unlocks the ability for the Backup Exec Agent for Windows to interact with SharePoint components and
perform advanced operations such as Backup Exec’s VFF driver, which is used for advanced granular recovery
operations.
Note: For additional information on the different versions and editions of Backup Exec that are available, to the Backup
Exec website available here: www.backupexec.com.
Note: For additional information on requirements for protecting SharePoint environments using Backup Exec, refer to
the Backup Exec™ 15 Administrator’s Guide available here: TECH205797.
The capability to protect Microsoft SharePoint is a feature of the Agent for Applications and Databases. The
SharePoint protection feature allows administrators to protect local or remote Microsoft SharePoint Servers,
whether they are implemented as physical servers or virtual machines.
Microsoft SharePoint Backup Process
To create online backups of Microsoft SharePoint, the administrator creates a backup job by selecting the
appropiate SharePoint farm or by selecting individual objects. Backup Exec™ 15 communicates with the Web
servers that participate in Microsoft SharePoint server farms to discover the farm topology. The Agent for
Windows needs to be installled on all of the servers participating in SharePoint farm. The Agent for
10
Applications and Databases automatically discovers SharePoint Farm components and protects each
component in the farm simultaneously during backup operations.
The Agent for Application and Databases for Microsoft SharePoint supports protecting and recovering physical
SharePoint servers as well as SharePoint servers running as virtual machines.
Figure 3: Application Granuular Recovery
To protect Microsoft SharePoint servers running inside a virtual machine, Backup Exec use V-Ray technology to
collect the information that is required to restore entire Sharepoint virtual machines or granular SharePoint
objects from within a virtual machine.
When adminstrators create a backup job for a virtual machine, the Agent for Windows automatically locates
any VSS-aware applications within the virtual machine, such as Microsoft SharePoint. During the backup job,
Backup Exec collects metadata for the applications using the Agent for Windows. This image-level backup
operation, powered by Symantec V-Ray technology, enables optimal backup of guest virtual machines while
enabling multiple levels of recovery, such as:
 Full virtual machine recovery
 Virtual disk recovery
 Recovery of the entire SharePoint application and all its components
 Recovery of granular SharePoint objects
 Recovery of granular files and folders within the file system
Backup Exec’s integrated V-Ray technology help reduce backup times and speed up recovery times with a "one
pass" backup which supports all of the recovery methods listed above.
When using image-level backups to protect virtual machines hosting SharePoint, granular recovery of
SharePoint objects is only supported for single server (single-virtual machine) implementations of SharePoint.
In order to achieve granular recovery support from multiple SharePoint virtual machines implemented in a
distributed manner or SharePoint farm, the SharePoint virtual machines must be protected using the legacy
agent-based method leveraging the local Agent for Windows to capture and transmit backup data from each
virtual machine to the Backup Exec server. Using the agent-based protection method essentially treats each
virtual machine as if it were a standalone physical server.
The Agent for Applications and Databases is designed to be flexible and easy-to-use, and gives administrators
of Microsoft SharePoint comprehensive and customizable protection. Backup Exec's dynamic inclusion feature
automatically protects any new resources that were added after a backup job was created. If Backup Exec
discovers that you added a new child resource to a currently protected resource, the new child resource is
11
automatically protected at the next job run time. Because the backup job may include new resources, the job
may require more storage space and more time to run than you anticipated.
Figure 4: Microsoft SharePoint Backup Selection
12
Backup Strategies for Microsoft SharePoint
Backup Exec incorporates online, non-disruptive Microsoft SharePoint protection as part of everyday backup
routines. This minimizes data loss in the event of a disaster or failure without inhibiting daily SharePoint
activity.
Supported SharePoint Backup Methods
Backup Exec™ 15 supports both full and incremental backup methods for protecting Microsoft SharePoint
environments.
Full Backups
When selecting a full backup method, the administrator can select to perform ‘Full’ backups or ‘Full Copy’
backups as in the screenshot below.
Figure 5: Microsoft SharePoint Full Backup Options
Incremental Backups
When selecting an incremental backup method, the administrator can select from several options as in the
screenshot below.
13
Figure 6: Microsoft SharePoint Incremental Backup Options
Using full and incremental backup methods provides a good balance between managing backup windows and
minimization of time required to recover information if the need arises. The easiest way to reduce backup
windows is to reduce the amount of SharePoint data included in every backup. This can be achieved through
Backup Exec™ 15 deduplication technology. Backup Exec™ 15 includes advanced data deduplication
capabilities which allow companies to dramatically reduce the amount of backup storage required and more
efficiently centralize backup data from multiple sites for assured disaster recovery.
Selecting a SharePoint Backup Strategy
To create SharePoint backup strategies, identify the critical components within a SharePoint environment that
require backup protection and the frequency with which backups should occur. While creating backup jobs,
ensure you always combine full backup jobs with incremental jobs. Incremental backup jobs will only back up
information that is new, or that has been changed or updated since the last backup job. This can greatly reduce
the time required for backup jobs to complete.
14
Figure 7: SharePoint Backup Options
When developing a SharePoint backup and recovery strategy, consider tools that offer granular recovery and
enable the restoration of data directly into the production or test environment to help reduce interruptions to
the business and simplify the restoration process. This is where the Agent for Applications and Databases plays
an important role. You can restore items to their original location or you can redirect the restore to a new
location.
15
Figure 8: SharePoint Restore Options
Data growth is a constant problem that modern administrators must manage. It’s important for administrators
to regularly analyze their SharePoint infrastructures and adjust their backup strategies as needed. To decide
which backup methods to use for optimal protection of SharePoint environments, consider the following:
• In small environments, consider running a daily full backup every evening in addition to hourly
incremental/differential backups
• In mid-sized environments, consider running a weekly full backup and daily incremental/differential
backups
• In large environments, consider running daily incremental/differential backups, with full backups
occurring twice a month
• Use the checksum feature to check database integrity
• Perform test restores periodically
• Combine different backup types to optimize the backup strategy
• Leverage compression and encryption features when creating a backup job to ensure data security
Granular Recovery Technology Catalog Operations
To enable granular recovery of SharePoint files and objects, Backup Exec performs catalog operations against
the SharePoint backup data that has been captured. To enable greater administration control and flexibility of
backup operations, these catalog operations can be scheduled to run according to the desires of the
administrator.
The granular recovery catalog scheduling options are displayed in the screenshot below.
16
Figure 9: Granular Recovery Catalog Operation Scheduling
17
Performance Recommendations
Listed below are recommendations for optimizing the performance of SharePoint backup operations. These
include the following:
• Schedule backup jobs when activity on SharePoint servers is low
• Consider a disk-to-disk-to-tape (D2D2T) backup strategy; backing up to disk will greatly increase both
backup and recovery performance
• Use a separate network for SharePoint backups
• Avoid disk-intensive SharePoint operations during backups
• For physical SharePoint servers, consider using client-side Deduplication
• Use daily differential or incremental backups in addition to periodic full backups
• Upgrade your Backup Exec infrastructure to the latest available version
• Use a disk maintenance utility to keep SharePoint disk defragmentation low
• If multiple networks are available, use the Central Admin Server Option to alternate what network
interfaces are used for backups
18
For More Information
Link Description
www.symantec.com/business/backup-exec-for-windows-servers BE Family Landing Page
www.symantec.com/business/products/whitepapers.jsp?pcid=pcat_business_cont&pvid=57_1 BE White Papers
www.symantec.com/business/products/datasheets.jsp?pcid=2244&pvid=57_1 BE Datasheets, Solution Briefs
TECH205797 Compatibility Docs
www.backupexec.com/configurator BE Product Configurator
www.backupexec.com/skugenerator SKU Generator and BEST Tool
19
20
About Symantec
Symantec is a global leader in providing security,
storage, and systems management solutions to help
consumers and organizations secure and manage
their information-driven world. Our software and
services protect against more risks at more points,
more completely and efficiently, enabling
confidence wherever information is used or stored.
Headquartered in Mountain View, Calif., Symantec
has operations in 40 countries. More information is
available at www.symantec.com.
For specific country offices
and contact numbers, please
visit our website.
Symantec World Headquarters
350 Ellis St.
Mountain View, CA 94043 USA
+1 (650) 527 8000
1 (800) 721 3934
www.symantec.com
Symantec helps organizations secure and manage their
information-driven world with data backup and recovery
software.
Copyright © 2015 Symantec Corporation. All rights
reserved. Symantec, the Symantec Logo, and the
Checkmark Logo are trademarks or registered
trademarks of Symantec Corporation or its affiliates in
the U.S. and other countries. Microsoft and Windows are
either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
Linux is a registered trademark of Linus Torvalds. Other
names may be trademarks of their respective owners.
8/2015

More Related Content

More from Symantec

Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB ProjectsSymantec
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantSymantec
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...Symantec
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec
 

More from Symantec (20)

Symantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat ReportSymantec Webinar Cloud Security Threat Report
Symantec Webinar Cloud Security Threat Report
 
Symantec Cloud Security Threat Report
Symantec Cloud Security Threat ReportSymantec Cloud Security Threat Report
Symantec Cloud Security Threat Report
 
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
Symantec Webinar | Security Analytics Breached! Next Generation Network Foren...
 
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
Symantec Webinar | Implementing a Zero Trust Framework to Secure Modern Workf...
 
Symantec Webinar | Tips for Successful CASB Projects
Symantec Webinar |  Tips for Successful CASB ProjectsSymantec Webinar |  Tips for Successful CASB Projects
Symantec Webinar | Tips for Successful CASB Projects
 
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
Symantec Webinar: What Cyber Threats Are Lurking in Your Network?
 
Symantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year OnSymantec Webinar: GDPR 1 Year On
Symantec Webinar: GDPR 1 Year On
 
Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019Symantec ISTR 24 Webcast 2019
Symantec ISTR 24 Webcast 2019
 
Symantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front LinesSymantec Best Practices for Cloud Security: Insights from the Front Lines
Symantec Best Practices for Cloud Security: Insights from the Front Lines
 
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
Symantec - The Importance of Building Your Zero Trust Program on a Solid Plat...
 
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
Symantec Webinar | Redefining Endpoint Security- How to Better Secure the End...
 
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy BearSymantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
Symantec Webinar Using Advanced Detection and MITRE ATT&CK to Cage Fancy Bear
 
GDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators WantGDPR Breach Notification Demystifying What the Regulators Want
GDPR Breach Notification Demystifying What the Regulators Want
 
Symantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 WebinarSymantec Internet Security Threat Report (ISTR) 23 Webinar
Symantec Internet Security Threat Report (ISTR) 23 Webinar
 
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
Symantec Webinar Part 6 of 6 GDPR Compliance, Breach Notification, Detection,...
 
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
Symantec Webinar Part 5 of 6 GDPR Compliance, the Operational Impact of Cross...
 
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...Symantec Webinar Part 4 of 6  GDPR Compliance, What NAM Organizations Need to...
Symantec Webinar Part 4 of 6 GDPR Compliance, What NAM Organizations Need to...
 
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
Symantec Webinar Part 3 of 6 How to Tackle Data Protection Risk in Time for G...
 
Symantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR ComplianceSymantec Webinar Part 2 of 6 GDPR Compliance
Symantec Webinar Part 2 of 6 GDPR Compliance
 
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR ReadinessSymantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
Symantec Webinar Part 1 of 6 The Four Stages of GDPR Readiness
 

Recently uploaded

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsJhone kinadey
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AIABDERRAOUF MEHENNI
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...kellynguyen01
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendArshad QA
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...MyIntelliSource, Inc.
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...OnePlan Solutions
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 

Recently uploaded (20)

Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AISyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
SyndBuddy AI 2k Review 2024: Revolutionizing Content Syndication with AI
 
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
Short Story: Unveiling the Reasoning Abilities of Large Language Models by Ke...
 
Exploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the ProcessExploring iOS App Development: Simplifying the Process
Exploring iOS App Development: Simplifying the Process
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Test Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and BackendTest Automation Strategy for Frontend and Backend
Test Automation Strategy for Frontend and Backend
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
Try MyIntelliAccount Cloud Accounting Software As A Service Solution Risk Fre...
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 

Protecting Microsoft Sharepoint with Backup Exec 15

  • 1. TECHNICALWHITEPAPER:BACKUPEXECTM15 PROTECTINGMICROSOFTSHAREPOINT Backup ExecTM 15 Technical White Paper Technical White Papers are designed to introduce Symantec partners and end users to key technologies and technical concepts that are associated with the Symantec Backup and Recovery product family. The information within a Technical White Paper will assist partners and end users as they design and implement data protection solutions based on Symantec Backup and Recovery products. Technical White Papers are authored and maintained by the Symantec Backup and Recovery Technical Services group. Protecting Microsoft SharePoint
  • 2. 2
  • 3. 3 Contents Introduction.............................................................................................................................................. 4 Business Value .......................................................................................................................................... 5 Underlying Principles................................................................................................................................ 8 Backup Strategies for Microsoft SharePoint .......................................................................................... 12 Performance Recommendations............................................................................................................ 17 For More Information............................................................................................................................. 18
  • 4. 4 Introduction This white paper is intended to assist technical personnel as they design and implement Backup Exec™ 15 and the Agent for Applications and Databases to protect servers hosting Microsoft SharePoint, and make related decisions. The business value of the Agent for Applications and Databases for Microsoft SharePoint servers will also be touched upon in this white paper. This white paper includes the following topics:  Business Value  Underlying Principles  Backup Strategies for Microsoft SharePoint  Best practices and Performance Factors Note: For step by step instructions for installing and managing Backup Exec™ 15 and the Agent for Applications and Databases to protect servers hosting Microsoft SharePoint, refer to the Backup Exec™ 15 Administrator’s Guide available here: TECH205797.
  • 5. 5 Business Value Microsoft SharePoint Collaboration can be defined as the hosting and sharing of information within an organization or between a business and their customers. Today, as organizations grow, collaboration applications and tools have become a critical need for companies of all sizes. Microsoft’s SharePoint products are designed to improve organizational effectiveness, enable comprehensive content management and search capabilities, including business process sharing and information sharing across boundaries for better business insight. Microsoft’s SharePoint products provide a simple web mechanism for management and abstraction of information from the web server, with the ultimate goal of enabling business users to leverage web features without having to understand technical aspects of web development. The Need for Backup Solutions Designed for Microsoft SharePoint Ensuring the content within a SharePoint infrastructure is safely protected can be a critical component to a company’s ongoing success. The loss of SharePoint data could result in delays in effective communications both internally and externally – leading to losses in productivity and revenues. Today’s information and technology administrators need reliable, easy to manage, and efficient backup and recovery solutions to protect their SharePoint intellectual property. SharePoint Protection Challenges and Objectives Administrators responsible for the backup and recovery of SharePoint environments understand the challenges associated with backup technologies that are not specifically designed to protect SharePoint servers. A modern and reliable backup strategy for Microsoft SharePoint provides an essential safeguard to help protect critical data. Objectives of performing SharePoint backups include:  Recovering lost data in the event of a disaster  Recovering unintentionally deleted content  Minimizing the amount of data lost as the result of a disaster  Moving data between installations as part of a hardware or software upgrade  Minimizing the downtime cost of a SharePoint infrastructure being offline It is important for administrators to choose what to protect and recover in a SharePoint environment. Business requirements will help in making the determination of which SharePoint components to protect, and the granularity with which they need to be recovered. Typically customers use the Agent for Applications and Databases for three types of SharePoint recovery:  Granular Recovery of individual SharePoint objects, such as files and list items.  Recovery of a SharePoint component or database  Full recovery of a SharePoint environment Backup Exec™ 15 and Microsoft SharePoint Backup Exec™ 15 and the Agent for Applications and Databases include features and capabilities designed specifically to protect SharePoint environments and solve each of the problems listed above. The Agent for Applications and Databases enables backup administrators to perform proper and intelligent backup and restore operations, which incorporate online, non-disruptive SharePoint protection as part of everyday backup routines.
  • 6. 6 When you use the Agent for Application and Databases to protect Microsoft SharePoint, you can back up and restore the following:  Web applications and their associated databases  Individual documents that are contained in libraries  Sites and sub-sites (Individual objects and their versions can be restored)  Lists and list items (Individual objects and their versions can be restored)  Restore Security Permissions on individual objects  Configuration database  Service applications  Single Sign-on databases  Shared Service Providers Complete SharePoint Protection in a Single Solution The Agent for Applications and Databases delivers state-of-the-art technology for the protection of growing Microsoft SharePoint environments, including the following:  User-friendly interface  Centralized management of large or distributed environments  Integrated data reduction technologies using the Deduplication Option  Scheduled, on-line backups of SharePoint servers  Comprehensive backup support for physical or virtualized SharePoint Servers  Granular recovery of SharePoint components, such as individual documents or document versions  Redirected restore of SharePoint databases to any SQL instance available on the network  Redirected restore of web applications to a remote SharePoint farm  Redirected restore of individual items to a folder location  Redirected restore of granular SharePoint objects to a different site or farm Figure 1: Example SharePoint Backup Configurations Symantec Backup Exec Backup Exec™ 15 delivers powerful, flexible, and easy-to-use backup and recovery that is designed for your entire infrastructure regardless of platform: virtual, physical or cloud. With Backup Exec you can meet recovery time and recovery point objectives (RTO and RPO) by reducing the time it takes to backup and recover your data. In a matter of minutes, you can recover anything including VMs, applications, databases, files, folders and
  • 7. 7 granular application objects. Protect one to thousands of virtual machines and servers all from the same user console for optimal performance and efficiency.  Powerful: Improve the performance of your backup and recovery with Backup Exec; a solution that enables fast, reliable backup and recovery of data and systems at every level and includes advanced integration with the most recent releases of VMware and Hyper-V. Backup Exec can also help solve your growing data challenges, regardless of how much that data changes. Avoid lengthy downtime and remain within critical backup windows with Backup Exec.  Flexible: Not every backup solution has the flexibility to protect your environment while also delivering agile recovery. Backup Exec protects both virtual and physical architectures and can backup anything to virtually any storage device and can restore anywhere. From VMs, to entire servers, applications or single files and folders, Backup Exec is the single solution for all of your needs.  Easy to use: Complex backup and recovery products can be inefficient, time consuming, and expensive to manage. Through intuitive wizards and insightful dashboards, Backup Exec is easy to implement, use and manage, whether you are upgrading from a previous version or switching from a competitive product. Save time and money, secure confidential data and help ensure all your critical information is always protected and easily recoverable with Backup Exec.
  • 8. 8 Underlying Principles Supported SharePoint Versions Backup Exec supports all major versions of Microsoft SharePoint, including the following: SharePoint Version Supported by Backup Exec SharePoint Server 2007  SharePoint Server 2010  SharePoint Server 2013  Windows SharePoint Foundation 2010  Windows SharePoint Services (WSS) 3.0  Note: For a complete list of supported software platforms and applications, please refer to the Backup Exec Software Compatibility List (SCL) available here: TECH205797. Components Used to Protect SharePoint The Backup Exec Server The primary component used to protect and recover Microsoft SharePoint is the Backup Exec server. The Backup Exec server interacts with the SharePoint system to prepare the system for backup, to capture backup data selections, to store backup sets to the target storage device, and to perform recovery operations. The Agent for Windows For physical SharePoint servers, the Backup Exec Agent for Windows is installed to the physical SharePoint servers to identify, capture, and transmit SharePoint backup data to the Backup Exec server for storage. For SharePoint 2007 and later (SharePoint 2003 does not have a VSS writer), SharePoint backup data is captured through VSS snapshots and transmitted by the Agent for Windows to the Backup Exec server over the NDMP protocol, using a secure (TSL/SSL) and trusted connection. For virtualized SharePoint servers on the VMware vSphere or Microsoft Hyper-V platforms, the virtual machines hosting SharePoint are protected using image-level backups through snapshot interactions with the virtual host. In these virtualized configurations, the Agent for Windows can be installed on the SharePoint virtual machine to enable application discovery and metadata collection, allowing for granular application recovery features for virtualized SharePoint servers. Protection of virtualized SharePoint servers without the Agent for Windows installed is also supported, but without the Agent for Windows installed to the virtual machine, recovery options are limited to full virtual machine recovery and file/folder recovery. The Agent for Applications and Databases When protecting either physical or virtualized SharePoint servers with Backup Exec, a license for the Agent for Applications and Database is required before Backup Exec can perform backup and recovery operations of SharePoint application data.
  • 9. 9 Figure 2: Enabling the Agent for Applications and Databases Whether the Agent for Applications and Databases license is included or purchased separately depends on the Backup Exec version that is being used. For example, the standard Backup Exec™ 15 product allows customers to pick and choose the different agents and options they need to protect their environment, while the Backup Exec™ 15 Capacity Edition includes unlimited use of the Agent for Applications and Databases in its core license. It’s important to note that the Agent for Applications and Databases does not represent a true software agent that needs to be pushed or installed to a physical SharePoint server in order to protect it; the license simply unlocks the ability for the Backup Exec Agent for Windows to interact with SharePoint components and perform advanced operations such as Backup Exec’s VFF driver, which is used for advanced granular recovery operations. Note: For additional information on the different versions and editions of Backup Exec that are available, to the Backup Exec website available here: www.backupexec.com. Note: For additional information on requirements for protecting SharePoint environments using Backup Exec, refer to the Backup Exec™ 15 Administrator’s Guide available here: TECH205797. The capability to protect Microsoft SharePoint is a feature of the Agent for Applications and Databases. The SharePoint protection feature allows administrators to protect local or remote Microsoft SharePoint Servers, whether they are implemented as physical servers or virtual machines. Microsoft SharePoint Backup Process To create online backups of Microsoft SharePoint, the administrator creates a backup job by selecting the appropiate SharePoint farm or by selecting individual objects. Backup Exec™ 15 communicates with the Web servers that participate in Microsoft SharePoint server farms to discover the farm topology. The Agent for Windows needs to be installled on all of the servers participating in SharePoint farm. The Agent for
  • 10. 10 Applications and Databases automatically discovers SharePoint Farm components and protects each component in the farm simultaneously during backup operations. The Agent for Application and Databases for Microsoft SharePoint supports protecting and recovering physical SharePoint servers as well as SharePoint servers running as virtual machines. Figure 3: Application Granuular Recovery To protect Microsoft SharePoint servers running inside a virtual machine, Backup Exec use V-Ray technology to collect the information that is required to restore entire Sharepoint virtual machines or granular SharePoint objects from within a virtual machine. When adminstrators create a backup job for a virtual machine, the Agent for Windows automatically locates any VSS-aware applications within the virtual machine, such as Microsoft SharePoint. During the backup job, Backup Exec collects metadata for the applications using the Agent for Windows. This image-level backup operation, powered by Symantec V-Ray technology, enables optimal backup of guest virtual machines while enabling multiple levels of recovery, such as:  Full virtual machine recovery  Virtual disk recovery  Recovery of the entire SharePoint application and all its components  Recovery of granular SharePoint objects  Recovery of granular files and folders within the file system Backup Exec’s integrated V-Ray technology help reduce backup times and speed up recovery times with a "one pass" backup which supports all of the recovery methods listed above. When using image-level backups to protect virtual machines hosting SharePoint, granular recovery of SharePoint objects is only supported for single server (single-virtual machine) implementations of SharePoint. In order to achieve granular recovery support from multiple SharePoint virtual machines implemented in a distributed manner or SharePoint farm, the SharePoint virtual machines must be protected using the legacy agent-based method leveraging the local Agent for Windows to capture and transmit backup data from each virtual machine to the Backup Exec server. Using the agent-based protection method essentially treats each virtual machine as if it were a standalone physical server. The Agent for Applications and Databases is designed to be flexible and easy-to-use, and gives administrators of Microsoft SharePoint comprehensive and customizable protection. Backup Exec's dynamic inclusion feature automatically protects any new resources that were added after a backup job was created. If Backup Exec discovers that you added a new child resource to a currently protected resource, the new child resource is
  • 11. 11 automatically protected at the next job run time. Because the backup job may include new resources, the job may require more storage space and more time to run than you anticipated. Figure 4: Microsoft SharePoint Backup Selection
  • 12. 12 Backup Strategies for Microsoft SharePoint Backup Exec incorporates online, non-disruptive Microsoft SharePoint protection as part of everyday backup routines. This minimizes data loss in the event of a disaster or failure without inhibiting daily SharePoint activity. Supported SharePoint Backup Methods Backup Exec™ 15 supports both full and incremental backup methods for protecting Microsoft SharePoint environments. Full Backups When selecting a full backup method, the administrator can select to perform ‘Full’ backups or ‘Full Copy’ backups as in the screenshot below. Figure 5: Microsoft SharePoint Full Backup Options Incremental Backups When selecting an incremental backup method, the administrator can select from several options as in the screenshot below.
  • 13. 13 Figure 6: Microsoft SharePoint Incremental Backup Options Using full and incremental backup methods provides a good balance between managing backup windows and minimization of time required to recover information if the need arises. The easiest way to reduce backup windows is to reduce the amount of SharePoint data included in every backup. This can be achieved through Backup Exec™ 15 deduplication technology. Backup Exec™ 15 includes advanced data deduplication capabilities which allow companies to dramatically reduce the amount of backup storage required and more efficiently centralize backup data from multiple sites for assured disaster recovery. Selecting a SharePoint Backup Strategy To create SharePoint backup strategies, identify the critical components within a SharePoint environment that require backup protection and the frequency with which backups should occur. While creating backup jobs, ensure you always combine full backup jobs with incremental jobs. Incremental backup jobs will only back up information that is new, or that has been changed or updated since the last backup job. This can greatly reduce the time required for backup jobs to complete.
  • 14. 14 Figure 7: SharePoint Backup Options When developing a SharePoint backup and recovery strategy, consider tools that offer granular recovery and enable the restoration of data directly into the production or test environment to help reduce interruptions to the business and simplify the restoration process. This is where the Agent for Applications and Databases plays an important role. You can restore items to their original location or you can redirect the restore to a new location.
  • 15. 15 Figure 8: SharePoint Restore Options Data growth is a constant problem that modern administrators must manage. It’s important for administrators to regularly analyze their SharePoint infrastructures and adjust their backup strategies as needed. To decide which backup methods to use for optimal protection of SharePoint environments, consider the following: • In small environments, consider running a daily full backup every evening in addition to hourly incremental/differential backups • In mid-sized environments, consider running a weekly full backup and daily incremental/differential backups • In large environments, consider running daily incremental/differential backups, with full backups occurring twice a month • Use the checksum feature to check database integrity • Perform test restores periodically • Combine different backup types to optimize the backup strategy • Leverage compression and encryption features when creating a backup job to ensure data security Granular Recovery Technology Catalog Operations To enable granular recovery of SharePoint files and objects, Backup Exec performs catalog operations against the SharePoint backup data that has been captured. To enable greater administration control and flexibility of backup operations, these catalog operations can be scheduled to run according to the desires of the administrator. The granular recovery catalog scheduling options are displayed in the screenshot below.
  • 16. 16 Figure 9: Granular Recovery Catalog Operation Scheduling
  • 17. 17 Performance Recommendations Listed below are recommendations for optimizing the performance of SharePoint backup operations. These include the following: • Schedule backup jobs when activity on SharePoint servers is low • Consider a disk-to-disk-to-tape (D2D2T) backup strategy; backing up to disk will greatly increase both backup and recovery performance • Use a separate network for SharePoint backups • Avoid disk-intensive SharePoint operations during backups • For physical SharePoint servers, consider using client-side Deduplication • Use daily differential or incremental backups in addition to periodic full backups • Upgrade your Backup Exec infrastructure to the latest available version • Use a disk maintenance utility to keep SharePoint disk defragmentation low • If multiple networks are available, use the Central Admin Server Option to alternate what network interfaces are used for backups
  • 18. 18 For More Information Link Description www.symantec.com/business/backup-exec-for-windows-servers BE Family Landing Page www.symantec.com/business/products/whitepapers.jsp?pcid=pcat_business_cont&pvid=57_1 BE White Papers www.symantec.com/business/products/datasheets.jsp?pcid=2244&pvid=57_1 BE Datasheets, Solution Briefs TECH205797 Compatibility Docs www.backupexec.com/configurator BE Product Configurator www.backupexec.com/skugenerator SKU Generator and BEST Tool
  • 19. 19
  • 20. 20 About Symantec Symantec is a global leader in providing security, storage, and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. Headquartered in Mountain View, Calif., Symantec has operations in 40 countries. More information is available at www.symantec.com. For specific country offices and contact numbers, please visit our website. Symantec World Headquarters 350 Ellis St. Mountain View, CA 94043 USA +1 (650) 527 8000 1 (800) 721 3934 www.symantec.com Symantec helps organizations secure and manage their information-driven world with data backup and recovery software. Copyright © 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, and the Checkmark Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Linux is a registered trademark of Linus Torvalds. Other names may be trademarks of their respective owners. 8/2015