ShadowProtect User Guide

ShadowProtect User Guide
ShadowProtect User
Guide
Author:
STC Admin
Date:
Nov 30, 2011 6:22 AM
URL:
http://doc.storagecraft.com/wiki/display/enSPguide/ShadowProtect+User+Guide
Page 1 of 91
ShadowProtect User Guide
Table of Contents
1 Additional Information ________________________________________________________________ 6
2 Documentation Conventions ___________________________________________________________ 7
3 ShadowProtect Overview _____________________________________________________________ 8
3.1 Features and Components ________________________________________________________ 8
3.2 Usage Scenarios _______________________________________________________________ 10
3.2.1 ShadowProtect Console Scenarios ___________________________________________ 10
3.2.2 VirtualBoot Scenarios ______________________________________________________ 11
4 How ShadowProtect Works ___________________________________________________________ 14
4.1 Create a Backup Image __________________________________________________________ 14
4.1.1 Create a Virtual Volume ____________________________________________________ 14
4.1.2 Capture the Virtual Volume _________________________________________________ 15
4.2 Restore a Backup Image _________________________________________________________ 15
4.2.1 Recover individual files and folders ___________________________________________ 15
4.2.2 Restore an entire volume ___________________________________________________ 16
4.3 Backup Image Files _____________________________________________________________ 16
4.3.1 File Naming Conventions ___________________________________________________ 17
4.3.2 File Dependencies ________________________________________________________ 17
5 Installing ShadowProtect _____________________________________________________________ 19
5.1 Requirements _________________________________________________________________ 19
5.1.1 Hardware Requirements ___________________________________________________ 19
5.1.2 Supported Operating Systems _______________________________________________ 20
5.1.3 Supported File Systems ____________________________________________________ 21
5.1.4 Supported Storage Media __________________________________________________ 21
5.1.5 Multi-Boot Enviroments ____________________________________________________ 21
5.2 License and Install Options _______________________________________________________ 22
5.2.1 ShadowProtect for Managed Service Providers _________________________________ 22
5.2.2 ShadowProtect Virtual _____________________________________________________ 23
5.3 Starting ShadowProtect __________________________________________________________ 23
5.4 Activating ShadowProtect ________________________________________________________ 23
5.4.1 Automatic Activation _______________________________________________________ 24
5.4.2 Manual Activation _________________________________________________________ 25
5.4.3 Deactivating ShadowProtect ________________________________________________ 25
5.5 Uninstalling shadowProtect _______________________________________________________ 26
6 Understanding ShadowProtect Console _________________________________________________ 27
6.1 Menu Bar _____________________________________________________________________ 27
6.2 Navigation Panel _______________________________________________________________ 28
6.3 Tabs ________________________________________________________________________ 31
6.3.1 Wizards Tab _____________________________________________________________ 31
6.3.2 Disk Map Tab ____________________________________________________________ 32
6.3.3 Backup Jobs Tab _________________________________________________________ 33
6.3.4 Destinations Tab _________________________________________________________ 34
6.3.5 Backup History Tab _______________________________________________________ 35
Page 2 of 91
ShadowProtect User Guide
6.4 Management View ______________________________________________________________ 35
6.5 Network View _________________________________________________________________ 36
7 Creating Backup Image Files _________________________________________________________ 38
7.1 Backup Image File Storage Locations _______________________________________________ 40
7.2 Destinations ___________________________________________________________________ 41
7.2.1 Editing Destinations _______________________________________________________ 42
7.2.2 Deleting Destinations ______________________________________________________ 43
7.3 Options ______________________________________________________________________ 43
7.3.1 Compression Method ______________________________________________________ 43
7.3.2 File Protection ___________________________________________________________ 43
7.3.3 Split Image File __________________________________________________________ 44
7.3.4 Backup Job Name ________________________________________________________ 44
7.3.5 Backup Comment _________________________________________________________ 45
7.3.6 Advanced Options ________________________________________________________ 45
7.4 Deleting Backup Image Files ______________________________________________________ 48
8 Mounting Backup Image Files _________________________________________________________ 49
8.1 Mounting Backup Image Files in Windows ___________________________________________ 50
8.2 Backup Image Mount Options _____________________________________________________ 51
8.3 Dismounting Backup Image Files __________________________________________________ 52
8.3.1 Dismounting Backup Image Files in Windows ___________________________________ 53
9 Restoring a Volume _________________________________________________________________ 54
10 Image Conversion Tool ______________________________________________________________ 57
11 Remote Management _______________________________________________________________ 59
11.1 Remote Management with the Management Console __________________________________ 59
11.1.1 Installing the Backup Agent Remotely _________________________________________ 59
11.1.2 Mgmt View - Adding and Deleting Remote Nodes ________________________________ 61
11.1.3 Mgmt View - Modifying Remote Node Properties ________________________________ 61
11.1.4 Mgmt View - Connecting and Disconnecting Remote Nodes _______________________ 62
11.2 Remote Management with the Network View _________________________________________ 63
11.2.1 Network View - Adding and Deleting Remote Nodes ______________________________ 63
11.2.2 Network View - Modifying Remote Node Properties ______________________________ 64
11.2.3 Network View - Connecting and Disconnecting Remote Nodes _____________________ 65
11.2.4 Exporting and Importing Node Settings ________________________________________ 65
11.3 Creating an Install Setup Package _________________________________________________ 66
12 Using VirtualBoot ___________________________________________________________________ 67
12.1 VirtualBoot Requirements ________________________________________________________ 67
12.1.1 Software Requirements ____________________________________________________ 67
12.1.2 Hardware Requirements ___________________________________________________ 68
12.2 Limitations ____________________________________________________________________ 68
12.3 Creating a VM _________________________________________________________________ 69
12.3.1 Creating a VM Manually ____________________________________________________ 71
12.4 Configuring a VM _______________________________________________________________ 73
12.4.1 Configuring a Network Adapter ______________________________________________ 73
12.4.2 Configuring Drivers _______________________________________________________ 74
12.4.3 Installing Guest Additions ___________________________________________________ 74
12.4.4 Continuing Incremental Backups _____________________________________________ 75
Page 3 of 91
ShadowProtect User Guide
13 Other Operations ___________________________________________________________________ 77
13.1 Verifying Backup Image Files _____________________________________________________ 77
13.1.1 To test a backup image with the Verify Image tool _______________________________ 77
13.2 Configuring Email Notifications ____________________________________________________ 78
13.2.1 To configure email notifications ______________________________________________ 78
13.3 Log Files _____________________________________________________________________ 80
13.4 Creating Key Files ______________________________________________________________ 80
13.4.1 To install KeyFileMaker ____________________________________________________ 80
13.4.2 To create a key file ________________________________________________________ 81
13.5 Changing Partition Creation Policy _________________________________________________ 81
13.5.1 To modify partition creation settings __________________________________________ 82
13.6 Creating a Recovery CD _________________________________________________________ 82
13.6.1 To create a Recovery Environment disk _______________________________________ 82
14 Best Practices _____________________________________________________________________ 84
15 Retention Policy Configurations _______________________________________________________ 85
16 Product Support ___________________________________________________________________ 86
16.1 Complimentary Technical Support _________________________________________________ 86
16.2 E-Mail Support _________________________________________________________________ 86
16.3 Telephone Support _____________________________________________________________ 86
17 Glossary _________________________________________________________________________ 87
Page 4 of 91
ShadowProtect User Guide
Welcome to the StorageCraft® ShadowProtect® User Guide. This Guide describes the ShadowProtect
technology, how to use the product, and how to derive maximum benefit from ShadowProtect.
ShadowProtect comes in multiple editions. While most differences between ShadowProtect editions relate to
the associated user license, this Guide specifically identifies information that applies to a specific edition.
Edition
Description
ShadowProtect Provides volume backup and restore options for a single desktop system. This edition is
most suitable for home use.
Desktop
ShadowProtect Provides backup and restore options for server operating systems. A separate license is
required for each installed Windows OS.
Server
ShadowProtect Provides backup and restore options for Microsoft Small Business Server (SBS). A
separate license is required for each installed Windows OS.
SBS
ShadowProtect Provides a subscription-based licensing model for Managed Service Providers (MSP)
that want to provide disaster recovery solutions for their clients.
MSP
ShadowProtect Provides a VM-based licensing model for disaster recovery in a virtualized environment.
Virtual
This Guide includes the following major sections:
ShadowProtect Overview
How ShadowProtect Works
Installing ShadowProtect
Understanding ShadowProtect Console
Create a Backup Image
Mounting Backup Image Files
Restoring a Volume
Image Conversion Tool
Remote Management
Using VirtualBoot
Other Operations
Best Practices
Additionally, this Guide includes the following general information sections:
Retention Policy Configurations
Product Support
Glossary
Page 5 of 91
ShadowProtect User Guide
1 Additional Information
For emerging issues and other resources, see the following:
The readme.txt file included with the ShadowProtect product files.
The StorageCraft technical support Web site at www.storagecraft.com/support.html.
This User Guide is also available in the ShadowProtect user interface from the Help menu.
Page 6 of 91
ShadowProtect User Guide
2 Documentation Conventions
This symbol designates Note or Warning text that highlights important information about the
configuration and/or use of ImageManager.
Page 7 of 91
ShadowProtect User Guide
3 ShadowProtect Overview
ShadowProtect provides robust and flexible disaster recovery by creating and managing backup image files.
Each backup image file represents the exact state of your system at a given point-in-time. ShadowProtect
provides tremendous advantages over traditional disaster recovery methods.
Other Methods
ShadowProtect
1 Repair hardware if necessary
1 Repair hardware if necessary
2 Collect all necessary OS media
2 Boot from Recovery CD
3 Reload OS from CD-ROM
3 Restore entire system or selected files
4 Reboot
4 Reboot
5 Apply multiple service packs
FULLY RESTORED IN MINUTES
6 Reboot (this could take several reboots)
7 Reload backup software from CD-ROM
8 Patch backup software to the latest support level
9 Reboot
10 Load recovery tape and restore
FULLY RESTORED IN HOURS
You should be aware of the following information as you prepare to install and use ShadowProtect:
Features and Components
Usage Scenarios
3.1 Features and Components
For a complete version history of product updates, see the readme.rtf, located in the
\StorageCraft\ShadowProtect folder of your ShadowProtect installation.
Component
Features
Page 8 of 91
ShadowProtect User Guide
ShadowProtect An easy-to-use management console that lets you manage the disaster recovery
Console
configuration on your Windows system. ShadowProtect console provides the
following primary features:
Microsoft VSS-aware (Volume Shadow CopyService) so you can unobtrusively
back up changes in the background.
Wizard-based back-up to any accessible hard disk, including network storage
(SAN, NAS, iSCSI), removable drives (USB, FireWire), and optical media (CD,
DVD, Blu-Ray).
Verify backup images to ensure complete recovery.
Create compressed and encrypted backup image files for efficiency and security.
Wizard-based recovery of files, folders, or a complete data volume, to an exact
point-in-time.
View backup images for quick file and folder recovery.
Remotely manage system backup and recovery operations.
VirtualBoot lets you create a mount any backup image file as a virtual disk in the
VirtualBoxVirtual Machine environment.
ShadowProtect The engine that creates and manages a system's point-in-time backup images. The
Backup Agent
Backup Agent also handles mounting of backup image files. You can manage the
operation of the Backup Agent from the ShadowProtect Console.
To access the ShadowProtect Backup Agent, you must be a user with local
administration rights.
StorageCraft
A bootable Windows environment for disaster recovery without installing software.
Recovery
For more information about the Recovery Environment, see the StorageCraft
Environment
Recovery Environment User Guide.
Access all the features of the ShadowProtect Console from a standalone disaster
recovery environment.
Loads from the bootable ShadowProtect CD.
Restore a system (bootable) volume quickly and easily.
Back up a non-bootable system before attempting a restore operation.
Use Hardware Independent Restore (HIR) to restore to different hardware, or to
virtual environments (P2P,P2V,V2P).
Network configuration tool to manage TCP/IP properties, domains and network
resources.
Page 9 of 91
ShadowProtect User Guide
ImageManager ImageManager provides unprecedented control over your backup image files. It
provides policy-driven services for managing backup image files. For more information
about ImageManager features, see the ShadowProtect ImageManager User Guide.
Consolidation of Incremental backup image files into daily, weekly, and monthly
consolidated image files that greatly reduce the number of files in an image chain.
Verification and re-verification of backup image files, including consolidated files.
Replication of backup image files to a local drive, a network share, or an off-site
location (using FTP).
Head Start Restore (HSR) lets you restore a backup image while ShadowProtect
continues to add Incremental backup images to it. This lets you greatly reduce the
downtime associated with hardware failure or hardware migration tasks.
3.2 Usage Scenarios
ShadowProtect offers a variety of backup and recovery solutions, depending on your needs. This section
includes several usage scenarios that help describe ShadowProtect features and benefits. ShadowProtect
usage scenarios are organized into the following types:
ShadowProtect Console Scenarios
VirtualBoot Scenarios
3.2.1 ShadowProtect Console Scenarios
The following scenarios introduce several common use cases for ShadowProtect:
Live Backup
Problem: When taking system backups, I cannot take the time to shutdown a system each time I want to
create a backup image.
ShadowProtect Solution: By leveraging disk imaging with existing Windows snapshot technology,
ShadowProtect lets you create live system backups without any system downtime. ShadowProtect creates
live backup images that include a system's operating system, critical data and configuration settings.
ExactState Backup Images
Problem: I need to create the most reliable and recoverable backup images possible.
ShadowProtect Solution: ShadowProtect includes ExactState backup image technology that lets you
create an image from the StorageCraft Recovery Environment, thereby ensuring that all system files and
resources are closed and in a state where ShadowProtect can create a complete backup image. ExactState
image technology supports all Windows server and desktop operating systems.
Page 10 of 91
ShadowProtect User Guide
Create Full and Incremental Backup Images
Problem: Making a full backup image every time I backup a system is very time consuming. I need to be
able to make incremental backup images to save time and space.
ShadowProtect Solution: ShadowProtect uses a sector-based backup strategy that lets it backup just the
changes to a file in an Incremental backup image file. Sector-based incremental backup is the quickest and
most efficient way to take an incremental backup. Once you have an initial Full backup, you can create
regular Incremental backup images from that point forward.
Individual Folder and File Restore
Problem: Restoring individual files and folders traditional backup systems, such as a tape drive, can be very
difficult and time-consuming...assuming I can even find the necessary data in the first place. I need a quick
and easy method to recover lost files or folders.
ShadowProtect Solution: Use the ShadowProtect Backup Explore Wizard to mount a backup image file as
a volume using a Drive letter or mount point. Once mounted, you can explore and recover individual files and
folders from the backup image. Disk-based backup images provide fast file access, and you can even share
backup images so Since the backups are disk-based, the process is very fast and easy and uses Windows
Explorer. The IT administrator can mount a backup image and share this with end users who can select the
files and folders they need to restore.
Update an Existing Backup Image
Problem: I have an existing backup image, but need to update a driver in that image, or clean a virus or
other malware from the backup image before restoring files. I don't want to have to clean the system, then
re-create the backup image before using it to restore a system.
ShadowProtect Solution: Because you can mount ShadowProtect backup image files as read/write
volumes, you can modify and repair backup images as needed. ShadowProtect saves backup image
changes as a separate Incremental image file.
3.2.2 VirtualBoot Scenarios
The following scenarios introduce several possible use cases for VirtualBoot:
Historical Data Access
Problem: After transitioning to a new financial management system, you are audited. To satisfy the audit,
you need access to historical tax records stored in the proprietary format of the old financial software.
Unfortunately, you no longer have the old software, so you cannot access your historical tax records.
VirtualBoot Solution: Rather than trying to restore a complete backup image that contains the old financial
software, use VirtualBoot to boot the backup image, which gives you access to both the application and the
data from your system at the time of the backup. By preserving the applications with the data, you can
greatly extend the lifespan of your data.
Page 11 of 91
ShadowProtect User Guide
Software Testing
Problem: You need to find out how some new software performs on your production system, but you don't
want to risk having any problems.
VirtualBoot Solution: VirtualBoot the latest backup of your production system, then install the software in
the virtual machine. You can evaluate the software performance using your system's actual production
environment without any risk to your production system.
Backup Image Testing
Problem: You need to confirm that your backup images restore properly and that they provide access to all
your mission critical applications and data.
VirtualBoot Solution: VirtualBoot a recent backup image and you can verify that the restored applications
and data perform as expected..
Hardware Failure
Problem: You have a database server and the 20TB disk array crashes. You need to get the system back
on-line and replace the disk subsystem.
VirtualBoot Solution: This solution is a three-step process:
1. VirtualBoot the latest backup image of your database server so users can continue using the
database. The interim VM solution performs well because there is no file conversion required.
StorageCraft provides native support for its backup image files in the VirtualBox environment.
As part of this process, configure ShadowProtect to continue creating Incremental backups in the VM,
preferably every 15 minutes. These Incremental backups are part of the original backup image chain.
ShadowProtect has VirtualBox store the VM-generated Incremental backups in native VDI files. While
these files are relatively tolerant of VM host crashes, or VirtualBox.exe or VBoxSvc.exe process
crashes, they might become corrupt and prevent the VM from restarting. If this happens, create a
new VirtualBoot VM, using as the VM source the latest Incremental backup created in the prior VM.
Warning: To continue uninterrupted Incremental backups in a VirtualBoot VM, the
ShadowProtect backup job that creates the backup image files must use a ShadowProtect
Destination Object of type Network (see Destinations ).
2. Start a HeadStart Restore (HSR) on the database server's new disk subsystem (For more
information, see the ShadowProtect ImageManager User Guide).
3. Once the HSR catches up to the most current Incremental, created in the VM, take the VM offline and
finalize the HSR installation on the new disk subsystem (a quick operation), then bring the database
server hardware back on-line.
Page 12 of 91
ShadowProtect User Guide
Note: Once the replacement VM is on-line and continuing the Incremental backup image chain,
you can recover from a hardware failure in several different ways, including:
Restore to the original hardware, once repaired.
Restore to new hardware (using StorageCraft Recovery Environment's Hardware
Independent Restore (HIR)).
Restore permanently to a VM environment by using HSR to restore to a VHD or VMDK
virtual machine hard disk file.
Page 13 of 91
ShadowProtect User Guide
4 How ShadowProtect Works
ShadowProtect provides robust and flexible disaster recovery by creating and managing backup image files.
Each backup image file represents the exact state of your system at a given point-in-time.
ShadowProtect Backup and Restore - How it Works
This section includes the following topics:
Create a Backup Image.
Restore a Backup Image
Backup Image Files
4.1 Create a Backup Image
Creating a ShadowProtect backup image involves two key processes:
4.1.1 Create a Virtual Volume
Using Microsoft VolSnap and VSS (with Windows Server 2003, Windows XP, or later), ShadowProtect
creates a point-in-time snapshot of the volume you want to backup. The entire process of taking a snapshot
of a volume and creating a virtual volume takes only seconds and does not interfere with system operation.
Snapshot
Supported
Image Quality Comments
OS
Speed
StorageCraft
Windows XP
Fast
VSM with
/ 2003 and
VSS aware applications are managed to achieve
VSS
later
best backups.
Best
Can use script files to manage applications that
are not VSS aware to improve backups.
Page 14 of 91
ShadowProtect User Guide
Microsoft
Windows XP
Slow
Best
VolSnap with / 2003 and
VSS aware applications are managed
VSS
automatically to achieve best backups.
later
Use script files (before and after the snapshot) to
manage non-VSS-aware applications and improve
backups.
Cannot create Incremental Image File (see
Glossary ).
StorageCraft
Windows
VSM direct
2000
Fast
Good
Use script files (before and after the snapshot) to
manage applications (both VSS and non-VSS) and
improve backups.
Additionally, ShadowProtect provides a Backup Scheduler that lets you configure automated backup jobs for
protected volumes. You can schedule Full Image, Incremental Images (as often as every 15 minutes), and
manage the retention of Backup Image Sets. The ShadowProtect Image Conversion Tool simplifies image
management by letting you manage existing image files, including consolidating files in an Image Set,
modifying password encryption and compression, and merging or splitting image files.
4.1.2 Capture the Virtual Volume
To backup the volume, ShadowProtect replicates the virtual volume to create a backup image file. A backup
image file is a sector-by-sector representation of the volume at the time the volume snapshot was taken. For
more information about backup image files, see Backup Image Files.
ShadowProtect writes the backup image file to the designated storage media. Options include network
storage (SAN, iSCSI, NAS, etc.), removable storage (USB / FireWire), and optical storage (CD, DVD,
Blu-ray). The amount of time it takes to write the backup image file depends upon the system hardware and
the size of the image file. For information about configuring and creating backup image files, see Create a
Backup Image.
4.2 Restore a Backup Image
Once you have created a backup image, you can use a ShadowProtect backup image to restore data in two
different ways:
4.2.1 Recover individual files and folders
Page 15 of 91
ShadowProtect User Guide
Use the ShadowProtect Mount utility to mount the backup image file as a volume using either a drive letter or
a mount point. The Mount utility can efficiently mount hundreds of backup images simultaneously, if desired.
Furthermore, since the mounted backup image files preserve the Windows volume properties, users can
share and access the backup image file for emergency access to backup image file data, including modifying
and saving changes to the backup image file as an incremental backup file.
For more information about mounting backup image files to recover data, see Mounting Backup Image Files.
4.2.2 Restore an entire volume
Use the ShadowProtect Restore Wizard to restore an entire volume from a backup image file. You can
restore a system volume (that contains the system's operating system) using the StorageCraft Recovery
Environment, or restore non-system volumes using either Recovery Environment or while running
ShadowProtect Console in Windows.
For more information about recovering volumes, see Restore a Backup Image.
4.3 Backup Image Files
A ShadowProtect backup image file is a point-in-time representation of a computer volume. It is not a
standard file copy of the volume, but rather a sector-by-sector duplicate of the volume. Because of this, you
can mount a backup image file (using the ShadowProtect Mount utility) and view its contents as if it were a
regular volume. In the event that you need to recover data, you can recover specific files and folders from
the image or you may recover the entire volume to the exact point-in-time that the backup image was taken.
ShadowProtect uses the following types of backup image files to provide a complete disaster recovery
solution.
Backup
Description
Images
Full
A stand-alone image file that represents a disk volume at a specific point-in-time. Full
.spf
backup image files do not rely and does not rely on any other files.
Incremental
An image file that contains volume changes relative to another backup image file. You
.spi
can create Incremental backup image files relative to Full backup images or other
Incremental backup images. ShadowProtect also creates an Incremental image file when
an existing image file is mounted as a read/write volume and modified.
Incremental backup image files let ShadowProtect offer multiple volume backup
strategies, including Differential and Incremental backup options. See Glossary for
information about these backup strategies.
Spanned
Image files that belong to a spanned Image Set. Spanned Image Sets are made by
.sp_#_
breaking a backup image file into pieces for increased portability (for example, to save
the image file on multiple CDs).
The actual Spanned image file name replaces the pound sign (#) with a number that
indicates the position of the file within the spanned Image Set.
Page 16 of 91
ShadowProtect User Guide
ImageManager Image files that have been automatically collapsed by ShadowProtect ImageManager.
The suffix before the file extension indicates if the file is a daily, weekly or monthly
-cd.spi
-cw.spi
collapsed backup files.
-cm.spi
.spk
A password key file used to encrypt backup image files.
4.3.1 File Naming Conventions
ShadowProtect backup image files use the following naming convention to help you identify the file and its
relationship to, and dependencies on, other backup image files.
<volume-identifier>-b_<base-seq>-d<diff-seq>-i<inc-seq>.<extension>_
volume-identifier: Identifies the volume that the backup image file represents.
base-seq: The Base Image File sequence number. This either identifies the sequence number of this file, or
identifies the Base Image File upon which this file is dependent.
diff-seq: The Differential backup sequence number. This either identifies the sequence number of this file,
or identifies the Differential Image File upon which this file is dependent.
inc-seq: The Incremental backup sequence number. This either identifies the sequence number of this file,
or identifies the Incremental Image File upon which this file is dependent.
extension: The file extension, which identifies if the file is a Full, Incremental, or Spanned backup image file.
File Type Extension
Description
C_Vol-b001.spf
Full image of the C: volume.
C_Vol-b001-d001-i000.spi Differential image of the C: volume with a dependency on the full
*
backup image file C_Vol-b001.spf
or
C_Vol-b001-d001.spi
C_Vol-b001-d000-i000.spi Incremental image of the C: volume with a dependency on the full
*
backup image file C_Vol-b001.spf
or
C_Vol-b001-i001.spi
C_Vol-b001-d001-i001.spi Incremental backup image file of the C: volume with a dependency on
the differential backup image file C_Vol-b001-d001.i000 which in
turn has a dependency on C_Vol-b001.spi.
*Backup image file names that include the “-d000” or “-i000” segment identifier indicate that the backup
image file does not rely on any other Differential or Incremental backup image files.
Page 17 of 91
ShadowProtect User Guide
4.3.2 File Dependencies
By examining the name of a backup image file, ShadowProtect users can identify the files on which it
depends. However, it is not possible to determine if other backup image files are dependent on this file.
Because of this, it is very important to use the Image Conversion Tool (see Image Conversion Toolto review
dependencies prior to moving, modifying or deleting backup images.
Warning:Deleting a backup image file on which other files depend renders the dependent backup
image files useless. You cannot browse or restore files contained by these dependent backup
image files.
Note: Deleting a full image file from an active backup image job causes ShadowProtect to create a
new Full image during the next scheduled backup and start a new backup Image Set.
Page 18 of 91
ShadowProtect User Guide
5 Installing ShadowProtect
Before installing ShadowProtect, review the Requirements and the License and Install Options.
To Install ShadowProtect
1. Insert the ShadowProtect CD into the system's CD drive.
If the installation does not start automatically, browse the ShadowProtect CD and run AUTORUN from
the root of the CD.
2. On the Product Installation CD home page, select the product version to install (Desktop, Server,
Small Business Server).
The appropriate install Wizard loads to walk you through the installation process.
3. On the Welcome page, click Next.
4. On the License Agreement page, select I accept the terms of the license agreement, then click
Next.
You must accept the license agreement to install ShadowProtect. Click Print to print out the License
Agreement.
5. On the Choose Components page, select the ShadowProtect components to install, then click Next.
Agent: Installs the ShadowProtect Backup agent, which lets you remotely manage
ShadowProtect operations on this system.
Console: Installs the ShadowProtect Management View, which lets you manage
ShadowProtect operations for the system, and remote systems if desired.
Mount: Installs the ShadowProtect mount driver and adds the ability to mount and dismount a
backup image file using the right-click menu in Windows Explorer.
6. In the Ready to Install the Program page, click Install.
7. In the InstallShield Wizard Complete page, select Yes, I want to restart my computer now, then
click Finish.
If you cannot restart the computer immediately, select No, I will restart my computer later.
However, you must restart the computer before attempting to use ShadowProtect.
8. Remove the ShadowProtect CD from the system's CD drive.
5.1 Requirements
ShadowProtect has the following hardware and software requirements:
Hardware Requirements
Supported Operating Systems
Supported File Systems
Supported Storage Media
5.1.1 Hardware Requirements
Hardware
ShadowProtect
Recovery Environment (RE)
Page 19 of 91
ShadowProtect User Guide
CPU
300 MHz or higher
Windows 2008 RE: 1 GHz or faster.
Pentium-compatible CPU.
Windows 2008 RE (Japan only): 1.4 GHz (x64
processor) or 1.3GHz (Dual Core).
Windows 2003 RE: 550 MHz or faster. Supports
up to four processors per system.
Memory
Hard Drive
The greater of 256 MB or the
Windows 2008 RE: 512 MB minimum.
Operating System minimum.
Windows 2003 RE: 256 MB minimum.
50 MB free disk space.
N/A
Required.
Required.
VGA or higher resolution.
VGA or higher resolution.
space
CD-ROM or
DVD drive
Monitor
5.1.2 Supported Operating Systems
Specific Operating System support is dependent upon the edition of ShadowProtect that you have
purchased. However, ShadowProtect supports both 32-bit and 64-bit versions of the operating system,
where applicable.
Edition
Description
ShadowProtect
Desktop
Edition
Windows XP Family, including:
XP Home
XP Professional
Windows Vista Family, including:
Vista Home Basic
Vista Home Premium
Vista Ultimate
Windows 7
Windows 2000 Workstation SP4 (Support for Hot Backup of the booted OS and
Cold Backup from Recovery Enviroment.)
Page 20 of 91
ShadowProtect User Guide
ShadowProtect
Server Edition
Window Server 2000 SP4 (Support for Hot Backup of the booted OS and Cold
Backup from Recovery Enviroment.)
Windows Server 2003 family, including:
Server 2003 Standard Edition
Server 2003 Standard Edition R2
Server 2003 Advanced Edition
Server 2003 Advanced Edition R2
Server 2003 Enterprise Edition
Server 2003 Enterprise Edition R2
Server 2003 Datacenter Edition
Server 2003 Datacenter Edition R2
Server 2003 Web Edition
Small Business Server 2003
Windows Server 2008 (including R2)
ShadowProtect
SBS Edition
Small Business Server 2003
(Small Business)
Small Business Server 2008
5.1.3 Supported File Systems
ShadowProtect supports the following File Systems:
FAT16
FAT16X
FAT32
FAT32X
NTFS
Dynamic Disks
5.1.4 Supported Storage Media
ShadowProtect supports the following storage media:
Locally-connected hard drives
Removeable hard drives (USB or FireWire)
Network drives (SAN, NAS, iSCSI)
Optical media (CD, DVD, Blu-Ray)
5.1.5 Multi-Boot Enviroments
Page 21 of 91
ShadowProtect User Guide
If your system has multiple boot partitions, install ShadowProtect on each of the bootable Windows partitions
to guarantee that ShadowProtect recognizes changes to ShadowProtect-managed volumes from these
secondary Windows environments. You do not need to activate ShadowProtect, but the snapshot driver
(stcvsm.sys) must be available in each Windows partition.
The snapshot driver manages the fast incremental tracking in ShadowProtect. If you boot to an alternate OS
environment where the snapshot driver is not loaded, ShadowProtect cannot track volume updates from
that OS boot session. This means that your next Incremental backup misses any changes made from the
alternate OS.
If one or more of non-Windows operating systems, such as Linux, can write to a ShadowProtect-managed
volume, you can make sure ShadowProtect recognizes those changes by doing the following:
Create a script, that executes during the startup/logon phase of the non-Windows OS, to delete all
VSM000.IDX (case-sensitive) files from the root directory of each ShadowProtect-managed volume.
Removing these files forces stcvsm.sys, when your primary Windows volume boots, to use a Full
Differential/Comparison backup, which captures any changes made to the volume from the
non-Windows OS.
5.2 License and Install Options
Use of ShadowProtect is governed by the ShadowProtect End User License Agreement. However,
StorageCraft provides the following ShadowProtect license options to help you in your decision-making
process:
Purchased License: StorageCraft licenses ShadowProtect on a per system basis (based on the number of
systems for which you are making backups. For example, using ShadowProtect to backup 100 computers
requires 100 licenses. Before using the Software, review the complete End User License Agreement (see
http://www.storagecraft.com/legal).
Evaluation Version License: StorageCraft provides an Evaluation version of the ShadowProtect Software
as a CD or ISO image file. With the Evaluation version, you can create backup image files of system and
data volumes. You can also restore system and data volumes or specific files and folders. The Evaluation
version includes the StorageCraft Recovery Environment, so you can restore system volumes with the
Evaluation version. The Evaluation version expires and ceases to operate when the Evaluation period ends.
Images created during the Evaluation period are fully compatible with the registered (purchased) version of
the Software.
Trial Version License: StorageCraft provides a Trial version of the ShadowProtect software as a free
download. With the Trial version, you can create backup image files of system and data volumes. You can
also restore system and data volumes or specific files and folders. However, the Trial version expires and
ceases to operate when the trial period ends. Images created during the trial period are fully compatible with
the registered (purchased) version of ShadowProtect. However, you cannot restore the system volumes
because StorageCraft Recovery Environment is not included with the Trial version.
5.2.1 ShadowProtect for Managed Service Providers
Page 22 of 91
ShadowProtect User Guide
ShadowProtect for Managed Services (SPMSP) is a subscription-based licensing option for Managed
Service Providers (MSP) that want to provide disaster recovery services to their clients. MSPs should be
aware of the following features related to ShadowProtect for Managed Services:
SPMSP supports all types of Windows installations (Desktop, Server, SBS, etc.) using a single
product installer.
On a daily basis, SPMSP licenses "call home" to StorageCraft servers to confirm that they are still
active. Because of this, SPMSP requires Internet connectivity.
An SPMSP license activation is valid for 30 days. As part of the "call home" process, SPMSP licenses
auto-renew every 30 days unless one of the following occurs:
The MSP or StorageCraft explicitly deactivates the license.
The license stops calling home, in which case it automatically deactivates.
The StorageCraft MSP Licensing Console (http://msp.storagecraft.com) lets MSPs create and
manage SPMSP licenses, including remotely deactivating licenses when needed.
5.2.2 ShadowProtect Virtual
ShadowProtect Virtual is a licensing model specifically designed for virtual environments. It allows you to
purchase VM licenses for ShadowProtect in multi-license bundles (3-pack, 6-pack, 12-pack, 24-pack,
50-pack).
ShadowProtect Virtual offers the same features and functionality available in ShadowProtect at a price point
more conducive to a virtualized environment.
Note: ShadowProtect Virtual licenses allow you to migrate or restore to a physical environment.
However, once restored the virtual license does not permit ShadowProtect to continue making
backups. You must use a standard ShadowProtect license to make backups in a physical
environment.
5.3 Starting ShadowProtect
You can access ShadowProtect in two ways:
From Windows: Select Start > All Programs > ShadowProtect > ShadowProtect.
From Recovery Environment: Put the ShadowProtect CD in the system's CD-ROM drive, then boot the
system. Make sure your system boot sequence is set to boot from the CD before the hard drive. For more
information about loading and using Recovery Environment, see the see the Recovery Environment User
Guide.
5.4 Activating ShadowProtect
Page 23 of 91
ShadowProtect User Guide
When you purchase ShadowProtect, StorageCraft provides you with a product serial number and an
Evaluation version of the purchased product. The Evaluation version provides 30 days of product access,
during which you must activate the product. If you do not activate the product within 30 days of installation,
the product times out and stops functioning.
You can activate ShadowProtect in the following ways:
Automatic Activation
Manual Activation
You can also deactivate a previously activated ShadowProtect installation to free a product license for use
by another system (see Deactivating ShadowProtect).
5.4.1 Automatic Activation
StorageCraft provides an activation server that you can use to quickly and easily activate your
ShadowProtect installation.
To activate ShadowProtect automatically
1. Start ShadowProtect.
For more information, see Starting ShadowProtect.
2. From the Menu Bar select Help > Product Activation.
3. In the Product Activation dialog box, provide the requested information, then click OK.
Customer Name: (Optional) Specify the name of the product purchaser, either person or
organization.
Product Serial Number: Enter the serial number that you received when purchasing ShadowProtect.
4. ShadowProtect notifies you if the activation process was successful.
1. If the activation is successful, click Close.
2. If the activation was not successful, review the message to determine why the activation was
unsuccessful. To correct the problem, do one of the following:
1. Review the information in the Product Activation dialog box for accuracy. Correct any
errors, then OK to resubmit the activation request.
2. If your computer cannot successfully communicate to the activation server or the
Internet, wait for a while and try the activation process again.. You can also try using a
manual activation option.
3.
Page 24 of 91
ShadowProtect User Guide
3. If the number of allowed activations for the serial number has been exceeded, you must
purchase additional licenses. If you feel you received this message in error, contact
StorageCraft Support (see Product Support.)
For all other activation issues, contact StorageCraft Support (see Product Support.)
5.4.2 Manual Activation
If for some reason you are unable to use the automated activation method, StorageCraft provide the
following manual options for activating your ShadowProtect installation. These manual options require you to
receive the activation key and manually apply it to your ShadowProtect installation.
To get an activation key
1. Use one of the following methods to contact StorageCraft and request an activation key.
Online: Open a Web browser to http://www.storagecraft.com/product_activation.php.
Email: Request an activation key from StorageCraft Support (support@storagecraft.com).
Phone: Call StorageCraft Support (see Product Support).
2. Provide the information required to generate an activation key.
Product Serial Number: Enter the serial number that you received when purchasing ShadowProtect.
Machine ID: ShadowProtect generates the Machine ID during the installation process. You can view
the Machine ID in the ShadowProtect Activation dialog box (select Help > Product Activation).
Version: The ShadowProtect version you installed. You can view this by selecting Help > About.
Language: The product language you are using (English, Japanese, French, or German).
3. When you receive the activation key, continue with To activate ShadowProtect manually.
Depending on the method used to request the activation key, StorageCraft will deliver it to you either
in a Web form or via an Email where you can copy and paste it into your ShadowProtect installation.
To activate ShadowProtect manually
1. Start ShadowProtect.
For more information, see Starting ShadowProtect.
2. From the Menu Bar select Tools > Product Activation.
3. In the Activation dialog box, select Manual activation.
4. In the Activation Key field, type or copy the activation key, then click Activate.
5.4.3 Deactivating ShadowProtect
When retiring a system, you can deactivate the ShadowProtect license to make the license available for use
on another system.
To deactivate a ShadowProtect license
1. Start ShadowProtect.
For more information, see Starting ShadowProtect.
2. From the Menu Bar select Help > Product Activation.
3.
Page 25 of 91
ShadowProtect User Guide
3. Click Deactivate.
ShadowProtect displays a message stating you can no longer use this product key on this machine
4. Click OK.
5.5 Uninstalling shadowProtect
Use the standard Windows application removal tool to uninstall ShadowProtect.
To uninstall ShadowProtect
1. In Windows, select Start > Settings > Control Panel > Add or Remove Programs.
2. Select ShadowProtect 4.x, then click Remove.
3. Click Yes to complete the uninstall.
After uninstalling ShadowProtect, you must reboot the computer for the changes to take effect.
Page 26 of 91
ShadowProtect User Guide
6 Understanding ShadowProtect Console
ShadowProtect Console provides access to most configuration and operation controls for ShadowProtect:
The console is divided into three panels:
Navigation Panel: Located on the left side of the console, the Navigation panel provides access to the tasks
and tools necessary to configure and operate ShadowProtect. For more information, see Navigation Panel.
Main Panel: Located in the center of the console, the Main panel contains tabbed views of ShadowProtect
tasks and information. For more information, see Tabs.
Network Panel: Located on the right side of the console, the Network panel, or Network View, provides
access to the remote management features in ShadowProtect. For more information, see Remote
Management.
6.1 Menu Bar
ShadowProtect Console has a menu bar that includes the following menus:
Menu
Description
Options
File
Access
Exit: Close the ShadowProtect UI.
application-level
options.
Page 27 of 91
ShadowProtect User Guide
Tasks
Access
Backup: Launches the Backup Wizard (see Create a Backup Image).
ShadowProtect
Restore: Launches the Restore Wizard (see Restoring a Volume).
Wizards.
Explore Backup: Launches the Explore Backup Image Wizard (see
Mounting Backup Image Files).
Dismount Backup Image: Launches the Backup Image Dismount Wizard
(see Dismounting Backup Image Files).
Verify Image: Launches the Verify Image Wizard (see Verifying Backup
Image Files).
Image Conversion Tool: Launches the Image Conversion Tool Wizard
(see Image Conversion Tool).
Add Destination: Opens the Destination dialog box where you can create
named destinations for backup image files (see Destinations).
Refresh Volume Info: Refreshes the ShadowProtect volume list for the
current system.
View
Create custom
Toolbars: Opens the Customize Tool Bar dialog box, where you can create
toolbars and
customized tool bars for the ShadowProtect UI.
manage toolbar
Status Bar: Toggles a status bar at the bottom of ShadowProtect Console
visibility.
that provides application and environment status information.
Task Panel: Toggles visibility of the Navigation Panel (see Navigation Panel
).
Options Access
ShadowProtect
Agent options.
Client Options: Opens the Client Options dialog box where you can
configure visual notifications for backup job success or failure.
Agent Options: Opens the Agent Options dialog box where you can
configure Email notification settings for the current system. You can choose
to send Email notifications for both failed and successful backup jobs.
Help
Access
Contents: Launches the ShadowProtect on-line help system. The help is
ShadowProtect
available only when running ShadowProtect Console in Windows (not in the
help resources.
Recovery Environment).
Product Activation: Opens the Activation dialog box, where you can
activate (or deactivate) the ShadowProtect installation (see Activating
ShadowProtect).
Check for Latest Version: Queries the StorageCraft Web site for updates
to the current ShadowProtect installation. If there is an update available, a
message displays the URL where you can get the update.
Register: Opens a browser to
https://register.storagecraft.com/register/regstart.jsp where you can
manually request an product activation key (see Manual Activation).
About: Displays the ShadowProtect version and copyright information. Click
System Info to open the Microsoft System Information dialog box, which
contains detailed information about the computer.
6.2 Navigation Panel
Page 28 of 91
ShadowProtect User Guide
The left-side Navigation panel provides quick access to ShadowProtect tasks and tools. You can toggle the
Navigation panel on or off by selecting View > Task Panel. The Navigation panel is organized into the
following categories. You can collapse and expand each category, as desired.
Category Description
View
Options
Display or hide the Network
Network View: Displays the nodes running the
View.
ShadowProtect Backup Agent (see Remote Management).
Management View: Displays the Management View in the
Main panel (see Management View).
Tasks
Access ShadowProtect
Backup: Launches the Backup Wizard (see
Wizards.
enSPguide:Creating a Backup Image File).
Restore: Launches the Restore Wizard (see Restoring a
Volume).
Explore Backup: Launches the Explore Backup Image
Wizard (see Mounting Backup Image Files).
Dismount Backup Image: Launches the Backup Image
Dismount Wizard (see Dismounting Backup Image Files).
Verify Image: Launches the Verify Image Wizard (see
Verifying Backup Image Files).
Image Conversion Tool: Launches the Backup Image Tool
Wizard (see Image Conversion Tool).
Add Destination: Opens the Destination dialog box where
you can create named destinations for backup image files
(see Destinations).
Refresh Volume Info: Refreshes the ShadowProtect
volume list for the current system.
Page 29 of 91
ShadowProtect User Guide
Tools
Access ShadowProtect tools.
Note: Several tools are available only in the
Recovery Environment (RE). For more information
about these tools, see the StorageCraft Recovery
Environment User Guide.
Verify Image: Launches the Verify Image Wizard (see
Verifying Backup Image Files).
Image Conversion Tool: Launches the Image Conversion
Tool Wizard (see Image Conversion Tool).
Refresh Volume Info: Refreshes the ShadowProtect
volume list for the current system.
Network Configuration: (RE only) Launches the Network
Configuration utility, where you can configure a computer's
network access settings.
HIR Configuration: (RE only) Launches the Hardware
Independent Restore (HIR) utility, where you can restore a
backup image to a different environment from which it was
created.
Load Drivers: (RE only) Opens the Load Drivers dialog box,
where you can configure storage drivers for use in the
Recovery Environment.
File Browser: (RE only) A simple file browser that lets you
browse files and folders of a backup image file.
Text Editor: (RE only) A simple text editor.
Vista BCD: (RE only) Launches the Vista BCD editor, where
you can edit Boot Configuration Data (BCD) on systems
running Windows Vista.
Partition Table Editor: (RE only) A simple partition table
editor.
UltraVNC: (RE only) Launches the Remote Management
utility, where you can configure remote access to systems
running the Recovery Environment.
Select Your Time Zone: (RE only) Launches the Time Zone
utility, where you can adjust the system's time zone
information.
Enable Logging: (RE only) Opens the Logging dialog box,
where you can configure ShadowProtect event logging.
Page 30 of 91
ShadowProtect User Guide
Help
(Windows only) Access to
Backup: Opens the on-line help to Create a Backup Image.
on-line help topics.
Restore: Opens the on-line help to Restoring a Volume.
Browse Image: Opens the on-line help to Mounting Backup
Image Files in Windows.
Image Tools: Opens the on-line help to Image Conversion
Tool.
License
Info
Status
(Windows only) Displays
Trial or Evaluation version: Displays the number of days
current licensing information
before the ShadowProtect installation expires.
for this ShadowProtect
Licensed version: Displays "Active", meaning that the
installation.
product is fully licensed and activated.
(RE only) Display system
A quick reference to basic system information, including
information.
Computer Name, IP Address and Time Zone information.
(RE only) Displays the
Queued Tasks: The number of queued tasks waiting to run.
current state of the system,
Running Tasks: The number of tasks currently running.
including:
6.3 Tabs
The ShadowProtect Console provides the following pages in the Center panel:
Wizards Tab
Disk Map Tab
Backup Jobs Tab
Destinations Tab
Backup History Tab
With the exception of the Management View, you can close a tabbed page by selecting it, then
clicking the Close icon to the right side of the tab list. Once closed, you can re-open a tab for a
particular node by right-clicking the node in the Management View, then selecting the tab to open
from the drop-down list.
6.3.1 Wizards Tab
The Wizards tab is the default displayed in the Main panel. It provides access to three Wizards that guide
users through the most common ShadowProtect tasks.
Page 31 of 91
ShadowProtect User Guide
Backup: Starts the Backup Wizard, which guides you through the creation of a backup job. For more
information, see Create a Backup Image.
Restore: Starts the Restore Wizard, which guides you through the process of restoring a volume from
a backup image file. For more information, see Restoring a Volume for additional information.
Explore Backup: Starts the Explore Backup Wizard, which guides you through mounting a backup
image file as a volume so you can restore individual files and folders. For more information, see
Mounting Backup Image Files.
6.3.2 Disk Map Tab
The Disk Map tab provides a graphical view of system drives. Disk Map lists each physical disk drive with
the partitions available on that drive.
ShadowProtect Disk Map tab
Right-clicking an entry in the Disk Map opens an actions menu for that entry.
Entry
Right-click Actions
Physical
Edit Policy: Opens the Partition Creation Policy Editor dialog box.
Drive
Refresh Volumes Info: Refreshes the ShadowProtect volume list for the current system.
Partition
Backup: Launches the Backup Wizard (see Creating Backup Image Files).
Restore: Launches the Restore Wizard (see Restoring a Volume).
Delete Partition: Deletes the selected partition.
Set Active: Sets the selected partition as the active (bootable) partition on the physical drive.
Edit Policy: Opens the Partition Creation Policy Editor dialog box. For more information, (see
Changing Partition Creation Policy).
Refresh Volumes Info: Refreshes the ShadowProtect volume list for the current system.
Page 32 of 91
ShadowProtect User Guide
The Disk Map tab lets you access the Backup and Restore Wizards, and change partition creation policies
for the selected drive. Additionally, in the Recovery Environment you can also run Check Disk, format a drive
and edit the selected disk's boot.ini.
6.3.3 Backup Jobs Tab
The Backup Jobs tab displays scheduled backup jobs. From this tab, you have complete control over the
ShadowProtect jobs configured for the current system.
The Backup Jobs tab is divided into two panes:
Job Controls Pane: The upper Job Controls pane lets you manage backup jobs. Select a backup job from
the job list to manage it, and view job information in the Job Information pane. The Job Controls pane
includes the following controls:
Control Description
Execute Executes the selected backup job.
Cancel
Cancels the selected backup job. This terminates a currently running job, but keeps the job
status as enabled (the job executes at its Next Run Time).
Pause
Toggles the selected job status between enabled and disabled. A disabled job is suspended and
will not run until re-enabled.
New
Launches the Backup Wizard (see Create a Backup Image).
Delete
Deletes the selected job from the Job Scheduler.
Edit
Launches the Backup Wizard, where you can edit the selected job's configuration (see Create a
Backup Image).
Details
Opens the Volume Backup tab in the Job Information pane so you can see details about the
currently selected backup job.
Refresh Refreshes the volume information in the Backup Job Information pane.
Page 33 of 91
ShadowProtect User Guide
Job Information: Displayed in the lower pane, the Job Information pane includes two tabs that provide
information about the currently selected backup job.
Component Description
Basic
Displays information about the currently selected backup job in three panes:
Properties
Job Status: Displays information about the current backup job, including the destination
backup image file, and status (queued, running, completed), and the time remaining
(running job) or total time (completed job). Click View Details to view the Volume Backup
tab.
Backup Job: Displays information about the backup job configuration, including
Compression, Encryption, and the backup job options.
Schedule: If the selected backup job is a recurring job, the Basic Properties tab displays the
job schedule for both Full backup images, and Incremental backup images, where
applicable.
Volume
Displays detailed information about the currently running backup job, including time
Backup
remaining, throughput, and an Event log. If no backup job is running, the Volume Backup
tab displays details from the most recent backup job.
6.3.4 Destinations Tab
The Destinations tab displays information about the system's named destinations, which are pre-defined
storage locations for backup image files. From this tab, you have complete control over the Destinations
defined on the current system. For more information (see Destinations).
ShadowProtect Destinations tab
The Destinations tab includes the following panes:
Destinations List: The upper pane displays a list of currently defined Destinations for the system. To delete
or edit a destination location, highlight the destination location in the list and then select the operation to
perform. Information about backup Image Sets stored at the destination location is presented for the
highlighted entry in the Destination Information.
Destination Usage: The lower pane displays information about the backup Image Sets stored in the
currently selected Destination, including Base Name, First Image Creation Time, Last Image Creation Time
and number of "point-in-time" image files in the backup Image Set.
Additionally, the Destinations tab includes the following icons for working with Destinations:
Add: Opens the Destination dialog box (see Destinations for additional information).
Delete: Deletes the currently selected Destination.
Page 34 of 91
ShadowProtect User Guide
Edit: Opens the Destinations dialog box so you can modify an existing Destination configuration (see Editing
Destinations).
Refresh: Updates the Destination Objects List and the Destination Objects Information List.
6.3.5 Backup History Tab
The Backup History tab displays log information for completed backup jobs. The Backup History lets you
analyze ShadowProtect backup activity over time, including failed jobs, if any.
The Backup History tab includes the following panes:
Job History: The upper pane displays a list of completed backup jobs. Select a job to view job details in the
Job Log.
Job Log: The lower pane displays the log entries for the selected job. This is the same information available
in the Volume Backup tab
(see Backup Jobs Tab.)
You can sort the backup history lists by clicking on the column headers. You can also adjust the column
width by dragging the column header borders.
Additionally, the Backup History tab includes the following icons:
Delete All: Clears the Job List.
Details: Displays or hides the Job Log pane.
6.4 Management View
The Management View is one way to access the remote management capabilities of ShadowProtect. It is
the preferred management view for users of ShadowProtect Server and ShadowProtect SBS because it lets
you easily manage many nodes from a single location.
The Management View tab is divided into two panes:
Node Controls Pane: The upper Node Controls pane lets you manage connected nodes. Select a node
from the Node Information pane to manage it. The Node Controls pane includes the following controls:
Page 35 of 91
ShadowProtect User Guide
Control
Description
Connect
Connects a previously added managed remote node to the ShadowProtect user interface.
Disconnect Disconnects a managed remote node from the ShadowProtect user interface.
Add
Adds a system that has the ShadowProtect Backup Agent installed to the node list.
Delete
Deletes a remote node from the managed node list.
Edit
Opens the Server Details dialog box of the currently selected node (see Mgmt View Modifying Remote Node Properties).
Manage
Opens the ShadowProtect tabs (Disk Map, Backup Jobs, Destinations, Backup History) for
the currently selected node.
Install
Opens the ShadowProtect Push Wizard, which lets you push the ShadowProtect agent out to
other systems that you want to manage from this Management View. For more information,
see Installing the Backup Agent Remotely.
Node Information List: The Node Information pane displays a list of nodes currently managed by this
management console.
Component Description
Basic
Displays information about the currently selected backup job in three panes:
Properties
Job Status: Displays information about the current backup job, including the destination
backup image file, and status (queued, running, completed), and the time remaining
(running job) or total time (completed job). Click View Details to view the Volume Backup
tab.
Backup Job: Displays information about the backup job configuration, including
Compression, Encryption, and the backup job options.
Schedule: If the selected backup job is a recurring job, the Basic Properties tab displays the
job schedule for both Full backup images, and Incremental backup images, where
applicable.
Volume
Displays detailed information about the currently running backup job, including time
Backup
remaining, throughput, and an Event log. If no backup job is running, the Volume Backup
tab displays details from the most recent backup job.
6.5 Network View
The Network view displays information for managing ShadowProtect on remote systems (see Remote
Management).
Page 36 of 91
ShadowProtect User Guide
The Network View includes the following controls:
Control
Description
Connect
Connects a previously added managed remote node to the ShadowProtect user
interface.
Disconnect
Disconnects a managed remote node from the ShadowProtect user interface.
Add
Adds a system that has the ShadowProtect Backup Agent installed to the node list.
Delete
Deletes a remote node from the managed node list.
Refresh
Refreshes the remote node list.
Properties
Toggles the Server Properties table on and off.
Import Nodes
Imports a previously exported node list into your Network View.
Export Nodes
Exports your node list into an XML file.
Page 37 of 91
ShadowProtect User Guide
7 Creating Backup Image Files
Note: For information about creating a backup image file in Recovery Environment, see the
StorageCraft Recovery Environment User Guide.
ShadowProtect provides two ways to create backup image files:
One-Time Backup: The Backup Wizard guides you through creating a backup image file immediately.
Consider the following when creating a one-time backup job:
To create a one-time backup job, you must be a member of the Administrator group on the system
where you are creating a backup.
One-time backup jobs do not affect scheduled backup jobs.
ShadowProtect supports one-time backup images from both Windows and Recovery Environment.
For more information about each of these options, see Features and Components.
Scheduled Backup: The Backup Wizard guides you through the process of creating a recurring backup job.
Consider the following when creating a scheduled backup job:
A volume can belong to no more than one scheduled backup job that includes Incremental backups.
This limitation does not include one-time backup images or Differential backup images, as long as
they do not disrupt sector tracking for the Incremental backup.
If ShadowProtect is currently running a backup job, or the computer is turned off and unavailable,
ShadowProtect skips any scheduled backup jobs during that time.
ShadowProtect supports scheduled backup images only from Windows (not Recovery Environment).
To create a backup image file
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. Start the Backup Wizard, then click Next.
There are several ways to start the Backup Wizard, including:
In the Wizards tab, click Backup.
In the Tasks menu, click Backup.
In the Menu Bar, select Tasks > Backup.
3. On the Volumes to Back Up page, select the volumes to backup, then click Next.
ShadowProtect creates a separate backup file for each volume.
4. On the Backup Name and Destination page, specify the following information about the backup image
file, then click Next.
Page 38 of 91
ShadowProtect User Guide
Location You can select either a local drive or network location to store the backup image file:
Local Drive: Click Browse. In the Open Folder dialog box, select the local drive and
folder to store the backup image file.
Network Share: In the drop-down list, select <Network Locations>. This opens the
Destinations dialog box where you can define the network share. For more information,
see Destinations
The File Name table displays the volumes (with default file names) selected for the
Name
backup job. Double-click a table row to modify the file name.
5. On the Specify the Backup Schedule page, specify the schedule and backup image type, then click
Next.
Note:The selected backup schedule determines the available backup image types. For
more information about the backup image types, see Glossary.
Now
Creates Full or Differential backup images.
Creates a one-time backup job that starts as soon as the Backup Wizard closes.
Later
Creates Full backup images.
Creates a one-time backup job at the specified date and time.
By default, the Start Time fields display the current date and time. To change the
date and time settings, click on an element of the date/time (month, day, year, hour
minute, second, AM/PM), then type or use the up/down buttons to set the desired
value.
Weekly
Creates Full and Incremental backup images.
Creates a recurring backup job based on a weekly schedule. You select the
weekdays and time of day to start a Full backup.
Optionally, you can specify a schedule for Incremental backups.
a. Select the weekdays to create Incremental backups.
b. Specify times of day to start and stop creating Incremental backups.
c. Specify the Incremental backup frequency (minutes between Incremental
backups).
Monthly
Creates Full and Incremental backup images.
Creates a recurring backup job based on a monthly schedule. You select the days
of the month and time of day to start a Full backup.
Optionally, you can specify a schedule for Incremental backups.
a. Select the weekdays to create Incremental backups.
b. Specify times of day to start creating Incremental backups
Page 39 of 91
ShadowProtect User Guide
Continuous
Creates Full and Incremental backup images.
Incrementals Creates a single Full backup, then creates recurring Incremental backups from that
point forward. This option requires ShadowProtect ImageManager (see the
ShadowProtect ImageManager User Guide).
To specify the Incremental backup schedule:
a. Select the weekdays to create Incremental backups.
b. Specify times of day to start and stop creating Incremental backups.
c. Specify the Incremental backup frequency (minutes between Incremental
backups).
6. (Conditional) On the Previous Backup Image page, select the existing backup image file to use as a
basis for creating the Differential backup image, then click Next.
This page displays only when you specified a Differential backup in the Backup Schedule page.
7. On the Options page, select the desired backup image file options, then click Next.
The Options page lets you set both basic and advanced backup image options. For more information
about each of the available options, see Options.
8. On the Wizard Summary page, review the backup job configuration, then click Finish.
Select Execute Now to run the backup job immediately in addition to the schedule defined in the job.
You can monitor the progress of the backup in the Backup Jobs tab (see Backup Jobs Tab).
7.1 Backup Image File Storage Locations
ShadowProtect lets you store backup image files on any disk device, including hard drives, removeable
USB/FireWire drives, network drives and NAS (Network Attached Storage) devices. You can also store
backup images to optical media such as CDs, DVDs, or Blu-Ray discs.
Note: If you select a destination that does not have enough disk space to save the backup image,
the backup job fails due to lack of destination storage space. ShadowProtect notes the reason for
the failure in its log file.
Location
Advantages
Disadvantages
Local Hard Drive
Fast backup and
Consumes local disk space.
restore.
Vulnerable to loss if the drive fails.
Inexpensive.
Page 40 of 91
ShadowProtect User Guide
Local
USB/FireWire
Fast backup and
More expensive than local hard drives.
Drive
restore.
Vulnerable to loss if the drive fails.
Preserves disk space
on local drives.
Inexpensive.
Easy off-site storage.
Network Hard
Drive
Fast backup and
Must have network interface card drivers
restore.
supported by Recovery Environment.
Protection from local
Complexity. Users must have network rights to
hard drive failure.
save and access backup images.
Off-site storage.
CD/DVD/Blu-Ray
Good media for
Slower backups due to media speeds.
archiving.
File restrictions due to limited size.
Protection from local
hard drive failure.
7.2 Destinations
Backup destinations let you create pre-defined storage locations for backup image files, either locally or on a
network. You can then select these destinations when creating backup jobs. Then, if you need to modify the
destination, you can do so by editing the destination object rather than deleting and recreating new backup
jobs.
Note: ShadowProtect requires that every system has a unique Destination for its backup image
files. Multiple systems should not save files to the same folder.
To create a backup job destination
1.
Page 41 of 91
ShadowProtect User Guide
1. Open the ShadowProtect Console, then select Tasks > Add Destination.
This opens the Destinations dialog box. You can also open the Destinations dialog box from the
Backup Name and Destination page of the Backup Wizard (see Creating Backup Image Files).
2. Specify the settings for the new destination, then click OK.
Destination Select the type of destination to create:
Type
Local Directory: The destination is on a locally connected storage device (HDD,
USB drive, etc.)
Network Share: The destination is on the network.
Destination Specify the path to the a descriptive name for this destination.
Name
Destination Specify the details of the destination. The information you need to provide depends
on the Destination Type.
Path
Local Directory: Click Browse, then select the local drive and folder to store backup
images.
Network Share: Click Browse, then select the network location to store backup
images. You must also specify the network credentials that ShadowProtect should
use to access the specified network location:
ShadowProtect Backup Service credentials: Use the same stored credentials used
by the ShadowProtect backup service to access your system.
Specific User credentials: Provide the Container (Domain, Computer name, or NAS
device name), Username and Password that ShadowProtect should use to access
this network share.
Verify
Instructs ShadowProtect to verify the destination path and access credentials, if
Destination necessary, before creating the Destination object.
If the destination access verification is not successful the program alerts you that the
Access
destination could not be created as requested. If this happens, check the path and
credentials used to make sure they are accurate, then re-create the destination.
7.2.1 Editing Destinations
To edit a backup job destination
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. Select the Destinations tab.
3.
Page 42 of 91
ShadowProtect User Guide
3. Select the destination to edit, then click Edit.
This open the Destination dialog box, which displays the current destination configuration. From this
dialog box, you can edit all Destination properties except the Destination Type (Network Share or
Local Directory).
7.2.2 Deleting Destinations
To delete a backup job destination
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. Select the Destinations tab.
3. Select the destination to delete, then click Delete.
Note: Before deleting a Destination, make sure to modify or delete any backup jobs that use
the Destination or the jobs will fail. For information about editing backup jobs, (see Backup
Jobs Tab.)
7.3 Options
When creating a backup job, ShadowProtect provides the following backup image file options. The Backup
Wizard provides access to these options when you are creating a backup job (see Creating Backup Image
Files).
Compression Method
Encryption
Split Image File
Backup Comment
7.3.1 Compression Method
ShadowProtect provides the following file compression options when creating a backup image file:
None: No data compression. This option uses the fewest CPU resources but uses the most disk space.
Standard: Typically compresses data by about 40%. Standard compression provides an optimal balance
between CPU usage and disk space usage.
High: Typically compresses data by about 50%. This option requires the most CPU resources, but is useful
when disk space is limited.
7.3.2 File Protection
Page 43 of 91
ShadowProtect User Guide
ShadowProtect provides the following file protection mechanisms when creating a backup image file. This is
particularly useful when storing backup image files on a network, or off-site, to help prevent unauthorized
access and use of your backup image files. If you select to protect the backup image file, you must specify
the correct password in order to mount or restore the backup image.
Password Protection: Assigning a password requires you to enter the correct password before using the
backup image file (for example, to restore a volume or create a Differential backup image based on the
password-protected file. ShadowProtect supports passwords comprised of alphanumeric characters. Use the
following guidelines when creating a password for the greatest security with password encrypted backup
image files.
Use at least eight characters.
Use a random mixture of characters, upper and lower case and numbers.
Don’t use a word found in the dictionary.
Change your password regularly or if you suspect your password has been compromised.
Warning: If you forget the password, you cannot access the backup image file. StorageCraft
cannot access an encrypted backup image file.
File Encryption: ShadowProtect uses the password as an encryption key when encrypting the backup
image file. You can select one of three encryption methods in the Advanced Options dialog box. For more
information,see "Encryption" in Advanced Options.
Use Password File: You can use password file, also known as a Key File, to encrypt a backup image. This
is helpful if you are not managing your own backups and you don’t want other users to have access to the
password used to protect the backup image files. For information about creating a Key File, see Creating
Key Files.
7.3.3 Split Image File
ShadowProtect lets you split a backup image file into multiple smaller files, creating a Spanned Image Set.
This is useful when you need to move a backup image file onto fixed length media such as CDs or DVDs.
You can split a backup image file when you create it by selecting Split Image File in the Backup Wizard's
Options page. Once selected, specify the desired file size, in MB, in the Split Image File field. For more
information about the Backup Wizard, see Creating Backup Image Files.
You can also split an existing backup image file using the Image Conversion Tool (see Image Conversion
Tool).
Note: If a backup image file is divided into multiple files, the filename suffix will change to .sp1,
.sp2, ..., .sp N, where N represents the file's sequence within the Spanned Image Set.
Page 44 of 91
ShadowProtect User Guide
7.3.4 Backup Job Name
The Backup Job Name field lets you specify a name for the backup job that ShadowProtect uses as a prefix
for each backup image file created as part of this backup job. For example, specify a backup job name of
"Server1" to be able to quickly identify those backup image files related to Server1.
7.3.5 Backup Comment
The Backup Comment option lets you attach a comment to a backup image file. These comments are
available for review when mounting or restoring the backup image file at a later date. By default the time and
date stamp are added to the backup image.
7.3.6 Advanced Options
ShadowProtect supports the following advanced options when creating a backup image job. You can access
advanced options from the Options page of the Backup Wizard (see Creating Backup Image Files).
ShadowProtect organizes its advanced options into four tabs:
Backup
Image
Commands
Retention
Note: StorageCraft recommends using the default advanced option settings unless you fully
understand the impact of changing these features.
Backup
The Backup tab includes the following advanced options:
Include free space: (Default = Off) Backs up all sectors on the volume, including those sectors marked as
free space. This can result in a much larger image file, but can help preserve previously deleted files.
Page 45 of 91
ShadowProtect User Guide
Performance throttling: (Default = On, 100% I/O usage) Specifies how much I/O bandwidth that
ShadowProtect can use when creating a backup image file. Use the slider bar to adjust this setting.
Reducing (throttling) ShadowProtect I/O usage increases the time it takes to create a backup image file, but
can reserve I/O bandwidth for other processes.
2nd and subsequent full backups are differentials: (Default = Off) Instructs ShadowProtect to create
Differential images rather than Full images for second and subsequent scheduled backup jobs. For example,
if you have a weekly backup schedule that creates a new Full image each Monday, selecting this option
instructs ShadowProtect to create Differential images each Monday that are based on the initial Full image
created when the backup job ran for the first time. This reduces storage needs for the backup image files
over time.
Generate MD5 file when creating an image file : (Default= On) Instructs ShadowProtect to create an MD5
(Message Digest 5) checksum file when creating a backup image file. The checksum lets you confirm the file
integrity of backup image files.
Ignore read failures and continue backup: (Default = Off) Instructs ShadowProtect to ignore disk read
errors that occur during the creation of backup image files. StorageCraft does not recommend using this
option because you might back up disk corruption that might prevent a restored volume from working
properly.
Image
The Image tab includes the following advanced options:
Enable write caching: (Default = Off) Enables or disables using file caching when writing the backup image
file. When writing to a network location, this might slow down the the backup process.
Enable concurrent task execution: (Default = Off) Enables or disables creating backup images
simultaneously for multiple volumes rather than creating only one backup images at a time. When using this
option, you should have hardware capable of supporting a high disk load.
Enable self-healing incremental recovery: (Default = On) Determines how ShadowProtect reacts to a
system error that interrupts the ShadowProtect incremental tracking feature. When Off, ShadowProtect
recovers by generating a new Full image and starting a new Image Set. When On, ShadowProtect recovers
by creating an Incremental image as planned, along with a Differential image based on the most recent
Incremental image and the current volume. This prevents disruption of the Incremental backup schedule, but
can result in increased CPU and network bandwidth when compared to creating a new backup Image Set.
Auto-execution of unexecuted task: (Default = On) Enables or disables executing the last scheduled
backup job if it was missed (for example, because the system was powered off). This option executes only
the last unexecuted backup job if ShadowProtect misses more than one scheduled backup job.
Commands
Page 46 of 91
ShadowProtect User Guide
The Commands tab lets you specify command files (.exe, .cmd, .bat) to execute at key points in the backup
image file creation process. The command files cannot rely on any user interaction, so you should test each
command file before using them with ShadowProtect. ShadowProtect allows 5 minutes at each stage
(Pre-snapshot, Post-snapshot, and Post-backup) for command files to complete. If the command files do not
complete in 5 minutes, ShadowProtect proceeds while the command files continue executing.
To use a command file, enter the full file name, including path, into the appropriate field:
Pre-Snapshot: Executes the specified command file before taking the image snapshot (see "Snapshot" in
Glossary. For example, you might execute a pre-snapshot command file that places non-VSS aware
applications or databases into a backup state.
Note: It takes only a few seconds to create a snapshot, so non-VSS databases or applications are
out of production only briefly before they can be returned to normal operating mode with a
post-snapshot command .
Post-Snapshot: Executes the specified command file after taking the image snapshot (see "Snapshot" in
Glossary). For example, you might execute a post-snapshot command file to return non-VSS aware
applications or databases to normal operating mode.
Post-Backup: Executes the specified command file after creating the backup image file. For example, you
might execute a post-backup command file to automatically copy the backup image file to an off-site location
or FTP server.
Note: To avoid the 5 minute execution limit for post-backup command files, you can call a
command file that simply executes another command file and then finishes. This lets you complete
the ShadowProtect-associated command file in the 5 minute allotment while the secondary
command file performs tasks that take longer to complete (synchronizing or copying the backup
image files to an alternate location, scanning the backup image file for viruses, etc.
Encryption
The Encryption tab lets you select the algorithm used to encrypt the backup image file. The Encryption tab is
displayed only when you have selected Enter Password on the Options page of the Backup Wizard (see
File Protection).
RC4 128-bit: This encryption option is the fastest, but least secure of the algorithms.
AES 128-bit: This encryption option strikes a balance between speed and security.
AES 256-bit: This encryption option is the most secure, but slowest, of the algorithms.
Retention
Page 47 of 91
ShadowProtect User Guide
The Retention tab lets you specify a policy for automatically managing the retention of backup Image Sets
(see "Image Set" in Glossary. The Retention tab is not available if you are using the Continuous Incremental
backup schedule, which leverages ShadowProtect ImageManager to manage backup Image Sets. For more
information, see the ShadowProtect ImageManager User Guide.
The Retention tab includes the following advanced options:
Enable a retention policy: (Default = Off) Enables or disables an automatic Image Set retention policy.
Number of backup Image Sets to retain: (Default = 3) Specifies the maximum number of Image Sets to
retain. When the specified maximum (M) is reached, ShadowProtect deletes the oldest Image Set. By
default, ShadowProtect enforces the retention policy after creating an Image Set, meaning that
ShadowProtect creates the M+1 Image Set, then deletes the oldest Image Set, thereby retaining M Image
Sets.
Delete both Full and Incremental backup images in the set: (Default = Off) Instructs ShadowProtect to
delete the all files, both Full and Incremental, when removing an old Image Set.
Delete only Incremental backup images (retain Full backup images): (Default = On) Instructs
ShadowProtect to delete only Incremental backup images when removing an old Image Set.
Enforce policy before starting the next Full backup: (Default = Off) Instructs ShadowProtect to "make
room" for a new Image Set by deleting the oldest Image Set before creating the new Image Set that will
replace it. This reduces the amount of disk space needed to adhere to the specified retention policy.
For more information about the benefits of retention policies, see Retention Policy Configurations.
7.4 Deleting Backup Image Files
You can delete backup image files using any process you normally use to delete a file in Windows. However,
before deleting a backup image file, be certain of the following:
The backup image file is not required for any active backup job. If you delete the Full image to an
active backup image job, ShadowProtect creates a new Full image at the next scheduled backup and
starts a new Image Set.
Other backup image files do not depend on this backup image file. If you delete a backup image file
that other point-in-time backup image files depend on, all dependent backup image files become
useless. You cannot browse and restore files from these dependent backup image files. Use the
Image Conversion Tool to check for any file dependencies (see Image Conversion Tool).
Page 48 of 91
ShadowProtect User Guide
8 Mounting Backup Image Files
The ShadowProtect Explore Backup Wizard guides you through the process of mounting a backup image
file. ShadowProtect automatically associates the files required to browse and restore a specific backup
image file. You need only select the backup image you want to explore. Once mounted, you can treat the
backup image file as you would any other Windows volume:
Browse the backup image file.
Share the backup image file.
Copy individual files and folders from the backup image file.
Modify the backup image file (if the volume is configured as writeable).
Use standard Windows security and file properties.
While the process is the same, whether you can restore files and folders in Windows, or need to use
the StorageCraft Recovery Environment, depends specifically on the state of your system and what
you need to restore:
Restore in Windows: Windows loads, but you have lost data or had undesirable changes to
applications or hardware files on a volume (excluding the operating system files).
Restore in Recovery Environment: Windows does not load and you have lost data or operating
system files, or had undesirable changes to applications or hardware files on a volume. For more
information, see the StorageCraft Recovery Environment User Guide.
Note: To restore data from an Incremental image, you must have all previous incremental
backup image files and the initial full backup image. If any of these files is missing or corrupt,
mounting the backup image to that point in time is not possible. ShadowProtect does not let
you modify Full images prevent corrupting an entire Image Set.
For information about mount options, see Backup Image Mount Options.
To mount a backup image file
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. Open the Explore Backup Wizard by doing one of the following:
In the Wizards tab, click Explore Backup.
In the Tasks menu, click Explore Backup.
In the Menu bar, select Tasks > Explore Backup.
3. On the Backup Image File Name page, browse to the backup image file you want to mount, then click
Next.
For information about backup image file naming conventions, see File Naming Conventions.
Note: If the backup image is encrypted you must provide the appropriate password.
Page 49 of 91
ShadowProtect User Guide
The Explore Backup Image Wizard displays a categorized list of information about the backup image
file.
4. (Conditional) In the Backup Image Dependencies page, select the desired point-in-time image from
the selected backup Image Set, then click Next.
5. On the Explore Options page, select how you want to mount the backup image, then click Next.
For more information about mount options, see Backup Image Mount Options.
a.To mount the backup image file as a drive letter, select Assign the following drive letter, then
select
the appropriate drive letter from the drop-down list.
b.To mount the backup image file as a mount point, select Mount in the following empty NTFS
folder, then
browse to the appropriate NTFS folder. You must also specify how to name the mount point
sub-folder:
Time/Date: Uses the backup image's creation date and time as the sub-folder name (for example,
7-12-2008 10.19.24 AM).
File Name: Uses the backup image file name as the sub-folder name (for example, E_VOL b001).
Custom: Lets you specify a custom sub-folder name.
c.(Optional) Deselect Mount Backup as Read-Only to mount the backup image as a writeable
volume.
If you mount the backup image file as a writeable volume, you can choose to save the changes to an
Incremental image file when you dismount the volume (see Dismounting Backup Image Files).
6. On the Wizard Summary page, review the mount information, then click Finish.
ShadowProtect mounts the backup image file, then automatically launches Windows Explorer and
displays the mounted volume.
7. With the backup image mounted, you can browse the contents of the volume as you would any
Windows volume.
To restore individual files or folders, simply copy them from the backup image file volume to your
production volume.
Note: Once mounted, select Refresh Volumes Info to get an accurate view of the mounted
system volumes from the Disk Map tab.
8.1 Mounting Backup Image Files in Windows
ShadowProtect adds two options to the Context menu (the right-click menu) of backup image files:
Page 50 of 91
ShadowProtect User Guide
Mount: Launches the Image File Mount Wizard to guide you through the process of mounting the selected
backup image file. For information about the various options in the Image File Mount Wizard, see Mounting
Backup Image Files, starting in Step 3. You can simultaneously mount multiple backup image files, but you
must mount each backup image file individually with the Image File Mount Wizard.
Quick Mount: Mounts the backup image file as read-only using the next available drive letter. You can
select multiple backup image files, then quick mount them simultaneously, with each backup image file
receiving the next available drive letter.
For information about dismounting a backup image file, see Dismounting Backup Image Files.
8.2 Backup Image Mount Options
When mounting a backup image file, consider the following:
Whether to mount the backup image as a drive letter or at a mount point location.
Whether to mount the backup image as read-only or writeable.
Mounting a Backup Image as a Drive Letter
The ShadowProtect Mount Utility lets you mount a backup image file as a drive letter on your computer with
all the properties of the original volume.
After mounting a backup image as a drive letter, you may perform a variety of tasks, such as running
ScanDisk (or CHKDSK), performing a virus check, defragmenting the drive, copying folders or files to an
alternate location or simply viewing disk information about the drive such as used space and free space.
When a drive is mounted, you may set it up as a shared drive. Users on a network can connect to the shared
drive and restore files and folders from within the backup image if you want end users to recover their own
files. You also may mount one or more backup images at a time. The drives will remain mounted until you
dismount them or restart the machine. If an NTFS volume uses EFS (Encrypted File System), the security
remains intact on the volume when it is mounted.
Mounting a Backup Image as a Mount Point
The ShadowProtect Mount Utility lets you mount a backup image file as a mount point (a directory on an
NTFS file system). Mount points overcome the available drive letter limitation and support more logical
organization of files and folders.
Mounting a Read-Only Backup Image
By default, ShadowProtect mounts backup image files as read-only. This lets users access the backup
image to do the following:
Recover files from an existing backup image.
View the contents of a backup image.
Run other applications that need to access the backup image, such as a storage resource manager or
data mining application.
Page 51 of 91
ShadowProtect User Guide
Note: Windows 2000 does not support read-only NTFS volumes.
Mounting a Writeable Backup Image
ShadowProtect can mount a backup image as a writeable volume. This lets users access the backup image
to do the following:
Remove files from the backup image (viruses, malware, etc.)
Add files to the backup image.
Update the backup image security.
Restore a backup image to a smaller volume (see Dismounting Backup Image Files).
Note: ShadowProtect prevents you from modifying a Full image file to prevent corruption of an
entire Image Set.
8.3 Dismounting Backup Image Files
Once mounted, a backup image file remains mounted until explicitly dismounted, or the system reboots. The
ShadowProtect Backup Image Dismount Wizard guides you through the process of dismounting a previously
mounted backup image file (see Mounting Backup Image Files). As part of the dismount process, you can do
the following:
Save changes to writeable backup images.
Shrink the volume so you can restore the image to a smaller drive.
Note:The Shrink Volume feature truncates mounted backup image files so that the file
system ends at the last currently-allocated cluster. To reduce the backup image size as
much as possible, use a disk defragmentation tool on the mounted image to consolidate file
distribution within the volume and free up space at the end of the volume.
To dismount a backup image
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. Open the Backup Image Dismount Wizard by doing one of the following:
In the Tasks menu, click Dismount Backup Image.
In the Menu bar, select Tasks > Dismount Backup Image.
3. In the Mounted Backup Images page, select the backup image volume to dismount, then click Next.
When selecting a mounted backup image, this page also displays the volume properties.
4.
Page 52 of 91
ShadowProtect User Guide
4. (Conditional) In the Backup Image Dismount Options page,select if you want to Save volume
changes, or Shrink the backup Image, then click Next.
These options are available only if the backup image volume is writeable (see Backup Image Mount
Options).
Save changes to incremental File: Saves changes made to the mounted volume. Right-click the
Incremental File to save the modified backup image file using a different name.
Shrink Volume: Shrinks the volume so you can restore the image to a smaller hard drive. This option
is available only in the following situations:
Dismounting a writeable backup image of an NTFS volume in Windows Vista or Windows
Server 2008 (or later).
Running StorageCraft Recovery Environment using boot option 1 (Recommended), which
boots using Windows PE (based on Windows 7).
5. In the Backup Image Dismount Summary page, review the dismount details, then click Finish.
Note: Once dismounted, select Refresh Volumes Info to get an accurate view of the
mounted system volumes from the Disk Map tab.
8.3.1 Dismounting Backup Image Files in Windows
ShadowProtect adds two options to the Context menu (the right-click menu) of mounted backup image files.
For information about mounting backup image files, see Mounting Backup Image Files.
Dismount: Launches the Backup Image Dismount Wizard to guide you through the process of dismounting
the selected backup image file. For information about the various options in the Backup image Dismount
Wizard, see Dismounting Backup Image Files, starting in Step 3.
Quick Dismount: Dismounts the backup image file without any further user interaction. ShadowProtect
dismounts the backup image file without saving changes made to a writeable mounted image file, if
applicable.
Page 53 of 91
ShadowProtect User Guide
9 Restoring a Volume
ShadowProtect provides two ways to restore volumes from backup image files:
Restore in Windows: Restore a non-system volume using the ShadowProtect Restore Wizard. This method
does not require you to reboot the system.
Restore in Recovery Environment: Use the bootable Recovery Environment when restoring a system
volume where the operating system resides. For information about restoring a system volume from the
Recovery Environment, see the StorageCraft Recovery Environment User Guide.
Warning:Restoring a backup image to a volume overwrites all data currently on the volume.
To restore a non-system volume
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. Open the Restore Wizard by doing one of the following:
In the Wizards tab, click Restore.
In the Tasks menu, click Restore.
In the Menu bar, select Tasks > Restore.
3. On the Backup Image to Restore page, select the Image Set to restore, then click Next.
In the drop-down menu, select the Destination (see Destinations) that contains the backup Image Set
to restore, or click Browse to locate the desired backup image set. The Specify Image Names field
displays the backup Image sets available at the selected destination or path.
Note: To restore a volume from a backup image set stored on a network share, you must
have the proper network credentials.
4.
Page 54 of 91
ShadowProtect User Guide
4. On the Backup Image Dependencies page, select the point-in-time to restore, then click Next.
This page displays all Incremental backup image files associated with the selected Image Set. Select
a specific backup image file to view the following image file properties:
Image File Properties: Volume size, creation time,compression, password protection, comment.
Original Partition Information: Style, number, type, bootable option, starting offset and length.
Disk Information: Disk geometry, disk size and number of the first track sectors. You can also view
the disk layout graphically at the bottom of the screen. This represents what the disk looked like at the
time of backup.
Originating machine: Operating system version, the machine name, MAC address and the
ShadowProtect engine version used to create the image file.
5. On the Restore Destination page, select the partition where you want to restore the backup image,
then click Next.
Note: The selected partition must have sufficient space for the selected Image Set. For
example, you cannot restore a 4GB backup file with only 1GB of free space.
Right-click a volume to see the following actions in the context menu:
Delete Volume: Deletes the selected volume. The deleted volume becomes unassigned space on
the disk that can be repartitioned.
Set Active: Sets the selected volume as Active (bootable). Only one partition per drive can be
designated as Active.
Create an exact primary partition: (Available only if unpartitioned disk space exists) Defines and
creates a primary partition on the disk. You cannot create more than four (4) primary partitions on a
disk.
Create extended partition: (Available only if unpartitioned disk space exists) Extends the selected
partition, then subdivide the extended partition into one or more logical drives.
Edit Policy: Launches the Partition Creation Policy Editor.
6. On the Specify the Restoration Options page, select the appropriate volume restore options, then
click Next.
Set Partition Active: Configures the restored volume as the active partition in the system (the drive
the machine boots from).
Restore MBR: Restore the master boot record (MBR) as part of the volume restore job. The master
boot record is stored in the first sector of the first physical hard drive, and contains the master boot
program and partition table. The master boot program uses the partition table to determine the active
partition, then starts the boot program from the boot sector of the active partition. When selected, you
have the following MBR restore options:
Restore MBR from the image file Restores the MBR from the backup image file.
Restore original Windows XP MBR: Restores the default MBR that ships with Windows XP.
Page 55 of 91
ShadowProtect User Guide
Restore disk signature: Restores the original hard drive physical disk signature. Windows
Server 2003, Windows 2000 Advanced Server, and Windows NT Server 4.0 Enterprise Edition
(SP3 and later) require disk signatures to use the hard drive.
#Restore Disk Hidden Track: Restores the first 63 sectors of a drive. Some boot loader
applications require this for the system to boot.
7. On the Wizard Summary page, review the details of the volume restore operation, then click Finish.
You can view the progress of restore volume operation in the Backup Jobs tab.
Page 56 of 91
ShadowProtect User Guide
10 Image Conversion Tool
ShadowProtect provides the Image Conversion Tool so you can manage existing backup image files, and
provides the following primary features:
Consolidate a point-in-time backup image (Full + Incremental images) into a new Full image.
Change the compression setting on an existing image.
Change the encryption setting on an existing image.
Split an backup image file into a Spanned Set where each file has a maximum file size. This is useful
for moving backup image files to CD or DVD.
Convert a backup image into a virtual machine format (VMDK or VHD).
You can access the Image Conversion Tool from either Windows or the StorageCraft Recovery
Environment.
To use the Image Conversion Tool
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. In the Tools menu, click Image Conversion Tool.
3. On the Source Image File page, browse to the location of the backup image files you want to modify.
ShadowProtect displays the Full images stored in the specified location.
4. Select the Base Image File to work with, then click Next.
Note:If the backup image is encrypted you must provide the appropriate password.
5. In the Backup Image Dependencies page, select the Incremental image that represents the
point-in-time to consolidate with the Full image, then click Next.
Select a backup image file in the left pane to view its properties in the right pane. ShadowProtect
groups backup image file properties into four groups:
Page 57 of 91
ShadowProtect User Guide
Originating machine: The operating system version, the machine name, MAC address and
the engine version of ShadowProtect used to create the image file.
Disk Information: Disk geometry, disk size and number of the first track sectors. You can view
the original disk layout in graphical form at the bottom of the screen.
Original Partition Information: Style, number, type, bootable option, starting offset and
length.
Image File Properties: Volume size, creation time, compression, password protection,
comment.
6. In the Destination Image File page, specify the required information, then click Next.
Select
From the drop-down menu, select the Destination (see Destinations) where you want
network
to store the destination image file, or Browse to the desired location.
location
or browse
to a local
path
Specify
Specify a name for the destination image file.
image
name
Save As
Select the type of image file you want to create. Supported options include:
SPF: Create a new Full (Base) image file.
VHD: Create a Microsoft Virtual Hard Disk file compatible with Microsoft and Hyper-V
virtual environments.
VMDK: Create a Virtual Machine Disk file compatible with VMWare virtual
environments.
ESX Server: Create an ESX server file compatible with VMWare ESX virtual
environments
7. In the Options page, specify the desired backup image file options, then click Next.
For information about each of these options, including the Advanced options, see Options.
8. In the Wizard Summary page, review the Image Conversion Tool job summary, then click Finish.
Monitor the progress of the Backup job in the Backup Jobs tab (select the job, then click Details).
Review the results of previously executed jobs in the Backup History tab.
Note: After converting a backup image to VHD/VMDK, and assigning it to a VM, make sure
to load Recovery Environment in the VM and run Hardware Independent Restore (HIR) on
the system volume created by the Image Conversion Tool. You must do this before the
operating system will boot successfully. If you still have boot problems after doing this, use
Recovery Environment's Boot Configuration Utility (BCU) to auto-fix any problems it
encounters. For more information, see "Using HIR" and "Using the Boot Configuration Utility"
in the Recovery Environment User Guide.
Page 58 of 91
ShadowProtect User Guide
11 Remote Management
ShadowProtect provides two ways to remotely manage ShadowProtect Backup Agents installed on remote
servers and desktops (known as remote nodes), as long as these systems are accessible through the local
area network or a virtual private network (VPN). By connecting to a remote node through one of these tools,
you have full access to ShadowProtect features and functionality on the remote node.
Remote Management with the Management Console
Remote Management with the Network View
Note: You must have administrative rights to the remote node in order to manage it. However, with
the proper administrative rights, you can remotely manage both ShadowProtect Server Edition and
ShadowProtect Desktop Edition nodes using either the Management View or the Network View.
11.1 Remote Management with the Management
Console
The Management View tab is designed specifically for ShadowProtect Server and ShadowProtect SBS
users that need to manage a larger number of remote ShadowProtect installations from a central location.
Although the functionality is very similar to the Network View, the Management View organizes it in a way to
make it more friendly to administrators with many remote nodes to manage. You can open and close the
Management View by selecting Management View in the View menu (see Management View).
You can do the following from the Management View:
Installing the Backup Agent Remotely
Mgmt View - Adding and Deleting Remote Nodes
Mgmt View - Modifying Remote Node Properties
Mgmt View - Connecting and Disconnecting Remote Nodes
11.1.1 Installing the Backup Agent Remotely
Using the Push Agent, Management View lets you remotely install the ShadowProtect Backup agent so you
can configure ShadowProtect operations on the remote system.
To remotely install the backup agent
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. In the View menu, click Management View to open the Management View.
3. In the Management View, click Install.
The Push Install Wizard so you can configure the remote installation.
4.
Page 59 of 91
ShadowProtect User Guide
4. On the Specify Installer Package page, browse to the ShadowProtect Installer Package that you want
to use for the remote installation, then click Next.
There must be an associated installation setup file (.iss) with the selected installer package. For more
information, see Creating an Install Setup Package.
5. In the Choose Search Options and Proper Credentials dialog box, provide the required information,
then click Next.
System
The name of the system where you want to install the ShadowProtect Backup
Name
agent. Select either Domain name or Host name according to the type of system
name you are providing, then type the system name in the field.
Note: If you leave the field blank, Push Install uses your current domain or
workgroup to locate a list of available systems.
Use Active
Instructs ShadowProtect to search Microsoft Active Directory for the desired
Directory
system.
Search
To use this parameter, click options (at the bottom of the Push Install dialog box
when Use Active Directory search is selected) to refine the Active Directory
search characteristics.
Use
The authentication credentials that Push Install uses to gain access to the remote
Specified
system.
Credentials
Note: If you do not provide credentials, Push Install uses your current
credentials to attempt to access the remote system.
Discover
Push Install attempts to identify existing ShadowProtect services running on
Services
remote systems. When successful, it displays the information it gathers about
agent version.
Automatically Push Install automatically activates the Backup agent it installs.
activate
To use this parameter, click settings (at the bottom of the Push Install dialog box
installed
when Automatically activate installed agents is selected) to specify the
agents
Username and Serial # of the ShadowProtect license you want to use on the
remote system.
Reboot after
Following a successful Backup agent install, ShadowProtect automatically re-boots
install
the remote system so the Backup agent is active.
To use this parameter, click settings (at the bottom of the Push Install dialog box
when Reboot after install is selected) to specify the details of the reboot
operation. You can instruct the remote system to reboot at a specific date/time;
specify a message to display before rebooting; and specify a delay before the
reboot occurs (in seconds).
6.
Page 60 of 91
ShadowProtect User Guide
6. (Conditional) On the Computers Overview page, select the systems where you want to install the
Backup agent, then click Next.
If you didn't specify a system name, you can select the systems where you want to install the Backup
agent here.
7. On the Install Overview page, wait until the install finishes, then click Next.
8. (Optional) On the Post Install Overview page, specify a Group name for each system where you
installed the Backup agent, then click Next.
Click in the Group name field, then type of select the group where you want to add this system. For
more information about Groups, see Mgmt View - Modifying Remote Node Properties.
9. On the Summary page, click Finish.
The newly installed remote nodes appear in the Management View node list.
11.1.2 Mgmt View - Adding and Deleting Remote Nodes
Before managing a remote node, you must add it to your Management View.
To add a remote node
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. If the Management View is not visible, select Management View from the View menu.
3. In the Management View, click Add
.
4. In the Server Details dialog box, specify the appropriate connection information for the remote node.
For information about remote node properties, see Mgmt View - Modifying Remote Node Properties.
You can now connect to the remote node to manage ShadowProtect.
To delete a remote node
1. In the Management View, select the remote node in the node list.
2. Click Delete
.
Deleting a remote node does not delete ShadowProtect or any of its configurations from the remote
node, or remove the remote node from the Management View of any other system that might be
configured to remotely manage that node.
Note: You cannot delete the local node from the Management View.
11.1.3 Mgmt View - Modifying Remote Node Properties
The properties table displays the properties of the currently selected remote node. You can edit remote node
properties as long as the remote node is not connected.
To modify the properties of a remote node
1.
Page 61 of 91
ShadowProtect User Guide
1. Start the ShadowProtect Console (see Starting ShadowProtect).
If the Network View is not visible, select Network View from the View menu.
2. In the node list, select a remote node to modify.
If the Server Properties pane is not visible, click Properties
.
3. In the Server properties pane, modify the remote node properties as needed.
Select a field to make it active. You can also use the Tab key to move from field to field. Remote
Node properties include the following:
Server
A remote node name used to identify it in the node list.
Name
Server
The IP address or machine name of the remote node. To browse the network for a
Address
particular system so you can find the IP address, click Browse
Group
The group that you want to associate with the remote node. You can create groups to
.
help organize remote nodes and make management easier.
Server
A description of the remote node. This is for your information only.
Description
Status
(Informational) The remote node status (Connected or Disconnected).
Domain
The domain name used to access the remote node.
Name
User Name
A user name with Administrator rights to the remote node.
Password
The user name's associated password.
Agent
(Informational) The version of the Backup Agent installed on the remote node.
Version
Last
(Informational) The date and time you last connected to the remote node.
Connected
11.1.4 Mgmt View - Connecting and Disconnecting Remote
Nodes
To connect to a remote node
1. Start the ShadowProtect Console (see Starting ShadowProtect).
If the Management View is not visible, select Management View from the View menu.
2. In the Management View, select the remote node in the node list.
3. Click Connect
.
You can be connected to only one node at a time. If you connect to another remote node,
ShadowProtect automatically disconnects you from the previously connected node.
Page 62 of 91
3.
ShadowProtect User Guide
Note: You must add a remote node in order to connect to it (see Mgmt View - Adding and
Deleting Remote Nodes).
To disconnect a remote node
1. In the Management View, select the remote node in the node list.
2. Click Disconnect
.
Disconnecting a remote node does not stop the ShadowProtect Backup Agent or affect any of
ShadowProtect operations on the remote node.
11.2 Remote Management with the Network View
When open, the Network View appears as a right panel in the ShadowProtect Console. You can open and
close the Network View by selecting Network View in the View menu (see Network View).
You can do the following from the Network View:
Network View - Adding and Deleting Remote Nodes
Network View - Modifying Remote Node Properties
Network View - Connecting and Disconnecting Remote Nodes
enSPguide:Exporting and Imorting Node Settings
11.2.1 Network View - Adding and Deleting Remote Nodes
Before managing a remote node, you must add it to your Network View.
To add a remote node
1. Start the ShadowProtect Console (see Starting ShadowProtect).
If the Network View is not visible, select Network View from the View menu.
2. In the Network View, click Add
.
This creates a new node in the Network View named New Node 1 and opens a Server Properties
pane where you can configure the remote node.
3. In the Server Properties pane, specify the appropriate connection information for the remote node.
For information about remote node properties, see Network View - Modifying Remote Node
Properties.
You can now connect to the remote node and manage ShadowProtect.
To delete a remote node
1. In the Network View, select the remote node in the node list.
2.
Page 63 of 91
ShadowProtect User Guide
2. Click Delete
.
Deleting a remote node does not delete ShadowProtect or any of its configurations from the remote
node, or remove the remote node from the Network View of any other system that might be
configured to remotely manage that node.
Note: You cannot delete the local node from the Network View.
11.2.2 Network View - Modifying Remote Node Properties
The properties table displays the properties of the currently selected remote node. You can edit remote node
properties as long as the remote node is not connected.
To modify the properties of a remote node
1. Start the ShadowProtect Console (see Starting ShadowProtect).
If the Network View is not visible, select Network View from the View menu.
2. In the node list, select a remote node to modify.
If the Server Properties pane is not visible, click Properties
.
3. In the Server properties pane, modify the remote node properties as needed.
Select a field to make it active. You can also use the Tab key to move from field to field. Remote
Node properties include the following:
Server
A remote node name used to identify it in the node list.
Name
Server
The IP address or machine name of the remote node. To browse the network for a
Address
particular system so you can find the IP address, click Browse
Group
The group that you want to associate with the remote node. You can create
.
groups to help organize remote nodes and make management easier.
Server
A description of the remote node. This is for your information only.
Description
Status
(Informational) The remote node status (Connected or Disconnected).
Domain
The domain name used to access the remote node.
Name
User Name
A user name with Administrator rights to the remote node.
Password
The user name's associated password.
Agent
(Informational) The version of the Backup Agent installed on the remote node.
Version
Page 64 of 91
ShadowProtect User Guide
(Informational) The date and time you last connected to the remote node.
Last
Connected
11.2.3 Network View - Connecting and Disconnecting Remote
Nodes
To connect to a remote node
1. Start the ShadowProtect Console (see Starting ShadowProtect).
If the Network View is not visible, select Network View from the View menu.
2. In the Network View, select the remote node in the node list.
3. Click Connect
.
You can only be connected to a single node at a time, so if you connect to another remote node,
ShadowProtect automatically disconnects you from the previously connected remote node.
Note: You must add a remote node in order to connect to it (see Network View - Adding and
Deleting Remote Nodes ).
To disconnect a remote node
1. In the Network View, select the remote node in the node list.
2. Click Disconnect
.
Disconnecting a remote node does not stop the ShadowProtect Backup Agent or affect any of
ShadowProtect operations on the remote node.
11.2.4 Exporting and Importing Node Settings
ShadowProtect lets you transfer remote node configurations from one ShadowProtect Console to another.
To export remote node configurations
1. Start the ShadowProtect Console (see Starting ShadowProtect).
If the Network View is not visible, select Network View from the View menu.
2. In the Network View, click Export nodes
.
3. Specify the name for the XML file that contains the exported remote node configurations, then click
Save.
To import remote node configurations
1. In the Network View, click Import nodes
.
2.
Page 65 of 91
ShadowProtect User Guide
2. Browse to the XML file that contains the previously exported remote node configurations, then click
Open.
11.3 Creating an Install Setup Package
The ShadowProtect Install Setup Package contains the recorded selections and settings associated with a
ShadowProtect installation. You can use the install setup package to automate a ShadowProtect install in a
in remote installation scenario.
Note: An Install Setup package file must have the same name as the Installer package with a .iss
extension.
To create a ShadowProtect Install Package
1. Open a Windows command prompt.
Click Start > Run. Enter cmd in the Open field, then click OK.
2. Browse (using the cd command) to the directory that contains the ShadowProtect installer that you
want to install remotely.
3. Execute the ShadowProtect installer using command-line parameters:
For example: ENU_Desktop_Setup_4.0.1.exe /r
/f1c:\storagecraft\ENU_Desktop_Setup_4.0.1.iss.
/r
Instructs the ShadowProtect installer to record the session.
/f1 Specifies where to create the write the install package. Do not put a space between the
parameter and the path information.
Page 66 of 91
ShadowProtect User Guide
12 Using VirtualBoot
VirtualBoot lets ShadowProtect users boot a backup image in a Virtual Machine (VM) environment.
VirtualBoot leverages the open source Oracle VirtualBox software so you can quickly boot a backup image
without performing a time-consuming restore operation, and without converting backup image files to a
different format.
VirtualBoot provides tremendous value in the following situations:
System Fail-over: When you're dealing with Terabytes of storage, restoring a failed system can take days.
However, VirtualBoot lets you quickly recreate your failed system in a VM while you rebuild the failed
system. Users have full access to the system during this time, with only a brief downtime to cut-over to the
new system once it is ready. Downtime drops from days to just minutes.
Backup Test: Disaster recovery is all about having system data stored in a way that is readily accessible
should it be needed. But can you be confident that your stored data is valid? VirtualBoot lets you mount any
backup image in a VM so you can test it to make sure a restored system would function properly. In just
minutes you can feel confident that your backup images are ready for use when needed.
Application-specific Data: While backing up system data is a critical operation, sometimes the data files
alone aren't useful without their associated applications. VirtualBoot lets you mount an entire system, both
applications and data, in a VM where you have access to data from its associated application.
For information about VirtualBoot usage scenarios, see VirtualBoot Scenarios.
This section includes the following topics:
VirtualBoot Requirements
Limitations
Creating a VM
Configuring a VM
Note: DeveloperNotes_VirtualBoot.txt contains developer-level information related to VirtualBoot.
You can find this file in the <install_folder>\StorageCraft\ShadowProtect\ folder.
Warning: If you power off a VM created with VirtualBoot, do not selectRestore current snapshot
VirtualBootas a shutdown option, or you will lose all Incremental backup data written in the VM
since its creation. Select this option only if you want to revert the VM back to its original state.
12.1 VirtualBoot Requirements
VirtualBoot requires you to install the following software before using it:
Page 67 of 91
ShadowProtect User Guide
12.1.1 Software Requirements
ShadowProtect 4.x or later: VirtualBoot supports backup image files created by any version of
ShadowProtect, but you must have ShadowProtect 4.x or later to run the application. ShadowProtect 4.x
includes VirtualBoot as a core component of the console installation.
Note: Although VirtualBoot can generate a VM from backup image files created with any version of
ShadowProtect, StorageCraft recommends using VirtualBoot with backup image files created by
ShadowProtect 3.3 and later to get full access to the benefits of VirtualBoot.
VirtualBox 3.1.0-3.2.12 or v4.0.1: VirtualBox is an open source VM environment. VirtualBoot provides
native support for ShadowProtect files in a VirtualBox VM. For information about VirtualBox, and to
download the software, visit www.virtualbox.org. VirtualBox is free for personal, education, and evaluation
use.
12.1.2 Hardware Requirements
VirtualBoot hardware requirements are driven primarily by the hardware requirements necessary to run
VirtualBox (see VirtualBox End-User Documentation).
Processor: Reasonably powerful x86 processor (either Intel or AMD), including AMD/Intel x64 processors.
VirtualBoot does not support Itanium (IA64).
Note: When using VirtualBoot to boot an image of an x64 operating system, make sure that your
host hardware supports AMD-V or VT-x, and that AMD-V, or VT-x, is enabled in the host machine's
hardware BIOS settings.
Memory: At least 1GB.
Hard Drive: At least 10 GB. This is dependent upon the Operating System you want to load in the VM.
Guest OS: VirtualBoot supports backup image files that contain backups of the following operating systems
(This is the OS that runs in the VM):
Windows 2000
Windows XP (32- and 64-bit)
Windows 2003 (32- and 64-bit)
Windows Vista (32- and 64-bit)
Windows 2008 (32- and 64-bit)
Windows 2008 R2 (32- and 64-bit)
Windows 7 (32- and 64-bit)
Host OS: VirtualBoot supports the same Host operating systems as VirtualBox 1.6; namely Windows
XP or later. Windows 2000 is not supported.
Page 68 of 91
ShadowProtect User Guide
12.2 Limitations
This release of VirtualBoot has the following limitations:
Supports boot volumes up to 2TB. However, VirtualBoot supports data volumes (non-bootable) of any
size.
Does not support LBD hard disk volumes, which report 4096-byte sector size to the OS. However,
Advanced Format hard disks, which have 4096-byte sectors but report 512-byte sectors to the OS,
are supported.
If the host crashes while running a VirtualBoot VM, you must create a new VM using the latest
Incremental backup image file created in the VM. For more information, see the VirtualBoot Scenarios
.
VirtualBoot does not work in a Windows 2000 Terminal Services session.
12.3 Creating a VM
Important: Before using VirtualBoot to create a VM, review the VirtualBoot Requirements and Limitations.
To create a virtual machine
1. Start VirtualBoot, then click Next on the VirtualBoot Wizard welcome page.
There are three ways to start VirtualBoot:
Executable: In Windows, select Start > ShadowProtect > VirtualBoot.
Command Line: From a Windows command prompt, type VirtualBoot <backup image file>, where
<backup image file> is the name, including full path, of the ShadowProtect backup image file that you
want to use to create a VM. For example:
VirtualBoot e:\backups\C_VOL-b005.spi
Right-Click Menu: In Windows Explorer, right-click the ShadowProtect backup image file that you
want to use to create a VM, then select VirtualBoot.
2. In the Backup Image List page, provide the required information, then click Next.
If you start VirtualBoot using the command line or right-click menu option, VirtualBoot populates the
Backup Image list with all files that are part of the backup chain for the specified backup image file.
Add
Lets you add a backup image file to the VM. If the selected backup image file is
Image
encrypted, you must provide a valid password to access it.
File
Remove Lets you remove a backup image file from the VM.
Image
File
Specify
Lets you designate the boot volume in the VM. Typically, VirtualBoot detects this
Boot
automatically, but if you include multiple bootable volumes in the VM, you can select the
Volume
volume that VirtualBoot designates as the boot volume.
Page 69 of 91
ShadowProtect User Guide
Note: If you specified a backup image file when starting VirtualBoot, this page lists the
related backup image file information.
3. In the Options page, provide the required information, then click Next.
Specify the operating
From the dropdown menu, select the Windows OS contained in the
system
boot volume of the backup image file.
for the new virtual
machine
Automatically create the
Select this option to have VirtualBoot automatically create the VM as
new virtual machine
part of the configuration process. If you do not select this option, you
must manually configure the VM in VirtualBox.
In either case, VirtualBoot creates the XSP files that VirtualBox uses
to define the virtual disk drives in the VM.
Note: VirtualBoot ALWAYS places the boot volume in the
Disk_0 XSP file.
For more information, see Manually Configuring a VM.
Automatically start the
Select this option to launch VirtualBox automatically after the VM is
new virtual machine
complete and load it for use.
Specify the name of the
Specify a name for the VM. By default, VirtualBoot creates a name
new virtual machine
based on the machine name.
Specify the amount of
Specify the amount of memory, in MB, that VirtualBox should allocate
memory to allocate to the for use by the VM when it loads.
new virtual machine
Specify the VM network
Select whether to include a network adapter in the VM. Supported
adapter type
options include:
NAT PRO/1000 MT Desktop: Adds a generic network adapter to the
VM that uses Network Address Translation (NAT).
No Network Adapter: Excludes a network adapter from the VM.
4. (Optional) On the Options page, click Advanced to open the Advanced Options dialog box.
The Advanced Options dialog box provides the following options:
Import only one volume Instructs VirtualBoot to include only one volume per VirtualBox XSP file.
By default, VirtualBoot assigns four volumes per XSP file.
per hard
disk drive within the
Note: VirtualBoot ALWAYS places the boot volume in the Disk_0 XSP
virtual machine
file.
Page 70 of 91
ShadowProtect User Guide
Deactivate Windows
Deactivates Windows on the VM's system volume. Because Microsoft
within the virtual
licensing limits the number of reactivations, this options lets you use the
machine
activation grace period to accomplish your purposes with the VM.
Note: If the host hardware where you start the VM is sufficiently
different, Windows might deactivate automatically.
Store write buffers in a
Lets you specify a location to store the write buffers used when creating
different directory than
the VM. By default, VirtualBoot stores write buffers in the same location
the image files
as the backup image files used to create the VM.
Override personality
For use only by StorageCraft technical support.
used to configure the
virtual machine OS
volume
5. On the Wizard Summary page, click Finish.
VirtualBoot generates the files necessary to support the new VM and, if specified in the VM
configuration, creates the VM and launches it for use.
Note: For information about manually creating a VM in VirtualBox, see (Creating a VM
Manually).
6. (Conditional) If you do not start the VM as part of the VirtualBoot creation process, you must start the
VM manually from VirtualBox.
a.Launch VirtualBox.
b.In the left-side VM list, select the VM, then click Start.
7. Continue with Configuring a VM.
12.3.1 Creating a VM Manually
If you elected not to have VirtualBoot create the VM for you (see Step 4 in Creating a VM), you can manually
create the VM in VirtualBox.
Note: The following task is based on VirtualBox v 3.1.4. Task details might vary slightly with
different versions of VirtualBox.
Page 71 of 91
ShadowProtect User Guide
To manually create a virtual machine
1. Launch VirtualBox, then click New.
2. In VirtualBox, select File > Virtual Media Manager., then select the Hard Disks tab.
3. Click Add, then browse to and select any XSP files previously created by VirtualBoot.
VirtualBoot virtual hard disk files have a .xsp extension. This adds the selected XSP files as managed
hard disks that you can assign to any VirtualBox VM. The XSP files contain lists of the backup image
files that constitute the virtual hard drive used by the VM.
Note: Make sure you select the _Disk_0 XSP file as the VM's first disk, as this disk always
contains the boot volume.
4. On the Create New Virtual Machine Wizard page, click Next.
5. On the VM Name and OS Type page, specify the required information, then click Next.
Name
The name of the virtual machine. You should make the name descriptive of the OS
and environment used in the VM.
Operating
The model of operating system used in the VM. VirtualBoot supports only Microsoft
System
Windows.
Version
The specific Windows operating system used in the VM.
6. On the Memory page, specify the amount of system memory (RAM) to allocate for use by the VM.
More memory makes the VM faster and more efficient. StorageCraft recommends at least 512MB.
7. On the Virtual Hard Disk page, select Use existing hard disk, then select the bootable virtual disk
created by VirtualBoot.
8. On the Summary page, click Finish.
VirtualBox creates the VM.
9. Once created, you can start the VM manually from VirtualBox.
a.Select the VM In the left-side list.
b.Click Start.
10. Continue with Configuring a VM.
Page 72 of 91
ShadowProtect User Guide
12.4 Configuring a VM
Once you have started a VM, you must configure it for use, much like you might configure a new Windows
installation. This process involves the following tasks:
Configuring Drivers
Installing Guest Additions
Configuring a Network Adapter
Continuing Incremental Backups
Note: When working with a VM, you must be able to switch keyboard/mouse focus between the
VM and your system environment. To switch focus to the VM, simply click the mouse in the VM
window. To switch focus out of the VM, press the right Ctrl button.
12.4.1 Configuring a Network Adapter
If you choose not to have VirtualBoot create a network adapter (NIC) in the VM, you can add it after the fact.
For the following reasons, this might be a good idea if you want to boot a backup image while the source
system is still operational, which can cause the following issues:
Two systems on the network with the same network ID can cause routing problems, particularly at the
Domain controllers.
Both the VM and the source system might save Incremental backup images to the same network
location. This does not affect data integrity, but can lead to confusing backup image file names, with
Incremental backup image files from both branches of the chain intermixed.
Keeping the VM off the network lets you resolve these types of issues before they cause any problems. For
example, once the VM loads you can pause ShadowProtect backup operations in the VM.
To add network support to the VM
1. Launch VirtualBox.
2. On the VirtualBox main page, select the VM where you want to add a NIC, then click Settings.
The VM must be powered off to modify the VM settings.
3. On the Settings page, select Network in the left-side navigation.
4. Select the Adapter 1 tab, then select Enable Network Adapter.
5.
Page 73 of 91
ShadowProtect User Guide
5. In the Attached To field, select how you want the virtual NIC to communicate with your host.
By default, VirtualBox uses Network Address Translation (NAT), but it supports other connection
options. For more information, see the VirtualBox documentation. A Bridged Adapter is necessary if
you want VM services to be visible to other network hosts. For example, during a failover scenario for
an Microsoft Exchange server.
6. Click Advanced, then select the virtual adapter type to use in the VM.
In testing, the "Intel Pro/1000 MT Desktop" appears to be a good generic driver for the VirtualBoot
environment.
7. Click OK to modify the network adapter settings.
12.4.2 Configuring Drivers
After starting a VM for the first time, you must allow Windows to detect and configure drivers for the VM
environment.
To configure a virtual machine for use
1. In the VM window, click Machine > Insert Ctrl-Alt-Delete to launch the Windows login, then log in to
the VM.
Click in the VM window to transfer mouse and keyboard control to the VM.
2. Allow Windows to identify hardware and install drivers in the VM.
Windows goes through it's initial boot sequence, identifying hardware and attempting to load drivers
for those devices. This process is similar to performing a Hardware Independent Restore (HIR) in
ShadowProtect. Follow the on-screen prompts and allow Windows to reboot as needed to load the
necessary drivers.
3. After rebooting, log in to the VM.
Note: Because of hardware changes detected by Windows as part of the transition to the VM
environment, you will likely be prompted to reactivate Windows when you log in to the VM.
However, you typically have a three-day grace period for doing this. Because Microsoft restricts the
number of hardware reactivations for each Windows license, you might want to leave Windows
deactivated if you can get the production system ready to restore within the three day grace period.
If this is not possible, activate Windows in the VM using the standard Microsoft activation process,
and your Windows VM is licensed for as long as you need it.
If your Windows installation does not grant a login grace period and requires immediate reactivation, try
booting into Safe Mode, or Safe Mode with Networking, to log in.
12.4.3 Installing Guest Additions
After Windows has installed drivers for the VM environment, you can install VirtualBox additions that provide
enhanced interaction with, and control over, the VM environment.
To install VirtualBox guest additions
Page 74 of 91
ShadowProtect User Guide
1. From the VM menu bar, select Devices > Install Guest Additions.
This loads a virtual CD into the VM that has extra software designed to make the VM run quickly and
smoothly. If the CD does not auto-run, browse the CD drive in the VM and execute one of the
following:
VBoxWindowsAdditions-x86.exe: 32-bit Windows VM.
VBoxWindowsAdditions-amd64.exe: 64-bit Windows VM.
2. Follow the directions in the Guest Additions Wizard, then reboot the VM.
3. Log in to the VM.
12.4.4 Continuing Incremental Backups
To use VirtualBoot in a hardware failure scenario, you must configure Incremental backups to continue in the
VM. For more information, see the VirtualBoot Scenarios. When working with a VirtualBoot VM, remember
the following important considerations:
To prevent performance problems in the VM, use backup jobs that use Incremental backups
(preferably Creating Backup Image Files). Do not use Differential imaging.
Any ShadowProtect backup jobs in the VirtualBoot VM are Paused/Disabled state. After starting the
VM, manually re-start the backup job (in the Backup Jobs tab) to continue making backups.
If you power off a VM created with VirtualBoot, DO NOT select Restore current snapshot
VirtualBoot as a shutdown option, or you will lose all Incremental backup data written in the VM since
its creation. Select this option only if you want to revert the VM back to its original state.
To continue incremental backups in the VM
1. Launch VirtualBox, then start the appropriate VM.
2. Once the VM loads, log in, then start ShadowProtect.
3. In ShadowProtect, select the Destinations tab.
4. In the Destinations tab, select the destination object used to store the VM's source backup image
files, then click Edit.
Warning: Do not delete the destination object or you will break the backup image chain.
Rather, modify the destination object as needed to point to the current location of the backup
image files used to create the VM.
5. In the Destination dialog box, modify the Destination Path to point to the location of the backup image
files used to create the VM, then click OK.
You might need to modify the network credentials (Domain, User, Password) in the destination object
to access the backup image files in their new location. If you have problems with name resolution in
the VM environment, try using the IP address of the host machine rather than its Host name.
When editing the Destination Object path, use only real SMB/CIFS network share paths. Do not use
share paths provided in the VM-to-Host file sharing facility of the VirtualBox “Guest Additions”.
6. In the ShadowProtect main page, select the Backups tab.
7.
Page 75 of 91
ShadowProtect User Guide
7. Select the appropriate backup job, then click Execute.
ShadowProtect starts an incremental backup job. The naming of incremental backup files in the VM
starts where the last Incremental image file used to create the VirtualBoot VM left off. The new
incremental image file depends on the Incremental image file chain used to create the VM. This
maintains a single backup image chain and makes it possible to provide Head Start Restore (HSR)
capabilities.
Warning: When continuing Incremental backups in the VM and using VirtualBox's Virtual
Media Manager to Remove managed XSP files, make sure to specify that you want to keep
the storage unit of the XSP disks for the VM where you continued creating Incremental
backups. Otherwise, VirtualBox deletes the XSP file and all other associated files, including
the Incremental backup image file created by VirtualBoot (You can identify this file because
the file name includes a GUID value). Any Incremental backups created in the VM are
dependent upon the VirtualBoot Incremental backup image file. By deleting it, VirtualBox
renders all Incrementals created in the VM unusable.
Page 76 of 91
ShadowProtect User Guide
13 Other Operations
ShadowProtect provides the following features to help you manage and maintain your backup environment:
Verifying Backup Image Files
Configuring Email Notifications
Log Files
13.1 Verifying Backup Image Files
It is important to verify the quality and integrity of backup images on a routine basis to ensure that a backup
image is ready should you need it.
One way to do this is to mount a backup image and browse the files and folders. If you can do this
successfully, you know the backup image is healthy. However, you can also use the Verify Image tool to test
the integrity of a specific backup image.
13.1.1 To test a backup image with the Verify Image tool
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. Open the Verify Image Wizard by doing one of the following:
In the Tools menu, click Verify Image.
In the Menu bar, select Tasks > Verify Image.
3. On the Source Image File page, select the Image Set to verify, then click Next.
In the drop-down menu, select the Destination (see Destinations) that contains the backup Image Set
to restore, or click Browse to locate the desired backup Image Set. The Specify Image Names field
displays the Image Sets available at the selected Destination or path.
Note: To verify a backup Image Set stored on a network share, you must have the proper
network credentials.
4. On the Backup Image Dependencies page, select the point-in-time to verify, then click Next.
Page 77 of 91
ShadowProtect User Guide
This page displays all Incremental backup image files associated with the selected Image Set. Select a
specific backup image file to view the following image file properties:
Image File Properties: Volume size, creation time, compression, password protection, comment.
Original Partition Information: Style, number, type, bootable option, starting offset and length.
Disk Information: Disk geometry, disk size and number of the first track sectors. You can also view the disk
layout graphically at the bottom of the screen. This represents what the disk looked like at the time of
backup.
Originating machine: Operating system version, the machine name, MAC address and the ShadowProtect
engine version used to create the image file.
1. On the Specify the Verify Options page, select what you want to verify, then click Next.
Verify only selected image: The Verify Image tool checks only the selected backup image file.
Verify selected image and all dependent files: Verifies the selected backup image file and all files
that it depends on. This verifies the integrity of the full point-in-time backup. If you select this option,
specify the order to verify the files (Newest to Oldest or Oldest to Newest).
2. On the Wizard Summary page, review the details of the verify operation, then click Finish.
You can view the progress of verify operation in the Backup Jobs tab.
13.2 Configuring Email Notifications
ShadowProtect can be configured to send Email notifications on the success or failure of a backup job. The
Email notification includes the following information:
Email Subject: Indicates that this notification is for a successful or unsuccessful back up job.
Email Body: Contains the following information about the backup job.
Start time
Finish time
Source volume
Destination path
13.2.1 To configure email notifications
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. In the Menu bar, select Options > Agent Options.
3. On the Agent Options page, provide the details of the Email configuration, then click OK.
Page 78 of 91
3.
ShadowProtect User Guide
SMTP Server
The host name or IP address of the outgoing SMTP server to use when
Name or IP
sending Email notifications (for example smtp@gmail.com).
Address
SMTP Port
(default: 25) The port used by the SMTP service.
The default port for secure SMTP connections (SSL), is 465.
SMTP Login User The username ShadowProtect uses to access the SMTP server. For example,
jdoe@gmail.com.
Name
SMTP Login
The password associated with the SMTP user name.
Password
SMTP
The authentication method used by the SMTP server. Select the appropriate
Authentication
authentication method for your SMTP server from the drop-down list.
Method
For example, the SMTP authentication method for Gmail is Login.
Use SSL
(Default: Off) Indicates if you want to use a secure connection to communicate
with the SMTP server.
When using SSL, make sure to set the SMTP Port accordingly.
Email From
The Email address that appears in email message's From field.
Address
Email To
A semi-colon separated list of Email addresses that you want to receive the
Addresses
notification. For example, jdoe@gmail.com;jsmith@gmail.com.
Custom Subject
(Optional) A text string that appears below the ShadowProtect-generated email
Suffix
content in the Subject field.
When creating this content, use /r for carriage return, /n for new line, and /t for
tab characters.
Custom Body
(Optional) A text string that appears in the email Message field. Use /r for
Prefix
carriage return, /n for new line, and /t for tab characters.
Send Email on
(Default: Off) Indicates if you want to send notification emails when
Success
ShadowProtect successfully completes a job.
Send Email on
(Default: Off) Indicates if you want to send notification emails when
Failure
ShadowProtect fails to complete a job.
Send daily report
(Default: Off) Indicates if you want to send a daily report of ShadowProtect
activities.
Send weekly
(Default: Off) Indicates if you want to send a weekly report of ShadowProtect
report
activities.
4.
Page 79 of 91
ShadowProtect User Guide
4. (Optional) Click Test Email to send a test message and confirm that the Email configuration is
working properly.
If you have trouble receiving ShadowProtect email messages on your production email server, try
sending emails to an external email account such as Gmail* or Hotmail*. This lets you isolate the
problem to ShadowProtect or the email system.
Note: When doing this, make sure your external email account has POP/IMAP support enabled.
13.3 Log Files
ShadowProtect creates a log file for each backup job. This log file provides information about the backup job
results, including the reason for failure, if any. You can view the log for any backup job in the Backup History
tab (see Backup History Tab).
Each log entry provides information about the related backup job: Start Time, End Time, Type (Full or
Incremental), Source, Destination and Status. Backup jobs that finished successfully have a status of
“Completed.” ShadowProtect marks jobs that do not complete successfully with a Warning icon
.These
jobs have a status other than “Completed,” such as “Execution Failed” or “Aborted.” It is important to review
these entries and determine why the job failed.
The Job Log provides information about the events that occurred during that job: Timing (when the event
occurred), Module, Code, and Message. Backup jobs that finished successfully have a status of
“Completed.” ShadowProtect marks events that do not complete successfully with Failed icon.
13.4 Creating Key Files
Key Files provide an alternative mechanism for protecting backup images. Key Files let you delegate the
creation and storage of backup image files without losing control of the passwords used to protect your
backup image files.
ShadowProtect includes the KeyFileMaker tool for generating Key Files. KeyFileMaker is provided on the
ShadowProtect CD, but is not installed by default.
Note: When using a Continuous Incrementals schedule (see Step 5 in Creating Backup Image
Files), ShadowProtect automatically creates a new Key File each time it generates a new Full
image. ImageManager uses the Key File when collapsing Incremental images. For more
information about ImageManager, see the ShadowProtect ImageManager User Guide.
13.4.1 To install KeyFileMaker
1. Insert the ShadowProtect CD into the system's CD drive.
2.
Page 80 of 91
ShadowProtect User Guide
2. Browse to the \Installers folder, then execute KEYFILEMAKERSETUP.exe.
3. Follow the steps in the Installation Wizard to install the KeyFileMaker software.
Once installed, you can access KeyFileMaker in Windows by selecting Start > Programs >
ShadowProtect > ShadowProtect KeyFileMaker.
13.4.2 To create a key file
1. Launch KeyFileMaker (Start > Programs > ShadowProtect > ShadowProtect KeyFileMaker).
2. In the KeyFileMaker dialog box, provide the following information, then click Create Key File.
Key files have a .spk file extension.
Set
Specify the password to store in the Key File.
Password /
Confirm
Password
Save Key
Specify the name and location for the Key File. You must save the Key File in the
File As
same folder as the backup image files that rely on it.
Key File
Specify the backup Image Set that you want to associate with the Key File.
Association Generic Key File: The key file is not associated with any Image Set. You can use a
generic key file if all backup image files in a given folder are part of the same Image
Set.
Key File associated with a GUID: The File Set GUID (Globally Unique ID) of the
Image Set that you want to associate with this Key File.
Key File associated with a backup image: The full file name, including path, to a
backup image file from the Image Set that you want to associate with this Key File.
All backup image files in an Image Set share the same File Set GUID. You can view
a backup image file's File Set GUID in the Image File Mount Wizard:
a. In Windows Explorer, double-click the backup image file.
b. On the Image File Name page, open the File Dependency Properties property
group.
13.5 Changing Partition Creation Policy
Page 81 of 91
ShadowProtect User Guide
The Partition Creation Policy Editor lets you modify basic disk geometry settings used to create a new
partition. You can access the Partition Creation Policy Editor from the Disk Map tab action menu (right-click
menu) (see Disk Map Tab).
13.5.1 To modify partition creation settings
1. Start the ShadowProtect Console (see Starting ShadowProtect).
2. On the Center panel, select the Disk Map tab.
3. Right-click the desired partition, then select Edit Policy.
4. In the Partition Creation Policy Editor, modify the partition creation settings as desired, then click Set
Active.
To modify a particular setting, click in the appropriate field, then type the desired value, or select it
from the drop-down list (if available).
Layout Type Specifies a name for the partition creation policy.
Partition
(Default: Track) Identifies the partition starting point, which typically occurs at a
Start
specific disk boundary. Supported options include: Cylinder, Track, and Sector.
Alignment
Partition
(Default: Sector) Identifies the partition end point. Supported options include:
End
Cylinder, Track, and Sector.
Alignment
Offset from
Specifies an offset from the start of the disk where you want the partition to begin.
Disk Start
This should be a Whole number.
Disk Start
(Default: Sector) Specifies the units to use with the specified offset. Supported
Offset Units
options include: Cylinder, Track, Sector, Byte.
13.6 Creating a Recovery CD
StorageCraft provides an ISO image file that you can use to create a bootable Recovery Environment disk.
For more information about using the StorageCraft Recovery Environment, see the StorageCraft Recovery
Environment User Guide.
Page 82 of 91
ShadowProtect User Guide
13.6.1 To create a Recovery Environment disk
1. If necessary, download the Recovery Environment ISO image file.
a.Open a Web browser to the StorageCraft ISO Download Web page.
b.In the Serial Number field, specify the product serial number you received when you
purchased ShadowProtect, then click Submit.
c.Save the Recovery Environment ISO image ShadowProtect_RE_4.0.0.isoz to a local
drive.
2. Insert a blank CD/DVD/Blu-Ray in your system's optical drive.
3. From Windows, select Start > ShadowProtect > ISO Tool.
4. Browse to and select the ShadowProtect ISO file, then click Burn the Disk.
Select Overwrite any existing data... if you want to replace existing data on the disk.
5. When ISO Tool finishes transferring the ISO image, click Close.
The ISO transfer can take several minutes to complete.
Page 83 of 91
ShadowProtect User Guide
14 Best Practices
Turn off disk defrag software if using incremental backups. When you take an incremental backup, you
are writing a file of only the sectors which have changed since the last full or incremental backup image was
taken. If you run disk defrag software, you will be changing the sectors on the disk and cause the time and
size of the incremental backup image to greatly increase. If you want to run disk defrag software, it is
recommended that you do it before you run a Full backup image and then do not run or schedule the disk
defrag software to run while ShadowProtect is scheduled to take Incremental backup images.
Test the StorageCraft Recovery Environment. Make sure the ShadowProtect CD lets you boot your
system and gain access to both any local drives and network devices that you might need.
Monitor disk space usage where images are stored. Make sure your backup image file storage location
has sufficient disk space for new backup image files, or backup jobs will fail.
Monitor the ShadowProtect log files. Routinely examine the ShadowProtect log files. The log files will
provide status of backup jobs, letting you know the backup jobs were completed successfully or if the backup
jobs failed. If the backup job failed, the log files will provide details of the failure allowing you to take action to
correct the situation.
Use password encryption to protect backup image files. Since ShadowProtect backup images include
all the contents of the disk drive, use password encryption to help protect data security.
Include multiple volumes in your backup job. If you have databases or applications that span volumes,
include all relevant volumes in the backup image. ShadowProtect snapshots can operate simultaneously on
multiple volumes, thereby ensuring cross-volume consistency.
Periodically save backup image files to removable storage. External hard drives or optical media let you
easily store backup image files at an off-site location. This helps ensure the availability of backup images in
the case of a disaster.
Use the Image Conversion Tool to manage backup images. You can consolidate backup images, split
backup images for CD or DVD storage, and apply new password encryption to existing backup image files in
the event passwords are compromised (see Image Conversion Tool).
Use Email notification. Automatic Emails keep you informed of the operation of your ShadowProtect
backup jobs so you can quickly identify and resolve problems that might arise (see Configuring Email
Notifications).
Use a retention policy that maximizes point-in-time histories. Review the options available in the
ShadowProtect for retaining point-in-time histories, including using Differential images for second and
subsequent Full images (see "Retention" in Advanced Options).
Page 84 of 91
ShadowProtect User Guide
15 Retention Policy Configurations
ShadowProtect employs a unique method for maximizing point-in-time backup images while minimizing
storage consumption that results in the ability to store more point-in-time histories in substantially less
storage space. The following two tables present four common retention policies for a scheduled backup job,
and the resulting performance of each. For more information about creating scheduled backup jobs and
retention policies, see Creating Backup Image Files.
Page 85 of 91
ShadowProtect User Guide
16 Product Support
Technical support for StorageCraft products is available beginning with the release of the product and
ending six months after the release of the next major version of the product or after StorageCraft
discontinues the product line.
16.1 Complimentary Technical Support
StorageCraft complimentary technical support consists of self-help support tools that are available at
http://forum.storagecraft.com/Community/ (in English only), and an easy-to-use, powerful knowledge base
that helps you find answers to the most frequently asked product questions, as well as “how-to” procedures
and technical information about all StorageCraft products.
16.2 E-Mail Support
Requests for e-mail support in North America are processed 8:00 am to 5:00 pm MST, Monday through
Friday. To obtain e-mail technical support for specific technical questions or issues, fill out the form at
http://forum.storagecraft.com/Community/. Please provide as much detail as possible to help the technical
support engineers understand and diagnose the issue.
In order to ensure efficient service, please provide at a minimum the following information:
Product name and version number
Detailed problem description, error code, log file description, etc.
Hardware and software configuration, operating system version, service pack number, etc.
16.3 Telephone Support
StorageCraft support engineers are available Monday through Friday 9:00 A.M. to 5:30 P.M. (MST), except
for business holidays. To reach the StorageCraft technical support team, please call: (801) 545-4710.
Telephone support is available to all customers with a current maintenance plan or customers who have
purchased product maintenance from the StorageCraft Web store. If you are not immediately connected to a
support engineer, leave a message and the next available support engineer will return your call.
Page 86 of 91
ShadowProtect User Guide
17 Glossary
Backup: The activity of copying files, volumes, and databases to preserve them in case of equipment failure
or other catastrophe. An important part of a disaster recovery strategy, backup is often neglected,
particularly for personal computer users.
Backup Image File: Files that contain the contents of a backup activity, Backup Image Files let you restore
the contents of a computer system to a specific point-in-time.
Backup Image Set: The Base Image File, plus any Incremental Image Files, that comprise all Backup
Image Files for a specific computer system.
Bare Metal Recovery: The complete restoration of computer data after a catastrophic failure, including the
operating system, file system, partitions, volumes and data, from a complete backup image.
Base Image File: see Full Image File.
Basic Disk: A physical disk drive that can be accessed by MS-DOS* and all Windows* operating systems.
Basic disks can contain up to four primary partitions, or three primary partitions and an extended partition
with multiple logical drives.
Cold Backup: A backup taken from the Recovery Environment, rather than when the computer's operating
system is loaded.
Continuous Incrementals: A backup scheduling model for ShadowProtect that lets you create a base
backup file, then create additional incremental backup files that include only changes that occurred since the
last backup.
Compression: A technology that reduces the size of a file. Compression lets you save time, bandwidth and
storage space.
Differential Image File: Backup files containing the hard drive sectors that have changed since the Base
Image File was created. Differential image files take about the same time to create as Base Image Files, but
they are smaller. When restoring a drive (or files and folders), you must use the Base Image File with the
appropriate Differential Image File to restore the computer to a specific point-in-time.
Disaster Recovery: The ability to recover from the complete loss of a computer, whether due to natural
disaster or malicious intent. Typical disaster recovery strategies include replication and backup/restore.
Disk Device: A locally accessible disk drive, including locally attached USB or FireWire disk drives, and
network drives such as SAN, NAS, iSCSI, SCSI, USB or FireWire.
Driver: A program that interacts with a particular device or software. The driver provides a common interface
to the device, or software, that makes it accessible to other computer systems and the user.
Drive Letter: See Mount as Drive Letter.
Page 87 of 91
ShadowProtect User Guide
Dynamic Disk: A physical disk that provides features that basic disks do not (see Basic Disk), such as
support for volumes spanning multiple disks. Dynamic disks use a hidden database to track information
about dynamic volumes on the disk and other dynamic disks in the computer.
Encryption: A procedure that renders the contents of a file unintelligible to anyone that cannot present the
appropriate decryption key.
*ExactState™ Imaging:* The ability to create a backup image at a point where the computer is in the best
state for creating a backup (for example, no open files).
Full Image File -- Backup files that contain a copy of all used sectors on a disk drive. This image file
contains all data on the computer, including operating system, applications, and data.
Hard Drive: An electromagnetic storage device, also referred to as a “disk drive,” “hard drive,” or “hard disk
drive” that stores and provides access to data on a computer.
Head Start Restore (HSR): The ability to begin the restoration of a large backup image chain while
ShadowProtect continues to add Incremental backup image files to the same image chain. This reduces the
time necessary to restore a large volume from days or weeks, to minutes or just a few hours.
Hot Backup: A backup image taken when ShadowProtect is loaded on the computer's standard operating
system. A hot backup requires the use of a snapshot filter driver (see Snapshot).
Hot Restore: The restoration of a backup image while the computer or server remains up and running. You
cannot perform a hot restore of a system volume.
Image or Image File: See Backup Image File.
Image Set: The combination of a Full image and all additional Incremental images necessary to restore a
computer to a given point-in-time.
Incremental Image File: Backup files containing the sectors that have changed since the last Incremental
backup was taken. Incremental images are fast to create and smaller than either Full image files or
Differential image files. When restoring a drive (or files and folders), you must use the Full image file and the
appropriate Incremental image files necessary to restore the computer to a specific point-in-time.
Lock Volume: A software request to gain exclusive access to a particular drive. Locking the volume
prevents other software programs from changing the file system or opening files during the process of writing
the image file.
Microsoft VolSnap: The proprietary Microsoft snapshot technology.
Microsoft Volume Shadow Copy Service (VSS): The backup infrastructure available in Microsoft Windows
(XP and Windows Server 2003 and later), which includes a mechanism for creating consistent data
snapshots. VSS produces consistent snapshots by coordinating with business applications, file-system
services, backup applications, fast-recovery solutions, and storage hardware.
Page 88 of 91
ShadowProtect User Guide
Mount as Drive Letter: The process of assigning volumes (active primary partitions and logical partitions) to
specific letter designators in the root namespace of a Microsoft operating system. Unlike mount points (see
Mount Point), drive letter assignment permits only letters in the namespace, and they solely represent
volumes. In other words, it is a process of naming the roots of the "forest" that represents the file-system
(with each volume being an independent tree therein).
Mount Point: A directory on a volume that an application can use to "mount" (set up for use) a different
volume. Mount points overcome the limitation of drive letters (see Mount as Drive Letter) and allow for more
logical organization of files and folders.
Mounted Volume: The ability to see and use a backup image that is physically located somewhere else on
the network. When mounted, the backup image appears as a volume and behaves as if it is a part of the
local computer system. Mounted volumes are read/write capable so users can update existing image files,
scan for viruses or other malware, and repair the image file.
Operating System: Software that, after being loaded into the computer by a boot program, manages all
other programs on a computer. Other programs are called applications or application programs.
Partition: The portion of a physical disk that functions as though it were a physically separate disk. Once
created, a partition must be formatted and assigned a drive letter before data can be stored on it. On basic
disks, partitions can contain basic volumes, which include primary partitions and logical drives. On dynamic
disks, partitions are known as dynamic volumes and come in the following types: simple, striped, spanned,
mirrored, and RAID--5 (striped with parity) volumes.
Restoring: The activity of retrieving computer data from a previously saved backup image file.
Snapshot: A type of backup that provides a point-in-time view of a volume. When you perform a backup or
scheduled backup, ShadowProtect uses either StorageCraft Volume Snapshot Manager (VSM) or Microsoft
Volume Shadow Copy Service (VSS) to take a snapshot of the volume. Any changes that occur to the
volume after the snapshot is taken are not included in the backup.
.spf: A file extension representing a ShadowProtect full or base image file.
.spi: A file extension representing a ShadowProtect incremental or differential image file.
.sp(number): A file extension representing a ShadowProtect image file that spans multiple files. The number
following .sp is the sequence of the file in the spanned image file group.
Point-In-Time Backup: A backup routine that lets you restore a file, folder, or the entire system to a specific
point-in-time. Point-in-time backups are often used to roll-back a computer to a point prior to a computer
problem.
Protected Volumes: Volumes that users have selected for backup by ShadowProtect.
RAID: Redundant Array of Independent Disks. A collection of disk drives that offers increased performance
and fault tolerance. There are a number of different RAID levels. The three most commonly used are 0, 1,
and 5:
Level 0: striping without parity (spreading out blocks of each file across multiple disks).
Level 1: disk mirroring or duplexing.
Page 89 of 91
ShadowProtect User Guide
Level 5: block-level striping with distributed parity.
Real-Time: A level of computer responsiveness that a user perceives as essentially immediate, or that
enables the computer to keep up with some external process such as backing up.
Recovery Environment: See StorageCraft Recovery Environment.
Remote Computer (Node): A computer that is physically located somewhere else on a network but is
accessible from a local computer.
Service: A program, routine, or process that performs a specific system function to support other programs,
particularly at a low (close to the hardware) level.
Scheduled Job: A job created in the ShadowProtect interface. Scheduled jobs let ShadowProtect backup
events to occur automatically.
Spanned Image Set: A Backup Image File that has been divided into multiple smaller files for easier
management or storage. This lets you save the Backup Image File to removable media such as a CD or
DVD.
StorageCraft Recovery Environment: A secondary boot environment (or operating system) that gives a
user the functionality necessary to access and restore Backup Image Files on a network. This environment
is typically used when a drive cannot be restored from within Windows or when the computer has suffered a
catastrophic failure and the entire hard drive must be restored.
System downtime: The amount of time a server or PC is offline and inaccessible to users. This is
commonly known as having the system out of production.
System Volume: The volume that stores the boot files necessary to load an operating system. Typically,
this is the C:\ volume.
Tray Icon: A graphical representation of a computer program or application. For example, ShadowProtect
uses a tray icon for the user to gain information about the program. Tray icons reside in the system tray.
UNC (Universal Naming Convention): A method used to identify folders, files and programs on a network
computer. A UNC path begins with two backslashes
followed by the server name, share name, directory and filename. For example,
\\server_name\share_name\backup_name.spi.
Unprotected Volumes: Volumes not protected by ShadowProtect.
User Interface (UI): The portions of a computer system with which a user interacts (display, keyboard,
mouse, etc.) and the portion of a software program that accepts and responds to user interaction.
Virtual Private Network (VPN): A private data network that makes use of the public telecommunication
infrastructure. VPNs maintain privacy through the use of tunneling protocols, encryption, and other security
procedures.
VirtualBoot: The ability to create a Virtual Machine based on an existing backup image chain. Once started,
the VM provides complete access to data, applications, and services provided by the original system, in a
state corresponding with the last Incremental image included in the VM.
Page 90 of 91
ShadowProtect User Guide
Virtual Volume: A locally referenced volume that does not physically exist on the system. ShadowProtect
uses virtual volumes for the benefit of protecting computer systems.
Volume: An area of storage on a hard disk. A volume is formatted by using a file system, such as file
allocation table (FAT) or NTFS, and typically has a drive letter assigned to it. A single hard disk can have
multiple volumes, and volumes can also span multiple disks.
VSS Aware: An application designed to work with Microsoft Volume Shadow Copy Services (VSS)
framework to ensure consistent data backup.
Page 91 of 91
Download PDF
Similar pages