Enviar búsqueda
Cargar
Network Implementation and Support Lesson 12 Backups
•
Descargar como PPT, PDF
•
0 recomendaciones
•
320 vistas
Eric Vanderburg
Seguir
Network Implementation and Support Lesson 12 Backups
Leer menos
Leer más
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 15
Descargar ahora
Recomendados
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
.Gastón. .Bx.
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld
Nim
Nim
muhammad adeel
1184 Quayle
1184 Quayle
Stanley F. Quayle
Installation of ESX Server
Installation of ESX Server
Luca Viscomi
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
Ken Hutchins
Implementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded System
insydesoftware
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study Guide
Veeam Software
Recomendados
AIX Advanced Administration Knowledge Share
AIX Advanced Administration Knowledge Share
.Gastón. .Bx.
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld 2013: Cisco, VMware and Hyper-converged Solutions for the Enterprise....
VMworld
Nim
Nim
muhammad adeel
1184 Quayle
1184 Quayle
Stanley F. Quayle
Installation of ESX Server
Installation of ESX Server
Luca Viscomi
Lecture Lesson 1 Windows 7 Configuration
Lecture Lesson 1 Windows 7 Configuration
Ken Hutchins
Implementing a UEFI BIOS into an Embedded System
Implementing a UEFI BIOS into an Embedded System
insydesoftware
The Unofficial VCAP / VCP VMware Study Guide
The Unofficial VCAP / VCP VMware Study Guide
Veeam Software
We4IT lcty 2013 - infra-man - domino run faster
We4IT lcty 2013 - infra-man - domino run faster
We4IT Group
Intrack14dec tips tricks_clean
Intrack14dec tips tricks_clean
chinitooo
EMC Dteata domain advanced command troubleshoot
EMC Dteata domain advanced command troubleshoot
solarisyougood
Presentation aix workload partitions (wpa rs)
Presentation aix workload partitions (wpa rs)
xKinAnx
Tlf2014
Tlf2014
Dru Lavigne
Windows 7 configuration
Windows 7 configuration
Arnold Derrick Kinney
Hbcd
Hbcd
bwryno
Impact of Intel Optane Technology on HPC
Impact of Intel Optane Technology on HPC
MemVerge
Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
RajKumar Rampelli
Operating Systems
Operating Systems
Geetha Kannan
Introduction to Kernel and Device Drivers
Introduction to Kernel and Device Drivers
RajKumar Rampelli
The e820 trap of Linux kernel hibernation
The e820 trap of Linux kernel hibernation
joeylikernel
Unit 1 four part pocessor and memory
Unit 1 four part pocessor and memory
Neha Kurale
Integrated Technology Unit Presentation
Integrated Technology Unit Presentation
Poom Chitnuchtaranon
Signature verification of hibernate snapshot
Signature verification of hibernate snapshot
joeylikernel
Virtualization ppt1
Virtualization ppt1
abdulrubbinmohsin
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Cường Nguyễn
UEFI Spec Version 2.4 Facilitates Secure Update
UEFI Spec Version 2.4 Facilitates Secure Update
insydesoftware
Asiabsdcon14
Asiabsdcon14
Dru Lavigne
Bootstrap process of u boot (NDS32 RISC CPU)
Bootstrap process of u boot (NDS32 RISC CPU)
Macpaul Lin
Anzac day
Anzac day
David Lucas
Firewall
Firewall
Nilkanth Shingala
Más contenido relacionado
La actualidad más candente
We4IT lcty 2013 - infra-man - domino run faster
We4IT lcty 2013 - infra-man - domino run faster
We4IT Group
Intrack14dec tips tricks_clean
Intrack14dec tips tricks_clean
chinitooo
EMC Dteata domain advanced command troubleshoot
EMC Dteata domain advanced command troubleshoot
solarisyougood
Presentation aix workload partitions (wpa rs)
Presentation aix workload partitions (wpa rs)
xKinAnx
Tlf2014
Tlf2014
Dru Lavigne
Windows 7 configuration
Windows 7 configuration
Arnold Derrick Kinney
Hbcd
Hbcd
bwryno
Impact of Intel Optane Technology on HPC
Impact of Intel Optane Technology on HPC
MemVerge
Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
RajKumar Rampelli
Operating Systems
Operating Systems
Geetha Kannan
Introduction to Kernel and Device Drivers
Introduction to Kernel and Device Drivers
RajKumar Rampelli
The e820 trap of Linux kernel hibernation
The e820 trap of Linux kernel hibernation
joeylikernel
Unit 1 four part pocessor and memory
Unit 1 four part pocessor and memory
Neha Kurale
Integrated Technology Unit Presentation
Integrated Technology Unit Presentation
Poom Chitnuchtaranon
Signature verification of hibernate snapshot
Signature verification of hibernate snapshot
joeylikernel
Virtualization ppt1
Virtualization ppt1
abdulrubbinmohsin
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
Cường Nguyễn
UEFI Spec Version 2.4 Facilitates Secure Update
UEFI Spec Version 2.4 Facilitates Secure Update
insydesoftware
Asiabsdcon14
Asiabsdcon14
Dru Lavigne
Bootstrap process of u boot (NDS32 RISC CPU)
Bootstrap process of u boot (NDS32 RISC CPU)
Macpaul Lin
La actualidad más candente
(20)
We4IT lcty 2013 - infra-man - domino run faster
We4IT lcty 2013 - infra-man - domino run faster
Intrack14dec tips tricks_clean
Intrack14dec tips tricks_clean
EMC Dteata domain advanced command troubleshoot
EMC Dteata domain advanced command troubleshoot
Presentation aix workload partitions (wpa rs)
Presentation aix workload partitions (wpa rs)
Tlf2014
Tlf2014
Windows 7 configuration
Windows 7 configuration
Hbcd
Hbcd
Impact of Intel Optane Technology on HPC
Impact of Intel Optane Technology on HPC
Writing Character driver (loadable module) in linux
Writing Character driver (loadable module) in linux
Operating Systems
Operating Systems
Introduction to Kernel and Device Drivers
Introduction to Kernel and Device Drivers
The e820 trap of Linux kernel hibernation
The e820 trap of Linux kernel hibernation
Unit 1 four part pocessor and memory
Unit 1 four part pocessor and memory
Integrated Technology Unit Presentation
Integrated Technology Unit Presentation
Signature verification of hibernate snapshot
Signature verification of hibernate snapshot
Virtualization ppt1
Virtualization ppt1
Code4vn - Linux day - linux boot process
Code4vn - Linux day - linux boot process
UEFI Spec Version 2.4 Facilitates Secure Update
UEFI Spec Version 2.4 Facilitates Secure Update
Asiabsdcon14
Asiabsdcon14
Bootstrap process of u boot (NDS32 RISC CPU)
Bootstrap process of u boot (NDS32 RISC CPU)
Destacado
Anzac day
Anzac day
David Lucas
Firewall
Firewall
Nilkanth Shingala
Shadow copy
Shadow copy
Sanjeev Gupta
Firewall
Firewall
Sherlyn rodriguez
Firewall and its types and function
Firewall and its types and function
Nisarg Amin
Firewall
Firewall
Manikyala Rao
Firewall
Firewall
Saurabh Chauhan
Real-time Shadowing Techniques: Shadow Volumes
Real-time Shadowing Techniques: Shadow Volumes
Mark Kilgard
Microsoft Offical Course 20410C_01
Microsoft Offical Course 20410C_01
gameaxt
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03
gameaxt
Microsoft Offical Course 20410C_04
Microsoft Offical Course 20410C_04
gameaxt
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
gameaxt
Firewall
Firewall
lmbriscoe
Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02
gameaxt
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
gameaxt
Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13
gameaxt
pfSense firewall workshop guide
pfSense firewall workshop guide
Sopon Tumchota
Microsoft Offical Course 20410C_08
Microsoft Offical Course 20410C_08
gameaxt
Microsoft Offical Course 20410C_09
Microsoft Offical Course 20410C_09
gameaxt
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
gameaxt
Destacado
(20)
Anzac day
Anzac day
Firewall
Firewall
Shadow copy
Shadow copy
Firewall
Firewall
Firewall and its types and function
Firewall and its types and function
Firewall
Firewall
Firewall
Firewall
Real-time Shadowing Techniques: Shadow Volumes
Real-time Shadowing Techniques: Shadow Volumes
Microsoft Offical Course 20410C_01
Microsoft Offical Course 20410C_01
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_03
Microsoft Offical Course 20410C_04
Microsoft Offical Course 20410C_04
Microsoft Offical Course 20410C_12
Microsoft Offical Course 20410C_12
Firewall
Firewall
Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_10
Microsoft Offical Course 20410C_13
Microsoft Offical Course 20410C_13
pfSense firewall workshop guide
pfSense firewall workshop guide
Microsoft Offical Course 20410C_08
Microsoft Offical Course 20410C_08
Microsoft Offical Course 20410C_09
Microsoft Offical Course 20410C_09
Microsoft Offical Course 20410C_11
Microsoft Offical Course 20410C_11
Similar a Network Implementation and Support Lesson 12 Backups
Windows_Installation.pptx
Windows_Installation.pptx
LearyJohn
les03.pdf
les03.pdf
VAMSICHOWDARY61
6421 b Module-13
6421 b Module-13
Bibekananada Jena
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
Gene Carboni
The Boot Process
The Boot Process
Amir Villas
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Eric Vanderburg
Managing Hardware Devices.pdf
Managing Hardware Devices.pdf
SolomonAnab1
Oracle Performance On Linux X86 systems
Oracle Performance On Linux X86 systems
Baruch Osoveskiy
32 bit linux-system
32 bit linux-system
Teguh Asmoro
System Client Details
System Client Details
SyAM Software
OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101
Trinath Somanchi
Os
Os
GOWTHAM SANKAR
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Sam Bowne
Computer Main Comppponents.pdf
Computer Main Comppponents.pdf
thinalost
Ite v5.0 chapter5
Ite v5.0 chapter5
Kazi Rafsun Shaanto
Introducing Widows 7
Introducing Widows 7
Gene Carboni
Proact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdf
Karel Kannel
Aties Presentation
Aties Presentation
Fedor Kurbatov
Windows 11 Desktop 01. Administration System Maintenance and Troubleshooting...
Windows 11 Desktop 01. Administration System Maintenance and Troubleshooting...
ssuseradaf5f
Ch03
Ch03
Sumit Tambe
Similar a Network Implementation and Support Lesson 12 Backups
(20)
Windows_Installation.pptx
Windows_Installation.pptx
les03.pdf
les03.pdf
6421 b Module-13
6421 b Module-13
Lesson 8 - Understanding Backup and Recovery Methods
Lesson 8 - Understanding Backup and Recovery Methods
The Boot Process
The Boot Process
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Computer Architecture - Software - Lesson 8 - Managing Windows XP - Eric Vand...
Managing Hardware Devices.pdf
Managing Hardware Devices.pdf
Oracle Performance On Linux X86 systems
Oracle Performance On Linux X86 systems
32 bit linux-system
32 bit linux-system
System Client Details
System Client Details
OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101
Os
Os
CNIT 121: 8 Forensic Duplication
CNIT 121: 8 Forensic Duplication
Computer Main Comppponents.pdf
Computer Main Comppponents.pdf
Ite v5.0 chapter5
Ite v5.0 chapter5
Introducing Widows 7
Introducing Widows 7
Proact ExaGrid Seminar Presentation KK 20220419.pdf
Proact ExaGrid Seminar Presentation KK 20220419.pdf
Aties Presentation
Aties Presentation
Windows 11 Desktop 01. Administration System Maintenance and Troubleshooting...
Windows 11 Desktop 01. Administration System Maintenance and Troubleshooting...
Ch03
Ch03
Más de Eric Vanderburg
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Eric Vanderburg
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Eric Vanderburg
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
Eric Vanderburg
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Eric Vanderburg
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Eric Vanderburg
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Eric Vanderburg
Principles of technology management
Principles of technology management
Eric Vanderburg
Japanese railway technology
Japanese railway technology
Eric Vanderburg
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Eric Vanderburg
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Eric Vanderburg
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Eric Vanderburg
Incident response table top exercises
Incident response table top exercises
Eric Vanderburg
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Eric Vanderburg
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Eric Vanderburg
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Eric Vanderburg
Más de Eric Vanderburg
(20)
GDPR, Data Privacy and Cybersecurity - MIT Symposium
GDPR, Data Privacy and Cybersecurity - MIT Symposium
Modern Security the way Equifax Should Have
Modern Security the way Equifax Should Have
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybercrime and Cyber Threats - CBLA - Eric Vanderburg
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Cybersecurity Incident Response Strategies and Tactics - RIMS 2017 - Eric Van...
Mobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
2017 March ISACA Security Challenges with the Internet of Things - Eric Vande...
Ransomware: 2016's Greatest Malware Threat
Ransomware: 2016's Greatest Malware Threat
Emerging Technologies: Japan’s Position
Emerging Technologies: Japan’s Position
Principles of technology management
Principles of technology management
Japanese railway technology
Japanese railway technology
Evaluating japanese technological competitiveness
Evaluating japanese technological competitiveness
Japanese current and future technology management challenges
Japanese current and future technology management challenges
Technology management in Japan: Robotics
Technology management in Japan: Robotics
Incident response table top exercises
Incident response table top exercises
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
The Prescription for Protection - Avoid Treatment Errors To The Malware Problem
Cloud Storage and Security: Solving Compliance Challenges
Cloud Storage and Security: Solving Compliance Challenges
Hacktivism: Motivations, Tactics and Threats
Hacktivism: Motivations, Tactics and Threats
Correct the most common web development security mistakes - Eric Vanderburg
Correct the most common web development security mistakes - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Deconstructing website attacks - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Countering malware threats - Eric Vanderburg
Último
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
SynarionITSolutions
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Principled Technologies
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
Boston Institute of Analytics
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
The Digital Insurer
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Roshan Dwivedi
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
Radu Cotescu
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Safe Software
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
wesley chun
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Último
(20)
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
Deploy with confidence: VMware Cloud Foundation 5.1 on next gen Dell PowerEdg...
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Network Implementation and Support Lesson 12 Backups
1.
Network Implementation & Support Chapter
12 Backups Eric Vanderburg © 2006
2.
Overview • • • • • Windows Backup Utility Shadow
Copies Automated System Recovery Startup Options Recovery Console Eric Vanderburg © 2006
3.
Windows Backup • Backup
or restore • System State – – – – – – – – – Registry COM+ (classes) Boot files Certificate Services database Active Directory SYSVOL Cluster Service IIS Metadirectory System Files Eric Vanderburg © 2006
4.
Windows Backup • Selected
files • Can be scheduled • Backup Types – Normal (resets archive bit) – Copy – Differential – Incremental (resets archive bit) – Daily (only files changed today Eric Vanderburg © 2006
5.
Windows Backup • Permissions
to backup entire system – Administrators – Backup Operators – Server Operators • Otherwise, backup is only permitted on files they own or have at least read NTFS permissions to. • Only the local machine can be backed up • Specific components of the system state cannot be selected individually for backup or restore • Files can be restored to another location Eric Vanderburg © 2006
6.
Windows Backup • Ntbackup •
Saved as .bkf compressed file • Boot to AD Restore mode to restore AD database – Use password set when dcpromo was run – Restore system state with ntbackup – Run ntdsutil to make the restore authoritative • Changes version • Replaces AD once replicated with other DCs Eric Vanderburg © 2006
7.
Shadow Copies • • • • VSS (Volume
Shadow Copy Service) Restore deleted files Go back to previous versions Compare previous versions & copy back into the folder • Makes backups at specified intervals, twice a day M-F • Only tracks changes so space is used efficiently Eric Vanderburg © 2006
8.
Shadow Copies • Defaults: –
Copy at 7:00 AM & 12:00 PM M-F – Uses 10% of hard drive space • Settings – Change space utilization (100MB min) – Stores up to 64 copies • Previous versions client – %systemroot%system32clientstwclientx86 twcli32.msi – View properties of a file or folder. Eric Vanderburg © 2006
9.
Automated System Recovery •
Restores system configuration information • Backs up registry & user preferences • Data must be restored and applications installed once the ASR process is complete. • Does not restore any installed programs from the program Files folder. • Replaces the NT/2k ERD (Emergency Repair Disk) • Contents of the disk: – Boot files – Asr.sif, Asrpnp.sif Eric Vanderburg © 2006
10.
ASR Restore Process •
1. Insert the Windows XP CD-Rom into the drive 2. Insert the ASR Floppy disk into the drive 3. Power up the computer 4. Press the enter key when prompted to "press any key to run from the CD" 5. Press F2 on the keyboard when prompted to start the ASR recovery action. 6. XP will format the C drive 7. The computer will restart Eric Vanderburg © 2006
11.
ASR Restore Process •
8. Let windows XP start automatically (do not press a key to run from the CD). 9. XP will go through the basic plug and play discovery and copy setup files to the C drive. 10. The computer will restart and boot into XP 11. The ASR wizard will start and automatically point to the asr.bkf file on the CD. Click OK to restore the system state and registry configuration. 13. When completed XP will either present the login screen • 14. Return to the Backup wizard to restore any valued data that was saved beforehand to the drive. Eric Vanderburg © 2006
12.
Advanced Startup • • • • • Press F8
on boot before Windows logo appears Safe Mode Safe Mode with Networking Safe mode with Command Prompt Enable Boot Logging – Logs all the drivers and services loaded and not loaded, %systemroot%ntbtlog.txt • • • • Enable VGA Mode Last Known Good Configuration Directory Services Restore Mode Debugging Mode – Send debug info via serial – Used by developers for kernel modifications Eric Vanderburg © 2006
13.
Recovery Console • Run
from setup process on Windows CD or by installing it as a startup option • Winnt32.exe /cmdcons • Start/stop services • Format drives • Look at data • Replace files • Change configuration • Must have administrator password to enter the recovery console Eric Vanderburg © 2006
14.
Recovery Console Commands •
Listsvc - Lists the services and drivers available on the computer. • Expand - Extracts a file from a compressed file. • Fixboot - Writes a new partition boot sector onto the specified partition. • Fixmbr - Repairs the master boot record of the specified disk. • Diskpart - Manages partitions on your hard drives. • Enable - Starts or enables a system service or a device driver. • Disable - Disables a system service or a device driver • Bootcfg - Boot file (boot.ini) configuration and recovery. • Chkdsk - Checks a disk and displays a status report. Eric Vanderburg © 2006
15.
Acronyms • VSS, Volume
Shadow Copy • ASR, Automated System Recovery • ERD, Emergency Repair Disk Eric Vanderburg © 2006
Descargar ahora